Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

35 Publications


2022 | Conference Paper | IST-REx-ID: 12168 | OA
Cohen, Shir, Be aware of your leaders. International Conference on Financial Cryptography and Data Security 13411. 2022
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12167 | OA
Avarikioti, Georgia, Hide & Seek: Privacy-preserving rebalancing on payment channel networks. Financial Cryptography and Data Security 13411. 2022
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12170
Meggendorfer, Tobias, PET – A partial exploration tool for probabilistic verification. 20th International Symposium on Automated Technology for Verification and Analysis 13505. 2022
View | DOI
 

2022 | Conference Paper | IST-REx-ID: 12175 | OA
Bose, Sougata, et al. “History-Deterministic Timed Automata Are Not Determinizable.” 16th International Conference on Reachability Problems, vol. 13608, Springer Nature, 2022, pp. 67–76, doi:10.1007/978-3-031-19135-0_5.
View | DOI | Download Preprint (ext.)
 

2022 | Conference Paper | IST-REx-ID: 12176 | OA
Hoffmann, Charlotte, et al. “Practical Statistically-Sound Proofs of Exponentiation in Any Group.” Advances in Cryptology – CRYPTO 2022, vol. 13508, Springer Nature, 2022, pp. 370–99, doi:10.1007/978-3-031-15979-4_13.
View | DOI | Download Preprint (ext.)
 

2022 | Conference Paper | IST-REx-ID: 12298 | OA
Gelashvili, Rati, et al. “Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.” Financial Cryptography and Data Security, vol. 13411, Springer Nature, 2022, pp. 296–315, doi:10.1007/978-3-031-18283-9_14.
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12302 | OA
Doveri, Kyveli, et al. “FORQ-Based Language Inclusion Formal Testing.” Computer Aided Verification, vol. 13372, Springer Nature, 2022, pp. 109–29, doi:10.1007/978-3-031-13188-2_6.
View | Files available | DOI | arXiv
 

2021 | Conference Paper | IST-REx-ID: 10041 | OA
Kamath Hosdurg, Chethan, et al. “Limits on the Adaptive Security of Yao’s Garbling.” 41st Annual International Cryptology Conference, Part II , vol. 12826, Springer Nature, 2021, pp. 486–515, doi:10.1007/978-3-030-84245-1_17.
View | Files available | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 7966 | OA
Auerbach, Benedikt, et al. “Everybody’s a Target: Scalability in Public-Key Encryption.” Advances in Cryptology – EUROCRYPT 2020, vol. 12107, Springer Nature, 2020, pp. 475–506, doi:10.1007/978-3-030-45727-3_16.
View | DOI | Download Submitted Version (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8195 | OA
Kragl, Bernhard, et al. “Refinement for Structured Concurrent Programs.” Computer Aided Verification, vol. 12224, Springer Nature, 2020, pp. 275–98, doi:10.1007/978-3-030-53288-8_14.
View | Files available | DOI
 

2020 | Book Chapter | IST-REx-ID: 10865 | OA
Chakraborty, Suvradip, et al. “Witness Maps and Applications.” Public-Key Cryptography, edited by A Kiayias, vol. 12110, Springer Nature, 2020, pp. 220–46, doi:10.1007/978-3-030-45374-9_8.
View | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8623 | OA
Henzinger, Thomas A., and Naci E. Sarac. “Monitorability under Assumptions.” Runtime Verification, vol. 12399, Springer Nature, 2020, pp. 3–18, doi:10.1007/978-3-030-60508-7_1.
View | Files available | DOI
 

2020 | Conference Paper | IST-REx-ID: 8732
Arroyo Guevara, Alan M., et al. “Inserting One Edge into a Simple Drawing Is Hard.” Graph-Theoretic Concepts in Computer Science, vol. 12301, Springer Nature, 2020, pp. 325–38, doi:10.1007/978-3-030-60440-0_26.
View | DOI
 

2020 | Conference Paper | IST-REx-ID: 8728 | OA
Asadi, Ali, et al. “Faster Algorithms for Quantitative Analysis of MCs and MDPs with Small Treewidth.” Automated Technology for Verification and Analysis, vol. 12302, Springer Nature, 2020, pp. 253–70, doi:10.1007/978-3-030-59152-6_14.
View | Files available | DOI
 

2019 | Conference Paper | IST-REx-ID: 7411 | OA
Abusalah, Hamza M., et al. “Reversible Proofs of Sequential Work.” Advances in Cryptology – EUROCRYPT 2019, vol. 11477, Springer International Publishing, 2019, pp. 277–91, doi:10.1007/978-3-030-17656-3_10.
View | DOI | Download Submitted Version (ext.)
 

2019 | Conference Paper | IST-REx-ID: 6163
Biswas, Ranita, et al. “Rhombic Dodecahedron Grid—Coordinate System and 3D Digital Object Definitions.” 21st IAPR International Conference on Discrete Geometry for Computer Imagery, vol. 11414, Springer Berlin Heidelberg, 2019, pp. 27–37, doi:10.1007/978-3-030-14085-4_3.
View | DOI
 

2019 | Conference Paper | IST-REx-ID: 6482 | OA
Sun, Rémy, and Christoph Lampert. KS(Conf): A Light-Weight Test If a ConvNet Operates Outside of Its Specifications. Vol. 11269, Springer Nature, 2019, pp. 244–59, doi:10.1007/978-3-030-12939-2_18.
View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2019 | Book Chapter | IST-REx-ID: 6726 | OA
Walter, Michael. “Sampling the Integers with Low Relative Error.” Progress in Cryptology – AFRICACRYPT 2019, edited by J Buchmann et al., vol. 11627, Springer Nature, 2019, pp. 157–80, doi:10.1007/978-3-030-23696-0_9.
View | DOI | Download Preprint (ext.)
 

2019 | Book Chapter | IST-REx-ID: 7453 | OA
Alur, Rajeev, et al. “Continuous-Time Models for System Design and Analysis.” Computing and Software Science, edited by Bernhard Steffen and Gerhard Woeginger, vol. 10000, Springer Nature, 2019, pp. 452–77, doi:10.1007/978-3-319-91908-9_22.
View | DOI | Download Published Version (ext.)
 

2018 | Conference Paper | IST-REx-ID: 8298
Androulaki, Elli, et al. “Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.” Computer Security, vol. 11098, Springer Nature, 2018, pp. 111–31, doi:10.1007/978-3-319-99073-6_6.
View | DOI
 

Filters and Search Terms

issn=1611-3349

Search

Filter Publications