Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2015.bht:"
@inproceedings{DBLP:conf/acisp/AgrawalCS15, author = {Megha Agrawal and Donghoon Chang and Somitra Sanadhya}, editor = {Ernest Foo and Douglas Stebila}, title = {sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {451--468}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_26}, doi = {10.1007/978-3-319-19962-7\_26}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AgrawalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AlissaRDS15, author = {Khalid Alissa and Jason Reid and Ed Dawson and Farzad Salim}, editor = {Ernest Foo and Douglas Stebila}, title = {{BP-XACML} an Authorisation Policy Language for Business Processes}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {307--325}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_18}, doi = {10.1007/978-3-319-19962-7\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AlissaRDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AvoineBC15, author = {Gildas Avoine and Adrien Bourgeois and Xavier Carpent}, editor = {Ernest Foo and Douglas Stebila}, title = {Analysis of Rainbow Tables with Fingerprints}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {356--374}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_21}, doi = {10.1007/978-3-319-19962-7\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AvoineBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BansalCS15, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, editor = {Ernest Foo and Douglas Stebila}, title = {Sponge Based {CCA2} Secure Asymmetric Encryption for Arbitrary Length Message}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {93--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_6}, doi = {10.1007/978-3-319-19962-7\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BansalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BernsteinHLN15, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen}, editor = {Ernest Foo and Douglas Stebila}, title = {Bad Directions in Cryptographic Hash Functions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {488--508}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_28}, doi = {10.1007/978-3-319-19962-7\_28}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BernsteinHLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Bose0R15, author = {Priyanka Bose and Dipanjan Das and Chandrasekaran Pandu Rangan}, editor = {Ernest Foo and Douglas Stebila}, title = {Constant Size Ring Signature Without Random Oracle}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {230--247}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_14}, doi = {10.1007/978-3-319-19962-7\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Bose0R15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenMYGW15, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xiaofen Wang}, editor = {Ernest Foo and Douglas Stebila}, title = {A New General Framework for Secure Public Key Encryption with Keyword Search}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {59--76}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_4}, doi = {10.1007/978-3-319-19962-7\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenMYGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DattaY15, author = {Nilanjan Datta and Kan Yasuda}, editor = {Ernest Foo and Douglas Stebila}, title = {Generalizing {PMAC} Under Weaker Assumptions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {433--450}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_25}, doi = {10.1007/978-3-319-19962-7\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DattaY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DowlingS15, author = {Benjamin Dowling and Douglas Stebila}, editor = {Ernest Foo and Douglas Stebila}, title = {Modelling Ciphersuite and Version Negotiation in the {TLS} Protocol}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {270--288}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_16}, doi = {10.1007/978-3-319-19962-7\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DowlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/EgertFGJST15, author = {Rolf Egert and Marc Fischlin and David Gens and Sven Jacob and Matthias Senker and J{\"{o}}rn Tillmanns}, editor = {Ernest Foo and Douglas Stebila}, title = {Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {413--430}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_24}, doi = {10.1007/978-3-319-19962-7\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/EgertFGJST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FengMYL15, author = {Yiteng Feng and Yi Mu and Guomin Yang and Joseph K. Liu}, editor = {Ernest Foo and Douglas Stebila}, title = {A New Public Remote Integrity Checking Scheme with User Privacy}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {377--394}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_22}, doi = {10.1007/978-3-319-19962-7\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FengMYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhoshSSC15, author = {Shamit Ghosh and Dhiman Saha and Abhrajit Sengupta and Dipanwita Roy Chowdhury}, editor = {Ernest Foo and Douglas Stebila}, title = {Preventing Fault Attacks Using Fault Randomization with a Case Study on {AES}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {343--355}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_20}, doi = {10.1007/978-3-319-19962-7\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GhoshSSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GrittiSP15, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard}, editor = {Ernest Foo and Douglas Stebila}, title = {Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {395--412}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_23}, doi = {10.1007/978-3-319-19962-7\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GrittiSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuntherP15, author = {Felix G{\"{u}}nther and Bertram Poettering}, editor = {Ernest Foo and Douglas Stebila}, title = {Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {195--212}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_12}, doi = {10.1007/978-3-319-19962-7\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuntherP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshidaWS15, author = {Yuu Ishida and Yohei Watanabe and Junji Shikata}, editor = {Ernest Foo and Douglas Stebila}, title = {Constructions of CCA-Secure Revocable Identity-Based Encryption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {174--191}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_11}, doi = {10.1007/978-3-319-19962-7\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshidaWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ItoM15, author = {Ryoma Ito and Atsuko Miyaji}, editor = {Ernest Foo and Douglas Stebila}, title = {How {TKIP} Induces Biases of Internal States of Generic {RC4}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {329--342}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_19}, doi = {10.1007/978-3-319-19962-7\_19}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ItoM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaP15, author = {Kaoru Kurosawa and Le Trieu Phong}, editor = {Ernest Foo and Douglas Stebila}, title = {{IBE} Under k k -LIN with Shorter Ciphertexts and Private Keys}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {145--159}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_9}, doi = {10.1007/978-3-319-19962-7\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiMGS15, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Willy Susilo}, editor = {Ernest Foo and Douglas Stebila}, title = {Improved Identity-Based Online/Offline Encryption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {160--173}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_10}, doi = {10.1007/978-3-319-19962-7\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiMGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaLHL15, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, editor = {Ernest Foo and Douglas Stebila}, title = {Cryptanalysis of Reduced-Round Whirlwind}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {20--38}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_2}, doi = {10.1007/978-3-319-19962-7\_2}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaLHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NegreP15, author = {Christophe N{\`{e}}gre and Guilherme Perin}, editor = {Ernest Foo and Douglas Stebila}, title = {Trade-Off Approaches for Leak Resistant Modular Arithmetic in {RNS}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {107--124}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_7}, doi = {10.1007/978-3-319-19962-7\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NegreP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SakaiESHO15, author = {Yusuke Sakai and Keita Emura and Jacob C. N. Schuldt and Goichiro Hanaoka and Kazuo Ohta}, editor = {Ernest Foo and Douglas Stebila}, title = {Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {77--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_5}, doi = {10.1007/978-3-319-19962-7\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SakaiESHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunWZ15, author = {Zhelei Sun and Peng Wang and Liting Zhang}, editor = {Ernest Foo and Douglas Stebila}, title = {Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {3--19}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_1}, doi = {10.1007/978-3-319-19962-7\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Tang15, author = {Qiang Tang}, editor = {Ernest Foo and Douglas Stebila}, title = {Towards Forward Security Properties for {PEKS} and {IBE}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {127--144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_8}, doi = {10.1007/978-3-319-19962-7\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Tang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TaoW15, author = {Biaoshuai Tao and Hongjun Wu}, editor = {Ernest Foo and Douglas Stebila}, title = {Improving the Biclique Cryptanalysis of {AES}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {39--56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_3}, doi = {10.1007/978-3-319-19962-7\_3}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TaoW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TrethowenAMW15, author = {Leliel Trethowen and Craig Anslow and Stuart Marshall and Ian Welch}, editor = {Ernest Foo and Douglas Stebila}, title = {VisRAID: Visualizing Remote Access for Intrusion Detection}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {289--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_17}, doi = {10.1007/978-3-319-19962-7\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TrethowenAMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangT15, author = {Yuyu Wang and Keisuke Tanaka}, editor = {Ernest Foo and Douglas Stebila}, title = {Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {213--229}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_13}, doi = {10.1007/978-3-319-19962-7\_13}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YasudaSKYK15, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Ernest Foo and Douglas Stebila}, title = {Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {471--487}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_27}, doi = {10.1007/978-3-319-19962-7\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YasudaSKYK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLH15, author = {Tingting Zhang and Hongda Li and Guifang Huang}, editor = {Ernest Foo and Douglas Stebila}, title = {Constant-Round Leakage-Resilient Zero-Knowledge Argument for {NP} from the Knowledge-of-Exponent Assumption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {251--269}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_15}, doi = {10.1007/978-3-319-19962-7\_15}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2015, editor = {Ernest Foo and Douglas Stebila}, title = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7}, doi = {10.1007/978-3-319-19962-7}, isbn = {978-3-319-19961-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.