default search action
Keith M. Martin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c54]Colin Putman, Keith M. Martin:
Selective Delegation of Attributes in Mercurial Signature Credentials. IMACC 2023: 181-196 - [c53]Saqib A. Kakvi, Keith M. Martin, Colin Putman, Elizabeth A. Quaglia:
SoK: Anonymous Credentials. SSR 2023: 129-151 - [i20]Colin Putman, Keith M. Martin:
Selective Delegation of Attributes in Mercurial Signature Credentials. IACR Cryptol. ePrint Arch. 2023: 1896 (2023) - 2022
- [j37]Haibat Khan, Benjamin Dowling, Keith M. Martin:
Pragmatic authenticated key agreement for IEEE Std 802.15.6. Int. J. Inf. Sec. 21(3): 577-595 (2022) - 2020
- [j36]Haibat Khan, Keith M. Martin:
A survey of subscription privacy on the 5G radio interface - The past, present and future. J. Inf. Secur. Appl. 53: 102537 (2020) - [i19]Haibat Khan, Benjamin Dowling, Keith M. Martin:
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6. IACR Cryptol. ePrint Arch. 2020: 45 (2020) - [i18]Haibat Khan, Keith M. Martin:
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future. IACR Cryptol. ePrint Arch. 2020: 101 (2020)
2010 – 2019
- 2019
- [c52]Haibat Khan, Keith M. Martin:
On the Efficacy of New Privacy Attacks against 5G AKA. ICETE (2) 2019: 431-438 - 2018
- [j35]Babak Daghighi, Miss Laiha Mat Kiah, Salman Iqbal, Muhammad Habib Ur Rehman, Keith M. Martin:
Host mobility key management in dynamic secure group communication. Wirel. Networks 24(8): 3009-3027 (2018) - [c51]Haibat Khan, Benjamin Dowling, Keith M. Martin:
Identity Confidentiality in 5G Mobile Telephony Systems. SSR 2018: 120-142 - [c50]Haibat Khan, Benjamin Dowling, Keith M. Martin:
Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks. TrustCom/BigDataSE 2018: 1064-1069 - [i17]Haibat Khan, Benjamin Dowling, Keith M. Martin:
Identity Confidentiality in 5G Mobile Telephony Systems. IACR Cryptol. ePrint Arch. 2018: 876 (2018) - 2017
- [j34]Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Localised multisecret sharing. Cryptogr. Commun. 9(5): 581-597 (2017) - [j33]Sarah Louise Renwick, Keith M. Martin:
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment. Cryptogr. 1(3): 19 (2017) - [j32]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. IET Inf. Secur. 11(4): 204-210 (2017) - [c49]Liqun Chen, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme. AFRICACRYPT 2017: 40-57 - [c48]James Alderman, Keith M. Martin, Sarah Louise Renwick:
Multi-level Access in Searchable Symmetric Encryption. Financial Cryptography Workshops 2017: 35-52 - [c47]James Alderman, Benjamin R. Curtis, Oriol Farràs, Keith M. Martin, Jordi Ribes-González:
Private Outsourced Kriging Interpolation. Financial Cryptography Workshops 2017: 75-90 - [c46]Lydia Garms, Keith M. Martin, Siaw-Lynn Ng:
Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper). PST 2017: 311-316 - [i16]James Alderman, Keith M. Martin, Sarah Louise Renwick:
Multi-level Access in Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2017: 211 (2017) - 2016
- [j31]Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer:
Are information security professionals expected value maximizers?: An experiment and survey-based test. J. Cybersecur. 2(1): 57-70 (2016) - [j30]Michelle Kendall, Keith M. Martin:
Graph-theoretic design and analysis of key predistribution schemes. Des. Codes Cryptogr. 81(1): 11-34 (2016) - [c45]Liqun Chen, Thalia M. Laing, Keith M. Martin:
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. CANS 2016: 467-483 - [i15]Liqun Chen, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2016: 1014 (2016) - 2015
- [j29]Constantinos Macropoulos, Keith M. Martin:
Balancing Privacy and Surveillance in the Cloud. IEEE Cloud Comput. 2(4): 14-21 (2015) - [c44]James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick:
Extended Functionality in Verifiable Searchable Encryption. BalkanCryptSec 2015: 187-205 - [c43]Konstantinos Mersinas, Bjoern Hartig, Keith M. Martin, Andrew Seltzer:
