Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iwsec/iwsec2015.bht:"
@inproceedings{DBLP:conf/iwsec/EzakiDI15, author = {Takaya Ezaki and Tomohiro Date and Hiroyuki Inoue}, editor = {Keisuke Tanaka and Yuji Suga}, title = {An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {301--315}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_18}, doi = {10.1007/978-3-319-22425-1\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/EzakiDI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FangLLS15, author = {Fuyang Fang and Bao Li and Xianhui Lu and Xiaochao Sun}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improved Efficiency of {MP12}}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {193--210}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_12}, doi = {10.1007/978-3-319-22425-1\_12}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FangLLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HeLLJXS15, author = {Jingnan He and Bao Li and Xianhui Lu and Dingding Jia and Haiyang Xue and Xiaochao Sun}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Identity-Based Lossy Encryption from Learning with Errors}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_1}, doi = {10.1007/978-3-319-22425-1\_1}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HeLLJXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HoshinoO15, author = {Hidetaka Hoshino and Satoshi Obana}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {213--222}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_13}, doi = {10.1007/978-3-319-22425-1\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HoshinoO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IkarashiKCT15, author = {Dai Ikarashi and Ryo Kikuchi and Koji Chida and Katsumi Takahashi}, editor = {Keisuke Tanaka and Yuji Suga}, title = {k-Anonymous Microdata Release via Post Randomisation Method}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {225--241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_14}, doi = {10.1007/978-3-319-22425-1\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IkarashiKCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KimT15, author = {Taechan Kim and Mehdi Tibouchi}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Invalid Curve Attacks in a {GLS} Setting}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {41--55}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_3}, doi = {10.1007/978-3-319-22425-1\_3}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KimT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuW15, author = {Tong Liu and Yazhe Wang}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {316--334}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_19}, doi = {10.1007/978-3-319-22425-1\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MaLHL15, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improved (Pseudo) Preimage Attacks on Reduced-Round {GOST} and Gr{\o}stl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {79--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_6}, doi = {10.1007/978-3-319-22425-1\_6}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MaLHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PengHLHX15, author = {Liqiang Peng and Lei Hu and Yao Lu and Zhangjie Huang and Jun Xu}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Implicit Factorization of {RSA} Moduli Revisited (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {67--76}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_5}, doi = {10.1007/978-3-319-22425-1\_5}, timestamp = {Sun, 10 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PengHLHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SadiahNF15, author = {Shahidatul Sadiah and Toru Nakanishi and Nobuo Funabiki}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {262--278}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_16}, doi = {10.1007/978-3-319-22425-1\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SadiahNF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SeoE15, author = {Jae Hong Seo and Keita Emura}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {21--38}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_2}, doi = {10.1007/978-3-319-22425-1\_2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SeoE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShinagawaMSNKNH15, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Secure Multi-Party Computation Using Polarizing Cards}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {281--297}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_17}, doi = {10.1007/978-3-319-22425-1\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/ShinagawaMSNKNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SmythHM15, author = {Ben Smyth and Yoshikazu Hanatani and Hirofumi Muratani}, editor = {Keisuke Tanaka and Yuji Suga}, title = {{NM-CPA} Secure Encryption with Proofs of Plaintext Knowledge}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {115--134}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_8}, doi = {10.1007/978-3-319-22425-1\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SmythHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SunHQMSS15, author = {Siwei Sun and Lei Hu and Kexin Qiao and Xiaoshuang Ma and Jinyong Shan and Ling Song}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers {DESL} and LBlock-s}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {97--111}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_7}, doi = {10.1007/978-3-319-22425-1\_7}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/SunHQMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TaketaniO15, author = {Shunsuke Taketani and Wakaha Ogata}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improvement of {UC} Secure Searchable Symmetric Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {135--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_9}, doi = {10.1007/978-3-319-22425-1\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TaketaniO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TeruyaNSH15, author = {Tadanori Teruya and Koji Nuida and Kana Shimizu and Goichiro Hanaoka}, editor = {Keisuke Tanaka and Yuji Suga}, title = {On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {242--261}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_15}, doi = {10.1007/978-3-319-22425-1\_15}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TeruyaNSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangWL15, author = {Fuqun Wang and Kunpeng Wang and Bao Li}, editor = {Keisuke Tanaka and Yuji Suga}, title = {LWE-Based {FHE} with Better Parameters}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {175--192}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_11}, doi = {10.1007/978-3-319-22425-1\_11}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WangWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YagasakiS15, author = {Reina Yagasaki and Kazuo Sakiyama}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {335--344}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_20}, doi = {10.1007/978-3-319-22425-1\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YagasakiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YuKJ15, author = {Wei Yu and Kwang Ho Kim and Myong Song Jo}, editor = {Keisuke Tanaka and Yuji Suga}, title = {New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {56--64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_4}, doi = {10.1007/978-3-319-22425-1\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YuKJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangL15, author = {Tingting Zhang and Hongda Li}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {153--172}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_10}, doi = {10.1007/978-3-319-22425-1\_10}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangLMJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Jiwu Jing}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Bit Error Probability Evaluation of Ring Oscillator {PUF} (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {347--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_21}, doi = {10.1007/978-3-319-22425-1\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangLMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2015, editor = {Keisuke Tanaka and Yuji Suga}, title = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1}, doi = {10.1007/978-3-319-22425-1}, isbn = {978-3-319-22424-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.