Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acns/acns2016.bht:"
@inproceedings{DBLP:conf/acns/0002ES16, author = {Ryan Johnson and Mohamed Elsabagh and Angelos Stavrou}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {193--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_11}, doi = {10.1007/978-3-319-39555-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/0002ES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/0002TMH16, author = {Takahiro Matsuda and Kenta Takahashi and Takao Murakami and Goichiro Hanaoka}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Fuzzy Signatures: Relaxing Requirements and a New Construction}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {97--116}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_6}, doi = {10.1007/978-3-319-39555-5\_6}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/0002TMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbusalahF16, author = {Hamza Abusalah and Georg Fuchsbauer}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Constrained PRFs for Unbounded Inputs with Short Keys}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {445--463}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_24}, doi = {10.1007/978-3-319-39555-5\_24}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AbusalahF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbusalahFP16, author = {Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Offline Witness Encryption}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {285--303}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_16}, doi = {10.1007/978-3-319-39555-5\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AbusalahFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AltFMOR16, author = {St{\'{e}}phanie Alt and Pierre{-}Alain Fouque and Gilles Macario{-}Rat and Cristina Onete and Benjamin Richard}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {A Cryptographic Analysis of {UMTS/LTE} {AKA}}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {18--35}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_2}, doi = {10.1007/978-3-319-39555-5\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AltFMOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AndoGPS16, author = {Megumi Ando and Joshua D. Guttman and Alberto R. Papaleo and John Scire}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Hash-Based {TPM} Signatures for the Quantum World}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {77--94}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_5}, doi = {10.1007/978-3-319-39555-5\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AndoGPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AttrapadungHMT016, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Tsutomu Matsumoto and Tadanori Teruya and Shota Yamada}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Attribute Based Encryption with Direct Efficiency Tradeoff}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {249--266}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_14}, doi = {10.1007/978-3-319-39555-5\_14}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AttrapadungHMT016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaumDTZ16, author = {Carsten Baum and Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Better Preprocessing for Secure Multiparty Computation}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {327--345}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_18}, doi = {10.1007/978-3-319-39555-5\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaumDTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BiryukovDG16, author = {Alex Biryukov and Daniel Dinu and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {537--557}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_29}, doi = {10.1007/978-3-319-39555-5\_29}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BiryukovDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BlackburnR16, author = {Simon R. Blackburn and Matthew J. B. Robshaw}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {On the Security of the Algebraic Eraser Tag Authentication Protocol}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_1}, doi = {10.1007/978-3-319-39555-5\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BlackburnR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BootleCCGG16, author = {Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Foundations of Fully Dynamic Group Signatures}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {117--136}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_7}, doi = {10.1007/978-3-319-39555-5\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BootleCCGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BoyenL16, author = {Xavier Boyen and Qinyi Li}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {267--284}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_15}, doi = {10.1007/978-3-319-39555-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BoyenL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChauhanAMK16, author = {Jagmohan Chauhan and Hassan Jameel Asghar and Anirban Mahanti and Mohamed Ali K{\^{a}}afar}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {648--665}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_35}, doi = {10.1007/978-3-319-39555-5\_35}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ChauhanAMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ContiGS16, author = {Mauro Conti and Claudio Guarisco and Riccardo Spolaor}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {CAPTCHaStar! {A} Novel {CAPTCHA} Based on Interactive Shape Discovery}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {611--628}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_33}, doi = {10.1007/978-3-319-39555-5\_33}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ContiGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CuvelierP16, author = {Edouard Cuvelier and Olivier Pereira}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Verifiable Multi-party Computation with Perfectly Private Audit Trail}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {367--385}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_20}, doi = {10.1007/978-3-319-39555-5\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CuvelierP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Square Attack on 7-Round Kiasu-BC}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {500--517}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_27}, doi = {10.1007/978-3-319-39555-5\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FerradiGMNP16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and David Pointcheval}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Legally Fair Contract Signing Without Keystones}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {175--190}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_10}, doi = {10.1007/978-3-319-39555-5\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FerradiGMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GennaroGN16, author = {Rosario Gennaro and Steven Goldfeder and Arvind Narayanan}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Threshold-Optimal {DSA/ECDSA} Signatures and an Application to Bitcoin Wallet Security}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {156--174}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_9}, doi = {10.1007/978-3-319-39555-5\_9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GennaroGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GoldbergJS16, author = {Ian Goldberg and Graeme Jenkinson and Frank Stajano}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {36--57}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_3}, doi = {10.1007/978-3-319-39555-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GoldbergJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GonzalezR16, author = {Alonso Gonz{\'{a}}lez and Carla R{\`{a}}fols}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {New Techniques for Non-interactive Shuffle and Range Arguments}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {427--444}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_23}, doi = {10.1007/978-3-319-39555-5\_23}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GonzalezR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GougeonBLAR16, author = {Thomas Gougeon and Morgan Barbier and Patrick Lacharme and Gildas Avoine and Christophe Rosenberger}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Memory Carving in Embedded Devices: Separate the Wheat from the Chaff}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {592--608}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_32}, doi = {10.1007/978-3-319-39555-5\_32}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GougeonBLAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GriningKS16, author = {Krzysztof Grining and Marek Klonowski and Piotr Syga}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Practical Fault-Tolerant Data Aggregation}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {386--404}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_21}, doi = {10.1007/978-3-319-39555-5\_21}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GriningKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JaschkeA16, author = {Angela J{\"{a}}schke and Frederik Armknecht}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Accelerating Homomorphic Computations on Rational Numbers}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {405--423}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_22}, doi = {10.1007/978-3-319-39555-5\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/JaschkeA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Kirshanova0W16, author = {Elena Kirshanova and Alexander May and Friedrich Wiemer}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Parallel Implementation of {BDD} Enumeration for {LWE}}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {580--591}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_31}, doi = {10.1007/978-3-319-39555-5\_31}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Kirshanova0W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KondoSI16, author = {Kota Kondo and Yu Sasaki and Tetsu Iwata}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {518--536}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_28}, doi = {10.1007/978-3-319-39555-5\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KondoSI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KoppulaPRW16, author = {Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Deterministic Public-Key Encryption Under Continual Leakage}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {304--323}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_17}, doi = {10.1007/978-3-319-39555-5\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KoppulaPRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LancrenonST16, author = {Jean Lancrenon and Marjan Skrobot and Qiang Tang}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Two More Efficient Variants of the {J-PAKE} Protocol}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {58--76}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_4}, doi = {10.1007/978-3-319-39555-5\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LancrenonST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LestringantGF16, author = {Pierre Lestringant and Fr{\'{e}}d{\'{e}}ric Guih{\'{e}}ry and Pierre{-}Alain Fouque}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {561--579}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_30}, doi = {10.1007/978-3-319-39555-5\_30}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LestringantGF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LibertMN16, author = {Beno{\^{\i}}t Libert and Fabrice Mouhartem and Khoa Nguyen}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {A Lattice-Based Group Signature Scheme with Message-Dependent Opening}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {137--155}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_8}, doi = {10.1007/978-3-319-39555-5\_8}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LibertMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuWR16, author = {Yunwen Liu and Qingju Wang and Vincent Rijmen}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Automatic Search of Linear Trails in {ARX} with Applications to {SPECK} and Chaskey}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {485--499}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_26}, doi = {10.1007/978-3-319-39555-5\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MengLWZ16, author = {Weizhi Meng and Wenjuan Li and Duncan S. Wong and Jianying Zhou}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {TMGuard: {A} Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {629--647}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_34}, doi = {10.1007/978-3-319-39555-5\_34}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MengLWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NiHCA16, author = {Xiejun Ni and Daojing He and Sammy Chan and Farooq Ahmad}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {212--227}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_12}, doi = {10.1007/978-3-319-39555-5\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NiHCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Ramanna16, author = {Somindu C. Ramanna}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {More Efficient Constructions for Inner-Product Encryption}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {231--248}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_13}, doi = {10.1007/978-3-319-39555-5\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Ramanna16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchoenmakersVV16, author = {Berry Schoenmakers and Meilof Veeningen and Niels de Vreede}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {346--366}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_19}, doi = {10.1007/978-3-319-39555-5\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchoenmakersVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TodoA16, author = {Yosuke Todo and Kazumaro Aoki}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {467--484}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_25}, doi = {10.1007/978-3-319-39555-5\_25}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TodoA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2016, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5}, doi = {10.1007/978-3-319-39555-5}, isbn = {978-3-319-39554-8}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.