Search dblp for Publications

export results for "stream:conf/secsr:"

 download as .bib file

@inproceedings{DBLP:conf/secsr/FischlinHMMWB23,
  author       = {Marc Fischlin and
                  Jonas von der Heyden and
                  Marian Margraf and
                  Frank Morgner and
                  Andreas Wallner and
                  Holger Bock},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {Post-quantum Security for the Extended Access Control Protocol},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {22--52},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_2},
  doi          = {10.1007/978-3-031-30731-7\_2},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/FischlinHMMWB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/GazdagGHHSCGL23,
  author       = {Stefan{-}Lukas Gazdag and
                  Sophia Grundner{-}Culemann and
                  Tobias Heider and
                  Daniel Herzinger and
                  Felix Sch{\"{a}}rtl and
                  Joo Yeon Cho and
                  Tobias Guggemos and
                  Daniel Loebenberger},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {Quantum-Resistant MACsec and IPsec for Virtual Private Networks},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_1},
  doi          = {10.1007/978-3-031-30731-7\_1},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/GazdagGHHSCGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KakviMPQ23,
  author       = {Saqib A. Kakvi and
                  Keith M. Martin and
                  Colin Putman and
                  Elizabeth A. Quaglia},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {SoK: Anonymous Credentials},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {129--151},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_6},
  doi          = {10.1007/978-3-031-30731-7\_6},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KakviMPQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KampanakisL23,
  author       = {Panos Kampanakis and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {Vision Paper: Do We Need to Change Some Things? - Open Questions Posed
                  by the Upcoming Post-quantum Migration to Existing Standards and Deployments},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {78--102},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_4},
  doi          = {10.1007/978-3-031-30731-7\_4},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KampanakisL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/PoetteringR23,
  author       = {Bertram Poettering and
                  Simon Rastikian},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {A Study of {KEM} Generalizations},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {53--77},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_3},
  doi          = {10.1007/978-3-031-30731-7\_3},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/PoetteringR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/ShuvoHMS23,
  author       = {Md. Wasiuddin Pathan Shuvo and
                  Md. Nazmul Hoq and
                  Suryadipta Majumdar and
                  Paria Shirani},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {On Reducing Underutilization of Security Standards by Deriving Actionable
                  Rules: An Application to IoT},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {103--128},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_5},
  doi          = {10.1007/978-3-031-30731-7\_5},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/ShuvoHMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2023,
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7},
  doi          = {10.1007/978-3-031-30731-7},
  isbn         = {978-3-031-30730-0},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/AkhmetzyanovaAS20,
  author       = {Liliya R. Akhmetzyanova and
                  Evgeny K. Alekseev and
                  Stanislav Smyshlyaev and
                  Igor B. Oshkin},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {On Internal Re-keying},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {23--45},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_2},
  doi          = {10.1007/978-3-030-64357-7\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/AkhmetzyanovaAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/AlbrechtJ20,
  author       = {Martin R. Albrecht and
                  Rikke Bjerg Jensen},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {The Vacuity of the Open Source Security Testing Methodology Manual},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {114--147},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_6},
  doi          = {10.1007/978-3-030-64357-7\_6},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/AlbrechtJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/AzouaouiBBDD0JK20,
  author       = {Melissa Azouaoui and
                  Davide Bellizia and
                  Ileana Buhan and
                  Nicolas Debande and
                  S{\'{e}}bastien Duval and
                  Christophe Giraud and
                  {\'{E}}liane Jaulmes and
                  Fran{\c{c}}ois Koeune and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Carolyn Whitnall},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {A Systematic Appraisal of Side Channel Evaluation Strategies},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {46--66},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_3},
  doi          = {10.1007/978-3-030-64357-7\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/AzouaouiBBDD0JK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/BrandstetterFSY20,
  author       = {Lukas Brandstetter and
                  Marc Fischlin and
                  Robin Leander Schr{\"{o}}der and
                  Michael Yonli},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {On the Memory Fault Resilience of {TLS} 1.3},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_1},
  doi          = {10.1007/978-3-030-64357-7\_1},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/BrandstetterFSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/ChalkiasGN20,
  author       = {Konstantinos Chalkias and
                  Fran{\c{c}}ois Garillot and
                  Valeria Nikolaenko},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {Taming the Many EdDSAs},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {67--90},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_4},
  doi          = {10.1007/978-3-030-64357-7\_4},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/ChalkiasGN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Halpin20,
  author       = {Harry Halpin},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {Vision: {A} Critique of Immunity Passports and {W3C} Decentralized
                  Identifiers},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {148--168},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_7},
  doi          = {10.1007/978-3-030-64357-7\_7},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/Halpin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Kakvi20,
  author       = {Saqib A. Kakvi},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {SoK: Comparison of the Security of Real World {RSA} Hash-and-Sign
                  Signatures},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {91--113},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_5},
  doi          = {10.1007/978-3-030-64357-7\_5},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/Kakvi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2020,
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7},
  doi          = {10.1007/978-3-030-64357-7},
  isbn         = {978-3-030-64356-0},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/AlvarezAHH19,
  author       = {Flor {\'{A}}lvarez and
                  Lars Almon and
                  Ann{-}Sophie Hahn and
                  Matthias Hollick},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship
                  Concept},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360334},
  doi          = {10.1145/3338500.3360334},
  timestamp    = {Wed, 11 Aug 2021 15:12:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/AlvarezAHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/DunkelmanP19,
  author       = {Orr Dunkelman and
                  L{\'{e}}o Perrin},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving"
                  Designs},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360335},
  doi          = {10.1145/3338500.3360335},
  timestamp    = {Tue, 12 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/DunkelmanP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Kakvi19,
  author       = {Saqib A. Kakvi},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {On the Security of {RSA-PSS} in the Wild},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360333},
  doi          = {10.1145/3338500.3360333},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Kakvi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KhanGN19,
  author       = {Mohsin Khan and
                  Philip Ginzboorg and
                  Valtteri Niemi},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {Privacy Preserving {AKMA} in 5G},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360337},
  doi          = {10.1145/3338500.3360337},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KhanGN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/LiMC19,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and
                  OpenID Connect},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360331},
  doi          = {10.1145/3338500.3360331},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/LiMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/WhitakerPRE19,
  author       = {Justin Whitaker and
                  Sathvik Prasad and
                  Bradley Reaves and
                  William Enck},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {Thou Shalt Discuss Security: Quantifying the Impacts of Instructions
                  to {RFC} Authors},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {57--68},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360332},
  doi          = {10.1145/3338500.3360332},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/WhitakerPRE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Yoneyama19,
  author       = {Kazuki Yoneyama},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {Post-Quantum Variants of {ISO/IEC} Standards: Compact Chosen Ciphertext
                  Secure Key Encapsulation Mechanism from Isogeny},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {13--21},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360336},
  doi          = {10.1145/3338500.3360336},
  timestamp    = {Tue, 12 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/Yoneyama19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2019,
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500},
  doi          = {10.1145/3338500},
  isbn         = {978-1-4503-6832-2},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/BalducciniV18,
  author       = {Marcello Balduccini and
                  Claire Vishik},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {Building Blocks in Standards: Improving Consistency in Standardization
                  with Ontology and Reasoning},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {76--94},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_5},
  doi          = {10.1007/978-3-030-04762-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/BalducciniV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/BhargavanKS18,
  author       = {Karthikeyan Bhargavan and
                  Franziskus Kiefer and
                  Pierre{-}Yves Strub},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {hacspec: Towards Verifiable Crypto Standards},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_1},
  doi          = {10.1007/978-3-030-04762-7\_1},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/BhargavanKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/BruniJPS18,
  author       = {Alessandro Bruni and
                  Thorvald Sahl J{\o}rgensen and
                  Theis Gr{\o}nbech Petersen and
                  Carsten Sch{\"{u}}rmann},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {Formal Verification of Ephemeral Diffie-Hellman Over {COSE} {(EDHOC)}},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_2},
  doi          = {10.1007/978-3-030-04762-7\_2},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/BruniJPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/HalpinEM18,
  author       = {Harry Halpin and
                  Ksenia Ermoshina and
                  Francesca Musiani},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure
                  Messaging Protocols},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {56--75},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_4},
  doi          = {10.1007/978-3-030-04762-7\_4},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/HalpinEM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Hurley-SmithH18,
  author       = {Darren Hurley{-}Smith and
                  Julio C. Hernandez{-}Castro},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {Great Expectations: {A} Critique of Current Approaches to Random Number
                  Generation Testing {\&} Certification},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_8},
  doi          = {10.1007/978-3-030-04762-7\_8},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Hurley-SmithH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Kelsey18,
  author       = {John Kelsey},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {The New Randomness Beacon Format Standard: An Exercise in Limiting
                  the Power of a Trusted Third Party},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {164--184},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_9},
  doi          = {10.1007/978-3-030-04762-7\_9},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/Kelsey18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KhanDM18,
  author       = {Haibat Khan and
                  Benjamin Dowling and
                  Keith M. Martin},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {Identity Confidentiality in 5G Mobile Telephony Systems},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {120--142},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_7},
  doi          = {10.1007/978-3-030-04762-7\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KhanDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KhanG0N18,
  author       = {Mohsin Khan and
                  Philip Ginzboorg and
                  Kimmo J{\"{a}}rvinen and
                  Valtteri Niemi},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {Defeating the Downgrade Attack on Identity Privacy in 5G},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {95--119},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_6},
  doi          = {10.1007/978-3-030-04762-7\_6},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KhanG0N18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/TeichelH18,
  author       = {Kristof Teichel and
                  Gregor Hildermeier},
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization
                  Protocols},
  booktitle    = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  pages        = {37--55},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7\_3},
  doi          = {10.1007/978-3-030-04762-7\_3},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/TeichelH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2018,
  editor       = {Cas Cremers and
                  Anja Lehmann},
  title        = {Security Standardisation Research - 4th International Conference,
                  {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11322},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04762-7},
  doi          = {10.1007/978-3-030-04762-7},
  isbn         = {978-3-030-04761-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/AlgarinD16,
  author       = {Alberto De la Rosa Algarin and
                  Steven A. Demurjian},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Extending the {UML} Standards to Model Tree-Structured Data and Their
                  Access Control Requirements},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {187--204},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_8},
  doi          = {10.1007/978-3-319-49100-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/AlgarinD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/CairnsHS16,
  author       = {Kelsey Cairns and
                  Harry Halpin and
                  Graham Steel},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Security Analysis of the {W3C} Web Cryptography {API}},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {112--140},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_5},
  doi          = {10.1007/978-3-319-49100-4\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/CairnsHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/ChenU16,
  author       = {Liqun Chen and
                  Rainer Urian},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Algorithm Agility - Discussion on {TPM} 2.0 {ECC} Functionalities},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {141--159},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_6},
  doi          = {10.1007/978-3-319-49100-4\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/ChenU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/GuttmanRR16,
  author       = {Joshua D. Guttman and
                  John D. Ramsdell and
                  Paul D. Rowe},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Cross-Tool Semantics for Protocol Security Goals},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {32--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_2},
  doi          = {10.1007/978-3-319-49100-4\_2},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/GuttmanRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/HanataniOOCD16,
  author       = {Yoshikazu Hanatani and
                  Naoki Ogura and
                  Yoshihiro Ohba and
                  Lidong Chen and
                  Subir Das},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Secure Multicast Group Management and Key Distribution in {IEEE} 802.21},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {227--243},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_10},
  doi          = {10.1007/978-3-319-49100-4\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/HanataniOOCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Katz16,
  author       = {Jonathan Katz},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Analysis of a Proposed Hash-Based Signature Standard},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {261--273},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_12},
  doi          = {10.1007/978-3-319-49100-4\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Katz16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/McGrewKFGBB16,
  author       = {David A. McGrew and
                  Panos Kampanakis and
                  Scott R. Fluhrer and
                  Stefan{-}Lukas Gazdag and
                  Denis Butin and
                  Johannes Buchmann},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {State Management for Hash-Based Signatures},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {244--260},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_11},
  doi          = {10.1007/978-3-319-49100-4\_11},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/McGrewKFGBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/MehrnezhadAHM16,
  author       = {Maryam Mehrnezhad and
                  Mohammed Aamir Ali and
                  Feng Hao and
                  Aad P. A. van Moorsel},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {{NFC} Payment Spy: {A} Privacy Attack on Contactless Payments},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_4},
  doi          = {10.1007/978-3-319-49100-4\_4},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/MehrnezhadAHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/MorgnerBF16,
  author       = {Frank Morgner and
                  Paul Bastian and
                  Marc Fischlin},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Attribute-Based Access Control Architectures with the eIDAS Protocols},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {205--226},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_9},
  doi          = {10.1007/978-3-319-49100-4\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/MorgnerBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/PatersonM16,
  author       = {Kenneth G. Paterson and
                  Thyla van der Merwe},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Reactive and Proactive Standardisation of {TLS}},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {160--186},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_7},
  doi          = {10.1007/978-3-319-49100-4\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/PatersonM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/SabtT16,
  author       = {Mohamed Sabt and
                  Jacques Traor{\'{e}}},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Cryptanalysis of GlobalPlatform Secure Channel Protocols},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {62--91},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_3},
  doi          = {10.1007/978-3-319-49100-4\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/SabtT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/SakuradaYHY16,
  author       = {Hideki Sakurada and
                  Kazuki Yoneyama and
                  Yoshikazu Hanatani and
                  Maki Yoshida},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Analyzing and Fixing the {QACCE} Security of {QUIC}},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {1--31},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_1},
  doi          = {10.1007/978-3-319-49100-4\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/SakuradaYHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2016,
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4},
  doi          = {10.1007/978-3-319-49100-4},
  isbn         = {978-3-319-49099-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/BernsteinCCHLLN15,
  author       = {Daniel J. Bernstein and
                  Tung Chou and
                  Chitchanok Chuengsatiansup and
                  Andreas H{\"{u}}lsing and
                  Eran Lambooij and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Christine van Vredendaal},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {How to Manipulate Curve Standards: {A} White Paper for the Black Hat
                  http: //bada55.cr.yp.to},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {109--139},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_6},
  doi          = {10.1007/978-3-319-27152-1\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/BernsteinCCHLLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Gonzalez-Burgueno15,
  author       = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and
                  Sonia Santiago and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Analysis of the PKCS{\#}11 {API} Using the Maude-NPA Tool},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {86--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_5},
  doi          = {10.1007/978-3-319-27152-1\_5},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Gonzalez-Burgueno15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/GuttmanLRR15,
  author       = {Joshua D. Guttman and
                  Moses D. Liskov and
                  John D. Ramsdell and
                  Paul D. Rowe},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Formal Support for Standardizing Protocols with State},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {246--265},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_13},
  doi          = {10.1007/978-3-319-27152-1\_13},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/GuttmanLRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/HokinoFOKSS15,
  author       = {Masatoshi Hokino and
                  Yuri Fujiki and
                  Sakura Onda and
                  Takeaki Kaneko and
                  Natsuhiko Sakimura and
                  Hiroyuki Sato},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {A Practical Trust Framework: Assurance Levels Repackaged Through Analysis
                  of Business Scenarios and Related Risks},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_11},
  doi          = {10.1007/978-3-319-27152-1\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/HokinoFOKSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/HwangKCJS15,
  author       = {Jung Yeon Hwang and
                  Seung{-}Hyun Kim and
                  Daeseon Choi and
                  Seung{-}Hun Jin and
                  Boyeon Song},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Robust Authenticated Key Exchange Using Passwords and Identity-Based
                  Signatures},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {43--69},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_3},
  doi          = {10.1007/978-3-319-27152-1\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/HwangKCJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KayuniKLMY15,
  author       = {Mwawi Nyirenda Kayuni and
                  Mohammed Shafiul Alam Khan and
                  Wanpeng Li and
                  Chris J. Mitchell and
                  Po{-}Wah Yau},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Generating Unlinkable IPv6 Addresses},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_10},
  doi          = {10.1007/978-3-319-27152-1\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KayuniKLMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KhanM15,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Improving Air Interface User Privacy in Mobile Telephony},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_9},
  doi          = {10.1007/978-3-319-27152-1\_9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/KhanM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/McCorrySCH15,
  author       = {Patrick McCorry and
                  Siamak Fayyaz Shahandashti and
                  Dylan Clarke and
                  Feng Hao},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Authenticated Key Exchange over Bitcoin},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_1},
  doi          = {10.1007/978-3-319-27152-1\_1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/McCorrySCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/MehrnezhadHS15,
  author       = {Maryam Mehrnezhad and
                  Feng Hao and
                  Siamak Fayyaz Shahandashti},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Tap-Tap and Pay {(TTP):} Preventing the Mafia Attack in {NFC} Payment},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_2},
  doi          = {10.1007/978-3-319-27152-1\_2},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/MehrnezhadHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/RulandS15,
  author       = {Karl Christoph Ruland and
                  Jochen Sassmannshausen},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Non-repudiation Services for the {MMS} Protocol of {IEC} 61850},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_4},
  doi          = {10.1007/978-3-319-27152-1\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/RulandS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Sekar15,
  author       = {Gautham Sekar},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Side Channel Cryptanalysis of Streebog},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {154--162},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_8},
  doi          = {10.1007/978-3-319-27152-1\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Sekar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/TeichelSM15,
  author       = {Kristof Teichel and
                  Dieter Sibold and
                  Stefan Milius},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {First Results of a Formal Analysis of the Network Time Security Specification},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {218--245},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_12},
  doi          = {10.1007/978-3-319-27152-1\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/TeichelSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/ZhangYZC15,
  author       = {Zhenfeng Zhang and
                  Kang Yang and
                  Jiang Zhang and
                  Cheng Chen},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Security of the {SM2} Signature Scheme Against Generalized Key Substitution
                  Attacks},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {140--153},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_7},
  doi          = {10.1007/978-3-319-27152-1\_7},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/ZhangYZC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2015,
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1},
  doi          = {10.1007/978-3-319-27152-1},
  isbn         = {978-3-319-27151-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/AbdullaSJ14,
  author       = {Alan Anwer Abdulla and
                  Harin Sellahewa and
                  Sabah A. Jassim},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Stego Quality Enhancement by Message Size Reduction and Fibonacci
                  Bit-Plane Mapping},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_10},
  doi          = {10.1007/978-3-319-14054-4\_10},
  timestamp    = {Sat, 09 Apr 2022 12:41:37 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/AbdullaSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/BrownJ14,
  author       = {Christopher W. Brown and
                  Michael Jenkins},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Analyzing Proposals for Improving Authentication on the TLS/SSL-Protected
                  Web},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_3},
  doi          = {10.1007/978-3-319-14054-4\_3},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/BrownJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/CremersH14,
  author       = {Cas Cremers and
                  Marko Horvat},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Improving the {ISO/IEC} 11770 Standard for Key Management Techniques},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {215--235},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_13},
  doi          = {10.1007/978-3-319-14054-4\_13},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/CremersH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/DegabrieleFFGGM14,
  author       = {Jean Paul Degabriele and
                  Victoria Fehr and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Kenneth G. Paterson},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-Standards-Track
                  Authentication Protocol},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_1},
  doi          = {10.1007/978-3-319-14054-4\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/DegabrieleFFGGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/FleischhackerMA14,
  author       = {Nils Fleischhacker and
                  Mark Manulis and
                  Amir Azodi},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {A Modular Framework for Multi-Factor Authentication and Key Exchange},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {190--214},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_12},
  doi          = {10.1007/978-3-319-14054-4\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/FleischhackerMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/GarrettW14,
  author       = {Duncan Garrett and
                  Michael Ward},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Blinded Diffie-Hellman - Preventing Eavesdroppers from Tracking Payments},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {79--92},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_6},
  doi          = {10.1007/978-3-319-14054-4\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/GarrettW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Gonzalez-Burgueno14,
  author       = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and
                  Sonia Santiago and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Analysis of the {IBM} {CCA} Security {API} Protocols in Maude-NPA},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {111--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_8},
  doi          = {10.1007/978-3-319-14054-4\_8},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Gonzalez-Burgueno14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Griffin14,
  author       = {Phillip H. Griffin},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Standardization Transparency - An Out of Body Experience},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {57--68},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_4},
  doi          = {10.1007/978-3-319-14054-4\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Griffin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/GuttmanLR14,
  author       = {Joshua D. Guttman and
                  Moses D. Liskov and
                  Paul D. Rowe},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Security Goals and Evolving Standards},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_7},
  doi          = {10.1007/978-3-319-14054-4\_7},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/GuttmanLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/HaleB14,
  author       = {Britta Hale and
                  Colin Boyd},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Computationally Analyzing the {ISO} 9798-2.4 Authentication Protocol},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {236--255},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_14},
  doi          = {10.1007/978-3-319-14054-4\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/HaleB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/HaoS14,
  author       = {Feng Hao and
                  Siamak Fayyaz Shahandashti},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {The {SPEKE} Protocol Revisited},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {26--38},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_2},
  doi          = {10.1007/978-3-319-14054-4\_2},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/HaoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/LeeL14,
  author       = {Jinwoo Lee and
                  Pil Joong Lee},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily
                  Long Hashcode},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {69--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_5},
  doi          = {10.1007/978-3-319-14054-4\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/LeeL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/ManulisSD14,
  author       = {Mark Manulis and
                  Douglas Stebila and
                  Nick Denham},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Secure Modular Password Authentication for the Web Using Channel Bindings},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {167--189},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_11},
  doi          = {10.1007/978-3-319-14054-4\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/ManulisSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/StathakidisSH14,
  author       = {Efstathios Stathakidis and
                  Steve A. Schneider and
                  James Heather},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Robustness Modelling and Verification of a Mix Net Protocol},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {131--150},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_9},
  doi          = {10.1007/978-3-319-14054-4\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/StathakidisSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2014,
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4},
  doi          = {10.1007/978-3-319-14054-4},
  isbn         = {978-3-319-14053-7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}