


default search action
Search dblp for Publications
export results for "toc:db/conf/provsec/provsec2011.bht:"
@inproceedings{DBLP:conf/provsec/BartheOB11, author = {Gilles Barthe and Federico Olmedo and Santiago Zanella B{\'{e}}guelin}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Verifiable Security of Boneh-Franklin Identity-Based Encryption}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {68--83}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_7}, doi = {10.1007/978-3-642-24316-5\_7}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BartheOB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BaumslagFNSS11, author = {Gilbert Baumslag and Nelly Fazio and Antonio Nicolosi and Vladimir Shpilrain and William E. Skeith III}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Generalized Learning Problems and Applications to Non-commutative Cryptography}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {324--339}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_23}, doi = {10.1007/978-3-642-24316-5\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BaumslagFNSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChenZF11, author = {Cheng Chen and Zhenfeng Zhang and Dengguo Feng}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {84--101}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_8}, doi = {10.1007/978-3-642-24316-5\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ChenZF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChengZZ11, author = {Rong Cheng and Bo Zhang and Fangguo Zhang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Secure Obfuscation of Encrypted Verifiable Encrypted Signatures}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {188--203}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_14}, doi = {10.1007/978-3-642-24316-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ChengZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DingG11, author = {Ning Ding and Dawu Gu}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Precise Time and Space Simulatable Zero-Knowledge}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {16--33}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_4}, doi = {10.1007/978-3-642-24316-5\_4}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/DingG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/GjosteenPS11, author = {Kristian Gj{\o}steen and George Petrides and Asgeir Steine}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {A Novel Framework for Protocol Analysis}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {340--347}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_24}, doi = {10.1007/978-3-642-24316-5\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/GjosteenPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Goyal11, author = {Vipul Goyal}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Secure Composition of Cryptographic Protocols}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {2}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_2}, doi = {10.1007/978-3-642-24316-5\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Goyal11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Groth11, author = {Jens Groth}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Optimal Structure-Preserving Signatures}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {1}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_1}, doi = {10.1007/978-3-642-24316-5\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Groth11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HanataniMY11, author = {Yoshikazu Hanatani and Hirofumi Muratani and Tomoko Yonemura}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Toward Compact Public Key Encryption Based on {CDH} Assumption via Extended Twin {DH} Assumption}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {138--153}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_11}, doi = {10.1007/978-3-642-24316-5\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/HanataniMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Huang11, author = {Hai Huang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {389--397}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_28}, doi = {10.1007/978-3-642-24316-5\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Huang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiMZT11, author = {Fagen Li and Fahad Bin Muhaya and Mingwu Zhang and Tsuyoshi Takagi}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Efficient Identity-Based Signcryption in the Standard Model}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {120--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_10}, doi = {10.1007/978-3-642-24316-5\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiMZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiuLD11, author = {Shengli Liu and Junzuo Lai and Robert H. Deng}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {General Construction of Chameleon All-But-One Trapdoor Functions}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {257--265}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_18}, doi = {10.1007/978-3-642-24316-5\_18}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiuLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LuLMX11, author = {Xianhui Lu and Bao Li and Qixiang Mei and Haixia Xu}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {297--308}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_21}, doi = {10.1007/978-3-642-24316-5\_21}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LuLMX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NaitoYWO11, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Security of Practical Cryptosystems Using Merkle-Damg{\aa}rd Hash Function in the Ideal Cipher Model}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {281--296}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_20}, doi = {10.1007/978-3-642-24316-5\_20}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NaitoYWO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NamikiTY11, author = {Hitoshi Namiki and Keisuke Tanaka and Kenji Yasunaga}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Randomness Leakage in the {KEM/DEM} Framework}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {309--323}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_22}, doi = {10.1007/978-3-642-24316-5\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NamikiTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PalmieriP11, author = {Paolo Palmieri and Olivier Pereira}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Secure Two-Party Computation over a Z-Channel}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {3--15}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_3}, doi = {10.1007/978-3-642-24316-5\_3}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PalmieriP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PanW11, author = {Jiaxin Pan and Libin Wang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {{TMQV:} {A} Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {380--388}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_27}, doi = {10.1007/978-3-642-24316-5\_27}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PanW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PhanT11, author = {Duong Hieu Phan and Viet Cuong Trinh}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Identity-Based Trace and Revoke Schemes}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {204--221}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_15}, doi = {10.1007/978-3-642-24316-5\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PhanT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TanakaYY11, author = {Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Weak Oblivious Transfer from Strong One-Way Functions}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {34--51}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_5}, doi = {10.1007/978-3-642-24316-5\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/TanakaYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TonicelliDA11, author = {Rafael Tonicelli and Bernardo Machado David and Vin{\'{\i}}cius de Morais Alves}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Universally Composable Private Proximity Testing}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {222--239}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_16}, doi = {10.1007/978-3-642-24316-5\_16}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/TonicelliDA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WeiMZ11, author = {Fushan Wei and Chuangui Ma and Zhenfeng Zhang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {366--379}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_26}, doi = {10.1007/978-3-642-24316-5\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WeiMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WuQZD11, author = {Qianhong Wu and Bo Qin and Lei Zhang and Josep Domingo{-}Ferrer}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Fully Distributed Broadcast Encryption}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {102--119}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_9}, doi = {10.1007/978-3-642-24316-5\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/WuQZD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YoneyamaZ11, author = {Kazuki Yoneyama and Yunlei Zhao}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {348--365}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_25}, doi = {10.1007/978-3-642-24316-5\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YoneyamaZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YuenWSH11, author = {Tsz Hon Yuen and Duncan S. Wong and Willy Susilo and Qiong Huang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Concurrent Signatures with Fully Negotiable Binding Control}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {170--187}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_13}, doi = {10.1007/978-3-642-24316-5\_13}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YuenWSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Zhang11, author = {Bingsheng Zhang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Simulatable Adaptive Oblivious Transfer with Statistical Receiver's Privacy}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {52--67}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_6}, doi = {10.1007/978-3-642-24316-5\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Zhang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Zhang11a, author = {Bingsheng Zhang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Generic Constant-Round Oblivious Sorting Algorithm for {MPC}}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {240--256}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_17}, doi = {10.1007/978-3-642-24316-5\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Zhang11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangNYT11, author = {Mingwu Zhang and Takashi Nishide and Bo Yang and Tsuyoshi Takagi}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Anonymous Encryption with Partial-Order Subset Delegation Functionality}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {154--169}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_12}, doi = {10.1007/978-3-642-24316-5\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhangNYT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangWW11, author = {Liting Zhang and Wenling Wu and Peng Wang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {PolyE+CTR: {A} Swiss-Army-Knife Mode for Block Ciphers}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {266--280}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_19}, doi = {10.1007/978-3-642-24316-5\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhangWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2011, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5}, doi = {10.1007/978-3-642-24316-5}, isbn = {978-3-642-24315-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.