Search dblp for Publications

export results for "toc:db/conf/iwsec/iwsec2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwsec/CheongK09,
  author       = {Kai{-}Yuen Cheong and
                  Takeshi Koshiba},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Reducing Complexity Assumptions for Oblivious Transfer},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {110--124},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_8},
  doi          = {10.1007/978-3-642-04846-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/CheongK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ChoyY09,
  author       = {Jiali Choy and
                  Huihui Yap},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Impossible Boomerang Attack for Block Cipher Structures},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {22--37},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_3},
  doi          = {10.1007/978-3-642-04846-3\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ChoyY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HuaLSR09,
  author       = {Jingyu Hua and
                  Mingchu Li and
                  Kouichi Sakurai and
                  Yizhi Ren},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Efficient Intrusion Detection Based on Static Analysis and Stack Walks},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_11},
  doi          = {10.1007/978-3-642-04846-3\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HuaLSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JakubowskiSV09,
  author       = {Mariusz H. Jakubowski and
                  Chit Wei Saw and
                  Ramarathnam Venkatesan},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Tamper-Tolerant Software: Modeling and Implementation},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {125--139},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_9},
  doi          = {10.1007/978-3-642-04846-3\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JakubowskiSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KimFU09,
  author       = {Minkyu Kim and
                  Atsushi Fujioka and
                  Berkant Ustaoglu},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Strongly Secure Authenticated Key Exchange without NAXOS' Approach},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_12},
  doi          = {10.1007/978-3-642-04846-3\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/KimFU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NakaiMKM09,
  author       = {Yasumasa Nakai and
                  Takahiro Matsuda and
                  Wataru Kitada and
                  Kanta Matsuura},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {A Generic Construction of Timed-Release Encryption with Pre-open Capability},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_5},
  doi          = {10.1007/978-3-642-04846-3\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NakaiMKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Nuida09,
  author       = {Koji Nuida},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and
                  Its Security Evaluation},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {140--157},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_10},
  doi          = {10.1007/978-3-642-04846-3\_10},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Nuida09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Preneel09,
  author       = {Bart Preneel},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {The Future of Cryptographic Algorithms},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_1},
  doi          = {10.1007/978-3-642-04846-3\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Preneel09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakashitaSYTOKN09,
  author       = {Taiki Sakashita and
                  Yoichi Shibata and
                  Takumi Yamamoto and
                  Kenta Takahashi and
                  Wakaha Ogata and
                  Hiroaki Kikuchi and
                  Masakatsu Nishigaki},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {A Proposal of Efficient Remote Biometric Authentication Protocol},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {212--227},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_14},
  doi          = {10.1007/978-3-642-04846-3\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakashitaSYTOKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SekarP09,
  author       = {Gautham Sekar and
                  Bart Preneel},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Improved Distinguishing Attacks on {HC-256}},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {38--52},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_4},
  doi          = {10.1007/978-3-642-04846-3\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SekarP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SelviVSR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Rahul Srinivasan and
                  Chandrasekaran Pandu Rangan},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_6},
  doi          = {10.1007/978-3-642-04846-3\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SelviVSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ThorncharoensriSM09,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Universal Designated Verifier Signatures with Threshold-Signers},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {89--109},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_7},
  doi          = {10.1007/978-3-642-04846-3\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ThorncharoensriSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangSSO09,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Bit-Free Collision: Application to {APOP} Attack},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_2},
  doi          = {10.1007/978-3-642-04846-3\_2},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangSSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YiTO09,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {ID-Based Group Password-Authenticated Key Exchange},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_13},
  doi          = {10.1007/978-3-642-04846-3\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/YiTO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2009,
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3},
  doi          = {10.1007/978-3-642-04846-3},
  isbn         = {978-3-642-04845-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics