BibTeX records: Giuseppe Ateniese

download as .bib file

@inproceedings{DBLP:conf/indocrypt/AtenieseFM18,
  author    = {Giuseppe Ateniese and
               Katharina Fech and
               Bernardo Magri},
  title     = {A Family of {FDH} Signature Schemes Based on the Quadratic Residuosity
               Assumption},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference
               on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings},
  pages     = {248--262},
  year      = {2018},
  crossref  = {DBLP:conf/indocrypt/2018},
  url       = {https://doi.org/10.1007/978-3-030-05378-9\_14},
  doi       = {10.1007/978-3-030-05378-9\_14},
  timestamp = {Thu, 06 Dec 2018 12:20:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/AtenieseFM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AtenieseKMT018,
  author    = {Giuseppe Ateniese and
               Aggelos Kiayias and
               Bernardo Magri and
               Yiannis Tselekounis and
               Daniele Venturi},
  title     = {Secure Outsourcing of Cryptographic Circuits Manufacturing},
  booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
               South Korea, October 25-28, 2018, Proceedings},
  pages     = {75--93},
  year      = {2018},
  crossref  = {DBLP:conf/provsec/2018},
  url       = {https://doi.org/10.1007/978-3-030-01446-9\_5},
  doi       = {10.1007/978-3-030-01446-9\_5},
  timestamp = {Thu, 11 Oct 2018 15:07:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/AtenieseKMT018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFNV18,
  author    = {Giuseppe Ateniese and
               Danilo Francati and
               David Nu{\~{n}}ez and
               Daniele Venturi},
  title     = {Match Me if You Can: Matchmaking Encryption and its Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1094},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1094},
  timestamp = {Tue, 11 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseFNV18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/AtenieseBCPS17,
  author    = {Giuseppe Ateniese and
               Giuseppe Bianchi and
               Angelo T. Capossele and
               Chiara Petrioli and
               Dora Spenza},
  title     = {Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor
               Networks},
  journal   = {{ACM} Trans. Embedded Comput. Syst.},
  volume    = {16},
  number    = {3},
  pages     = {64:1--64:23},
  year      = {2017},
  url       = {https://doi.org/10.1145/2994603},
  doi       = {10.1145/2994603},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tecs/AtenieseBCPS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuAAHSDM17,
  author    = {Yong Yu and
               Man Ho Au and
               Giuseppe Ateniese and
               Xinyi Huang and
               Willy Susilo and
               Yuanshun Dai and
               Geyong Min},
  title     = {Identity-Based Remote Data Integrity Checking With Perfect Data Privacy
               Preserving for Cloud Storage},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {12},
  number    = {4},
  pages     = {767--778},
  year      = {2017},
  url       = {https://doi.org/10.1109/TIFS.2016.2615853},
  doi       = {10.1109/TIFS.2016.2615853},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/YuAAHSDM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AtenieseGLPPT17,
  author    = {Giuseppe Ateniese and
               Michael T. Goodrich and
               Vassilios Lekakis and
               Charalampos Papamanthou and
               Evripidis Paraskevas and
               Roberto Tamassia},
  title     = {Accountable Storage},
  booktitle = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  pages     = {623--644},
  year      = {2017},
  crossref  = {DBLP:conf/acns/2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1\_31},
  doi       = {10.1007/978-3-319-61204-1\_31},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/AtenieseGLPPT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HitajAP17,
  author    = {Briland Hitaj and
               Giuseppe Ateniese and
               Fernando P{\'{e}}rez{-}Cruz},
  title     = {Deep Models Under the {GAN:} Information Leakage from Collaborative
               Deep Learning},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {603--618},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {https://doi.org/10.1145/3133956.3134012},
  doi       = {10.1145/3133956.3134012},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/HitajAP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AtenieseM0A17,
  author    = {Giuseppe Ateniese and
               Bernardo Magri and
               Daniele Venturi and
               Ewerton R. Andrade},
  title     = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends},
  booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  pages     = {111--126},
  year      = {2017},
  crossref  = {DBLP:conf/eurosp/2017},
  url       = {https://doi.org/10.1109/EuroSP.2017.37},
  doi       = {10.1109/EuroSP.2017.37},
  timestamp = {Wed, 12 Jul 2017 09:52:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/AtenieseM0A17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/AtenieseBCPS17,
  author    = {Giuseppe Ateniese and
               Giuseppe Bianchi and
               Angelo T. Capossele and
               Chiara Petrioli and
               Dora Spenza},
  title     = {{HELIOS:} Outsourcing of Security Operations in Green Wireless Sensor
               Networks},
  booktitle = {85th {IEEE} Vehicular Technology Conference, {VTC} Spring 2017, Sydney,
               Australia, June 4-7, 2017},
  pages     = {1--7},
  year      = {2017},
  crossref  = {DBLP:conf/vtc/2017s},
  url       = {https://doi.org/10.1109/VTCSpring.2017.8108500},
  doi       = {10.1109/VTCSpring.2017.8108500},
  timestamp = {Mon, 26 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vtc/AtenieseBCPS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HitajAP17,
  author    = {Briland Hitaj and
               Giuseppe Ateniese and
               Fernando P{\'{e}}rez{-}Cruz},
  title     = {Deep Models Under the {GAN:} Information Leakage from Collaborative
               Deep Learning},
  journal   = {CoRR},
  volume    = {abs/1702.07464},
  year      = {2017},
  url       = {http://arxiv.org/abs/1702.07464},
  archivePrefix = {arXiv},
  eprint    = {1702.07464},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/HitajAP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-00440,
  author    = {Briland Hitaj and
               Paolo Gasti and
               Giuseppe Ateniese and
               Fernando P{\'{e}}rez{-}Cruz},
  title     = {PassGAN: {A} Deep Learning Approach for Password Guessing},
  journal   = {CoRR},
  volume    = {abs/1709.00440},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.00440},
  archivePrefix = {arXiv},
  eprint    = {1709.00440},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-00440},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AtenieseDDV16,
  author    = {Giuseppe Ateniese and
               {\"{O}}zg{\"{u}}r Dagdelen and
               Ivan Damg{\aa}rd and
               Daniele Venturi},
  title     = {Entangled cloud storage},
  journal   = {Future Generation Comp. Syst.},
  volume    = {62},
  pages     = {104--118},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.future.2016.01.008},
  doi       = {10.1016/j.future.2016.01.008},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/AtenieseDDV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KruppSSFAN16,
  author    = {Johannes Krupp and
               Dominique Schr{\"{o}}der and
               Mark Simkin and
               Dario Fiore and
               Giuseppe Ateniese and
               Stefan N{\"{u}}rnberger},
  title     = {Nearly Optimal Verifiable Data Streaming},
  booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {I}},
  pages     = {417--445},
  year      = {2016},
  crossref  = {DBLP:conf/pkc/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-49384-7\_16},
  doi       = {10.1007/978-3-662-49384-7\_16},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/KruppSSFAN16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseKMTV16,
  author    = {Giuseppe Ateniese and
               Aggelos Kiayias and
               Bernardo Magri and
               Yiannis Tselekounis and
               Daniele Venturi},
  title     = {Secure Outsourcing of Circuit Manufacturing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {527},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/527},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseKMTV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseMVA16,
  author    = {Giuseppe Ateniese and
               Bernardo Magri and
               Daniele Venturi and
               Ewerton R. Andrade},
  title     = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {757},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/757},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseMVA16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AtenieseMSVVF15,
  author    = {Giuseppe Ateniese and
               Luigi V. Mancini and
               Angelo Spognardi and
               Antonio Villani and
               Domenico Vitali and
               Giovanni Felici},
  title     = {Hacking smart machines with smarter ones: How to extract meaningful
               data from machine learning classifiers},
  journal   = {{IJSN}},
  volume    = {10},
  number    = {3},
  pages     = {137--150},
  year      = {2015},
  url       = {https://doi.org/10.1504/IJSN.2015.071829},
  doi       = {10.1504/IJSN.2015.071829},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijsn/AtenieseMSVVF15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/YuMA15,
  author    = {Yong Yu and
               Yi Mu and
               Giuseppe Ateniese},
  title     = {Recent Advances in Security and Privacy in Big Data},
  journal   = {J. {UCS}},
  volume    = {21},
  number    = {3},
  pages     = {365--368},
  year      = {2015},
  url       = {http://www.jucs.org/jucs\_21\_3/recent\_advances\_in\_security},
  timestamp = {Mon, 24 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jucs/YuMA15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseDDV15,
  author    = {Giuseppe Ateniese and
               {\"{O}}zg{\"{u}}r Dagdelen and
               Ivan Damg{\aa}rd and
               Daniele Venturi},
  title     = {Entangled Encodings and Data Entanglement},
  booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud
               Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
               14, 2015},
  pages     = {3--12},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015scc},
  url       = {https://doi.org/10.1145/2732516.2732524},
  doi       = {10.1145/2732516.2732524},
  timestamp = {Tue, 06 Nov 2018 11:07:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseDDV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseMV15,
  author    = {Giuseppe Ateniese and
               Bernardo Magri and
               Daniele Venturi},
  title     = {Subversion-Resilient Signature Schemes},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {364--375},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2813635},
  doi       = {10.1145/2810103.2813635},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseMV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AtenieseFK15,
  author    = {Giuseppe Ateniese and
               Antonio Faonio and
               Seny Kamara},
  title     = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs
               of Storage},
  booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
               2015, Oxford, UK, December 15-17, 2015. Proceedings},
  pages     = {311--328},
  year      = {2015},
  crossref  = {DBLP:conf/ima/2015},
  url       = {https://doi.org/10.1007/978-3-319-27239-9\_19},
  doi       = {10.1007/978-3-319-27239-9\_19},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/AtenieseFK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/AtenieseHMVV15,
  author    = {Giuseppe Ateniese and
               Briland Hitaj and
               Luigi Vincenzo Mancini and
               Nino Vincenzo Verde and
               Antonio Villani},
  title     = {No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based
               Encrypted Traffic to Track a User's Position},
  booktitle = {Network and System Security - 9th International Conference, {NSS}
               2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  pages     = {46--59},
  year      = {2015},
  crossref  = {DBLP:conf/nss/2015},
  url       = {https://doi.org/10.1007/978-3-319-25645-0\_4},
  doi       = {10.1007/978-3-319-25645-0\_4},
  timestamp = {Wed, 17 May 2017 14:24:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/AtenieseHMVV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WilsonA15,
  author    = {Duane Wilson and
               Giuseppe Ateniese},
  title     = {From Pretty Good to Great: Enhancing {PGP} Using Bitcoin and the Blockchain},
  booktitle = {Network and System Security - 9th International Conference, {NSS}
               2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  pages     = {368--375},
  year      = {2015},
  crossref  = {DBLP:conf/nss/2015},
  url       = {https://doi.org/10.1007/978-3-319-25645-0\_25},
  doi       = {10.1007/978-3-319-25645-0\_25},
  timestamp = {Wed, 17 May 2017 14:24:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/WilsonA15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AtenieseHMVV15,
  author    = {Giuseppe Ateniese and
               Briland Hitaj and
               Luigi V. Mancini and
               Nino Vincenzo Verde and
               Antonio Villani},
  title     = {No Place to Hide that Bytes won't Reveal: Sniffing Location-Based
               Encrypted Traffic to Track User Position},
  journal   = {CoRR},
  volume    = {abs/1505.07774},
  year      = {2015},
  url       = {http://arxiv.org/abs/1505.07774},
  archivePrefix = {arXiv},
  eprint    = {1505.07774},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AtenieseHMVV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WilsonA15,
  author    = {Duane Wilson and
               Giuseppe Ateniese},
  title     = {From Pretty Good To Great: Enhancing {PGP} using Bitcoin and the Blockchain},
  journal   = {CoRR},
  volume    = {abs/1508.04868},
  year      = {2015},
  url       = {http://arxiv.org/abs/1508.04868},
  archivePrefix = {arXiv},
  eprint    = {1508.04868},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/WilsonA15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KruppSSFAN15,
  author    = {Johannes Krupp and
               Dominique Schr{\"{o}}der and
               Mark Simkin and
               Dario Fiore and
               Giuseppe Ateniese and
               Stefan N{\"{u}}rnberger},
  title     = {Nearly Optimal Verifiable Data Streaming (Full Version)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {333},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/333},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KruppSSFAN15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseMV15,
  author    = {Giuseppe Ateniese and
               Bernardo Magri and
               Daniele Venturi},
  title     = {Subversion-Resilient Signature Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {517},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/517},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseMV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFK15,
  author    = {Giuseppe Ateniese and
               Antonio Faonio and
               Seny Kamara},
  title     = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs
               of Storage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {920},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/920},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseFK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/AtenieseBBL14,
  author    = {Giuseppe Ateniese and
               Roberto Baldoni and
               Silvia Bonomi and
               Giuseppe Antonio Di Luna},
  title     = {Fault-tolerant oblivious assignment with m slots in synchronous systems},
  journal   = {J. Parallel Distrib. Comput.},
  volume    = {74},
  number    = {7},
  pages     = {2648--2661},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.jpdc.2014.02.008},
  doi       = {10.1016/j.jpdc.2014.02.008},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jpdc/AtenieseBBL14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AtenieseFMM14,
  author    = {Giuseppe Ateniese and
               Antonio Faonio and
               Bernardo Magri and
               Breno de Medeiros},
  title     = {Certified Bitcoins},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  pages     = {80--96},
  year      = {2014},
  crossref  = {DBLP:conf/acns/2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5\_6},
  doi       = {10.1007/978-3-319-07536-5\_6},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/AtenieseFMM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/VerdeAGMS14,
  author    = {Nino Vincenzo Verde and
               Giuseppe Ateniese and
               Emanuele Gabrielli and
               Luigi Vincenzo Mancini and
               Angelo Spognardi},
  title     = {No NAT'd User Left Behind: Fingerprinting Users behind {NAT} from
               NetFlow Records Alone},
  booktitle = {{IEEE} 34th International Conference on Distributed Computing Systems,
               {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014},
  pages     = {218--227},
  year      = {2014},
  crossref  = {DBLP:conf/icdcs/2014},
  url       = {https://doi.org/10.1109/ICDCS.2014.30},
  doi       = {10.1109/ICDCS.2014.30},
  timestamp = {Mon, 11 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/VerdeAGMS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhengXA14,
  author    = {Qingji Zheng and
               Shouhuai Xu and
               Giuseppe Ateniese},
  title     = {{VABKS:} Verifiable attribute-based keyword search over outsourced
               encrypted data},
  booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
               Toronto, Canada, April 27 - May 2, 2014},
  pages     = {522--530},
  year      = {2014},
  crossref  = {DBLP:conf/infocom/2014},
  url       = {https://doi.org/10.1109/INFOCOM.2014.6847976},
  doi       = {10.1109/INFOCOM.2014.6847976},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/ZhengXA14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WilsonA14,
  author    = {Duane C. Wilson and
               Giuseppe Ateniese},
  title     = {"To Share or not to Share" in Client-Side Encrypted Clouds},
  booktitle = {Information Security - 17th International Conference, {ISC} 2014,
               Hong Kong, China, October 12-14, 2014. Proceedings},
  pages     = {401--412},
  year      = {2014},
  crossref  = {DBLP:conf/isw/2014},
  url       = {https://doi.org/10.1007/978-3-319-13257-0\_24},
  doi       = {10.1007/978-3-319-13257-0\_24},
  timestamp = {Fri, 02 Nov 2018 09:37:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/WilsonA14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseBFG14,
  author    = {Giuseppe Ateniese and
               Ilario Bonacina and
               Antonio Faonio and
               Nicola Galesi},
  title     = {Proofs of Space: When Space Is of the Essence},
  booktitle = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  pages     = {538--557},
  year      = {2014},
  crossref  = {DBLP:conf/scn/2014},
  url       = {https://doi.org/10.1007/978-3-319-10879-7\_31},
  doi       = {10.1007/978-3-319-10879-7\_31},
  timestamp = {Sat, 16 Sep 2017 12:10:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/AtenieseBFG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VerdeAGMS14,
  author    = {Nino Vincenzo Verde and
               Giuseppe Ateniese and
               Emanuele Gabrielli and
               Luigi Vincenzo Mancini and
               Angelo Spognardi},
  title     = {No NAT'd User left Behind: Fingerprinting Users behind {NAT} from
               NetFlow Records alone},
  journal   = {CoRR},
  volume    = {abs/1402.1940},
  year      = {2014},
  url       = {http://arxiv.org/abs/1402.1940},
  archivePrefix = {arXiv},
  eprint    = {1402.1940},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/VerdeAGMS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WilsonA14,
  author    = {Duane Wilson and
               Giuseppe Ateniese},
  title     = {To Share or Not to Share in Client-Side Encrypted Clouds},
  journal   = {CoRR},
  volume    = {abs/1404.2697},
  year      = {2014},
  url       = {http://arxiv.org/abs/1404.2697},
  archivePrefix = {arXiv},
  eprint    = {1404.2697},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/WilsonA14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFMM14,
  author    = {Giuseppe Ateniese and
               Antonio Faonio and
               Bernardo Magri and
               Breno de Medeiros},
  title     = {Certified Bitcoins},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {76},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/076},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseFMM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseGLPPT14,
  author    = {Giuseppe Ateniese and
               Michael T. Goodrich and
               Vassilios Lekakis and
               Charalampos Papamanthou and
               Evripidis Paraskevas and
               Roberto Tamassia},
  title     = {Accountable Storage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {886},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/886},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseGLPPT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AtenieseSFM13,
  author    = {Giuseppe Ateniese and
               Alfredo De Santis and
               Anna Lisa Ferrara and
               Barbara Masucci},
  title     = {A note on time-bound hierarchical key assignment schemes},
  journal   = {Inf. Process. Lett.},
  volume    = {113},
  number    = {5-6},
  pages     = {151--155},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.ipl.2013.01.006},
  doi       = {10.1016/j.ipl.2013.01.006},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/AtenieseSFM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseBCP13,
  author    = {Giuseppe Ateniese and
               Giuseppe Bianchi and
               Angelo Capossele and
               Chiara Petrioli},
  title     = {Low-cost Standard Signatures in Wireless Sensor Networks: {A} Case
               for Reviving Pre-computation Techniques?},
  booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  year      = {2013},
  crossref  = {DBLP:conf/ndss/2013},
  url       = {https://www.ndss-symposium.org/ndss2013/low-cost-standard-signatures-wireless-sensor-networks-case-reviving-pre-computation-techniques},
  timestamp = {Mon, 26 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/AtenieseBCP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AtenieseFMSVV13,
  author    = {Giuseppe Ateniese and
               Giovanni Felici and
               Luigi V. Mancini and
               Angelo Spognardi and
               Antonio Villani and
               Domenico Vitali},
  title     = {Hacking Smart Machines with Smarter Ones: How to Extract Meaningful
               Data from Machine Learning Classifiers},
  journal   = {CoRR},
  volume    = {abs/1306.4447},
  year      = {2013},
  url       = {http://arxiv.org/abs/1306.4447},
  archivePrefix = {arXiv},
  eprint    = {1306.4447},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AtenieseFMSVV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengXA13,
  author    = {Qingji Zheng and
               Shouhuai Xu and
               Giuseppe Ateniese},
  title     = {{VABKS:} Verifiable Attribute-based Keyword Search over Outsourced
               Encrypted Data},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {462},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/462},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhengXA13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBFG13,
  author    = {Giuseppe Ateniese and
               Ilario Bonacina and
               Antonio Faonio and
               Nicola Galesi},
  title     = {Proofs of Space: When Space is of the Essence},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {805},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/805},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseBFG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AtenieseSFM12,
  author    = {Giuseppe Ateniese and
               Alfredo De Santis and
               Anna Lisa Ferrara and
               Barbara Masucci},
  title     = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes},
  journal   = {J. Cryptology},
  volume    = {25},
  number    = {2},
  pages     = {243--270},
  year      = {2012},
  url       = {https://doi.org/10.1007/s00145-010-9094-6},
  doi       = {10.1007/s00145-010-9094-6},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/AtenieseSFM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhengXA12,
  author    = {Qingji Zheng and
               Shouhuai Xu and
               Giuseppe Ateniese},
  title     = {Efficient query integrity for outsourced dynamic databases},
  booktitle = {Proceedings of the 2012 {ACM} Workshop on Cloud computing security,
               {CCSW} 2012, Raleigh, NC, USA, October 19, 2012.},
  pages     = {71--82},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012ccsw},
  url       = {https://doi.org/10.1145/2381913.2381927},
  doi       = {10.1145/2381913.2381927},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhengXA12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FilardoA12,
  author    = {Nathaniel Wesley Filardo and
               Giuseppe Ateniese},
  title     = {High-Entropy Visual Identification for Touch Screen Devices},
  booktitle = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  pages     = {182--198},
  year      = {2012},
  crossref  = {DBLP:conf/ispec/2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2\_13},
  doi       = {10.1007/978-3-642-29101-2\_13},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/FilardoA12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/AtenieseBBL12,
  author    = {Giuseppe Ateniese and
               Roberto Baldoni and
               Silvia Bonomi and
               Giuseppe Antonio Di Luna},
  title     = {Oblivious Assignment with m Slots},
  booktitle = {Stabilization, Safety, and Security of Distributed Systems - 14th
               International Symposium, {SSS} 2012, Toronto, Canada, October 1-4,
               2012. Proceedings},
  pages     = {187--201},
  year      = {2012},
  crossref  = {DBLP:conf/sss/2012},
  url       = {https://doi.org/10.1007/978-3-642-33536-5\_19},
  doi       = {10.1007/978-3-642-33536-5\_19},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sss/AtenieseBBL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengXA12,
  author    = {Qingji Zheng and
               Shouhuai Xu and
               Giuseppe Ateniese},
  title     = {Efficient Query Integrity for Outsourced Dynamic Databases},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {493},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/493},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhengXA12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseDDV12,
  author    = {Giuseppe Ateniese and
               {\"{O}}zg{\"{u}}r Dagdelen and
               Ivan Damg{\aa}rd and
               Daniele Venturi},
  title     = {Entangled Cloud Storage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {511},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/511},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseDDV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseBCHKKPS11,
  author    = {Giuseppe Ateniese and
               Randal C. Burns and
               Reza Curtmola and
               Joseph Herring and
               Osama Khan and
               Lea Kissner and
               Zachary N. J. Peterson and
               Dawn Song},
  title     = {Remote data checking using provable data possession},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {14},
  number    = {1},
  pages     = {12:1--12:34},
  year      = {2011},
  url       = {https://doi.org/10.1145/1952982.1952994},
  doi       = {10.1145/1952982.1952994},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/AtenieseBCHKKPS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AtenieseCT11,
  author    = {Giuseppe Ateniese and
               Emiliano De Cristofaro and
               Gene Tsudik},
  title     = {(If) Size Matters: Size-Hiding Private Set Intersection},
  booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
               on Practice and Theory in Public Key Cryptography, Taormina, Italy,
               March 6-9, 2011. Proceedings},
  pages     = {156--173},
  year      = {2011},
  crossref  = {DBLP:conf/pkc/2011},
  url       = {https://doi.org/10.1007/978-3-642-19379-8\_10},
  doi       = {10.1007/978-3-642-19379-8\_10},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/AtenieseCT11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FilardoA11,
  author    = {Nathaniel Wesley Filardo and
               Giuseppe Ateniese},
  title     = {High-Entropy Visual Identification for Touch Screen Devices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {359},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/359},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FilardoA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/StantonMBA10,
  author    = {Paul T. Stanton and
               Benjamin McKeown and
               Randal C. Burns and
               Giuseppe Ateniese},
  title     = {FastAD: an authenticated directory for billions of objects},
  journal   = {Operating Systems Review},
  volume    = {44},
  number    = {1},
  pages     = {45--49},
  year      = {2010},
  url       = {https://doi.org/10.1145/1740390.1740401},
  doi       = {10.1145/1740390.1740401},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/StantonMBA10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenCAB10,
  author    = {Bo Chen and
               Reza Curtmola and
               Giuseppe Ateniese and
               Randal C. Burns},
  title     = {Remote data checking for network coding-based distributed storage
               systems},
  booktitle = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
               2010, Chicago, IL, USA, October 8, 2010},
  pages     = {31--42},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010ccsw},
  url       = {https://doi.org/10.1145/1866835.1866842},
  doi       = {10.1145/1866835.1866842},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChenCAB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GastiAB10,
  author    = {Paolo Gasti and
               Giuseppe Ateniese and
               Marina Blanton},
  title     = {Deniable cloud storage: sharing files via public-key deniability},
  booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  pages     = {31--42},
  year      = {2010},
  crossref  = {DBLP:conf/wpes/2010},
  url       = {https://doi.org/10.1145/1866919.1866925},
  doi       = {10.1145/1866919.1866925},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/GastiAB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCT10,
  author    = {Giuseppe Ateniese and
               Emiliano De Cristofaro and
               Gene Tsudik},
  title     = {(If) Size Matters: Size-Hiding Private Set Intersection},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {220},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/220},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseCT10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AtenieseCJT09,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  title     = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt
               2006},
  journal   = {{IJACT}},
  volume    = {1},
  number    = {4},
  pages     = {320--322},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJACT.2009.028030},
  doi       = {10.1504/IJACT.2009.028030},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijact/AtenieseCJT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AtenieseKK09,
  author    = {Giuseppe Ateniese and
               Seny Kamara and
               Jonathan Katz},
  title     = {Proofs of Storage from Homomorphic Identification Protocols},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {319--333},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7\_19},
  doi       = {10.1007/978-3-642-10366-7\_19},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/AtenieseKK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AtenieseG09,
  author    = {Giuseppe Ateniese and
               Paolo Gasti},
  title     = {Universally Anonymous {IBE} Based on the Quadratic Residuosity Assumption},
  booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
               the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
               Proceedings},
  pages     = {32--47},
  year      = {2009},
  crossref  = {DBLP:conf/ctrsa/2009},
  url       = {https://doi.org/10.1007/978-3-642-00862-7\_3},
  doi       = {10.1007/978-3-642-00862-7\_3},
  timestamp = {Sat, 24 Nov 2018 11:59:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/AtenieseG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AtenieseBH09,
  author    = {Giuseppe Ateniese and
               Karyn Benson and
               Susan Hohenberger},
  title     = {Key-Private Proxy Re-encryption},
  booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
               the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
               Proceedings},
  pages     = {279--294},
  year      = {2009},
  crossref  = {DBLP:conf/ctrsa/2009},
  url       = {https://doi.org/10.1007/978-3-642-00862-7\_19},
  doi       = {10.1007/978-3-642-00862-7\_19},
  timestamp = {Sat, 24 Nov 2018 11:59:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/AtenieseBH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseG09,
  author    = {Giuseppe Ateniese and
               Paolo Gasti},
  title     = {Universally Anonymous {IBE} based on the Quadratic Residuosity Assumption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {280},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/280},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/CurtmolaKBA08,
  author    = {Reza Curtmola and
               Osama Khan and
               Randal C. Burns and
               Giuseppe Ateniese},
  title     = {{MR-PDP:} Multiple-Replica Provable Data Possession},
  booktitle = {28th {IEEE} International Conference on Distributed Computing Systems
               {(ICDCS} 2008), 17-20 June 2008, Beijing, China},
  pages     = {411--420},
  year      = {2008},
  crossref  = {DBLP:conf/icdcs/2008},
  url       = {https://doi.org/10.1109/ICDCS.2008.68},
  doi       = {10.1109/ICDCS.2008.68},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/CurtmolaKBA08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AteniesePMT08,
  author    = {Giuseppe Ateniese and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Gene Tsudik},
  title     = {Scalable and efficient provable data possession},
  booktitle = {4th International {ICST} Conference on Security and Privacy in Communication
               Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages     = {9},
  year      = {2008},
  crossref  = {DBLP:conf/securecomm/2008},
  url       = {https://doi.org/10.1145/1460877.1460889},
  doi       = {10.1145/1460877.1460889},
  timestamp = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/AteniesePMT08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AteniesePMT08,
  author    = {Giuseppe Ateniese and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Gene Tsudik},
  title     = {Scalable and Efficient Provable Data Possession},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {114},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/114},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AteniesePMT08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBH08,
  author    = {Giuseppe Ateniese and
               Karyn Benson and
               Susan Hohenberger},
  title     = {Key-Private Proxy Re-Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {463},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/463},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseBH08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GreenA07,
  author    = {Matthew Green and
               Giuseppe Ateniese},
  title     = {Identity-Based Proxy Re-encryption},
  booktitle = {Applied Cryptography and Network Security, 5th International Conference,
               {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  pages     = {288--306},
  year      = {2007},
  crossref  = {DBLP:conf/acns/2007},
  url       = {https://doi.org/10.1007/978-3-540-72738-5\_19},
  doi       = {10.1007/978-3-540-72738-5\_19},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/GreenA07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseBCHKPS07,
  author    = {Giuseppe Ateniese and
               Randal C. Burns and
               Reza Curtmola and
               Joseph Herring and
               Lea Kissner and
               Zachary N. J. Peterson and
               Dawn Xiaodong Song},
  title     = {Provable data possession at untrusted stores},
  booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
               Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages     = {598--609},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007},
  url       = {https://doi.org/10.1145/1315245.1315318},
  doi       = {10.1145/1315245.1315318},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseBCHKPS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/PetersonBAB07,
  author    = {Zachary N. J. Peterson and
               Randal C. Burns and
               Giuseppe Ateniese and
               Stephen Bono},
  title     = {Design and Implementation of Verifiable Audit Trails for a Versioning
               File System},
  booktitle = {5th {USENIX} Conference on File and Storage Technologies, {FAST} 2007,
               February 13-16, 2007, San Jose, CA, {USA}},
  pages     = {93--106},
  year      = {2007},
  crossref  = {DBLP:conf/fast/2007},
  url       = {http://www.usenix.org/events/fast07/tech/peterson.html},
  timestamp = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fast/PetersonBAB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseKB07,
  author    = {Giuseppe Ateniese and
               Jonathan Kirsch and
               Marina Blanton},
  title     = {Secret Handshakes with Dynamic and Fuzzy Matching},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
               2007},
  year      = {2007},
  crossref  = {DBLP:conf/ndss/2007},
  url       = {http://www.isoc.org/isoc/conferences/ndss/07/papers/secret-handshakes.pdf},
  timestamp = {Thu, 16 Apr 2009 21:25:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/AtenieseKB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBCHKPS07,
  author    = {Giuseppe Ateniese and
               Randal C. Burns and
               Reza Curtmola and
               Joseph Herring and
               Lea Kissner and
               Zachary N. J. Peterson and
               Dawn Song},
  title     = {Provable Data Possession at Untrusted Stores},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {202},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/202},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseBCHKPS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseFGH06,
  author    = {Giuseppe Ateniese and
               Kevin Fu and
               Matthew Green and
               Susan Hohenberger},
  title     = {Improved proxy re-encryption schemes with applications to secure distributed
               storage},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {9},
  number    = {1},
  pages     = {1--30},
  year      = {2006},
  url       = {https://doi.org/10.1145/1127345.1127346},
  doi       = {10.1145/1127345.1127346},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/AtenieseFGH06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AtenieseRS06,
  author    = {Giuseppe Ateniese and
               Chris Riley and
               Christian Scheideler},
  title     = {Survivable Monitoring in Dynamic Networks},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {5},
  number    = {9},
  pages     = {1242--1254},
  year      = {2006},
  url       = {https://doi.org/10.1109/TMC.2006.138},
  doi       = {10.1109/TMC.2006.138},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tmc/AtenieseRS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseSFM06,
  author    = {Giuseppe Ateniese and
               Alfredo De Santis and
               Anna Lisa Ferrara and
               Barbara Masucci},
  title     = {Provably-secure time-bound hierarchical key assignment schemes},
  booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  pages     = {288--297},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006usa},
  url       = {https://doi.org/10.1145/1180405.1180441},
  doi       = {10.1145/1180405.1180441},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseSFM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseSFM06,
  author    = {Giuseppe Ateniese and
               Alfredo De Santis and
               Anna Lisa Ferrara and
               Barbara Masucci},
  title     = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {225},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/225},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseSFM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCJT06,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  title     = {Remarks on "Analysis of One Popular Group Signature Scheme"
               in Asiacrypt 2006},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {464},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/464},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseCJT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenA06,
  author    = {Matthew Green and
               Giuseppe Ateniese},
  title     = {Identity-Based Proxy Re-encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {473},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/473},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GreenA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CurtmolaSA05,
  author    = {Reza Curtmola and
               Aniello Del Sorbo and
               Giuseppe Ateniese},
  title     = {On the Performance and Analysis of {DNS} Security Extensions},
  booktitle = {Cryptology and Network Security, 4th International Conference, {CANS}
               2005, Xiamen, China, December 14-16, 2005, Proceedings},
  pages     = {288--303},
  year      = {2005},
  crossref  = {DBLP:conf/cans/2005},
  url       = {https://doi.org/10.1007/11599371\_24},
  doi       = {10.1007/11599371\_24},
  timestamp = {Mon, 24 Sep 2018 12:27:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/CurtmolaSA05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseCM05,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Breno de Medeiros},
  title     = {Untraceable {RFID} tags via insubvertible encryption},
  booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages     = {92--101},
  year      = {2005},
  crossref  = {DBLP:conf/ccs/2005},
  url       = {https://doi.org/10.1145/1102120.1102134},
  doi       = {10.1145/1102120.1102134},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseCM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseH05,
  author    = {Giuseppe Ateniese and
               Susan Hohenberger},
  title     = {Proxy re-signatures: new definitions, algorithms, and applications},
  booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages     = {310--319},
  year      = {2005},
  crossref  = {DBLP:conf/ccs/2005},
  url       = {https://doi.org/10.1145/1102120.1102161},
  doi       = {10.1145/1102120.1102161},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AtenieseCMT05,
  author    = {Giuseppe Ateniese and
               Daniel H. Chou and
               Breno de Medeiros and
               Gene Tsudik},
  title     = {Sanitizable Signatures},
  booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
               in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  pages     = {159--177},
  year      = {2005},
  crossref  = {DBLP:conf/esorics/2005},
  url       = {https://doi.org/10.1007/11555827\_10},
  doi       = {10.1007/11555827\_10},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/AtenieseCMT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseFGH05,
  author    = {Giuseppe Ateniese and
               Kevin Fu and
               Matthew Green and
               Susan Hohenberger},
  title     = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed
               Storage},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2005, San Diego, California, {USA}},
  year      = {2005},
  crossref  = {DBLP:conf/ndss/2005},
  url       = {http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/ateniese.pdf},
  timestamp = {Thu, 30 Aug 2012 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/AtenieseFGH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/storagess/BurnsPAB05,
  author    = {Randal C. Burns and
               Zachary N. J. Peterson and
               Giuseppe Ateniese and
               Stephen Bono},
  title     = {Verifiable audit trails for a versioning file system},
  booktitle = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability,
               StorageSS 2005, Fairfax, VA, USA, November 11, 2005},
  pages     = {44--50},
  year      = {2005},
  crossref  = {DBLP:conf/storagess/2005},
  url       = {https://doi.org/10.1145/1103780.1103787},
  doi       = {10.1145/1103780.1103787},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/storagess/BurnsPAB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFGH05,
  author    = {Giuseppe Ateniese and
               Kevin Fu and
               Matthew Green and
               Susan Hohenberger},
  title     = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed
               Storage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {28},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/028},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseFGH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCHM05,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Susan Hohenberger and
               Breno de Medeiros},
  title     = {Practical Group Signatures without Random Oracles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {385},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/385},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseCHM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseH05,
  author    = {Giuseppe Ateniese and
               Susan Hohenberger},
  title     = {Proxy Re-Signatures: New Definitions, Algorithms, and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {433},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/433},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ateniese04,
  author    = {Giuseppe Ateniese},
  title     = {Verifiable encryption of digital signatures and applications},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {1--20},
  year      = {2004},
  url       = {https://doi.org/10.1145/984334.984335},
  doi       = {10.1145/984334.984335},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/Ateniese04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtenieseM04,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros},
  title     = {Identity-Based Chameleon Hash and Applications},
  booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
               West, FL, USA, February 9-12, 2004. Revised Papers},
  pages     = {164--180},
  year      = {2004},
  crossref  = {DBLP:conf/fc/2004},
  url       = {https://doi.org/10.1007/978-3-540-27809-2\_19},
  doi       = {10.1007/978-3-540-27809-2\_19},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/AtenieseM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/AtenieseRS04,
  author    = {Giuseppe Ateniese and
               Chris Riley and
               Christian Scheideler},
  title     = {Survivable Monitoring in Dynamic Networks},
  booktitle = {Proceedings of the Second {IEEE} International Workshop on Information
               Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages     = {33--47},
  year      = {2004},
  crossref  = {DBLP:conf/iwia/2004},
  url       = {https://doi.org/10.1109/IWIA.2004.1288036},
  doi       = {10.1109/IWIA.2004.1288036},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwia/AtenieseRS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseM04,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros},
  title     = {On the Key Exposure Problem in Chameleon Hashes},
  booktitle = {Security in Communication Networks, 4th International Conference,
               {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
               Papers},
  pages     = {165--179},
  year      = {2004},
  crossref  = {DBLP:conf/scn/2004},
  url       = {https://doi.org/10.1007/978-3-540-30598-9\_12},
  doi       = {10.1007/978-3-540-30598-9\_12},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/AtenieseM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM04,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros},
  title     = {A Provably Secure Nyberg-Rueppel Signature Variant with Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {93},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/093},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM04a,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros},
  title     = {On the Key Exposure Problem in Chameleon Hashes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {243},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/243},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseM04a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AtenieseM03,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros},
  title     = {Efficient Group Signatures without Trapdoors},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  pages     = {246--268},
  year      = {2003},
  crossref  = {DBLP:conf/asiacrypt/2003},
  url       = {https://doi.org/10.1007/978-3-540-40061-5\_15},
  doi       = {10.1007/978-3-540-40061-5\_15},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/AtenieseM03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM03,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros},
  title     = {Identity-based Chameleon Hash and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {167},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/167},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseM03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AtenieseN02,
  author    = {Giuseppe Ateniese and
               Cristina Nita{-}Rotaru},
  title     = {Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption},
  booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
               the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
               Proceedings},
  pages     = {182--199},
  year      = {2002},
  crossref  = {DBLP:conf/ctrsa/2002},
  url       = {https://doi.org/10.1007/3-540-45760-7\_13},
  doi       = {10.1007/3-540-45760-7\_13},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/AtenieseN02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtenieseST02,
  author    = {Giuseppe Ateniese and
               Dawn Xiaodong Song and
               Gene Tsudik},
  title     = {Quasi-Efficient Revocation in Group Signatures},
  booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
               Bermuda, March 11-14, 2002, Revised Papers},
  pages     = {183--197},
  year      = {2002},
  crossref  = {DBLP:conf/fc/2002},
  url       = {https://doi.org/10.1007/3-540-36504-4\_14},
  doi       = {10.1007/3-540-36504-4\_14},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/AtenieseST02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseCMD02,
  author    = {Giuseppe Ateniese and
               Reza Curtmola and
               Breno de Medeiros and
               Darren Davis},
  title     = {Medical Information Privacy Assurance: Cryptographic and System Aspects},
  booktitle = {Security in Communication Networks, Third International Conference,
               {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  pages     = {199--218},
  year      = {2002},
  crossref  = {DBLP:conf/scn/2002},
  url       = {https://doi.org/10.1007/3-540-36413-7\_15},
  doi       = {10.1007/3-540-36413-7\_15},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/AtenieseCMD02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/AtenieseM02,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros},
  title     = {Anonymous E-prescriptions},
  booktitle = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2002, Washington, DC, USA, November 21, 2002},
  pages     = {19--31},
  year      = {2002},
  crossref  = {DBLP:conf/wpes/2002},
  url       = {https://doi.org/10.1145/644527.644530},
  doi       = {10.1145/644527.644530},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/AtenieseM02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM02,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros},
  title     = {Efficient Group Signatures without Trapdoors},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {173},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/173},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseM02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AtenieseBSS01,
  author    = {Giuseppe Ateniese and
               Carlo Blundo and
               Alfredo De Santis and
               Douglas R. Stinson},
  title     = {Extended capabilities for visual cryptography},
  journal   = {Theor. Comput. Sci.},
  volume    = {250},
  number    = {1-2},
  pages     = {143--161},
  year      = {2001},
  url       = {https://doi.org/10.1016/S0304-3975(99)00127-9},
  doi       = {10.1016/S0304-3975(99)00127-9},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/AtenieseBSS01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseM01,
  author    = {Giuseppe Ateniese and
               Stefan Mangard},
  title     = {A new approach to {DNS} security {(DNSSEC)}},
  booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
               Communications Security, Philadelphia, Pennsylvania, USA, November
               6-8, 2001.},
  pages     = {86--95},
  year      = {2001},
  crossref  = {DBLP:conf/ccs/2001},
  url       = {https://doi.org/10.1145/501983.501996},
  doi       = {10.1145/501983.501996},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseM01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseMG01,
  author    = {Giuseppe Ateniese and
               Breno de Medeiros and
               Michael T. Goodrich},
  title     = {{TRICERT:} {A} Distributed Certified E-Mail Scheme},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2001, San Diego, California, {USA}},
  year      = {2001},
  crossref  = {DBLP:conf/ndss/2001},
  url       = {http://www.isoc.org/isoc/conferences/ndss/01/2001/papers/ateniese.pdf},
  timestamp = {Wed, 15 Dec 2004 13:45:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/AtenieseMG01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseST01,
  author    = {Giuseppe Ateniese and
               Dawn Song and
               Gene Tsudik},
  title     = {Quasi-Efficient Revocation of Group Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2001},
  pages     = {101},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/101},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseST01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/AtenieseST00,
  author    = {Giuseppe Ateniese and
               Michael Steiner and
               Gene Tsudik},
  title     = {New multiparty authentication services and key agreement protocols},
  journal   = {{IEEE} Journal on Selected Areas in Communications},
  volume    = {18},
  number    = {4},
  pages     = {628--639},
  year      = {2000},
  url       = {https://doi.org/10.1109/49.839937},
  doi       = {10.1109/49.839937},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jsac/AtenieseST00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AtenieseCJT00,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  title     = {A Practical and Provably Secure Coalition-Resistant Group Signature
               Scheme},
  booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  pages     = {255--270},
  year      = {2000},
  crossref  = {DBLP:conf/crypto/2000},
  url       = {https://doi.org/10.1007/3-540-44598-6\_16},
  doi       = {10.1007/3-540-44598-6\_16},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AtenieseCJT00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/StantonAHAKNSST00,
  author    = {Jonathan Robert Stanton and
               Yair Amir and
               Damian Hasse and
               Giuseppe Ateniese and
               Yongdae Kim and
               Cristina Nita{-}Rotaru and
               Theo Schlossnagle and
               John L. Schultz and
               Gene Tsudik},
  title     = {Secure Group Communication in Asynchronous Networks with Failures:
               Integration and Experiments},
  booktitle = {Proceedings of the 20th International Conference on Distributed Computing
               Systems, Taipei, Taiwan, April 10-13, 2000},
  pages     = {330--343},
  year      = {2000},
  crossref  = {DBLP:conf/icdcs/2000},
  url       = {https://doi.org/10.1109/ICDCS.2000.840945},
  doi       = {10.1109/ICDCS.2000.840945},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/StantonAHAKNSST00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AtenieseHKT99,
  author    = {Giuseppe Ateniese and
               Amir Herzberg and
               Hugo Krawczyk and
               Gene Tsudik},
  title     = {Untraceable mobility or how to travel incognito},
  journal   = {Computer Networks},
  volume    = {31},
  number    = {8},
  pages     = {871--884},
  year      = {1999},
  url       = {https://doi.org/10.1016/S1389-1286(98)00021-8},
  doi       = {10.1016/S1389-1286(98)00021-8},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/AtenieseHKT99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ateniese99,
  author    = {Giuseppe Ateniese},
  title     = {Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures},
  booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
               Communications Security, Singapore, November 1-4, 1999.},
  pages     = {138--146},
  year      = {1999},
  crossref  = {DBLP:conf/ccs/1999},
  url       = {https://doi.org/10.1145/319709.319728},
  doi       = {10.1145/319709.319728},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Ateniese99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtenieseT99,
  author    = {Giuseppe Ateniese and
               Gene Tsudik},
  title     = {Some Open Issues and New Directions in Group Signatures},
  booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  pages     = {196--211},
  year      = {1999},
  crossref  = {DBLP:conf/fc/1999},
  url       = {https://doi.org/10.1007/3-540-48390-X\_15},
  doi       = {10.1007/3-540-48390-X\_15},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/AtenieseT99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/AtenieseT99,
  author    = {Giuseppe Ateniese and
               Gene Tsudik},
  title     = {Group Signatures \emph{{\'{A}} la carte}},
  booktitle = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
               17-19 January 1999, Baltimore, Maryland, {USA.}},
  pages     = {848--849},
  year      = {1999},
  crossref  = {DBLP:conf/soda/1999},
  url       = {http://dl.acm.org/citation.cfm?id=314500.314964},
  timestamp = {Thu, 05 Jul 2018 07:29:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soda/AtenieseT99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseST98,
  author    = {Giuseppe Ateniese and
               Michael Steiner and
               Gene Tsudik},
  title     = {Authenticated Group Key Agreement and Friends},
  booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
               Communications Security, San Francisco, CA, USA, November 3-5, 1998.},
  pages     = {17--26},
  year      = {1998},
  crossref  = {DBLP:conf/ccs/1998},
  url       = {https://doi.org/10.1145/288090.288097},
  doi       = {10.1145/288090.288097},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseST98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AtenieseBSS96,
  author    = {Giuseppe Ateniese and
               Carlo Blundo and
               Alfredo De Santis and
               Douglas R. Stinson},
  title     = {Visual Cryptography for General Access Structures},
  journal   = {Inf. Comput.},
  volume    = {129},
  number    = {2},
  pages     = {86--106},
  year      = {1996},
  url       = {https://doi.org/10.1006/inco.1996.0076},
  doi       = {10.1006/inco.1996.0076},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iandc/AtenieseBSS96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AtenieseBSS96,
  author    = {Giuseppe Ateniese and
               Carlo Blundo and
               Alfredo De Santis and
               Douglas R. Stinson},
  title     = {Constructions and Bounds for Visual Cryptography},
  booktitle = {Automata, Languages and Programming, 23rd International Colloquium,
               ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings},
  pages     = {416--428},
  year      = {1996},
  crossref  = {DBLP:conf/icalp/1996},
  url       = {https://doi.org/10.1007/3-540-61440-0\_147},
  doi       = {10.1007/3-540-61440-0\_147},
  timestamp = {Mon, 22 May 2017 16:14:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/AtenieseBSS96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR96-012,
  author    = {Giuseppe Ateniese and
               Carlo Blundo and
               Alfredo De Santis and
