Search dblp for Publications

export results for "stream:streams/conf/crss:"

 download as .bib file

@inproceedings{DBLP:conf/crss/CourtoisGN14,
  author       = {Nicolas T. Courtois and
                  Marek Grajek and
                  Rahul Naik},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Optimizing {SHA256} in Bitcoin Mining},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {131--144},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_12},
  doi          = {10.1007/978-3-662-44893-9\_12},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/CourtoisGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/ForysJO14,
  author       = {Wit Forys and
                  Lukasz Jeda and
                  Piotr Oprocha},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {On a Cipher Based on Pseudo-random Walks on Graphs},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {59--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_6},
  doi          = {10.1007/978-3-662-44893-9\_6},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/ForysJO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/FrayHKMP14,
  author       = {Imed El Fray and
                  Tomasz Hyla and
                  Miroslaw Kurkowski and
                  Witold Mackow and
                  Jerzy Pejas},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Practical Authentication Protocols for Protecting and Sharing Sensitive
                  Information on Mobile Devices},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {153--165},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_14},
  doi          = {10.1007/978-3-662-44893-9\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/FrayHKMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/HalunenS14,
  author       = {Kimmo Halunen and
                  Mirko Sailio},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Identity-Based Cryptography in Credit Card Payments},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {49--58},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_5},
  doi          = {10.1007/978-3-662-44893-9\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/HalunenS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/MansourCL14,
  author       = {Ismail Mansour and
                  G{\'{e}}rard Chalhoub and
                  Pascal Lafourcade},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Secure Multihop Key Establishment Protocols for Wireless Sensor Networks},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {166--177},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_15},
  doi          = {10.1007/978-3-662-44893-9\_15},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/MansourCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/MazurK14,
  author       = {Katarzyna Mazur and
                  Bogdan Ksiezopolski},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Comparison and Assessment of Security Modeling Approaches in Terms
                  of the QoP-ML},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_16},
  doi          = {10.1007/978-3-662-44893-9\_16},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crss/MazurK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/MuszynskiVLB14,
  author       = {Jakub Muszynski and
                  S{\'{e}}bastien Varrette and
                  Juan Luis Jim{\'{e}}nez Laredo and
                  Pascal Bouvry},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {89--99},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_8},
  doi          = {10.1007/978-3-662-44893-9\_8},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/MuszynskiVLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/Neupane14,
  author       = {Kashi Neupane},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Long-Term Secure Two-Round Group Key Establishment from Pairings},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {122--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_11},
  doi          = {10.1007/978-3-662-44893-9\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/Neupane14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/OgielaS14,
  author       = {Marek R. Ogiela and
                  Piotr Sulkowski},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Protocol for Detection of Counterfeit Transactions in Electronic Currency
                  Exchange},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {145--152},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_13},
  doi          = {10.1007/978-3-662-44893-9\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/OgielaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/OrynczakK14,
  author       = {Grzegorz Orynczak and
                  Zbigniew Kotulski},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Context-Aware Secure Routing Protocol for Real-Time Services},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {193--207},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_17},
  doi          = {10.1007/978-3-662-44893-9\_17},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/OrynczakK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/ParfieniukJ14,
  author       = {Marek Parfieniuk and
                  Piotr Jankowski},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words
                  without Changing the Bit Count of a Pair},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {12--22},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_2},
  doi          = {10.1007/978-3-662-44893-9\_2},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/ParfieniukJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/PolakU14,
  author       = {Monika Polak and
                  Vasyl Ustimenko},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {On {LDPC} Codes Based on Families of Expanding Graphs of Increasing
                  Girth without Edge-Transitive Automorphism Groups},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {74--88},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_7},
  doi          = {10.1007/978-3-662-44893-9\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/PolakU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/PudovkinaT14,
  author       = {Marina Pudovkina and
                  Alexander Toktarev},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Numerical Semigroups and Bounds on Impossible Differential Attacks
                  on Generalized Feistel Schemes},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_1},
  doi          = {10.1007/978-3-662-44893-9\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/PudovkinaT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/ReyadK14,
  author       = {Omar Reyad and
                  Zbigniew Kotulski},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random
                  Number Generators},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {38--48},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_4},
  doi          = {10.1007/978-3-662-44893-9\_4},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/ReyadK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/Romanczuk-PolubiecU14,
  author       = {Urszula Romanczuk{-}Polubiec and
                  Vasyl Ustimenko},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {On Multivariate Cryptosystems Based on Polynomially Compressed Maps
                  with Invertible Decomposition},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {23--37},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_3},
  doi          = {10.1007/978-3-662-44893-9\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/Romanczuk-PolubiecU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/TentuR14,
  author       = {Appala Naidu Tentu and
                  Allam Appa Rao},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Efficient Verifiable Multi-Secret Sharing Based on {Y.C.H} Scheme},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {100--109},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_9},
  doi          = {10.1007/978-3-662-44893-9\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/TentuR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crss/Tiplea14,
  author       = {Ferucio Laurentiu Tiplea},
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {A Lightweight Authentication Protocol for {RFID}},
  booktitle    = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  pages        = {110--121},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9\_10},
  doi          = {10.1007/978-3-662-44893-9\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/Tiplea14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crss/2014,
  editor       = {Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Katarzyna Mazur},
  title        = {Cryptography and Security Systems - Third International Conference,
                  {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {448},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44893-9},
  doi          = {10.1007/978-3-662-44893-9},
  isbn         = {978-3-662-44892-2},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crss/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}