Search dblp for Publications

export results for "toc:db/conf/spw/spw96.bht:"

 download as .bib file

@proceedings{DBLP:conf/spw/1996,
  editor       = {T. Mark A. Lomas},
  title        = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-62494-5},
  doi          = {10.1007/3-540-62494-5},
  isbn         = {3-540-62494-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonMS96,
  author       = {Ross J. Anderson and
                  Charalampos Manifavas and
                  Chris Sutherland},
  editor       = {T. Mark A. Lomas},
  title        = {NetCard - {A} Practical Electronic-Cash System},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {49--57},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_4},
  doi          = {10.1007/3-540-62494-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonMS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterD96,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  editor       = {T. Mark A. Lomas},
  title        = {Efficient and Secure Conference-Key Distribution},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {119--129},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_12},
  doi          = {10.1007/3-540-62494-5\_12},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChenGM96,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  editor       = {T. Mark A. Lomas},
  title        = {Key Escrow in Mutually Mistrusting Domains},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {139--153},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_14},
  doi          = {10.1007/3-540-62494-5\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChenGM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonH96,
  author       = {Bruce Christianson and
                  William S. Harbison},
  editor       = {T. Mark A. Lomas},
  title        = {Why Isn't Trust Transitive?},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {171--176},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_16},
  doi          = {10.1007/3-540-62494-5\_16},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChuangG96,
  author       = {Shaw{-}Cheng Chuang and
                  David J. Greaves},
  editor       = {T. Mark A. Lomas},
  title        = {Securing the Residential Asynchronous Transfer Mode Networks},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {177--196},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_17},
  doi          = {10.1007/3-540-62494-5\_17},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChuangG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CramerDP96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Torben P. Pedersen},
  editor       = {T. Mark A. Lomas},
  title        = {Efficient and Provable Security Amplifications},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {101--109},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_9},
  doi          = {10.1007/3-540-62494-5\_9},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CramerDP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CrispoL96,
  author       = {Bruno Crispo and
                  T. Mark A. Lomas},
  editor       = {T. Mark A. Lomas},
  title        = {A Certification Scheme for Electronic Commerce},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_2},
  doi          = {10.1007/3-540-62494-5\_2},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CrispoL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Cusick96,
  author       = {Thomas W. Cusick},
  editor       = {T. Mark A. Lomas},
  title        = {A Comparison of {RSA} and the Naccache-Stern Public-Key Cryptosystem},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {111--116},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_10},
  doi          = {10.1007/3-540-62494-5\_10},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Cusick96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FujisakiO96,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {T. Mark A. Lomas},
  title        = {Practical Escrow Cash System},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_3},
  doi          = {10.1007/3-540-62494-5\_3},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FujisakiO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JoyeQ96,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {T. Mark A. Lomas},
  title        = {Protocol Failures for RSA-Like Functions Using Lucas Sequences and
                  Elliptic Curves},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {93--100},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_8},
  doi          = {10.1007/3-540-62494-5\_8},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JoyeQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Kaliski96,
  author       = {Burton S. Kaliski Jr.},
  editor       = {T. Mark A. Lomas},
  title        = {{IEEE} {P1363:} {A} Standard for RSA, Diffie-Hellman, and Elliptic-Curve
                  Cryptography (Abstract)},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {117--118},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_11},
  doi          = {10.1007/3-540-62494-5\_11},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Kaliski96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LimL96,
  author       = {Chae Hoon Lim and
                  Pil Joong Lee},
  editor       = {T. Mark A. Lomas},
  title        = {Directed Signatures and Application to Threshold Cryptosystems},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {131--138},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_13},
  doi          = {10.1007/3-540-62494-5\_13},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LimL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao96,
  author       = {Wenbo Mao},
  editor       = {T. Mark A. Lomas},
  title        = {On Cryptographic Techniques for On-line Bankcard Payment Transactions
                  Using Open Networks},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_1},
  doi          = {10.1007/3-540-62494-5\_1},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NaorS96,
  author       = {Moni Naor and
                  Adi Shamir},
  editor       = {T. Mark A. Lomas},
  title        = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {197--202},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_18},
  doi          = {10.1007/3-540-62494-5\_18},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NaorS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Pedersen96,
  author       = {Torben P. Pedersen},
  editor       = {T. Mark A. Lomas},
  title        = {Electronic Payments of Small Amounts},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {59--68},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_5},
  doi          = {10.1007/3-540-62494-5\_5},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Pedersen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RivestS96,
  author       = {Ronald L. Rivest and
                  Adi Shamir},
  editor       = {T. Mark A. Lomas},
  title        = {PayWord and MicroMint: Two Simple Micropayment Schemes},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {69--87},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_6},
  doi          = {10.1007/3-540-62494-5\_6},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RivestS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SchneierK96,
  author       = {Bruce Schneier and
                  John Kelsey},
  editor       = {T. Mark A. Lomas},
  title        = {Automatic Event-Stream Notarization Using Digital Signatures},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {155--169},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_15},
  doi          = {10.1007/3-540-62494-5\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/SchneierK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wheeler96,
  author       = {David Wheeler},
  editor       = {T. Mark A. Lomas},
  title        = {Transactions Using Bets},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {89--92},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_7},
  doi          = {10.1007/3-540-62494-5\_7},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wheeler96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics