Search dblp for Publications

export results for "toc:db/conf/secrypt/secrypt2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/secrypt/AlisCEG08,
  author       = {Jorge Blasco Al{\'{\i}}s and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Arturo Ribagorda Garnacho},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {CSteg: Talking in {C} Code - Steganography of {C} Source Code in Text},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {399--406},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlisCEG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AmberkerS08,
  author       = {B. B. Amberker and
                  N. R. Sunitha},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer
                  with Multiple Original Signers},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {245--252},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AmberkerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ApampaZWA08,
  author       = {Kikelomo Maria Apampa and
                  Tian Zhang and
                  Gary B. Wills and
                  David Argles},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Ensuring Privacy of Biometric Factors in Multi-Factor Authentication
                  Systems},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {44--49},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ApampaZWA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ArenasAS08,
  author       = {{\'{A}}lvaro Enrique Arenas and
                  Benjamin Aziz and
                  Gheorghe Cosmin Silaghi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Reputation Management in Grid-based Virtual Organisations},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {538--545},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ArenasAS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Atta-ur-RahmanHKS08,
  author       = {Atta{-}ur{-}Rahman and
                  Mureed Hussain and
                  Kahina Kabri and
                  Dominique Seret},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Kerberos Implementation in Manets},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {161--166},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Atta-ur-RahmanHKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BagheriSN08,
  author       = {Nasour Bagheri and
                  Babak Sadeghiyan and
                  Majid Naderi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Multi-Collisions Attack in Ring Hash Structure},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {278--284},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 03 Dec 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BagheriSN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenferhatS08,
  author       = {Salem Benferhat and
                  Karima Sedki},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Alert Correlation based on a Logical Handling of Administrator Preferences
                  and Knowledge},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {50--56},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenferhatS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenferhatT08,
  author       = {Salem Benferhat and
                  Karim Tabia},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Novel and Anomalous Behavior Detection using Bayesian Network Classifiers},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {13--20},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenferhatT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenferhatT08a,
  author       = {Salem Benferhat and
                  Karim Tabia},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {New Schemes for Anomaly Score Aggregation and Thresholding},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {21--28},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenferhatT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BertoniBFR08,
  author       = {Guido Marco Bertoni and
                  Luca Breveglieri and
                  Roberto Farina and
                  Francesco Regazzoni},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A 640 Mbit/S 32-Bit Pipelined Implementation of the {AES} Algorithm},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {453--459},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BertoniBFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BoulaicheA08,
  author       = {Ammar Boulaiche and
                  Kamel Adi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Honeyd Detection Via Abnormal Behaviors Generated by the {ARPD} Daemon},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {65--71},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 17 Aug 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BoulaicheA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CampoHP08,
  author       = {Juan Vera del Campo and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Josep Pegueroles},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{SCFS:} Towards Design and Implementation of a Secure Distributed
                  Filesystem},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {169--176},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CampoHP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Carvalho08,
  author       = {Nuno Borges Carvalho},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {The Importance of Metrology in Wireless Communication Systems - From
                  {AM/FM} to {SDR} Systems},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {35--35},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Carvalho08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Chen08,
  author       = {Hsiao{-}Hwa Chen},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Next Generation {CDMA} Technologies for Futuristic Wireless Communications},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {37},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Chen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChewK08,
  author       = {Guanhan Chew and
                  Khoongming Khoo},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off
                  Attacks on Stream Ciphers},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {300--305},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChewK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CoiO08,
  author       = {Juri Luca De Coi and
                  Daniel Olmedilla},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Review of Trust Management, Security and Privacy Policy Languages},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {483--490},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CoiO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Cox08,
  author       = {Ingemar J. Cox},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Watermarking, Steganography and Content Forensics},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {29--29},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Cox08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Diehl08,
  author       = {Malte Diehl},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Geographic Data and Steganography - Using Google Earth and {KML} Files
                  for High-Capacity Steganography},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {381--387},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Diehl08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DionysiouBHF08,
  author       = {Ioanna Dionysiou and
                  David E. Bakken and
                  Carl H. Hauser and
                  Deborah A. Frincke},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Formalizing End-to-End Context-Aware Trust Relationships in Collaborative
                  Activities},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {546--553},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DionysiouBHF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/El-FotouhD08,
  author       = {Mohamed Abo El{-}Fotouh and
                  Klaus Diepold},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Fast Encryption Scheme for Networks Applications},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {119--127},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/El-FotouhD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/El-FotouhD08a,
  author       = {Mohamed Abo El{-}Fotouh and
                  Klaus Diepold},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {The Substitution Cipher Chaining Mode},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {421--429},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/El-FotouhD08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ElrakaibyCC08,
  author       = {Yehia ElRakaiby and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Interactivity for Reactive Access Control},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {57--64},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Sat, 15 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ElrakaibyCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GomathisankaranKT08,
  author       = {Mahadevan Gomathisankaran and
                  Ka{-}Ming Keung and
                  Akhilesh Tyagi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{REBEL} - Reconfigurable Block Encryption Logic},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {312--318},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GomathisankaranKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GoodB08,
  author       = {Tim Good and
                  Mohammed Benaissa},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Price to Provide {RFID} Security and Privacy?},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {209--213},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GoodB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GroverSMK08,
  author       = {Satyajit Grover and
                  Divya Naidu Kolar Sunder and
                  Samuel O. Moffatt and
                  Michael E. Kounavis},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {411--420},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GroverSMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GuelzimO08,
  author       = {Tarik Guelzim and
                  Mohammad S. Obaidat},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Novel Neurocomputing-based Scheme to Authenticate {WLAN} Users Employing
                  Distance Proximity Threshold},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {145--153},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GuelzimO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HassanB08,
  author       = {Mohamed N. Hassan and
                  Mohammed Benaissa},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Low Area Scalable Montgomery Inversion Over GF(2m)},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {363--367},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HassanB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HerbosaDC08,
  author       = {Ra{\'{u}}l Herbosa and
                  Gabriel D{\'{\i}}az and
                  Manuel Castro},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Securing the Email Services - New System for Secure Managing the Organization's
                  Mail Service},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {469--472},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HerbosaDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HidalgoCG08,
  author       = {Sergio Pozo Hidalgo and
                  Rafael Ceballos and
                  Rafael Martinez Gasca},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis
                  in Firewall Rule Sets},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {430--441},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HidalgoCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoumaniM08,
  author       = {Hanane Houmani and
                  Mohamed Mejri},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Ensuring the Correctness of Cryptographic Protocols with Respect to
                  Secrecy},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {184--189},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoumaniM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HwangTC08,
  author       = {Min{-}Shiang Hwang and
                  Shiang{-}Feng Tzeng and
                  Shu{-}Fen Chiou},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Improvement of Strong Proxy Signature and Its Applications},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {95--98},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HwangTC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JensenK08,
  author       = {Christian Damsgaard Jensen and
                  Thomas Rune Korsgaard},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Dynamics of Trust Evolution - Auto-configuration of Dispositional
                  Trust Dynamics},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {509--517},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JensenK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Jin08,
  author       = {Hongxia Jin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Traitor Tracing for Anonymous Attack in Content Protection},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {331--336},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Jin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JoshiP08,
  author       = {Shankar Joshi and
                  Alwyn R. Pais},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A New Probabilistic Rekeying Method for Secure Dynamic Groups},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {325--330},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JoshiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KilincY08,
  author       = {Celalettin Kilinc and
                  Ali G{\"{o}}khan Yavuz},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Applying {SRP} on {SIP} Authentication},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {227--231},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 02 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KilincY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KimN08,
  author       = {Kwang Ho Kim and
                  Christophe N{\`{e}}gre},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Point Multiplication on Supersingular Elliptic Curves Defined over
                  Fields of Characteristic 2 and 3},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {373--376},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KimN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoTS08,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {FPGA-Targeted Hardware Implementations of {K2}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {270--277},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Kogan08,
  author       = {Yaakov Kogan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Improving Reliability in Commercial {IP} Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {17--19},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Kogan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KuzuuHMW08,
  author       = {Kazuto Kuzuu and
                  Yasushi Hirano and
                  Kenji Mase and
                  Toyohide Watanabe},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Application to a Shared Terminal of a Roaming User Profile Set Up
                  through LDAP-Smart Card Authentication Cooperation},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {29--34},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KuzuuHMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LeeNU08,
  author       = {Peter Hyun{-}Jeen Lee and
                  Shivaramakrishnan Narayan and
                  Parampalli Udaya},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless
                  Encryption},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {306--311},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LeeNU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LenziniSE08,
  author       = {Gabriele Lenzini and
                  Nabil Sahli and
                  Henk Eertink},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Trust Model for High Quality Recommendation},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {518--528},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 02 Nov 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/LenziniSE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiN08,
  author       = {Yin Li and
                  Christophe N{\`{e}}gre},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Efficient Multiplication Algorithm using Binomial Residue Representation},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {319--324},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 21 Jun 2010 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lopez-GarciaRC08,
  author       = {Lourdes L{\'{o}}pez{-}Garc{\'{\i}}a and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Miguel Le{\'{o}}n Ch{\'{a}}vez},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An e-Voting Protocol based on Pairing Blind Signatures},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {214--217},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 22 Jun 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lopez-GarciaRC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Marca08,
  author       = {David A. Marca},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {e-Business Innovation - Surviving the Coming Decades},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {5--16},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Marca08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Maurer08,
  author       = {Ueli M. Maurer},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Rethinking Digital Signatures},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {31--33},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 07 Oct 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Maurer08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MelladoFP08,
  author       = {Daniel Mellado and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Mario Piattini},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Security Requirements in Software Product Lines},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {442--449},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MelladoFP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MianiZMP08,
  author       = {Rodrigo Sanches Miani and
                  Bruno Bogaz Zarpel{\~{a}}o and
                  Leonardo de Souza Mendes and
                  Mario Lemes Proen{\c{c}}a Jr.},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Metrics Application in Metropolitan Broadband Access Network Security
                  Analysis},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {473--476},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 11 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MianiZMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MizunoD08,
  author       = {Takeo Mizuno and
                  Hiroshi Doi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Efficient {IBE-PKE} Proxy Re-Encryption},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {285--293},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MizunoD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MouradAD08,
  author       = {Azzam Mourad and
                  Dima Alhadidi and
                  Mourad Debbabi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Towards Language-Independent Approach for Security Concerns Weaving},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {460--465},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MouradAD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MufticS08,
  author       = {Sead Muftic and
                  Gernot Schmoelzer},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Cryptonet: Secure E-Mail System},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {84--91},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MufticS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Muller08,
  author       = {Volker M{\"{u}}ller},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Short Note on Secret Sharing using Elliptic Curves},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {359--362},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Thu, 31 Mar 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Muller08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Munoz-GeaMMSG08,
  author       = {Juan Pedro Mu{\~{n}}oz{-}Gea and
                  Josemaria Malgosa{-}Sanahuja and
                  Pilar Manzanares{-}Lopez and
                  Juan Carlos S{\'{a}}nchez{-}Aarnoutse and
                  Joan Garc{\'{\i}}a{-}Haro},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Efficient Methodology to Limit Path Length Guaranteeing Anonymity
                  in Overlay Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {205--208},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Tue, 15 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Munoz-GeaMMSG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MurtyV08,
  author       = {V. Kumar Murty and
                  Nikolajs Volkovs},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Polynomial based Hashing Algorithm},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {103--106},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MurtyV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MurtyX08,
  author       = {V. Kumar Murty and
                  Guangwu Xu},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Security and Authentication for Networked Storage},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {477--480},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MurtyX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NagyAK08,
  author       = {Marius Nagy and
                  Selim G. Akl and
                  Sean Kershaw},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Key Distribution based on Quantum Fourier Transform},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {263--269},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NagyAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NarayanUL08,
  author       = {Shivaramakrishnan Narayan and
                  Parampalli Udaya and
                  Peter Hyun{-}Jeen Lee},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Identity-based Signcryption without Random Oracles},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {342--347},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NarayanUL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NeppachPWLMSW08,
  author       = {Andreas Neppach and
                  Christian Pfaffel{-}Janser and
                  Ilse Wimberger and
                  Thomas Lor{\"{u}}nser and
                  Michael Meyenburg and
                  Alexander Szekely and
                  Johannes Wolkerstorfer},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Key Management of Quantum Generated Keys in IPsec},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {177--183},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NeppachPWLMSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NikovV08,
  author       = {Ventzislav Nikov and
                  Marc Vauclair},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Yet Another Secure Distance-Bounding Protocol},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {218--221},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NikovV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OhtsukaKTBY08,
  author       = {Shinsuke Ohtsuka and
                  Satoshi Kawamoto and
                  Shigeru Takano and
                  Kensuke Baba and
                  Hiroto Yasuura},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Note on Biometrics-based Authentication with Portable Device},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {99--102},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OhtsukaKTBY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OrencikPSK08,
  author       = {Cengiz {\"{O}}rencik and
                  Thomas Brochmann Pedersen and
                  Erkay Savas and
                  Mehmet Keskin{\"{o}}z},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Improved Fuzzy Vault Scheme for Fingerprint Verification},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {37--43},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/OrencikPSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Overbeck08,
  author       = {Raphael Overbeck},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Multiple Birthday Attack on {NTRU}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {237--244},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Overbeck08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW08,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Fair e-Tendering Protocol},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {294--299},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PohM08,
  author       = {Geong Sen Poh and
                  Keith M. Martin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {On the (In)Security of Two Buyer-Seller Watermarking Protocols},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {253--260},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PohM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Preneel08,
  author       = {Bart Preneel},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Cryptographic Algorithms - Successes, Failures and Challenges},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {21--27},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Preneel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/QuerciaCZ08,
  author       = {Daniele Quercia and
                  Licia Capra and
                  Valentina Zanardi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Selecting Trustworthy Content using Tags},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {501--508},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/QuerciaCZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/QureshiSI08,
  author       = {Muhammed Nauman Qureshi and
                  Muhammad Nadeem Sial and
                  Nassar Ikram},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Efficient Reconfigurable {SOS} Montgomery Multiplier in {GF} {(P)}
                  usign {FPGA} {DSP} Slices},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {355--358},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/QureshiSI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SalvadorNFV08,
  author       = {Paulo Salvador and
                  Ant{\'{o}}nio Nogueira and
                  Ulisses Fran{\c{c}}a and
                  Rui Valadas},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Detection of Illicit Traffic using Neural Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {5--12},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SalvadorNFV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SanchezVFP08,
  author       = {Luis Enrique S{\'{a}}nchez and
                  Daniel Villafranca and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Mario Piattini},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Practical Application of a Security Management Maturity Model for
                  SMEs based on Predefined Schemas},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {391--398},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SanchezVFP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchreudersP08,
  author       = {Z. Cliffe Schreuders and
                  Christian Payne},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Functionality-based Application Confinement - Parameterised Hierarchical
                  Application Restrictions},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {72--77},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchreudersP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ShibliM08,
  author       = {Muhammad Awais Shibli and
                  Sead Muftic},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Intrusion Detection and Prevention System using Secure Mobile Agents},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {107--113},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ShibliM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SilvaSAL08,
  author       = {Eduardo da Silva and
                  Aldri Luiz dos Santos and
                  Luiz Carlos Pessoa Albini and
                  Michele Nogueira Lima},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Quantifying Misbehaviour Attacks Against the Self-Organized Public
                  Key Management on Manets},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {128--135},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 15 Sep 2010 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SilvaSAL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SundararajanO08,
  author       = {Mukund Sundararajan and
                  Mohammad S. Obaidat},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {New Techniques to Enhance the Capabilities of the Socks Network Security
                  Protocol},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {197--201},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SundararajanO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SzollosiFM08,
  author       = {Lor{\'{a}}nd Sz{\"{o}}ll{\"{o}}si and
                  G{\'{a}}bor Feh{\'{e}}r and
                  Tam{\'{a}}s Marosits},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Proper Key Generation for the IzoSign Algorithm},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {368--372},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SzollosiFM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VergaraVG08,
  author       = {Jorge E. L{\'{o}}pez de Vergara and
                  Enrique V{\'{a}}zquez and
                  Javier Guerra},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Security Policy Instantiation to React to Network Attacks - An Ontology-based
                  Approach using {OWL} and {SWRL}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {78--83},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VergaraVG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WangZ08,
  author       = {Qinghua Wang and
                  Tingting Zhang},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Sec-SNMP: Policy-based Security Management for Sensor Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {222--226},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/WangZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/XiongT08,
  author       = {Kaiqi Xiong and
                  David J. Thuente},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Efficient Localization Schemes in Sensor Networks with Malicious Nodes},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {190--196},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/XiongT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/XuFSW08,
  author       = {Peng Xu and
                  Zhiyi Fang and
                  Hang Su and
                  Chuyi Wei},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Experimental Research and Capability Valuation on Security of {SOA-SCA}
                  based {SDO}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {337--341},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/XuFSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yan08,
  author       = {Zheng Yan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Autonomic Trust Management for a Pervasive System},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {491--500},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Yan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YasirHKS08,
  author       = {Muhammad Yasir and
                  Mureed Hussain and
                  Kahina Kabri and
                  Dominique Seret},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{SAKE} - Secure Authenticated Key Establishment in Sensor Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {154--160},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YasirHKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YilmazLS08,
  author       = {Omer Zekvan Yilmaz and
                  Albert Levi and
                  Erkay Savas},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Multiphase Deployment Models for Fast Self Healing in Wireless Sensor
                  Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {136--144},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YilmazLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama08,
  author       = {Kazuki Yoneyama},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Anonymous Message Authentication - Universally Composable Definition
                  and Construction},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {351--354},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Yoneyama08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Zuquete08,
  author       = {Andr{\'{e}} Z{\'{u}}quete},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Enhanced Secure Interface for a Portable e-Voting Terminal},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {529--537},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Zuquete08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2008,
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  isbn         = {978-989-8111-59-3},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics