![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "signature generation"
@article{DBLP:journals/tches/OuyangZZYZWTZWL25, author = {Yi Ouyang and Yihong Zhu and Wenping Zhu and Bohan Yang and Zirui Zhang and Hanning Wang and Qichao Tao and Min Zhu and Shaojun Wei and Leibo Liu}, title = {FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2025}, number = {1}, pages = {203--226}, year = {2025}, url = {https://doi.org/10.46586/tches.v2025.i1.203-226}, doi = {10.46586/TCHES.V2025.I1.203-226}, timestamp = {Wed, 15 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/OuyangZZYZWTZWL25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bib/ChengPFYXYY24, author = {Jiabei Cheng and Xiaoyong Pan and Yi Fang and Kaiyuan Yang and Yiming Xue and Qingran Yan and Ye Yuan}, title = {GexMolGen: cross-modal generation of hit-like molecules via large language model encoding of gene expression signatures}, journal = {Briefings Bioinform.}, volume = {25}, number = {6}, year = {2024}, url = {https://doi.org/10.1093/bib/bbae525}, doi = {10.1093/BIB/BBAE525}, timestamp = {Thu, 12 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bib/ChengPFYXYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/PandeyBS24, author = {Sachi Pandey and Ritin Behl and Amit Sinha}, title = {Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment}, journal = {Multim. Tools Appl.}, volume = {83}, number = {16}, pages = {47269--47293}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-17365-8}, doi = {10.1007/S11042-023-17365-8}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/PandeyBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EspitauNP24, author = {Thomas Espitau and Guilhem Niot and Thomas Prest}, title = {Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {VII}}, pages = {425--458}, year = {2024}, crossref = {DBLP:conf/crypto/2024-7}, url = {https://doi.org/10.1007/978-3-031-68394-7\_14}, doi = {10.1007/978-3-031-68394-7\_14}, timestamp = {Wed, 28 Aug 2024 21:54:03 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EspitauNP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ZhangMWGYCWJ24, author = {Zicheng Zhang and Haoyu Ma and Daoyuan Wu and Debin Gao and Xiao Yi and Yufan Chen and Yan Wu and Lingxiao Jiang}, title = {MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search}, booktitle = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2024, Vienna, Austria, July 8-12, 2024}, pages = {724--740}, year = {2024}, crossref = {DBLP:conf/eurosp/2024}, url = {https://doi.org/10.1109/EuroSP60621.2024.00045}, doi = {10.1109/EUROSP60621.2024.00045}, timestamp = {Thu, 05 Sep 2024 16:02:09 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ZhangMWGYCWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/YangWMFSH24, author = {Gang Yang and Bo Wu and Weifeng Mou and Linna Fan and Xuan Shen and Jun He}, title = {DAS-Gen: Continual Signature Generation for Evolving Malicious Traffic}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, pages = {352--362}, year = {2024}, crossref = {DBLP:conf/icic/2024-9}, url = {https://doi.org/10.1007/978-981-97-5606-3\_30}, doi = {10.1007/978-981-97-5606-3\_30}, timestamp = {Thu, 08 Aug 2024 08:41:10 +0200}, biburl = {https://dblp.org/rec/conf/icic/YangWMFSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/MahantaW24, author = {Ashish Mahanta and Haibo Wang}, title = {Embedding Power Signature Generation into Low Dropout Voltage Regulators for Enhancing IoT Security}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2024, Knoxville, TN, USA, July 1-3, 2024}, pages = {167--172}, year = {2024}, crossref = {DBLP:conf/isvlsi/2024}, url = {https://doi.org/10.1109/ISVLSI61997.2024.00040}, doi = {10.1109/ISVLSI61997.2024.00040}, timestamp = {Tue, 01 Oct 2024 21:41:42 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/MahantaW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SarkerMSDK24, author = {Shaown Sarker and William Melicher and Oleksii Starov and Anupam Das and Alexandros Kapravelos}, title = {Automated Generation of Behavioral Signatures for Malicious Web Campaigns}, booktitle = {Information Security - 27th International Conference, {ISC} 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part {II}}, pages = {226--245}, year = {2024}, crossref = {DBLP:conf/isw/2024-2}, url = {https://doi.org/10.1007/978-3-031-75764-8\_12}, doi = {10.1007/978-3-031-75764-8\_12}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/SarkerMSDK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ShafiuzzamanDSB24, author = {Md Shafiuzzaman and Achintya Desai and Laboni Sarker and Tevfik Bultan}, title = {{STASE:} Static Analysis Guided Symbolic Execution for {UEFI} Vulnerability Signature Generation}, booktitle = {Proceedings of the 39th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2024, Sacramento, CA, USA, October 27 - November 1, 2024}, pages = {1783--1794}, year = {2024}, crossref = {DBLP:conf/kbse/2024}, url = {https://doi.org/10.1145/3691620.3695543}, doi = {10.1145/3691620.3695543}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/ShafiuzzamanDSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/StevensEZKP24, author = {Kevin Stevens and Mert Erdemir and Hang Zhang and Taesoo Kim and Paul Pearce}, title = {BluePrint: Automatic Malware Signature Generation for Internet Scanning}, booktitle = {The 27th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2024, Padua, Italy, 30 September 2024- 2 October 2024}, pages = {197--214}, year = {2024}, crossref = {DBLP:conf/raid/2024}, url = {https://doi.org/10.1145/3678890.3678923}, doi = {10.1145/3678890.3678923}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/StevensEZKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sai/GkoutroumpiGV24, author = {Christina Gkoutroumpi and Nikolaos Virtsionis Gkalinikis and Dimitrios Vrakas}, title = {{SGAN:} Appliance Signatures Data Generation for {NILM} Applications Using GANs}, booktitle = {Intelligent Computing - Proceedings of the 2024 Computing Conference, Volume 3, London, UK, 26-27 June 2024}, pages = {325--339}, year = {2024}, crossref = {DBLP:conf/sai/2024-3}, url = {https://doi.org/10.1007/978-3-031-62269-4\_23}, doi = {10.1007/978-3-031-62269-4\_23}, timestamp = {Tue, 17 Dec 2024 12:26:16 +0100}, biburl = {https://dblp.org/rec/conf/sai/GkoutroumpiGV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-07166, author = {Md Shafiuzzaman and Achintya Desai and Laboni Sarker and Tevfik Bultan}, title = {{UEFI} Vulnerability Signature Generation using Static and Symbolic Analysis}, journal = {CoRR}, volume = {abs/2407.07166}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.07166}, doi = {10.48550/ARXIV.2407.07166}, eprinttype = {arXiv}, eprint = {2407.07166}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-07166.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspitauNP24, author = {Thomas Espitau and Guilhem Niot and Thomas Prest}, title = {Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2024}, url = {https://eprint.iacr.org/2024/959}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspitauNP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/LazebnikK23, author = {Teddy Lazebnik and Liron Simon Keren}, title = {Cancer-inspired genomics mapper model for the generation of synthetic {DNA} sequences with desired genomics signatures}, journal = {Comput. Biol. Medicine}, volume = {164}, pages = {107221}, year = {2023}, url = {https://doi.org/10.1016/j.compbiomed.2023.107221}, doi = {10.1016/J.COMPBIOMED.2023.107221}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbm/LazebnikK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ArabNC23, author = {Naouel Arab and Hassiba Nemmour and Youcef Chibani}, title = {A new synthetic feature generation scheme based on artificial immune systems for robust offline signature verification}, journal = {Expert Syst. Appl.}, volume = {213}, number = {Part}, pages = {119306}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2022.119306}, doi = {10.1016/J.ESWA.2022.119306}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/ArabNC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KobayashiKKO23, author = {Masaki Kobayashi and Yo Kanemoto and Daisuke Kotani and Yasuo Okabe}, title = {Generation of {IDS} Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities}, journal = {J. Inf. Process.}, volume = {31}, pages = {591--601}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.591}, doi = {10.2197/IPSJJIP.31.591}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/KobayashiKKO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SimESYKS23, author = {Minjoo Sim and Siwoo Eum and Gyeongju Song and Yujin Yang and Wonwoong Kim and Hwajeong Seo}, title = {{K-XMSS} and {K-SPHINCS+:} Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms}, journal = {Sensors}, volume = {23}, number = {17}, pages = {7558}, year = {2023}, url = {https://doi.org/10.3390/s23177558}, doi = {10.3390/S23177558}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SimESYKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/NguyenG23, author = {Duc Tri Nguyen and Kris Gaj}, title = {Fast Falcon Signature Generation and Verification Using ARMv8 {NEON} Instructions}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings}, pages = {417--441}, year = {2023}, crossref = {DBLP:conf/africacrypt/2023}, url = {https://doi.org/10.1007/978-3-031-37679-5\_18}, doi = {10.1007/978-3-031-37679-5\_18}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/NguyenG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/RomeroMAARV23, author = {Agust{\'{\i}}n Walabonso Lara Romero and Juan Antonio Ternero Mu{\~{n}}iz and Rafael M. Estepa{-}Alonso and Antonio Jose Estepa Alonso and Fernando Ruiz Robles and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo}, title = {{HTTP} Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments}, booktitle = {Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, {EICC} 2023, Stavanger, Norway, June 14-15, 2023}, pages = {65--70}, year = {2023}, crossref = {DBLP:conf/eicc/2023}, url = {https://doi.org/10.1145/3590777.3590788}, doi = {10.1145/3590777.3590788}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eicc/RomeroMAARV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihci/KumarSRS23, author = {Suneel Kumar and Mona Singh and Ruchilekha and Manoj Kumar Singh}, title = {Semantic Segmentation Based Image Signature Generation for {CBIR}}, booktitle = {Intelligent Human Computer Interaction - 15th International Conference, {IHCI} 2023, Daegu, South Korea, November 8-10, 2023, Revised Selected Papers, Part {II}}, pages = {319--329}, year = {2023}, crossref = {DBLP:conf/ihci/2023-2}, url = {https://doi.org/10.1007/978-3-031-53830-8\_33}, doi = {10.1007/978-3-031-53830-8\_33}, timestamp = {Mon, 11 Mar 2024 15:20:48 +0100}, biburl = {https://dblp.org/rec/conf/ihci/KumarSRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/irps/MalikJCMKSBVS23, author = {Rasik Rashid Malik and Vipin Joshi and Rajarshi Roy Chaudhuri and Mehak Ashraf Mir and Zubear Khan and Avinas N. Shaji and Madhura Bhattacharya and Anup T. Vitthal and Mayank Shrivastava}, title = {Signatures of Positive Gate Over-Drive Induced Hole Trap Generation and its Impact on p-GaN Gate Stack Instability in AlGaN/GaN HEMTs}, booktitle = {{IEEE} International Reliability Physics Symposium, {IRPS} 2023, Monterey, CA, USA, March 26-30, 2023}, pages = {1--4}, year = {2023}, crossref = {DBLP:conf/irps/2023}, url = {https://doi.org/10.1109/IRPS48203.2023.10117793}, doi = {10.1109/IRPS48203.2023.10117793}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/irps/MalikJCMKSBVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/SenC23, author = {Ovishake Sen and Baibhab Chatterjee}, title = {Invited: Ring-Oscillator Physical Unclonable Function {(RO-PUF)} Based {PRBS} Generation as a Device Signature in Distributed Brain Implants}, booktitle = {66th {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2023, Tempe, AZ, USA, August 6-9, 2023}, pages = {439--443}, year = {2023}, crossref = {DBLP:conf/mwscas/2023}, url = {https://doi.org/10.1109/MWSCAS57524.2023.10405893}, doi = {10.1109/MWSCAS57524.2023.10405893}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwscas/SenC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01315, author = {Pere D{\'{\i}}az Lozano and Toni Lozano Bag{\'{e}}n and Josep Vives}, title = {Neural SDEs for Conditional Time Series Generation and the Signature-Wasserstein-1 metric}, journal = {CoRR}, volume = {abs/2301.01315}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01315}, doi = {10.48550/ARXIV.2301.01315}, eprinttype = {arXiv}, eprint = {2301.01315}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01315.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-01475, author = {Teddy Lazebnik and Liron Simon Keren}, title = {Cancer-inspired Genomics Mapper Model for the Generation of Synthetic {DNA} Sequences with Desired Genomics Signatures}, journal = {CoRR}, volume = {abs/2305.01475}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.01475}, doi = {10.48550/ARXIV.2305.01475}, eprinttype = {arXiv}, eprint = {2305.01475}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-01475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-05775, author = {Ovishake Sen and Baibhab Chatterjee}, title = {Modified Ring-Oscillator Physical Unclonable Function {(RO-PUF)} based {PRBS} Generation as a Device Signature in Distributed Brain Implants}, journal = {CoRR}, volume = {abs/2305.05775}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.05775}, doi = {10.48550/ARXIV.2305.05775}, eprinttype = {arXiv}, eprint = {2305.05775}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-05775.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jetc/ThompsonW22, author = {David Thompson and Haibo Wang}, title = {Integrated Power Signature Generation Circuit for IoT Abnormality Detection}, journal = {{ACM} J. Emerg. Technol. Comput. Syst.}, volume = {18}, number = {1}, pages = {5:1--5:13}, year = {2022}, url = {https://doi.org/10.1145/3460476}, doi = {10.1145/3460476}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jetc/ThompsonW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coolchips/MasadaNI22, author = {Kaoru Masada and Ryohei Nakayama and Makoto Ikeda}, title = {Hardware Acceleration of Aggregate Signature Generation and Authentication by {BLS} Signature over {BLS12-381} curve}, booktitle = {{IEEE} Symposium in Low-Power and High-Speed Chips, {COOL} {CHIPS} 2022, Tokyo, Japan, April 20-22, 2022}, pages = {1--3}, year = {2022}, crossref = {DBLP:conf/coolchips/2022}, url = {https://doi.org/10.1109/COOLCHIPS54332.2022.9772706}, doi = {10.1109/COOLCHIPS54332.2022.9772706}, timestamp = {Mon, 23 May 2022 16:36:20 +0200}, biburl = {https://dblp.org/rec/conf/coolchips/MasadaNI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/ShiWL22, author = {Zhixin Shi and Xiangyu Wang and Pengcheng Liu}, title = {{NBP-MS:} Malware Signature Generation Based on Network Behavior Profiling}, booktitle = {26th International Conference on Pattern Recognition, {ICPR} 2022, Montreal, QC, Canada, August 21-25, 2022}, pages = {1865--1870}, year = {2022}, crossref = {DBLP:conf/icpr/2022}, url = {https://doi.org/10.1109/ICPR56361.2022.9956412}, doi = {10.1109/ICPR56361.2022.9956412}, timestamp = {Thu, 01 Dec 2022 13:56:03 +0100}, biburl = {https://dblp.org/rec/conf/icpr/ShiWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChandrasekaranT21, author = {Lakshmi Chandrasekaran and Karuppuswamy Thenmozhi and John Bosco Balaguru Rayappan and Rengarajan Amirtharajan}, title = {Genetic and chaotic signatures in offspring - an encrypted generation of image family}, journal = {Multim. Tools Appl.}, volume = {80}, number = {6}, pages = {8581--8609}, year = {2021}, url = {https://doi.org/10.1007/s11042-020-09978-0}, doi = {10.1007/S11042-020-09978-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChandrasekaranT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/DuHH21, author = {Min Du and Wenjun Hu and William Hewlett}, title = {AutoCombo: Automatic Malware Signature Generation Through Combination Rule Mining}, booktitle = {{CIKM} '21: The 30th {ACM} International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021}, pages = {3777--3786}, year = {2021}, crossref = {DBLP:conf/cikm/2021}, url = {https://doi.org/10.1145/3459637.3481896}, doi = {10.1145/3459637.3481896}, timestamp = {Tue, 16 Aug 2022 23:04:38 +0200}, biburl = {https://dblp.org/rec/conf/cikm/DuHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmc2/Ikematsu21, author = {Yasuhiko Ikematsu}, title = {A Study on Randomness Used in Signature Generation of {UOV}}, booktitle = {Proceedings of the Seventh International Conference on Mathematics and Computing - {ICMC} 2021, Shibpur, India,}, pages = {39--50}, year = {2021}, crossref = {DBLP:conf/icmc2/2021}, url = {https://doi.org/10.1007/978-981-16-6890-6\_4}, doi = {10.1007/978-981-16-6890-6\_4}, timestamp = {Wed, 16 Mar 2022 11:12:46 +0100}, biburl = {https://dblp.org/rec/conf/icmc2/Ikematsu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/AlnujaimK21, author = {Ibrahim Alnujaim and Youngwook Kim}, title = {Application of Conditional Generative Adversarial Networks for Generation of Micro-Doppler Signatures of Different Aspect Angles}, booktitle = {{IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2021, Brussels, Belgium, July 11-16, 2021}, pages = {5056--5058}, year = {2021}, crossref = {DBLP:conf/igarss/2021}, url = {https://doi.org/10.1109/IGARSS47720.2021.9553743}, doi = {10.1109/IGARSS47720.2021.9553743}, timestamp = {Tue, 19 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/AlnujaimK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/SongHWTW21, author = {Yifeng Song and Xiao Hu and Wenhao Wang and Jing Tian and Zhongfeng Wang}, title = {High-Speed and Scalable {FPGA} Implementation of the Key Generation for the Leighton-Micali Signature Protocol}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021, Daegu, South Korea, May 22-28, 2021}, pages = {1--5}, year = {2021}, crossref = {DBLP:conf/iscas/2021}, url = {https://doi.org/10.1109/ISCAS51556.2021.9401177}, doi = {10.1109/ISCAS51556.2021.9401177}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/SongHWTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/KapoorFQ21, author = {Maya Kapoor and Garrett Fuchs and Jonathan Quance}, title = {RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection}, booktitle = {20th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2021, Boston, MA, USA, November 23-26, 2021}, pages = {1--9}, year = {2021}, crossref = {DBLP:conf/nca/2021}, url = {https://doi.org/10.1109/NCA53618.2021.9685959}, doi = {10.1109/NCA53618.2021.9685959}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nca/KapoorFQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KosugeT21, author = {Haruhisa Kosuge and Hidema Tanaka}, title = {Simple and Memory-Efficient Signature Generation of {\textdollar}{\textbackslash}mathrm \{XMSS\{MT\}\}{\textdollar}}, booktitle = {Selected Areas in Cryptography - 28th International Conference, {SAC} 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers}, pages = {377--397}, year = {2021}, crossref = {DBLP:conf/sacrypt/2021}, url = {https://doi.org/10.1007/978-3-030-99277-4\_18}, doi = {10.1007/978-3-030-99277-4\_18}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KosugeT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FengHWWH20, author = {Qi Feng and Debiao He and Huaqun Wang and Ding Wang and Xinyi Huang}, title = {Multi-party key generation protocol for the identity-based signature scheme in the {IEEE} {P1363} standard for public key cryptography}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {6}, pages = {724--732}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2020.0096}, doi = {10.1049/IET-IFS.2020.0096}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/FengHWWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcat/ShinRIY20, author = {Jungpil Shin and Md. Abdur Rahim and Md. Rashedul Islam and Keun Soo Yun}, title = {A novel approach of cursive signature generation for personal identity}, journal = {Int. J. Comput. Appl. Technol.}, volume = {62}, number = {4}, pages = {384--394}, year = {2020}, url = {https://doi.org/10.1504/IJCAT.2020.107423}, doi = {10.1504/IJCAT.2020.107423}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcat/ShinRIY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgi/ChenHLAH20, author = {Ting Chen and Haiqing He and Dajun Li and Puyang An and Zhenyang Hui}, title = {Damage Signature Generation of Revetment Surface along Urban Rivers Using UAV-Based Mapping}, journal = {{ISPRS} Int. J. Geo Inf.}, volume = {9}, number = {4}, pages = {283}, year = {2020}, url = {https://doi.org/10.3390/ijgi9040283}, doi = {10.3390/IJGI9040283}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgi/ChenHLAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/RuizLSV20, author = {Victoria Ru{\'{\i}}z and Ismael Linares and {\'{A}}ngel S{\'{a}}nchez and Jos{\'{e}} Francisco V{\'{e}}lez}, title = {Off-line handwritten signature verification using compositional synthetic generation of signatures and Siamese Neural Networks}, journal = {Neurocomputing}, volume = {374}, pages = {30--41}, year = {2020}, url = {https://doi.org/10.1016/j.neucom.2019.09.041}, doi = {10.1016/J.NEUCOM.2019.09.041}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/RuizLSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaiscr/ZalasinskiCLWP20, author = {Marcin Zalasinski and Krzysztof Cpalka and Lukasz Laskowski and Donald C. Wunsch and Krzysztof Przybyszewski}, title = {An Algorithm for the Evolutionary-Fuzzy Generation of on-Line Signature Hybrid Descriptors}, journal = {J. Artif. Intell. Soft Comput. Res.}, volume = {10}, number = {3}, pages = {173--187}, year = {2020}, url = {https://doi.org/10.2478/jaiscr-2020-0012}, doi = {10.2478/JAISCR-2020-0012}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaiscr/ZalasinskiCLWP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nar/StathiasTKVCFPT20, author = {Vasileios Stathias and John Paul Turner and Amar Koleti and Dusica Vidovic and Daniel J. Cooper and Mehdi Fazel{-}Najafabadi and Marcin Pilarczyk and Raymond Terryn and Caty Chung and Afoma Umeano and Daniel J. B. Clarke and Alexander Lachmann and John Erol Evangelista and Avi Ma'ayan and Mario Medvedovic and Stephan C. Sch{\"{u}}rer}, title = {{LINCS} Data Portal 2.0: next generation access point for perturbation-response signatures}, journal = {Nucleic Acids Res.}, volume = {48}, number = {Database-Issue}, pages = {D431--D439}, year = {2020}, url = {https://doi.org/10.1093/nar/gkz1023}, doi = {10.1093/NAR/GKZ1023}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nar/StathiasTKVCFPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/KaurS20, author = {Sanmeet Kaur and Maninder Singh}, title = {Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks}, journal = {Neural Comput. Appl.}, volume = {32}, number = {12}, pages = {7859--7877}, year = {2020}, url = {https://doi.org/10.1007/s00521-019-04187-9}, doi = {10.1007/S00521-019-04187-9}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/KaurS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/NahmiasCNE20, author = {Daniel Nahmias and Aviad Cohen and Nir Nissim and Yuval Elovici}, title = {Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments}, journal = {Neural Networks}, volume = {124}, pages = {243--257}, year = {2020}, url = {https://doi.org/10.1016/j.neunet.2020.01.003}, doi = {10.1016/J.NEUNET.2020.01.003}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nn/NahmiasCNE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/KimLH20, author = {Gyu{-}Chol Kim and Su{-}Chol Li and Hak{-}Chol Hwang}, title = {Fast rebalanced {RSA} signature scheme with typical prime generation}, journal = {Theor. Comput. Sci.}, volume = {830-831}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.04.024}, doi = {10.1016/J.TCS.2020.04.024}, timestamp = {Wed, 03 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/KimLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/ZitarNHA20, author = {Raed Abu Zitar and Mirna Nachouki and Hanan Hussain and Farid Alzboun}, title = {Recurrent Neural Networks for Signature Generation}, booktitle = {13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, {CISP-BMEI} 2020, Chengdu, China, October 17-19, 2020}, pages = {1093--1097}, year = {2020}, crossref = {DBLP:conf/bmei/2020}, url = {https://doi.org/10.1109/CISP-BMEI51763.2020.9263638}, doi = {10.1109/CISP-BMEI51763.2020.9263638}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmei/ZitarNHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/LongX20, author = {Yihong Long and Feng Xiong}, title = {Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption}, booktitle = {5th International Conference on Computer and Communication Systems, {ICCCS} 2020, Shanghai, China, May 15-18, 2020}, pages = {76--81}, year = {2020}, crossref = {DBLP:conf/ccoms/2020}, url = {https://doi.org/10.1109/ICCCS49078.2020.9118464}, doi = {10.1109/ICCCS49078.2020.9118464}, timestamp = {Mon, 02 Aug 2021 08:40:32 +0200}, biburl = {https://dblp.org/rec/conf/ccoms/LongX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kokoris-KogiasM20, author = {Eleftherios Kokoris{-}Kogias and Dahlia Malkhi and Alexander Spiegelman}, title = {Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1751--1767}, year = {2020}, crossref = {DBLP:conf/ccs/2020}, url = {https://doi.org/10.1145/3372297.3423364}, doi = {10.1145/3372297.3423364}, timestamp = {Sun, 19 Jan 2025 13:26:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kokoris-KogiasM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/WeirSD20, author = {Nathaniel Weir and Jo{\~{a}}o Sedoc and Benjamin Van Durme}, title = {{COD3S:} Diverse Generation with Discrete Semantic Signatures}, booktitle = {Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2020, Online, November 16-20, 2020}, pages = {5199--5211}, year = {2020}, crossref = {DBLP:conf/emnlp/2020-1}, url = {https://doi.org/10.18653/v1/2020.emnlp-main.421}, doi = {10.18653/V1/2020.EMNLP-MAIN.421}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/WeirSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewdts/ChesnokovKCSCP20, author = {Nikita I. Chesnokov and Denis A. Korochentsev and Larissa V. Cherckesova and Olga A. Safaryan and Vladislav E. Chumakov and Irina A. Pilipenko}, title = {Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation}, booktitle = {{IEEE} East-West Design {\&} Test Symposium, {EWDTS} 2020, Varna, Bulgaria, September 4-7, 2020}, pages = {1--5}, year = {2020}, crossref = {DBLP:conf/ewdts/2020}, url = {https://doi.org/10.1109/EWDTS50664.2020.9224967}, doi = {10.1109/EWDTS50664.2020.9224967}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ewdts/ChesnokovKCSCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LongX20, author = {Yihong Long and Feng Xiong}, title = {Secret Sharing Based {BLMQ} Signature Generation}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {6--12}, year = {2020}, crossref = {DBLP:conf/iccsp/2020}, url = {https://doi.org/10.1145/3377644.3377655}, doi = {10.1145/3377644.3377655}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LongX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icct/YeL20, author = {Wenlan Ye and Yihong Long}, title = {Two Party Generation of {SM9} Digital Signature}, booktitle = {20th {IEEE} International Conference on Communication Technology, {ICCT} 2020, Nanning, China, October 28-31, 2020}, pages = {1556--1560}, year = {2020}, crossref = {DBLP:conf/icct/2020}, url = {https://doi.org/10.1109/ICCT50939.2020.9295863}, doi = {10.1109/ICCT50939.2020.9295863}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icct/YeL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/ThompsonSW20, author = {David E. Thompson and Md Kamruzzaman Shuvo and Haibo Wang}, title = {Digital {LDO} Based Power Signature Generation Circuit for IoT Security}, booktitle = {63rd {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2020, Springfield, MA, USA, August 9-12, 2020}, pages = {1076--1079}, year = {2020}, crossref = {DBLP:conf/mwscas/2020}, url = {https://doi.org/10.1109/MWSCAS48704.2020.9184550}, doi = {10.1109/MWSCAS48704.2020.9184550}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwscas/ThompsonSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/KajitaONT20, author = {Kaisei Kajita and Kazuto Ogawa and Koji Nuida and Tsuyoshi Takagi}, title = {Short Lattice Signatures in the Standard Model with Efficient Tag Generation}, booktitle = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, pages = {85--102}, year = {2020}, crossref = {DBLP:conf/provsec/2020}, url = {https://doi.org/10.1007/978-3-030-62576-4\_5}, doi = {10.1007/978-3-030-62576-4\_5}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/KajitaONT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengHLLC20, author = {Qi Feng and Debiao He and Min Luo and Zengxiang Li and Kim{-}Kwang Raymond Choo}, title = {Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {137--147}, year = {2020}, crossref = {DBLP:conf/trustcom/2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00031}, doi = {10.1109/TRUSTCOM50675.2020.00031}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengHLLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangTCXLX20, author = {Runzi Zhang and Mingkai Tong and Lei Chen and Jianxin Xue and Wenmao Liu and Feng Xie}, title = {CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {736--743}, year = {2020}, crossref = {DBLP:conf/trustcom/2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00101}, doi = {10.1109/TRUSTCOM50675.2020.00101}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangTCXLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-02882, author = {Nathaniel Weir and Jo{\~{a}}o Sedoc and Benjamin Van Durme}, title = {{COD3S:} Diverse Generation with Discrete Semantic Signatures}, journal = {CoRR}, volume = {abs/2010.02882}, year = {2020}, url = {https://arxiv.org/abs/2010.02882}, eprinttype = {arXiv}, eprint = {2010.02882}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-02882.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eecs/JagadeeshDBR19, author = {Kokila Jagadeesh and Arjun Murali Das and B. Shameedha Begum and Natarajan Ramasubramanian}, title = {Hardware Signature Generation Using a Hybrid {PUF} and {FSM} Model for an SoC Architecture}, journal = {Period. Polytech. Electr. Eng. Comput. Sci.}, volume = {63}, number = {4}, pages = {244--253}, year = {2019}, url = {https://doi.org/10.3311/ppee.13424}, doi = {10.3311/PPEE.13424}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eecs/JagadeeshDBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ItoK19, author = {Hiroshi Ito and Tadashi Kasezawa}, title = {Permutation-Based Signature Generation for Spread-Spectrum Video Watermarking}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {1}, pages = {31--40}, year = {2019}, url = {https://doi.org/10.1587/transinf.2018MUP0005}, doi = {10.1587/TRANSINF.2018MUP0005}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ItoK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChangLLGP19, author = {Chin{-}Chen Chang and Wai{-}Kong Lee and Yanjun Liu and Bok{-}Min Goi and Raphael C.{-}W. Phan}, title = {Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by {GPU}}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4448--4461}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2881425}, doi = {10.1109/JIOT.2018.2881425}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ChangLLGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ZhaoYZ19, author = {Pu Zhao and Jia Yu and Hanlin Zhang}, title = {Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing}, journal = {J. Inf. Sci. Eng.}, volume = {35}, number = {3}, pages = {635--650}, year = {2019}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=168\_2242}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ZhaoYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/BaeKA19, author = {Tae{-}Wuk Bae and Young{-}Choon Kim and Sang{-}Ho Ahn}, title = {{IR} Composite Image Generation by Wavelength Band Based on Temperature Synthesis Estimated from {IR} Target Signature and Background Scene}, journal = {J. Sensors}, volume = {2019}, pages = {9423976:1--9423976:17}, year = {2019}, url = {https://doi.org/10.1155/2019/9423976}, doi = {10.1155/2019/9423976}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/js/BaeKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ats/HiramotoOT19, author = {Yushiro Hiramoto and Satoshi Ohtake and Hiroshi Takahashi}, title = {A Built-In Self-Diagnostic Mechanism for Delay Faults Based on Self-Generation of Expected Signatures}, booktitle = {28th {IEEE} Asian Test Symposium, {ATS} 2019, Kolkata, India, December 10-13, 2019}, pages = {31--36}, year = {2019}, crossref = {DBLP:conf/ats/2019}, url = {https://doi.org/10.1109/ATS47505.2019.000-4}, doi = {10.1109/ATS47505.2019.000-4}, timestamp = {Tue, 14 Jan 2020 13:20:27 +0100}, biburl = {https://dblp.org/rec/conf/ats/HiramotoOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LongC19, author = {Yihong Long and Minyang Cheng}, title = {Secret Sharing Based {SM2} Digital Signature Generation using Homomorphic Encryption}, booktitle = {15th International Conference on Computational Intelligence and Security, {CIS} 2019, Macao, SAR, China, December 13-16, 2019}, pages = {252--256}, year = {2019}, crossref = {DBLP:conf/cis/2019}, url = {https://doi.org/10.1109/CIS.2019.00060}, doi = {10.1109/CIS.2019.00060}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LongC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShanYGJWL19, author = {Weijun Shan and Jun Yu and Limin Guo and Kun Jiang and Lihui Wang and Qing Li}, title = {A Horizontal Attack on {SM9} Signature Generation}, booktitle = {15th International Conference on Computational Intelligence and Security, {CIS} 2019, Macao, SAR, China, December 13-16, 2019}, pages = {306--309}, year = {2019}, crossref = {DBLP:conf/cis/2019}, url = {https://doi.org/10.1109/CIS.2019.00071}, doi = {10.1109/CIS.2019.00071}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ShanYGJWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/Zhdanov19, author = {Alexander Zhdanov}, title = {Generation of Static YARA-Signatures Using Genetic Algorithm}, booktitle = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {220--228}, year = {2019}, crossref = {DBLP:conf/eurosp/2019w}, url = {https://doi.org/10.1109/EuroSPW.2019.00031}, doi = {10.1109/EUROSPW.2019.00031}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/Zhdanov19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnss/QiuLW19, author = {Jian Qiu and Hengjian Li and Xiyu Wang}, title = {Cancelable Palmprint Feature Generation Method Based on Minimum Signature}, booktitle = {Future Network Systems and Security - 5th International Conference, {FNSS} 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings}, pages = {118--127}, year = {2019}, crossref = {DBLP:conf/fnss/2019}, url = {https://doi.org/10.1007/978-3-030-34353-8\_8}, doi = {10.1007/978-3-030-34353-8\_8}, timestamp = {Fri, 27 Mar 2020 08:58:51 +0100}, biburl = {https://dblp.org/rec/conf/fnss/QiuLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaiic/ChoiKPC19, author = {Kiho Choi and Hyeongrae Kim and Daejin Park and Jeonghun Cho}, title = {Automatic Multi-Thread Code Generation for Monitoring Signature-based Control Flow}, booktitle = {International Conference on Artificial Intelligence in Information and Communication, {ICAIIC} 2019, Okinawa, Japan, February 11-13, 2019}, pages = {28--33}, year = {2019}, crossref = {DBLP:conf/icaiic/2019}, url = {https://doi.org/10.1109/ICAIIC.2019.8668997}, doi = {10.1109/ICAIIC.2019.8668997}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/icaiic/ChoiKPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbk/ZhangHHCT19, author = {Yuanming Zhang and Ting Han and Zelin Hao and Yu Cao and Jing Tao}, title = {An Efficient Application Traffic Signature Generation System}, booktitle = {2019 {IEEE} International Conference on Big Knowledge, {ICBK} 2019, Beijing, China, November 10-11, 2019}, pages = {341--347}, year = {2019}, crossref = {DBLP:conf/icbk/2019}, url = {https://doi.org/10.1109/ICBK.2019.00053}, doi = {10.1109/ICBK.2019.00053}, timestamp = {Tue, 21 Jan 2020 16:26:02 +0100}, biburl = {https://dblp.org/rec/conf/icbk/ZhangHHCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/NahmiasCNE19, author = {Daniel Nahmias and Aviad Cohen and Nir Nissim and Yuval Elovici}, title = {TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest, Hungary, July 14-19, 2019}, pages = {1--8}, year = {2019}, crossref = {DBLP:conf/ijcnn/2019}, url = {https://doi.org/10.1109/IJCNN.2019.8851841}, doi = {10.1109/IJCNN.2019.8851841}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/NahmiasCNE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-00154, author = {Saeed Valizadeh and Marten van Dijk}, title = {On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware}, journal = {CoRR}, volume = {abs/1905.00154}, year = {2019}, url = {http://arxiv.org/abs/1905.00154}, eprinttype = {arXiv}, eprint = {1905.00154}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-00154.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AtzeniDMSST18, author = {Andrea S. Atzeni and Fernando Diaz and Andrea Marcelli and Antonio S{\'{a}}nchez and Giovanni Squillero and Alberto Paolo Tonda}, title = {Countering Android Malware: {A} Scalable Semi-Supervised Approach for Family-Signature Generation}, journal = {{IEEE} Access}, volume = {6}, pages = {59540--59556}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2874502}, doi = {10.1109/ACCESS.2018.2874502}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AtzeniDMSST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/YiN18, author = {Haibo Yi and Zhe Nie}, title = {High-speed hardware architecture for implementations of multivariate signature generations on FPGAs}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2018}, pages = {93}, year = {2018}, url = {https://doi.org/10.1186/s13638-018-1117-2}, doi = {10.1186/S13638-018-1117-2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/YiN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SugiyamaAI18, author = {Shotaro Sugiyama and Hiromitsu Awano and Makoto Ikeda}, title = {Low Latency 256-bit {\textdollar}mathbb\{F\}{\_}p{\textdollar} {ECDSA} Signature Generation Crypto Processor}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {12}, pages = {2290--2296}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.2290}, doi = {10.1587/TRANSFUN.E101.A.2290}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SugiyamaAI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PengT18, author = {Zhiniang Peng and Shaohua Tang}, title = {Circulant {UOV:} a new {UOV} variant with shorter private key and faster signature generation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {3}, pages = {1376--1395}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.03.022}, doi = {10.3837/TIIS.2018.03.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PengT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SijaSK18, author = {Baraka D. Sija and Kyu{-}Seok Shim and Myung{-}Sup Kim}, title = {Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {4}, pages = {1572--1593}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.04.010}, doi = {10.3837/TIIS.2018.04.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SijaSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/MengT18, author = {Lei Meng and Lin Teng}, title = {Karhunen Loeve Transform-based Online Handwritten Signature Scheme via Dynamic Bit Allocation Method and Naive Bayes for Biometric Key Generation}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {9}, number = {4}, pages = {896--903}, year = {2018}, url = {http://bit.kuas.edu.tw/\&\#126;jihmsp/2018/vol9/JIH-MSP-2018-04-012.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/MengT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwe/TangLC18, author = {Yazhe Tang and Xun Li and Lishui Chen}, title = {{STAFF:} Automated Signature Generationfor Fine-Grained FunctionTraffic Identification}, journal = {J. Web Eng.}, volume = {17}, number = {5}, pages = {71--94}, year = {2018}, url = {https://doi.org/10.13052/jwe1540-9589.1753}, doi = {10.13052/JWE1540-9589.1753}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jwe/TangLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeKLCYLL18, author = {Suchul Lee and Sungho Kim and Sungil Lee and Jaehyuk Choi and Hanjun Yoon and Dohoon Lee and Jun{-}Rak Lee}, title = {LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {771--783}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2609907}, doi = {10.1109/TDSC.2016.2609907}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeKLCYLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asscc/SugiyamaAI18, author = {Shotaro Sugiyama and Hiromitsu Awano and Makoto Ikeda}, title = {31.3 {\(\mu\)}s/Signature-Generation 256-bit {\unicode{54589}}p {ECDSA} Cryptoprocessor}, booktitle = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2018, Tainan, Taiwan, November 5-7, 2018}, pages = {153--156}, year = {2018}, crossref = {DBLP:conf/asscc/2018}, url = {https://doi.org/10.1109/ASSCC.2018.8579287}, doi = {10.1109/ASSCC.2018.8579287}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asscc/SugiyamaAI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlhanahnahLYZC18, author = {Mohannad Alhanahnah and Qicheng Lin and Qiben Yan and Ning Zhang and Zhenxiang Chen}, title = {Efficient Signature Generation for Classifying Cross-Architecture IoT Malware}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, year = {2018}, crossref = {DBLP:conf/cns/2018}, url = {https://doi.org/10.1109/CNS.2018.8433203}, doi = {10.1109/CNS.2018.8433203}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlhanahnahLYZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/OzdilEDO18, author = {Omer Ozdil and Yunus Emre Esin and Berkan Demirel and Safak Ozturk}, title = {Representative Signature Generation for Plant Detection in Hyperspectral Images}, booktitle = {2018 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2018, Valencia, Spain, July 22-27, 2018}, pages = {2709--2712}, year = {2018}, crossref = {DBLP:conf/igarss/2018}, url = {https://doi.org/10.1109/IGARSS.2018.8517344}, doi = {10.1109/IGARSS.2018.8517344}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/OzdilEDO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iseaisap/NaderiVCPA18, author = {Hassan Naderi and P. Vinod and Mauro Conti and Saeed Parsa and Mohammad Hadi Alaeiyan}, title = {Malware Signature Generation Using Locality Sensitive Hashing}, booktitle = {Security and Privacy - Second {ISEA} International Conference, {ISEA-ISAP} 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers}, pages = {115--124}, year = {2018}, crossref = {DBLP:conf/iseaisap/2018}, url = {https://doi.org/10.1007/978-981-13-7561-3\_9}, doi = {10.1007/978-981-13-7561-3\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iseaisap/NaderiVCPA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PengT17, author = {Zhiniang Peng and Shaohua Tang}, title = {Circulant Rainbow: {A} New Rainbow Variant With Shorter Private Key and Faster Signature Generation}, journal = {{IEEE} Access}, volume = {5}, pages = {11877--11886}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2717279}, doi = {10.1109/ACCESS.2017.2717279}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PengT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ShimYLK17, author = {Kyu{-}Seok Shim and Sung{-}Ho Yoon and Su{-}Kang Lee and Myung{-}Sup Kim}, title = {SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {2}, pages = {537--569}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=155\_2012}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ShimYLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocs/Niewiadomska-Szynkiewicz17, author = {Ewa Niewiadomska{-}Szynkiewicz and Adam Kozakiewicz}, title = {Design and evaluation of a system for network threat signatures generation}, journal = {J. Comput. Sci.}, volume = {22}, pages = {187--197}, year = {2017}, url = {https://doi.org/10.1016/j.jocs.2017.05.006}, doi = {10.1016/J.JOCS.2017.05.006}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocs/Niewiadomska-Szynkiewicz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/CabreraFES17, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Miguel A. Ferrer and George S. Eskander and Robert Sabourin}, title = {Generation of Duplicated Off-Line Signature Images for Verification Systems}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {39}, number = {5}, pages = {951--964}, year = {2017}, url = {https://doi.org/10.1109/TPAMI.2016.2560810}, doi = {10.1109/TPAMI.2016.2560810}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/CabreraFES17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/ShahriarB17, author = {Hossain Shahriar and William Bond}, title = {Towards an Attack Signature Generation Framework for Intrusion Detection Systems}, booktitle = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017}, pages = {597--603}, year = {2017}, crossref = {DBLP:conf/dasc/2017}, url = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.106}, doi = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.106}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/ShahriarB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/BuneevaR17, author = {Nadezda Buneeva and Andreas Reinhardt}, title = {{AMBAL:} Realistic load signature generation for load disaggregation performance evaluation}, booktitle = {2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017}, pages = {443--448}, year = {2017}, crossref = {DBLP:conf/smartgridcomm/2017}, url = {https://doi.org/10.1109/SmartGridComm.2017.8340657}, doi = {10.1109/SMARTGRIDCOMM.2017.8340657}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/BuneevaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-08336, author = {Eli David and Nathan S. Netanyahu}, title = {DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification}, journal = {CoRR}, volume = {abs/1711.08336}, year = {2017}, url = {http://arxiv.org/abs/1711.08336}, eprinttype = {arXiv}, eprint = {1711.08336}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-08336.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShaoKVP16, author = {Min Shao and Min Sik Kim and Victor C. Valgenti and Jungkeun Park}, title = {Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {8}, pages = {2090--2099}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015EDP7483}, doi = {10.1587/TRANSINF.2015EDP7483}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShaoKVP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TamuraI16, author = {Masato Tamura and Makoto Ikeda}, title = {Montgomery Multiplier Design for {ECDSA} Signature Generation Processor}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {12}, pages = {2444--2452}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.2444}, doi = {10.1587/TRANSFUN.E99.A.2444}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TamuraI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SalazarTP16, author = {Jos{\'{e}} Luis Salazar and Jos{\'{e}} Luis Tornos and Joan Josep Piles}, title = {Efficient ways of prime number generation for ring signatures}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {1}, pages = {33--36}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2014.0547}, doi = {10.1049/IET-IFS.2014.0547}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SalazarTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asscc/TamuraI16, author = {Masato Tamura and Makoto Ikeda}, title = {1.68{\(\mu\)}J/signature-generation 256-bit {ECDSA} over GF(p) signature generator for IoT devices}, booktitle = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2016, Toyama, Japan, November 7-9, 2016}, pages = {341--344}, year = {2016}, crossref = {DBLP:conf/asscc/2016}, url = {https://doi.org/10.1109/ASSCC.2016.7844205}, doi = {10.1109/ASSCC.2016.7844205}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/asscc/TamuraI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/JupinSD16, author = {Joseph Jupin and Justin Y. Shi and Eduard C. Dragut}, title = {{PSH:} {A} probabilistic signature hash method with hash neighborhood candidate generation for fast edit-distance string comparison on big data}, booktitle = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, pages = {122--127}, year = {2016}, crossref = {DBLP:conf/bigdataconf/2016}, url = {https://doi.org/10.1109/BigData.2016.7840596}, doi = {10.1109/BIGDATA.2016.7840596}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/JupinSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BohmerR16, author = {Kristof B{\"{o}}hmer and Stefanie Rinderle{-}Ma}, title = {Automatic Signature Generation for Anomaly Detection in Business Process Instance Data}, booktitle = {Enterprise, Business-Process and Information Systems Modeling - 17th International Conference, {BPMDS} 2016, 21st International Conference, {EMMSAD} 2016, Held at CAiSE 2016, Ljubljana, Slovenia, June 13-14, 2016, Proceedings}, pages = {196--211}, year = {2016}, crossref = {DBLP:conf/caise/2016bpmds}, url = {https://doi.org/10.1007/978-3-319-39429-9\_13}, doi = {10.1007/978-3-319-39429-9\_13}, timestamp = {Fri, 19 Mar 2021 08:43:31 +0100}, biburl = {https://dblp.org/rec/conf/caise/BohmerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/SowaSYM16, author = {Taiki Sowa and Suguru Sunada and Yasushi Yamazaki and Takeru Miyazaki}, title = {Biometric Bit String Generation from Handwritten Signatures on Smart Device}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {662--665}, year = {2016}, crossref = {DBLP:conf/ic-nc/2016}, url = {https://doi.org/10.1109/CANDAR.2016.0118}, doi = {10.1109/CANDAR.2016.0118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/SowaSYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/Kim0X16, author = {Jongik Kim and Chen Li and Xiaohui Xie}, title = {Hobbes3: Dynamic generation of variable-length signatures for efficient approximate subsequence mappings}, booktitle = {32nd {IEEE} International Conference on Data Engineering, {ICDE} 2016, Helsinki, Finland, May 16-20, 2016}, pages = {169--180}, year = {2016}, crossref = {DBLP:conf/icde/2016}, url = {https://doi.org/10.1109/ICDE.2016.7498238}, doi = {10.1109/ICDE.2016.7498238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/Kim0X16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfhr/CabreraCFBMCAP16, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Sukalpa Chanda and Miguel A. Ferrer and Chayan Kumar Banerjee and Anirban Majumdar and Cristina Carmona{-}Duarte and Parikshit Acharya and Umapada Pal}, title = {Multiple Generation of Bengali Static Signatures}, booktitle = {15th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2016, Shenzhen, China, October 23-26, 2016}, pages = {42--47}, year = {2016}, crossref = {DBLP:conf/icfhr/2016}, url = {https://doi.org/10.1109/ICFHR.2016.0021}, doi = {10.1109/ICFHR.2016.0021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/CabreraCFBMCAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/ChoiLCKK16a, author = {Sunoh Choi and Jooyoung Lee and Yangseo Choi and Jonghyun Kim and Ikkyun Kim}, title = {Hierarchical network signature clustering and generation}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2016, Jeju Island, South Korea, October 19-21, 2016}, pages = {1191--1193}, year = {2016}, crossref = {DBLP:conf/ictc/2016}, url = {https://doi.org/10.1109/ICTC.2016.7763403}, doi = {10.1109/ICTC.2016.7763403}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ictc/ChoiLCKK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwci/ChakrabortyRRU16, author = {Narayan Ranjan Chakraborty and Muhammad Taifur Rahman and Md. Ekhlasur Rahman and Mohammad Shorif Uddin}, title = {Generation and verification of digital signature with two factor authentication}, booktitle = {2016 International Workshop on Computational Intelligence {(IWCI} 2016), Dhaka, Bangladesh, December 12-13, 2016}, pages = {131--135}, year = {2016}, crossref = {DBLP:conf/iwci/2016}, url = {https://doi.org/10.1109/IWCI.2016.7860353}, doi = {10.1109/IWCI.2016.7860353}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/iwci/ChakrabortyRRU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Vasilomanolakis16a, author = {Emmanouil Vasilomanolakis and Shreyas Srinivasa and Carlos Garcia Cordero and Max M{\"{u}}hlh{\"{a}}user}, title = {Multi-stage attack detection and signature generation with {ICS} honeypots}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {1227--1232}, year = {2016}, crossref = {DBLP:conf/noms/2016}, url = {https://doi.org/10.1109/NOMS.2016.7502992}, doi = {10.1109/NOMS.2016.7502992}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/Vasilomanolakis16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/BhowmickSMB16, author = {Shib Sankar Bhowmick and Indrajit Saha and Ujjwal Maulik and Debotosh Bhattacharjee}, title = {Identification of miRNA signature using Next-Generation Sequencing data of prostate cancer}, booktitle = {2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 3-5, 2016}, pages = {528--533}, year = {2016}, crossref = {DBLP:conf/rait/2016}, url = {https://doi.org/10.1109/RAIT.2016.7507956}, doi = {10.1109/RAIT.2016.7507956}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/BhowmickSMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcloud/ShangPLL16, author = {Tao Shang and Tianli Peng and Qi Lei and Jianwei Liu}, title = {Homomorphic Signature for Generation-based Network Coding}, booktitle = {2016 {IEEE} International Conference on Smart Cloud, SmartCloud 2016, New York, NY, USA, November 18-20, 2016}, pages = {269--273}, year = {2016}, crossref = {DBLP:conf/smartcloud/2016}, url = {https://doi.org/10.1109/SmartCloud.2016.59}, doi = {10.1109/SMARTCLOUD.2016.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartcloud/ShangPLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/WangW16, author = {Jie Wang and Jie Wu}, title = {A Novel Signature Generation Approach in Noisy Environments for Detecting Polymorphic Worm}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, pages = {109--121}, year = {2016}, crossref = {DBLP:conf/spaccs/2016}, url = {https://doi.org/10.1007/978-3-319-49148-6\_10}, doi = {10.1007/978-3-319-49148-6\_10}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Garcia-TeodoroD15, author = {Pedro Garc{\'{\i}}a{-}Teodoro and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and Juan E. Tapiador and Rolando Salazar{-}Hern{\'{a}}ndez}, title = {Automatic generation of {HTTP} intrusion signatures by selective identification of anomalies}, journal = {Comput. Secur.}, volume = {55}, pages = {159--174}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.09.007}, doi = {10.1016/J.COSE.2015.09.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Garcia-TeodoroD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Horng15, author = {Gwoboa Horng}, title = {Accelerating {DSA} Signature Generation}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {121--125}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915262}, doi = {10.1080/01611194.2014.915262}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Horng15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssc/KuzunoT15, author = {Hiroki Kuzuno and Satoshi Tonami}, title = {Detection of sensitive information leakage in Android applications using signature generation}, journal = {Int. J. Space Based Situated Comput.}, volume = {5}, number = {1}, pages = {53--62}, year = {2015}, url = {https://doi.org/10.1504/IJSSC.2015.067998}, doi = {10.1504/IJSSC.2015.067998}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssc/KuzunoT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HaoWLR15, author = {Sun Hao and Wen Wang and Huabiao Lu and Peige Ren}, title = {AutoMal: automatic clustering and signature generation for malwares based on the network flow}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1845--1854}, year = {2015}, url = {https://doi.org/10.1002/sec.1029}, doi = {10.1002/SEC.1029}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HaoWLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TanT15, author = {Yang Tan and Shaohua Tang}, title = {Two Approaches to Build {UOV} Variants with Shorter Private Key and Faster Signature Generation}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, pages = {57--74}, year = {2015}, crossref = {DBLP:conf/cisc/2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_4}, doi = {10.1007/978-3-319-38898-4\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TanT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangH15, author = {Jie Wang and Xiaoxian He}, title = {A Novel Signature Generation Approach for Polymorphic Worms}, booktitle = {Algorithms and Architectures for Parallel Processing - 15th International Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part {III}}, pages = {369--382}, year = {2015}, crossref = {DBLP:conf/ica3pp/2015-3}, url = {https://doi.org/10.1007/978-3-319-27137-8\_28}, doi = {10.1007/978-3-319-27137-8\_28}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/DavidN15, author = {Omid E. David and Nathan S. Netanyahu}, title = {DeepSign: Deep learning for automatic malware signature generation and classification}, booktitle = {2015 International Joint Conference on Neural Networks, {IJCNN} 2015, Killarney, Ireland, July 12-17, 2015}, pages = {1--8}, year = {2015}, crossref = {DBLP:conf/ijcnn/2015}, url = {https://doi.org/10.1109/IJCNN.2015.7280815}, doi = {10.1109/IJCNN.2015.7280815}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/DavidN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XuLMMBNA15, author = {Qiang Xu and Yong Liao and Stanislav Miskovic and Zhuoqing Morley Mao and Mario Baldi and Antonio Nucci and Thomas Andrews}, title = {Automatic generation of mobile app signatures from traffic observations}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {1481--1489}, year = {2015}, crossref = {DBLP:conf/infocom/2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218526}, doi = {10.1109/INFOCOM.2015.7218526}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/XuLMMBNA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WangH15, author = {Jie Wang and Xiaoxian He}, title = {A Signature Generation Approach Based on Clustering for Polymorphic Worm}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, pages = {84--96}, year = {2015}, crossref = {DBLP:conf/intrust/2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_6}, doi = {10.1007/978-3-319-31550-8\_6}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CashDK15, author = {David Cash and Rafael Dowsley and Eike Kiltz}, title = {Digital Signatures from Strong {RSA} without Prime Generation}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, pages = {217--235}, year = {2015}, crossref = {DBLP:conf/pkc/2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_10}, doi = {10.1007/978-3-662-46447-2\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CashDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/YangWZ14, author = {Lili Yang and Jie Wang and Ping Zhong}, title = {Combining Supervised and Unsupervised Learning for Automatic Attack Signature Generation System}, booktitle = {Algorithms and Architectures for Parallel Processing - 14th International Conference, {ICA3PP} 2014, Dalian, China, August 24-27, 2014. Proceedings, Part {I}}, pages = {607--618}, year = {2014}, crossref = {DBLP:conf/ica3pp/2014-1}, url = {https://doi.org/10.1007/978-3-319-11197-1\_47}, doi = {10.1007/978-3-319-11197-1\_47}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/YangWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfhr/CabreraGMFG14, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Marta Gomez{-}Barrero and Aythami Morales and Miguel Angel Ferrer{-}Ballester and Javier Galbally}, title = {Generation of Enhanced Synthetic Off-Line Signatures Based on Real On-Line Data}, booktitle = {14th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2014, Crete, Greece, September 1-4, 2014}, pages = {482--487}, year = {2014}, crossref = {DBLP:conf/icfhr/2014}, url = {https://doi.org/10.1109/ICFHR.2014.87}, doi = {10.1109/ICFHR.2014.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/CabreraGMFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/AydinAB14, author = {Abdulbaki Aydin and Muath Alkhalaf and Tevfik Bultan}, title = {Automated Test Generation from Vulnerability Signatures}, booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, {USA}}, pages = {193--202}, year = {2014}, crossref = {DBLP:conf/icst/2014}, url = {https://doi.org/10.1109/ICST.2014.32}, doi = {10.1109/ICST.2014.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/AydinAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/HobeikaPLTBA14, author = {Christelle Hobeika and Simon Pichette and M. A. Leonard and Claude Thibeault and Jean{-}Fran{\c{c}}ois Boland and Yves Audet}, title = {Multi-abstraction level signature generation and comparison based on radiation single event upset}, booktitle = {2014 {IEEE} 20th International On-Line Testing Symposium, {IOLTS} 2014, Platja d'Aro, Girona, Spain, July 7-9, 2014}, pages = {212--215}, year = {2014}, crossref = {DBLP:conf/iolts/2014}, url = {https://doi.org/10.1109/IOLTS.2014.6873700}, doi = {10.1109/IOLTS.2014.6873700}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/iolts/HobeikaPLTBA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snds/KaurS14, author = {Ratinder Kaur and Maninder Singh}, title = {Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks}, booktitle = {Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, {SNDS} 2014, Trivandrum, India, March 13-14, 2014, Proceedings}, pages = {298--309}, year = {2014}, crossref = {DBLP:conf/snds/2014}, url = {https://doi.org/10.1007/978-3-642-54525-2\_27}, doi = {10.1007/978-3-642-54525-2\_27}, timestamp = {Sat, 19 Oct 2019 19:58:53 +0200}, biburl = {https://dblp.org/rec/conf/snds/KaurS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KaurS13, author = {Sanmeet Kaur and Maninder Singh}, title = {Automatic Attack Signature Generation Systems: {A} Review}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {6}, pages = {54--61}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.51}, doi = {10.1109/MSP.2013.51}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KaurS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdc/Spencer13, author = {Ross Spencer}, title = {Generation of a Skeleton Corpus of Digital Objects for the Validation and Evaluation of Format Identification Tools and Signatures}, journal = {Int. J. Digit. Curation}, volume = {8}, number = {1}, pages = {120--130}, year = {2013}, url = {https://doi.org/10.2218/ijdc.v8i1.249}, doi = {10.2218/IJDC.V8I1.249}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdc/Spencer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/AltwaijryS13, author = {Hesham Altwaijry and Khalid Shahbar}, title = {{(WHASG)} Automatic {SNORT} Signatures Generation by using Honeypot}, journal = {J. Comput.}, volume = {8}, number = {12}, pages = {3280--3286}, year = {2013}, url = {http://www.jcomputers.us/index.php?m=content\&c=index\&a=show\&catid=113\&id=1510}, doi = {10.4304/JCP.8.12.3280-3286}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/AltwaijryS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/KimC13, author = {Hwan{-}Hee Kim and Mi{-}Jung Choi}, title = {Towards automatic signature generation for identification of HTTP-based applications}, booktitle = {15th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2013, Hiroshima, Japan, September 25-27, 2013}, pages = {1--3}, year = {2013}, crossref = {DBLP:conf/apnoms/2013}, url = {https://ieeexplore.ieee.org/document/6665215/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/KimC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YasudaDTS13, author = {Takanori Yasuda and Jintai Ding and Tsuyoshi Takagi and Kouichi Sakurai}, title = {A variant of rainbow with shorter secret key and faster signature generation}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {57--62}, year = {2013}, crossref = {DBLP:conf/ccs/2013asiapkc}, url = {https://doi.org/10.1145/2484389.2484401}, doi = {10.1145/2484389.2484401}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YasudaDTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/Ferrer-BallesterCM13, author = {Miguel Angel Ferrer{-}Ballester and Mois{\'{e}}s D{\'{\i}}az Cabrera and Aythami Morales}, title = {Synthetic off-line signature image generation}, booktitle = {International Conference on Biometrics, {ICB} 2013, 4-7 June, 2013, Madrid, Spain}, pages = {1--7}, year = {2013}, crossref = {DBLP:conf/icb/2013}, url = {https://doi.org/10.1109/ICB.2013.6612969}, doi = {10.1109/ICB.2013.6612969}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/Ferrer-BallesterCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/KuzunoT13, author = {Hiroki Kuzuno and Satoshi Tonami}, title = {Signature generation for sensitive information leakage in android applications}, booktitle = {Workshops Proceedings of the 29th {IEEE} International Conference on Data Engineering, {ICDE} 2013, Brisbane, Australia, April 8-12, 2013}, pages = {112--119}, year = {2013}, crossref = {DBLP:conf/icde/2013w}, url = {https://doi.org/10.1109/ICDEW.2013.6547438}, doi = {10.1109/ICDEW.2013.6547438}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/KuzunoT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciap/PirloIPOCGR13, author = {Giuseppe Pirlo and Donato Impedovo and Rejean Plamondon and Christian O'Reilly and A. Cozzolongo and R. Gravinese and Andrea Rollo}, title = {Stability of Dynamic Signatures: From the Representation to the Generation Domain}, booktitle = {New Trends in Image Analysis and Processing - {ICIAP} 2013 - {ICIAP} 2013 International Workshops, Naples, Italy, September 9-13, 2013. Proceedings}, pages = {122--130}, year = {2013}, crossref = {DBLP:conf/iciap/2013-w}, url = {https://doi.org/10.1007/978-3-642-41190-8\_14}, doi = {10.1007/978-3-642-41190-8\_14}, timestamp = {Tue, 18 Jun 2019 15:49:52 +0200}, biburl = {https://dblp.org/rec/conf/iciap/PirloIPOCGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13, author = {Huabiao Lu and Baokang Zhao and Xiaofeng Wang and Jinshu Su}, title = {DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, pages = {271--284}, year = {2013}, crossref = {DBLP:conf/ict-eurasia/2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_28}, doi = {10.1007/978-3-642-36818-9\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/LuZWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RafiqueC13, author = {M. Zubair Rafique and Juan Caballero}, title = {{FIRMA:} Malware Clustering and Network Signature Generation with Mixed Network Behaviors}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, pages = {144--163}, year = {2013}, crossref = {DBLP:conf/raid/2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_8}, doi = {10.1007/978-3-642-41284-4\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/RafiqueC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-4045, author = {Hiroki Kuzuno and Satoshi Tonami}, title = {Signature Generation for Sensitive Information Leakage in Android Applications}, journal = {CoRR}, volume = {abs/1305.4045}, year = {2013}, url = {http://arxiv.org/abs/1305.4045}, eprinttype = {arXiv}, eprint = {1305.4045}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-4045.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/VenckauskasJMM12, author = {Algimantas Venckauskas and Nerijus Jusas and Irena Mikuckiene and Stasys Maciulevicius}, title = {Generation of the Secret Encryption Key Using the Signature of the Embedded System}, journal = {Inf. Technol. Control.}, volume = {41}, number = {4}, pages = {368--375}, year = {2012}, url = {https://doi.org/10.5755/j01.itc.41.4.1162}, doi = {10.5755/J01.ITC.41.4.1162}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/VenckauskasJMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/VogelRS12, author = {Michael Vogel and Ren{\'{e}} Rietz and Sebastian Schmerl}, title = {Automated Generation of Precise Signatures}, journal = {Prax. Inf.verarb. Kommun.}, volume = {35}, number = {1}, pages = {40--45}, year = {2012}, url = {https://doi.org/10.1515/pik-2012-0007}, doi = {10.1515/PIK-2012-0007}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/VogelRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/GalballyFOP12, author = {Javier Galbally and Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia and R{\'{e}}jean Plamondon}, title = {Synthetic on-line signature generation. Part {II:} Experimental validation}, journal = {Pattern Recognit.}, volume = {45}, number = {7}, pages = {2622--2632}, year = {2012}, url = {https://doi.org/10.1016/j.patcog.2011.12.007}, doi = {10.1016/J.PATCOG.2011.12.007}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pr/GalballyFOP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/GalballyPFO12, author = {Javier Galbally and R{\'{e}}jean Plamondon and Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia}, title = {Synthetic on-line signature generation. Part {I:} Methodology and algorithms}, journal = {Pattern Recognit.}, volume = {45}, number = {7}, pages = {2610--2621}, year = {2012}, url = {https://doi.org/10.1016/j.patcog.2011.12.011}, doi = {10.1016/J.PATCOG.2011.12.011}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/GalballyPFO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccomm/SerbP12, author = {Mihai Serb and Victor Valeriu Patriciu}, title = {Using MTMs to secure electronic signatures generation}, booktitle = {9th International Conference on Communications, {COMM} 2012, Bucharest, Romania, June 21-23, 2012}, pages = {315--318}, year = {2012}, crossref = {DBLP:conf/iccomm/2012}, url = {https://doi.org/10.1109/ICComm.2012.6262538}, doi = {10.1109/ICCOMM.2012.6262538}, timestamp = {Thu, 07 Apr 2022 14:06:59 +0200}, biburl = {https://dblp.org/rec/conf/iccomm/SerbP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/visapp/DOrazioG12, author = {Tiziana D'Orazio and Cataldo Guaragnella}, title = {A Graph-based Signature Generation for People Re-identification in a Multi-camera Surveillance System}, booktitle = {{VISAPP} 2012 - Proceedings of the International Conference on Computer Vision Theory and Applications, Volume 1, Rome, Italy, 24-26 February, 2012}, pages = {414--417}, year = {2012}, crossref = {DBLP:conf/visapp/2012-1}, timestamp = {Fri, 25 May 2012 14:48:14 +0200}, biburl = {https://dblp.org/rec/conf/visapp/DOrazioG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Hu11, author = {Xin Hu}, title = {Large Scale Malware Analysis, Detection and Signature Generation}, school = {University of Michigan, {USA}}, year = {2011}, url = {https://hdl.handle.net/2027.42/89760}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Hu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/LeeC11, author = {Mn{-}Ta Lee and Hsuan T. Chang}, title = {On the pinned field image binarization for signature generation in image ownership verification method}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2011}, pages = {44}, year = {2011}, url = {https://doi.org/10.1186/1687-6180-2011-44}, doi = {10.1186/1687-6180-2011-44}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/LeeC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KongJGZLX11, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} semantics aware signature generation for polymorphic worm detection}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {269--283}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0132-7}, doi = {10.1007/S10207-011-0132-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KongJGZLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/TangXL11, author = {Yong Tang and Bin Xiao and Xicheng Lu}, title = {Signature Tree Generation for Polymorphic Worms}, journal = {{IEEE} Trans. Computers}, volume = {60}, number = {4}, pages = {565--579}, year = {2011}, url = {https://doi.org/10.1109/TC.2010.130}, doi = {10.1109/TC.2010.130}, timestamp = {Sun, 23 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/TangXL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/ShabtaiME11, author = {Asaf Shabtai and Eitan Menahem and Yuval Elovici}, title = {F-Sign: Automatic, Function-Based Signature Generation for Malware}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {41}, number = {4}, pages = {494--508}, year = {2011}, url = {https://doi.org/10.1109/TSMCC.2010.2068544}, doi = {10.1109/TSMCC.2010.2068544}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/ShabtaiME11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/ScheuermannBH11, author = {Dirk Scheuermann and Bastian Wolfgruber and Olaf Henniger}, title = {On biometric key generation from handwritten signatures}, booktitle = {{BIOSIG} 2011 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 08.-09. September 2011 in Darmstadt, Germany}, pages = {103--114}, year = {2011}, crossref = {DBLP:conf/biosig/2011}, url = {https://dl.gi.de/handle/20.500.12116/18532}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/ScheuermannBH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/valuetools/SzaboTTMS11, author = {G{\'{e}}za Szab{\'{o}} and Zolt{\'{a}}n Richard Tur{\'{a}}nyi and L{\'{a}}szl{\'{o}} Toka and S{\'{a}}ndor Moln{\'{a}}r and Alysson Santos}, title = {Automatic protocol signature generation framework for deep packet inspection}, booktitle = {5th International {ICST} Conference on Performance Evaluation Methodologies and Tools Communications, {VALUETOOLS} '11, Paris, France, May 16-20, 2011}, pages = {291--299}, year = {2011}, crossref = {DBLP:conf/valuetools/2011}, url = {https://doi.org/10.4108/icst.valuetools.2011.245606}, doi = {10.4108/ICST.VALUETOOLS.2011.245606}, timestamp = {Thu, 14 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/valuetools/SzaboTTMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vts/BanerjeeSDC11, author = {Aritra Banerjee and Shreyas Sen and Shyam Kumar Devarakond and Abhijit Chatterjee}, title = {Automatic test stimulus generation for accurate diagnosis of {RF} systems using transient response signatures}, booktitle = {29th {IEEE} {VLSI} Test Symposium, {VTS} 2011, May 1-5, 2011, Dana Point, California, {USA}}, pages = {58--63}, year = {2011}, crossref = {DBLP:conf/vts/2011}, url = {https://doi.org/10.1109/VTS.2011.5783755}, doi = {10.1109/VTS.2011.5783755}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/vts/BanerjeeSDC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KattiK10, author = {Rajendra S. Katti and Rajesh G. Kavasseri}, title = {Nonce Generation For The Digital Signature Standard}, journal = {Int. J. Netw. Secur.}, volume = {11}, number = {1}, pages = {23--32}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v11-n1/ijns-2010-v11-n1-p23-32.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KattiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangLCFL10, author = {Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and Xing Li}, title = {Thwarting zero-day polymorphic worms with network-level length-based signature generation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {1}, pages = {53--66}, year = {2010}, url = {http://doi.acm.org/10.1145/1816288.1816293}, doi = {10.1145/1816288.1816293}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangLCFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/DurmeL10, author = {Benjamin Van Durme and Ashwin Lall}, title = {Online Generation of Locality Sensitive Hash Signatures}, booktitle = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden, Short Papers}, pages = {231--235}, year = {2010}, crossref = {DBLP:conf/acl/2010s}, url = {https://aclanthology.org/P10-2043/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/DurmeL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/ShezafR10, author = {Daphna Shezaf and Ari Rappoport}, title = {Bilingual Lexicon Generation Using Non-Aligned Signatures}, booktitle = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden}, pages = {98--107}, year = {2010}, crossref = {DBLP:conf/acl/2010}, url = {https://aclanthology.org/P10-1011/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/ShezafR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aict/Garcia-TeodoroMR10, author = {Pedro Garcia{-}Teodoro and Pablo Mu{\~{n}}oz{-}Feldstedt and David Ruete{-}Z{\'{u}}{\~{n}}iga}, title = {Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents}, booktitle = {Sixth Advanced International Conference on Telecommunications, {AICT} 2010, 9-15 May 2010, Barcelona, Spain}, pages = {370--375}, year = {2010}, crossref = {DBLP:conf/aict/2010}, url = {https://doi.org/10.1109/AICT.2010.22}, doi = {10.1109/AICT.2010.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aict/Garcia-TeodoroMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/Shoufan10, author = {Abdulhadi Shoufan}, title = {An {FPGA} Accelerator for Hash Tree Generation in the Merkle Signature Scheme}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications, 6th International Symposium, {ARC} 2010, Bangkok, Thailand, March 17-19, 2010. Proceedings}, pages = {145--156}, year = {2010}, crossref = {DBLP:conf/arc/2010}, url = {https://doi.org/10.1007/978-3-642-12133-3\_15}, doi = {10.1007/978-3-642-12133-3\_15}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/Shoufan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arcs/Fechner10, author = {Bernhard Fechner}, title = {GPU-Based Parallel Signature Scanning and Hash Generation}, booktitle = {{ARCS} '10 - 23th International Conference on Architecture of Computing Systens 2010, Workshop Proceedings, February 22-23, 2010, Hannover, Germany}, pages = {133--138}, year = {2010}, crossref = {DBLP:conf/arcs/2010w}, url = {https://ieeexplore.ieee.org/document/5758996/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arcs/Fechner10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ChaisornSM10, author = {Lekha Chaisorn and Janya Sainui and Corey Manders}, title = {Fast and efficient video signature generation and matching for online video sharing}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2010, September 26-29, Hong Kong, China}, pages = {2129--2132}, year = {2010}, crossref = {DBLP:conf/icip/2010}, url = {https://doi.org/10.1109/ICIP.2010.5652053}, doi = {10.1109/ICIP.2010.5652053}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/ChaisornSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangKP10, author = {Junxing Zhang and Sneha Kumar Kasera and Neal Patwari}, title = {Mobility Assisted Secret Key Generation Using Wireless Link Signatures}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {261--265}, year = {2010}, crossref = {DBLP:conf/infocom/2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462231}, doi = {10.1109/INFCOM.2010.5462231}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/PerdisciLF10, author = {Roberto Perdisci and Wenke Lee and Nick Feamster}, title = {Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces}, booktitle = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA, {USA}}, pages = {391--404}, year = {2010}, crossref = {DBLP:conf/nsdi/2010}, url = {http://www.usenix.org/events/nsdi10/tech/full\_papers/perdisci.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/PerdisciLF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/Tang10, author = {Xinyu Tang}, title = {The Generation of Attack Signatures Based on Virtual Honeypots}, booktitle = {2010 International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2010, Wuhan, China, 8-11 December, 2010}, pages = {435--439}, year = {2010}, crossref = {DBLP:conf/pdcat/2010}, url = {https://doi.org/10.1109/PDCAT.2010.54}, doi = {10.1109/PDCAT.2010.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/Tang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KongJGZLX10, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, pages = {1--19}, year = {2010}, crossref = {DBLP:conf/securecomm/2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_1}, doi = {10.1007/978-3-642-16161-2\_1}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KongJGZLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LuminiN09, author = {Alessandra Lumini and Loris Nanni}, title = {Ensemble of on-line signature matchers based on OverComplete feature generation}, journal = {Expert Syst. Appl.}, volume = {36}, number = {3}, pages = {5291--5296}, year = {2009}, url = {https://doi.org/10.1016/j.eswa.2008.06.069}, doi = {10.1016/J.ESWA.2008.06.069}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LuminiN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiJS09, author = {Lixin Li and James E. Just and R. Sekar}, title = {Online Signature Generation for Windows Systems}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {289--298}, year = {2009}, crossref = {DBLP:conf/acsac/2009}, url = {https://doi.org/10.1109/ACSAC.2009.34}, doi = {10.1109/ACSAC.2009.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadcom/MohammedCVHA09, author = {Mohssen Mohammed Zian Elaabdeen Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Ezzeldien Amin}, title = {Signature Generation for Zero-day Polymorphic Works}, booktitle = {Selected Papers on Broadband Communication, Information Technology {\&} Biomedical Applications, BroadBandCom 2009, Proceedings, Wroc{\l}aw, Poland, July 15-18, 2009}, pages = {295--300}, year = {2009}, crossref = {DBLP:conf/broadcom/2009}, timestamp = {Tue, 18 Apr 2023 16:23:03 +0200}, biburl = {https://dblp.org/rec/conf/broadcom/MohammedCVHA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YaoLZ09, author = {Li Yao and Yu Liu and Yuqing Zhang}, title = {An Integrated Approach to Worm Detection and Automatic Signature Generation}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers}, pages = {371--375}, year = {2009}, crossref = {DBLP:conf/cis/2009-2}, url = {https://doi.org/10.1109/CIS.2009.274}, doi = {10.1109/CIS.2009.274}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YaoLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WyschogrodD09, author = {Daniel Wyschogrod and Jeffrey Dezso}, title = {Using automatic signature generation as a sensor backend}, booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, pages = {29}, year = {2009}, crossref = {DBLP:conf/csiirw/2009}, url = {https://doi.org/10.1145/1558607.1558640}, doi = {10.1145/1558607.1558640}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WyschogrodD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/depcos/Tylman09, author = {Wojciech Tylman}, title = {Data Mining Techniques for Semi-automatic Signature Generation}, booktitle = {Fourth International Conference on Dependability of Computer Systems, DepCos-RELCOMEX '09, Brunow, Poland, June 30 - July 2, 2009}, pages = {210--217}, year = {2009}, crossref = {DBLP:conf/depcos/2009}, url = {https://doi.org/10.1109/DepCoS-RELCOMEX.2009.24}, doi = {10.1109/DEPCOS-RELCOMEX.2009.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/depcos/Tylman09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangWCZ09, author = {Jie Wang and Jianxin Wang and Jianer Chen and Xi Zhang}, title = {An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, year = {2009}, crossref = {DBLP:conf/icc/2009}, url = {https://doi.org/10.1109/ICC.2009.5198721}, doi = {10.1109/ICC.2009.5198721}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangWCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GriffinSHC09, author = {Kent Griffin and Scott Schneider and Xin Hu and Tzi{-}cker Chiueh}, title = {Automatic Generation of String Signatures for Malware Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, pages = {101--120}, year = {2009}, crossref = {DBLP:conf/raid/2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_6}, doi = {10.1007/978-3-642-04342-0\_6}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GriffinSHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsea/LiXYW08, author = {Nan Li and Chunhe Xia and Yi Yang and Haiquan Wang}, title = {An Algorithm for Generation of Attack Signatures Based on Sequences Alignment}, journal = {J. Softw. Eng. Appl.}, volume = {1}, number = {1}, pages = {76--82}, year = {2008}, url = {https://doi.org/10.4236/jsea.2008.11011}, doi = {10.4236/JSEA.2008.11011}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsea/LiXYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrumleyNSWJ08, author = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha}, title = {Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.55}, doi = {10.1109/TDSC.2008.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangLCXRK08, author = {XiaoFeng Wang and Zhuowei Li and Jong Youl Choi and Jun Xu and Michael K. Reiter and Chongkyung Kil}, title = {Fast and Black-box Exploit Detection and Signature Generation for Commodity Software}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {11:1--11:35}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455523}, doi = {10.1145/1455518.1455523}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SathyanarayanKB08, author = {V. Sai Sathyanarayan and Pankaj Kohli and Bezawada Bruhadeshwar}, title = {Signature Generation and Detection of Malware Families}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, pages = {336--349}, year = {2008}, crossref = {DBLP:conf/acisp/2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_25}, doi = {10.1007/978-3-540-70500-0\_25}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SathyanarayanKB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NandaC08, author = {Susanta Nanda and Tzi{-}cker Chiueh}, title = {Execution Trace-Driven Automated Attack Signature Generation}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {195--204}, year = {2008}, crossref = {DBLP:conf/acsac/2008}, url = {https://doi.org/10.1109/ACSAC.2008.58}, doi = {10.1109/ACSAC.2008.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NandaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/BalasubramanianCBRD08, author = {Sundar Balasubramanian and Harold W. Carter and Andrey Bogdanov and Andy Rupp and Jintai Ding}, title = {Fast multivariate signature generation in hardware: The case of rainbow}, booktitle = {19th {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven, Belgium}, pages = {25--30}, year = {2008}, crossref = {DBLP:conf/asap/2008}, url = {https://doi.org/10.1109/ASAP.2008.4580149}, doi = {10.1109/ASAP.2008.4580149}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/BalasubramanianCBRD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bliss/HoqueFH08, author = {Sanaul Hoque and Michael C. Fairhurst and W. Gareth J. Howells}, title = {Evaluating Biometric Encryption Key Generation Using Handwritten Signatures}, booktitle = {2008 {ECSIS} Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, {BLISS} 2008, Edinburgh, UK, 4-6 August 2008}, pages = {17--22}, year = {2008}, crossref = {DBLP:conf/bliss/2008}, url = {https://doi.org/10.1109/BLISS.2008.8}, doi = {10.1109/BLISS.2008.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bliss/HoqueFH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadcom/MohammedC08, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan}, title = {Fast Automated Signature Generation for Polymorphic Worms Using Double-Honeynet}, booktitle = {2008 Third International Conference on Broadband Communications, Information Technology {\&} Biomedical Applications, BroadCom 2008, 23-26 November 2008, Pretoria, Gauteng, South Africa}, pages = {142--147}, year = {2008}, crossref = {DBLP:conf/broadcom/2008}, url = {https://doi.org/10.1109/BROADCOM.2008.21}, doi = {10.1109/BROADCOM.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/broadcom/MohammedC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08, author = {Urko Zurutuza and Roberto Uribeetxeberria and Diego Zamboni}, title = {A data mining approach for analysis of worm activity through automatic signature generation}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {61--70}, year = {2008}, crossref = {DBLP:conf/ccs/2008aisec}, url = {https://doi.org/10.1145/1456377.1456394}, doi = {10.1145/1456377.1456394}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZurutuzaUZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/LiXYW08, author = {Nan Li and Chunhe Xia and Yi Yang and Haiquan Wang}, title = {An Algorithm for Generation of Attack Signatures Based on Sequences Alignment}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {964--969}, year = {2008}, crossref = {DBLP:conf/csse/2008-3}, url = {https://doi.org/10.1109/CSSE.2008.555}, doi = {10.1109/CSSE.2008.555}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/LiXYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/delta/DoulcierFR08, author = {M. Doulcier and Marie{-}Lise Flottes and Bruno Rouzeyre}, title = {AES-Based {BIST:} Self-Test, Test Pattern Generation and Signature Analysis}, booktitle = {4th {IEEE} International Symposium on Electronic Design, Test and Applications, {DELTA} 2008, Hong Kong, January 23-25, 2008}, pages = {314--321}, year = {2008}, crossref = {DBLP:conf/delta/2008}, url = {https://doi.org/10.1109/DELTA.2008.86}, doi = {10.1109/DELTA.2008.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/delta/DoulcierFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiWLR08, author = {Zhuowei Li and XiaoFeng Wang and Zhenkai Liang and Michael K. Reiter}, title = {{AGIS:} Towards automatic generation of infection signatures}, booktitle = {The 38th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings}, pages = {237--246}, year = {2008}, crossref = {DBLP:conf/dsn/2008}, url = {https://doi.org/10.1109/DSN.2008.4630092}, doi = {10.1109/DSN.2008.4630092}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiWLR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/BalasubramanianBRDC08, author = {Sundar Balasubramanian and Andrey Bogdanov and Andy Rupp and Jintai Ding and Harold W. Carter}, title = {Fast Multivariate Signature Generation in Hardware: The Case of Rainbow}, booktitle = {16th {IEEE} International Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2008, 14-15 April 2008, Stanford, Palo Alto, California, {USA}}, pages = {281--282}, year = {2008}, crossref = {DBLP:conf/fccm/2008}, url = {https://doi.org/10.1109/FCCM.2008.52}, doi = {10.1109/FCCM.2008.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/BalasubramanianBRDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/YaoLGZY08, author = {Yu Yao and Junwei Lv and Fuxiang Gao and Yanfang Zhang and Ge Yu}, title = {Behavior-Based Worm Detection and Signature Generation}, booktitle = {International Multisymposiums on Computer and Computational Sciences, {IMSCCS} 2008, Shanghai, China, October 18-20, 2008}, pages = {124--131}, year = {2008}, crossref = {DBLP:conf/imsccs/2008}, url = {https://doi.org/10.1109/IMSCCS.2008.29}, doi = {10.1109/IMSCCS.2008.29}, timestamp = {Thu, 06 Feb 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/YaoLGZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VenkataramanBS08, author = {Shobha Venkataraman and Avrim Blum and Dawn Song}, title = {Limits of Learning-based Signature Generation with Adversaries}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, year = {2008}, crossref = {DBLP:conf/ndss/2008}, url = {https://www.ndss-symposium.org/ndss2008/limits-of-learning-based-signature-generation-with-adversaries/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VenkataramanBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/ParkWKH08, author = {Byung{-}Chul Park and Young J. Won and Myung{-}Sup Kim and James W. Hong}, title = {Towards automated application signature generation for traffic identification}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, pages = {160--167}, year = {2008}, crossref = {DBLP:conf/noms/2008}, url = {https://doi.org/10.1109/NOMS.2008.4575130}, doi = {10.1109/NOMS.2008.4575130}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/ParkWKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/XiaoHCL08, author = {Fengtao Xiao and Huaping Hu and Xin Chen and Bo Liu}, title = {{ASG} Automated Signature Generation for Worm-Like {P2P} Traffic Patterns}, booktitle = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, pages = {654--660}, year = {2008}, crossref = {DBLP:conf/waim/2008}, url = {https://doi.org/10.1109/WAIM.2008.95}, doi = {10.1109/WAIM.2008.95}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/XiaoHCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiHPP07, author = {Min Cai and Kai Hwang and Jianping Pan and Christos Papadopoulos}, title = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {88--104}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1000}, doi = {10.1109/TDSC.2007.1000}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaiHPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HwangCCQ07, author = {Kai Hwang and Min Cai and Ying Chen and Min Qin}, title = {Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {41--55}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.9}, doi = {10.1109/TDSC.2007.9}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HwangCCQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GundyCSV07, author = {Matthew Van Gundy and Hao Chen and Zhendong Su and Giovanni Vigna}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {74--85}, year = {2007}, crossref = {DBLP:conf/acsac/2007}, url = {https://doi.org/10.1109/ACSAC.2007.42}, doi = {10.1109/ACSAC.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/faw/JoSL07, author = {Je{-}Gyeong Jo and Jong{-}Won Seo and Hyung{-}Woo Lee}, title = {Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint}, booktitle = {Frontiers in Algorithmics, First Annual International Workshop, {FAW} 2007, Lanzhou, China, August 1-3, 2007, Proceedings}, pages = {38--49}, year = {2007}, crossref = {DBLP:conf/faw/2007}, url = {https://doi.org/10.1007/978-3-540-73814-5\_4}, doi = {10.1007/978-3-540-73814-5\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/faw/JoSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LiWCF07, author = {Zhichun Li and Lanjia Wang and Yan Chen and Zhi Fu}, title = {Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {164--173}, year = {2007}, crossref = {DBLP:conf/icnp/2007}, url = {https://doi.org/10.1109/ICNP.2007.4375847}, doi = {10.1109/ICNP.2007.4375847}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LiWCF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/TanakaSEY07, author = {Hideaki Tanaka and Shoichi Sasaki and Isao Echizen and Hiroshi Yoshiura}, title = {Secure Generation of Digital Signature on Compromised Computer}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {12--15}, year = {2007}, crossref = {DBLP:conf/iih-msp/2007}, url = {https://doi.org/10.1109/IIH-MSP.2007.276}, doi = {10.1109/IIH-MSP.2007.276}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/TanakaSEY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/KimLK07a, author = {Sijung Kim and Geuk Lee and Bonghan Kim}, title = {The Design and Testing of Automated Signature Generation Engine for Worms Detection}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, First {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings}, pages = {956--963}, year = {2007}, crossref = {DBLP:conf/kesamsta/2007}, url = {https://doi.org/10.1007/978-3-540-72830-6\_101}, doi = {10.1007/978-3-540-72830-6\_101}, timestamp = {Thu, 16 Mar 2023 20:00:31 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/KimLK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/Nait-Sidi-MohWRG07, author = {Ahmed Nait{-}Sidi{-}Moh and Maxime Wack and Damien Rieupet and Jaafar Gaber}, title = {On an innovative generation method of electronic signatures: comparative study with traditional hash functions simulation}, booktitle = {Proceedings of the First International Conference on Research Challenges in Information Science, {RCIS} 2007, Ouarzazate, Morocco, April 23-26, 2007}, pages = {357--360}, year = {2007}, crossref = {DBLP:conf/rcis/2007}, timestamp = {Mon, 18 Jan 2021 08:56:35 +0100}, biburl = {https://dblp.org/rec/conf/rcis/Nait-Sidi-MohWRG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangJG06, author = {Hao Wang and Somesh Jha and Vinod Ganapathy}, title = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {99--108}, year = {2006}, crossref = {DBLP:conf/acsac/2006}, url = {https://doi.org/10.1109/ACSAC.2006.34}, doi = {10.1109/ACSAC.2006.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangJG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangLXRKC06, author = {XiaoFeng Wang and Zhuowei Li and Jun Xu and Michael K. Reiter and Chongkyung Kil and Jong Youl Choi}, title = {Packet vaccine: black-box exploit detection and signature generation}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {37--46}, year = {2006}, crossref = {DBLP:conf/ccs/2006usa}, url = {https://doi.org/10.1145/1180405.1180412}, doi = {10.1145/1180405.1180412}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangLXRKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/PortokalidisSB06, author = {Georgios Portokalidis and Asia Slowinska and Herbert Bos}, title = {Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation}, booktitle = {Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006}, pages = {15--27}, year = {2006}, crossref = {DBLP:conf/eurosys/2006}, url = {https://doi.org/10.1145/1217935.1217938}, doi = {10.1145/1217935.1217938}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/PortokalidisSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/YipGNT06, author = {Wai Kuan Yip and Alwyn Goh and David Ngo Chek Ling and Andrew Teoh Beng Jin}, title = {Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2006, Hong Kong, China, January 5-7, 2006, Proceedings}, pages = {509--515}, year = {2006}, crossref = {DBLP:conf/icb/2006}, url = {https://doi.org/10.1007/11608288\_68}, doi = {10.1007/11608288\_68}, timestamp = {Thu, 17 Oct 2019 12:39:20 +0200}, biburl = {https://dblp.org/rec/conf/icb/YipGNT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mrcs/WahlHHI06, author = {Alain Wahl and Jean Hennebert and Andreas Humm and Rolf Ingold}, title = {Generation and Evaluation of Brute-Force Signature Forgeries}, booktitle = {Multimedia Content Representation, Classification and Security, International Workshop, {MRCS} 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings}, pages = {2--9}, year = {2006}, crossref = {DBLP:conf/mrcs/2006}, url = {https://doi.org/10.1007/11848035\_2}, doi = {10.1007/11848035\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mrcs/WahlHHI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChungM06, author = {Simon P. Chung and Aloysius K. Mok}, title = {Allergy Attack Against Automatic Signature Generation}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, pages = {61--80}, year = {2006}, crossref = {DBLP:conf/raid/2006}, url = {https://doi.org/10.1007/11856214\_4}, doi = {10.1007/11856214\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChungM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06, author = {David Brumley and James Newsome and Dawn Xiaodong Song and Hao Wang and Somesh Jha}, title = {Towards Automatic Generation of Vulnerability-Based Signatures}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {2--16}, year = {2006}, crossref = {DBLP:conf/sp/2006}, url = {https://doi.org/10.1109/SP.2006.41}, doi = {10.1109/SP.2006.41}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiSCKC06, author = {Zhichun Li and Manan Sanghi and Yan Chen and Ming{-}Yang Kao and Brian Chavez}, title = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {32--47}, year = {2006}, crossref = {DBLP:conf/sp/2006}, url = {https://doi.org/10.1109/SP.2006.18}, doi = {10.1109/SP.2006.18}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiSCKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiangS05, author = {Zhenkai Liang and R. Sekar}, title = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {215--224}, year = {2005}, crossref = {DBLP:conf/acsac/2005}, url = {https://doi.org/10.1109/CSAC.2005.12}, doi = {10.1109/CSAC.2005.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiangS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiangS05, author = {Zhenkai Liang and R. Sekar}, title = {Fast and automated generation of attack signatures: a basis for building self-protecting servers}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {213--222}, year = {2005}, crossref = {DBLP:conf/ccs/2005}, url = {https://doi.org/10.1145/1102120.1102150}, doi = {10.1145/1102120.1102150}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiangS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/DyerN05, author = {Justin S. Dyer and Balasubramaniam Natarajan}, title = {A new deterministic algorithm for {DS-CDMA} signature sequence generation}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2005, Seoul, Korea, 16-20 May 2005}, pages = {2348--2351}, year = {2005}, crossref = {DBLP:conf/icc/2005}, url = {https://doi.org/10.1109/ICC.2005.1494755}, doi = {10.1109/ICC.2005.1494755}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/DyerN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism/SimkhadaTWN05, author = {Kumar Simkhada and Hiroshi Tsunoda and Yuji Waizumi and Yoshiaki Nemoto}, title = {Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures}, booktitle = {Seventh {IEEE} International Symposium on Multimedia {(ISM} 2005), 12-14 December 2005, Irvine, CA, {USA}}, pages = {680--685}, year = {2005}, crossref = {DBLP:conf/ism/2005}, url = {https://doi.org/10.1109/ISM.2005.49}, doi = {10.1109/ISM.2005.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ism/SimkhadaTWN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangCS05, author = {Ke Wang and Gabriela F. Cretu and Salvatore J. Stolfo}, title = {Anomalous Payload-Based Worm Detection and Signature Generation}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, pages = {227--246}, year = {2005}, crossref = {DBLP:conf/raid/2005}, url = {https://doi.org/10.1007/11663812\_12}, doi = {10.1007/11663812\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TangCR05, author = {Caimu Tang and Anthony T. Chronopoulos and Cauligi S. Raghavendra}, title = {Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {353--364}, year = {2005}, crossref = {DBLP:conf/securecomm/2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.52}, doi = {10.1109/SECURECOMM.2005.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/TangCR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RubinJM05, author = {Shai Rubin and Somesh Jha and Barton P. Miller}, title = {Language-Based Generation and Evaluation of {NIDS} Signatures}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {3--17}, year = {2005}, crossref = {DBLP:conf/sp/2005}, url = {https://doi.org/10.1109/SP.2005.10}, doi = {10.1109/SP.2005.10}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/RubinJM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/GuptaTM04, author = {Alok Gupta and Y. Alex Tung and James R. Marsden}, title = {Digital signature: use and modification to achieve success in next generational e-business processes}, journal = {Inf. Manag.}, volume = {41}, number = {5}, pages = {561--575}, year = {2004}, url = {https://doi.org/10.1016/S0378-7206(03)00090-9}, doi = {10.1016/S0378-7206(03)00090-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/GuptaTM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SameshimaSOM04, author = {Yoshiki Sameshima and Hideaki Saisho and Kazuko Oyanagi and Tsutomu Matsumoto}, title = {Multiparty {DSA} Signature Generation without Simultaneous User Operations}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {87-D}, number = {8}, pages = {2095--2105}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-d\_8\_2095}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SameshimaSOM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MacKenzieR04, author = {Philip D. MacKenzie and Michael K. Reiter}, title = {Two-party generation of {DSA} signatures}, journal = {Int. J. Inf. Sec.}, volume = {2}, number = {3-4}, pages = {218--239}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0041-0}, doi = {10.1007/S10207-004-0041-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MacKenzieR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KwonL04, author = {Taekyoung Kwon and Jaeil Lee}, title = {Practical Digital Signature Generation Using Biometrics}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, pages = {728--737}, year = {2004}, crossref = {DBLP:conf/iccsa/2004-1}, url = {https://doi.org/10.1007/978-3-540-24707-4\_85}, doi = {10.1007/978-3-540-24707-4\_85}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KwonL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0409014, author = {Manoj Kumar}, title = {A Digital Signature with Threshold Generation and Verification}, journal = {CoRR}, volume = {cs.CR/0409014}, year = {2004}, url = {http://arxiv.org/abs/cs.CR/0409014}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0409014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/SadowskiP03, author = {Michael I. Sadowski and John Howard Parish}, title = {Automated generation and refinement of protein signatures: case study with G-protein coupled receptors}, journal = {Bioinform.}, volume = {19}, number = {6}, pages = {727--734}, year = {2003}, url = {https://doi.org/10.1093/bioinformatics/btg075}, doi = {10.1093/BIOINFORMATICS/BTG075}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/SadowskiP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/YoussefA03, author = {Bilal Youssef and Mazen Alamir}, title = {Generic signature generation tool for diagnosis and parametric estimation of multi-variable dynamical nonlinear systems}, booktitle = {42nd {IEEE} Conference on Decision and Control, {CDC} 2003, Maui, Hawaii, USA, December 9-12, 2003}, pages = {966--971}, year = {2003}, crossref = {DBLP:conf/cdc/2003}, url = {https://doi.org/10.1109/CDC.2003.1272692}, doi = {10.1109/CDC.2003.1272692}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/YoussefA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FengW02, author = {Feng Hao and Chan Choong Wah}, title = {Private key generation from on-line handwritten signatures}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {159--164}, year = {2002}, url = {https://doi.org/10.1108/09685220210436949}, doi = {10.1108/09685220210436949}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FengW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MacKenzieR01, author = {Philip D. MacKenzie and Michael K. Reiter}, title = {Two-Party Generation of {DSA} Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, pages = {137--154}, year = {2001}, crossref = {DBLP:conf/crypto/2001}, url = {https://doi.org/10.1007/3-540-44647-8\_8}, doi = {10.1007/3-540-44647-8\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MacKenzieR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Huhnlein01, author = {Detlef H{\"{u}}hnlein}, title = {Faster Generation of NICE-Schnorr-Type Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, pages = {1--12}, year = {2001}, crossref = {DBLP:conf/ctrsa/2001}, url = {https://doi.org/10.1007/3-540-45353-9\_1}, doi = {10.1007/3-540-45353-9\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Huhnlein01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Ramesh01, author = {D. Ramesh}, title = {A Twin Algorithm for Efficient Generation of Digital Signatures}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, pages = {267--274}, year = {2001}, crossref = {DBLP:conf/indocrypt/2001}, url = {https://doi.org/10.1007/3-540-45311-3\_25}, doi = {10.1007/3-540-45311-3\_25}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Ramesh01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwvf/Nishida01, author = {Hirobumi Nishida}, title = {Robust Structural Indexing through Quasi-Invariant Shape Signatures and Feature Generation}, booktitle = {Visual Form 2001, 4th International Workshop on Visual Form, IWVF-4, Capri, Italy, May 28-30, 2001, Proceedings}, pages = {696--705}, year = {2001}, crossref = {DBLP:conf/iwvf/2001}, url = {https://doi.org/10.1007/3-540-45129-3\_64}, doi = {10.1007/3-540-45129-3\_64}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iwvf/Nishida01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JakobssonW01, author = {Markus Jakobsson and Susanne Wetzel}, title = {Secure Server-Aided Signature Generation}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, pages = {383--401}, year = {2001}, crossref = {DBLP:conf/pkc/2001}, url = {https://doi.org/10.1007/3-540-44586-2\_28}, doi = {10.1007/3-540-44586-2\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JakobssonW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ats/ShiehLS00, author = {Ming{-}Der Shieh and Hsin{-}Fu Lo and Ming{-}Hwa Sheu}, title = {High-speed generation of {LFSR} signatures}, booktitle = {9th Asian Test Symposium {(ATS} 2000), 4-6 December 2000, Taipei, Taiwan}, pages = {222}, year = {2000}, crossref = {DBLP:conf/ats/2000}, url = {https://doi.org/10.1109/ATS.2000.893629}, doi = {10.1109/ATS.2000.893629}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ats/ShiehLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/YarmanA00, author = {B. Siddik Yarman and Rafet Akdeniz}, title = {Generation of optimum signature base sequences for speech signals}, booktitle = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing. {ICASSP} 2000, 5-9 June, 2000, Hilton Hotel and Convention Center, Istanbul, Turkey}, pages = {1077--1080}, year = {2000}, crossref = {DBLP:conf/icassp/2000}, url = {https://doi.org/10.1109/ICASSP.2000.859150}, doi = {10.1109/ICASSP.2000.859150}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/YarmanA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/Echtle99, author = {Klaus Echtle}, title = {Avoiding Malicious Byzantine Faults by a New Signature Generation Technique}, booktitle = {Dependable Computing - EDCC-3, Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings}, pages = {106--123}, year = {1999}, crossref = {DBLP:conf/edcc/1999}, url = {https://doi.org/10.1007/3-540-48254-7\_9}, doi = {10.1007/3-540-48254-7\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/edcc/Echtle99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/ChakrabartiDAR98, author = {Soumen Chakrabarti and Byron Dom and Rakesh Agrawal and Prabhakar Raghavan}, title = {Scalable Feature Selection, Classification and Signature Generation for Organizing Large Text Databases into Hierarchical Topic Taxonomies}, journal = {{VLDB} J.}, volume = {7}, number = {3}, pages = {163--178}, year = {1998}, url = {https://doi.org/10.1007/s007780050061}, doi = {10.1007/S007780050061}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vldb/ChakrabartiDAR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PoupardS98, author = {Guillaume Poupard and Jacques Stern}, title = {Security Analysis of a Practical "on the fly" Authentication and Signature Generation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, pages = {422--436}, year = {1998}, crossref = {DBLP:conf/eurocrypt/98}, url = {https://doi.org/10.1007/BFb0054143}, doi = {10.1007/BFB0054143}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PoupardS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/KinoshitaS98, author = {Hirotsugu Kinoshita and Masafumi Satoh}, title = {Generation of the signature with the structured information of the image}, booktitle = {9th European Signal Processing Conference, {EUSIPCO} 1998, Island of Rhodes, Greece, 8-11 September, 1998}, pages = {1--4}, year = {1998}, crossref = {DBLP:conf/eusipco/1998}, url = {https://ieeexplore.ieee.org/document/7089552/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/KinoshitaS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsdia/OliveiraKBS97, author = {Claudio de Oliveira and Celso A. A. Kaestner and Fl{\'{a}}vio Bortolozzi and Robert Sabourin}, title = {Generation of Signatures by Deformations}, booktitle = {Advances in Document Image Analysis, First Brazilian Symposium, BSDIA'97, Curitiba, Brazil, November 2-5, 1997, Proceedings}, pages = {283--298}, year = {1997}, crossref = {DBLP:conf/bsdia/1997}, url = {https://doi.org/10.1007/3-540-63791-5\_22}, doi = {10.1007/3-540-63791-5\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/bsdia/OliveiraKBS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spieSR/CelentanoL97, author = {Augusto Celentano and Vincenzo Di Lecce}, title = {FFT-Based Technique for Image-Signature Generation}, booktitle = {Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, February 8-14, 1997}, pages = {457--466}, year = {1997}, crossref = {DBLP:conf/spieSR/1997}, url = {https://doi.org/10.1117/12.263435}, doi = {10.1117/12.263435}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spieSR/CelentanoL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MRaihiN96, author = {David M'Ra{\"{\i}}hi and David Naccache}, title = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {58--61}, year = {1996}, crossref = {DBLP:conf/ccs/1996}, url = {https://doi.org/10.1145/238168.238187}, doi = {10.1145/238168.238187}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MRaihiN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramesD96, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {New Generation of Secure and Practical RSA-Based Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, pages = {173--185}, year = {1996}, crossref = {DBLP:conf/crypto/1996}, url = {https://doi.org/10.1007/3-540-68697-5\_14}, doi = {10.1007/3-540-68697-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramesD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acm/YoungL94, author = {Hwan{-}Seung Yong and Sukho Lee}, title = {Signature File Generation Techniques for Query Processing in Object-Oriented Databases}, booktitle = {Proceedings of the {ACM} 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, {CSC} '94, Phoenix, Arizona, USA, March 8-10, 1994}, pages = {364--371}, year = {1994}, crossref = {DBLP:conf/acm/1994}, url = {https://doi.org/10.1145/197530.197653}, doi = {10.1145/197530.197653}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acm/YoungL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/LengL92, author = {Chun{-}Wu Roger Leng and Dik Lun Lee}, title = {Optimal Weight Assignment for Signature Generation}, journal = {{ACM} Trans. Database Syst.}, volume = {17}, number = {2}, pages = {346--373}, year = {1992}, url = {https://doi.org/10.1145/128903.128907}, doi = {10.1145/128903.128907}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/LengL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Schnorr91, author = {Claus{-}Peter Schnorr}, title = {Efficient Signature Generation by Smart Cards}, journal = {J. Cryptol.}, volume = {4}, number = {3}, pages = {161--174}, year = {1991}, url = {https://doi.org/10.1007/BF00196725}, doi = {10.1007/BF00196725}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Schnorr91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtF91, author = {Yvo Desmedt and Yair Frankel}, title = {Shared Generation of Authenticators and Signatures (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, pages = {457--469}, year = {1991}, crossref = {DBLP:conf/crypto/1991}, url = {https://doi.org/10.1007/3-540-46766-1\_37}, doi = {10.1007/3-540-46766-1\_37}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtF91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OngS90, author = {H. Ong and Claus{-}Peter Schnorr}, title = {Fast Signature Generation With a Fiat Shamir-Like Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, pages = {432--440}, year = {1990}, crossref = {DBLP:conf/eurocrypt/90}, url = {https://doi.org/10.1007/3-540-46877-3\_38}, doi = {10.1007/3-540-46877-3\_38}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OngS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2024-7, editor = {Leonid Reyzin and Douglas Stebila}, title = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {VII}}, series = {Lecture Notes in Computer Science}, volume = {14926}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68394-7}, doi = {10.1007/978-3-031-68394-7}, isbn = {978-3-031-68393-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/crypto/2024-7.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosp/2024, title = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2024, Vienna, Austria, July 8-12, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuroSP60621.2024}, doi = {10.1109/EUROSP60621.2024}, isbn = {979-8-3503-5425-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icic/2024-9, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3}, doi = {10.1007/978-981-97-5606-3}, isbn = {978-981-97-5605-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icic/2024-9.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isvlsi/2024, title = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2024, Knoxville, TN, USA, July 1-3, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ISVLSI61997.2024}, doi = {10.1109/ISVLSI61997.2024}, isbn = {979-8-3503-5411-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2024-2, editor = {Nicky Mouha and Nick Nikiforakis}, title = {Information Security - 27th International Conference, {ISC} 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {15258}, publisher = {Springer}, year = {2025}, url = {https://doi.org/10.1007/978-3-031-75764-8}, doi = {10.1007/978-3-031-75764-8}, isbn = {978-3-031-75763-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/isw/2024-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/kbse/2024, editor = {Vladimir Filkov and Baishakhi Ray and Minghui Zhou}, title = {Proceedings of the 39th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2024, Sacramento, CA, USA, October 27 - November 1, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3691620}, doi = {10.1145/3691620}, isbn = {979-8-4007-1248-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/kbse/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2024, editor = {Eleonora Losiouk and Alessandro Brighente and Mauro Conti and Yousra Aafer and Yanick Fratantonio}, title = {The 27th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2024, Padua, Italy, 30 September 2024- 2 October 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3678890}, doi = {10.1145/3678890}, isbn = {979-8-4007-0959-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/raid/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sai/2024-3, editor = {Kohei Arai}, title = {Intelligent Computing - Proceedings of the 2024 Computing Conference, Volume 3, London, UK, 26-27 June 2024}, series = {Lecture Notes in Networks and Systems}, volume = {1018}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-62269-4}, doi = {10.1007/978-3-031-62269-4}, isbn = {978-3-031-62268-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/sai/2024-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2023, editor = {Nadia El Mrabet and Luca De Feo and Sylvain Duquesne}, title = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14064}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37679-5}, doi = {10.1007/978-3-031-37679-5}, isbn = {978-3-031-37678-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eicc/2023, editor = {Aleksandra Mileva and Steffen Wendzel and Virginia N. L. Franqueira}, title = {Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, {EICC} 2023, Stavanger, Norway, June 14-15, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3590777}, doi = {10.1145/3590777}, isbn = {978-1-4503-9829-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/eicc/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ihci/2023-2, editor = {Bong Jun Choi and Dhananjay Singh and Uma Shanker Tiwary and Wan{-}Young Chung}, title = {Intelligent Human Computer Interaction - 15th International Conference, {IHCI} 2023, Daegu, South Korea, November 8-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14532}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-53830-8}, doi = {10.1007/978-3-031-53830-8}, isbn = {978-3-031-53829-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ihci/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/irps/2023, title = {{IEEE} International Reliability Physics Symposium, {IRPS} 2023, Monterey, CA, USA, March 26-30, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IRPS48203.2023}, doi = {10.1109/IRPS48203.2023}, isbn = {978-1-6654-5672-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/irps/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mwscas/2023, title = {66th {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2023, Tempe, AZ, USA, August 6-9, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MWSCAS57524.2023}, doi = {10.1109/MWSCAS57524.2023}, isbn = {979-8-3503-0210-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/mwscas/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/coolchips/2022, title = {{IEEE} Symposium in Low-Power and High-Speed Chips, {COOL} {CHIPS} 2022, Tokyo, Japan, April 20-22, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COOLCHIPS54332.2022}, doi = {10.1109/COOLCHIPS54332.2022}, isbn = {978-1-6654-1989-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/coolchips/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icpr/2022, title = {26th International Conference on Pattern Recognition, {ICPR} 2022, Montreal, QC, Canada, August 21-25, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICPR56361.2022}, doi = {10.1109/ICPR56361.2022}, isbn = {978-1-6654-9062-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icpr/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cikm/2021, editor = {Gianluca Demartini and Guido Zuccon and J. Shane Culpepper and Zi Huang and Hanghang Tong}, title = {{CIKM} '21: The 30th {ACM} International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3459637}, doi = {10.1145/3459637}, isbn = {978-1-4503-8446-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/cikm/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icmc2/2021, editor = {Debasis Giri and Kim{-}Kwang Raymond Choo and Saminathan Ponnusamy and Weizhi Meng and Sedat Akleylek and Santi Prasad Maity}, title = {Proceedings of the Seventh International Conference on Mathematics and Computing - {ICMC} 2021, Shibpur, India,}, series = {Advances in Intelligent Systems and Computing}, volume = {1412}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-16-6890-6}, doi = {10.1007/978-981-16-6890-6}, isbn = {978-981-16-6889-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icmc2/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/igarss/2021, title = {{IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2021, Brussels, Belgium, July 11-16, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IGARSS47720.2021}, doi = {10.1109/IGARSS47720.2021}, isbn = {978-1-6654-0369-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/igarss/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2021, title = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021, Daegu, South Korea, May 22-28, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCAS51556.2021}, doi = {10.1109/ISCAS51556.2021}, isbn = {978-1-7281-9201-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iscas/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nca/2021, editor = {Mauro Andreolini and Mirco Marchetti and Dimiter R. Avresky}, title = {20th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2021, Boston, MA, USA, November 23-26, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NCA53618.2021}, doi = {10.1109/NCA53618.2021}, isbn = {978-1-6654-9550-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/nca/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2021, editor = {Riham AlTawy and Andreas H{\"{u}}lsing}, title = {Selected Areas in Cryptography - 28th International Conference, {SAC} 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13203}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99277-4}, doi = {10.1007/978-3-030-99277-4}, isbn = {978-3-030-99276-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bmei/2020, editor = {Qiang Zheng and Xiaopeng Zheng and Xiangfu Zhao and Weiqing Yan and Nan Zhang and Lipo Wang}, title = {13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, {CISP-BMEI} 2020, Chengdu, China, October 17-19, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CISP-BMEI51763.2020}, doi = {10.1109/CISP-BMEI51763.2020}, isbn = {978-0-7381-0545-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/bmei/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccoms/2020, title = {5th International Conference on Computer and Communication Systems, {ICCCS} 2020, Shanghai, China, May 15-18, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9114888/proceeding}, isbn = {978-1-7281-6136-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ccoms/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297}, doi = {10.1145/3372297}, isbn = {978-1-4503-7089-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/emnlp/2020-1, editor = {Bonnie Webber and Trevor Cohn and Yulan He and Yang Liu}, title = {Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2020, Online, November 16-20, 2020}, publisher = {Association for Computational Linguistics}, year = {2020}, url = {https://aclanthology.org/volumes/2020.emnlp-main/}, isbn = {978-1-952148-60-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ewdts/2020, title = {{IEEE} East-West Design {\&} Test Symposium, {EWDTS} 2020, Varna, Bulgaria, September 4-7, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9220087/proceeding}, isbn = {978-1-7281-9899-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ewdts/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccsp/2020, title = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644}, doi = {10.1145/3377644}, isbn = {978-1-4503-7744-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icct/2020, title = {20th {IEEE} International Conference on Communication Technology, {ICCT} 2020, Nanning, China, October 28-31, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCT50939.2020}, doi = {10.1109/ICCT50939.2020}, isbn = {978-1-7281-8141-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icct/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mwscas/2020, title = {63rd {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2020, Springfield, MA, USA, August 9-12, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9178719/proceeding}, isbn = {978-1-7281-8058-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/mwscas/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2020, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4}, doi = {10.1007/978-3-030-62576-4}, isbn = {978-3-030-62575-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/provsec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2020, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020}, doi = {10.1109/TRUSTCOM50675.2020}, isbn = {978-1-6654-0392-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ats/2019, title = {28th {IEEE} Asian Test Symposium, {ATS} 2019, Kolkata, India, December 10-13, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8942393/proceeding}, isbn = {978-1-7281-2695-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ats/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cis/2019, title = {15th International Conference on Computational Intelligence and Security, {CIS} 2019, Macao, SAR, China, December 13-16, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8982560/proceeding}, isbn = {978-1-7281-6092-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/cis/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosp/2019w, title = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8790672/proceeding}, isbn = {978-1-7281-3026-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/2019w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fnss/2019, editor = {Robin Doss and Selwyn Piramuthu and Wei Zhou}, title = {Future Network Systems and Security - 5th International Conference, {FNSS} 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1113}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34353-8}, doi = {10.1007/978-3-030-34353-8}, isbn = {978-3-030-34352-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/fnss/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icaiic/2019, title = {International Conference on Artificial Intelligence in Information and Communication, {ICAIIC} 2019, Okinawa, Japan, February 11-13, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8665865/proceeding}, isbn = {978-1-5386-7822-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icaiic/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbk/2019, editor = {Yunjun Gao and Ralf M{\"{o}}ller and Xindong Wu and Ramamohanarao Kotagiri}, title = {2019 {IEEE} International Conference on Big Knowledge, {ICBK} 2019, Beijing, China, November 10-11, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8938595/proceeding}, isbn = {978-1-7281-4607-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icbk/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ijcnn/2019, title = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest, Hungary, July 14-19, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8840768/proceeding}, isbn = {978-1-7281-1985-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asscc/2018, title = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2018, Tainan, Taiwan, November 5-7, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8547238/proceeding}, isbn = {978-1-5386-6413-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/asscc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cns/2018, title = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8410986/proceeding}, isbn = {978-1-5386-4586-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/cns/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/igarss/2018, title = {2018 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2018, Valencia, Spain, July 22-27, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8496405/proceeding}, isbn = {978-1-5386-7150-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/igarss/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iseaisap/2018, editor = {Sukumar Nandi and Devesh Jinwala and Virendra Singh and Vijay Laxmi and Manoj Singh Gaur and Parvez Faruki}, title = {Security and Privacy - Second {ISEA} International Conference, {ISEA-ISAP} 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {939}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-7561-3}, doi = {10.1007/978-981-13-7561-3}, isbn = {978-981-13-7560-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iseaisap/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dasc/2017, title = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8327304/proceeding}, isbn = {978-1-5386-1956-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/dasc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/smartgridcomm/2017, title = {2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8334844/proceeding}, isbn = {978-1-5386-0943-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asscc/2016, title = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2016, Toyama, Japan, November 7-9, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7833314/proceeding}, isbn = {978-1-5090-3699-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/asscc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bigdataconf/2016, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7818133/proceeding}, isbn = {978-1-4673-9005-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/caise/2016bpmds, editor = {Rainer Schmidt and Wided Gu{\'{e}}dria and Ilia Bider and S{\'{e}}rgio Guerreiro}, title = {Enterprise, Business-Process and Information Systems Modeling - 17th International Conference, {BPMDS} 2016, 21st International Conference, {EMMSAD} 2016, Held at CAiSE 2016, Ljubljana, Slovenia, June 13-14, 2016, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {248}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39429-9}, doi = {10.1007/978-3-319-39429-9}, isbn = {978-3-319-39428-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/caise/2016bpmds.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ic-nc/2016, title = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7818132/proceeding}, isbn = {978-1-5090-2655-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icde/2016, title = {32nd {IEEE} International Conference on Data Engineering, {ICDE} 2016, Helsinki, Finland, May 16-20, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7491900/proceeding}, isbn = {978-1-5090-2020-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icde/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icfhr/2016, title = {15th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2016, Shenzhen, China, October 23-26, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7811907/proceeding}, isbn = {978-1-5090-0981-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ictc/2016, title = {International Conference on Information and Communication Technology Convergence, {ICTC} 2016, Jeju Island, South Korea, October 19-21, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7750938/proceeding}, isbn = {978-1-5090-1325-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ictc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwci/2016, title = {2016 International Workshop on Computational Intelligence {(IWCI} 2016), Dhaka, Bangladesh, December 12-13, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7840553/proceeding}, isbn = {978-1-5090-5769-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iwci/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/noms/2016, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7499631/proceeding}, isbn = {978-1-5090-0223-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/noms/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rait/2016, title = {2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 3-5, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7503253/proceeding}, isbn = {978-1-4799-8579-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/rait/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/smartcloud/2016, title = {2016 {IEEE} International Conference on Smart Cloud, SmartCloud 2016, New York, NY, USA, November 18-20, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7795279/proceeding}, isbn = {978-1-5090-5263-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/smartcloud/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spaccs/2016, editor = {Guojun Wang and Indrakshi Ray and Jos{\'{e}} M. Alcaraz Calero and Sabu M. Thampi}, title = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10066}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49148-6}, doi = {10.1007/978-3-319-49148-6}, isbn = {978-3-319-49147-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2015, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-38898-4}, doi = {10.1007/978-3-319-38898-4}, isbn = {978-3-319-38897-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/cisc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ica3pp/2015-3, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {Algorithms and Architectures for Parallel Processing - 15th International Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9530}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27137-8}, doi = {10.1007/978-3-319-27137-8}, isbn = {978-3-319-27136-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/2015-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ijcnn/2015, title = {2015 International Joint Conference on Neural Networks, {IJCNN} 2015, Killarney, Ireland, July 12-17, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7256526/proceeding}, isbn = {978-1-4799-1960-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infocom/2015, title = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7172813/proceeding}, isbn = {978-1-4799-8381-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/infocom/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2015, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31550-8}, doi = {10.1007/978-3-319-31550-8}, isbn = {978-3-319-31549-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/intrust/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2015, editor = {Jonathan Katz}, title = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2}, doi = {10.1007/978-3-662-46447-2}, isbn = {978-3-662-46446-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ica3pp/2014-1, editor = {Xian{-}He Sun and Wenyu Qu and Ivan Stojmenovic and Wanlei Zhou and Zhiyang Li and Hua Guo and Geyong Min and Tingting Yang and Yulei Wu and Lei (Chris) Liu}, title = {Algorithms and Architectures for Parallel Processing - 14th International Conference, {ICA3PP} 2014, Dalian, China, August 24-27, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8630}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11197-1}, doi = {10.1007/978-3-319-11197-1}, isbn = {978-3-319-11196-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/2014-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icfhr/2014, title = {14th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2014, Crete, Greece, September 1-4, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6979380/proceeding}, isbn = {978-1-4799-4335-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icst/2014, title = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, {USA}}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6823818/proceeding}, isbn = {978-0-7695-5185-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icst/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iolts/2014, title = {2014 {IEEE} 20th International On-Line Testing Symposium, {IOLTS} 2014, Platja d'Aro, Girona, Spain, July 7-9, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6867432/proceeding}, isbn = {978-1-4799-5323-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iolts/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/snds/2014, editor = {Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Sabu M. Thampi and Ryan K. L. Ko and Lei Shu}, title = {Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, {SNDS} 2014, Trivandrum, India, March 13-14, 2014, Proceedings}, series = {Communications in Computer and Information Science}, volume = {420}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54525-2}, doi = {10.1007/978-3-642-54525-2}, isbn = {978-3-642-54524-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/snds/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/apnoms/2013, title = {15th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2013, Hiroshima, Japan, September 25-27, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6648475/proceeding}, isbn = {978-4-8855-2279-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/apnoms/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013asiapkc, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2484389}, isbn = {978-1-4503-2069-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icb/2013, editor = {Julian Fi{\'{e}}rrez and Ajay Kumar and Mayank Vatsa and Raymond N. J. Veldhuis and Javier Ortega{-}Garcia}, title = {International Conference on Biometrics, {ICB} 2013, 4-7 June, 2013, Madrid, Spain}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6596180/proceeding}, isbn = {978-1-4799-0310-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icb/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icde/2013w, editor = {Chee Yong Chan and Jiaheng Lu and Kjetil N{\o}rv{\aa}g and Egemen Tanin}, title = {Workshops Proceedings of the 29th {IEEE} International Conference on Data Engineering, {ICDE} 2013, Brisbane, Australia, April 8-12, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6530813/proceeding}, isbn = {978-1-4673-5303-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icde/2013w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciap/2013-w, editor = {Alfredo Petrosino and Lucia Maddalena and Pietro Pala}, title = {New Trends in Image Analysis and Processing - {ICIAP} 2013 - {ICIAP} 2013 International Workshops, Naples, Italy, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8158}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41190-8}, doi = {10.1007/978-3-642-41190-8}, isbn = {978-3-642-41189-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iciap/2013-w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ict-eurasia/2013, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9}, doi = {10.1007/978-3-642-36818-9}, isbn = {978-3-642-36817-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2013, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4}, doi = {10.1007/978-3-642-41284-4}, isbn = {978-3-642-41283-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/raid/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccomm/2012, title = {9th International Conference on Communications, {COMM} 2012, Bucharest, Romania, June 21-23, 2012}, publisher = {{IEEE}}, year = {2012}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6255879}, isbn = {978-1-4577-0057-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iccomm/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/visapp/2012-1, editor = {Gabriela Csurka and Jos{\'{e}} Braz}, title = {{VISAPP} 2012 - Proceedings of the International Conference on Computer Vision Theory and Applications, Volume 1, Rome, Italy, 24-26 February, 2012}, publisher = {SciTePress}, year = {2012}, isbn = {978-989-8565-03-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/visapp/2012-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/biosig/2011, editor = {Arslan Br{\"{o}}mme and Christoph Busch}, title = {{BIOSIG} 2011 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 08.-09. September 2011 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-191}}, publisher = {{GI}}, year = {2011}, url = {https://dl.gi.de/handle/20.500.12116/20077}, isbn = {978-3-88579-285-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/biosig/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/valuetools/2011, editor = {Samson Lasaulce and Dieter Fiems and Peter G. Harrison and Luc Vandendorpe}, title = {5th International {ICST} Conference on Performance Evaluation Methodologies and Tools Communications, {VALUETOOLS} '11, Paris, France, May 16-20, 2011}, publisher = {{ICST/ACM}}, year = {2011}, url = {http://eudl.eu/proceedings/VALUETOOLS/2011}, isbn = {978-1-936968-09-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/valuetools/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vts/2011, title = {29th {IEEE} {VLSI} Test Symposium, {VTS} 2011, May 1-5, 2011, Dana Point, California, {USA}}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5772241/proceeding}, isbn = {978-1-61284-657-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/vts/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acl/2010s, title = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden, Short Papers}, publisher = {The Association for Computer Linguistics}, year = {2010}, url = {https://aclanthology.org/volumes/P10-2/}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acl/2010s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acl/2010, editor = {Jan Hajic and Sandra Carberry and Stephen Clark}, title = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden}, publisher = {The Association for Computer Linguistics}, year = {2010}, url = {https://aclanthology.org/volumes/P10-1/}, isbn = {978-1-932432-66-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acl/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aict/2010, editor = {T{\"{u}}lin Atmaca and Jacques Palicot and Amor Nafkha and Thrasyvoulos Tsiatsos and Michel Marot and Oana Dini}, title = {Sixth Advanced International Conference on Telecommunications, {AICT} 2010, 9-15 May 2010, Barcelona, Spain}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5488876/proceeding}, isbn = {978-0-7695-4021-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/aict/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/arc/2010, editor = {Phaophak Sirisuk and Fearghal Morgan and Tarek A. El{-}Ghazawi and Hideharu Amano}, title = {Reconfigurable Computing: Architectures, Tools and Applications, 6th International Symposium, {ARC} 2010, Bangkok, Thailand, March 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5992}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12133-3}, doi = {10.1007/978-3-642-12133-3}, isbn = {978-3-642-12132-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/arc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/arcs/2010w, editor = {Michael Beigl and Francisco Javier Cazorla{-}Almeida}, title = {{ARCS} '10 - 23th International Conference on Architecture of Computing Systens 2010, Workshop Proceedings, February 22-23, 2010, Hannover, Germany}, publisher = {{VDE} Verlag}, year = {2010}, isbn = {978-3-8007-3222-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/arcs/2010w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icip/2010, title = {Proceedings of the International Conference on Image Processing, {ICIP} 2010, September 26-29, Hong Kong, China}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5641636/proceeding}, isbn = {978-1-4244-7994-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icip/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infocom/2010, title = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5461675/proceeding}, isbn = {978-1-4244-5838-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/infocom/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nsdi/2010, title = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA, {USA}}, publisher = {{USENIX} Association}, year = {2010}, isbn = {978-1-931971-73-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pdcat/2010, title = {2010 International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2010, Wuhan, China, 8-11 December, 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5704274/proceeding}, isbn = {978-0-7695-4287-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2010, editor = {Sushil Jajodia and Jianying Zhou}, title = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2}, doi = {10.1007/978-3-642-16161-2}, isbn = {978-3-642-16160-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2009, title = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5379501/proceeding}, isbn = {978-0-7695-3919-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/broadcom/2009, editor = {Tomasz Janiczek and Ryszard Klempous and Jan Nikodem and Ryszard J. Zielinski and Johnson I. Agbinya and Robin Braun and Zenon Chaczko}, title = {Selected Papers on Broadband Communication, Information Technology {\&} Biomedical Applications, BroadBandCom 2009, Proceedings, Wroc{\l}aw, Poland, July 15-18, 2009}, publisher = {Wroc{\l}aw University of Technology}, year = {2009}, isbn = {978-83-7493-470-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/broadcom/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cis/2009-2, title = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5375751}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/cis/2009-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csiirw/2009, editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, publisher = {{ACM}}, year = {2009}, url = {http://dl.acm.org/citation.cfm?id=1558607}, isbn = {978-1-60558-518-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/depcos/2009, title = {Fourth International Conference on Dependability of Computer Systems, DepCos-RELCOMEX '09, Brunow, Poland, June 30 - July 2, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5260979/proceeding}, isbn = {978-0-7695-3674-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/depcos/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icc/2009, title = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, publisher = {{IEEE}}, year = {2009}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2009, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0}, doi = {10.1007/978-3-642-04342-0}, isbn = {978-3-642-04341-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/raid/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2008, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0}, doi = {10.1007/978-3-540-70500-0}, isbn = {978-3-540-69971-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acisp/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2008, title = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4721525/proceeding}, isbn = {978-0-7695-3447-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asap/2008, title = {19th {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven, Belgium}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4569858/proceeding}, isbn = {978-1-4244-1897-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/asap/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bliss/2008, editor = {Adrian Stoica and Tughrul Arslan and Daniel Howard and Tetsuya Higuchi and Ahmed O. El{-}Rayis}, title = {2008 {ECSIS} Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, {BLISS} 2008, Edinburgh, UK, 4-6 August 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4595777/proceeding}, isbn = {978-0-7695-3265-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/bliss/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/broadcom/2008, editor = {Johnson I. Agbinya and Elmarie Biermann and Yskandar Hamam and Ntsibane Ntlatlapa and Keith Ferguson}, title = {2008 Third International Conference on Broadband Communications, Information Technology {\&} Biomedical Applications, BroadCom 2008, 23-26 November 2008, Pretoria, Gauteng, South Africa}, publisher = {{IEEE} Computer Society}, year = {2008}, isbn = {978-0-7695-3453-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/broadcom/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008aisec, editor = {Dirk Balfanz and Jessica Staddon}, title = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-291-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2008aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csse/2008-3, title = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=4722268}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/csse/2008-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/delta/2008, title = {4th {IEEE} International Symposium on Electronic Design, Test and Applications, {DELTA} 2008, Hong Kong, January 23-25, 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4459488/proceeding}, isbn = {978-0-7695-3110-6}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/delta/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dsn/2008, title = {The 38th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4610267/proceeding}, isbn = {978-1-4244-2397-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/dsn/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fccm/2008, editor = {Kenneth L. Pocek and Duncan A. Buell}, title = {16th {IEEE} International Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2008, 14-15 April 2008, Stanford, Palo Alto, California, {USA}}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4724876/proceeding}, isbn = {978-0-7695-3307-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/fccm/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/imsccs/2008, title = {International Multisymposiums on Computer and Computational Sciences, {IMSCCS} 2008, Shanghai, China, October 18-20, 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4760279/proceeding}, isbn = {978-0-7695-3430-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ndss/2008, title = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ndss/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/noms/2008, editor = {Marcus Brunner and Carlos Becker Westphall and Lisandro Zambenedetti Granville}, title = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, publisher = {{IEEE}}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4567164/proceeding}, isbn = {978-1-4244-2066-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/noms/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/waim/2008, title = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4596966/proceeding}, isbn = {978-0-7695-3185-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/waim/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2007, title = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4412959/proceeding}, isbn = {0-7695-3060-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/faw/2007, editor = {Franco P. Preparata and Qizhi Fang}, title = {Frontiers in Algorithmics, First Annual International Workshop, {FAW} 2007, Lanzhou, China, August 1-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4613}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73814-5}, doi = {10.1007/978-3-540-73814-5}, isbn = {978-3-540-73813-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/faw/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icnp/2007, title = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4375820/proceeding}, isbn = {1-4244-1588-8}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icnp/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iih-msp/2007, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIH-MSP13239.2007}, doi = {10.1109/IIH-MSP13239.2007}, isbn = {978-0-7695-2994-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/kesamsta/2007, editor = {Ngoc Thanh Nguyen and Adam Grzech and Robert J. Howlett and Lakhmi C. Jain}, title = {Agent and Multi-Agent Systems: Technologies and Applications, First {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4496}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72830-6}, doi = {10.1007/978-3-540-72830-6}, isbn = {978-3-540-72829-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rcis/2007, editor = {Colette Rolland and Oscar Pastor and Jean{-}Louis Cavarero}, title = {Proceedings of the First International Conference on Research Challenges in Information Science, {RCIS} 2007, Ouarzazate, Morocco, April 23-26, 2007}, year = {2007}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/rcis/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2006, title = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/4041138/proceeding}, isbn = {0-7695-2716-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2006usa, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405}, doi = {10.1145/1180405}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2006usa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosys/2006, editor = {Yolande Berbers and Willy Zwaenepoel}, title = {Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-322-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icb/2006, editor = {David Zhang and Anil K. Jain}, title = {Advances in Biometrics, International Conference, {ICB} 2006, Hong Kong, China, January 5-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3832}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11608288}, doi = {10.1007/11608288}, isbn = {3-540-31111-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icb/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mrcs/2006, editor = {Bilge G{\"{u}}nsel and Anil K. Jain and A. Murat Tekalp and B{\"{u}}lent Sankur}, title = {Multimedia Content Representation, Classification and Security, International Workshop, {MRCS} 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4105}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11848035}, doi = {10.1007/11848035}, isbn = {3-540-39392-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/mrcs/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2006, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214}, doi = {10.1007/11856214}, isbn = {3-540-39723-X}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/raid/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2006, title = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/10812/proceeding}, isbn = {0-7695-2574-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/sp/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2005, title = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/10467/proceeding}, isbn = {0-7695-2461-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-226-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icc/2005, title = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2005, Seoul, Korea, 16-20 May 2005}, publisher = {{IEEE}}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/9996/proceeding}, isbn = {0-7803-8938-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ism/2005, title = {Seventh {IEEE} International Symposium on Multimedia {(ISM} 2005), 12-14 December 2005, Irvine, CA, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/10471/proceeding}, isbn = {0-7695-2489-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ism/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2005, editor = {Alfonso Valdes and Diego Zamboni}, title = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11663812}, doi = {10.1007/11663812}, isbn = {3-540-31778-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/raid/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2005, title = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, publisher = {{IEEE}}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/10695/proceeding}, isbn = {0-7695-2369-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2005, title = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/9752/proceeding}, isbn = {0-7695-2339-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/sp/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccsa/2004-1, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98048}, doi = {10.1007/B98048}, isbn = {3-540-22054-2}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/2004-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cdc/2003, title = {42nd {IEEE} Conference on Decision and Control, {CDC} 2003, Maui, Hawaii, USA, December 9-12, 2003}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CDC.2003}, doi = {10.1109/CDC.2003}, isbn = {0-7803-7924-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/cdc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2001, editor = {Joe Kilian}, title = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8}, doi = {10.1007/3-540-44647-8}, isbn = {3-540-42456-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/crypto/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2001, editor = {David Naccache}, title = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9}, doi = {10.1007/3-540-45353-9}, isbn = {3-540-41898-9}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2001, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3}, doi = {10.1007/3-540-45311-3}, isbn = {3-540-43010-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwvf/2001, editor = {Carlo Arcelli and Luigi P. Cordella and Gabriella Sanniti di Baja}, title = {Visual Form 2001, 4th International Workshop on Visual Form, IWVF-4, Capri, Italy, May 28-30, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2059}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45129-3}, doi = {10.1007/3-540-45129-3}, isbn = {3-540-42120-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/iwvf/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2001, editor = {Kwangjo Kim}, title = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2}, doi = {10.1007/3-540-44586-2}, isbn = {3-540-41658-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ats/2000, title = {9th Asian Test Symposium {(ATS} 2000), 4-6 December 2000, Taipei, Taiwan}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://ieeexplore.ieee.org/xpl/conhome/7181/proceeding}, isbn = {0-7695-0887-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ats/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icassp/2000, title = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing. {ICASSP} 2000, 5-9 June, 2000, Hilton Hotel and Convention Center, Istanbul, Turkey}, publisher = {{IEEE}}, year = {2000}, url = {https://ieeexplore.ieee.org/xpl/conhome/6939/proceeding}, isbn = {0-7803-6293-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/icassp/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/edcc/1999, editor = {Jan Hlavicka and Erik Maehle and Andr{\'{a}}s Pataricza}, title = {Dependable Computing - EDCC-3, Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1667}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48254-7}, doi = {10.1007/3-540-48254-7}, isbn = {3-540-66483-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/edcc/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/98, editor = {Kaisa Nyberg}, title = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054112}, doi = {10.1007/BFB0054112}, isbn = {3-540-64518-7}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eusipco/1998, title = {9th European Signal Processing Conference, {EUSIPCO} 1998, Island of Rhodes, Greece, 8-11 September, 1998}, publisher = {{IEEE}}, year = {1998}, url = {https://ieeexplore.ieee.org/xpl/conhome/7089497/proceeding}, isbn = {978-960-7620-06-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/eusipco/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bsdia/1997, editor = {Nabeel A. Murshed and Fl{\'{a}}vio Bortolozzi}, title = {Advances in Document Image Analysis, First Brazilian Symposium, BSDIA'97, Curitiba, Brazil, November 2-5, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1339}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63791-5}, doi = {10.1007/3-540-63791-5}, isbn = {3-540-63791-5}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/bsdia/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spieSR/1997, editor = {Ishwar K. Sethi and Ramesh C. Jain}, title = {Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, February 8-14, 1997}, series = {{SPIE} Proceedings}, volume = {3022}, publisher = {{SPIE}}, year = {1997}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=3022}, isbn = {0-8194-2433-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/spieSR/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/1996, editor = {Li Gong and Jacques Stearn}, title = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, publisher = {{ACM}}, year = {1996}, url = {http://dl.acm.org/citation.cfm?id=238168}, isbn = {0-89791-829-0}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/ccs/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1996, editor = {Neal Koblitz}, title = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5}, doi = {10.1007/3-540-68697-5}, isbn = {3-540-61512-1}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/crypto/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acm/1994, editor = {John Werth and Laurie Honour Werth}, title = {Proceedings of the {ACM} 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, {CSC} '94, Phoenix, Arizona, USA, March 8-10, 1994}, publisher = {{ACM}}, year = {1994}, url = {http://dl.acm.org/citation.cfm?id=197530}, isbn = {0-89791-634-4}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/acm/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1991, editor = {Joan Feigenbaum}, title = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-46766-1}, doi = {10.1007/3-540-46766-1}, isbn = {3-540-55188-3}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/crypto/1991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/90, editor = {Ivan Damg{\aa}rd}, title = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46877-3}, doi = {10.1007/3-540-46877-3}, isbn = {3-540-53587-X}, timestamp = {Mon, 10 Feb 2025 11:12:37 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.