Experimental Elicitation of Risk Behaviour amongst Information Security Professionals. WEIS 2015 - [i14]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. CoRR abs/1506.03588 (2015) - [i13]Mwawi M. Nyirenda, Siaw-Lynn Ng, Keith M. Martin:
A Combinatorial Model of Interference in Frequency Hopping Schemes. CoRR abs/1508.02570 (2015) - [i12]Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Localised Multisecret Sharing. IACR Cryptol. ePrint Arch. 2015: 922 (2015) - [i11]James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick:
Extended Functionality in Verifiable Searchable Encryption. IACR Cryptol. ePrint Arch. 2015: 975 (2015) - 2014
- [j28]Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson:
Broadcast-Enhanced Key Predistribution Schemes. ACM Trans. Sens. Networks 11(1): 6:1-6:33 (2014) - [c42]Zhiqian Xu, Keith M. Martin:
Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing. CloudCom 2014: 358-365 - [i10]Michelle Kendall, Keith M. Martin:
Graph-theoretic design and analysis of key predistribution schemes. IACR Cryptol. ePrint Arch. 2014: 355 (2014) - 2013
- [c41]Zhiqian Xu, Keith M. Martin:
A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection. HPCC/EUC 2013: 1593-1598 - [c40]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
A privacy-aware reputation-based announcement scheme for VANETs. WiVeC 2013: 1-5 - 2012
- [j27]Qin Li, Amizah Malip, Keith M. Martin, Siaw-Lynn Ng, Jie Zhang:
A Reputation-Based Announcement Scheme for VANETs. IEEE Trans. Veh. Technol. 61(9): 4095-4108 (2012) - [c39]Qin Li, Jie Zhang, Keith M. Martin:
Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplaces. TrustCom 2012: 334-341 - [c38]Zhiqian Xu, Keith M. Martin:
Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. TrustCom 2012: 844-849 - [i9]Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson:
Broadcast-enhanced Key Predistribution Schemes. IACR Cryptol. ePrint Arch. 2012: 295 (2012) - 2011
- [j26]Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. Cryptogr. Commun. 3(2): 65-86 (2011) - [j25]Shinsaku Kiyomoto, Keith M. Martin:
Model for a Common Notion of Privacy Leakage on Public Database. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 50-62 (2011) - [c37]Qin Li, Keith M. Martin, Jie Zhang:
Design of a multiagent-based e-marketplace to secure service trading on the internet. ICEC 2011: 1:1-1:9 - [c36]Michelle Kendall, Keith M. Martin:
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks. WEWoRC 2011: 62-82 - [i8]Michelle Kendall, Keith M. Martin:
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2011: 555 (2011) - 2010
- [j24]Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson:
Two-dimensional patterns with distinct differences: constructions, bounds, and maximal anticodes. IEEE Trans. Inf. Theory 56(3): 1216-1229 (2010) - [j23]Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson:
Distinct difference configurations: multihop paths and key predistribution in sensor networks. IEEE Trans. Inf. Theory 56(8): 3961-3972 (2010) - [j22]Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Trans. Sens. Networks 7(2): 11:1-11:27 (2010) - [c35]Shinsaku Kiyomoto, Keith M. Martin:
Towards a Common Notion of Privacy Leakage on Public Database. BWCCA 2010: 186-191 - [c34]Jason Crampton, Rosli Daud, Keith M. Martin:
Constructing Key Assignment Schemes from Chain Partitions. DBSec 2010: 130-145 - [c33]Qin Li, Keith M. Martin:
A Viable Grid Marketplace. ISPA 2010: 427-432 - [c32]Keith M. Martin:
The Rise and Fall and Rise of Combinatorial Key Predistribution. Selected Areas in Cryptography 2010: 92-98
2000 – 2009
- 2009
- [j21]Thomas Martin, Keith M. Martin, Peter R. Wild:
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. Des. Codes Cryptogr. 51(3): 315-334 (2009) - [c31]Keith M. Martin:
