Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2016-2.bht:"
@inproceedings{DBLP:conf/acisp/0008WLHT16, author = {Wei Yu and Kunpeng Wang and Bao Li and Xiaoyang He and Song Tian}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Deterministic Encoding into Twisted Edwards Curves}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {285--297}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_18}, doi = {10.1007/978-3-319-40367-0\_18}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/0008WLHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BagheriMS16, author = {Nasour Bagheri and Florian Mendel and Yu Sasaki}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Improved Rebound Attacks on {AESQ:} Core Permutation of {CAESAR} Candidate {PAEQ}}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {301--316}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_19}, doi = {10.1007/978-3-319-40367-0\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BagheriMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BunderNST16, author = {Martin W. Bunder and Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A New Attack on Three Variants of the {RSA} Cryptosystem}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {258--268}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_16}, doi = {10.1007/978-3-319-40367-0\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BunderNST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CastiglioneSMPC16, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Aniello Castiglione}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {37--54}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_3}, doi = {10.1007/978-3-319-40367-0\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CastiglioneSMPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16, author = {Rongmao Chen and Yi Mu and Willy Susilo and Guomin Yang and Fuchun Guo and Mingwu Zhang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {One-Round Strong Oblivious Signature-Based Envelope}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {3--20}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_1}, doi = {10.1007/978-3-319-40367-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenMSYGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenTSSF16, author = {Jiageng Chen and Jesen Teh and Chunhua Su and Azman Samsudin and Junbin Fang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Improved (related-key) Attacks on Round-Reduced {KATAN-32/48/64} Based on the Extended Boomerang Framework}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {333--346}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_21}, doi = {10.1007/978-3-319-40367-0\_21}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenTSSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChengLD16, author = {Yao Cheng and Yingjiu Li and Robert H. Deng}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A Feasible No-Root Approach on Android}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {481--489}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_32}, doi = {10.1007/978-3-319-40367-0\_32}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChengLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuongPT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Reducing the Key Size of the {SRP} Encryption Scheme}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {427--434}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_27}, doi = {10.1007/978-3-319-40367-0\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuongPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ForlerLLW16, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {317--332}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_20}, doi = {10.1007/978-3-319-40367-0\_20}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ForlerLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GlennanLE16, author = {Timothy Glennan and Christopher Leckie and Sarah M. Erfani}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {493--501}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_33}, doi = {10.1007/978-3-319-40367-0\_33}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GlennanLE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HeWAMD16, author = {Kai He and Jian Weng and Man Ho Au and Yijun Mao and Robert H. Deng}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {207--222}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_13}, doi = {10.1007/978-3-319-40367-0\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HeWAMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiaW16, author = {Keting Jia and Ning Wang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Impossible Differential Cryptanalysis of 14-Round Camellia-192}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {363--378}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_23}, doi = {10.1007/978-3-319-40367-0\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiaW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiangMGW16, author = {Peng Jiang and Yi Mu and Fuchun Guo and Qiaoyan Wen}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Public Key Encryption with Authorized Keyword Search}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {170--186}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_11}, doi = {10.1007/978-3-319-40367-0\_11}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiangMGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KutylowskiHK16, author = {Miroslaw Kutylowski and Lucjan Hanzlik and Kamil Kluczniak}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {467--477}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_31}, doi = {10.1007/978-3-319-40367-0\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KutylowskiHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiMGSC16, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Willy Susilo and Rongmao Chen}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {223--239}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_14}, doi = {10.1007/978-3-319-40367-0\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiMGSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiLLJJL16, author = {Tong Li and Zheli Liu and Ping Li and Chunfu Jia and Zoe Lin Jiang and Jin Li}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {153--169}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_10}, doi = {10.1007/978-3-319-40367-0\_10}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiLLJJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LinL16, author = {Xiaodong Lin and Rongxing Lu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Proxy Re-encryption with Delegatable Verifiability}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {120--133}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_8}, doi = {10.1007/978-3-319-40367-0\_8}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LinL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Lu16, author = {Jiqiang Lu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {On the Security of the {LAC} Authenticated Encryption Algorithm}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {395--408}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_25}, doi = {10.1007/978-3-319-40367-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Lu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuoRLHLWXW16, author = {Xiling Luo and Yili Ren and Jingwen Liu and Jiankun Hu and Weiran Liu and Zhen Wang and Wei Xu and Qianhong Wu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Identity-Based Group Encryption}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {87--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_6}, doi = {10.1007/978-3-319-40367-0\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LuoRLHLWXW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Minematsu16, author = {Kazuhiko Minematsu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Authenticated Encryption with Small Stretch (or, How to Accelerate {AERO)}}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {347--362}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_22}, doi = {10.1007/978-3-319-40367-0\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Minematsu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanYZ16, author = {Shiran Pan and Shen Yan and Wen Tao Zhu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {446--453}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_29}, doi = {10.1007/978-3-319-40367-0\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PangYO16, author = {Ying{-}Han Pang and Khor Ean Yee and Shih Yin Ooi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Biometric Access Control with High Dimensional Facial Features}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {437--445}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_28}, doi = {10.1007/978-3-319-40367-0\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PangYO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ParraCH16, author = {Jhordany Rodriguez Parra and Terence Chan and Siu{-}Wai Ho}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A Noiseless Key-Homomorphic {PRF:} Application on Distributed Storage Systems}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {505--513}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_34}, doi = {10.1007/978-3-319-40367-0\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ParraCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PhuongYSL16, author = {Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo and Kaitai Liang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Edit Distance Based Encryption and Its Application}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {103--119}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_7}, doi = {10.1007/978-3-319-40367-0\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PhuongYSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QinCW16, author = {Lingyue Qin and Huaifeng Chen and Xiaoyun Wang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {409--424}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_26}, doi = {10.1007/978-3-319-40367-0\_26}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/QinCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SongHY16, author = {Ling Song and Zhangjie Huang and Qianqian Yang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Automatic Differential Analysis of {ARX} Block Ciphers with Application to {SPECK} and {LEA}}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {379--394}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_24}, doi = {10.1007/978-3-319-40367-0\_24}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SongHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunPYYG16, author = {Shifeng Sun and Udaya Parampalli and Tsz Hon Yuen and Yu Yu and Dawu Gu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Efficient Completely Non-Malleable and {RKA} Secure Public Key Encryptions}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {134--150}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_9}, doi = {10.1007/978-3-319-40367-0\_9}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SunPYYG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Partial Key Exposure Attacks on {RSA} with Multiple Exponent Pairs}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {243--257}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_15}, doi = {10.1007/978-3-319-40367-0\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangM16, author = {Xiaofen Wang and Yi Mu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Content-Based Encryption}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {57--72}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_4}, doi = {10.1007/978-3-319-40367-0\_4}, timestamp = {Mon, 24 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XiaYXH16, author = {Zhe Xia and Xiaoyun Yang and Min Xiao and Debiao He}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {73--86}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_5}, doi = {10.1007/978-3-319-40367-0\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XiaYXH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuYMM16, author = {Shengmin Xu and Guomin Yang and Yi Mu and Sha Ma}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Proxy Signature with Revocation}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {21--36}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_2}, doi = {10.1007/978-3-319-40367-0\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/XuYMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamakawaHK16, author = {Takashi Yamakawa and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {269--284}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_17}, doi = {10.1007/978-3-319-40367-0\_17}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamakawaHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangXC16, author = {Min Yang and Fei Xu and Kam{-}Pui Chow}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Interest Profiling for Security Monitoring and Forensic Investigation}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {457--464}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_30}, doi = {10.1007/978-3-319-40367-0\_30}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YangXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangYM16, author = {Shiwei Zhang and Guomin Yang and Yi Mu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Linear Encryption with Keyword Search}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {187--203}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_12}, doi = {10.1007/978-3-319-40367-0\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2016-2, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0}, doi = {10.1007/978-3-319-40367-0}, isbn = {978-3-319-40366-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.