Search dblp for Publications

export results for "toc:db/conf/provsec/provsec2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/provsec/Abdalla14,
  author       = {Michel Abdalla},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Password-Based Authenticated Key Exchange: An Overview},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_1},
  doi          = {10.1007/978-3-319-12475-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Abdalla14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BuldasLLT14,
  author       = {Ahto Buldas and
                  Risto Laanoja and
                  Peeter Laud and
                  Ahto Truu},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Bounded Pre-image Awareness and the Security of Hash-Tree Keyless
                  Signatures},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_10},
  doi          = {10.1007/978-3-319-12475-9\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BuldasLLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChenMS14,
  author       = {Jiageng Chen and
                  Atsuko Miyaji and
                  Chunhua Su},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {A Provable Secure Batch Authentication Scheme for EPCGen2 Tags},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {103--116},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_8},
  doi          = {10.1007/978-3-319-12475-9\_8},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChenMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/CuiMA14,
  author       = {Hui Cui and
                  Yi Mu and
                  Man Ho Au},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Complete Robustness in Identity-Based Encryption},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {342--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_26},
  doi          = {10.1007/978-3-319-12475-9\_26},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/CuiMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DamgardN14,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Adaptive versus Static Security in the {UC} Model},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {10--28},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_2},
  doi          = {10.1007/978-3-319-12475-9\_2},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/DamgardN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DattaN14,
  author       = {Nilanjan Datta and
                  Mridul Nandi},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Equivalence between MAC, {WCR} and {PRF} for Blockcipher Based Constructions},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {300--308},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_21},
  doi          = {10.1007/978-3-319-12475-9\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/DattaN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HiroseK14,
  author       = {Shoichi Hirose and
                  Hidenori Kuwakado},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block
                  Compression Function},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {71--86},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_6},
  doi          = {10.1007/978-3-319-12475-9\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/HiroseK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HiroseK14a,
  author       = {Shoichi Hirose and
                  Hidenori Kuwakado},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Forward-Secure Sequential Aggregate Message Authentication Revisited},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {87--102},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_7},
  doi          = {10.1007/978-3-319-12475-9\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/HiroseK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/KatsumataK14,
  author       = {Shuichi Katsumata and
                  Noboru Kunihiro},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Constructing Subspace Membership Encryption through Inner Product
                  Encryption},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_16},
  doi          = {10.1007/978-3-319-12475-9\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/KatsumataK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Krzywiecki14,
  author       = {Lukasz Krzywiecki},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Deniable Version of {SIGMA} Key Exchange Protocol Resilient to Ephemeral
                  Key Leakage},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {334--341},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_25},
  doi          = {10.1007/978-3-319-12475-9\_25},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Krzywiecki14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LaudP14,
  author       = {Peeter Laud and
                  Alisa Pankova},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Verifiable Computation in Multiparty Protocols with Honest Majority},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {146--161},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_11},
  doi          = {10.1007/978-3-319-12475-9\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LaudP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LuLSL14,
  author       = {Rongxing Lu and
                  Xiaodong Lin and
                  Jun Shao and
                  Kaitai Liang},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master
                  Secret Security},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {194--205},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_14},
  doi          = {10.1007/978-3-319-12475-9\_14},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LuLSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Nuida14,
  author       = {Koji Nuida},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {How to Use Pseudorandom Generators in Unconditional Security Settings},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {291--299},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_20},
  doi          = {10.1007/978-3-319-12475-9\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Nuida14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PanditPB14,
  author       = {Tapas Pandit and
                  Sumit Kumar Pandey and
                  Rana Barua},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability
                  and {IND-CCA2} Security in Adaptive-Predicates Attack},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {274--290},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_19},
  doi          = {10.1007/978-3-319-12475-9\_19},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PanditPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/RamannaS14,
  author       = {Somindu C. Ramanna and
                  Palash Sarkar},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Efficient (Anonymous) Compact {HIBE} from Standard Assumptions},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_17},
  doi          = {10.1007/978-3-319-12475-9\_17},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/RamannaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ReyhanitabarVV14,
  author       = {Reza Reyhanitabar and
                  Serge Vaudenay and
                  Damian Viz{\'{a}}r},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Misuse-Resistant Variants of the {OMD} Authenticated Encryption Mode},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_5},
  doi          = {10.1007/978-3-319-12475-9\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ReyhanitabarVV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Tibouchi14,
  author       = {Mehdi Tibouchi},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Impossibility of Surjective Icart-Like Encodings},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {29--39},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_3},
  doi          = {10.1007/978-3-319-12475-9\_3},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Tibouchi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangT14,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Generic Transformation to Strongly Existentially Unforgeable Signature
                  Schemes with Leakage Resiliency},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {117--129},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_9},
  doi          = {10.1007/978-3-319-12475-9\_9},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WangT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WatanabeS14,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Timed-Release Computational Secret Sharing Scheme and Its Applications},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {326--333},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_24},
  doi          = {10.1007/978-3-319-12475-9\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WatanabeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/XueLLL14,
  author       = {Haiyang Xue and
                  Xianhui Lu and
                  Bao Li and
                  Yamin Liu},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Lossy Trapdoor Relation and Its Applications to Lossy Encryption and
                  Adaptive Trapdoor Relation},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_12},
  doi          = {10.1007/978-3-319-12475-9\_12},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/XueLLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YamakawaKNHO14,
  author       = {Takashi Yamakawa and
                  Nobuaki Kitajima and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {A Short Fail-Stop Signature Scheme from Factoring},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {309--316},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_22},
  doi          = {10.1007/978-3-319-12475-9\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YamakawaKNHO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangLWZS14,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Jian Weng and
                  Youcheng Zhang and
                  Kouichi Sakurai},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Fine-Grained Conditional Proxy Re-Encryption and Application},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {206--222},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_15},
  doi          = {10.1007/978-3-319-12475-9\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/YangLWZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Yoneyama14,
  author       = {Kazuki Yoneyama},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {317--325},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_23},
  doi          = {10.1007/978-3-319-12475-9\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Yoneyama14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaH14,
  author       = {Kazuki Yoneyama and
                  Goichiro Hanaoka},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Compact Public Key Encryption with Minimum Ideal Property of Hash
                  Functions},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {178--193},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_13},
  doi          = {10.1007/978-3-319-12475-9\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YoneyamaH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangZCLL14,
  author       = {Yinghui Zhang and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Jin Li and
                  Hui Li},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Computationally Efficient Ciphertext-Policy Attribute-Based Encryption
                  with Constant-Size Ciphertexts},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {259--273},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_18},
  doi          = {10.1007/978-3-319-12475-9\_18},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangZCLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhaoCLLS14,
  author       = {Guangyao Zhao and
                  Lei Cheng and
                  Chao Li and
                  Ruilin Li and
                  Xuan Shen},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {On the Practical Security Bound of {GF-NLFSR} Structure with {SPN}
                  Round Function},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_4},
  doi          = {10.1007/978-3-319-12475-9\_4},
  timestamp    = {Tue, 12 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhaoCLLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2014,
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9},
  doi          = {10.1007/978-3-319-12475-9},
  isbn         = {978-3-319-12474-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics