Search dblp for Publications

export results for "toc:db/conf/ispec/ispec2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ispec/0001DMAFKS18,
  author       = {Partha Sarathi Roy and
                  Sabyasachi Dutta and
                  Kirill Morozov and
                  Avishek Adhikari and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Kouichi Sakurai},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary:
                  Cheater Identification and Robustness},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {578--594},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_37},
  doi          = {10.1007/978-3-319-99807-7\_37},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/0001DMAFKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/0005ZMYT18,
  author       = {Weiwei Liu and
                  Yinghui Zhang and
                  Yi Mu and
                  Guomin Yang and
                  Yangguang Tian},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Efficient Traceable Oblivious Transfer and Its Applications},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {610--621},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_39},
  doi          = {10.1007/978-3-319-99807-7\_39},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/0005ZMYT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CarpovS18,
  author       = {Sergiu Carpov and
                  Oana Stan},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE
                  Homomorphic Encryption Schemes},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {265--281},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_16},
  doi          = {10.1007/978-3-319-99807-7\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CarpovS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChengC18,
  author       = {Zhaohui Cheng and
                  Liqun Chen},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Certificateless Public Key Signature Schemes from Standard Algorithms},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {179--197},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_11},
  doi          = {10.1007/978-3-319-99807-7\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ChengC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChiuYN18,
  author       = {Wayne Chiu and
                  Kuo{-}Hui Yeh and
                  Akihito Nakamura},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Seeing Is Believing: Authenticating Users with What They See and Remember},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {391--403},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_24},
  doi          = {10.1007/978-3-319-99807-7\_24},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ChiuYN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Datta18,
  author       = {Pratish Datta},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Constrained (Verifiable) Pseudorandom Function from Functional Encryption},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {141--159},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_9},
  doi          = {10.1007/978-3-319-99807-7\_9},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Datta18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/DuttaNR18,
  author       = {Sabyasachi Dutta and
                  Nishant Nikam and
                  Sushmita Ruj},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Secure Computation of Inner Product of Vectors with Distributed Entries
                  and Its Applications to {SVM}},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {533--543},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_34},
  doi          = {10.1007/978-3-319-99807-7\_34},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/DuttaNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GabillonB18,
  author       = {Alban Gabillon and
                  Emmanuel Bruno},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Regulating IoT Messages},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {468--480},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_29},
  doi          = {10.1007/978-3-319-99807-7\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GabillonB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GuoWZC18,
  author       = {Jingjing Guo and
                  Jianfeng Wang and
                  Zhiwei Zhang and
                  Xiaofeng Chen},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {An Almost Non-interactive Order Preserving Encryption Scheme},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_6},
  doi          = {10.1007/978-3-319-99807-7\_6},
  timestamp    = {Tue, 18 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GuoWZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HiranoKK18,
  author       = {Takato Hirano and
                  Yutaka Kawai and
                  Yoshihiro Koseki},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Efficient Trapdoor Generation from Multiple Hashing in Searchable
                  Symmetric Encryption},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_10},
  doi          = {10.1007/978-3-319-99807-7\_10},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HiranoKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HiroseS18,
  author       = {Shoichi Hirose and
                  Junji Shikata},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Non-adaptive Group-Testing Aggregate {MAC} Scheme},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {357--372},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_22},
  doi          = {10.1007/978-3-319-99807-7\_22},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/HiroseS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KomanoXKS18,
  author       = {Yuichi Komano and
                  Zhengfan Xia and
                  Takeshi Kawabata and
                  Hideo Shimizu},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Efficient and Secure Firmware Update/Rollback Method for Vehicular
                  Devices},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {455--467},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_28},
  doi          = {10.1007/978-3-319-99807-7\_28},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KomanoXKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LandauerWSSF18,
  author       = {Max Landauer and
                  Markus Wurzenberger and
                  Florian Skopik and
                  Giuseppe Settanni and
                  Peter Filzmoser},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier
                  Detection},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_2},
  doi          = {10.1007/978-3-319-99807-7\_2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LandauerWSSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiMWHL18,
  author       = {Wenjuan Li and
                  Weizhi Meng and
                  Yu Wang and
                  Jinguang Han and
                  Jin Li},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Towards Securing Challenge-Based Collaborative Intrusion Detection
                  Networks via Message Verification},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {313--328},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_19},
  doi          = {10.1007/978-3-319-99807-7\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiMWHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiuWWXX18,
  author       = {Yi{-}Ning Liu and
                  Yan{-}Ping Wang and
                  Xiao{-}Fen Wang and
                  Zhe Xia and
                  Jingfang Xu},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {506--518},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_32},
  doi          = {10.1007/978-3-319-99807-7\_32},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LiuWWXX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LohHT18,
  author       = {Jia{-}Ch'ng Loh and
                  Swee{-}Huay Heng and
                  Syh{-}Yuan Tan},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {A Generic Framework for Accountable Optimistic Fair Exchange Protocol},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {299--309},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_18},
  doi          = {10.1007/978-3-319-99807-7\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LohHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LuoWL18,
  author       = {Fucai Luo and
                  Kunpeng Wang and
                  Changlu Lin},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from
                  Learning with Rounding},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_7},
  doi          = {10.1007/978-3-319-99807-7\_7},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LuoWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LuoWTZHG18,
  author       = {Entao Luo and
                  Guojun Wang and
                  Kun Tang and
                  Quanyou Zhao and
                  Chen He and
                  Liyong Guo},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile
                  Healthcare},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {495--505},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_31},
  doi          = {10.1007/978-3-319-99807-7\_31},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LuoWTZHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MengL18,
  author       = {Weizhi Meng and
                  Zhe Liu},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {TMGMap: Designing Touch Movement-Based Geographical Password Authentication
                  on Smartphones},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {373--390},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_23},
  doi          = {10.1007/978-3-319-99807-7\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/MengL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MiuraMT18,
  author       = {Hiroya Miura and
                  Mamoru Mimura and
                  Hidema Tanaka},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Macros Finder: Do You Remember LOVELETTER?},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_1},
  doi          = {10.1007/978-3-319-99807-7\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/MiuraMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PereraK18,
  author       = {Maharage Nisansala Sevwandi Perera and
                  Takeshi Koshiba},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group
                  Signatures with Verifier-Local Revocation},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {229--247},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_14},
  doi          = {10.1007/978-3-319-99807-7\_14},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/PereraK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/RenZSLY18,
  author       = {Hao Ren and
                  Peng Zhang and
                  Qingchun Shentu and
                  Joseph K. Liu and
                  Tsz Hon Yuen},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Compact Ring Signature in the Standard Model for Blockchain},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {50--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_4},
  doi          = {10.1007/978-3-319-99807-7\_4},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/RenZSLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SameerN18,
  author       = {Venkata Udaya Sameer and
                  Ruchira Naskar},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Universal Wavelet Relative Distortion: {A} New Counter-Forensic Attack
                  on Photo Response Non-Uniformity Based Source Camera Identification},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {37--49},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_3},
  doi          = {10.1007/978-3-319-99807-7\_3},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SameerN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SantosoYO18,
  author       = {Bagus Santoso and
                  Taiyo Yamaguchi and
                  Tomoyuki Ohkubo},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Entanglement Between Hash Encodings and Signatures from {ID} Schemes
                  with Non-binary Challenges: {A} Case Study on Lightweight Code-Based
                  Signatures},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_15},
  doi          = {10.1007/978-3-319-99807-7\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/SantosoYO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SchabhuserB018,
  author       = {Lucas Schabh{\"{u}}ser and
                  Denis Butin and
                  Johannes Buchmann},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {{CHQS:} Publicly Verifiable Homomorphic Signatures Beyond the Linear
                  Case},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_13},
  doi          = {10.1007/978-3-319-99807-7\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/SchabhuserB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SenguptaR18,
  author       = {Binanda Sengupta and
                  Sushmita Ruj},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Keyword-Based Delegable Proofs of Storage},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {282--298},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_17},
  doi          = {10.1007/978-3-319-99807-7\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/SenguptaR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SimCMYCH18,
  author       = {Bo{-}Yeon Sim and
                  Kyu Young Choi and
                  Dukjae Moon and
                  Hyo Jin Yoon and
                  Jihoon Cho and
                  Dong{-}Guk Han},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {T{\_}SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against
                  Single-Trace Attacks},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {407--423},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_25},
