Search dblp for Publications

export results for "toc:db/conf/IEEEares/cd-ares2013w.bht:"

 download as .bib file

@inproceedings{DBLP:conf/IEEEares/AlaouiCBH13,
  author       = {Sidi Mohamed El Yousfi Alaoui and
                  Pierre{-}Louis Cayrel and
                  Rachid El Bansarkhani and
                  Gerhard Hoffmann},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Code-Based Identification and Signature Schemes in Software},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {122--136},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_9},
  doi          = {10.1007/978-3-642-40588-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlaouiCBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AlsuhibanyAMSM13,
  author       = {Suliman A. Alsuhibany and
                  Ahmad Alonaizi and
                  Charles Morisset and
                  Chris Smith and
                  Aad P. A. van Moorsel},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Experimental Investigation in the Impact on Security of the Release
                  Order of Defensive Algorithms},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {321--336},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_22},
  doi          = {10.1007/978-3-642-40588-4\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlsuhibanyAMSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Boehmer13,
  author       = {Wolfgang Boehmer},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {How to Estimate a Technical VaR Using Conditional Probability, Attack
                  Trees and a Crime Function},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {288--304},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_20},
  doi          = {10.1007/978-3-642-40588-4\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Boehmer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CamaraGLD13,
  author       = {Danilo F. C{\^{a}}mara and
                  Conrado Porto Lopes Gouv{\^{e}}a and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Ricardo Dahab},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Fast Software Polynomial Multiplication on {ARM} Processors Using
                  the {NEON} Engine},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {137--154},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_10},
  doi          = {10.1007/978-3-642-40588-4\_10},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CamaraGLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CastiglioneDSP13,
  author       = {Arcangelo Castiglione and
                  Ciriaco D'Ambrosio and
                  Alfredo De Santis and
                  Francesco Palmieri},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Fully Distributed Secure Video Surveillance Via Portable Device with
                  User Awareness},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {414--429},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_29},
  doi          = {10.1007/978-3-642-40588-4\_29},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CastiglioneDSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChenM13,
  author       = {Jiageng Chen and
                  Atsuko Miyaji},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_1},
  doi          = {10.1007/978-3-642-40588-4\_1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChenM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChenTY13,
  author       = {Chien{-}Ning Chen and
                  Jheng{-}Hong Tu and
                  Sung{-}Ming Yen},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {{SPA} on {MIST} Exponentiation Algorithm with Multiple Computational
                  Sequences},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {222--235},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_16},
  doi          = {10.1007/978-3-642-40588-4\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChenTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ColombiniCMC13,
  author       = {Clara Maria Colombini and
                  Antonio Colella and
                  Marco Mattiucci and
                  Aniello Castiglione},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Cyber Threats Monitoring: Experimental Analysis of Malware Behavior
                  in Cyberspace},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {236--252},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_17},
  doi          = {10.1007/978-3-642-40588-4\_17},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ColombiniCMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FlamminiMMPPV13,
  author       = {Francesco Flammini and
                  Stefano Marrone and
                  Nicola Mazzocca and
                  Alfio Pappalardo and
                  Concetta Pragliola and
                  Valeria Vittorini},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Trustworthiness Evaluation of Multi-sensor Situation Recognition in
                  Transit Surveillance Scenarios},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {442--456},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_31},
  doi          = {10.1007/978-3-642-40588-4\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FlamminiMMPPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GobboMM13,
  author       = {Nicola Gobbo and
                  Alessio Merlo and
                  Mauro Migliardi},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {A Denial of Service Attack to {GSM} Networks via Attach Procedure},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_25},
  doi          = {10.1007/978-3-642-40588-4\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GobboMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GsengerH13,
  author       = {Gerwin Gsenger and
                  Christian Hanser},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Improving the Efficiency of Elliptic Curve Scalar Multiplication Using
                  Binary Huff Curves},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {155--167},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_11},
  doi          = {10.1007/978-3-642-40588-4\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GsengerH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GuptaR13,
  author       = {Kishan Chand Gupta and
                  Indranil Ghosh Ray},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {On Constructions of {MDS} Matrices from Companion Matrices for Lightweight
                  Cryptography},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {29--43},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_3},
  doi          = {10.1007/978-3-642-40588-4\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GuptaR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HachajO13,
  author       = {Tomasz Hachaj and
                  Marek R. Ogiela},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Computer Karate Trainer in Tasks of Personal and Homeland Security
                  Defense},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {430--441},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_30},
  doi          = {10.1007/978-3-642-40588-4\_30},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HachajO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HanserW13,
  author       = {Christian Hanser and
                  Christian Wagner},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication
                  on Koblitz Curves},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {168--179},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_12},
  doi          = {10.1007/978-3-642-40588-4\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HanserW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HeatherCSSX13,
  author       = {James Heather and
                  Chris Culnane and
                  Steve A. Schneider and
                  Sriramkrishnan Srinivasan and
                  Zhe Xia},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Solving the Discrete Logarithm Problem for Packing Candidate Preferences},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {209--221},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_15},
  doi          = {10.1007/978-3-642-40588-4\_15},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HeatherCSSX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HuberGSB13,
  author       = {Matthias Huber and
                  Matthias Gabel and
                  Marco Schulze and
                  Alexander Bieber},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Cumulus4j: {A} Provably Secure Database Abstraction Layer},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {180--193},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_13},
  doi          = {10.1007/978-3-642-40588-4\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HuberGSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HulsingRB13,
  author       = {Andreas H{\"{u}}lsing and
                  Lea Rausch and
                  Johannes Buchmann},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Optimal Parameters for {XMSS} {MT}},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {194--208},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_14},
  doi          = {10.1007/978-3-642-40588-4\_14},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HulsingRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IslamAR13,
  author       = {Saad Islam and
                  Mehreen Afzal and
                  Adnan Rashdi},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {On the Security of LBlock against the Cube Attack and Side Channel
                  Cube Attack},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {105--121},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_8},
  doi          = {10.1007/978-3-642-40588-4\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IslamAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KamalZY13,
  author       = {Abdel Alim Kamal and
                  Roger Zahno and
                  Amr M. Youssef},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction
                  of Cryptographic Keys from Corrupted Memory Images},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_6},
  doi          = {10.1007/978-3-642-40588-4\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KamalZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoNTWM13,
  author       = {Shinsaku Kiyomoto and
                  Toru Nakamura and
                  Haruo Takasaki and
                  Ryu Watanabe and
                  Yutaka Miyake},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {{PPM:} Privacy Policy Manager for Personalized Services},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_26},
  doi          = {10.1007/978-3-642-40588-4\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KotenkoN13,
  author       = {Igor V. Kotenko and
                  Evgenia Novikova},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {VisSecAnalyzer: {A} Visual Analytics Tool for Network Security Assessment},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {345--360},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_24},
  doi          = {10.1007/978-3-642-40588-4\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KotenkoN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KubaiSW13,
  author       = {Asato Kubai and
                  Junji Shikata and
                  Yohei Watanabe},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Information-Theoretically Secure Aggregate Authentication Code: Model,
                  Bounds, and Constructions},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_2},
  doi          = {10.1007/978-3-642-40588-4\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KubaiSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiuHLYCYC13,
  author       = {Jung{-}Chun Liu and
                  Yi{-}Li Huang and
                  Fang{-}Yie Leu and
                  Ilsun You and
                  Feng{-}Ching Chiang and
                  Chao{-}Tung Yang and
                  William Cheng{-}Chung Chu},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {A Multiple-Key Management Scheme in Wireless Sensor Networks},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {337--344},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_23},
  doi          = {10.1007/978-3-642-40588-4\_23},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiuHLYCYC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiuZLW13,
  author       = {Bo Liu and
                  Baokang Zhao and
                  Bo Liu and
                  Chunqing Wu},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {An Attribute Based Private Data Sharing Scheme for People-Centric
                  Sensing Networks},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {393--407},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_27},
  doi          = {10.1007/978-3-642-40588-4\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiuZLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MashkoorHB13,
  author       = {Atif Mashkoor and
                  Osman Hasan and
                  Wolfgang Beer},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Using Probabilistic Analysis for the Certification of Machine Control
                  Systems},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {305--320},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_21},
  doi          = {10.1007/978-3-642-40588-4\_21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MashkoorHB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NiePB13,
  author       = {Xuyun Nie and
                  Albrecht Petzoldt and
                  Johannes Buchmann},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_7},
  doi          = {10.1007/978-3-642-40588-4\_7},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NiePB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/OgielaO13,
  author       = {Lidia Ogiela and
                  Marek R. Ogiela},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Intelligent {UBMSS} Systems for Strategic Information Management},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {408--413},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_28},
  doi          = {10.1007/978-3-642-40588-4\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/OgielaO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PalmieriFCLS13,
  author       = {Francesco Palmieri and
                  Ugo Fiore and
                  Aniello Castiglione and
                  Fang{-}Yie Leu and
                  Alfredo De Santis},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Analyzing the Internet Stability in Presence of Disasters},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {253--268},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_18},
  doi          = {10.1007/978-3-642-40588-4\_18},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PalmieriFCLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PatuY13,
  author       = {Vaise Patu and
                  Shuichiro Yamamoto},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {A New Approach to Develop a Dependable Security Case by Combining
                  Real Life Security Experiences (Lessons Learned) with D-Case Development
                  Process},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {457--464},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_32},
  doi          = {10.1007/978-3-642-40588-4\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PatuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Persichetti13,
  author       = {Edoardo Persichetti},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Code-Based Public-Key Encryption Resistant to Key Leakage},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {44--54},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_4},
  doi          = {10.1007/978-3-642-40588-4\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Persichetti13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchaberreiterVBRK13,
  author       = {Thomas Schaberreiter and
                  S{\'{e}}bastien Varrette and
                  Pascal Bouvry and
                  Juha R{\"{o}}ning and
                  Djamel Khadraoui},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Dependency Analysis for Critical Infrastructure Security Modelling:
                  {A} Case Study within the Grid'5000 Project},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {269--287},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_19},
  doi          = {10.1007/978-3-642-40588-4\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchaberreiterVBRK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/YasudaSKYK13,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Packed Homomorphic Encryption Based on Ideal Lattices and Its Application
                  to Biometrics},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {55--74},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_5},
  doi          = {10.1007/978-3-642-40588-4\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/YasudaSKYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2013cd-w,
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4},
  doi          = {10.1007/978-3-642-40588-4},
  isbn         = {978-3-642-40587-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/2013cd-w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics