Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cisc/inscrypt2008x.bht:"
@proceedings{DBLP:conf/cisc/2008x, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01440-6}, doi = {10.1007/978-3-642-01440-6}, isbn = {978-3-642-01439-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2008x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/BettaleFP08, author = {Luk Bettale and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Security Analysis of Multivariate Polynomials for Hashing}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {115--124}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_11}, doi = {10.1007/978-3-642-01440-6\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/BettaleFP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChengCL08, author = {Bo{-}Chao Cheng and Huan Chen and Guo{-}Tan Liao}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical {WSN}}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {265--274}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_21}, doi = {10.1007/978-3-642-01440-6\_21}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChengCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CookYK08, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {157--180}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_14}, doi = {10.1007/978-3-642-01440-6\_14}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CookYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DengHX08, author = {Lingli Deng and Yeping He and Ziyao Xu}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Separation of Duty in Trust-Based Collaboration}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {370--388}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_28}, doi = {10.1007/978-3-642-01440-6\_28}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DengHX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JhanwarB08, author = {Mahabir Prasad Jhanwar and Rana Barua}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {314--331}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_25}, doi = {10.1007/978-3-642-01440-6\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/JhanwarB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KimRJ08, author = {Mooseop Kim and Jaecheol Ryou and Sungik Jun}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Efficient Hardware Architecture of {SHA-256} Algorithm for Trusted Mobile Computing}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {240--252}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_19}, doi = {10.1007/978-3-642-01440-6\_19}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KimRJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiST08, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Efficient Signcryption Key Encapsulation without Random Oracles}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {47--59}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_6}, doi = {10.1007/978-3-642-01440-6\_6}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiST08a, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {289--304}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_23}, doi = {10.1007/978-3-642-01440-6\_23}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiST08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiZL08, author = {Mengjun Li and Ti Zhou and Zhoujun Li}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {{SPVT-II:} An Efficient Security Protocol Verifier Based on Logic Programming}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {125--140}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_12}, doi = {10.1007/978-3-642-01440-6\_12}, timestamp = {Wed, 13 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LibertQY08, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Key Evolution Systems in Untrusted Update Environments}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {12--21}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_2}, doi = {10.1007/978-3-642-01440-6\_2}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LibertQY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LimLL08, author = {Tong{-}Lee Lim and Tieyan Li and Yingjiu Li}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {A Security and Performance Evaluation of Hash-Based {RFID} Protocols}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {406--424}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_30}, doi = {10.1007/978-3-642-01440-6\_30}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LimLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Liu08, author = {Peng Liu}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Secure and Privacy-Preserving Information Brokering}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {22}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_3}, doi = {10.1007/978-3-642-01440-6\_3}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/Liu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuTD08, author = {Duo Liu and Zhiyong Tan and Yiqi Dai}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist {SPA}}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {253--264}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_20}, doi = {10.1007/978-3-642-01440-6\_20}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuTD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MuHZ08, author = {Ningbo Mu and Yupu Hu and Leyou Zhang}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {On the Computational Efficiency of {XTR+}}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {305--313}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_24}, doi = {10.1007/978-3-642-01440-6\_24}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MuHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PengB08, author = {Kun Peng and Feng Bao}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Batch {ZK} Proof and Verification of {OR} Logic}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {141--156}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_13}, doi = {10.1007/978-3-642-01440-6\_13}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/PengB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PengB08a, author = {Kun Peng and Feng Bao}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Correction, Optimisation and Secure and Efficient Application of {PBD} Shuffling}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {425--437}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_31}, doi = {10.1007/978-3-642-01440-6\_31}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/PengB08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Preneel08, author = {Bart Preneel}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {The State of Hash Functions and the {NIST} {SHA-3} Competition}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {1--11}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_1}, doi = {10.1007/978-3-642-01440-6\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Preneel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/QinWSM08, author = {Bo Qin and Qianhong Wu and Willy Susilo and Yi Mu}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Publicly Verifiable Privacy-Preserving Group Decryption}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {72--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_8}, doi = {10.1007/978-3-642-01440-6\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/QinWSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/RujR08, author = {Sushmita Ruj and Bimal K. Roy}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Key Predistribution Schemes Using Codes in Wireless Sensor Networks}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {275--288}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_22}, doi = {10.1007/978-3-642-01440-6\_22}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/RujR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TangHJ08, author = {Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Inter-domain Identity-Based Proxy Re-encryption}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {332--347}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_26}, doi = {10.1007/978-3-642-01440-6\_26}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TangHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangFLW08, author = {Peng Wang and Dengguo Feng and Changlu Lin and Wenling Wu}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Security of Truncated MACs}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {96--114}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_10}, doi = {10.1007/978-3-642-01440-6\_10}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangFLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangHY08, author = {Xu An Wang and Xinyi Huang and Xiaoyuan Yang}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Further Observations on Certificateless Public Key Encryption}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {217--239}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_18}, doi = {10.1007/978-3-642-01440-6\_18}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangY08, author = {Huaqun Wang and Hong Yu}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Cryptanalysis of Two Ring Signcryption Schemes}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {41--46}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_5}, doi = {10.1007/978-3-642-01440-6\_5}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuQMS08, author = {Qianhong Wu and Bo Qin and Yi Mu and Willy Susilo}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Privacy for Private Key in Signatures}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {84--95}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_9}, doi = {10.1007/978-3-642-01440-6\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WuQMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/XuHD08, author = {Ziyao Xu and Yeping He and Lingli Deng}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {An Integrity Assurance Mechanism for Run-Time Programs}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {389--405}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_29}, doi = {10.1007/978-3-642-01440-6\_29}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/XuHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YangCD08, author = {Piyi Yang and Zhenfu Cao and Xiaolei Dong}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {201--216}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_17}, doi = {10.1007/978-3-642-01440-6\_17}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YangCD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZengYHF08, author = {Guang Zeng and Yang Yang and Wenbao Han and Shuqin Fan}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Reducible Polynomial over F\({}_{\mbox{2}}\) Constructed by Trinomial sigma-LFSR}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {192--200}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_16}, doi = {10.1007/978-3-642-01440-6\_16}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZengYHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangAK08, author = {Zonghua Zhang and Ruo Ando and Youki Kadobayashi}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Hardening Botnet by a Rational Botmaster}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {348--369}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_27}, doi = {10.1007/978-3-642-01440-6\_27}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangH08, author = {Wenying Zhang and Jing Han}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Impossible Differential Analysis of Reduced Round {CLEFIA}}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {181--191}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_15}, doi = {10.1007/978-3-642-01440-6\_15}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangI08, author = {Rui Zhang and Hideki Imai}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Strong Anonymous Signatures}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {60--71}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_7}, doi = {10.1007/978-3-642-01440-6\_7}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhaoLY08, author = {Wei Zhao and Changlu Lin and Dingfeng Ye}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Provably Secure Convertible Nominative Signature Scheme}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {23--40}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_4}, doi = {10.1007/978-3-642-01440-6\_4}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhaoLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.