Search dblp for Publications

export results for "toc:db/conf/acisp/acisp2017-2.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acisp/0002T17,
  author       = {Eunkyung Kim and
                  Mehdi Tibouchi},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Secure {GLS} Recomposition for Sum-of-Square Cofactors},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {349--365},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_20},
  doi          = {10.1007/978-3-319-59870-3\_20},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/0002T17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AkterH17,
  author       = {Mousumi Akter and
                  Tanzima Hashem},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Computing Aggregates Over Numeric Data with Personalized Local Differential
                  Privacy},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {249--260},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_14},
  doi          = {10.1007/978-3-319-59870-3\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AkterH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChowSTZ17,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Joseph Tonien and
                  Wei Zong},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {A {QR} Code Watermarking Approach Based on the {DWT-DCT} Technique},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {314--331},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_18},
  doi          = {10.1007/978-3-319-59870-3\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChowSTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DavidsonC17,
  author       = {Alex Davidson and
                  Carlos Cid},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {An Efficient Toolkit for Computing Private Set Operations},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_15},
  doi          = {10.1007/978-3-319-59870-3\_15},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DavidsonC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DumasZ17,
  author       = {Jean{-}Guillaume Dumas and
                  Vincent Zucca},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Prover Efficient Public Verification of Dense or Sparse/Structured
                  Matrix-Vector Multiplication},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_7},
  doi          = {10.1007/978-3-319-59870-3\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DumasZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Emura17,
  author       = {Keita Emura},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability
                  from Simple Assumptions},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {193--213},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_11},
  doi          = {10.1007/978-3-319-59870-3\_11},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Emura17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ErwigFHHKKKLR17,
  author       = {Andreas Erwig and
                  Marc Fischlin and
                  Martin Hald and
                  Dominik Helm and
                  Robert Kiel and
                  Florian K{\"{u}}bler and
                  Michael K{\"{u}}mmerlin and
                  Jakob Laenge and
                  Felix Rohrbach},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Redactable Graph Hashing, Revisited - (Extended Abstract)},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {398--405},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_24},
  doi          = {10.1007/978-3-319-59870-3\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ErwigFHHKKKLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FangYTLLWY17,
  author       = {Ying Fang and
                  Bo Yu and
                  Yong Tang and
                  Liu Liu and
                  Zexin Lu and
                  Yi Wang and
                  Qiang Yang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {A New Malware Classification Approach Based on Malware Dynamic Analysis},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {173--189},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_10},
  doi          = {10.1007/978-3-319-59870-3\_10},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FangYTLLWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FarashahiH17,
  author       = {Reza Rezaeian Farashahi and
                  Seyed Gholamhossein Hosseini},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Differential Addition on Twisted Edwards Curves},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {366--378},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_21},
  doi          = {10.1007/978-3-319-59870-3\_21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FarashahiH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ForlerLLW17,
  author       = {Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Reforgeability of Authenticated Encryption Schemes},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_2},
  doi          = {10.1007/978-3-319-59870-3\_2},
  timestamp    = {Thu, 21 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ForlerLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HattoriHMSW17,
  author       = {Mitsuhiro Hattori and
                  Takato Hirano and
                  Nori Matsuda and
                  Rina Shimizu and
                  Ye Wang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Privacy-Utility Tradeoff for Applications Using Energy Disaggregation
                  of Smart-Meter Data},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {214--234},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_12},
  doi          = {10.1007/978-3-319-59870-3\_12},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HattoriHMSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HeJLLJ17,
  author       = {Jingnan He and
                  Wenpan Jing and
                  Bao Li and
                  Xianhui Lu and
                  Dingding Jia},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Dual-Mode Cryptosystem Based on the Learning with Errors Problem},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {443--451},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_29},
  doi          = {10.1007/978-3-319-59870-3\_29},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HeJLLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HorneN17,
  author       = {Dwight Horne and
                  Suku Nair},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking
                  with Identity Linked Wishes},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {422--434},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_27},
  doi          = {10.1007/978-3-319-59870-3\_27},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HorneN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Horsch0MB17,
  author       = {Moritz Horsch and
                  Johannes Braun and
                  Dominique Metz and
                  Johannes Buchmann},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Update-Tolerant and Revocable Password Backup},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {390--397},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_23},
  doi          = {10.1007/978-3-319-59870-3\_23},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Horsch0MB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiangZC17,
  author       = {Fan Jiang and
                  Cen Zhang and
                  Shaoyin Cheng},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_4},
  doi          = {10.1007/978-3-319-59870-3\_4},
  timestamp    = {Tue, 21 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiangZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LinTG17,
  author       = {Yan Lin and
                  Xiaoxiao Tang and
                  Debin Gao},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {SafeStack + : Enhanced Dual Stack to Combat Data-Flow Hijacking},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_6},
  doi          = {10.1007/978-3-319-59870-3\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LinTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaitiGC17,
  author       = {Swapan Maiti and
                  Shamit Ghosh and
                  Dipanwita Roy Chowdhury},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {On the Security of Designing a Cellular Automata Based Stream Cipher},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {406--413},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_25},
  doi          = {10.1007/978-3-319-59870-3\_25},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaitiGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MengHAL17,
  author       = {Weizhi Meng and
                  Lee Wang Hao and
                  Man Ho Au and
                  Zhe Liu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Exploring Effect of Location Number on Map-Based Graphical Password
                  Authentication},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {301--313},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_17},
  doi          = {10.1007/978-3-319-59870-3\_17},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MengHAL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Naito17,
  author       = {Yusuke Naito},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward
                  Operations},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_3},
  doi          = {10.1007/978-3-319-59870-3\_3},
  timestamp    = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Naito17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PrabowoT17,
  author       = {Theo Fanuela Prabowo and
                  Chik How Tan},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Generating Complete Edwards Curves},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {335--348},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_19},
  doi          = {10.1007/978-3-319-59870-3\_19},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PrabowoT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QiangGJL17,
  author       = {Weizhong Qiang and
                  JiaZhen Guo and
                  Hai Jin and
                  Weifeng Li},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {JSFfox: Run-Timely Confining JavaScript for Firefox},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {135--150},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_8},
  doi          = {10.1007/978-3-319-59870-3\_8},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/QiangGJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QiangHZJWS17,
  author       = {Weizhong Qiang and
                  Yingda Huang and
                  Deqing Zou and
                  Hai Jin and
                  Shizhen Wang and
                  Guozhong Sun},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Fully Context-Sensitive {CFI} for {COTS} Binaries},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {435--442},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_28},
  doi          = {10.1007/978-3-319-59870-3\_28},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/QiangHZJWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RodofileSSDRF17,
  author       = {Nicholas R. Rodofile and
                  Thomas Schmidt and
                  Sebastian T. Sherry and
                  Christopher Djamaludin and
                  Kenneth Radke and
                  Ernest Foo},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical
                  Infrastructure},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {452--459},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_30},
  doi          = {10.1007/978-3-319-59870-3\_30},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RodofileSSDRF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SarkarS17,
  author       = {Sumanta Sarkar and
                  Habeeb Syed},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Analysis of Toeplitz {MDS} Matrices},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_1},
  doi          = {10.1007/978-3-319-59870-3\_1},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SarkarS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SinghSR17,
  author       = {Abhishek Singh and
                  Binanda Sengupta and
                  Sushmita Ruj},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Certificate Transparency with Enhancements and Short Proofs},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {381--389},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_22},
  doi          = {10.1007/978-3-319-59870-3\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SinghSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
  author       = {Hao Sun and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Rongmao Chen and
                  Yujing Liu and
                  Qiaolin Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_9},
  doi          = {10.1007/978-3-319-59870-3\_9},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ThomborsonJ17,
  author       = {Clark D. Thomborson and
                  Marc Jeanmougin},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Stegogames},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {414--421},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_26},
  doi          = {10.1007/978-3-319-59870-3\_26},
  timestamp    = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ThomborsonJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TianZYMY17,
  author       = {Yangguang Tian and
                  Shiwei Zhang and
                  Guomin Yang and
                  Yi Mu and
                  Yong Yu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Privacy-Preserving k-time Authenticated Secret Handshakes},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {281--300},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_16},
  doi          = {10.1007/978-3-319-59870-3\_16},
  timestamp    = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TianZYMY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YingK17,
  author       = {Jason H. M. Ying and
                  Noboru Kunihiro},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Solving the {DLP} with Low Hamming Weight Product Exponents and Improved
                  Attacks on the {GPS} Identification Scheme},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {460--467},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_31},
  doi          = {10.1007/978-3-319-59870-3\_31},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YingK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhanZGWN17,
  author       = {Jiawei Zhan and
                  Quan Zhou and
                  Xiaozhuo Gu and
                  Yuewu Wang and
                  Yingjiao Niu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Splitting Third-Party Libraries' Privileges from Android Apps},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {80--94},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_5},
  doi          = {10.1007/978-3-319-59870-3\_5},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhanZGWN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhouXLXP17,
  author       = {Fucai Zhou and
                  Zifeng Xu and
                  Yuxi Li and
                  Jian Xu and
                  Su Peng},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Private Graph Intersection Protocol},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {235--248},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_13},
  doi          = {10.1007/978-3-319-59870-3\_13},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhouXLXP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-2,
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3},
  doi          = {10.1007/978-3-319-59870-3},
  isbn         = {978-3-319-59869-7},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics