Search dblp for Publications

export results for "toc:db/conf/scn/scn2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/scn/0002P14,
  author       = {Abhishek Jain and
                  Omkant Pandey},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional
                  Relationships},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {435--454},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_25},
  doi          = {10.1007/978-3-319-10879-7\_25},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/0002P14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AlwenHMPR14,
  author       = {Jo{\"{e}}l Alwen and
                  Martin Hirt and
                  Ueli Maurer and
                  Arpita Patra and
                  Pavel Raykov},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Key-Indistinguishable Message Authentication Codes},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {476--493},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_27},
  doi          = {10.1007/978-3-319-10879-7\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AlwenHMPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseBFG14,
  author       = {Giuseppe Ateniese and
                  Ilario Bonacina and
                  Antonio Faonio and
                  Nicola Galesi},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Proofs of Space: When Space Is of the Essence},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {538--557},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_31},
  doi          = {10.1007/978-3-319-10879-7\_31},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AtenieseBFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaileyDP14,
  author       = {Daniel V. Bailey and
                  Markus D{\"{u}}rmuth and
                  Christof Paar},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Statistics on Password Re-use and Adaptive Strength for Financial
                  Accounts},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {218--235},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_13},
  doi          = {10.1007/978-3-319-10879-7\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaileyDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaumDO14,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Publicly Auditable Secure Multi-Party Computation},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {175--196},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_11},
  doi          = {10.1007/978-3-319-10879-7\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/BaumDO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CanettiKRV14,
  author       = {Ran Canetti and
                  Vladimir Kolesnikov and
                  Charles Rackoff and
                  Yevgeniy Vahlis},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Secure Key Exchange and Sessions without Credentials},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_3},
  doi          = {10.1007/978-3-319-10879-7\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CanettiKRV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Catalano14,
  author       = {Dario Catalano},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Homomorphic Signatures and Message Authentication Codes},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {514--519},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_29},
  doi          = {10.1007/978-3-319-10879-7\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Catalano14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChenW14,
  author       = {Jie Chen and
                  Hoeteck Wee},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Semi-adaptive Attribute-Based Encryption and Improved Delegation for
                  Boolean Formula},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {277--297},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_16},
  doi          = {10.1007/978-3-319-10879-7\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChenW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChenZ14,
  author       = {Yu Chen and
                  Zongyang Zhang},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Publicly Evaluable Pseudorandom Functions and Their Applications},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_8},
  doi          = {10.1007/978-3-319-10879-7\_8},
  timestamp    = {Thu, 10 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChenZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChoudhuryPS14,
  author       = {Ashish Choudhury and
                  Arpita Patra and
                  Nigel P. Smart},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Reducing the Overhead of {MPC} over a Large Population},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {197--217},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_12},
  doi          = {10.1007/978-3-319-10879-7\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChoudhuryPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DamgardLT14,
  author       = {Ivan Damg{\aa}rd and
                  Rasmus Lauritsen and
                  Tomas Toft},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {An Empirical Study and Some Improvements of the MiniMac Protocol for
                  Secure Computation},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {398--415},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_23},
  doi          = {10.1007/978-3-319-10879-7\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DamgardLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DodisF14,
  author       = {Yevgeniy Dodis and
                  Dario Fiore},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Interactive Encryption and Message Authentication},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {494--513},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_28},
  doi          = {10.1007/978-3-319-10879-7\_28},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DodisF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ForteGJV14,
  author       = {Andrea G. Forte and
                  Juan A. Garay and
                  Trevor Jim and
                  Yevgeniy Vahlis},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {EyeDecrypt - Private Interactions in Plain Sight},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {255--276},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_15},
  doi          = {10.1007/978-3-319-10879-7\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ForteGJV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FrederiksenJN14,
  author       = {Tore Kasper Frederiksen and
                  Thomas P. Jakobsen and
                  Jesper Buus Nielsen},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Faster Maliciously Secure Two-Party Computation Using the {GPU}},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {358--379},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_21},
  doi          = {10.1007/978-3-319-10879-7\_21},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/FrederiksenJN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FreireHH14,
  author       = {Eduarda S. V. Freire and
                  Julia Hesse and
                  Dennis Hofheinz},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Universally Composable Non-Interactive Key Exchange},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_1},
  doi          = {10.1007/978-3-319-10879-7\_1},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/FreireHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Fuchsbauer14,
  author       = {Georg Fuchsbauer},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Constrained Verifiable Random Functions},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {95--114},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_7},
  doi          = {10.1007/978-3-319-10879-7\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Fuchsbauer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Garg14,
  author       = {Sanjam Garg},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Program Obfuscation via Multilinear Maps},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {91--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_6},
  doi          = {10.1007/978-3-319-10879-7\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Garg14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GiuraKTV14,
  author       = {Paul Giura and
                  Vladimir Kolesnikov and
                  Aris Tentes and
                  Yevgeniy Vahlis},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Efficient Network-Based Enforcement of Data Access Rights},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {236--254},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_14},
  doi          = {10.1007/978-3-319-10879-7\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GiuraKTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KarvelasK14,
  author       = {Nikolaos P. Karvelas and
                  Aggelos Kiayias},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Efficient Proofs of Secure Erasure},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {520--537},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_30},
  doi          = {10.1007/978-3-319-10879-7\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KarvelasK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LampkinsO14,
  author       = {Joshua Lampkins and
                  Rafail Ostrovsky},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Communication-Efficient {MPC} for General Adversary Structures},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_10},
  doi          = {10.1007/978-3-319-10879-7\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/LampkinsO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Lipmaa14,
  author       = {Helger Lipmaa},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Efficient {NIZK} Arguments via Parallel Verification of Benes Networks},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {416--434},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_24},
  doi          = {10.1007/978-3-319-10879-7\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Lipmaa14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Makriyannis14,
  author       = {Nikolaos Makriyannis},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {On the Classification of Finite Boolean Functions up to Fairness},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {135--154},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_9},
  doi          = {10.1007/978-3-319-10879-7\_9},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Makriyannis14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/MarcedoneO14,
  author       = {Antonio Marcedone and
                  Claudio Orlandi},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Obfuscation {\(\Rightarrow\)} {(IND-CPA} Security !{\(\Rightarrow\)}
                  Circular Security)},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {77--90},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_5},
  doi          = {10.1007/978-3-319-10879-7\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/MarcedoneO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NaccacheSCY14,
  author       = {David Naccache and
                  Rainer Steinwandt and
                  Adriana Su{\'{a}}rez Corona and
                  Moti Yung},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {598--607},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_34},
  doi          = {10.1007/978-3-319-10879-7\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NaccacheSCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NaitoO14,
  author       = {Yusuke Naito and
                  Kazuo Ohta},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Improved Indifferentiable Security Analysis of {PHOTON}},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {340--357},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_20},
  doi          = {10.1007/978-3-319-10879-7\_20},
  timestamp    = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NaitoO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/OstrovskyRV14,
  author       = {Rafail Ostrovsky and
                  Vanishree Rao and
                  Ivan Visconti},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {On Selective-Opening Attacks against Encryption Schemes},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {578--597},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_33},
  doi          = {10.1007/978-3-319-10879-7\_33},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/OstrovskyRV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PandeyRW14,
  author       = {Omkant Pandey and
                  Kim Ramchen and
                  Brent Waters},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Relaxed Two-to-One Recoding Schemes},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_4},
  doi          = {10.1007/978-3-319-10879-7\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PandeyRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PerryGFW14,
  author       = {Jason Perry and
                  Debayan Gupta and
                  Joan Feigenbaum and
                  Rebecca N. Wright},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Systematizing Secure Computation for Research and Decision Support},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {380--397},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_22},
  doi          = {10.1007/978-3-319-10879-7\_22},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PerryGFW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PointchevalS14,
  author       = {David Pointcheval and
                  Olivier Sanders},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Forward Secure Non-Interactive Key Exchange},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_2},
  doi          = {10.1007/978-3-319-10879-7\_2},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/PointchevalS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/SasakiW14,
  author       = {Yu Sasaki and
                  Lei Wang},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Generic Attacks on Strengthened {HMAC:} n-bit Secure {HMAC} Requires
                  Key in All Blocks},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {324--339},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_19},
  doi          = {10.1007/978-3-319-10879-7\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/SasakiW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Takashima14,
  author       = {Katsuyuki Takashima},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Expressive Attribute-Based Encryption with Constant-Size Ciphertexts
                  from the Decisional Linear Assumption},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {298--317},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_17},
  doi          = {10.1007/978-3-319-10879-7\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Takashima14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Venkitasubramaniam14,
  author       = {Muthuramakrishnan Venkitasubramaniam},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {On Adaptively Secure Protocols},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {455--475},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_26},
  doi          = {10.1007/978-3-319-10879-7\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Venkitasubramaniam14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Wee14,
  author       = {Hoeteck Wee},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Functional Encryption and Its Impact on Cryptography},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {318--323},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_18},
  doi          = {10.1007/978-3-319-10879-7\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Wee14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Yamakawa0NHK14,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Koji Nuida and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Chosen Ciphertext Security on Hard Membership Decision Groups: The
                  Case of Semi-smooth Subgroups of Quadratic Residues},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {558--577},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_32},
  doi          = {10.1007/978-3-319-10879-7\_32},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Yamakawa0NHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2014,
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7},
  doi          = {10.1007/978-3-319-10879-7},
  isbn         = {978-3-319-10878-0},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics