Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cans/cans2009.bht:"
@inproceedings{DBLP:conf/cans/AgrenJH09, author = {Martin {\AA}gren and Thomas Johansson and Martin Hell}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Improving the Rainbow Attack by Reusing Colours}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {362--378}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_24}, doi = {10.1007/978-3-642-10433-6\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/AgrenJH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BeuchatLMMR09, author = {Jean{-}Luc Beuchat and Emmanuel L{\'{o}}pez{-}Trejo and Luis Mart{\'{\i}}nez{-}Ramos and Shigeo Mitsunari and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {413--432}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_28}, doi = {10.1007/978-3-642-10433-6\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/BeuchatLMMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BlundoIP09, author = {Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Private-Key Hidden Vector Encryption with Key Confidentiality}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {259--277}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_17}, doi = {10.1007/978-3-642-10433-6\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/BlundoIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Boyen09, author = {Xavier Boyen}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {{HPAKE} : Password Authentication Secure against Cross-Site User Impersonation}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {279--298}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_19}, doi = {10.1007/978-3-642-10433-6\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/Boyen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BrecherBM09, author = {Timo Brecher and Emmanuel Bresson and Mark Manulis}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Fully Robust Tree-Diffie-Hellman Group Key Exchange}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {478--497}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_33}, doi = {10.1007/978-3-642-10433-6\_33}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/BrecherBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CagaljSU09, author = {Mario Cagalj and Nitesh Saxena and Ersin Uzun}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {On the Usability of Secure Association of Wireless Devices Based on Distance Bounding}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {443--462}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_30}, doi = {10.1007/978-3-642-10433-6\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/CagaljSU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ChoyYK09, author = {Jiali Choy and Huihui Yap and Khoongming Khoo}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {An Analysis of the Compact {XSL} Attack on {BES} and Embedded {SMS4}}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {103--118}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_8}, doi = {10.1007/978-3-642-10433-6\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ChoyYK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DahmenK09, author = {Erik Dahmen and Christoph Krau{\ss}}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Short Hash-Based Signatures for Wireless Sensor Networks}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {463--476}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_31}, doi = {10.1007/978-3-642-10433-6\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DahmenK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FangSGW09, author = {Liming Fang and Willy Susilo and Chunpeng Ge and Jiandong Wang}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {248--258}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_16}, doi = {10.1007/978-3-642-10433-6\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/FangSGW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FuLMQ09, author = {Shaojing Fu and Chao Li and Kanta Matsuura and Longjiang Qu}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {402--412}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_27}, doi = {10.1007/978-3-642-10433-6\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/FuLMQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FuchsbauerPV09, author = {Georg Fuchsbauer and David Pointcheval and Damien Vergnaud}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Transferable Constant-Size Fair E-Cash}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {226--247}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_15}, doi = {10.1007/978-3-642-10433-6\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/FuchsbauerPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Gentry09, author = {Craig Gentry}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Computing on Encrypted Data}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {477}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_32}, doi = {10.1007/978-3-642-10433-6\_32}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/Gentry09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/IsobeKNS09, author = {Shuji Isobe and Eisuke Koizumi and Yuji Nishigaki and Hiroki Shizuya}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {On the Complexity of Computing Discrete Logarithms over Algebraic Tori}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {433--442}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_29}, doi = {10.1007/978-3-642-10433-6\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/IsobeKNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/IzadiSSK09, author = {Maryam Izadi and Babak Sadeghiyan and Seyed Saeed Sadeghian and Hossein Arabnezhad Khanooki}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {{MIBS:} {A} New Lightweight Block Cipher}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {334--348}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_22}, doi = {10.1007/978-3-642-10433-6\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/IzadiSSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/JiaWYX09, author = {Keting Jia and Xiaoyun Wang and Zheng Yuan and Guangwu Xu}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Distinguishing and Second-Preimage Attacks on CBC-Like MACs}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {349--361}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_23}, doi = {10.1007/978-3-642-10433-6\_23}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/JiaWYX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/JinX09, author = {Wenting Jin and Jing Xu}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {299--314}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_20}, doi = {10.1007/978-3-642-10433-6\_20}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/JinX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Joye09, author = {Marc Joye}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {On Cryptographic Schemes Based on Discrete Logarithms and Factoring}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {41--52}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_3}, doi = {10.1007/978-3-642-10433-6\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/Joye09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KimA09, author = {Chong Hee Kim and Gildas Avoine}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {{RFID} Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {119--133}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_9}, doi = {10.1007/978-3-642-10433-6\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/KimA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KolesnikovSS09, author = {Vladimir Kolesnikov and Ahmad{-}Reza Sadeghi and Thomas Schneider}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {1--20}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_1}, doi = {10.1007/978-3-642-10433-6\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/KolesnikovSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LiZD09, author = {Xiangxi Li and Yu Zhang and Yuxin Deng}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Verifying Anonymous Credential Systems in Applied Pi Calculus}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {209--225}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_14}, doi = {10.1007/978-3-642-10433-6\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LiZD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LibertV09, author = {Beno{\^{\i}}t Libert and Damien Vergnaud}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {498--517}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_34}, doi = {10.1007/978-3-642-10433-6\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/LibertV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/MezzourPGP09, author = {Ghita Mezzour and Adrian Perrig and Virgil D. Gligor and Panos Papadimitratos}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Privacy-Preserving Relationship Path Discovery in Social Networks}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {189--208}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_13}, doi = {10.1007/978-3-642-10433-6\_13}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/MezzourPGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/MohamedDBW09, author = {Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann and Fabian Werner}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Algebraic Attack on the {MQQ} Public Key Cryptosystem}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {392--401}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_26}, doi = {10.1007/978-3-642-10433-6\_26}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/MohamedDBW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/NakaharaSZW09, author = {Jorge Nakahara Jr. and Pouyan Sepehrdad and Bingsheng Zhang and Meiqin Wang}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher {PRESENT}}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {58--75}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_5}, doi = {10.1007/978-3-642-10433-6\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/NakaharaSZW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/NarayananAAPCR09, author = {G. Sathya Narayanan and T. Aishwarya and Anugrah Agrawal and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {21--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_2}, doi = {10.1007/978-3-642-10433-6\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/NarayananAAPCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Perrig09, author = {Adrian Perrig}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Building Secure Networked Systems with Code Attestation}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {278}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_18}, doi = {10.1007/978-3-642-10433-6\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/Perrig09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SadeghiVW09, author = {Ahmad{-}Reza Sadeghi and Ivan Visconti and Christian Wachsmann}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Anonymizer-Enabled Security and Privacy for {RFID}}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {134--153}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_10}, doi = {10.1007/978-3-642-10433-6\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SadeghiVW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SaxenaU09, author = {Nitesh Saxena and Md. Borhan Uddin}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {154--173}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_11}, doi = {10.1007/978-3-642-10433-6\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SaxenaU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Smith09, author = {Adam D. Smith}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Asymptotically Optimal and Private Statistical Estimation}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {53--57}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_4}, doi = {10.1007/978-3-642-10433-6\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/Smith09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SunCCL09, author = {Hung{-}Min Sun and Wen{-}Hsuan Chang and Shih{-}Ying Chang and Yue{-}Hsun Lin}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {DepenDNS: Dependable Mechanism against {DNS} Cache Poisoning}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {174--188}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_12}, doi = {10.1007/978-3-642-10433-6\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SunCCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SuzukiHK09, author = {Koutarou Suzuki and Fumitaka Hoshino and Tetsutaro Kobayashi}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Relinkable Ring Signature}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {518--536}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_35}, doi = {10.1007/978-3-642-10433-6\_35}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SuzukiHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Tartary09, author = {Christophe Tartary}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Ensuring Authentication of Digital Information Using Cryptographic Accumulators}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {315--333}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_21}, doi = {10.1007/978-3-642-10433-6\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/Tartary09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/YangWQ09, author = {Lin Yang and Meiqin Wang and Siyuan Qiao}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Side Channel Cube Attack on {PRESENT}}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {379--391}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_25}, doi = {10.1007/978-3-642-10433-6\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/YangWQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhangLKWP09, author = {Aileen Zhang and Chu{-}Wee Lim and Khoongming Khoo and Lei Wei and Josef Pieprzyk}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Extensions of the Cube Attack Based on Low Degree Annihilators}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {87--102}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_7}, doi = {10.1007/978-3-642-10433-6\_7}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZhangLKWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZhangSL09, author = {Peng Zhang and Bing Sun and Chao Li}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Saturation Attack on the Block Cipher {HIGHT}}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {76--86}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_6}, doi = {10.1007/978-3-642-10433-6\_6}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/ZhangSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2009, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6}, doi = {10.1007/978-3-642-10433-6}, isbn = {978-3-642-10432-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.