Search dblp for Publications

export results for "toc:db/conf/cisc/inscrypt2008x.bht:"

 download as .bib file

@proceedings{DBLP:conf/cisc/2008x,
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01440-6},
  doi          = {10.1007/978-3-642-01440-6},
  isbn         = {978-3-642-01439-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2008x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/BettaleFP08,
  author       = {Luk Bettale and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Security Analysis of Multivariate Polynomials for Hashing},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {115--124},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_11},
  doi          = {10.1007/978-3-642-01440-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/BettaleFP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChengCL08,
  author       = {Bo{-}Chao Cheng and
                  Huan Chen and
                  Guo{-}Tan Liao},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {A Novel Marking Probability Distribution Using Probability Propagation
                  in Hierarchical {WSN}},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {265--274},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_21},
  doi          = {10.1007/978-3-642-01440-6\_21},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChengCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CookYK08,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {157--180},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_14},
  doi          = {10.1007/978-3-642-01440-6\_14},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CookYK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/DengHX08,
  author       = {Lingli Deng and
                  Yeping He and
                  Ziyao Xu},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Separation of Duty in Trust-Based Collaboration},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {370--388},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_28},
  doi          = {10.1007/978-3-642-01440-6\_28},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/DengHX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/JhanwarB08,
  author       = {Mahabir Prasad Jhanwar and
                  Rana Barua},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption
                  Scheme},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {314--331},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_25},
  doi          = {10.1007/978-3-642-01440-6\_25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/JhanwarB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KimRJ08,
  author       = {Mooseop Kim and
                  Jaecheol Ryou and
                  Sungik Jun},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Efficient Hardware Architecture of {SHA-256} Algorithm for Trusted
                  Mobile Computing},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {240--252},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_19},
  doi          = {10.1007/978-3-642-01440-6\_19},
  timestamp    = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KimRJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Efficient Signcryption Key Encapsulation without Random Oracles},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_6},
  doi          = {10.1007/978-3-642-01440-6\_6},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiST08a,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {289--304},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_23},
  doi          = {10.1007/978-3-642-01440-6\_23},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiST08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiZL08,
  author       = {Mengjun Li and
                  Ti Zhou and
                  Zhoujun Li},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {{SPVT-II:} An Efficient Security Protocol Verifier Based on Logic
                  Programming},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_12},
  doi          = {10.1007/978-3-642-01440-6\_12},
  timestamp    = {Wed, 13 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LibertQY08,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Key Evolution Systems in Untrusted Update Environments},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {12--21},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_2},
  doi          = {10.1007/978-3-642-01440-6\_2},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LibertQY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LimLL08,
  author       = {Tong{-}Lee Lim and
                  Tieyan Li and
                  Yingjiu Li},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {A Security and Performance Evaluation of Hash-Based {RFID} Protocols},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {406--424},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_30},
  doi          = {10.1007/978-3-642-01440-6\_30},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LimLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Liu08,
  author       = {Peng Liu},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Secure and Privacy-Preserving Information Brokering},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {22},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_3},
  doi          = {10.1007/978-3-642-01440-6\_3},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/Liu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuTD08,
  author       = {Duo Liu and
                  Zhiyong Tan and
                  Yiqi Dai},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair
                  of Integers to Resist {SPA}},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {253--264},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_20},
  doi          = {10.1007/978-3-642-01440-6\_20},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuTD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MuHZ08,
  author       = {Ningbo Mu and
                  Yupu Hu and
                  Leyou Zhang},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {On the Computational Efficiency of {XTR+}},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {305--313},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_24},
  doi          = {10.1007/978-3-642-01440-6\_24},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MuHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PengB08,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Batch {ZK} Proof and Verification of {OR} Logic},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_13},
  doi          = {10.1007/978-3-642-01440-6\_13},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/PengB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PengB08a,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Correction, Optimisation and Secure and Efficient Application of {PBD}
                  Shuffling},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {425--437},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_31},
  doi          = {10.1007/978-3-642-01440-6\_31},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/PengB08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Preneel08,
  author       = {Bart Preneel},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {The State of Hash Functions and the {NIST} {SHA-3} Competition},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_1},
  doi          = {10.1007/978-3-642-01440-6\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Preneel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/QinWSM08,
  author       = {Bo Qin and
                  Qianhong Wu and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Publicly Verifiable Privacy-Preserving Group Decryption},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {72--83},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_8},
  doi          = {10.1007/978-3-642-01440-6\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/QinWSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/RujR08,
  author       = {Sushmita Ruj and
                  Bimal K. Roy},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Key Predistribution Schemes Using Codes in Wireless Sensor Networks},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {275--288},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_22},
  doi          = {10.1007/978-3-642-01440-6\_22},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/RujR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TangHJ08,
  author       = {Qiang Tang and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Inter-domain Identity-Based Proxy Re-encryption},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {332--347},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_26},
  doi          = {10.1007/978-3-642-01440-6\_26},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TangHJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangFLW08,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Changlu Lin and
                  Wenling Wu},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Security of Truncated MACs},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {96--114},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_10},
  doi          = {10.1007/978-3-642-01440-6\_10},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangFLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangHY08,
  author       = {Xu An Wang and
                  Xinyi Huang and
                  Xiaoyuan Yang},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Further Observations on Certificateless Public Key Encryption},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {217--239},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_18},
  doi          = {10.1007/978-3-642-01440-6\_18},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangY08,
  author       = {Huaqun Wang and
                  Hong Yu},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Cryptanalysis of Two Ring Signcryption Schemes},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {41--46},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_5},
  doi          = {10.1007/978-3-642-01440-6\_5},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuQMS08,
  author       = {Qianhong Wu and
                  Bo Qin and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Privacy for Private Key in Signatures},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {84--95},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_9},
  doi          = {10.1007/978-3-642-01440-6\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WuQMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/XuHD08,
  author       = {Ziyao Xu and
                  Yeping He and
                  Lingli Deng},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {An Integrity Assurance Mechanism for Run-Time Programs},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {389--405},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_29},
  doi          = {10.1007/978-3-642-01440-6\_29},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/XuHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YangCD08,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Chosen Ciphertext Secure Certificateless Threshold Encryption in the
                  Standard Model},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_17},
  doi          = {10.1007/978-3-642-01440-6\_17},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YangCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZengYHF08,
  author       = {Guang Zeng and
                  Yang Yang and
                  Wenbao Han and
                  Shuqin Fan},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Reducible Polynomial over F\({}_{\mbox{2}}\) Constructed by Trinomial
                  sigma-LFSR},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {192--200},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_16},
  doi          = {10.1007/978-3-642-01440-6\_16},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZengYHF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangAK08,
  author       = {Zonghua Zhang and
                  Ruo Ando and
                  Youki Kadobayashi},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Hardening Botnet by a Rational Botmaster},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {348--369},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_27},
  doi          = {10.1007/978-3-642-01440-6\_27},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangH08,
  author       = {Wenying Zhang and
                  Jing Han},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Impossible Differential Analysis of Reduced Round {CLEFIA}},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {181--191},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_15},
  doi          = {10.1007/978-3-642-01440-6\_15},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangI08,
  author       = {Rui Zhang and
                  Hideki Imai},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Strong Anonymous Signatures},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_7},
  doi          = {10.1007/978-3-642-01440-6\_7},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhaoLY08,
  author       = {Wei Zhao and
                  Changlu Lin and
                  Dingfeng Ye},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Provably Secure Convertible Nominative Signature Scheme},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_4},
  doi          = {10.1007/978-3-642-01440-6\_4},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhaoLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics