Search dblp for Publications

export results for "toc:db/conf/iwsec/iwsec2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwsec/Al-FannahL17,
  author       = {Nasser Mohammed Al{-}Fannah and
                  Wanpeng Li},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {105--120},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_7},
  doi          = {10.1007/978-3-319-64200-0\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Al-FannahL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AlsayighDTW17,
  author       = {Saed Alsayigh and
                  Jintai Ding and
                  Tsuyoshi Takagi and
                  Yuntao Wang},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {The Beauty and the Beasts - The Hard Cases in {LLL} Reduction},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_2},
  doi          = {10.1007/978-3-319-64200-0\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AlsayighDTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BuldasLWC17,
  author       = {Ahto Buldas and
                  Aleksandr Lenin and
                  Jan Willemson and
                  Anton Charnamord},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Simple Infeasibility Certificates for Attack Trees},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {39--55},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_3},
  doi          = {10.1007/978-3-319-64200-0\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/BuldasLWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Fujioka17,
  author       = {Atsushi Fujioka},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Adaptive Security in Identity-Based Authenticated Key Agreement with
                  Multiple Private Key Generators},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_12},
  doi          = {10.1007/978-3-319-64200-0\_12},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Fujioka17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HosoyamadaA17,
  author       = {Akinori Hosoyamada and
                  Kazumaro Aoki},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_1},
  doi          = {10.1007/978-3-319-64200-0\_1},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HosoyamadaA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KondoSTI17,
  author       = {Kota Kondo and
                  Yu Sasaki and
                  Yosuke Todo and
                  Tetsu Iwata},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Analyzing Key Schedule of Simon: Iterative Key Differences and Application
                  to Related-Key Impossible Differentials},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_9},
  doi          = {10.1007/978-3-319-64200-0\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KondoSTI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KuchtaSSBM17,
  author       = {Veronika Kuchta and
                  Gaurav Sharma and
                  Rajeev Anand Sahu and
                  Tarunpreet Bhatia and
                  Olivier Markowitch},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Secure Certificateless Proxy Re-encryption Without Pairing},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {85--101},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_6},
  doi          = {10.1007/978-3-319-64200-0\_6},
  timestamp    = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KuchtaSSBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MauN17,
  author       = {Baptiste Vinh Mau and
                  Koji Nuida},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Correction of a Secure Comparison Protocol for Encrypted Integers
                  in {IEEE} {WIFS} 2012 (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {181--191},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_11},
  doi          = {10.1007/978-3-319-64200-0\_11},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MauN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuVS17,
  author       = {Jiawei Su and
                  Danilo Vasconcellos Vargas and
                  Kouichi Sakurai},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Evasion Attacks Against Statistical Code Obfuscation Detectors},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {121--137},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_8},
  doi          = {10.1007/978-3-319-64200-0\_8},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XiaJY17,
  author       = {Bingqing Xia and
                  Dongyao Ji and
                  Gang Yao},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Enhanced {TLS} Handshake Authentication with Blockchain and Smart
                  Contract (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {56--66},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_4},
  doi          = {10.1007/978-3-319-64200-0\_4},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XiaJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMBRK17,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Anirban Basu and
                  Mohammad Shahriar Rahman and
                  Shinsaku Kiyomoto},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Security Analysis of a Verifiable Server-Aided Approximate Similarity
                  Computation},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_10},
  doi          = {10.1007/978-3-319-64200-0\_10},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMBRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XueLL17,
  author       = {Haiyang Xue and
                  Bao Li and
                  Xianhui Lu},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {{IND-PCA} Secure {KEM} Is Enough for Password-Based Authenticated
                  Key Exchange (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {231--241},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_14},
  doi          = {10.1007/978-3-319-64200-0\_14},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XueLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangFLW17,
  author       = {Daode Zhang and
                  Fuyang Fang and
                  Bao Li and
                  Xin Wang},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Deterministic Identity-Based Encryption from Lattices with More Compact
                  Public Parameters},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_13},
  doi          = {10.1007/978-3-319-64200-0\_13},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangFLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangH17,
  author       = {Rui Zhang and
                  Kai He},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Multipurpose Public-Key Encryption},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_5},
  doi          = {10.1007/978-3-319-64200-0\_5},
  timestamp    = {Sat, 19 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2017,
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0},
  doi          = {10.1007/978-3-319-64200-0},
  isbn         = {978-3-319-64199-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}