Search dblp for Publications

export results for "toc:db/conf/iwsec/iwsec2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwsec/AguessyBBCD16,
  author       = {Fran{\c{c}}ois{-}Xavier Aguessy and
                  Olivier Bettan and
                  Gregory Blanc and
                  Vania Conan and
                  Herv{\'{e}} Debar},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Hybrid Risk Assessment Model Based on Bayesian Networks},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_2},
  doi          = {10.1007/978-3-319-44524-3\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/AguessyBBCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BarenghiP16,
  author       = {Alessandro Barenghi and
                  Gerardo Pelosi},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {A Note on Fault Attacks Against Deterministic Signature Schemes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {182--192},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_11},
  doi          = {10.1007/978-3-319-44524-3\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BarenghiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BeatoHM16,
  author       = {Filipe Beato and
                  Kimmo Halunen and
                  Bart Mennink},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Recipient Privacy in Online Social Networks},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {254--264},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_15},
  doi          = {10.1007/978-3-319-44524-3\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BeatoHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ButinDB16,
  author       = {Denis Butin and
                  Denise Demirel and
                  Johannes Buchmann},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Formal Policy-Based Provenance Audit},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {234--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_14},
  doi          = {10.1007/978-3-319-44524-3\_14},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/ButinDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DingKOTT16,
  author       = {Jintai Ding and
                  Momonari Kudo and
                  Shinya Okumura and
                  Tsuyoshi Takagi and
                  Chengdong Tao},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations
                  via Weighted {LLL} Reduction},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {305--315},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_18},
  doi          = {10.1007/978-3-319-44524-3\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DingKOTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHKMIOSM16,
  author       = {Takato Hirano and
                  Mitsuhiro Hattori and
                  Yutaka Kawai and
                  Nori Matsuda and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Yusuke Sakai and
                  Tatsuji Munaka},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Simple, Secure, and Efficient Searchable Symmetric Encryption with
                  Multiple Encrypted Indexes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {91--110},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_6},
  doi          = {10.1007/978-3-319-44524-3\_6},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HiranoHKMIOSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JeongKPN16,
  author       = {Ji{-}Hoon Jeong and
                  Hyung Chan Kim and
                  Il Hwan Park and
                  Bong{-}Nam Noh},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Hooking Graceful Moments: {A} Security Analysis of Sudo Session Handling},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_3},
  doi          = {10.1007/978-3-319-44524-3\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JeongKPN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KawachiTT16,
  author       = {Akinori Kawachi and
                  Hirotoshi Takebe and
                  Keisuke Tanaka},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Lower Bounds for Key Length of k-wise Almost Independent Permutations
                  and Certain Symmetric-Key Encryption Schemes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_12},
  doi          = {10.1007/978-3-319-44524-3\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KawachiTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KudoYGY16,
  author       = {Momonari Kudo and
                  Junpei Yamaguchi and
                  Yang Guo and
                  Masaya Yasuda},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Practical Analysis of Key Recovery Attack Against Search-LWE Problem},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_10},
  doi          = {10.1007/978-3-319-44524-3\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KudoYGY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16,
  author       = {Kaoru Kurosawa and
                  Keisuke Sasaki and
                  Kiyohiko Ohta and
                  Kazuki Yoneyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_5},
  doi          = {10.1007/978-3-319-44524-3\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaSOY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LinWJZW16,
  author       = {Zimin Lin and
                  Rui Wang and
                  Xiaoqi Jia and
                  Shengzhi Zhang and
                  Chuankun Wu},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_1},
  doi          = {10.1007/978-3-319-44524-3\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/LinWJZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnukiTKU16,
  author       = {Hiroshi Onuki and
                  Tadanori Teruya and
                  Naoki Kanayama and
                  Shigenori Uchiyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Faster Explicit Formulae for Computing Pairings via Elliptic Nets
                  and Their Parallel Computation},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {319--334},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_19},
  doi          = {10.1007/978-3-319-44524-3\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnukiTKU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XiangZL16,
  author       = {Zejun Xiang and
                  Wentao Zhang and
                  Dongdai Lin},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {On the Division Property of Simon48 and Simon64},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_9},
  doi          = {10.1007/978-3-319-44524-3\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/XiangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XieTCZG16,
  author       = {Wei Xie and
                  Yong Tang and
                  Shuhui Chen and
                  Yi Zhang and
                  Yuanming Gao},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Security of Web of Things: {A} Survey},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {61--70},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_4},
  doi          = {10.1007/978-3-319-44524-3\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XieTCZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yamamoto16,
  author       = {Hiroaki Yamamoto},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Secure Automata-Based Substring Search Scheme on Encrypted Data},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {111--131},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_7},
  doi          = {10.1007/978-3-319-44524-3\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Yamamoto16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YangHSS16,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Related-Key Impossible Differential Analysis of Full Khudra},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_8},
  doi          = {10.1007/978-3-319-44524-3\_8},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/YangHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YashiroMIS16,
  author       = {Risa Yashiro and
                  Takanori Machida and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Deep-Learning-Based Security Evaluation on Authentication Systems
                  Using Arbiter {PUF} and Its Variants},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {267--285},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_16},
  doi          = {10.1007/978-3-319-44524-3\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YashiroMIS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangCZL16,
  author       = {Tao Zhang and
                  Sherman S. M. Chow and
                  Zhe Zhou and
                  Ming Li},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {215--233},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_13},
  doi          = {10.1007/978-3-319-44524-3\_13},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangCZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangT16,
  author       = {Wenbin Zhang and
                  Chik How Tan},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {On the Security and Key Generation of the {ZHFE} Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {289--304},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_17},
  doi          = {10.1007/978-3-319-44524-3\_17},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2016,
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3},
  doi          = {10.1007/978-3-319-44524-3},
  isbn         = {978-3-319-44523-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics