Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

35 Publications


2022 | Conference Paper | IST-REx-ID: 12302
Doveri, Kyveli, FORQ-based language inclusion formal testing. Computer Aided Verification 13372. 2022
View | DOI
 

2022 | Conference Paper | IST-REx-ID: 12298
Gelashvili, Rati, Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. Financial Cryptography and Data Security 13411. 2022
View | DOI
 

2022 | Conference Paper | IST-REx-ID: 12168 | OA
Cohen, Shir, Be aware of your leaders. International Conference on Financial Cryptography and Data Security 13411. 2022
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12167 | OA
Avarikioti, Georgia, Hide & Seek: Privacy-preserving rebalancing on payment channel networks. Financial Cryptography and Data Security 13411. 2022
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12170
Meggendorfer, Tobias, PET – A partial exploration tool for probabilistic verification. 20th International Symposium on Automated Technology for Verification and Analysis 13505. 2022
View | DOI
 

2022 | Conference Paper | IST-REx-ID: 12175 | OA
Bose, S., Henzinger, T. A., Lehtinen, K., Schewe, S., & Totzke, P. (2022). History-deterministic timed automata are not determinizable. In 16th International Conference on Reachability Problems (Vol. 13608, pp. 67–76). Kaiserslautern, Germany: Springer Nature. https://doi.org/10.1007/978-3-031-19135-0_5
View | DOI | Download Preprint (ext.)
 

2022 | Conference Paper | IST-REx-ID: 12176 | OA
Hoffmann, C., Hubáček, P., Kamath, C., Klein, K., & Pietrzak, K. Z. (2022). Practical statistically-sound proofs of exponentiation in any group. In Advances in Cryptology – CRYPTO 2022 (Vol. 13508, pp. 370–399). Santa Barbara, CA, United States: Springer Nature. https://doi.org/10.1007/978-3-031-15979-4_13
View | DOI | Download Preprint (ext.)
 

2021 | Conference Paper | IST-REx-ID: 10041 | OA
Kamath Hosdurg, C., Klein, K., Pietrzak, K. Z., & Wichs, D. (2021). Limits on the Adaptive Security of Yao’s Garbling. In 41st Annual International Cryptology Conference, Part II (Vol. 12826, pp. 486–515). Cham: Springer Nature. https://doi.org/10.1007/978-3-030-84245-1_17
View | Files available | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 7966 | OA
Auerbach, B., Giacon, F., & Kiltz, E. (2020). Everybody’s a target: Scalability in public-key encryption. In Advances in Cryptology – EUROCRYPT 2020 (Vol. 12107, pp. 475–506). Springer Nature. https://doi.org/10.1007/978-3-030-45727-3_16
View | DOI | Download Submitted Version (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8195 | OA
Kragl, B., Qadeer, S., & Henzinger, T. A. (2020). Refinement for structured concurrent programs. In Computer Aided Verification (Vol. 12224, pp. 275–298). Springer Nature. https://doi.org/10.1007/978-3-030-53288-8_14
View | Files available | DOI
 

2020 | Book Chapter | IST-REx-ID: 10865 | OA
Chakraborty, S., Prabhakaran, M., & Wichs, D. (2020). Witness maps and applications. In A. Kiayias (Ed.), Public-Key Cryptography (Vol. 12110, pp. 220–246). Cham: Springer Nature. https://doi.org/10.1007/978-3-030-45374-9_8
View | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8623 | OA
Henzinger, T. A., & Sarac, N. E. (2020). Monitorability under assumptions. In Runtime Verification (Vol. 12399, pp. 3–18). Los Angeles, CA, United States: Springer Nature. https://doi.org/10.1007/978-3-030-60508-7_1
View | Files available | DOI
 

2020 | Conference Paper | IST-REx-ID: 8732
Arroyo Guevara, A. M., Klute, F., Parada, I., Seidel, R., Vogtenhuber, B., & Wiedera, T. (2020). Inserting one edge into a simple drawing is hard. In Graph-Theoretic Concepts in Computer Science (Vol. 12301, pp. 325–338). Leeds, United Kingdom: Springer Nature. https://doi.org/10.1007/978-3-030-60440-0_26
View | DOI
 

2020 | Conference Paper | IST-REx-ID: 8728 | OA
Asadi, A., Chatterjee, K., Goharshady, A. K., Mohammadi, K., & Pavlogiannis, A. (2020). Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth. In Automated Technology for Verification and Analysis (Vol. 12302, pp. 253–270). Hanoi, Vietnam: Springer Nature. https://doi.org/10.1007/978-3-030-59152-6_14
View | Files available | DOI
 

2019 | Conference Paper | IST-REx-ID: 7411 | OA
Abusalah, H. M., Kamath Hosdurg, C., Klein, K., Pietrzak, K. Z., & Walter, M. (2019). Reversible proofs of sequential work. In Advances in Cryptology – EUROCRYPT 2019 (Vol. 11477, pp. 277–291). Darmstadt, Germany: Springer International Publishing. https://doi.org/10.1007/978-3-030-17656-3_10
View | DOI | Download Submitted Version (ext.)
 

2019 | Conference Paper | IST-REx-ID: 6163
Biswas, R., Largeteau-Skapin, G., Zrour, R., & Andres, E. (2019). Rhombic dodecahedron grid—coordinate system and 3D digital object definitions. In 21st IAPR International Conference on Discrete Geometry for Computer Imagery (Vol. 11414, pp. 27–37). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-030-14085-4_3
View | DOI
 

2019 | Conference Paper | IST-REx-ID: 6482 | OA
Sun, R., & Lampert, C. (2019). KS(conf): A light-weight test if a ConvNet operates outside of Its specifications (Vol. 11269, pp. 244–259). Presented at the GCPR: Conference on Pattern Recognition, Stuttgart, Germany: Springer Nature. https://doi.org/10.1007/978-3-030-12939-2_18
View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2019 | Book Chapter | IST-REx-ID: 6726 | OA
Walter, M. (2019). Sampling the integers with low relative error. In J. Buchmann, A. Nitaj, & T. Rachidi (Eds.), Progress in Cryptology – AFRICACRYPT 2019 (Vol. 11627, pp. 157–180). Cham: Springer Nature. https://doi.org/10.1007/978-3-030-23696-0_9
View | DOI | Download Preprint (ext.)
 

2019 | Book Chapter | IST-REx-ID: 7453 | OA
Alur, R., Giacobbe, M., Henzinger, T. A., Larsen, K. G., & Mikučionis, M. (2019). Continuous-time models for system design and analysis. In B. Steffen & G. Woeginger (Eds.), Computing and Software Science (Vol. 10000, pp. 452–477). Springer Nature. https://doi.org/10.1007/978-3-319-91908-9_22
View | DOI | Download Published Version (ext.)
 

2018 | Conference Paper | IST-REx-ID: 8298
Androulaki, E., Cachin, C., De Caro, A., & Kokoris Kogias, E. (2018). Channels: Horizontal scaling and confidentiality on permissioned blockchains. In Computer Security (Vol. 11098, pp. 111–131). Barcelona, Spain: Springer Nature. https://doi.org/10.1007/978-3-319-99073-6_6
View | DOI
 

Filters and Search Terms

issn=1611-3349

Search

Filter Publications