Search dblp for Publications

export results for "toc:db/conf/acisp/acisp2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acisp/AgrawalCS15,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Somitra Sanadhya},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained
                  Devices},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {451--468},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_26},
  doi          = {10.1007/978-3-319-19962-7\_26},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AgrawalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AlissaRDS15,
  author       = {Khalid Alissa and
                  Jason Reid and
                  Ed Dawson and
                  Farzad Salim},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {{BP-XACML} an Authorisation Policy Language for Business Processes},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {307--325},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_18},
  doi          = {10.1007/978-3-319-19962-7\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AlissaRDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AvoineBC15,
  author       = {Gildas Avoine and
                  Adrien Bourgeois and
                  Xavier Carpent},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Analysis of Rainbow Tables with Fingerprints},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {356--374},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_21},
  doi          = {10.1007/978-3-319-19962-7\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AvoineBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BansalCS15,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Sponge Based {CCA2} Secure Asymmetric Encryption for Arbitrary Length
                  Message},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {93--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_6},
  doi          = {10.1007/978-3-319-19962-7\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BansalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BernsteinHLN15,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Ruben Niederhagen},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Bad Directions in Cryptographic Hash Functions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {488--508},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_28},
  doi          = {10.1007/978-3-319-19962-7\_28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BernsteinHLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bose0R15,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Chandrasekaran Pandu Rangan},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Constant Size Ring Signature Without Random Oracle},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {230--247},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_14},
  doi          = {10.1007/978-3-319-19962-7\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Bose0R15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMYGW15,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo and
                  Xiaofen Wang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {A New General Framework for Secure Public Key Encryption with Keyword
                  Search},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_4},
  doi          = {10.1007/978-3-319-19962-7\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenMYGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DattaY15,
  author       = {Nilanjan Datta and
                  Kan Yasuda},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Generalizing {PMAC} Under Weaker Assumptions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_25},
  doi          = {10.1007/978-3-319-19962-7\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DattaY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DowlingS15,
  author       = {Benjamin Dowling and
                  Douglas Stebila},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Modelling Ciphersuite and Version Negotiation in the {TLS} Protocol},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {270--288},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_16},
  doi          = {10.1007/978-3-319-19962-7\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DowlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/EgertFGJST15,
  author       = {Rolf Egert and
                  Marc Fischlin and
                  David Gens and
                  Sven Jacob and
                  Matthias Senker and
                  J{\"{o}}rn Tillmanns},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Privately Computing Set-Union and Set-Intersection Cardinality via
                  Bloom Filters},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {413--430},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_24},
  doi          = {10.1007/978-3-319-19962-7\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/EgertFGJST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FengMYL15,
  author       = {Yiteng Feng and
                  Yi Mu and
                  Guomin Yang and
                  Joseph K. Liu},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {A New Public Remote Integrity Checking Scheme with User Privacy},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {377--394},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_22},
  doi          = {10.1007/978-3-319-19962-7\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FengMYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhoshSSC15,
  author       = {Shamit Ghosh and
                  Dhiman Saha and
                  Abhrajit Sengupta and
                  Dipanwita Roy Chowdhury},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Preventing Fault Attacks Using Fault Randomization with a Case Study
                  on {AES}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {343--355},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_20},
  doi          = {10.1007/978-3-319-19962-7\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GhoshSSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GrittiSP15,
  author       = {Cl{\'{e}}mentine Gritti and
                  Willy Susilo and
                  Thomas Plantard},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Efficient Dynamic Provable Data Possession with Public Verifiability
                  and Data Privacy},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {395--412},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_23},
  doi          = {10.1007/978-3-319-19962-7\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GrittiSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuntherP15,
  author       = {Felix G{\"{u}}nther and
                  Bertram Poettering},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Linkable Message Tagging: Solving the Key Distribution Problem of
                  Signature Schemes},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {195--212},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_12},
  doi          = {10.1007/978-3-319-19962-7\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuntherP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshidaWS15,
  author       = {Yuu Ishida and
                  Yohei Watanabe and
                  Junji Shikata},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Constructions of CCA-Secure Revocable Identity-Based Encryption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_11},
  doi          = {10.1007/978-3-319-19962-7\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshidaWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ItoM15,
  author       = {Ryoma Ito and
                  Atsuko Miyaji},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {How {TKIP} Induces Biases of Internal States of Generic {RC4}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_19},
  doi          = {10.1007/978-3-319-19962-7\_19},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ItoM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaP15,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {{IBE} Under k k -LIN with Shorter Ciphertexts and Private Keys},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_9},
  doi          = {10.1007/978-3-319-19962-7\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiMGS15,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Willy Susilo},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Improved Identity-Based Online/Offline Encryption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_10},
  doi          = {10.1007/978-3-319-19962-7\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiMGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaLHL15,
  author       = {Bingke Ma and
                  Bao Li and
                  Ronglin Hao and
                  Xiaoqian Li},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Cryptanalysis of Reduced-Round Whirlwind},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {20--38},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_2},
  doi          = {10.1007/978-3-319-19962-7\_2},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaLHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NegreP15,
  author       = {Christophe N{\`{e}}gre and
                  Guilherme Perin},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Trade-Off Approaches for Leak Resistant Modular Arithmetic in {RNS}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_7},
  doi          = {10.1007/978-3-319-19962-7\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NegreP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SakaiESHO15,
  author       = {Yusuke Sakai and
                  Keita Emura and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Dynamic Threshold Public-Key Encryption with Decryption Consistency
                  from Static Assumptions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_5},
  doi          = {10.1007/978-3-319-19962-7\_5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SakaiESHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunWZ15,
  author       = {Zhelei Sun and
                  Peng Wang and
                  Liting Zhang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering
                  Schemes},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_1},
  doi          = {10.1007/978-3-319-19962-7\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Tang15,
  author       = {Qiang Tang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Towards Forward Security Properties for {PEKS} and {IBE}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_8},
  doi          = {10.1007/978-3-319-19962-7\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Tang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TaoW15,
  author       = {Biaoshuai Tao and
                  Hongjun Wu},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Improving the Biclique Cryptanalysis of {AES}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_3},
  doi          = {10.1007/978-3-319-19962-7\_3},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TaoW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TrethowenAMW15,
  author       = {Leliel Trethowen and
                  Craig Anslow and
                  Stuart Marshall and
                  Ian Welch},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {VisRAID: Visualizing Remote Access for Intrusion Detection},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {289--306},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_17},
  doi          = {10.1007/978-3-319-19962-7\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TrethowenAMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangT15,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Generic Transformation to Strongly Existentially Unforgeable Signature
                  Schemes with Continuous Leakage Resiliency},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {213--229},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_13},
  doi          = {10.1007/978-3-319-19962-7\_13},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YasudaSKYK15,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {471--487},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_27},
  doi          = {10.1007/978-3-319-19962-7\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YasudaSKYK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLH15,
  author       = {Tingting Zhang and
                  Hongda Li and
                  Guifang Huang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Constant-Round Leakage-Resilient Zero-Knowledge Argument for {NP}
                  from the Knowledge-of-Exponent Assumption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {251--269},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_15},
  doi          = {10.1007/978-3-319-19962-7\_15},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2015,
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7},
  doi          = {10.1007/978-3-319-19962-7},
  isbn         = {978-3-319-19961-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics