default search action
Search dblp for Publications
export results for "toc:db/conf/acns/acns2008.bht:"
@inproceedings{DBLP:conf/acns/AuHLSWY08, author = {Man Ho Au and Qiong Huang and Joseph K. Liu and Willy Susilo and Duncan S. Wong and Guomin Yang}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Traceable and Retrievable Identity-Based Encryption}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {94--110}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_6}, doi = {10.1007/978-3-540-68914-0\_6}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AuHLSWY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaekZB08, author = {Joonsang Baek and Jianying Zhou and Feng Bao}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Generic Constructions of Stateful Public Key Encryption and Their Applications}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {75--93}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_5}, doi = {10.1007/978-3-540-68914-0\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaekZB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Blanton08, author = {Marina Blanton}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Improved Conditional E-Payments}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {188--206}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_12}, doi = {10.1007/978-3-540-68914-0\_12}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Blanton08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BorisovM08, author = {Nikita Borisov and Soumyadeb Mitra}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {373--391}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_23}, doi = {10.1007/978-3-540-68914-0\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BorisovM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BurmesterM08, author = {Mike Burmester and Breno de Medeiros}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {The Security of {EPC} Gen2 Compliant {RFID} Protocols}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {490--506}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_30}, doi = {10.1007/978-3-540-68914-0\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BurmesterM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CanardG08, author = {S{\'{e}}bastien Canard and Aline Gouget}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Anonymity in Transferable E-cash}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {207--223}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_13}, doi = {10.1007/978-3-540-68914-0\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CanardG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CanardLM08, author = {S{\'{e}}bastien Canard and Fabien Laguillaumie and Michel Milhau}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {TrapdoorSanitizable Signatures and Their Application to Content Protection}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {258--276}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_16}, doi = {10.1007/978-3-540-68914-0\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CanardLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CanrightB08, author = {David Canright and Lejla Batina}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {A Very Compact "Perfectly Masked" S-Box for {AES}}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {446--459}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_27}, doi = {10.1007/978-3-540-68914-0\_27}, timestamp = {Mon, 08 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CanrightB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DamgardKT08, author = {Ivan Damg{\aa}rd and Lars R. Knudsen and S{\o}ren S. Thomsen}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {144--155}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_9}, doi = {10.1007/978-3-540-68914-0\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DamgardKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DingYCCC08, author = {Jintai Ding and Bo{-}Yin Yang and Chia{-}Hsin Owen Chen and Ming{-}Shing Chen and Chen{-}Mou Cheng}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {New Differential-Algebraic Attacks and Reparametrization of Rainbow}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {242--257}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_15}, doi = {10.1007/978-3-540-68914-0\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DingYCCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DodisP08, author = {Yevgeniy Dodis and Prashant Puniya}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {156--173}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_10}, doi = {10.1007/978-3-540-68914-0\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DodisP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FouqueMVZ08, author = {Pierre{-}Alain Fouque and Gwena{\"{e}}lle Martinet and Fr{\'{e}}d{\'{e}}ric Valette and S{\'{e}}bastien Zimmer}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {On the Security of the {CCM} Encryption Mode and of a Slight Variant}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {411--428}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_25}, doi = {10.1007/978-3-540-68914-0\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FouqueMVZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HammouriS08, author = {Ghaith Hammouri and Berk Sunar}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {{PUF-HB:} {A} Tamper-Resilient {HB} Based Authentication Protocol}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {346--365}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_21}, doi = {10.1007/978-3-540-68914-0\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HammouriS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/King08, author = {Brian King}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {429--445}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_26}, doi = {10.1007/978-3-540-68914-0\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/King08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KlonowskiKL08, author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Repelling Detour Attack Against Onions with Re-encryption}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {296--308}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_18}, doi = {10.1007/978-3-540-68914-0\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KlonowskiKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiKZW08, author = {Jin Li and Kwangjo Kim and Fangguo Zhang and Duncan S. Wong}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Generic Security-Amplifying Methods of Ordinary Digital Signatures}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_14}, doi = {10.1007/978-3-540-68914-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiKZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LimLS08, author = {Tong{-}Lee Lim and Anantharaman Lakshminarayanan and Vira Saksen}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {392--410}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_24}, doi = {10.1007/978-3-540-68914-0\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LimLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MitchellRRS08, author = {John C. Mitchell and Arnab Roy and Paul D. Rowe and Andre Scedrov}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Analysis of {EAP-GPSK} Authentication Protocol}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {309--327}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_19}, doi = {10.1007/978-3-540-68914-0\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MitchellRRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NishideYO08, author = {Takashi Nishide and Kazuki Yoneyama and Kazuo Ohta}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {111--129}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_7}, doi = {10.1007/978-3-540-68914-0\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NishideYO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/OuafiP08, author = {Khaled Ouafi and Raphael C.{-}W. Phan}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Traceable Privacy of Recent Provably-Secure {RFID} Protocols}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {479--489}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_29}, doi = {10.1007/978-3-540-68914-0\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/OuafiP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PointchevalZ08, author = {David Pointcheval and S{\'{e}}bastien Zimmer}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Multi-factor Authenticated Key Exchange}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {277--295}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_17}, doi = {10.1007/978-3-540-68914-0\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PointchevalZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PrasadS08, author = {Ramnath Prasad and Nitesh Saxena}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {328--345}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_20}, doi = {10.1007/978-3-540-68914-0\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PrasadS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PuigserverPFR08, author = {Maci{\`{a}} Mut Puigserver and Magdalena Payeras{-}Capell{\`{a}} and Josep Llu{\'{\i}}s Ferrer{-}Gomila and Lloren{\c{c}} Huguet i Rotger}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Replay Attack in a Fair Exchange Protocol}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {174--187}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_11}, doi = {10.1007/978-3-540-68914-0\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/PuigserverPFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/RajabMTP08, author = {Moheeb Abu Rajab and Fabian Monrose and Andreas Terzis and Niels Provos}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Peeking Through the Cloud: DNS-Based Estimation and Its Applications}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {21--38}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_2}, doi = {10.1007/978-3-540-68914-0\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/RajabMTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SanadhyaS08, author = {Somitra Kumar Sanadhya and Palash Sarkar}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Attacking Reduced Round {SHA-256}}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {130--143}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_8}, doi = {10.1007/978-3-540-68914-0\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SanadhyaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ShpilrainU08, author = {Vladimir Shpilrain and Alexander Ushakov}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {An Authentication Scheme Based on the Twisted Conjugacy Problem}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {366--372}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_22}, doi = {10.1007/978-3-540-68914-0\_22}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ShpilrainU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/StajanoCL08, author = {Frank Stajano and Daniel Cvrcek and Matt Lewis}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {460--478}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_28}, doi = {10.1007/978-3-540-68914-0\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/StajanoCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/StavrouLK08, author = {Angelos Stavrou and Michael E. Locasto and Angelos D. Keromytis}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Pushback for Overlay Networks: Protecting Against Malicious Insiders}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {39--54}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_3}, doi = {10.1007/978-3-540-68914-0\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/StavrouLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TsangS08, author = {Patrick P. Tsang and Sean W. Smith}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {{PPAA:} Peer-to-Peer Anonymous Authentication}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {55--74}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_4}, doi = {10.1007/978-3-540-68914-0\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TsangS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XieSZ08, author = {Liang Xie and Hui Song and Sencun Zhu}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {On the Effectiveness of Internal Patching Against File-Sharing Worms}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {1--20}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_1}, doi = {10.1007/978-3-540-68914-0\_1}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/XieSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2008, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0}, doi = {10.1007/978-3-540-68914-0}, isbn = {978-3-540-68913-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.