  doi          = {10.1007/978-3-319-99807-7\_25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SimCMYCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Sumongkayothin18,
  author       = {Karin Sumongkayothin},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {{M-ORAM} Revisited: Security and Construction Updates},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {521--532},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_33},
  doi          = {10.1007/978-3-319-99807-7\_33},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Sumongkayothin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SuzukiEO18,
  author       = {Tatsuya Suzuki and
                  Keita Emura and
                  Toshihiro Ohigashi},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {A Generic Construction of Integrated Secure-Channel Free {PEKS} and
                  {PKE}},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {69--86},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_5},
  doi          = {10.1007/978-3-319-99807-7\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SuzukiEO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TekliBIKH18,
  author       = {Jimmy Tekli and
                  Bechara al Bouna and
                  Youssef Bou Issa and
                  Marc Kamradt and
                  Ramzi A. Haraty},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {(k, l)-Clustering for Transactional Data Streams Anonymization},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {544--556},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_35},
  doi          = {10.1007/978-3-319-99807-7\_35},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/TekliBIKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TianLZLYY18,
  author       = {Yangguang Tian and
                  Yingjiu Li and
                  Yinghui Zhang and
                  Nan Li and
                  Guomin Yang and
                  Yong Yu},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {{DSH:} Deniable Secret Handshake Framework},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {341--353},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_21},
  doi          = {10.1007/978-3-319-99807-7\_21},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TianLZLYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangCLH18,
  author       = {Huige Wang and
                  Kefei Chen and
                  Joseph K. Liu and
                  Ziyuan Hu},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from
                  Garbled Circuits},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {119--140},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_8},
  doi          = {10.1007/978-3-319-99807-7\_8},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangCLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangW18,
  author       = {Yuntao Wang and
                  Thomas Wunderer},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Revisiting the Sparsification Technique in Kannan's Embedding Attack
                  on {LWE}},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {440--452},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_27},
  doi          = {10.1007/978-3-319-99807-7\_27},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WangW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XiaYZM18,
  author       = {Zhe Xia and
                  Bo Yang and
                  Mingwu Zhang and
                  Yi Mu},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {An Efficient and Provably Secure Private Polynomial Evaluation Scheme},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {595--609},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_38},
  doi          = {10.1007/978-3-319-99807-7\_38},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/XiaYZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuZXZJ18,
  author       = {Jing Xu and
                  Yuqiang Zhang and
                  Fei Xu and
                  Lei Zhou and
                  Shuanglin Jiang},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {A Security Cycle Clock Synchronization Method Based on Mobile Reference
                  Nodes in Wireless Sensor Networks},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {481--492},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_30},
  doi          = {10.1007/978-3-319-99807-7\_30},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuZXZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YinWLZJ18,
  author       = {Wei Yin and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Hua Zhang and
                  Zhengping Jin},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {A New Insight - Proxy Re-encryption Under {LWE} with Strong Anti-collusion},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {559--577},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_36},
  doi          = {10.1007/978-3-319-99807-7\_36},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YinWLZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YuanLSSW18,
  author       = {Zhiwei Yuan and
                  Yang Li and
                  Kazuo Sakiyama and
                  Takeshi Sugawara and
                  Jian Wang},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Recovering Memory Access Sequence with Differential Flush+Reload Attack},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {424--439},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_26},
  doi          = {10.1007/978-3-319-99807-7\_26},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/YuanLSSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhengYWSH18,
  author       = {Mingmei Zheng and
                  Shao{-}Jun Yang and
                  Wei Wu and
                  Jun Shao and
                  Xinyi Huang},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {A New Design of Online/Offline Signatures Based on Lattice},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {198--212},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_12},
  doi          = {10.1007/978-3-319-99807-7\_12},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhengYWSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZongCS18,
  author       = {Wei Zong and
                  Yang{-}Wai Chow and
                  Willy Susilo},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {A Two-Stage Classifier Approach for Network Intrusion Detection},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {329--340},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_20},
  doi          = {10.1007/978-3-319-99807-7\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZongCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2018,
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7},
  doi          = {10.1007/978-3-319-99807-7},
  isbn         = {978-3-319-99806-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}