BibTeX records: Julien Bringer

download as .bib file

@article{DBLP:journals/ivc/BringerMR17,
  author    = {Julien Bringer and
               Constance Morel and
               Christian Rathgeb},
  title     = {Security analysis and improvement of some biometric protected templates
               based on Bloom filters},
  journal   = {Image Vision Comput.},
  volume    = {58},
  pages     = {239--253},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.imavis.2016.08.002},
  doi       = {10.1016/j.imavis.2016.08.002},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ivc/BringerMR17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/apf/BernabeSNBD17,
  author    = {Jorge Bernal Bernab{\'{e}} and
               Antonio F. Skarmeta and
               Nicol{\'{a}}s Notario and
               Julien Bringer and
               Martin David},
  title     = {Towards a Privacy-Preserving Reliable European Identity Ecosystem},
  booktitle = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF}
               2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers},
  pages     = {19--33},
  year      = {2017},
  crossref  = {DBLP:conf/apf/2017},
  url       = {https://doi.org/10.1007/978-3-319-67280-9_2},
  doi       = {10.1007/978-3-319-67280-9_2},
  timestamp = {Sun, 22 Oct 2017 18:40:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/apf/BernabeSNBD17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BringerCML17,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Daniel Le M{\'{e}}tayer and
               Roch Lescuyer},
  title     = {Biometric Systems Private by Design: Reasoning about privacy properties
               of biometric system architectures},
  journal   = {CoRR},
  volume    = {abs/1702.08301},
  year      = {2017},
  url       = {http://arxiv.org/abs/1702.08301},
  archivePrefix = {arXiv},
  eprint    = {1702.08301},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/BringerCML17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BringerCL16,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Roch Lescuyer},
  title     = {Software-Only Two-Factor Authentication Secure Against Active Servers},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
               on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  pages     = {285--303},
  year      = {2016},
  crossref  = {DBLP:conf/africacrypt/2016},
  url       = {https://doi.org/10.1007/978-3-319-31517-1_15},
  doi       = {10.1007/978-3-319-31517-1_15},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/BringerCL16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BringerCLP16,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Roch Lescuyer and
               Alain Patey},
  title     = {Hierarchical Identities from Group Signatures and Pseudonymous Signatures},
  booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
               of His 85th Birthday},
  pages     = {457--469},
  year      = {2016},
  crossref  = {DBLP:conf/birthday/2016kahn},
  url       = {https://doi.org/10.1007/978-3-662-49301-4_28},
  doi       = {10.1007/978-3-662-49301-4_28},
  timestamp = {Tue, 23 May 2017 01:06:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/birthday/BringerCLP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cardis/MaghrebiB16,
  author    = {Houssem Maghrebi and
               Julien Bringer},
  title     = {Side-Channel Analysis of the {TUAK} Algorithm Used for Authentication
               and Key Agreement in 3G/4G Networks},
  booktitle = {Smart Card Research and Advanced Applications - 15th International
               Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
               Selected Papers},
  pages     = {39--56},
  year      = {2016},
  crossref  = {DBLP:conf/cardis/2016},
  url       = {https://doi.org/10.1007/978-3-319-54669-8_3},
  doi       = {10.1007/978-3-319-54669-8_3},
  timestamp = {Tue, 23 May 2017 01:08:17 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/MaghrebiB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/compsac/IidaMYYB16,
  author    = {Katsuyoshi Iida and
               Yutaka Miyake and
               Chung Huang Yang and
               Bian Yang and
               Julien Bringer},
  title     = {Message from the {NETSAP} and {SIMICE} Workshop Organizers},
  booktitle = {40th {IEEE} Annual Computer Software and Applications Conference,
               {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages     = {552},
  year      = {2016},
  crossref  = {DBLP:conf/compsac/2016w},
  url       = {https://doi.org/10.1109/COMPSAC.2016.286},
  doi       = {10.1109/COMPSAC.2016.286},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/compsac/IidaMYYB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BringerCML16,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Daniel Le M{\'{e}}tayer and
               Roch Lescuyer},
  title     = {Reasoning About Privacy Properties of Architectures Supporting Group
               Authentication and Application to Biometric Systems},
  booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
               Proceedings},
  pages     = {313--327},
  year      = {2016},
  crossref  = {DBLP:conf/dbsec/2016},
  url       = {https://doi.org/10.1007/978-3-319-41483-6_22},
  doi       = {10.1007/978-3-319-41483-6_22},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dbsec/BringerCML16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AmchyaaBL16,
  author    = {Ghassane Amchyaa and
               Julien Bringer and
               Roch Lescuyer},
  title     = {Searchable Encryption for Biometric Identification Revisited},
  booktitle = {Data Privacy Management and Security Assurance - 11th International
               Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016,
               Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  pages     = {113--129},
  year      = {2016},
  crossref  = {DBLP:conf/esorics/2016dpm},
  url       = {https://doi.org/10.1007/978-3-319-47072-6_8},
  doi       = {10.1007/978-3-319-47072-6_8},
  timestamp = {Tue, 23 May 2017 01:07:17 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esorics/AmchyaaBL16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/MaghrebiSB16,
  author    = {Houssem Maghrebi and
               Victor Servant and
               Julien Bringer},
  title     = {There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized
               Encoding to Thwart Side-Channel Attacks},
  booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  pages     = {223--243},
  year      = {2016},
  crossref  = {DBLP:conf/fse/2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5_12},
  doi       = {10.1007/978-3-662-52993-5_12},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/MaghrebiSB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BringerOMC16,
  author    = {Julien Bringer and
               Othmane El Omri and
               Constance Morel and
               Herv{\'{e}} Chabanne},
  title     = {Boosting {GSHADE} Capabilities: New Applications and Security in Malicious
               Setting},
  booktitle = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  pages     = {203--214},
  year      = {2016},
  crossref  = {DBLP:conf/sacmat/2016},
  url       = {http://doi.acm.org/10.1145/2914642.2914658},
  doi       = {10.1145/2914642.2914658},
  timestamp = {Fri, 03 Feb 2017 13:23:17 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sacmat/BringerOMC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiSB16,
  author    = {Houssem Maghrebi and
               Victor Servant and
               Julien Bringer},
  title     = {There is Wisdom in Harnessing the Strengths of your Enemy: Customized
               Encoding to Thwart Side-Channel Attacks - Extended Version -},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {183},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/183},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/MaghrebiSB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YangB15,
  author    = {Bian Yang and
               Julien Bringer},
  title     = {Message from the {SIMICE} 2015 Workshop Organizers},
  booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC}
               Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages     = {296},
  year      = {2015},
  crossref  = {DBLP:conf/compsac/2015w},
  url       = {https://doi.org/10.1109/COMPSAC.2015.307},
  doi       = {10.1109/COMPSAC.2015.307},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/compsac/YangB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/BringerGKKLORSV15,
  author    = {Julien Bringer and
               Beatriz Gallego{-}Nicasio and
               Ghassan Karame and
               Mathias Kohler and
               Panos Louridas and
               Melek {\"{O}}nen and
               Hubert Ritzdorf and
               Alessandro Sorniotti and
               David Vallejo},
  title     = {{TREDISEC:} Trust-Aware REliable and Distributed Information SEcurity
               in the Cloud},
  booktitle = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
               - 6th International Conference, E-Democracy 2015, Athens, Greece,
               December 10-11, 2015, Proceedings},
  pages     = {193--197},
  year      = {2015},
  crossref  = {DBLP:conf/edemocracy/2015},
  url       = {https://doi.org/10.1007/978-3-319-27164-4_14},
  doi       = {10.1007/978-3-319-27164-4_14},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/edemocracy/BringerGKKLORSV15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fm/BringerCML15,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Daniel Le M{\'{e}}tayer and
               Roch Lescuyer},
  title     = {Privacy by Design in Practice: Reasoning about Privacy Properties
               of Biometric System Architectures},
  booktitle = {{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway,
               June 24-26, 2015, Proceedings},
  pages     = {90--107},
  year      = {2015},
  crossref  = {DBLP:conf/fm/2015},
  url       = {https://doi.org/10.1007/978-3-319-19249-9_7},
  doi       = {10.1007/978-3-319-19249-9_7},
  timestamp = {Mon, 22 May 2017 17:11:19 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fm/BringerCML15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/host/RiviereNRDBS15,
  author    = {Lionel Rivi{\`{e}}re and
               Zakaria Najm and
               Pablo Rauzy and
               Jean{-}Luc Danger and
               Julien Bringer and
               Laurent Sauvage},
  title     = {High precision fault injections on the instruction cache of ARMv7-M
               architectures},
  booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
               {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages     = {62--67},
  year      = {2015},
  crossref  = {DBLP:conf/host/2015},
  url       = {https://doi.org/10.1109/HST.2015.7140238},
  doi       = {10.1109/HST.2015.7140238},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/host/RiviereNRDBS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icb/BringerMR15,
  author    = {Julien Bringer and
               Constance Morel and
               Christian Rathgeb},
  title     = {Security analysis of Bloom filter-based iris biometric template protection},
  booktitle = {International Conference on Biometrics, {ICB} 2015, Phuket, Thailand,
               19-22 May, 2015},
  pages     = {527--534},
  year      = {2015},
  crossref  = {DBLP:conf/icb/2015},
  url       = {https://doi.org/10.1109/ICB.2015.7139069},
  doi       = {10.1109/ICB.2015.7139069},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icb/BringerMR15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FavrePBC15,
  author    = {M{\'{e}}lanie Favre and
               Sylvaine Picard and
               Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Balancing is the Key - Performing Finger Vein Template Protection
               using Fuzzy Commitment},
  booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
               Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
               France, 9-11 February, 2015.},
  pages     = {304--311},
  year      = {2015},
  crossref  = {DBLP:conf/icissp/2015},
  url       = {https://doi.org/10.5220/0005241403040311},
  doi       = {10.5220/0005241403040311},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icissp/FavrePBC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icst/RiviereBLC15,
  author    = {Lionel Rivi{\`{e}}re and
               Julien Bringer and
               Thanh{-}Ha Le and
               Herv{\'{e}} Chabanne},
  title     = {A novel simulation approach for fault injection resistance evaluation
               on smart cards},
  booktitle = {Eighth {IEEE} International Conference on Software Testing, Verification
               and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17,
               2015},
  pages     = {1--8},
  year      = {2015},
  crossref  = {DBLP:conf/icst/2015w},
  url       = {https://doi.org/10.1109/ICSTW.2015.7107460},
  doi       = {10.1109/ICSTW.2015.7107460},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icst/RiviereBLC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isw/BringerCML15,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Daniel Le M{\'{e}}tayer and
               Roch Lescuyer},
  title     = {Reasoning about Privacy Properties of Biometric Systems Architectures
               in the Presence of Information Leakage},
  booktitle = {Information Security - 18th International Conference, {ISC} 2015,
               Trondheim, Norway, September 9-11, 2015, Proceedings},
  pages     = {493--510},
  year      = {2015},
  crossref  = {DBLP:conf/isw/2015},
  url       = {https://doi.org/10.1007/978-3-319-23318-5_27},
  doi       = {10.1007/978-3-319-23318-5_27},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isw/BringerCML15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BringerCKLS15,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Firas Kraiem and
               Roch Lescuyer and
               Eduardo Soria{-}Vazquez},
  title     = {Some applications of verifiable computation to biometric verification},
  booktitle = {2015 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages     = {1--6},
  year      = {2015},
  crossref  = {DBLP:conf/wifs/2015},
  url       = {https://doi.org/10.1109/WIFS.2015.7368568},
  doi       = {10.1109/WIFS.2015.7368568},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wifs/BringerCKLS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/RiviereNRDBS15,
  author    = {Lionel Rivi{\`{e}}re and
               Zakaria Najm and
               Pablo Rauzy and
               Jean{-}Luc Danger and
               Julien Bringer and
               Laurent Sauvage},
  title     = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
               Architectures},
  journal   = {CoRR},
  volume    = {abs/1510.01537},
  year      = {2015},
  url       = {http://arxiv.org/abs/1510.01537},
  archivePrefix = {arXiv},
  eprint    = {1510.01537},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/RiviereNRDBS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/RiviereNRDBS15,
  author    = {Lionel Rivi{\`{e}}re and
               Zakaria Najm and
               Pablo Rauzy and
               Jean{-}Luc Danger and
               Julien Bringer and
               Laurent Sauvage},
  title     = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
               Architectures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {147},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/147},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/RiviereNRDBS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/FujimotoMNHHAHKSLBBBD14,
  author    = {Daisuke Fujimoto and
               Noriyuki Miura and
               Makoto Nagata and
               Yu{-}ichi Hayashi and
               Naofumi Homma and
               Takafumi Aoki and
               Yohei Hori and
               Toshihiro Katashita and
               Kazuo Sakiyama and
               Thanh{-}Ha Le and
               Julien Bringer and
               Pirouz Bazargan{-}Sabet and
               Shivam Bhasin and
               Jean{-}Luc Danger},
  title     = {Power Noise Measurements of Cryptographic {VLSI} Circuits Regarding
               Side-Channel Information Leakage},
  journal   = {{IEICE} Transactions},
  volume    = {97-C},
  number    = {4},
  pages     = {272--279},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-c_4_272},
  timestamp = {Thu, 15 May 2014 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/FujimotoMNHHAHKSLBBBD14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/biosig/BringerFPS14,
  author    = {Julien Bringer and
               M{\'{e}}lanie Favre and
               Chlo{\'{e}} Pelle and
               Hughes de Saxc{\'{e}}},
  title     = {Fuzzy vault and template-level fusion applied to a binary fingerprint
               representation},
  booktitle = {{BIOSIG} 2014 - Proceedings of the 13th International Conference of
               the Biometrics Special Interest Group, 10.-12. September 2014, Darmstadt,
               Germany},
  pages     = {235--242},
  year      = {2014},
  crossref  = {DBLP:conf/biosig/2014},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings230/article7.html},
  timestamp = {Sat, 29 Apr 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/biosig/BringerFPS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ServantDMB14,
  author    = {Victor Servant and
               Nicolas Debande and
               Houssem Maghrebi and
               Julien Bringer},
  title     = {Study of a Novel Software Constant Weight Implementation},
  booktitle = {Smart Card Research and Advanced Applications - 13th International
               Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
               Selected Papers},
  pages     = {35--48},
  year      = {2014},
  crossref  = {DBLP:conf/cardis/2014},
  url       = {https://doi.org/10.1007/978-3-319-16763-3_3},
  doi       = {10.1007/978-3-319-16763-3_3},
  timestamp = {Tue, 23 May 2017 01:08:17 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/ServantDMB14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BerthierBBCCDFG14,
  author    = {Ma{\"{e}}l Berthier and
               Yves Bocktaels and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Taoufik Chouta and
               Jean{-}Luc Danger and
               M{\'{e}}lanie Favre and
               Tarik Graba},
  title     = {Studying Leakages on an Embedded Biometric System Using Side Channel
               Analysis},
  booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International
               Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
               Selected Papers},
  pages     = {281--298},
  year      = {2014},
  crossref  = {DBLP:conf/cosade/2014},
  url       = {https://doi.org/10.1007/978-3-319-10175-0_19},
  doi       = {10.1007/978-3-319-10175-0_19},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cosade/BerthierBBCCDFG14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PuysRBL14,
  author    = {Maxime Puys and
               Lionel Rivi{\`{e}}re and
               Julien Bringer and
               Thanh{-}Ha Le},
  title     = {High-Level Simulation for Multiple Fault Injection Evaluation},
  booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security
               Assurance - 9th International Workshop, {DPM} 2014, 7th International
               Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
               Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  pages     = {293--308},
  year      = {2014},
  crossref  = {DBLP:conf/esorics/2014-8872},
  url       = {https://doi.org/10.1007/978-3-319-17016-9_19},
  doi       = {10.1007/978-3-319-17016-9_19},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esorics/PuysRBL14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/essos/BerthierBCLRS14,
  author    = {Ma{\"{e}}l Berthier and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thanh{-}Ha Le and
               Lionel Rivi{\`{e}}re and
               Victor Servant},
  title     = {Idea: Embedded Fault Injection Simulator on Smartcard},
  booktitle = {Engineering Secure Software and Systems - 6th International Symposium,
               ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings},
  pages     = {222--229},
  year      = {2014},
  crossref  = {DBLP:conf/essos/2014},
  url       = {https://doi.org/10.1007/978-3-319-04897-0_15},
  doi       = {10.1007/978-3-319-04897-0_15},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/BerthierBCLRS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/BringerCLP14,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Roch Lescuyer and
               Alain Patey},
  title     = {Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous
               Signatures for {ID} Documents},
  booktitle = {Financial Cryptography and Data Security - 18th International Conference,
               {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
               Papers},
  pages     = {255--272},
  year      = {2014},
  crossref  = {DBLP:conf/fc/2014},
  url       = {https://doi.org/10.1007/978-3-662-45472-5_16},
  doi       = {10.1007/978-3-662-45472-5_16},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/BringerCLP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fps/RivierePLBCP14,
  author    = {Lionel Rivi{\`{e}}re and
               Marie{-}Laure Potet and
               Thanh{-}Ha Le and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Maxime Puys},
  title     = {Combining High-Level and Low-Level Approaches to Evaluate Software
               Implementations Robustness Against Multiple Fault Injection Attacks},
  booktitle = {Foundations and Practice of Security - 7th International Symposium,
               {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
               Papers},
  pages     = {92--111},
  year      = {2014},
  crossref  = {DBLP:conf/fps/2014},
  url       = {https://doi.org/10.1007/978-3-319-17040-4_7},
  doi       = {10.1007/978-3-319-17040-4_7},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fps/RivierePLBCP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icb/BringerCM14,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Constance Morel},
  title     = {Shuffling is not sufficient: Security analysis of cancelable iriscodes
               based on a secret permutation},
  booktitle = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB}
               2014, FL, USA, September 29 - October 2, 2014},
  pages     = {1--8},
  year      = {2014},
  crossref  = {DBLP:conf/icb/2014},
  url       = {https://doi.org/10.1109/BTAS.2014.6996280},
  doi       = {10.1109/BTAS.2014.6996280},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icb/BringerCM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ih/BringerCFP0Z14,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               M{\'{e}}lanie Favre and
               Alain Patey and
               Thomas Schneider and
               Michael Zohner},
  title     = {{GSHADE:} faster privacy-preserving distance computation and biometric
               identification},
  booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
               '14, Salzburg, Austria, June 11-13, 2014},
  pages     = {187--198},
  year      = {2014},
  crossref  = {DBLP:conf/ih/2014},
  url       = {http://doi.acm.org/10.1145/2600918.2600922},
  doi       = {10.1145/2600918.2600922},
  timestamp = {Tue, 16 Dec 2014 17:33:05 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ih/BringerCFP0Z14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14,
  author    = {Taoufik Chouta and
               Tarik Graba and
               Jean{-}Luc Danger and
               Julien Bringer and
               Ma{\"{e}}l Berthier and
               Yves Bocktaels and
               M{\'{e}}lanie Favre and
               Herv{\'{e}} Chabanne},
  title     = {Side channel analysis on an embedded hardware fingerprint biometric
               comparator {\&} low cost countermeasures},
  booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
               Minneapolis, MN, USA, June 15, 2014},
  pages     = {6:1--6:6},
  year      = {2014},
  crossref  = {DBLP:conf/isca/2014hasp},
  url       = {http://doi.acm.org/10.1145/2611765.2611771},
  doi       = {10.1145/2611765.2611771},
  timestamp = {Thu, 07 May 2015 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isca/ChoutaGDBBBFC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sec/BourgeatBCCCFHMNV14,
  author    = {Thomas Bourgeat and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Robin Champenois and
               J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and
               Houda Ferradi and
               Marc Heinrich and
               Paul Melotti and
               David Naccache and
               Antoine Voizard},
  title     = {New Algorithmic Approaches to Point Constellation Recognition},
  booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
               International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
               2014. Proceedings},
  pages     = {80--90},
  year      = {2014},
  crossref  = {DBLP:conf/sec/2014},
  url       = {https://doi.org/10.1007/978-3-642-55415-5_7},
