Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/scn/scn2014.bht:"
@inproceedings{DBLP:conf/scn/0002P14, author = {Abhishek Jain and Omkant Pandey}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {435--454}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_25}, doi = {10.1007/978-3-319-10879-7\_25}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/0002P14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AlwenHMPR14, author = {Jo{\"{e}}l Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Key-Indistinguishable Message Authentication Codes}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {476--493}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_27}, doi = {10.1007/978-3-319-10879-7\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/AlwenHMPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AtenieseBFG14, author = {Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Proofs of Space: When Space Is of the Essence}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {538--557}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_31}, doi = {10.1007/978-3-319-10879-7\_31}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/AtenieseBFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaileyDP14, author = {Daniel V. Bailey and Markus D{\"{u}}rmuth and Christof Paar}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Statistics on Password Re-use and Adaptive Strength for Financial Accounts}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {218--235}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_13}, doi = {10.1007/978-3-319-10879-7\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaileyDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaumDO14, author = {Carsten Baum and Ivan Damg{\aa}rd and Claudio Orlandi}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Publicly Auditable Secure Multi-Party Computation}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {175--196}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_11}, doi = {10.1007/978-3-319-10879-7\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/BaumDO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CanettiKRV14, author = {Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and Yevgeniy Vahlis}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Secure Key Exchange and Sessions without Credentials}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {40--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_3}, doi = {10.1007/978-3-319-10879-7\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CanettiKRV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Catalano14, author = {Dario Catalano}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Homomorphic Signatures and Message Authentication Codes}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {514--519}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_29}, doi = {10.1007/978-3-319-10879-7\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Catalano14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChenW14, author = {Jie Chen and Hoeteck Wee}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {277--297}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_16}, doi = {10.1007/978-3-319-10879-7\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChenW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChenZ14, author = {Yu Chen and Zongyang Zhang}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Publicly Evaluable Pseudorandom Functions and Their Applications}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {115--134}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_8}, doi = {10.1007/978-3-319-10879-7\_8}, timestamp = {Thu, 10 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChenZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChoudhuryPS14, author = {Ashish Choudhury and Arpita Patra and Nigel P. Smart}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Reducing the Overhead of {MPC} over a Large Population}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {197--217}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_12}, doi = {10.1007/978-3-319-10879-7\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChoudhuryPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DamgardLT14, author = {Ivan Damg{\aa}rd and Rasmus Lauritsen and Tomas Toft}, editor = {Michel Abdalla and Roberto De Prisco}, title = {An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {398--415}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_23}, doi = {10.1007/978-3-319-10879-7\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DamgardLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DodisF14, author = {Yevgeniy Dodis and Dario Fiore}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Interactive Encryption and Message Authentication}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {494--513}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_28}, doi = {10.1007/978-3-319-10879-7\_28}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DodisF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ForteGJV14, author = {Andrea G. Forte and Juan A. Garay and Trevor Jim and Yevgeniy Vahlis}, editor = {Michel Abdalla and Roberto De Prisco}, title = {EyeDecrypt - Private Interactions in Plain Sight}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {255--276}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_15}, doi = {10.1007/978-3-319-10879-7\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ForteGJV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FrederiksenJN14, author = {Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Faster Maliciously Secure Two-Party Computation Using the {GPU}}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {358--379}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_21}, doi = {10.1007/978-3-319-10879-7\_21}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/FrederiksenJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FreireHH14, author = {Eduarda S. V. Freire and Julia Hesse and Dennis Hofheinz}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Universally Composable Non-Interactive Key Exchange}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {1--20}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_1}, doi = {10.1007/978-3-319-10879-7\_1}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/FreireHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Fuchsbauer14, author = {Georg Fuchsbauer}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Constrained Verifiable Random Functions}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {95--114}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_7}, doi = {10.1007/978-3-319-10879-7\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Fuchsbauer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Garg14, author = {Sanjam Garg}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Program Obfuscation via Multilinear Maps}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {91--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_6}, doi = {10.1007/978-3-319-10879-7\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Garg14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GiuraKTV14, author = {Paul Giura and Vladimir Kolesnikov and Aris Tentes and Yevgeniy Vahlis}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Efficient Network-Based Enforcement of Data Access Rights}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {236--254}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_14}, doi = {10.1007/978-3-319-10879-7\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/GiuraKTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KarvelasK14, author = {Nikolaos P. Karvelas and Aggelos Kiayias}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Efficient Proofs of Secure Erasure}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {520--537}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_30}, doi = {10.1007/978-3-319-10879-7\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KarvelasK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LampkinsO14, author = {Joshua Lampkins and Rafail Ostrovsky}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Communication-Efficient {MPC} for General Adversary Structures}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {155--174}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_10}, doi = {10.1007/978-3-319-10879-7\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/LampkinsO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Lipmaa14, author = {Helger Lipmaa}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Efficient {NIZK} Arguments via Parallel Verification of Benes Networks}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {416--434}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_24}, doi = {10.1007/978-3-319-10879-7\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Lipmaa14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Makriyannis14, author = {Nikolaos Makriyannis}, editor = {Michel Abdalla and Roberto De Prisco}, title = {On the Classification of Finite Boolean Functions up to Fairness}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {135--154}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_9}, doi = {10.1007/978-3-319-10879-7\_9}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Makriyannis14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/MarcedoneO14, author = {Antonio Marcedone and Claudio Orlandi}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Obfuscation {\(\Rightarrow\)} {(IND-CPA} Security !{\(\Rightarrow\)} Circular Security)}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {77--90}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_5}, doi = {10.1007/978-3-319-10879-7\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/MarcedoneO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NaccacheSCY14, author = {David Naccache and Rainer Steinwandt and Adriana Su{\'{a}}rez Corona and Moti Yung}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {598--607}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_34}, doi = {10.1007/978-3-319-10879-7\_34}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/NaccacheSCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NaitoO14, author = {Yusuke Naito and Kazuo Ohta}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Improved Indifferentiable Security Analysis of {PHOTON}}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {340--357}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_20}, doi = {10.1007/978-3-319-10879-7\_20}, timestamp = {Wed, 13 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/NaitoO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/OstrovskyRV14, author = {Rafail Ostrovsky and Vanishree Rao and Ivan Visconti}, editor = {Michel Abdalla and Roberto De Prisco}, title = {On Selective-Opening Attacks against Encryption Schemes}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {578--597}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_33}, doi = {10.1007/978-3-319-10879-7\_33}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/OstrovskyRV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PandeyRW14, author = {Omkant Pandey and Kim Ramchen and Brent Waters}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Relaxed Two-to-One Recoding Schemes}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {57--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_4}, doi = {10.1007/978-3-319-10879-7\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PandeyRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PerryGFW14, author = {Jason Perry and Debayan Gupta and Joan Feigenbaum and Rebecca N. Wright}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Systematizing Secure Computation for Research and Decision Support}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {380--397}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_22}, doi = {10.1007/978-3-319-10879-7\_22}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PerryGFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PointchevalS14, author = {David Pointcheval and Olivier Sanders}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Forward Secure Non-Interactive Key Exchange}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {21--39}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_2}, doi = {10.1007/978-3-319-10879-7\_2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/PointchevalS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/SasakiW14, author = {Yu Sasaki and Lei Wang}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Generic Attacks on Strengthened {HMAC:} n-bit Secure {HMAC} Requires Key in All Blocks}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {324--339}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_19}, doi = {10.1007/978-3-319-10879-7\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/SasakiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Takashima14, author = {Katsuyuki Takashima}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {298--317}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_17}, doi = {10.1007/978-3-319-10879-7\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Takashima14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Venkitasubramaniam14, author = {Muthuramakrishnan Venkitasubramaniam}, editor = {Michel Abdalla and Roberto De Prisco}, title = {On Adaptively Secure Protocols}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {455--475}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_26}, doi = {10.1007/978-3-319-10879-7\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Venkitasubramaniam14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Wee14, author = {Hoeteck Wee}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Functional Encryption and Its Impact on Cryptography}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {318--323}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_18}, doi = {10.1007/978-3-319-10879-7\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Wee14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Yamakawa0NHK14, author = {Takashi Yamakawa and Shota Yamada and Koji Nuida and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {558--577}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_32}, doi = {10.1007/978-3-319-10879-7\_32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Yamakawa0NHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2014, editor = {Michel Abdalla and Roberto De Prisco}, title = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7}, doi = {10.1007/978-3-319-10879-7}, isbn = {978-3-319-10878-0}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.