Search dblp for Publications

export results for "toc:db/conf/acisp/acisp2016-2.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acisp/0008WLHT16,
  author       = {Wei Yu and
                  Kunpeng Wang and
                  Bao Li and
                  Xiaoyang He and
                  Song Tian},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Deterministic Encoding into Twisted Edwards Curves},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {285--297},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_18},
  doi          = {10.1007/978-3-319-40367-0\_18},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/0008WLHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BagheriMS16,
  author       = {Nasour Bagheri and
                  Florian Mendel and
                  Yu Sasaki},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Improved Rebound Attacks on {AESQ:} Core Permutation of {CAESAR} Candidate
                  {PAEQ}},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_19},
  doi          = {10.1007/978-3-319-40367-0\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BagheriMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BunderNST16,
  author       = {Martin W. Bunder and
                  Abderrahmane Nitaj and
                  Willy Susilo and
                  Joseph Tonien},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A New Attack on Three Variants of the {RSA} Cryptosystem},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {258--268},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_16},
  doi          = {10.1007/978-3-319-40367-0\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BunderNST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CastiglioneSMPC16,
  author       = {Arcangelo Castiglione and
                  Alfredo De Santis and
                  Barbara Masucci and
                  Francesco Palmieri and
                  Aniello Castiglione},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {On the Relations Between Security Notions in Hierarchical Key Assignment
                  Schemes for Dynamic Structures},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_3},
  doi          = {10.1007/978-3-319-40367-0\_3},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CastiglioneSMPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Willy Susilo and
                  Guomin Yang and
                  Fuchun Guo and
                  Mingwu Zhang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {One-Round Strong Oblivious Signature-Based Envelope},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_1},
  doi          = {10.1007/978-3-319-40367-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenMSYGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenTSSF16,
  author       = {Jiageng Chen and
                  Jesen Teh and
                  Chunhua Su and
                  Azman Samsudin and
                  Junbin Fang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Improved (related-key) Attacks on Round-Reduced {KATAN-32/48/64} Based
                  on the Extended Boomerang Framework},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {333--346},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_21},
  doi          = {10.1007/978-3-319-40367-0\_21},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenTSSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChengLD16,
  author       = {Yao Cheng and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A Feasible No-Root Approach on Android},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {481--489},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_32},
  doi          = {10.1007/978-3-319-40367-0\_32},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChengLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuongPT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Reducing the Key Size of the {SRP} Encryption Scheme},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {427--434},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_27},
  doi          = {10.1007/978-3-319-40367-0\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuongPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ForlerLLW16,
  author       = {Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated
                  Encryption with Minimal Stretch},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {317--332},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_20},
  doi          = {10.1007/978-3-319-40367-0\_20},
  timestamp    = {Thu, 21 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ForlerLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GlennanLE16,
  author       = {Timothy Glennan and
                  Christopher Leckie and
                  Sarah M. Erfani},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Improved Classification of Known and Unknown Network Traffic Flows
                  Using Semi-supervised Machine Learning},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {493--501},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_33},
  doi          = {10.1007/978-3-319-40367-0\_33},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GlennanLE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HeWAMD16,
  author       = {Kai He and
                  Jian Weng and
                  Man Ho Au and
                  Yijun Mao and
                  Robert H. Deng},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext
                  Security},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_13},
  doi          = {10.1007/978-3-319-40367-0\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HeWAMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiaW16,
  author       = {Keting Jia and
                  Ning Wang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Impossible Differential Cryptanalysis of 14-Round Camellia-192},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_23},
  doi          = {10.1007/978-3-319-40367-0\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiaW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiangMGW16,
  author       = {Peng Jiang and
                  Yi Mu and
                  Fuchun Guo and
                  Qiaoyan Wen},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Public Key Encryption with Authorized Keyword Search},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {170--186},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_11},
  doi          = {10.1007/978-3-319-40367-0\_11},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiangMGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KutylowskiHK16,
  author       = {Miroslaw Kutylowski and
                  Lucjan Hanzlik and
                  Kamil Kluczniak},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Pseudonymous Signature on eIDAS Token - Implementation Based Privacy
                  Threats},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {467--477},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_31},
  doi          = {10.1007/978-3-319-40367-0\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KutylowskiHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiMGSC16,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Willy Susilo and
                  Rongmao Chen},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Anonymous Identity-Based Broadcast Encryption with Revocation for
                  File Sharing},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_14},
  doi          = {10.1007/978-3-319-40367-0\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiMGSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiLLJJL16,
  author       = {Tong Li and
                  Zheli Liu and
                  Ping Li and
                  Chunfu Jia and
                  Zoe Lin Jiang and
                  Jin Li},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Verifiable Searchable Encryption with Aggregate Keys for Data Sharing
                  in Outsourcing Storage},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {153--169},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_10},
  doi          = {10.1007/978-3-319-40367-0\_10},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiLLJJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LinL16,
  author       = {Xiaodong Lin and
                  Rongxing Lu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Proxy Re-encryption with Delegatable Verifiability},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {120--133},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_8},
  doi          = {10.1007/978-3-319-40367-0\_8},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LinL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Lu16,
  author       = {Jiqiang Lu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {On the Security of the {LAC} Authenticated Encryption Algorithm},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {395--408},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_25},
  doi          = {10.1007/978-3-319-40367-0\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Lu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuoRLHLWXW16,
  author       = {Xiling Luo and
                  Yili Ren and
                  Jingwen Liu and
                  Jiankun Hu and
                  Weiran Liu and
                  Zhen Wang and
                  Wei Xu and
                  Qianhong Wu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Identity-Based Group Encryption},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {87--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_6},
  doi          = {10.1007/978-3-319-40367-0\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LuoRLHLWXW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Minematsu16,
  author       = {Kazuhiko Minematsu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Authenticated Encryption with Small Stretch (or, How to Accelerate
                  {AERO)}},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {347--362},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_22},
  doi          = {10.1007/978-3-319-40367-0\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Minematsu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanYZ16,
  author       = {Shiran Pan and
                  Shen Yan and
                  Wen Tao Zhu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification
                  Schemes},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {446--453},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_29},
  doi          = {10.1007/978-3-319-40367-0\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PanYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PangYO16,
  author       = {Ying{-}Han Pang and
                  Khor Ean Yee and
                  Shih Yin Ooi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Biometric Access Control with High Dimensional Facial Features},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {437--445},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_28},
  doi          = {10.1007/978-3-319-40367-0\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PangYO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ParraCH16,
  author       = {Jhordany Rodriguez Parra and
                  Terence Chan and
                  Siu{-}Wai Ho},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A Noiseless Key-Homomorphic {PRF:} Application on Distributed Storage
                  Systems},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {505--513},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_34},
  doi          = {10.1007/978-3-319-40367-0\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ParraCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PhuongYSL16,
  author       = {Tran Viet Xuan Phuong and
                  Guomin Yang and
                  Willy Susilo and
                  Kaitai Liang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Edit Distance Based Encryption and Its Application},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_7},
  doi          = {10.1007/978-3-319-40367-0\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PhuongYSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QinCW16,
  author       = {Lingyue Qin and
                  Huaifeng Chen and
                  Xiaoyun Wang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing
                  Techniques},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {409--424},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_26},
  doi          = {10.1007/978-3-319-40367-0\_26},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/QinCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SongHY16,
  author       = {Ling Song and
                  Zhangjie Huang and
                  Qianqian Yang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Automatic Differential Analysis of {ARX} Block Ciphers with Application
                  to {SPECK} and {LEA}},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {379--394},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_24},
  doi          = {10.1007/978-3-319-40367-0\_24},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SongHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunPYYG16,
  author       = {Shifeng Sun and
                  Udaya Parampalli and
                  Tsz Hon Yuen and
                  Yu Yu and
                  Dawu Gu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Efficient Completely Non-Malleable and {RKA} Secure Public Key Encryptions},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {134--150},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_9},
  doi          = {10.1007/978-3-319-40367-0\_9},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SunPYYG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Partial Key Exposure Attacks on {RSA} with Multiple Exponent Pairs},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_15},
  doi          = {10.1007/978-3-319-40367-0\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangM16,
  author       = {Xiaofen Wang and
                  Yi Mu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Content-Based Encryption},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {57--72},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_4},
  doi          = {10.1007/978-3-319-40367-0\_4},
  timestamp    = {Mon, 24 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XiaYXH16,
  author       = {Zhe Xia and
                  Xiaoyun Yang and
                  Min Xiao and
                  Debiao He},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Provably Secure Threshold Paillier Encryption Based on Hyperplane
                  Geometry},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_5},
  doi          = {10.1007/978-3-319-40367-0\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XiaYXH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuYMM16,
  author       = {Shengmin Xu and
                  Guomin Yang and
                  Yi Mu and
                  Sha Ma},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Proxy Signature with Revocation},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_2},
  doi          = {10.1007/978-3-319-40367-0\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/XuYMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamakawaHK16,
  author       = {Takashi Yamakawa and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Generalized Hardness Assumption for Self-bilinear Map with Auxiliary
                  Information},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {269--284},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_17},
  doi          = {10.1007/978-3-319-40367-0\_17},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamakawaHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangXC16,
  author       = {Min Yang and
                  Fei Xu and
                  Kam{-}Pui Chow},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Interest Profiling for Security Monitoring and Forensic Investigation},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {457--464},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_30},
  doi          = {10.1007/978-3-319-40367-0\_30},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YangXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangYM16,
  author       = {Shiwei Zhang and
                  Guomin Yang and
                  Yi Mu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Linear Encryption with Keyword Search},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_12},
  doi          = {10.1007/978-3-319-40367-0\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2016-2,
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0},
  doi          = {10.1007/978-3-319-40367-0},
  isbn         = {978-3-319-40366-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics