Search dblp for Publications

export results for "toc:db/conf/acns/acns2005.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acns/AlharbyI05,
  author       = {Abdulrahman Alharby and
                  Hideki Imai},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {{IDS} False Alarm Reduction Using Continuous and Discontinuous Patterns},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {192--205},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_14},
  doi          = {10.1007/11496137\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AlharbyI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoesgaardCZ05,
  author       = {Martin Boesgaard and
                  Thomas Christensen and
                  Erik Zenner},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Badger - {A} Fast and Provably Secure {MAC}},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {176--191},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_13},
  doi          = {10.1007/11496137\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BoesgaardCZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ByunL05,
  author       = {Jin Wook Byun and
                  Dong Hoon Lee},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {75--90},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_6},
  doi          = {10.1007/11496137\_6},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ByunL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChangM05,
  author       = {Yan{-}Cheng Chang and
                  Michael Mitzenmacher},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Privacy Preserving Keyword Searches on Remote Encrypted Data},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {442--455},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_30},
  doi          = {10.1007/11496137\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChangM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Chevallier-Mames05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {New Signature Schemes with Coupons and Tight Reduction},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {513--528},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_35},
  doi          = {10.1007/11496137\_35},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Chevallier-Mames05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Chevallier-MamesPP05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Optimal Asymmetric Encryption and Signature Paddings},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {254--268},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_18},
  doi          = {10.1007/11496137\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Chevallier-MamesPP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChowYH05,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Identity Based Ring Signature},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {499--512},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_34},
  doi          = {10.1007/11496137\_34},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChowYH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DaudignyLMV05,
  author       = {R{\'{e}}my Daudigny and
                  Herv{\'{e}} Ledig and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {{SCARE} of the {DES}},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {393--406},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_27},
  doi          = {10.1007/11496137\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DaudignyLMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DingS05,
  author       = {Jintai Ding and
                  Dieter Schmidt},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Rainbow, a New Multivariable Polynomial Signature Scheme},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {164--175},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_12},
  doi          = {10.1007/11496137\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DingS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DuG05,
  author       = {Wenliang Du and
                  Michael T. Goodrich},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Searching for High-Value Rare Events with Uncheatable Grid Computing},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {122--137},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_9},
  doi          = {10.1007/11496137\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DuG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GarciaH05,
  author       = {Flavio D. Garcia and
                  Jaap{-}Henk Hoepman},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Off-Line Karma: {A} Decentralized Currency for Peer-to-peer and Grid
                  Applications},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {364--377},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_25},
  doi          = {10.1007/11496137\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GarciaH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GoodrichAT05,
  author       = {Michael T. Goodrich and
                  Mikhail J. Atallah and
                  Roberto Tamassia},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Indexing Information for Data Forensics},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {206--221},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_15},
  doi          = {10.1007/11496137\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GoodrichAT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GriffithJ05,
  author       = {Virgil Griffith and
                  Markus Jakobsson},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Messin' with Texas Deriving Mother's Maiden Names Using Public Records},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {91--103},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_7},
  doi          = {10.1007/11496137\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GriffithJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Groth05,
  author       = {Jens Groth},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Non-interactive Zero-Knowledge Arguments for Voting},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {467--482},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_32},
  doi          = {10.1007/11496137\_32},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Groth05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HuJP05,
  author       = {Yih{-}Chun Hu and
                  Markus Jakobsson and
                  Adrian Perrig},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Constructions for One-Way Hash Chains},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {423--441},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_29},
  doi          = {10.1007/11496137\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HuJP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ItkisMR05,
  author       = {Gene Itkis and
                  Robert McNerney and
                  Scott Russell},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Intrusion-Resilient Secure Channels},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {238--253},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_17},
  doi          = {10.1007/11496137\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ItkisMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JakobssonY05,
  author       = {Markus Jakobsson and
                  Liu Yang},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Quantifying Security in Hybrid Cellular Networks},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {350--363},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_24},
  doi          = {10.1007/11496137\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/JakobssonY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KatzMTG05,
  author       = {Jonathan Katz and
                  Philip D. MacKenzie and
                  Gelareh Taban and
                  Virgil D. Gligor},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Two-Server Password-Only Authenticated Key Exchange},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {1--16},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_1},
  doi          = {10.1007/11496137\_1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KatzMTG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiDZ05,
  author       = {Zhuowei Li and
                  Amitabha Das and
                  Jianying Zhou},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Model Generalization and Its Implications on Intrusion Detection},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {222--237},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_16},
  doi          = {10.1007/11496137\_16},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiDZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiL05,
  author       = {Jiangtao Li and
                  Ninghui Li},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {OACerts: Oblivious Attribute Certificates},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {301--317},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_21},
  doi          = {10.1007/11496137\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LibertQ05,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Identity Based Encryption Without Redundancy},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {285--300},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_20},
  doi          = {10.1007/11496137\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LibertQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LinT05,
  author       = {Hsiao{-}Ying Lin and
                  Wen{-}Guey Tzeng},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {An Efficient Solution to the Millionaires' Problem Based on Homomorphic
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {456--466},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_31},
  doi          = {10.1007/11496137\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LinT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MatrawyOS05,
  author       = {Ashraf Matrawy and
                  Paul C. van Oorschot and
                  Anil Somayaji},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Mitigating Network Denial-of-Service Through Diversity-Based Traffic
                  Management},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {104--121},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_8},
  doi          = {10.1007/11496137\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MatrawyOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/McGregorYL05,
  author       = {John Patrick McGregor and
                  Yiqun Lisa Yin and
                  Ruby B. Lee},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {A Traitor Tracing Scheme Based on {RSA} for Fast Decryption},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {56--74},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_5},
  doi          = {10.1007/11496137\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/McGregorYL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NguyenS05,
  author       = {Lan Nguyen and
                  Reihaneh Safavi{-}Naini},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Dynamic k-Times Anonymous Authentication},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {318--333},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_22},
  doi          = {10.1007/11496137\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NguyenS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PhanG05,
  author       = {Raphael Chung{-}Wei Phan and
                  Bok{-}Min Goi},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Cryptanalysis of an Improved Client-to-Client Password-Authenticated
                  Key Exchange {(C2C-PAKE)} Scheme},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {33--39},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_3},
  doi          = {10.1007/11496137\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PhanG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PorninS05,
  author       = {Thomas Pornin and
                  Julien P. Stern},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Digital Signatures Do Not Guarantee Exclusive Ownership},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {138--150},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_10},
  doi          = {10.1007/11496137\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PorninS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ReiterWW05,
  author       = {Michael K. Reiter and
                  XiaoFeng Wang and
                  Matthew K. Wright},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Building Reliable Mix Networks with Fair Exchange},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {378--392},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_26},
  doi          = {10.1007/11496137\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ReiterWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ShinKI05,
  author       = {SeongHan Shin and
                  Kazukuni Kobara and
                  Hideki Imai},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient and Leakage-Resilient Authenticated Key Transport Protocol
                  Based on {RSA}},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {269--284},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_19},
  doi          = {10.1007/11496137\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ShinKI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ShpilrainU05,
  author       = {Vladimir Shpilrain and
                  Alexander Ushakov},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Thompson's Group and Public Key Cryptography},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {151--163},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_11},
  doi          = {10.1007/11496137\_11},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ShpilrainU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SkoricTO05,
  author       = {Boris Skoric and
                  Pim Tuyls and
                  W. Ophey},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Robust Key Extraction from Physical Uncloneable Functions},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {407--422},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_28},
  doi          = {10.1007/11496137\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SkoricTO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangKKK05,
  author       = {Peng Wang and
                  Yongdae Kim and
                  Vishal Kher and
                  Taekyoung Kwon},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Strengthening Password-Based Authentication Protocols Against Online
                  Dictionary Attacks},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {17--32},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_2},
  doi          = {10.1007/11496137\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/WangKKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YangWD05,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Anonymous Roaming and Its Security Analysis},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {334--349},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_23},
  doi          = {10.1007/11496137\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/YangWD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangFI05,
  author       = {Rui Zhang and
                  Jun Furukawa and
                  Hideki Imai},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Short Signature and Universal Designated Verifier Signature Without
                  Random Oracles},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {483--498},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_33},
  doi          = {10.1007/11496137\_33},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangFI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhuYLSJ05,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Security Mechanisms for Overlay Multicast-Based Content
                  Distribution},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {40--55},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_4},
  doi          = {10.1007/11496137\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2005,
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137093},
  doi          = {10.1007/B137093},
  isbn         = {3-540-26223-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics