default search action
Search dblp for Publications
export results for "stream:streams/conf/crss:"
@inproceedings{DBLP:conf/crss/CourtoisGN14, author = {Nicolas T. Courtois and Marek Grajek and Rahul Naik}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Optimizing {SHA256} in Bitcoin Mining}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {131--144}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_12}, doi = {10.1007/978-3-662-44893-9\_12}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/CourtoisGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/ForysJO14, author = {Wit Forys and Lukasz Jeda and Piotr Oprocha}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {On a Cipher Based on Pseudo-random Walks on Graphs}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {59--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_6}, doi = {10.1007/978-3-662-44893-9\_6}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/ForysJO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/FrayHKMP14, author = {Imed El Fray and Tomasz Hyla and Miroslaw Kurkowski and Witold Mackow and Jerzy Pejas}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {153--165}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_14}, doi = {10.1007/978-3-662-44893-9\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/FrayHKMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/HalunenS14, author = {Kimmo Halunen and Mirko Sailio}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Identity-Based Cryptography in Credit Card Payments}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {49--58}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_5}, doi = {10.1007/978-3-662-44893-9\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/HalunenS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/MansourCL14, author = {Ismail Mansour and G{\'{e}}rard Chalhoub and Pascal Lafourcade}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Secure Multihop Key Establishment Protocols for Wireless Sensor Networks}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {166--177}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_15}, doi = {10.1007/978-3-662-44893-9\_15}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/MansourCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/MazurK14, author = {Katarzyna Mazur and Bogdan Ksiezopolski}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {178--192}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_16}, doi = {10.1007/978-3-662-44893-9\_16}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crss/MazurK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/MuszynskiVLB14, author = {Jakub Muszynski and S{\'{e}}bastien Varrette and Juan Luis Jim{\'{e}}nez Laredo and Pascal Bouvry}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {89--99}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_8}, doi = {10.1007/978-3-662-44893-9\_8}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/MuszynskiVLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/Neupane14, author = {Kashi Neupane}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Long-Term Secure Two-Round Group Key Establishment from Pairings}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {122--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_11}, doi = {10.1007/978-3-662-44893-9\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/Neupane14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/OgielaS14, author = {Marek R. Ogiela and Piotr Sulkowski}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {145--152}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_13}, doi = {10.1007/978-3-662-44893-9\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/OgielaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/OrynczakK14, author = {Grzegorz Orynczak and Zbigniew Kotulski}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Context-Aware Secure Routing Protocol for Real-Time Services}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {193--207}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_17}, doi = {10.1007/978-3-662-44893-9\_17}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/OrynczakK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/ParfieniukJ14, author = {Marek Parfieniuk and Piotr Jankowski}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count of a Pair}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {12--22}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_2}, doi = {10.1007/978-3-662-44893-9\_2}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/ParfieniukJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/PolakU14, author = {Monika Polak and Vasyl Ustimenko}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {On {LDPC} Codes Based on Families of Expanding Graphs of Increasing Girth without Edge-Transitive Automorphism Groups}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {74--88}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_7}, doi = {10.1007/978-3-662-44893-9\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/PolakU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/PudovkinaT14, author = {Marina Pudovkina and Alexander Toktarev}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel Schemes}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {1--11}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_1}, doi = {10.1007/978-3-662-44893-9\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/PudovkinaT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/ReyadK14, author = {Omar Reyad and Zbigniew Kotulski}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {38--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_4}, doi = {10.1007/978-3-662-44893-9\_4}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/ReyadK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/Romanczuk-PolubiecU14, author = {Urszula Romanczuk{-}Polubiec and Vasyl Ustimenko}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {23--37}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_3}, doi = {10.1007/978-3-662-44893-9\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/Romanczuk-PolubiecU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/TentuR14, author = {Appala Naidu Tentu and Allam Appa Rao}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Efficient Verifiable Multi-Secret Sharing Based on {Y.C.H} Scheme}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {100--109}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_9}, doi = {10.1007/978-3-662-44893-9\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/TentuR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/Tiplea14, author = {Ferucio Laurentiu Tiplea}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {A Lightweight Authentication Protocol for {RFID}}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {110--121}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_10}, doi = {10.1007/978-3-662-44893-9\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/Tiplea14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crss/2014, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9}, doi = {10.1007/978-3-662-44893-9}, isbn = {978-3-662-44892-2}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crss/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.