               Douglas R. Stinson},
  title     = {Visual Cryptography for General Access Structures},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {3},
  number    = {12},
  year      = {1996},
  url       = {http://eccc.hpi-web.de/eccc-reports/1996/TR96-012/index.html},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/ECCC-TR96-012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2018,
  editor    = {Debrup Chakraborty and
               Tetsu Iwata},
  title     = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference
               on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11356},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05378-9},
  doi       = {10.1007/978-3-030-05378-9},
  isbn      = {978-3-030-05377-2},
  timestamp = {Thu, 06 Dec 2018 12:20:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2018,
  editor    = {Joonsang Baek and
               Willy Susilo and
               Jongkil Kim},
  title     = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
               South Korea, October 25-28, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11192},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01446-9},
  doi       = {10.1007/978-3-030-01446-9},
  isbn      = {978-3-030-01445-2},
  timestamp = {Thu, 11 Oct 2018 15:07:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2017,
  editor    = {Dieter Gollmann and
               Atsuko Miyaji and
               Hiroaki Kikuchi},
  title     = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10355},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1},
  doi       = {10.1007/978-3-319-61204-1},
  isbn      = {978-3-319-61203-4},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2017,
  title     = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7961955},
  isbn      = {978-1-5090-5762-7},
  timestamp = {Wed, 12 Jul 2017 09:52:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vtc/2017s,
  title     = {85th {IEEE} Vehicular Technology Conference, {VTC} Spring 2017, Sydney,
               Australia, June 4-7, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8106913},
  isbn      = {978-1-5090-5932-4},
  timestamp = {Wed, 22 Nov 2017 15:08:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vtc/2017s},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2016-1,
  editor    = {Chen{-}Mou Cheng and
               Kai{-}Min Chung and
               Giuseppe Persiano and
               Bo{-}Yin Yang},
  title     = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9614},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49384-7},
  doi       = {10.1007/978-3-662-49384-7},
  isbn      = {978-3-662-49383-0},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015scc,
  editor    = {Feng Bao and
               Steven Miller and
               Sherman S. M. Chow and
               Danfeng Yao},
  title     = {Proceedings of the 3rd International Workshop on Security in Cloud
               Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
               14, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2732516},
  doi       = {10.1145/2732516},
  isbn      = {978-1-4503-3447-1},
  timestamp = {Tue, 06 Nov 2018 11:07:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015scc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Wed, 11 Apr 2018 11:09:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2015,
  editor    = {Jens Groth},
  title     = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
               2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9496},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27239-9},
  doi       = {10.1007/978-3-319-27239-9},
  isbn      = {978-3-319-27238-2},
  timestamp = {Sun, 04 Jun 2017 10:06:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2015,
  editor    = {Meikang Qiu and
               Shouhuai Xu and
               Moti Yung and
               Haibo Zhang},
  title     = {Network and System Security - 9th International Conference, {NSS}
               2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9408},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-25645-0},
  doi       = {10.1007/978-3-319-25645-0},
  isbn      = {978-3-319-25644-3},
  timestamp = {Wed, 17 May 2017 14:24:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2014,
  editor    = {Ioana Boureanu and
               Philippe Owesarski and
               Serge Vaudenay},
  title     = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8479},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5},
  doi       = {10.1007/978-3-319-07536-5},
  isbn      = {978-3-319-07535-8},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2014,
  title     = {{IEEE} 34th International Conference on Distributed Computing Systems,
               {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6888815},
  isbn      = {978-1-4799-5168-0},
  timestamp = {Thu, 11 Dec 2014 17:34:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2014,
  title     = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
               Toronto, Canada, April 27 - May 2, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6839150},
  isbn      = {978-14799-3360-0},
  timestamp = {Fri, 19 Dec 2014 14:04:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2014,
  editor    = {Sherman S. M. Chow and
               Jan Camenisch and
               Lucas Chi Kwong Hui and
               Siu{-}Ming Yiu},
  title     = {Information Security - 17th International Conference, {ISC} 2014,
               Hong Kong, China, October 12-14, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8783},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13257-0},
  doi       = {10.1007/978-3-319-13257-0},
  isbn      = {978-3-319-13256-3},
  timestamp = {Fri, 02 Nov 2018 09:37:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2014,
  editor    = {Michel Abdalla and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8642},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10879-7},
  doi       = {10.1007/978-3-319-10879-7},
  isbn      = {978-3-319-10878-0},
  timestamp = {Sat, 16 Sep 2017 12:10:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2013,
  title     = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  publisher = {The Internet Society},
  year      = {2013},
  url       = {https://www.ndss-symposium.org/ndss2013/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012ccsw,
  editor    = {Ting Yu and
               Srdjan Capkun and
               Seny Kamara},
  title     = {Proceedings of the 2012 {ACM} Workshop on Cloud computing security,
               {CCSW} 2012, Raleigh, NC, USA, October 19, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2381913},
  isbn      = {978-1-4503-1665-1},
  timestamp = {Fri, 28 Jun 2013 18:32:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
  editor    = {Mark Dermot Ryan and
               Ben Smyth and
               Guilin Wang},
  title     = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7232},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2},
  doi       = {10.1007/978-3-642-29101-2},
  isbn      = {978-3-642-29100-5},
  timestamp = {Sun, 21 May 2017 00:18:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sss/2012,
  editor    = {Andr{\'{e}}a W. Richa and
               Christian Scheideler},
  title     = {Stabilization, Safety, and Security of Distributed Systems - 14th
               International Symposium, {SSS} 2012, Toronto, Canada, October 1-4,
               2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7596},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33536-5},
  doi       = {10.1007/978-3-642-33536-5},
  isbn      = {978-3-642-33535-8},
  timestamp = {Thu, 25 May 2017 00:40:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sss/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2011,
  editor    = {Dario Catalano and
               Nelly Fazio and
               Rosario Gennaro and
               Antonio Nicolosi},
  title     = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
               on Practice and Theory in Public Key Cryptography, Taormina, Italy,
               March 6-9, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6571},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19379-8},
  doi       = {10.1007/978-3-642-19379-8},
  isbn      = {978-3-642-19378-1},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010ccsw,
  editor    = {Adrian Perrig and
               Radu Sion},
  title     = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
               2010, Chicago, IL, USA, October 8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1866835},
  isbn      = {978-1-4503-0089-6},
  timestamp = {Wed, 25 Jan 2012 19:28:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2010ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2010,
  editor    = {Ehab Al{-}Shaer and
               Keith B. Frikken},
  title     = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0096-4},
  timestamp = {Fri, 04 Feb 2011 17:20:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor    = {Mitsuru Matsui},
  title     = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5912},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7},
  doi       = {10.1007/978-3-642-10366-7},
  isbn      = {978-3-642-10365-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2009,
  editor    = {Marc Fischlin},
  title     = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
               the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5473},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00862-7},
  doi       = {10.1007/978-3-642-00862-7},
  isbn      = {978-3-642-00861-0},
  timestamp = {Sat, 24 Nov 2018 11:59:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2008,
  title     = {28th {IEEE} International Conference on Distributed Computing Systems
               {(ICDCS} 2008), 17-20 June 2008, Beijing, China},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4595849},
  isbn      = {978-0-7695-3172-4},
  timestamp = {Thu, 11 Dec 2014 17:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2008,
  editor    = {Albert Levi and
               Peng Liu and
               Refik Molva},
  title     = {4th International {ICST} Conference on Security and Privacy in Communication
               Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/1460877},
  doi       = {10.1145/1460877},
  isbn      = {978-1-60558-241-2},
  timestamp = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2007,
  editor    = {Jonathan Katz and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, 5th International Conference,
               {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4521},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72738-5},
  doi       = {10.1007/978-3-540-72738-5},
  isbn      = {978-3-540-72737-8},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007,
  editor    = {Peng Ning and
               Sabrina De Capitani di Vimercati and
               Paul F. Syverson},
  title     = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
               Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-703-2},
  timestamp = {Fri, 22 Feb 2008 08:21:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fast/2007,
  editor    = {Andrea C. Arpaci{-}Dusseau and
               Remzi H. Arpaci{-}Dusseau},
  title     = {5th {USENIX} Conference on File and Storage Technologies, {FAST} 2007,
               February 13-16, 2007, San Jose, CA, {USA}},
  publisher = {{USENIX}},
  year      = {2007},
  timestamp = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fast/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2007,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
               2007},
  publisher = {The Internet Society},
  year      = {2007},
  timestamp = {Thu, 16 Apr 2009 21:25:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006usa,
  editor    = {Ari Juels and
               Rebecca N. Wright and
               Sabrina De Capitani di Vimercati},
  title     = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  publisher = {{ACM}},
  year      = {2006},
  timestamp = {Mon, 11 Dec 2006 11:03:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2006usa},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2005,
  editor    = {Yvo Desmedt and
               Huaxiong Wang and
               Yi Mu and
               Yongqing Li},
  title     = {Cryptology and Network Security, 4th International Conference, {CANS}
               2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3810},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11599371},
  doi       = {10.1007/11599371},
  isbn      = {3-540-30849-0},
  timestamp = {Mon, 24 Sep 2018 12:27:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005,
  editor    = {Vijay Atluri and
               Catherine A. Meadows and
               Ari Juels},
  title     = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-226-7},
  timestamp = {Mon, 14 Mar 2016 15:38:52 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2005,
  editor    = {Sabrina De Capitani di Vimercati and
               Paul F. Syverson and
               Dieter Gollmann},
  title     = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
               in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3679},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11555827},
  doi       = {10.1007/11555827},
  isbn      = {3-540-28963-1},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2005,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2005, San Diego, California, {USA}},
  publisher = {The Internet Society},
  year      = {2005},
  isbn      = {1-891562-20-7},
  timestamp = {Thu, 23 Feb 2006 15:03:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/storagess/2005,
  editor    = {Vijay Atluri and
               Pierangela Samarati and
               William Yurcik and
               Larry Brumbaugh and
               Yuanyuan Zhou},
  title     = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability,
               StorageSS 2005, Fairfax, VA, USA, November 11, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-233-X},
  timestamp = {Mon, 23 Oct 2017 16:58:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/storagess/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2004,
  editor    = {Ari Juels},
  title     = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
               West, FL, USA, February 9-12, 2004. Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3110},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98935},
  doi       = {10.1007/b98935},
  isbn      = {3-540-22420-3},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwia/2004,
  editor    = {John L. Cole and
               Stephen D. Wolthusen},
  title     = {Proceedings of the Second {IEEE} International Workshop on Information
               Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9053},
  isbn      = {0-7695-2117-7},
  timestamp = {Wed, 15 Oct 2014 17:03:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwia/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2004,
  editor    = {Carlo Blundo and
               Stelvio Cimato},
  title     = {Security in Communication Networks, 4th International Conference,
               {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3352},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b105083},
  doi       = {10.1007/b105083},
  isbn      = {3-540-24301-1},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2003,
  editor    = {Chi{-}Sung Laih},
  title     = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2894},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b94617},
  doi       = {10.1007/b94617},
  isbn      = {3-540-20592-6},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2002,
  editor    = {Bart Preneel},
  title     = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
               the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2271},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45760-7},
  doi       = {10.1007/3-540-45760-7},
  isbn      = {3-540-43224-8},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2002,
  editor    = {Matt Blaze},
  title     = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
               Bermuda, March 11-14, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2357},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36504-4},
  doi       = {10.1007/3-540-36504-4},
  isbn      = {3-540-00646-X},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2002,
  editor    = {Stelvio Cimato and
               Clemente Galdi and
               Giuseppe Persiano},
  title     = {Security in Communication Networks, Third International Conference,
               {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2576},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36413-7},
  doi       = {10.1007/3-540-36413-7},
  isbn      = {3-540-00420-3},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2002,
  editor    = {Sushil Jajodia and
               Pierangela Samarati},
  title     = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2002, Washington, DC, USA, November 21, 2002},
  publisher = {{ACM}},
  year      = {2002},
  isbn      = {1-58113-633-1},
  timestamp = {Wed, 16 Feb 2005 14:48:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001,
  editor    = {Michael K. Reiter and
               Pierangela Samarati},
  title     = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
               Communications Security, Philadelphia, Pennsylvania, USA, November
               6-8, 2001},
  publisher = {{ACM}},
  year      = {2001},
  url       = {http://dl.acm.org/citation.cfm?id=501983},
  isbn      = {1-58113-385-5},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2001,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2001, San Diego, California, {USA}},
  publisher = {The Internet Society},
  year      = {2001},
  isbn      = {1-891562-10-X},
  timestamp = {Wed, 15 Dec 2004 13:45:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2000,
  editor    = {Mihir Bellare},
  title     = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1880},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44598-6},
  doi       = {10.1007/3-540-44598-6},
  isbn      = {3-540-67907-3},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2000,
  title     = {Proceedings of the 20th International Conference on Distributed Computing
               Systems, Taipei, Taiwan, April 10-13, 2000},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6782},
  isbn      = {0-7695-0601-1},
  timestamp = {Thu, 11 Dec 2014 17:34:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1999,
  editor    = {Juzar Motiwalla and
               Gene Tsudik},
  title     = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
               Communications Security, Singapore, November 1-4, 1999},
  publisher = {{ACM}},
  year      = {1999},
  url       = {http://dl.acm.org/citation.cfm?id=319709},
  isbn      = {1-58113-148-8},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/1999,
  editor    = {Matthew K. Franklin},
  title     = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1648},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48390-X},
  doi       = {10.1007/3-540-48390-X},
  isbn      = {3-540-66362-2},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soda/1999,
  editor    = {Robert Endre Tarjan and
               Tandy J. Warnow},
  title     = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
               17-19 January 1999, Baltimore, Maryland, {USA}},
  publisher = {{ACM/SIAM}},
  year      = {1999},
  url       = {http://dl.acm.org/citation.cfm?id=314500},
  isbn      = {0-89871-434-6},
  timestamp = {Thu, 05 Jul 2018 07:29:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soda/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1998,
  editor    = {Li Gong and
               Michael K. Reiter},
  title     = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
               Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  publisher = {{ACM}},
  year      = {1998},
  url       = {http://dl.acm.org/citation.cfm?id=288090},
  isbn      = {1-58113-007-4},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/1996,
  editor    = {Friedhelm {Meyer auf der Heide} and
               Burkhard Monien},
  title     = {Automata, Languages and Programming, 23rd International Colloquium,
               ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1099},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-61440-0},
  doi       = {10.1007/3-540-61440-0},
  isbn      = {3-540-61440-0},
  timestamp = {Mon, 22 May 2017 16:14:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier