Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/secrypt/secrypt2008.bht:"
@inproceedings{DBLP:conf/secrypt/AlisCEG08, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda Garnacho}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {CSteg: Talking in {C} Code - Steganography of {C} Source Code in Text}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {399--406}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:20:36 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlisCEG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AmberkerS08, author = {B. B. Amberker and N. R. Sunitha}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {245--252}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AmberkerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ApampaZWA08, author = {Kikelomo Maria Apampa and Tian Zhang and Gary B. Wills and David Argles}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {44--49}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ApampaZWA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ArenasAS08, author = {{\'{A}}lvaro Enrique Arenas and Benjamin Aziz and Gheorghe Cosmin Silaghi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Reputation Management in Grid-based Virtual Organisations}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {538--545}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ArenasAS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Atta-ur-RahmanHKS08, author = {Atta{-}ur{-}Rahman and Mureed Hussain and Kahina Kabri and Dominique Seret}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Kerberos Implementation in Manets}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {161--166}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Atta-ur-RahmanHKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BagheriSN08, author = {Nasour Bagheri and Babak Sadeghiyan and Majid Naderi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Multi-Collisions Attack in Ring Hash Structure}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {278--284}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 03 Dec 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BagheriSN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenferhatS08, author = {Salem Benferhat and Karima Sedki}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {50--56}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BenferhatS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenferhatT08, author = {Salem Benferhat and Karim Tabia}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Novel and Anomalous Behavior Detection using Bayesian Network Classifiers}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {13--20}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BenferhatT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenferhatT08a, author = {Salem Benferhat and Karim Tabia}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {New Schemes for Anomaly Score Aggregation and Thresholding}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {21--28}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BenferhatT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BertoniBFR08, author = {Guido Marco Bertoni and Luca Breveglieri and Roberto Farina and Francesco Regazzoni}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A 640 Mbit/S 32-Bit Pipelined Implementation of the {AES} Algorithm}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {453--459}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BertoniBFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BoulaicheA08, author = {Ammar Boulaiche and Kamel Adi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Honeyd Detection Via Abnormal Behaviors Generated by the {ARPD} Daemon}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {65--71}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 17 Aug 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BoulaicheA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CampoHP08, author = {Juan Vera del Campo and Juan Hern{\'{a}}ndez{-}Serrano and Josep Pegueroles}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{SCFS:} Towards Design and Implementation of a Secure Distributed Filesystem}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {169--176}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CampoHP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Carvalho08, author = {Nuno Borges Carvalho}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {The Importance of Metrology in Wireless Communication Systems - From {AM/FM} to {SDR} Systems}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {35--35}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Carvalho08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Chen08, author = {Hsiao{-}Hwa Chen}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Next Generation {CDMA} Technologies for Futuristic Wireless Communications}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Chen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChewK08, author = {Guanhan Chew and Khoongming Khoo}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {300--305}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChewK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CoiO08, author = {Juri Luca De Coi and Daniel Olmedilla}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Review of Trust Management, Security and Privacy Policy Languages}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {483--490}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CoiO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Cox08, author = {Ingemar J. Cox}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Watermarking, Steganography and Content Forensics}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {29--29}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Cox08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Diehl08, author = {Malte Diehl}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Geographic Data and Steganography - Using Google Earth and {KML} Files for High-Capacity Steganography}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {381--387}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Diehl08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DionysiouBHF08, author = {Ioanna Dionysiou and David E. Bakken and Carl H. Hauser and Deborah A. Frincke}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {546--553}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DionysiouBHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/El-FotouhD08, author = {Mohamed Abo El{-}Fotouh and Klaus Diepold}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Fast Encryption Scheme for Networks Applications}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {119--127}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/El-FotouhD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/El-FotouhD08a, author = {Mohamed Abo El{-}Fotouh and Klaus Diepold}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {The Substitution Cipher Chaining Mode}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {421--429}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/El-FotouhD08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ElrakaibyCC08, author = {Yehia ElRakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Interactivity for Reactive Access Control}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {57--64}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ElrakaibyCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GomathisankaranKT08, author = {Mahadevan Gomathisankaran and Ka{-}Ming Keung and Akhilesh Tyagi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{REBEL} - Reconfigurable Block Encryption Logic}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {312--318}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GomathisankaranKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GoodB08, author = {Tim Good and Mohammed Benaissa}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Price to Provide {RFID} Security and Privacy?}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {209--213}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GoodB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GroverSMK08, author = {Satyajit Grover and Divya Naidu Kolar Sunder and Samuel O. Moffatt and Michael E. Kounavis}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {411--420}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GroverSMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GuelzimO08, author = {Tarik Guelzim and Mohammad S. Obaidat}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Novel Neurocomputing-based Scheme to Authenticate {WLAN} Users Employing Distance Proximity Threshold}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {145--153}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GuelzimO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HassanB08, author = {Mohamed N. Hassan and Mohammed Benaissa}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Low Area Scalable Montgomery Inversion Over GF(2m)}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {363--367}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HassanB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HerbosaDC08, author = {Ra{\'{u}}l Herbosa and Gabriel D{\'{\i}}az and Manuel Castro}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Securing the Email Services - New System for Secure Managing the Organization's Mail Service}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {469--472}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HerbosaDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HidalgoCG08, author = {Sergio Pozo Hidalgo and Rafael Ceballos and Rafael Martinez Gasca}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {430--441}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HidalgoCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoumaniM08, author = {Hanane Houmani and Mohamed Mejri}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {184--189}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HoumaniM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HwangTC08, author = {Min{-}Shiang Hwang and Shiang{-}Feng Tzeng and Shu{-}Fen Chiou}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Improvement of Strong Proxy Signature and Its Applications}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {95--98}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HwangTC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JensenK08, author = {Christian Damsgaard Jensen and Thomas Rune Korsgaard}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {509--517}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JensenK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Jin08, author = {Hongxia Jin}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Traitor Tracing for Anonymous Attack in Content Protection}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {331--336}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Jin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JoshiP08, author = {Shankar Joshi and Alwyn R. Pais}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A New Probabilistic Rekeying Method for Secure Dynamic Groups}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {325--330}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JoshiP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KilincY08, author = {Celalettin Kilinc and Ali G{\"{o}}khan Yavuz}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Applying {SRP} on {SIP} Authentication}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {227--231}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Mon, 02 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KilincY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KimN08, author = {Kwang Ho Kim and Christophe N{\`{e}}gre}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {373--376}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KimN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoTS08, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {FPGA-Targeted Hardware Implementations of {K2}}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {270--277}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Kogan08, author = {Yaakov Kogan}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Improving Reliability in Commercial {IP} Networks}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {17--19}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Kogan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KuzuuHMW08, author = {Kazuto Kuzuu and Yasushi Hirano and Kenji Mase and Toyohide Watanabe}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {29--34}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KuzuuHMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LeeNU08, author = {Peter Hyun{-}Jeen Lee and Shivaramakrishnan Narayan and Parampalli Udaya}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {306--311}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LeeNU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LenziniSE08, author = {Gabriele Lenzini and Nabil Sahli and Henk Eertink}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Trust Model for High Quality Recommendation}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {518--528}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Mon, 02 Nov 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/LenziniSE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiN08, author = {Yin Li and Christophe N{\`{e}}gre}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Efficient Multiplication Algorithm using Binomial Residue Representation}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {319--324}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Mon, 21 Jun 2010 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Lopez-GarciaRC08, author = {Lourdes L{\'{o}}pez{-}Garc{\'{\i}}a and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Miguel Le{\'{o}}n Ch{\'{a}}vez}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An e-Voting Protocol based on Pairing Blind Signatures}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {214--217}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Mon, 22 Jun 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Lopez-GarciaRC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Marca08, author = {David A. Marca}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {e-Business Innovation - Surviving the Coming Decades}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--16}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Marca08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Maurer08, author = {Ueli M. Maurer}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Rethinking Digital Signatures}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {31--33}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Wed, 07 Oct 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Maurer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MelladoFP08, author = {Daniel Mellado and Eduardo Fern{\'{a}}ndez{-}Medina and Mario Piattini}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Security Requirements in Software Product Lines}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {442--449}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MelladoFP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MianiZMP08, author = {Rodrigo Sanches Miani and Bruno Bogaz Zarpel{\~{a}}o and Leonardo de Souza Mendes and Mario Lemes Proen{\c{c}}a Jr.}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Metrics Application in Metropolitan Broadband Access Network Security Analysis}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {473--476}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 11 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MianiZMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MizunoD08, author = {Takeo Mizuno and Hiroshi Doi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Efficient {IBE-PKE} Proxy Re-Encryption}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {285--293}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MizunoD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MouradAD08, author = {Azzam Mourad and Dima Alhadidi and Mourad Debbabi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Towards Language-Independent Approach for Security Concerns Weaving}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {460--465}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MouradAD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MufticS08, author = {Sead Muftic and Gernot Schmoelzer}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Cryptonet: Secure E-Mail System}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {84--91}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MufticS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Muller08, author = {Volker M{\"{u}}ller}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Short Note on Secret Sharing using Elliptic Curves}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {359--362}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Thu, 31 Mar 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Muller08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Munoz-GeaMMSG08, author = {Juan Pedro Mu{\~{n}}oz{-}Gea and Josemaria Malgosa{-}Sanahuja and Pilar Manzanares{-}Lopez and Juan Carlos S{\'{a}}nchez{-}Aarnoutse and Joan Garc{\'{\i}}a{-}Haro}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {205--208}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Tue, 15 Nov 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Munoz-GeaMMSG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MurtyV08, author = {V. Kumar Murty and Nikolajs Volkovs}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Polynomial based Hashing Algorithm}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {103--106}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MurtyV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MurtyX08, author = {V. Kumar Murty and Guangwu Xu}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Security and Authentication for Networked Storage}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {477--480}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MurtyX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NagyAK08, author = {Marius Nagy and Selim G. Akl and Sean Kershaw}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Key Distribution based on Quantum Fourier Transform}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {263--269}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NagyAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NarayanUL08, author = {Shivaramakrishnan Narayan and Parampalli Udaya and Peter Hyun{-}Jeen Lee}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Identity-based Signcryption without Random Oracles}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {342--347}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NarayanUL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NeppachPWLMSW08, author = {Andreas Neppach and Christian Pfaffel{-}Janser and Ilse Wimberger and Thomas Lor{\"{u}}nser and Michael Meyenburg and Alexander Szekely and Johannes Wolkerstorfer}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Key Management of Quantum Generated Keys in IPsec}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {177--183}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NeppachPWLMSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NikovV08, author = {Ventzislav Nikov and Marc Vauclair}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Yet Another Secure Distance-Bounding Protocol}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {218--221}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NikovV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OhtsukaKTBY08, author = {Shinsuke Ohtsuka and Satoshi Kawamoto and Shigeru Takano and Kensuke Baba and Hiroto Yasuura}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Note on Biometrics-based Authentication with Portable Device}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {99--102}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OhtsukaKTBY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OrencikPSK08, author = {Cengiz {\"{O}}rencik and Thomas Brochmann Pedersen and Erkay Savas and Mehmet Keskin{\"{o}}z}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Improved Fuzzy Vault Scheme for Fingerprint Verification}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--43}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/OrencikPSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Overbeck08, author = {Raphael Overbeck}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Multiple Birthday Attack on {NTRU}}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {237--244}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Overbeck08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW08, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Fair e-Tendering Protocol}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {294--299}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PohM08, author = {Geong Sen Poh and Keith M. Martin}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {On the (In)Security of Two Buyer-Seller Watermarking Protocols}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {253--260}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PohM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Preneel08, author = {Bart Preneel}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Cryptographic Algorithms - Successes, Failures and Challenges}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {21--27}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Preneel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/QuerciaCZ08, author = {Daniele Quercia and Licia Capra and Valentina Zanardi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Selecting Trustworthy Content using Tags}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {501--508}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/QuerciaCZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/QureshiSI08, author = {Muhammed Nauman Qureshi and Muhammad Nadeem Sial and Nassar Ikram}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Efficient Reconfigurable {SOS} Montgomery Multiplier in {GF} {(P)} usign {FPGA} {DSP} Slices}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {355--358}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/QureshiSI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SalvadorNFV08, author = {Paulo Salvador and Ant{\'{o}}nio Nogueira and Ulisses Fran{\c{c}}a and Rui Valadas}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Detection of Illicit Traffic using Neural Networks}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--12}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SalvadorNFV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SanchezVFP08, author = {Luis Enrique S{\'{a}}nchez and Daniel Villafranca and Eduardo Fern{\'{a}}ndez{-}Medina and Mario Piattini}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {391--398}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SanchezVFP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchreudersP08, author = {Z. Cliffe Schreuders and Christian Payne}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {72--77}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchreudersP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ShibliM08, author = {Muhammad Awais Shibli and Sead Muftic}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Intrusion Detection and Prevention System using Secure Mobile Agents}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {107--113}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ShibliM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SilvaSAL08, author = {Eduardo da Silva and Aldri Luiz dos Santos and Luiz Carlos Pessoa Albini and Michele Nogueira Lima}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {128--135}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Wed, 15 Sep 2010 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SilvaSAL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SundararajanO08, author = {Mukund Sundararajan and Mohammad S. Obaidat}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {New Techniques to Enhance the Capabilities of the Socks Network Security Protocol}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {197--201}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SundararajanO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SzollosiFM08, author = {Lor{\'{a}}nd Sz{\"{o}}ll{\"{o}}si and G{\'{a}}bor Feh{\'{e}}r and Tam{\'{a}}s Marosits}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Proper Key Generation for the IzoSign Algorithm}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {368--372}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SzollosiFM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VergaraVG08, author = {Jorge E. L{\'{o}}pez de Vergara and Enrique V{\'{a}}zquez and Javier Guerra}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using {OWL} and {SWRL}}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {78--83}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VergaraVG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WangZ08, author = {Qinghua Wang and Tingting Zhang}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Sec-SNMP: Policy-based Security Management for Sensor Networks}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {222--226}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/WangZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/XiongT08, author = {Kaiqi Xiong and David J. Thuente}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Efficient Localization Schemes in Sensor Networks with Malicious Nodes}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {190--196}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/XiongT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/XuFSW08, author = {Peng Xu and Zhiyi Fang and Hang Su and Chuyi Wei}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Experimental Research and Capability Valuation on Security of {SOA-SCA} based {SDO}}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {337--341}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/XuFSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Yan08, author = {Zheng Yan}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Autonomic Trust Management for a Pervasive System}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {491--500}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Yan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YasirHKS08, author = {Muhammad Yasir and Mureed Hussain and Kahina Kabri and Dominique Seret}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{SAKE} - Secure Authenticated Key Establishment in Sensor Networks}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {154--160}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YasirHKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YilmazLS08, author = {Omer Zekvan Yilmaz and Albert Levi and Erkay Savas}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {136--144}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YilmazLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Yoneyama08, author = {Kazuki Yoneyama}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Anonymous Message Authentication - Universally Composable Definition and Construction}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {351--354}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Yoneyama08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Zuquete08, author = {Andr{\'{e}} Z{\'{u}}quete}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Enhanced Secure Interface for a Portable e-Voting Terminal}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {529--537}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Zuquete08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2008, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {{INSTICC} Press}, year = {2008}, isbn = {978-989-8111-59-3}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.