Search dblp for Publications

export results for "toc:db/conf/iwsec/iwsec2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwsec/EzakiDI15,
  author       = {Takaya Ezaki and
                  Tomohiro Date and
                  Hiroyuki Inoue},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {An Analysis Platform for the Information Security of In-Vehicle Networks
                  Connected with External Networks},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {301--315},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_18},
  doi          = {10.1007/978-3-319-22425-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/EzakiDI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FangLLS15,
  author       = {Fuyang Fang and
                  Bao Li and
                  Xianhui Lu and
                  Xiaochao Sun},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improved Efficiency of {MP12}},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {193--210},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_12},
  doi          = {10.1007/978-3-319-22425-1\_12},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FangLLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HeLLJXS15,
  author       = {Jingnan He and
                  Bao Li and
                  Xianhui Lu and
                  Dingding Jia and
                  Haiyang Xue and
                  Xiaochao Sun},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Identity-Based Lossy Encryption from Learning with Errors},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_1},
  doi          = {10.1007/978-3-319-22425-1\_1},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HeLLJXS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HoshinoO15,
  author       = {Hidetaka Hoshino and
                  Satoshi Obana},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Almost Optimum Secret Sharing Schemes with Cheating Detection for
                  Random Bit Strings},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {213--222},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_13},
  doi          = {10.1007/978-3-319-22425-1\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HoshinoO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IkarashiKCT15,
  author       = {Dai Ikarashi and
                  Ryo Kikuchi and
                  Koji Chida and
                  Katsumi Takahashi},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {k-Anonymous Microdata Release via Post Randomisation Method},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_14},
  doi          = {10.1007/978-3-319-22425-1\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IkarashiKCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KimT15,
  author       = {Taechan Kim and
                  Mehdi Tibouchi},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Invalid Curve Attacks in a {GLS} Setting},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_3},
  doi          = {10.1007/978-3-319-22425-1\_3},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KimT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuW15,
  author       = {Tong Liu and
                  Yazhe Wang},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Beyond Scale: An Efficient Framework for Evaluating Web Access Control
                  Policies in the Era of Big Data},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_19},
  doi          = {10.1007/978-3-319-22425-1\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MaLHL15,
  author       = {Bingke Ma and
                  Bao Li and
                  Ronglin Hao and
                  Xiaoqian Li},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improved (Pseudo) Preimage Attacks on Reduced-Round {GOST} and Gr{\o}stl-256
                  and Studies on Several Truncation Patterns for AES-like Compression
                  Functions},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {79--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_6},
  doi          = {10.1007/978-3-319-22425-1\_6},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MaLHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PengHLHX15,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Yao Lu and
                  Zhangjie Huang and
                  Jun Xu},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Implicit Factorization of {RSA} Moduli Revisited (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {67--76},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_5},
  doi          = {10.1007/978-3-319-22425-1\_5},
  timestamp    = {Sun, 10 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PengHLHX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SadiahNF15,
  author       = {Shahidatul Sadiah and
                  Toru Nakanishi and
                  Nobuo Funabiki},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Anonymous Credential System with Efficient Proofs for Monotone Formulas
                  on Attributes},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {262--278},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_16},
  doi          = {10.1007/978-3-319-22425-1\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SadiahNF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SeoE15,
  author       = {Jae Hong Seo and
                  Keita Emura},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_2},
  doi          = {10.1007/978-3-319-22425-1\_2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SeoE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShinagawaMSNKNH15,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Secure Multi-Party Computation Using Polarizing Cards},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {281--297},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_17},
  doi          = {10.1007/978-3-319-22425-1\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShinagawaMSNKNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SmythHM15,
  author       = {Ben Smyth and
                  Yoshikazu Hanatani and
                  Hirofumi Muratani},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {{NM-CPA} Secure Encryption with Proofs of Plaintext Knowledge},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_8},
  doi          = {10.1007/978-3-319-22425-1\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SmythHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SunHQMSS15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Jinyong Shan and
                  Ling Song},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improvement on the Method for Automatic Differential Analysis and
                  Its Application to Two Lightweight Block Ciphers {DESL} and LBlock-s},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_7},
  doi          = {10.1007/978-3-319-22425-1\_7},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/SunHQMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TaketaniO15,
  author       = {Shunsuke Taketani and
                  Wakaha Ogata},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improvement of {UC} Secure Searchable Symmetric Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {135--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_9},
  doi          = {10.1007/978-3-319-22425-1\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TaketaniO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TeruyaNSH15,
  author       = {Tadanori Teruya and
                  Koji Nuida and
                  Kana Shimizu and
                  Goichiro Hanaoka},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {On Limitations and Alternatives of Privacy-Preserving Cryptographic
                  Protocols for Genomic Data},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {242--261},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_15},
  doi          = {10.1007/978-3-319-22425-1\_15},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TeruyaNSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangWL15,
  author       = {Fuqun Wang and
                  Kunpeng Wang and
                  Bao Li},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {LWE-Based {FHE} with Better Parameters},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_11},
  doi          = {10.1007/978-3-319-22425-1\_11},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YagasakiS15,
  author       = {Reina Yagasaki and
                  Kazuo Sakiyama},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {335--344},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_20},
  doi          = {10.1007/978-3-319-22425-1\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YagasakiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YuKJ15,
  author       = {Wei Yu and
                  Kwang Ho Kim and
                  Myong Song Jo},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {56--64},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_4},
  doi          = {10.1007/978-3-319-22425-1\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YuKJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangL15,
  author       = {Tingting Zhang and
                  Hongda Li},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Fully Leakage-Resilient Non-malleable Identification Schemes in the
                  Bounded-Retrieval Model},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_10},
  doi          = {10.1007/978-3-319-22425-1\_10},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangLMJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Jiwu Jing},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Bit Error Probability Evaluation of Ring Oscillator {PUF} (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {347--356},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_21},
  doi          = {10.1007/978-3-319-22425-1\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangLMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2015,
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1},
  doi          = {10.1007/978-3-319-22425-1},
  isbn         = {978-3-319-22424-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics