Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acns/acns2005.bht:"
@inproceedings{DBLP:conf/acns/AlharbyI05, author = {Abdulrahman Alharby and Hideki Imai}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {{IDS} False Alarm Reduction Using Continuous and Discontinuous Patterns}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {192--205}, year = {2005}, url = {https://doi.org/10.1007/11496137\_14}, doi = {10.1007/11496137\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AlharbyI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BoesgaardCZ05, author = {Martin Boesgaard and Thomas Christensen and Erik Zenner}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Badger - {A} Fast and Provably Secure {MAC}}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {176--191}, year = {2005}, url = {https://doi.org/10.1007/11496137\_13}, doi = {10.1007/11496137\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BoesgaardCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ByunL05, author = {Jin Wook Byun and Dong Hoon Lee}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {75--90}, year = {2005}, url = {https://doi.org/10.1007/11496137\_6}, doi = {10.1007/11496137\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ByunL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChangM05, author = {Yan{-}Cheng Chang and Michael Mitzenmacher}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Privacy Preserving Keyword Searches on Remote Encrypted Data}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {442--455}, year = {2005}, url = {https://doi.org/10.1007/11496137\_30}, doi = {10.1007/11496137\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChangM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Chevallier-Mames05, author = {Beno{\^{\i}}t Chevallier{-}Mames}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {New Signature Schemes with Coupons and Tight Reduction}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {513--528}, year = {2005}, url = {https://doi.org/10.1007/11496137\_35}, doi = {10.1007/11496137\_35}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Chevallier-Mames05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Chevallier-MamesPP05, author = {Beno{\^{\i}}t Chevallier{-}Mames and Duong Hieu Phan and David Pointcheval}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Optimal Asymmetric Encryption and Signature Paddings}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {254--268}, year = {2005}, url = {https://doi.org/10.1007/11496137\_18}, doi = {10.1007/11496137\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Chevallier-MamesPP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChowYH05, author = {Sherman S. M. Chow and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Identity Based Ring Signature}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {499--512}, year = {2005}, url = {https://doi.org/10.1007/11496137\_34}, doi = {10.1007/11496137\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChowYH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DaudignyLMV05, author = {R{\'{e}}my Daudigny and Herv{\'{e}} Ledig and Fr{\'{e}}d{\'{e}}ric Muller and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {{SCARE} of the {DES}}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {393--406}, year = {2005}, url = {https://doi.org/10.1007/11496137\_27}, doi = {10.1007/11496137\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DaudignyLMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DingS05, author = {Jintai Ding and Dieter Schmidt}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Rainbow, a New Multivariable Polynomial Signature Scheme}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {164--175}, year = {2005}, url = {https://doi.org/10.1007/11496137\_12}, doi = {10.1007/11496137\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DingS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DuG05, author = {Wenliang Du and Michael T. Goodrich}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Searching for High-Value Rare Events with Uncheatable Grid Computing}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {122--137}, year = {2005}, url = {https://doi.org/10.1007/11496137\_9}, doi = {10.1007/11496137\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DuG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GarciaH05, author = {Flavio D. Garcia and Jaap{-}Henk Hoepman}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Off-Line Karma: {A} Decentralized Currency for Peer-to-peer and Grid Applications}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {364--377}, year = {2005}, url = {https://doi.org/10.1007/11496137\_25}, doi = {10.1007/11496137\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GarciaH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GoodrichAT05, author = {Michael T. Goodrich and Mikhail J. Atallah and Roberto Tamassia}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Indexing Information for Data Forensics}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {206--221}, year = {2005}, url = {https://doi.org/10.1007/11496137\_15}, doi = {10.1007/11496137\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GoodrichAT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GriffithJ05, author = {Virgil Griffith and Markus Jakobsson}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Messin' with Texas Deriving Mother's Maiden Names Using Public Records}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {91--103}, year = {2005}, url = {https://doi.org/10.1007/11496137\_7}, doi = {10.1007/11496137\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GriffithJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Groth05, author = {Jens Groth}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Non-interactive Zero-Knowledge Arguments for Voting}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {467--482}, year = {2005}, url = {https://doi.org/10.1007/11496137\_32}, doi = {10.1007/11496137\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Groth05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HuJP05, author = {Yih{-}Chun Hu and Markus Jakobsson and Adrian Perrig}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Constructions for One-Way Hash Chains}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {423--441}, year = {2005}, url = {https://doi.org/10.1007/11496137\_29}, doi = {10.1007/11496137\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HuJP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ItkisMR05, author = {Gene Itkis and Robert McNerney and Scott Russell}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Intrusion-Resilient Secure Channels}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {238--253}, year = {2005}, url = {https://doi.org/10.1007/11496137\_17}, doi = {10.1007/11496137\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ItkisMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JakobssonY05, author = {Markus Jakobsson and Liu Yang}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Quantifying Security in Hybrid Cellular Networks}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {350--363}, year = {2005}, url = {https://doi.org/10.1007/11496137\_24}, doi = {10.1007/11496137\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/JakobssonY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KatzMTG05, author = {Jonathan Katz and Philip D. MacKenzie and Gelareh Taban and Virgil D. Gligor}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Two-Server Password-Only Authenticated Key Exchange}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {1--16}, year = {2005}, url = {https://doi.org/10.1007/11496137\_1}, doi = {10.1007/11496137\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KatzMTG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiDZ05, author = {Zhuowei Li and Amitabha Das and Jianying Zhou}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Model Generalization and Its Implications on Intrusion Detection}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {222--237}, year = {2005}, url = {https://doi.org/10.1007/11496137\_16}, doi = {10.1007/11496137\_16}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiDZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiL05, author = {Jiangtao Li and Ninghui Li}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {OACerts: Oblivious Attribute Certificates}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {301--317}, year = {2005}, url = {https://doi.org/10.1007/11496137\_21}, doi = {10.1007/11496137\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LibertQ05, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Identity Based Encryption Without Redundancy}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {285--300}, year = {2005}, url = {https://doi.org/10.1007/11496137\_20}, doi = {10.1007/11496137\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LibertQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LinT05, author = {Hsiao{-}Ying Lin and Wen{-}Guey Tzeng}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {456--466}, year = {2005}, url = {https://doi.org/10.1007/11496137\_31}, doi = {10.1007/11496137\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LinT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MatrawyOS05, author = {Ashraf Matrawy and Paul C. van Oorschot and Anil Somayaji}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {104--121}, year = {2005}, url = {https://doi.org/10.1007/11496137\_8}, doi = {10.1007/11496137\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MatrawyOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/McGregorYL05, author = {John Patrick McGregor and Yiqun Lisa Yin and Ruby B. Lee}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {A Traitor Tracing Scheme Based on {RSA} for Fast Decryption}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {56--74}, year = {2005}, url = {https://doi.org/10.1007/11496137\_5}, doi = {10.1007/11496137\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/McGregorYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NguyenS05, author = {Lan Nguyen and Reihaneh Safavi{-}Naini}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Dynamic k-Times Anonymous Authentication}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {318--333}, year = {2005}, url = {https://doi.org/10.1007/11496137\_22}, doi = {10.1007/11496137\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NguyenS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PhanG05, author = {Raphael Chung{-}Wei Phan and Bok{-}Min Goi}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange {(C2C-PAKE)} Scheme}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {33--39}, year = {2005}, url = {https://doi.org/10.1007/11496137\_3}, doi = {10.1007/11496137\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PhanG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PorninS05, author = {Thomas Pornin and Julien P. Stern}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Digital Signatures Do Not Guarantee Exclusive Ownership}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {138--150}, year = {2005}, url = {https://doi.org/10.1007/11496137\_10}, doi = {10.1007/11496137\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PorninS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ReiterWW05, author = {Michael K. Reiter and XiaoFeng Wang and Matthew K. Wright}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Building Reliable Mix Networks with Fair Exchange}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {378--392}, year = {2005}, url = {https://doi.org/10.1007/11496137\_26}, doi = {10.1007/11496137\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ReiterWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ShinKI05, author = {SeongHan Shin and Kazukuni Kobara and Hideki Imai}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on {RSA}}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {269--284}, year = {2005}, url = {https://doi.org/10.1007/11496137\_19}, doi = {10.1007/11496137\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ShinKI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ShpilrainU05, author = {Vladimir Shpilrain and Alexander Ushakov}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Thompson's Group and Public Key Cryptography}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {151--163}, year = {2005}, url = {https://doi.org/10.1007/11496137\_11}, doi = {10.1007/11496137\_11}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ShpilrainU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SkoricTO05, author = {Boris Skoric and Pim Tuyls and W. Ophey}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Robust Key Extraction from Physical Uncloneable Functions}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {407--422}, year = {2005}, url = {https://doi.org/10.1007/11496137\_28}, doi = {10.1007/11496137\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SkoricTO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangKKK05, author = {Peng Wang and Yongdae Kim and Vishal Kher and Taekyoung Kwon}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {17--32}, year = {2005}, url = {https://doi.org/10.1007/11496137\_2}, doi = {10.1007/11496137\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/WangKKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YangWD05, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Anonymous Roaming and Its Security Analysis}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {334--349}, year = {2005}, url = {https://doi.org/10.1007/11496137\_23}, doi = {10.1007/11496137\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/YangWD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangFI05, author = {Rui Zhang and Jun Furukawa and Hideki Imai}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Short Signature and Universal Designated Verifier Signature Without Random Oracles}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {483--498}, year = {2005}, url = {https://doi.org/10.1007/11496137\_33}, doi = {10.1007/11496137\_33}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhangFI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhuYLSJ05, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {40--55}, year = {2005}, url = {https://doi.org/10.1007/11496137\_4}, doi = {10.1007/11496137\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2005, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, year = {2005}, url = {https://doi.org/10.1007/b137093}, doi = {10.1007/B137093}, isbn = {3-540-26223-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.