  doi       = {10.1007/978-3-642-55415-5_7},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sec/BourgeatBCCCFHMNV14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BringerCCGM14,
  author    = {Julien Bringer and
               Claude Carlet and
               Herv{\'{e}} Chabanne and
               Sylvain Guilley and
               Houssem Maghrebi},
  title     = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation
               Paradigm in a Code, with Builtin Protection against Side-Channel and
               Fault Attacks},
  booktitle = {Information Security Theory and Practice. Securing the Internet of
               Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
               Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  pages     = {40--56},
  year      = {2014},
  crossref  = {DBLP:conf/wistp/2014},
  url       = {https://doi.org/10.1007/978-3-662-43826-8_4},
  doi       = {10.1007/978-3-662-43826-8_4},
  timestamp = {Tue, 23 May 2017 01:11:27 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wistp/BringerCCGM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BourgeatBCCCFHMNV14,
  author    = {Thomas Bourgeat and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Robin Champenois and
               J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and
               Houda Ferradi and
               Marc Heinrich and
               Paul Melotti and
               David Naccache and
               Antoine Voizard},
  title     = {New Algorithmic Approaches to Point Constellation Recognition},
  journal   = {CoRR},
  volume    = {abs/1405.1402},
  year      = {2014},
  url       = {http://arxiv.org/abs/1405.1402},
  archivePrefix = {arXiv},
  eprint    = {1405.1402},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/BourgeatBCCCFHMNV14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BerthierBBCCDFG14,
  author    = {Ma{\"{e}}l Berthier and
               Yves Bocktaels and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Taoufik Chouta and
               Jean{-}Luc Danger and
               M{\'{e}}lanie Favre and
               Tarik Graba},
  title     = {Studying Potential Side Channel Leakages on an Embedded Biometric
               Comparison System},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {26},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/026},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BerthierBBCCDFG14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCLP14,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Roch Lescuyer and
               Alain Patey},
  title     = {Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous
               Signatures for {ID} Documents},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {67},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/067},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCLP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCCGM14a,
  author    = {Julien Bringer and
               Claude Carlet and
               Herv{\'{e}} Chabanne and
               Sylvain Guilley and
               Houssem Maghrebi},
  title     = {Orthogonal Direct Sum Masking: {A} Smartcard Friendly Computation
               Paradigm in a Code, with Builtin Protection against Side-Channel and
               Fault Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {665},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/665},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCCGM14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/spm/BringerCP13,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {Privacy-Preserving Biometric Identification Using Secure Multiparty
               Computation: An Overview and Recent Trends},
  journal   = {{IEEE} Signal Process. Mag.},
  volume    = {30},
  number    = {2},
  pages     = {42--52},
  year      = {2013},
  url       = {https://doi.org/10.1109/MSP.2012.2230218},
  doi       = {10.1109/MSP.2012.2230218},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/spm/BringerCP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JustusCCBCC13,
  author    = {Benjamin Justus and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Olivier Cipiere},
  title     = {Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer
               Size Standard for the Setbase},
  booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
               Proceedings},
  pages     = {274--281},
  year      = {2013},
  crossref  = {DBLP:conf/dbsec/2013},
  url       = {https://doi.org/10.1007/978-3-642-39256-6_19},
  doi       = {10.1007/978-3-642-39256-6_19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dbsec/JustusCCBCC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dim/YangBBKBSSRWA13,
  author    = {Bian Yang and
               Christoph Busch and
               Julien Bringer and
               Els Kindt and
               Willem Ronald Belser and
               Uwe Seidel and
               Edward Springmann and
               Uwe Rabeler and
               Andreas Wolf and
               Magnar Aukrust},
  title     = {Towards standardizing trusted evidence of identity},
  booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Berlin, Germany, November 8, 2013},
  pages     = {63--72},
  year      = {2013},
  crossref  = {DBLP:conf/dim/2013},
  url       = {http://doi.acm.org/10.1145/2517881.2517890},
  doi       = {10.1145/2517881.2517890},
  timestamp = {Mon, 09 Dec 2013 15:49:10 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/dim/YangBBKBSSRWA13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/BringerCP13,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {{SHADE:} Secure HAmming DistancE Computation from Oblivious Transfer},
  booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
               and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  pages     = {164--176},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013w},
  url       = {https://doi.org/10.1007/978-3-642-41320-9_11},
  doi       = {10.1007/978-3-642-41320-9_11},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/BringerCP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icb/BringerCP13,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {Practical identification with encrypted biometric data using oblivious
               {RAM}},
  booktitle = {International Conference on Biometrics, {ICB} 2013, 4-7 June, 2013,
               Madrid, Spain},
  pages     = {1--8},
  year      = {2013},
  crossref  = {DBLP:conf/icb/2013},
  url       = {https://doi.org/10.1109/ICB.2013.6612970},
  doi       = {10.1109/ICB.2013.6612970},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icb/BringerCP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ih/MathonFAB13,
  author    = {Benjamin Mathon and
               Teddy Furon and
               Laurent Amsaleg and
               Julien Bringer},
  title     = {Secure and efficient approximate nearest neighbors search},
  booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
               '13, Montpellier, France, June 17-19, 2013},
  pages     = {175--180},
  year      = {2013},
  crossref  = {DBLP:conf/ih/2013},
  url       = {http://doi.acm.org/10.1145/2482513.2482539},
  doi       = {10.1145/2482513.2482539},
  timestamp = {Mon, 04 Aug 2014 16:00:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ih/MathonFAB13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/nss/BringerCP13,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {Collusion-Resistant Domain-Specific Pseudonymous Signatures},
  booktitle = {Network and System Security - 7th International Conference, {NSS}
               2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  pages     = {649--655},
  year      = {2013},
  crossref  = {DBLP:conf/nss/2013},
  url       = {https://doi.org/10.1007/978-3-642-38631-2_52},
  doi       = {10.1007/978-3-642-38631-2_52},
  timestamp = {Wed, 17 May 2017 14:24:31 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/nss/BringerCP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pst/JustusCCBCC13,
  author    = {Benjamin Justus and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Olivier Cipiere},
  title     = {Define privacy-preserving setbase drawer size standard: {A} {\unicode{8714}}-closeness
               perspective},
  booktitle = {Eleventh Annual International Conference on Privacy, Security and
               Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
               July 10-12, 2013},
  pages     = {362--365},
  year      = {2013},
  crossref  = {DBLP:conf/pst/2013},
  url       = {https://doi.org/10.1109/PST.2013.6596090},
  doi       = {10.1109/PST.2013.6596090},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pst/JustusCCBCC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/daglib/p/BringerC13,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Two Efficient Architectures for Handling Biometric Data While Taking
               Care of Their Privacy},
  booktitle = {Security and Privacy in Biometrics},
  pages     = {275--295},
  year      = {2013},
  crossref  = {DBLP:books/daglib/0032278},
  url       = {https://doi.org/10.1007/978-1-4471-5230-9_11},
  doi       = {10.1007/978-1-4471-5230-9_11},
  timestamp = {Tue, 16 May 2017 14:01:33 +0200},
  biburl    = {http://dblp.org/rec/bib/books/daglib/p/BringerC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCP13,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {Collusion-Resistant Domain-Specific Pseudonymous Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {182},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/182},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jce/BringerCL12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thanh{-}Ha Le},
  title     = {Protecting {AES} against side-channel analysis using wire-tap codes},
  journal   = {J. Cryptographic Engineering},
  volume    = {2},
  number    = {2},
  pages     = {129--141},
  year      = {2012},
  url       = {https://doi.org/10.1007/s13389-012-0034-2},
  doi       = {10.1007/s13389-012-0034-2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jce/BringerCL12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tifs/SimoensBCS12,
  author    = {Koen Simoens and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Stefaan Seys},
  title     = {A Framework for Analyzing Template Security and Privacy in Biometric
               Authentication Systems},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {7},
  number    = {2},
  pages     = {833--841},
  year      = {2012},
  url       = {https://doi.org/10.1109/TIFS.2012.2184092},
  doi       = {10.1109/TIFS.2012.2184092},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tifs/SimoensBCS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/BringerC12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Code Reverse Engineering Problem for Identification Codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {58},
  number    = {4},
  pages     = {2406--2412},
  year      = {2012},
  url       = {https://doi.org/10.1109/TIT.2011.2177808},
  doi       = {10.1109/TIT.2011.2177808},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/BringerC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BringerCF12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               M{\'{e}}lanie Favre},
  title     = {Fuzzy Vault for Multiple Users},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  pages     = {67--81},
  year      = {2012},
  crossref  = {DBLP:conf/africacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-31410-0_5},
  doi       = {10.1007/978-3-642-31410-0_5},
  timestamp = {Mon, 29 May 2017 13:41:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/BringerCF12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/europki/BringerCP12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {Cross-Unlinkable Hierarchical Group Signatures},
  booktitle = {Public Key Infrastructures, Services and Applications - 9th European
               Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised
               Selected Papers},
  pages     = {161--177},
  year      = {2012},
  crossref  = {DBLP:conf/europki/2012},
  url       = {https://doi.org/10.1007/978-3-642-40012-4_11},
  doi       = {10.1007/978-3-642-40012-4_11},
  timestamp = {Fri, 02 Jun 2017 20:48:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/europki/BringerCP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icb/BringerFCP12,
  author    = {Julien Bringer and
               M{\'{e}}lanie Favre and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {Faster secure computation for biometric identification using filtering},
  booktitle = {5th {IAPR} International Conference on Biometrics, {ICB} 2012, New
               Delhi, India, March 29 - April 1, 2012},
  pages     = {257--264},
  year      = {2012},
  crossref  = {DBLP:conf/icb/2012},
  url       = {https://doi.org/10.1109/ICB.2012.6199817},
  doi       = {10.1109/ICB.2012.6199817},
  timestamp = {Fri, 27 Oct 2017 15:34:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icb/BringerFCP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pst/BringerCC12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Olivier Cipiere},
  title     = {Combining the setbase approach with negative databases},
  booktitle = {Tenth Annual International Conference on Privacy, Security and Trust,
               {PST} 2012, Paris, France, July 16-18, 2012},
  pages     = {233--234},
  year      = {2012},
  crossref  = {DBLP:conf/pst/2012},
  url       = {https://doi.org/10.1109/PST.2012.6297948},
  doi       = {10.1109/PST.2012.6297948},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pst/BringerCC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BringerP12,
  author    = {Julien Bringer and
               Alain Patey},
  title     = {{VLR} Group Signatures - How to Achieve Both Backward Unlinkability
               and Efficient Revocation Checks},
  booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
               and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  pages     = {215--220},
  year      = {2012},
  crossref  = {DBLP:conf/secrypt/2012},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/BringerP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BringerCP12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {An Application of a Group Signature Scheme with Backward Unlinkability
               to Biometric Identity Management},
  booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
               and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  pages     = {421--425},
  year      = {2012},
  crossref  = {DBLP:conf/secrypt/2012},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/BringerCP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCP12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {Cross-Unlinkable Hierarchical Group Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {407},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/407},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCP12a,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {{SHADE:} Secure HAmming DistancE computation from oblivious transfer},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {586},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/586},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCP12a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/scn/BringerCK11,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Bruno Kindarji},
  title     = {Identification with encrypted biometric data},
  journal   = {Security and Communication Networks},
  volume    = {4},
  number    = {5},
  pages     = {548--562},
  year      = {2011},
  url       = {https://doi.org/10.1002/sec.206},
  doi       = {10.1002/sec.206},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/scn/BringerCK11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/biosig/BringerC11,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Visual cryptography applied to fingerprint features as a solution
               for pre-alignment},
  booktitle = {{BIOSIG} 2011 - Proceedings of the Special Interest Group on Biometrics
               and Electronic Signatures, 08.-09. September 2011 in Darmstadt, Germany},
  pages     = {243--250},
  year      = {2011},
  crossref  = {DBLP:conf/biosig/2011},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings191/article6475.html},
  timestamp = {Fri, 09 Dec 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/biosig/BringerC11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-2569,
  author    = {Koen Simoens and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Stefaan Seys},
  title     = {Analysis of Biometric Authentication Protocols in the Blackbox Model},
  journal   = {CoRR},
  volume    = {abs/1101.2569},
  year      = {2011},
  url       = {http://arxiv.org/abs/1101.2569},
  archivePrefix = {arXiv},
  eprint    = {1101.2569},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1101-2569},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-1601,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Code Reverse Engineering problem for Identification Codes},
  journal   = {CoRR},
  volume    = {abs/1105.1601},
  year      = {2011},
  url       = {http://arxiv.org/abs/1105.1601},
  archivePrefix = {arXiv},
  eprint    = {1105.1601},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1105-1601},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerP11,
  author    = {Julien Bringer and
               Alain Patey},
  title     = {Backward Unlinkability for a {VLR} Group Signature Scheme with Efficient
               Revocation Check},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {376},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/376},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerP11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/BringerCI10,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thomas Icart},
  title     = {Password Based Key Exchange Protocols on Elliptic Curves Which Conceal
               the Public Parameters},
  booktitle = {Applied Cryptography and Network Security, 8th International Conference,
               {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  pages     = {291--308},
  year      = {2010},
  crossref  = {DBLP:conf/acns/2010},
  url       = {https://doi.org/10.1007/978-3-642-13708-2_18},
  doi       = {10.1007/978-3-642-13708-2_18},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/acns/BringerCI10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/btas/BringerD10,
  author    = {Julien Bringer and
               Vincent Despiegel},
  title     = {Binary feature vector fingerprint representation from minutiae vicinities},
  booktitle = {Fourth {IEEE} International Conference on Biometrics: Theory Applications
               and Systems, {BTAS} 2010, Washington, DC, USA, 27-29 September, 2010},
  pages     = {1--6},
  year      = {2010},
  crossref  = {DBLP:conf/btas/2010},
  url       = {https://doi.org/10.1109/BTAS.2010.5634488},
  doi       = {10.1109/BTAS.2010.5634488},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/btas/BringerD10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/BringerCS10,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Koen Simoens},
  title     = {Blackbox Security of Biometrics (Invited Paper)},
  booktitle = {Sixth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
               15-17 October, 2010, Proceedings},
  pages     = {337--340},
  year      = {2010},
  crossref  = {DBLP:conf/iih-msp/2010},
  url       = {https://doi.org/10.1109/IIHMSP.2010.89},
  doi       = {10.1109/IIHMSP.2010.89},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/BringerCS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BringerC10,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Negative databases for biometric data},
  booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
               September 9-10, 2010},
  pages     = {55--62},
  year      = {2010},
  crossref  = {DBLP:conf/mmsec/2010},
  url       = {http://doi.acm.org/10.1145/1854229.1854242},
  doi       = {10.1145/1854229.1854242},
  timestamp = {Thu, 22 Jan 2015 08:10:03 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/mmsec/BringerC10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-4992,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               G{\'{e}}rard D. Cohen and
               Bruno Kindarji},
  title     = {{RFID} Key Establishment Against Active Adversaries},
  journal   = {CoRR},
  volume    = {abs/1001.4992},
  year      = {2010},
  url       = {http://arxiv.org/abs/1001.4992},
  archivePrefix = {arXiv},
  eprint    = {1001.4992},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1001-4992},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1005-1194,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Negative Databases for Biometric Data},
  journal   = {CoRR},
  volume    = {abs/1005.1194},
  year      = {2010},
  url       = {http://arxiv.org/abs/1005.1194},
  archivePrefix = {arXiv},
  eprint    = {1005.1194},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1005-1194},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BringerC09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Another Look at Extended Private Information Retrieval Protocols},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
               Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
               2009. Proceedings},
  pages     = {305--322},
  year      = {2009},
  crossref  = {DBLP:conf/africacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-02384-2_19},
  doi       = {10.1007/978-3-642-02384-2_19},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/BringerC09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BringerCI09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thomas Icart},
  title     = {Efficient zero-knowledge identification schemes which respect privacy},
  booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2009, Sydney, Australia, March
               10-12, 2009},
  pages     = {195--205},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009asia},
  url       = {http://doi.acm.org/10.1145/1533057.1533086},
  doi       = {10.1145/1533057.1533086},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/BringerCI09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cost/BringerCKK09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Tom A. M. Kevenaar and
               Bruno Kindarji},
  title     = {Extending Match-On-Card to Local Biometric Identification},
  booktitle = {Biometric {ID} Management and Multimodal Communication, Joint {COST}
               2101 and 2102 International Conference, BioID{\_}MultiComm 2009, Madrid,
               Spain, September 16-18, 2009. Proceedings},
  pages     = {178--186},
  year      = {2009},
  crossref  = {DBLP:conf/cost/2009},
  url       = {https://doi.org/10.1007/978-3-642-04391-8_23},
  doi       = {10.1007/978-3-642-04391-8_23},
  timestamp = {Fri, 02 Jun 2017 20:51:18 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cost/BringerCKK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icc/BringerCK09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Bruno Kindarji},
  title     = {Error-Tolerant Searchable Encryption},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages     = {1--6},
  year      = {2009},
  crossref  = {DBLP:conf/icc/2009},
  url       = {https://doi.org/10.1109/ICC.2009.5199004},
  doi       = {10.1109/ICC.2009.5199004},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icc/BringerCK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AdjedjBCK09,
  author    = {Michael Adjedj and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Bruno Kindarji},
  title     = {Biometric Identification over Encrypted Data Made Feasible},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  pages     = {86--100},
  year      = {2009},
  crossref  = {DBLP:conf/iciss/2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6_8},
  doi       = {10.1007/978-3-642-10772-6_8},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iciss/AdjedjBCK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BringerCI09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thomas Icart},
  title     = {On Physical Obfuscation of Cryptographic Algorithms},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  pages     = {88--103},
  year      = {2009},
  crossref  = {DBLP:conf/indocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6_6},
  doi       = {10.1007/978-3-642-10628-6_6},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/BringerCI09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BringerCCK09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               G{\'{e}}rard D. Cohen and
               Bruno Kindarji},
  title     = {Private Interrogation of Devices via Identification Codes},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  pages     = {272--289},
  year      = {2009},
  crossref  = {DBLP:conf/indocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6_19},
  doi       = {10.1007/978-3-642-10628-6_19},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/BringerCCK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/BringerCD09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Jean{-}Luc Danger},
  title     = {Protecting the {NOEKEON} Cipher against {SCARE} Attacks in FPGAs by
               Using Dynamic Implementations},
  booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
               and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages     = {183--188},
  year      = {2009},
  crossref  = {DBLP:conf/reconfig/2009},
  url       = {https://doi.org/10.1109/ReConFig.2009.19},
  doi       = {10.1109/ReConFig.2009.19},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/reconfig/BringerCD09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BringerCCK09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               G{\'{e}}rard D. Cohen and
               Bruno Kindarji},
  title     = {{RFID} key establishment against active adversaries},
  booktitle = {First {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2009, London, UK, December 6-9, 2009},
  pages     = {186--190},
  year      = {2009},
  crossref  = {DBLP:conf/wifs/2009},
  url       = {https://doi.org/10.1109/WIFS.2009.5386458},
  doi       = {10.1109/WIFS.2009.5386458},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wifs/BringerCCK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-0901-1062,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Bruno Kindarji},
  title     = {Identification with Encrypted Biometric Data Made Feasible},
  journal   = {CoRR},
  volume    = {abs/0901.1062},
  year      = {2009},
  url       = {http://arxiv.org/abs/0901.1062},
  archivePrefix = {arXiv},
  eprint    = {0901.1062},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-0901-1062},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Jean{-}Luc Danger},
  title     = {Protecting the {NOEKEON} Cipher Against {SCARE} Attacks in FPGAs by
               using Dynamic Implementations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {239},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/239},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCD09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCI09,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thomas Icart},
  title     = {Password Based Key Exchange with Hidden Elliptic Curve Public Parameters},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {468},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/468},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCI09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/scp/BringerCK08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Bruno Kindarji},
  title     = {The best of both worlds: Applying secure sketches to cancelable biometrics},
  journal   = {Sci. Comput. Program.},
  volume    = {74},
  number    = {1-2},
  pages     = {43--51},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.scico.2008.09.016},
  doi       = {10.1016/j.scico.2008.09.016},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/scp/BringerCK08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tifs/BringerCCKZ08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               G{\'{e}}rard D. Cohen and
               Bruno Kindarji and
               Gilles Z{\'{e}}mor},
  title     = {Theoretical and Practical Boundaries of Binary Secure Sketches},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {3},
  number    = {4},
  pages     = {673--683},
  year      = {2008},
  url       = {https://doi.org/10.1109/TIFS.2008.2002937},
  doi       = {10.1109/TIFS.2008.2002937},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tifs/BringerCCKZ08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/BringerC08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Trusted-HB: {A} Low-Cost Version of {HB} \({}^{\mbox{+}}\) Secure
               Against Man-in-the-Middle Attacks},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {54},
  number    = {9},
  pages     = {4339--4342},
  year      = {2008},
  url       = {https://doi.org/10.1109/TIT.2008.928290},
  doi       = {10.1109/TIT.2008.928290},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/BringerC08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BringerC08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {An Authentication Protocol with Encrypted Biometric Data},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
               on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  pages     = {109--124},
  year      = {2008},
  crossref  = {DBLP:conf/africacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-68164-9_8},
  doi       = {10.1007/978-3-540-68164-9_8},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/BringerC08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cans/BringerCI08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thomas Icart},
  title     = {Cryptanalysis of EC-RAC, a {RFID} Identification Protocol},
  booktitle = {Cryptology and Network Security, 7th International Conference, {CANS}
               2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  pages     = {149--161},
  year      = {2008},
  crossref  = {DBLP:conf/cans/2008},
  url       = {https://doi.org/10.1007/978-3-540-89641-8_11},
  doi       = {10.1007/978-3-540-89641-8_11},
  timestamp = {Tue, 13 Jun 2017 10:37:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cans/BringerCI08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/DelvauxCBKLMBAVVKSBBGYSRCS08,
  author    = {Nicolas Delvaux and
               Herv{\'{e}} Chabanne and
               Julien Bringer and
               Bruno Kindarji and
               Patrik Lindeberg and
               Johannes Midgren and
               Jeroen Breebaart and
               Ton H. Akkermans and
               Michiel van der Veen and
               Raymond N. J. Veldhuis and
               Els Kindt and
               Koen Simoens and
               Christoph Busch and
               Patrick Bours and
               Davrondzhon Gafurov and
               Bian Yang and
               Julien Stern and
               Carsten Rust and
               Bruno Cucinelli and
               Dimitrios Skepastianos},
  title     = {Pseudo Identities Based on Fingerprint Characteristics},
  booktitle = {4th International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
               August 2008, Proceedings},
  pages     = {1063--1068},
  year      = {2008},
  crossref  = {DBLP:conf/iih-msp/2008},
  url       = {https://doi.org/10.1109/IIH-MSP.2008.327},
  doi       = {10.1109/IIH-MSP.2008.327},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/DelvauxCBKLMBAVVKSBBGYSRCS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TangBCP08,
  author    = {Qiang Tang and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               David Pointcheval},
  title     = {A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication
               Schemes},
  booktitle = {Information Security Practice and Experience, 4th International Conference,
               {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  pages     = {56--70},
  year      = {2008},
  crossref  = {DBLP:conf/ispec/2008},
  url       = {https://doi.org/10.1007/978-3-540-79104-1_5},
  doi       = {10.1007/978-3-540-79104-1_5},
  timestamp = {Thu, 15 Jun 2017 21:34:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ispec/TangBCP08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BringerCPZ08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               David Pointcheval and
               S{\'{e}}bastien Zimmer},
  title     = {An Application of the Boneh and Shacham Group Signature Scheme to
               Biometric Authentication},
  booktitle = {Advances in Information and Computer Security, Third International
               Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
               2008. Proceedings},
  pages     = {219--230},
  year      = {2008},
  crossref  = {DBLP:conf/iwsec/2008},
  url       = {https://doi.org/10.1007/978-3-540-89598-5_15},
  doi       = {10.1007/978-3-540-89598-5_15},
  timestamp = {Tue, 13 Jun 2017 10:37:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/BringerCPZ08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/scn/BringerCI08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thomas Icart},
  title     = {Improved Privacy of the Tree-Based Hash Protocols Using Physically
               Unclonable Function},
  booktitle = {Security and Cryptography for Networks, 6th International Conference,
               {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  pages     = {77--91},
  year      = {2008},
  crossref  = {DBLP:conf/scn/2008},
  url       = {https://doi.org/10.1007/978-3-540-85855-3_6},
  doi       = {10.1007/978-3-540-85855-3_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/scn/BringerCI08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-0802-0603,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Trusted-HB: a low-cost version of {HB+} secure against Man-in-The-Middle
               attacks},
  journal   = {CoRR},
  volume    = {abs/0802.0603},
  year      = {2008},
  url       = {http://arxiv.org/abs/0802.0603},
  archivePrefix = {arXiv},
  eprint    = {0802.0603},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-0802-0603},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerC08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {Trusted-HB: a low-cost version of {HB+} secure against Man-in-The-Middle
               attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {42},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/042},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerC08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCI08,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thomas Icart},
  title     = {Identification and Privacy: Zero-Knowledge is not Enough},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {229},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/229},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCI08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@phdthesis{DBLP:phd/hal/Bringer07,
  author    = {Julien Bringer},
  title     = {Non-lin{\'{e}}arit{\'{e}} des fonctions bool{\'{e}}ennes
               : applications de la th{\'{e}}orie des fonctions bool{\'{e}}ennes
               et des codes en cryptographie. (Nonlinearity of boolean functions
               : ecryptographic applications of boolean functions and coding theory)},
  school    = {University of the South, Toulon-Var, France},
  year      = {2007},
  url       = {https://tel.archives-ouvertes.fr/tel-00258334},
  timestamp = {Wed, 03 Aug 2016 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/phd/hal/Bringer07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Malika Izabach{\`{e}}ne and
               David Pointcheval and
               Qiang Tang and
               S{\'{e}}bastien Zimmer},
  title     = {An Application of the Goldwasser-Micali Cryptosystem to Biometric
               Authentication},
  booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  pages     = {96--106},
  year      = {2007},
  crossref  = {DBLP:conf/acisp/2007},
  url       = {https://doi.org/10.1007/978-3-540-73458-1_8},
  doi       = {10.1007/978-3-540-73458-1_8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/BringerCIPTZ07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/autoid/BringerC07,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric
               Authentication},
  booktitle = {2007 {IEEE} Workshop on Automatic Identification Advanced Technologies,
               AutoID 2007, Alghero, Italy, June 7-8, 2007},
  pages     = {180--185},
  year      = {2007},
  crossref  = {DBLP:conf/autoid/2007},
  url       = {https://doi.org/10.1109/AUTOID.2007.380616},
  doi       = {10.1109/AUTOID.2007.380616},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/autoid/BringerC07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cans/BringerCPT07,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               David Pointcheval and
               Qiang Tang},
  title     = {Extended Private Information Retrieval and Its Application in Biometrics
               Authentications},
  booktitle = {Cryptology and Network Security, 6th International Conference, {CANS}
               2007, Singapore, December 8-10, 2007, Proceedings},
  pages     = {175--193},
  year      = {2007},
  crossref  = {DBLP:conf/cans/2007},
  url       = {https://doi.org/10.1007/978-3-540-76969-9_12},
  doi       = {10.1007/978-3-540-76969-9_12},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/cans/BringerCPT07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-0705-3740,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               G{\'{e}}rard D. Cohen and
               Bruno Kindarji and
               Gilles Z{\'{e}}mor},
  title     = {Optimal Iris Fuzzy Sketches},
  journal   = {CoRR},
  volume    = {abs/0705.3740},
  year      = {2007},
  url       = {http://arxiv.org/abs/0705.3740},
  archivePrefix = {arXiv},
  eprint    = {0705.3740},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-0705-3740},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCI07,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thomas Icart},
  title     = {Improved Privacy of the Tree-Based Hash protocols using Physically
               Unclonable Function},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {294},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/294},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCI07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/BringerCD06,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Quoc Dung Do},
  title     = {A fuzzy sketch with trapdoor},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {52},
  number    = {5},
  pages     = {2266--2269},
  year      = {2006},
  url       = {https://doi.org/10.1109/TIT.2006.872861},
  doi       = {10.1109/TIT.2006.872861},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/BringerCD06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cms/BringerCD06,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Emmanuelle Dottax},
  title     = {Perturbing and Protecting a Traceable Block Cipher},
  booktitle = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
               International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
               19-21, 2006, Proceedings},
  pages     = {109--119},
  year      = {2006},
  crossref  = {DBLP:conf/cms/2006},
  url       = {https://doi.org/10.1007/11909033_10},
  doi       = {10.1007/11909033_10},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cms/BringerCD06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esas/BringerC06,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne},
  title     = {On the Wiretap Channel Induced by Noisy Tags},
  booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
               Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
               Selected Papers},
  pages     = {113--120},
  year      = {2006},
  crossref  = {DBLP:conf/esas/2006},
  url       = {https://doi.org/10.1007/11964254_11},
  doi       = {10.1007/11964254_11},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esas/BringerC06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secperu/BringerCD06,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Emmanuelle Dottax},
  title     = {HB\({}^{\mbox{++}}\): a Lightweight Authentication Protocol Secure
               against Some Attacks},
  booktitle = {Second International Workshop on Security, Privacy and Trust in Pervasive
               and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France},
  pages     = {28--33},
  year      = {2006},
  crossref  = {DBLP:conf/secperu/2006},
  url       = {https://doi.org/10.1109/SECPERU.2006.10},
  doi       = {10.1109/SECPERU.2006.10},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secperu/BringerCD06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD06,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Emmanuelle Dottax},
  title     = {Perturbing and Protecting a Traceable Block Cipher},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {64},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/064},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCD06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD06a,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Emmanuelle Dottax},
  title     = {White Box Cryptography: Another Attempt},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {468},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/468},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCD06a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD05,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Quoc Dung Do},
  title     = {A Fuzzy Sketch with Trapdoor},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {331},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/331},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCD05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD05a,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Emmanuelle Dottax},
  title     = {{HB++:} a Lightweight Authentication Protocol Secure against Some
               Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {440},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/440},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BringerCD05a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/apf/2017,
  editor    = {Erich Schweighofer and
               Herbert Leitold and
               Andreas Mitrakas and
               Kai Rannenberg},
  title     = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF}
               2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10518},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-67280-9},
  doi       = {10.1007/978-3-319-67280-9},
  isbn      = {978-3-319-67279-3},
  timestamp = {Sun, 22 Oct 2017 18:40:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/apf/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2016,
  editor    = {David Pointcheval and
               Abderrahmane Nitaj and
               Tajjeeddine Rachidi},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
               on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9646},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-31517-1},
  doi       = {10.1007/978-3-319-31517-1},
  isbn      = {978-3-319-31516-4},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/birthday/2016kahn,
  editor    = {Peter Y. A. Ryan and
               David Naccache and
               Jean{-}Jacques Quisquater},
  title     = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
               of His 85th Birthday},
  series    = {Lecture Notes in Computer Science},
  volume    = {9100},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49301-4},
  doi       = {10.1007/978-3-662-49301-4},
  isbn      = {978-3-662-49300-7},
  timestamp = {Tue, 23 May 2017 01:06:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/birthday/2016kahn},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cardis/2016,
  editor    = {Kerstin Lemke{-}Rust and
               Michael Tunstall},
  title     = {Smart Card Research and Advanced Applications - 15th International
               Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10146},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-54669-8},
  doi       = {10.1007/978-3-319-54669-8},
  isbn      = {978-3-319-54668-1},
  timestamp = {Tue, 23 May 2017 01:08:17 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/compsac/2016w,
  title     = {40th {IEEE} Annual Computer Software and Applications Conference,
               {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7551592},
  timestamp = {Wed, 05 Apr 2017 12:53:50 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/compsac/2016w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2016,
  editor    = {Silvio Ranise and
               Vipin Swarup},
  title     = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9766},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-41483-6},
  doi       = {10.1007/978-3-319-41483-6},
  isbn      = {978-3-319-41482-9},
  timestamp = {Fri, 26 May 2017 00:49:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dbsec/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016dpm,
  editor    = {Giovanni Livraga and
               Vicen{\c{c}} Torra and
               Alessandro Aldini and
               Fabio Martinelli and
               Neeraj Suri},
  title     = {Data Privacy Management and Security Assurance - 11th International
               Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016,
               Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9963},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-47072-6},
  doi       = {10.1007/978-3-319-47072-6},
  isbn      = {978-3-319-47071-9},
  timestamp = {Tue, 23 May 2017 01:07:17 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esorics/2016dpm},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2016,
  editor    = {Thomas Peyrin},
  title     = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9783},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5},
  doi       = {10.1007/978-3-662-52993-5},
  isbn      = {978-3-662-52992-8},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2016,
  editor    = {X. Sean Wang and
               Lujo Bauer and
               Florian Kerschbaum},
  title     = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2914642},
  doi       = {10.1145/2914642},
  isbn      = {978-1-4503-3802-8},
  timestamp = {Fri, 03 Feb 2017 13:23:17 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sacmat/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/compsac/2015w,
  editor    = {Sheikh Iqbal Ahamed and
               Carl K. Chang and
               William C. Chu and
               Ivica Crnkovic and
               Pao{-}Ann Hsiung and
               Gang Huang and
               Jingwei Yang},
  title     = {39th Annual Computer Software and Applications Conference, {COMPSAC}
               Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7271781},
  timestamp = {Sat, 14 May 2016 12:54:09 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/compsac/2015w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/edemocracy/2015,
  editor    = {Sokratis K. Katsikas and
               Alexander B. Sideridis},
  title     = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
               - 6th International Conference, E-Democracy 2015, Athens, Greece,
               December 10-11, 2015, Proceedings},
  series    = {Communications in Computer and Information Science},
  volume    = {570},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27164-4},
  doi       = {10.1007/978-3-319-27164-4},
  isbn      = {978-3-319-27163-7},
  timestamp = {Thu, 25 May 2017 00:42:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/edemocracy/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fm/2015,
  editor    = {Nikolaj Bj{\o}rner and
               Frank S. de Boer},
  title     = {{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway,
               June 24-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9109},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-19249-9},
  doi       = {10.1007/978-3-319-19249-9},
  isbn      = {978-3-319-19248-2},
  timestamp = {Mon, 22 May 2017 17:11:19 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fm/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/host/2015,
  title     = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
               {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7119893},
  isbn      = {978-1-4673-7420-0},
  timestamp = {Fri, 29 Apr 2016 12:32:30 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/host/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icb/2015,
  title     = {International Conference on Biometrics, {ICB} 2015, Phuket, Thailand,
               19-22 May, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7131935},
  isbn      = {978-1-4799-7824-3},
  timestamp = {Mon, 13 Jul 2015 16:39:42 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icb/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icissp/2015,
  editor    = {Olivier Camp and
               Edgar R. Weippl and
               Christophe Bidan and
               Esma A{\"{\i}}meur},
  title     = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
               Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
               France, 9-11 February, 2015},
  publisher = {SciTePress},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7504796},
  isbn      = {978-989-758-081-9},
  timestamp = {Mon, 18 Jul 2016 13:46:54 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icissp/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icst/2015w,
  title     = {Eighth {IEEE} International Conference on Software Testing, Verification
               and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17,
               2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7100633},
  isbn      = {978-1-4799-1885-0},
  timestamp = {Fri, 05 Aug 2016 12:49:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icst/2015w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isw/2015,
  editor    = {Javier Lopez and
               Chris J. Mitchell},
  title     = {Information Security - 18th International Conference, {ISC} 2015,
               Trondheim, Norway, September 9-11, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9290},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-23318-5},
  doi       = {10.1007/978-3-319-23318-5},
  isbn      = {978-3-319-23317-8},
  timestamp = {Sun, 21 May 2017 00:20:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isw/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wifs/2015,
  title     = {2015 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7364553},
  isbn      = {978-1-4673-6802-5},
  timestamp = {Thu, 07 Jan 2016 14:28:50 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/wifs/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/biosig/2014,
  editor    = {Arslan Br{\"{o}}mme and
               Christoph Busch},
  title     = {{BIOSIG} 2014 - Proceedings of the 13th International Conference of
               the Biometrics Special Interest Group, 10.-12. September 2014, Darmstadt,
               Germany},
  series    = {{LNI}},
  volume    = {230},
  publisher = {{GI}},
  year      = {2014},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings230.html},
  isbn      = {978-3-88579-624-4},
  timestamp = {Tue, 15 Mar 2016 10:37:02 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/biosig/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cardis/2014,
  editor    = {Marc Joye and
               Amir Moradi},
  title     = {Smart Card Research and Advanced Applications - 13th International
               Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8968},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-16763-3},
  doi       = {10.1007/978-3-319-16763-3},
  isbn      = {978-3-319-16762-6},
  timestamp = {Tue, 23 May 2017 01:08:17 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cosade/2014,
  editor    = {Emmanuel Prouff},
  title     = {Constructive Side-Channel Analysis and Secure Design - 5th International
               Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8622},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10175-0},
  doi       = {10.1007/978-3-319-10175-0},
  isbn      = {978-3-319-10174-3},
  timestamp = {Sun, 21 May 2017 00:20:24 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cosade/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-8872,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Jordi Herrera{-}Joancomart{\'{\i}} and
               Emil Lupu and
               Joachim Posegga and
               Alessandro Aldini and
               Fabio Martinelli and
               Neeraj Suri},
  title     = {Data Privacy Management, Autonomous Spontaneous Security, and Security
               Assurance - 9th International Workshop, {DPM} 2014, 7th International
               Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
               Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8872},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17016-9},
  doi       = {10.1007/978-3-319-17016-9},
  isbn      = {978-3-319-17015-2},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esorics/2014-8872},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/essos/2014,
  editor    = {Jan J{\"{u}}rjens and
               Frank Piessens and
               Nataliia Bielova},
  title     = {Engineering Secure Software and Systems - 6th International Symposium,
               ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8364},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-04897-0},
  doi       = {10.1007/978-3-319-04897-0},
  isbn      = {978-3-319-04896-3},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/essos/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2014,
  editor    = {Nicolas Christin and
               Reihaneh Safavi{-}Naini},
  title     = {Financial Cryptography and Data Security - 18th International Conference,
               {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8437},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45472-5},
  doi       = {10.1007/978-3-662-45472-5},
  isbn      = {978-3-662-45471-8},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fps/2014,
  editor    = {Fr{\'{e}}d{\'{e}}ric Cuppens and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               A. Nur Zincir{-}Heywood and
               Philip W. L. Fong},
  title     = {Foundations and Practice of Security - 7th International Symposium,
               {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8930},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17040-4},
  doi       = {10.1007/978-3-319-17040-4},
  isbn      = {978-3-319-17039-8},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fps/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icb/2014,
  title     = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB}
               2014, FL, USA, September 29 - October 2, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6982598},
  isbn      = {978-1-4799-3584-0},
  timestamp = {Wed, 04 Jan 2017 14:30:46 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/icb/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ih/2014,
  editor    = {Andreas Unterweger and
               Andreas Uhl and
               Stefan Katzenbeisser and
               Roland Kwitt and
               Alessandro Piva},
  title     = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
               '14, Salzburg, Austria, June 11-13, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2600918},
  isbn      = {978-1-4503-2647-6},
  timestamp = {Tue, 16 Dec 2014 17:33:05 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ih/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isca/2014hasp,
  editor    = {Ruby B. Lee and
               Weidong Shi},
  title     = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
               Minneapolis, MN, USA, June 15, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2611765},
  isbn      = {978-1-4503-2777-0},
  timestamp = {Thu, 02 Oct 2014 20:36:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isca/2014hasp},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sec/2014,
  editor    = {Nora Cuppens{-}Boulahia and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Sushil Jajodia and
               Anas Abou El Kalam and
               Thierry Sans},
  title     = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
               International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
               2014. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {428},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55415-5},
  doi       = {10.1007/978-3-642-55415-5},
  isbn      = {978-3-642-55414-8},
  timestamp = {Fri, 19 May 2017 01:25:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sec/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wistp/2014,
  editor    = {David Naccache and
               Damien Sauveron},
  title     = {Information Security Theory and Practice. Securing the Internet of
               Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
               Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8501},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43826-8},
  doi       = {10.1007/978-3-662-43826-8},
  isbn      = {978-3-662-43825-1},
  timestamp = {Tue, 23 May 2017 01:11:27 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wistp/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2013,
  editor    = {Lingyu Wang and
               Basit Shafiq},
  title     = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7964},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39256-6},
  doi       = {10.1007/978-3-642-39256-6},
  isbn      = {978-3-642-39255-9},
  timestamp = {Fri, 26 May 2017 00:49:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dbsec/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dim/2013,
  editor    = {Thomas Gro{\ss} and
               Marit Hansen},
  title     = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Berlin, Germany, November 8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517881},
  isbn      = {978-1-4503-2493-9},
  timestamp = {Mon, 09 Dec 2013 15:49:10 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/dim/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2013w,
  editor    = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title     = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
               and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7862},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41320-9},
  doi       = {10.1007/978-3-642-41320-9},
  isbn      = {978-3-642-41319-3},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/2013w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icb/2013,
  editor    = {Julian Fi{\'{e}}rrez and
               Ajay Kumar and
               Mayank Vatsa and
               Raymond N. J. Veldhuis and
               Javier Ortega{-}Garcia},
  title     = {International Conference on Biometrics, {ICB} 2013, 4-7 June, 2013,
               Madrid, Spain},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6596180},
  isbn      = {978-1-4799-0310-8},
  timestamp = {Mon, 24 Mar 2014 07:41:26 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/icb/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ih/2013,
  editor    = {William Puech and
               Marc Chaumont and
               Jana Dittmann and
               Patrizio Campisi},
  title     = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
               '13, Montpellier, France, June 17-19, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2482513},
  isbn      = {978-1-4503-2081-8},
  timestamp = {Mon, 04 Aug 2014 16:00:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ih/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/nss/2013,
  editor    = {Javier Lopez and
               Xinyi Huang and
               Ravi Sandhu},
  title     = {Network and System Security - 7th International Conference, {NSS}
               2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7873},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38631-2},
  doi       = {10.1007/978-3-642-38631-2},
  isbn      = {978-3-642-38630-5},
  timestamp = {Wed, 17 May 2017 14:24:31 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/nss/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pst/2013,
  editor    = {Jordi Castell{\`{a}}{-}Roca and
               Josep Domingo{-}Ferrer and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Ali A. Ghorbani and
               Christian D. Jensen and
               Jes{\'{u}}s A. Manj{\'{o}}n and
               Iosif{-}Viorel Onut and
               Natalia Stakhanova and
               Vicen{\c{c}} Torra and
               Jie Zhang},
  title     = {Eleventh Annual International Conference on Privacy, Security and
               Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
               July 10-12, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6589044},
  isbn      = {978-1-4673-5839-2},
  timestamp = {Fri, 23 Dec 2016 13:11:12 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/pst/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/daglib/0032278,
  editor    = {Patrizio Campisi},
  title     = {Security and Privacy in Biometrics},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-1-4471-5230-9},
  doi       = {10.1007/978-1-4471-5230-9},
  isbn      = {978-1-4471-5229-3},
  timestamp = {Tue, 16 May 2017 14:01:33 +0200},
  biburl    = {http://dblp.org/rec/bib/books/daglib/0032278},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2012,
  editor    = {Aikaterini Mitrokotsa and
               Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7374},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31410-0},
  doi       = {10.1007/978-3-642-31410-0},
  isbn      = {978-3-642-31409-4},
  timestamp = {Mon, 29 May 2017 13:41:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/europki/2012,
  editor    = {Sabrina De Capitani di Vimercati and
               Chris J. Mitchell},
  title     = {Public Key Infrastructures, Services and Applications - 9th European
               Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7868},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40012-4},
  doi       = {10.1007/978-3-642-40012-4},
  isbn      = {978-3-642-40011-7},
  timestamp = {Fri, 02 Jun 2017 20:48:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/europki/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icb/2012,
  editor    = {Anil K. Jain and
               Arun Ross and
               Salil Prabhakar and
               Jaihie Kim},
  title     = {5th {IAPR} International Conference on Biometrics, {ICB} 2012, New
               Delhi, India, March 29 - April 1, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6195082},
  isbn      = {978-1-4673-0396-5},
  timestamp = {Fri, 27 Oct 2017 15:34:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icb/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pst/2012,
  editor    = {Nora Cuppens{-}Boulahia and
               Philip Fong and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Stephen Marsh and
               Jan{-}Philipp Stegh{\"{o}}fer},
  title     = {Tenth Annual International Conference on Privacy, Security and Trust,
               {PST} 2012, Paris, France, July 16-18, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6287257},
  isbn      = {978-1-4673-2323-9},
  timestamp = {Fri, 23 Dec 2016 13:11:38 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/pst/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2012,
  editor    = {Pierangela Samarati and
               Wenjing Lou and
               Jianying Zhou},
  title     = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
               and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  publisher = {SciTePress},
  year      = {2012},
  isbn      = {978-989-8565-24-2},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/biosig/2011,
  editor    = {Arslan Br{\"{o}}mme and
               Christoph Busch},
  title     = {{BIOSIG} 2011 - Proceedings of the Special Interest Group on Biometrics
               and Electronic Signatures, 08.-09. September 2011 in Darmstadt, Germany},
  series    = {{LNI}},
  volume    = {191},
  publisher = {{GI}},
  year      = {2011},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings191.html},
  isbn      = {978-3-88579-285-7},
  timestamp = {Tue, 15 Mar 2016 11:26:11 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/biosig/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2010,
  editor    = {Jianying Zhou and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, 8th International Conference,
               {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6123},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13708-2},
  doi       = {10.1007/978-3-642-13708-2},
  isbn      = {978-3-642-13707-5},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/btas/2010,
  title     = {Fourth {IEEE} International Conference on Biometrics: Theory Applications
               and Systems, {BTAS} 2010, Washington, DC, USA, 27-29 September, 2010},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5618724},
  isbn      = {978-1-4244-7581-0},
  timestamp = {Thu, 15 Oct 2015 13:56:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/btas/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iih-msp/2010,
  editor    = {Isao Echizen and
               Jeng{-}Shyang Pan and
               Dieter W. Fellner and
               Alexander Nouak and
               Arjan Kuijper and
               Lakhmi C. Jain},
  title     = {Sixth International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
               15-17 October, 2010, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5634604},
  isbn      = {978-1-4244-8378-5},
  timestamp = {Wed, 18 May 2016 12:50:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2010,
  editor    = {Patrizio Campisi and
               Jana Dittmann and
               Scott Craver},
  title     = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
               September 9-10, 2010},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1854229},
  isbn      = {978-1-4503-0286-9},
  timestamp = {Thu, 22 Jan 2015 08:10:03 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/mmsec/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2009,
  editor    = {Bart Preneel},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
               Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
               2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5580},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02384-2},
  doi       = {10.1007/978-3-642-02384-2},
  isbn      = {978-3-642-02383-5},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009asia,
  editor    = {Wanqing Li and
               Willy Susilo and
               Udaya Kiran Tupakula and
               Reihaneh Safavi{-}Naini and
               Vijay Varadharajan},
  title     = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2009, Sydney, Australia, March
               10-12, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-394-5},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2009asia},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cost/2009,
  editor    = {Julian Fi{\'{e}}rrez{-}Aguilar and
               Javier Ortega{-}Garcia and
               Anna Esposito and
               Andrzej Drygajlo and
               Marcos Fa{\'{u}}ndez{-}Zanuy},
  title     = {Biometric {ID} Management and Multimodal Communication, Joint {COST}
               2101 and 2102 International Conference, BioID{\_}MultiComm 2009, Madrid,
               Spain, September 16-18, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5707},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04391-8},
  doi       = {10.1007/978-3-642-04391-8},
  isbn      = {978-3-642-04390-1},
  timestamp = {Fri, 02 Jun 2017 20:51:18 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cost/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icc/2009,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  publisher = {{IEEE}},
  year      = {2009},
  timestamp = {Thu, 04 Mar 2010 15:03:20 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/icc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iciss/2009,
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6},
  doi       = {10.1007/978-3-642-10772-6},
  isbn      = {978-3-642-10771-9},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iciss/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2009,
  editor    = {Bimal K. Roy and
               Nicolas Sendrier},
  title     = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5922},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6},
  doi       = {10.1007/978-3-642-10628-6},
  isbn      = {978-3-642-10627-9},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/reconfig/2009,
  editor    = {Viktor K. Prasanna and
               Lionel Torres and
               Ren{\'{e}} Cumplido},
  title     = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
               and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5379688},
  isbn      = {978-0-7695-3917-1},
  timestamp = {Tue, 21 Oct 2014 16:16:12 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/reconfig/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wifs/2009,
  title     = {First {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2009, London, UK, December 6-9, 2009},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5377995},
  isbn      = {978-1-4244-5279-8},
  timestamp = {Wed, 22 Apr 2015 19:02:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wifs/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2008,
  editor    = {Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
               on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5023},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68164-9},
  doi       = {10.1007/978-3-540-68164-9},
  isbn      = {978-3-540-68159-5},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cans/2008,
  editor    = {Matthew K. Franklin and
               Lucas Chi Kwong Hui and
               Duncan S. Wong},
  title     = {Cryptology and Network Security, 7th International Conference, {CANS}
               2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5339},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89641-8},
  doi       = {10.1007/978-3-540-89641-8},
  isbn      = {978-3-540-89640-1},
  timestamp = {Tue, 13 Jun 2017 10:37:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cans/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iih-msp/2008,
  editor    = {Jeng{-}Shyang Pan and
               Xiamu Niu and
               Hsiang{-}Cheh Huang and
               Lakhmi C. Jain},
  title     = {4th International Conference on Intelligent Information Hiding and
               Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
               August 2008, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4603986},
  isbn      = {978-0-7695-3278-3},
  timestamp = {Wed, 18 May 2016 12:48:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iih-msp/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ispec/2008,
  editor    = {Liqun Chen and
               Yi Mu and
               Willy Susilo},
  title     = {Information Security Practice and Experience, 4th International Conference,
               {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4991},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-79104-1},
  doi       = {10.1007/978-3-540-79104-1},
  isbn      = {978-3-540-79103-4},
  timestamp = {Thu, 15 Jun 2017 21:34:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ispec/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2008,
  editor    = {Kanta Matsuura and
               Eiichiro Fujisaki},
  title     = {Advances in Information and Computer Security, Third International
               Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5312},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89598-5},
  doi       = {10.1007/978-3-540-89598-5},
  isbn      = {978-3-540-89597-8},
  timestamp = {Tue, 13 Jun 2017 10:37:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/scn/2008,
  editor    = {Rafail Ostrovsky and
               Roberto De Prisco and
               Ivan Visconti},
  title     = {Security and Cryptography for Networks, 6th International Conference,
               {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5229},
  publisher = {Springer},
  year      = {2008},
  url       = {http://www.springerlink.com/content/978-3-540-85854-6/#section=249631&page=1},
  isbn      = {978-3-540-85854-6},
  timestamp = {Sun, 25 Sep 2011 11:07:13 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/scn/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2007,
  editor    = {Josef Pieprzyk and
               Hossein Ghodosi and
               Ed Dawson},
  title     = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4586},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73458-1},
  doi       = {10.1007/978-3-540-73458-1},
  isbn      = {978-3-540-73457-4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/autoid/2007,
  title     = {2007 {IEEE} Workshop on Automatic Identification Advanced Technologies,
               AutoID 2007, Alghero, Italy, June 7-8, 2007},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4263198},
  isbn      = {1-4244-1300-1},
  timestamp = {Thu, 20 Nov 2014 17:59:29 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/autoid/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cans/2007,
  editor    = {Feng Bao and
               San Ling and
               Tatsuaki Okamoto and
               Huaxiong Wang and
               Chaoping Xing},
  title     = {Cryptology and Network Security, 6th International Conference, {CANS}
               2007, Singapore, December 8-10, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4856},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-76969-9},
  doi       = {10.1007/978-3-540-76969-9},
  isbn      = {978-3-540-76968-2},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/cans/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cms/2006,
  editor    = {Herbert Leitold and
               Evangelos P. Markatos},
  title     = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
               International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
               19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4237},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11909033},
  doi       = {10.1007/11909033},
  isbn      = {3-540-47820-5},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cms/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esas/2006,
  editor    = {Levente Butty{\'{a}}n and
               Virgil D. Gligor and
               Dirk Westhoff},
  title     = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
               Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4357},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11964254},
  doi       = {10.1007/11964254},
  isbn      = {978-3-540-69172-3},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esas/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secperu/2006,
  title     = {Second International Workshop on Security, Privacy and Trust in Pervasive
               and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10943},
  isbn      = {0-7695-2549-0},
  timestamp = {Fri, 01 Aug 2014 14:26:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secperu/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier