Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/IEEEares/cd-ares2013w.bht:"
@inproceedings{DBLP:conf/IEEEares/AlaouiCBH13, author = {Sidi Mohamed El Yousfi Alaoui and Pierre{-}Louis Cayrel and Rachid El Bansarkhani and Gerhard Hoffmann}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Code-Based Identification and Signature Schemes in Software}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {122--136}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_9}, doi = {10.1007/978-3-642-40588-4\_9}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlaouiCBH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AlsuhibanyAMSM13, author = {Suliman A. Alsuhibany and Ahmad Alonaizi and Charles Morisset and Chris Smith and Aad P. A. van Moorsel}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {321--336}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_22}, doi = {10.1007/978-3-642-40588-4\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlsuhibanyAMSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Boehmer13, author = {Wolfgang Boehmer}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {288--304}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_20}, doi = {10.1007/978-3-642-40588-4\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Boehmer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CamaraGLD13, author = {Danilo F. C{\^{a}}mara and Conrado Porto Lopes Gouv{\^{e}}a and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Ricardo Dahab}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Fast Software Polynomial Multiplication on {ARM} Processors Using the {NEON} Engine}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {137--154}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_10}, doi = {10.1007/978-3-642-40588-4\_10}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CamaraGLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CastiglioneDSP13, author = {Arcangelo Castiglione and Ciriaco D'Ambrosio and Alfredo De Santis and Francesco Palmieri}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {414--429}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_29}, doi = {10.1007/978-3-642-40588-4\_29}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CastiglioneDSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChenM13, author = {Jiageng Chen and Atsuko Miyaji}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {1--15}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_1}, doi = {10.1007/978-3-642-40588-4\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ChenM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChenTY13, author = {Chien{-}Ning Chen and Jheng{-}Hong Tu and Sung{-}Ming Yen}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {{SPA} on {MIST} Exponentiation Algorithm with Multiple Computational Sequences}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {222--235}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_16}, doi = {10.1007/978-3-642-40588-4\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ChenTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ColombiniCMC13, author = {Clara Maria Colombini and Antonio Colella and Marco Mattiucci and Aniello Castiglione}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {236--252}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_17}, doi = {10.1007/978-3-642-40588-4\_17}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ColombiniCMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FlamminiMMPPV13, author = {Francesco Flammini and Stefano Marrone and Nicola Mazzocca and Alfio Pappalardo and Concetta Pragliola and Valeria Vittorini}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {442--456}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_31}, doi = {10.1007/978-3-642-40588-4\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/FlamminiMMPPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GobboMM13, author = {Nicola Gobbo and Alessio Merlo and Mauro Migliardi}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {A Denial of Service Attack to {GSM} Networks via Attach Procedure}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {361--376}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_25}, doi = {10.1007/978-3-642-40588-4\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GobboMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GsengerH13, author = {Gerwin Gsenger and Christian Hanser}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {155--167}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_11}, doi = {10.1007/978-3-642-40588-4\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GsengerH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GuptaR13, author = {Kishan Chand Gupta and Indranil Ghosh Ray}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {On Constructions of {MDS} Matrices from Companion Matrices for Lightweight Cryptography}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {29--43}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_3}, doi = {10.1007/978-3-642-40588-4\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GuptaR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HachajO13, author = {Tomasz Hachaj and Marek R. Ogiela}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Computer Karate Trainer in Tasks of Personal and Homeland Security Defense}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {430--441}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_30}, doi = {10.1007/978-3-642-40588-4\_30}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HachajO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HanserW13, author = {Christian Hanser and Christian Wagner}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {168--179}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_12}, doi = {10.1007/978-3-642-40588-4\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HanserW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HeatherCSSX13, author = {James Heather and Chris Culnane and Steve A. Schneider and Sriramkrishnan Srinivasan and Zhe Xia}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Solving the Discrete Logarithm Problem for Packing Candidate Preferences}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {209--221}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_15}, doi = {10.1007/978-3-642-40588-4\_15}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HeatherCSSX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HuberGSB13, author = {Matthias Huber and Matthias Gabel and Marco Schulze and Alexander Bieber}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Cumulus4j: {A} Provably Secure Database Abstraction Layer}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {180--193}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_13}, doi = {10.1007/978-3-642-40588-4\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HuberGSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HulsingRB13, author = {Andreas H{\"{u}}lsing and Lea Rausch and Johannes Buchmann}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Optimal Parameters for {XMSS} {MT}}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {194--208}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_14}, doi = {10.1007/978-3-642-40588-4\_14}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HulsingRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/IslamAR13, author = {Saad Islam and Mehreen Afzal and Adnan Rashdi}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {On the Security of LBlock against the Cube Attack and Side Channel Cube Attack}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {105--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_8}, doi = {10.1007/978-3-642-40588-4\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/IslamAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KamalZY13, author = {Abdel Alim Kamal and Roger Zahno and Amr M. Youssef}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {75--90}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_6}, doi = {10.1007/978-3-642-40588-4\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KamalZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KiyomotoNTWM13, author = {Shinsaku Kiyomoto and Toru Nakamura and Haruo Takasaki and Ryu Watanabe and Yutaka Miyake}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {{PPM:} Privacy Policy Manager for Personalized Services}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {377--392}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_26}, doi = {10.1007/978-3-642-40588-4\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KotenkoN13, author = {Igor V. Kotenko and Evgenia Novikova}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {VisSecAnalyzer: {A} Visual Analytics Tool for Network Security Assessment}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {345--360}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_24}, doi = {10.1007/978-3-642-40588-4\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KotenkoN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KubaiSW13, author = {Asato Kubai and Junji Shikata and Yohei Watanabe}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {16--28}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_2}, doi = {10.1007/978-3-642-40588-4\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KubaiSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LiuHLYCYC13, author = {Jung{-}Chun Liu and Yi{-}Li Huang and Fang{-}Yie Leu and Ilsun You and Feng{-}Ching Chiang and Chao{-}Tung Yang and William Cheng{-}Chung Chu}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {A Multiple-Key Management Scheme in Wireless Sensor Networks}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {337--344}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_23}, doi = {10.1007/978-3-642-40588-4\_23}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/LiuHLYCYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LiuZLW13, author = {Bo Liu and Baokang Zhao and Bo Liu and Chunqing Wu}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {393--407}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_27}, doi = {10.1007/978-3-642-40588-4\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LiuZLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MashkoorHB13, author = {Atif Mashkoor and Osman Hasan and Wolfgang Beer}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Using Probabilistic Analysis for the Certification of Machine Control Systems}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {305--320}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_21}, doi = {10.1007/978-3-642-40588-4\_21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MashkoorHB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NiePB13, author = {Xuyun Nie and Albrecht Petzoldt and Johannes Buchmann}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {91--104}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_7}, doi = {10.1007/978-3-642-40588-4\_7}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/NiePB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/OgielaO13, author = {Lidia Ogiela and Marek R. Ogiela}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Intelligent {UBMSS} Systems for Strategic Information Management}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {408--413}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_28}, doi = {10.1007/978-3-642-40588-4\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/OgielaO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PalmieriFCLS13, author = {Francesco Palmieri and Ugo Fiore and Aniello Castiglione and Fang{-}Yie Leu and Alfredo De Santis}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Analyzing the Internet Stability in Presence of Disasters}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {253--268}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_18}, doi = {10.1007/978-3-642-40588-4\_18}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PalmieriFCLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PatuY13, author = {Vaise Patu and Shuichiro Yamamoto}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {457--464}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_32}, doi = {10.1007/978-3-642-40588-4\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PatuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Persichetti13, author = {Edoardo Persichetti}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Code-Based Public-Key Encryption Resistant to Key Leakage}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {44--54}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_4}, doi = {10.1007/978-3-642-40588-4\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Persichetti13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchaberreiterVBRK13, author = {Thomas Schaberreiter and S{\'{e}}bastien Varrette and Pascal Bouvry and Juha R{\"{o}}ning and Djamel Khadraoui}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Dependency Analysis for Critical Infrastructure Security Modelling: {A} Case Study within the Grid'5000 Project}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {269--287}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_19}, doi = {10.1007/978-3-642-40588-4\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SchaberreiterVBRK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/YasudaSKYK13, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {55--74}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_5}, doi = {10.1007/978-3-642-40588-4\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/YasudaSKYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEares/2013cd-w, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4}, doi = {10.1007/978-3-642-40588-4}, isbn = {978-3-642-40587-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/2013cd-w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.