Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

35 Publications


2022 | Conference Paper | IST-REx-ID: 12168 | OA
Be aware of your leaders
Cohen, Shir, Be aware of your leaders. International Conference on Financial Cryptography and Data Security 13411. 2022
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12167 | OA
Hide & Seek: Privacy-preserving rebalancing on payment channel networks
Avarikioti, Georgia, Hide & Seek: Privacy-preserving rebalancing on payment channel networks. Financial Cryptography and Data Security 13411. 2022
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12170
PET – A partial exploration tool for probabilistic verification
Meggendorfer, Tobias, PET – A partial exploration tool for probabilistic verification. 20th International Symposium on Automated Technology for Verification and Analysis 13505. 2022
View | DOI
 

2022 | Conference Paper | IST-REx-ID: 12175 | OA
History-deterministic timed automata are not determinizable
S. Bose, T.A. Henzinger, K. Lehtinen, S. Schewe, P. Totzke, in:, 16th International Conference on Reachability Problems, Springer Nature, 2022, pp. 67–76.
View | DOI | Download Preprint (ext.)
 

2022 | Conference Paper | IST-REx-ID: 12176 | OA
Practical statistically-sound proofs of exponentiation in any group
C. Hoffmann, P. Hubáček, C. Kamath, K. Klein, K.Z. Pietrzak, in:, Advances in Cryptology – CRYPTO 2022, Springer Nature, 2022, pp. 370–399.
View | DOI | Download Preprint (ext.)
 

2022 | Conference Paper | IST-REx-ID: 12298 | OA
Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback
R. Gelashvili, E. Kokoris Kogias, A. Sonnino, A. Spiegelman, Z. Xiang, in:, Financial Cryptography and Data Security, Springer Nature, 2022, pp. 296–315.
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12302 | OA
FORQ-based language inclusion formal testing
K. Doveri, P. Ganty, N.A. Mazzocchi, in:, Computer Aided Verification, Springer Nature, 2022, pp. 109–129.
View | Files available | DOI | arXiv
 

2021 | Conference Paper | IST-REx-ID: 10041 | OA
Limits on the Adaptive Security of Yao’s Garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, D. Wichs, in:, 41st Annual International Cryptology Conference, Part II , Springer Nature, Cham, 2021, pp. 486–515.
View | Files available | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 7966 | OA
Everybody’s a target: Scalability in public-key encryption
B. Auerbach, F. Giacon, E. Kiltz, in:, Advances in Cryptology – EUROCRYPT 2020, Springer Nature, 2020, pp. 475–506.
View | DOI | Download Submitted Version (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8195 | OA
Refinement for structured concurrent programs
B. Kragl, S. Qadeer, T.A. Henzinger, in:, Computer Aided Verification, Springer Nature, 2020, pp. 275–298.
View | Files available | DOI
 

2020 | Book Chapter | IST-REx-ID: 10865 | OA
Witness maps and applications
S. Chakraborty, M. Prabhakaran, D. Wichs, in:, A. Kiayias (Ed.), Public-Key Cryptography, Springer Nature, Cham, 2020, pp. 220–246.
View | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8623 | OA
Monitorability under assumptions
T.A. Henzinger, N.E. Sarac, in:, Runtime Verification, Springer Nature, 2020, pp. 3–18.
View | Files available | DOI
 

2020 | Conference Paper | IST-REx-ID: 8732
Inserting one edge into a simple drawing is hard
A.M. Arroyo Guevara, F. Klute, I. Parada, R. Seidel, B. Vogtenhuber, T. Wiedera, in:, Graph-Theoretic Concepts in Computer Science, Springer Nature, 2020, pp. 325–338.
View | DOI
 

2020 | Conference Paper | IST-REx-ID: 8728 | OA
Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth
A. Asadi, K. Chatterjee, A.K. Goharshady, K. Mohammadi, A. Pavlogiannis, in:, Automated Technology for Verification and Analysis, Springer Nature, 2020, pp. 253–270.
View | Files available | DOI
 

2019 | Conference Paper | IST-REx-ID: 7411 | OA
Reversible proofs of sequential work
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
View | DOI | Download Submitted Version (ext.)
 

2019 | Conference Paper | IST-REx-ID: 6163
Rhombic dodecahedron grid—coordinate system and 3D digital object definitions
R. Biswas, G. Largeteau-Skapin, R. Zrour, E. Andres, in:, 21st IAPR International Conference on Discrete Geometry for Computer Imagery, Springer Berlin Heidelberg, Berlin, Heidelberg, 2019, pp. 27–37.
View | DOI
 

2019 | Conference Paper | IST-REx-ID: 6482 | OA
KS(conf): A light-weight test if a ConvNet operates outside of Its specifications
R. Sun, C. Lampert, in:, Springer Nature, 2019, pp. 244–259.
View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2019 | Book Chapter | IST-REx-ID: 6726 | OA
Sampling the integers with low relative error
M. Walter, in:, J. Buchmann, A. Nitaj, T. Rachidi (Eds.), Progress in Cryptology – AFRICACRYPT 2019, Springer Nature, Cham, 2019, pp. 157–180.
View | DOI | Download Preprint (ext.)
 

2019 | Book Chapter | IST-REx-ID: 7453 | OA
Continuous-time models for system design and analysis
R. Alur, M. Giacobbe, T.A. Henzinger, K.G. Larsen, M. Mikučionis, in:, B. Steffen, G. Woeginger (Eds.), Computing and Software Science, Springer Nature, 2019, pp. 452–477.
View | DOI | Download Published Version (ext.)
 

2018 | Conference Paper | IST-REx-ID: 8298
Channels: Horizontal scaling and confidentiality on permissioned blockchains
E. Androulaki, C. Cachin, A. De Caro, E. Kokoris Kogias, in:, Computer Security, Springer Nature, 2018, pp. 111–131.
View | DOI
 

2018 | Conference Paper | IST-REx-ID: 6941 | OA
SpaceMint: A cryptocurrency based on proofs of space
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J.F. Alwen, K.Z. Pietrzak, in:, 22nd International Conference on Financial Cryptography and Data Security, Springer Nature, 2018, pp. 480–499.
View | DOI | Download Submitted Version (ext.)
 

2017 | Book Chapter | IST-REx-ID: 5803
Construction of persistent Voronoi diagram on 3D digital plane
R. Biswas, P. Bhowmick, in:, Combinatorial Image Analysis, Springer Nature, Cham, 2017, pp. 93–104.
View | DOI
 

2016 | Conference Paper | IST-REx-ID: 5806
On functionality of quadraginta octants of naive sphere with application to circle drawing
R. Biswas, P. Bhowmick, in:, Discrete Geometry for Computer Imagery, Springer Nature, Cham, 2016, pp. 256–267.
View | DOI
 

2014 | Conference Paper | IST-REx-ID: 5810
On Finding Spherical Geodesic Paths and Circles in ℤ3
R. Biswas, P. Bhowmick, 8668 (2014) 396–409.
View | DOI
 

2014 | Conference Paper | IST-REx-ID: 10894
PHAT – Persistent Homology Algorithms Toolbox
U. Bauer, M. Kerber, J. Reininghaus, H. Wagner, in:, ICMS 2014: International Congress on Mathematical Software, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014, pp. 137–143.
View | Files available | DOI
 

2013 | Book Chapter | IST-REx-ID: 5747 | OA
Automatic Linearizability Proofs of Concurrent Objects with Cooperating Updates
C. Dragoi, A. Gupta, T.A. Henzinger, in:, Computer Aided Verification, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 174–190.
View | Files available | DOI
 

2013 | Conference Paper | IST-REx-ID: 10902
How to travel between languages
K. Chatterjee, S. Chaubal, S. Rubin, in:, 7th International Conference on Language and Automata Theory and Applications, Springer Nature, Berlin, Heidelberg, 2013, pp. 214–225.
View | DOI
 

2013 | Conference Paper | IST-REx-ID: 10897
Persistent homology in image processing
H. Edelsbrunner, in:, Graph-Based Representations in Pattern Recognition, Springer Nature, Berlin, Heidelberg, 2013, pp. 182–183.
View | DOI
 

2012 | Book Chapter | IST-REx-ID: 5745 | OA
Improved Single Pass Algorithms for Resolution Proof Reduction
A. Gupta, in:, Automated Technology for Verification and Analysis, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 107–121.
View | Files available | DOI
 

2012 | Conference Paper | IST-REx-ID: 10906 | OA
HSF(C): A software verifier based on Horn clauses
S. Grebenshchikov, A. Gupta, N.P. Lopes, C. Popeea, A. Rybalchenko, in:, C. Flanagan, B. König (Eds.), Tools and Algorithms for the Construction and Analysis of Systems, Springer, Berlin, Heidelberg, 2012, pp. 549–551.
View | DOI | Download Published Version (ext.)
 

2012 | Conference Paper | IST-REx-ID: 10903
Accurate invariant checking for programs manipulating lists and arrays with infinite data
A. Bouajjani, C. Dragoi, C. Enea, M. Sighireanu, in:, Automated Technology for Verification and Analysis, Springer, Berlin, Heidelberg, 2012, pp. 167–182.
View | DOI
 

2012 | Conference Paper | IST-REx-ID: 10905
Polynomial-time algorithms for energy games with special weight structures
K. Chatterjee, M.H. Henzinger, S. Krinninger, D. Nanongkai, in:, L. Epstein, P. Ferragina (Eds.), Algorithms – ESA 2012, Springer, Berlin, Heidelberg, 2012, pp. 301–312.
View | Files available | DOI | arXiv
 

2012 | Conference Paper | IST-REx-ID: 10904
Strategy synthesis for multi-dimensional quantitative objectives
K. Chatterjee, M. Randour, J.-F. Raskin, in:, M. Koutny, I. Ulidowski (Eds.), CONCUR 2012 - Concurrency Theory, Springer, Berlin, Heidelberg, 2012, pp. 115–131.
View | Files available | DOI | arXiv
 

2011 | Conference Paper | IST-REx-ID: 10907
Spatio-temporal extraction of articulated models in a graph pyramid
N.M. Artner, A. Ion, W.G. Kropatsch, in:, X. Jiang, M. Ferrer, A. Torsello (Eds.), Graph-Based Representations in Pattern Recognition, Springer, Berlin, Heidelberg, 2011, pp. 215–224.
View | DOI
 

2010 | Book Chapter | IST-REx-ID: 5940
Instance Deadlock: A Mystery behind Frozen Programs
G. Juhás, I. Kazlov, A. Juhásová, in:, Applications and Theory of Petri Nets, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010, pp. 1–17.
View | DOI
 

Filters and Search Terms

issn=1611-3349

Search

Filter Publications