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. IWCC 2009: 124-145 - [c30]Fiona Higgins, Allan Tomlinson, Keith M. Martin:
Survey on Security Challenges for Swarm Robotics. ICAS 2009: 307-312 - [c29]Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:
Offline Peer-to-Peer Broadcast with Anonymity. ICETE (Selected Papers) 2009: 174-185 - [c28]Geong Sen Poh, Keith M. Martin:
Classification Framework for Fair Content Tracing Protocols. IWDW 2009: 252-267 - [c27]Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:
An Offline Peer-to-peer Broadcasting Scheme with Anonymity. SECRYPT 2009: 75-82 - [c26]Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima:
Privacy-Aware Location Database Service for Granular Queries. WISTP 2009: 28-37 - [c25]Keith M. Martin, Maura B. Paterson:
Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. WISTP 2009: 143-152 - [i7]Keith M. Martin:
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. CoRR abs/0902.0458 (2009) - [i6]Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson:
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2009: 14 (2009) - [i5]Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures. IACR Cryptol. ePrint Arch. 2009: 487 (2009) - 2008
- [c24]Geong Sen Poh, Keith M. Martin:
On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority. ICETE (Selected Papers) 2008: 210-223 - [c23]Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson:
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks. ICITS 2008: 54-69 - [c22]Simon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Key Refreshing in Wireless Sensor Networks. ICITS 2008: 156-170 - [c21]Geong Sen Poh, Keith M. Martin:
An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption. IWDW 2008: 433-447 - [c20]Geong Sen Poh, Keith M. Martin:
On the (In)Security of Two Buyer-Seller Watermarking Protocols. SECRYPT 2008: 253-260 - [i4]Keith M. Martin, Maura B. Paterson, Douglas R. Stinson:
Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes. IACR Cryptol. ePrint Arch. 2008: 412 (2008) - 2007
- [j20]Keith M. Martin, Siaw-Lynn Ng:
The combinatorics of generalised cumulative arrays. J. Math. Cryptol. 1(1): 13-32 (2007) - [c19]Geong Sen Poh, Keith M. Martin:
A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. IAS 2007: 457-461 - [c18]Miss Laiha Mat Kiah, Keith M. Martin:
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. FGCN (1) 2007: 100-107 - [c17]Keith M. Martin, Maura B. Paterson:
An Application-Oriented Framework for Wireless Sensor Network Key Establishment. WCAN@ICALP 2007: 31-41 - 2006
- [j19]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Optimal updating of ideal threshold schemes. Australas. J Comb. 36: 123-132 (2006) - [c16]Jason Crampton, Keith M. Martin, Peter R. Wild:
On Key Assignment for Hierarchical Access Control. CSFW 2006: 98-111 - 2005
- [j18]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin:
A General Approach to Robust Web Metering. Des. Codes Cryptogr. 36(1): 5-27 (2005) - [j17]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptogr. 36(3): 263-287 (2005) - [j16]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin:
Updating the parameters of a threshold scheme by minimal broadcast. IEEE Trans. Inf. Theory 51(2): 620-633 (2005) - [c15]Miss Laiha Mat Kiah, Keith M. Martin:
Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. Security and Management 2005: 385-391 - [c14]Keith M. Martin:
Dynamic access policies for unconditionally secure secret sharing schemes. ICITS 2005: 61-66 - 2004
- [i3]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin:
Updating the Parameters of a Threshold Scheme by Minimal Broadcast. IACR Cryptol. ePrint Arch. 2004: 177 (2004) - [i2]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Optimal Updating of Ideal Threshold Schemes. IACR Cryptol. ePrint Arch. 2004: 178 (2004) - 2003
- [j15]Mida Guillermo, Keith M. Martin, Christine M. O'Keefe:
