default search action
Search dblp for Publications
export results for "toc:db/conf/iwsec/iwsec2017.bht:"
@inproceedings{DBLP:conf/iwsec/Al-FannahL17, author = {Nasser Mohammed Al{-}Fannah and Wanpeng Li}, editor = {Satoshi Obana and Koji Chida}, title = {Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {105--120}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_7}, doi = {10.1007/978-3-319-64200-0\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Al-FannahL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AlsayighDTW17, author = {Saed Alsayigh and Jintai Ding and Tsuyoshi Takagi and Yuntao Wang}, editor = {Satoshi Obana and Koji Chida}, title = {The Beauty and the Beasts - The Hard Cases in {LLL} Reduction}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {19--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_2}, doi = {10.1007/978-3-319-64200-0\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AlsayighDTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BuldasLWC17, author = {Ahto Buldas and Aleksandr Lenin and Jan Willemson and Anton Charnamord}, editor = {Satoshi Obana and Koji Chida}, title = {Simple Infeasibility Certificates for Attack Trees}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {39--55}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_3}, doi = {10.1007/978-3-319-64200-0\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/BuldasLWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Fujioka17, author = {Atsushi Fujioka}, editor = {Satoshi Obana and Koji Chida}, title = {Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {192--211}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_12}, doi = {10.1007/978-3-319-64200-0\_12}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Fujioka17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HosoyamadaA17, author = {Akinori Hosoyamada and Kazumaro Aoki}, editor = {Satoshi Obana and Koji Chida}, title = {On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_1}, doi = {10.1007/978-3-319-64200-0\_1}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HosoyamadaA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KondoSTI17, author = {Kota Kondo and Yu Sasaki and Yosuke Todo and Tetsu Iwata}, editor = {Satoshi Obana and Koji Chida}, title = {Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {141--158}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_9}, doi = {10.1007/978-3-319-64200-0\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KondoSTI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KuchtaSSBM17, author = {Veronika Kuchta and Gaurav Sharma and Rajeev Anand Sahu and Tarunpreet Bhatia and Olivier Markowitch}, editor = {Satoshi Obana and Koji Chida}, title = {Secure Certificateless Proxy Re-encryption Without Pairing}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {85--101}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_6}, doi = {10.1007/978-3-319-64200-0\_6}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KuchtaSSBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MauN17, author = {Baptiste Vinh Mau and Koji Nuida}, editor = {Satoshi Obana and Koji Chida}, title = {Correction of a Secure Comparison Protocol for Encrypted Integers in {IEEE} {WIFS} 2012 (Short Paper)}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {181--191}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_11}, doi = {10.1007/978-3-319-64200-0\_11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MauN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuVS17, author = {Jiawei Su and Danilo Vasconcellos Vargas and Kouichi Sakurai}, editor = {Satoshi Obana and Koji Chida}, title = {Evasion Attacks Against Statistical Code Obfuscation Detectors}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {121--137}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_8}, doi = {10.1007/978-3-319-64200-0\_8}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XiaJY17, author = {Bingqing Xia and Dongyao Ji and Gang Yao}, editor = {Satoshi Obana and Koji Chida}, title = {Enhanced {TLS} Handshake Authentication with Blockchain and Smart Contract (Short Paper)}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {56--66}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_4}, doi = {10.1007/978-3-319-64200-0\_4}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XiaJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMBRK17, author = {Rui Xu and Kirill Morozov and Anirban Basu and Mohammad Shahriar Rahman and Shinsaku Kiyomoto}, editor = {Satoshi Obana and Koji Chida}, title = {Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {159--178}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_10}, doi = {10.1007/978-3-319-64200-0\_10}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMBRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XueLL17, author = {Haiyang Xue and Bao Li and Xianhui Lu}, editor = {Satoshi Obana and Koji Chida}, title = {{IND-PCA} Secure {KEM} Is Enough for Password-Based Authenticated Key Exchange (Short Paper)}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {231--241}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_14}, doi = {10.1007/978-3-319-64200-0\_14}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XueLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangFLW17, author = {Daode Zhang and Fuyang Fang and Bao Li and Xin Wang}, editor = {Satoshi Obana and Koji Chida}, title = {Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {215--230}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_13}, doi = {10.1007/978-3-319-64200-0\_13}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangFLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangH17, author = {Rui Zhang and Kai He}, editor = {Satoshi Obana and Koji Chida}, title = {Multipurpose Public-Key Encryption}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {69--84}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_5}, doi = {10.1007/978-3-319-64200-0\_5}, timestamp = {Sat, 19 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2017, editor = {Satoshi Obana and Koji Chida}, title = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0}, doi = {10.1007/978-3-319-64200-0}, isbn = {978-3-319-64199-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.