Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

202 Publications


2022 | Published | Conference Paper | IST-REx-ID: 12167 | OA
Avarikioti G, Pietrzak KZ, Salem I, Schmid S, Tiwari S, Yeo MX. 2022. Hide & Seek: Privacy-preserving rebalancing on payment channel networks. Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 13411, 358–373.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12170
Meggendorfer T. 2022. PET – A partial exploration tool for probabilistic verification. 20th International Symposium on Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 13505, 320–326.
View | DOI
 

2022 | Published | Conference Paper | IST-REx-ID: 12298 | OA
Gelashvili R, Kokoris Kogias E, Sonnino A, Spiegelman A, Xiang Z. 2022. Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. Financial Cryptography and Data Security. FC: Financial Cryptography, LNCS, vol. 13411, 296–315.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12516 | OA
Bogdanov A, Cueto Noval M, Hoffmann C, Rosen A. 2022. Public-Key Encryption from Homogeneous CLWE. Theory of Cryptography. TCC: Theory of Cryptography, LNCS, vol. 13748, 565–592.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 18229 | OA
Amrani E, Karlinsky L, Bronstein AM. 2022. Self-supervised classification network. 17th European Conference on Computer Vision. ECCV: European Conference on Computer Vision, LNCS, vol. 13691, 116–132.
View | Files available | DOI | Download None (ext.) | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12168 | OA
Cohen S, Gelashvili R, Kokoris Kogias E, Li Z, Malkhi D, Sonnino A, Spiegelman A. 2022. Be aware of your leaders. International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 13411, 279–295.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12302 | OA
Doveri K, Ganty P, Mazzocchi NA. 2022. FORQ-based language inclusion formal testing. Computer Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 13372, 109–129.
[Published Version] View | Files available | DOI | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12171 | OA
Garcia Soto M, Henzinger TA, Schilling C. 2022. Synthesis of parametric hybrid automata from time series. 20th International Symposium on Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 13505, 337–353.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 12175 | OA
Bose S, Henzinger TA, Lehtinen K, Schewe S, Totzke P. 2022. History-deterministic timed automata are not determinizable. 16th International Conference on Reachability Problems. RC: Reachability Problems, LNCS, vol. 13608, 67–76.
[Preprint] View | DOI | Download Preprint (ext.)
 

2022 | Published | Conference Paper | IST-REx-ID: 11707 | OA
Balliu A, Hirvonen J, Melnyk D, Olivetti D, Rybicki J, Suomela J. 2022. Local mending. International Colloquium on Structural Information and Communication Complexity. SIROCCO: Structural Information and Communication ComplexityLNCS vol. 13298, 1–20.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 10891
Henzinger TA. 2022. Quantitative monitoring of software. Software Verification. NSV: Numerical Software VerificationLNCS vol. 13124, 3–6.
View | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 11355 | OA
Bartocci E, Ferrere T, Henzinger TA, Nickovic D, Da Costa AO. 2022. Information-flow interfaces. Fundamental Approaches to Software Engineering. FASE: Fundamental Approaches to Software Engineering, LNCS, vol. 13241, 3–22.
[Published Version] View | Files available | DOI | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 11185 | OA
Arroyo Guevara AM, Felsner S. 2022. Approximating the bundled crossing number. WALCOM 2022: Algorithms and Computation. WALCOM: Algorithms and ComputationLNCS vol. 13174, 383–395.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2022 | Published | Conference Paper | IST-REx-ID: 11476 | OA
Alwen J, Auerbach B, Cueto Noval M, Klein K, Pascual Perez G, Pietrzak KZ, Walter M. 2022. CoCoA: Concurrent continuous group key agreement. Advances in Cryptology – EUROCRYPT 2022. EUROCRYPT: Theory and Applications of Cryptology and Information Security, LNCS, vol. 13276, 815–844.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12176 | OA
Hoffmann C, Hubáček P, Kamath C, Klein K, Pietrzak KZ. 2022. Practical statistically-sound proofs of exponentiation in any group. Advances in Cryptology – CRYPTO 2022. CRYPTO: International Cryptology Conference, LNCS, vol. 13508, 370–399.
[Preprint] View | DOI | Download Preprint (ext.) | WoS
 

2022 | Published | Conference Paper | IST-REx-ID: 12000 | OA
Chatterjee K, Goharshady AK, Meggendorfer T, Zikelic D. 2022. Sound and complete certificates for auantitative termination analysis of probabilistic programs. Proceedings of the 34th International Conference on Computer Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 13371, 55–78.
[Published Version] View | Files available | DOI | WoS
 

2022 | Published | Book Chapter | IST-REx-ID: 20062
Henzinger M. 2022.Fine-Grained Complexity Lower Bounds for Problems in Computer Aided Verification. In: Principles of Systems Design. vol. 13660, 292–305.
View | DOI
 

2022 | Published | Conference Paper | IST-REx-ID: 11775 | OA
Henzinger TA, Mazzocchi NA, Sarac NE. 2022. Abstract monitors for quantitative specifications. 22nd International Conference on Runtime Verification. RV: Runtime Verification, LNCS, vol. 13498, 200–220.
[Published Version] View | Files available | DOI | WoS
 

2021 | Published | Conference Paper | IST-REx-ID: 11771 | OA
Henzinger M, Wu X. 2021. Upper and lower bounds for fully retroactive graph problems. 17th International Symposium on Algorithms and Data Structures. WADS: Workshop on Algorithms and Data Structures, LNCS, vol. 12808, 471–484.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2021 | Published | Conference Paper | IST-REx-ID: 10324 | OA
Avarikioti Z, Kokoris Kogias E, Wattenhofer R, Zindros D. 2021. Brick: Asynchronous incentive-compatible payment channels. 25th International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography, LNCS, vol. 12675, 209–230.
[Preprint] View | DOI | Download Preprint (ext.) | WoS | arXiv
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: ISTA Annual Report

Export / Embed