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. Des. Codes Cryptogr. 28(3): 227-245 (2003) - [c13]Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw:
Ten Years of Information Security Masters Programmes. World Conference on Information Security Education 2003: 215-230 - [i1]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher. IACR Cryptol. ePrint Arch. 2003: 5 (2003) - 2002
- [j14]Günther Horn, Keith M. Martin, Chris J. Mitchell:
Authentication protocols for mobile network environment value-added services. IEEE Trans. Veh. Technol. 51(2): 383-392 (2002) - [c12]Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild:
Size of Broadcast in Threshold Schemes with Disenrollment. ACISP 2002: 71-88 - [c11]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Threshold MACs. ICISC 2002: 237-252
1990 – 1999
- 1999
- [j13]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels. Aust. Comput. J. 31(2): 34-43 (1999) - [j12]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang:
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999) - [j11]Keith M. Martin, Chris J. Mitchell:
Comments on an optimized protocol for mobile network authentication and security. ACM SIGMOBILE Mob. Comput. Commun. Rev. 3(2): 37 (1999) - [c10]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191 - 1998
- [j10]L. Rey A. Casse, Keith M. Martin, Peter R. Wild:
Bounds and Characterizations of Authentication/Secrecy Schemes. Des. Codes Cryptogr. 13(2): 107-129 (1998) - [j9]Marten van Dijk, Wen-Ai Jackson, Keith M. Martin:
A General Decomposition Construction for Incomplete Secret Sharing Schemes. Des. Codes Cryptogr. 15(3): 301-321 (1998) - [j8]Lars R. Knudsen, Keith M. Martin:
In Search of Multiple Domain Key Recovery. J. Comput. Secur. 6(4): 219-236 (1998) - [c9]Keith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, Alla Poliakova, Peter Howard:
Secure Billing for Mobile Information Services in UMTS. IS&N 1998: 535-548 - 1997
- [j7]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Mutually Trusted Authority-Free Secret Sharing Schemes. J. Cryptol. 10(4): 261-289 (1997) - [c8]Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini:
Secret sharing in hierarchical groups. ICICS 1997: 81-86 - [c7]Keith M. Martin, Reihaneh Safavi-Naini:
Multisender authentication systems with unconditional security. ICICS 1997: 130-143 - [c6]Keith M. Martin:
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains. IMACC 1997: 221-232 - 1996
- [j6]Wen-Ai Jackson, Keith M. Martin:
A combinatorial interpretation of ramp schemes. Australas. J Comb. 14: 51-60 (1996) - [j5]Wen-Ai Jackson, Keith M. Martin:
Efficient constructions for one sharing of many secrets. Australas. J Comb. 14: 283-296 (1996) - [j4]Wen-Ai Jackson, Keith M. Martin:
Perfect Secret Sharing Schemes on Five Participants. Des. Codes Cryptogr. 9(3): 267-286 (1996) - [j3]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
A Construction for Multisecret Threshold Schemes. Des. Codes Cryptogr. 9(3): 287-303 (1996) - [j2]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Ideal Secret Sharing Schemes with Multiple Secrets. J. Cryptol. 9(4): 233-250 (1996) - 1995
- [c5]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). EUROCRYPT 1995: 183-193 - 1994
- [j1]Wen-Ai Jackson, Keith M. Martin:
Geometric Secret Sharing Schemes and Their Duals. Des. Codes Cryptogr. 4(1): 83-95 (1994) - [c4]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
On Sharing Many Secrets (Extended Abstract). ASIACRYPT 1994: 42-54 - 1993
- [c3]Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Multisecret Threshold Schemes. CRYPTO 1993: 126-135 - 1992
- [c2]Wen-Ai Jackson, Keith M. Martin:
Cumulative Arrays and Geometric Secret Sharing Schemes. AUSCRYPT 1992: 48-55 - 1990
- [c1]Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild:
Some Remarks on Authentication Systems. AUSCRYPT 1990: 122-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint