Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/books/collections/LCS2019.bht:"
@incollection{DBLP:books/sp/18/BaekSSHDY19, author = {Joonsang Baek and Willy Susilo and Khaled Salah and Jun Su Ha and Ernesto Damiani and Ilsun You}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Stateful Public-Key Encryption: {A} Security Solution for Resource-Constrained Environment}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {1--22}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_1}, doi = {10.1007/978-981-13-1483-4\_1}, timestamp = {Thu, 14 Oct 2021 08:45:55 +0200}, biburl = {https://dblp.org/rec/books/sp/18/BaekSSHDY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/BlaskiewiczHKKKSW19, author = {Przemyslaw Blaskiewicz and Lucjan Hanzlik and Kamil Kluczniak and Lukasz Krzywiecki and Miroslaw Kutylowski and Marcin Slowik and Marta Wszola}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Pseudonymous Signature Schemes}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {185--255}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_8}, doi = {10.1007/978-981-13-1483-4\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/BlaskiewiczHKKKSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/ChowST19, author = {Yang{-}Wai Chow and Willy Susilo and Pairat Thorncharoensri}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {{CAPTCHA} Design and Security Issues}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {69--92}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_4}, doi = {10.1007/978-981-13-1483-4\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/ChowST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/DiazCAKRY19, author = {Jesus Diaz and Seung Geol Choi and David Arroyo and Angelos D. Keromytis and Francisco B. Rodr{\'{\i}}guez and Moti Yung}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {143--183}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_7}, doi = {10.1007/978-981-13-1483-4\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/DiazCAKRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/Liu0ZHM19, author = {Jianghua Liu and Yang Xiang and Wanlei Zhou and Xinyi Huang and Jinhua Ma}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Data Authentication with Privacy Protection}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {115--142}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_6}, doi = {10.1007/978-981-13-1483-4\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/Liu0ZHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/Liu19, author = {Joseph K. Liu}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Ring Signature}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {93--114}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_5}, doi = {10.1007/978-981-13-1483-4\_5}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/Liu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/YuAY19, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Accountable Anonymous Credentials}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {49--68}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_3}, doi = {10.1007/978-981-13-1483-4\_3}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/YuAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/ZhangHZ019, author = {Zijian Zhang and Jialing He and Liehuang Zhu and Kui Ren}, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid}, booktitle = {Advances in Cyber Security: Principles, Techniques, and Applications}, pages = {23--48}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4\_2}, doi = {10.1007/978-981-13-1483-4\_2}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/ZhangHZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/LCS2019, editor = {Kuan{-}Ching Li and Xiaofeng Chen and Willy Susilo}, title = {Advances in Cyber Security: Principles, Techniques, and Applications}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1483-4}, doi = {10.1007/978-981-13-1483-4}, isbn = {978-981-13-1482-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/LCS2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.