Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acns/acns2007.bht:"
@inproceedings{DBLP:conf/acns/AimaniV07, author = {Laila El Aimani and Damien Vergnaud}, editor = {Jonathan Katz and Moti Yung}, title = {Gradually Convertible Undeniable Signatures}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {478--496}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_31}, doi = {10.1007/978-3-540-72738-5\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AimaniV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BakhshiS07, author = {Bahador Bakhshi and Babak Sadeghiyan}, editor = {Jonathan Katz and Moti Yung}, title = {A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to {DSA}}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {129--140}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_9}, doi = {10.1007/978-3-540-72738-5\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BakhshiS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BidderBC07, author = {Diana von Bidder and David A. Basin and Germano Caronni}, editor = {Jonathan Katz and Moti Yung}, title = {Midpoints Versus Endpoints: From Protocols to Firewalls}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {46--64}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_4}, doi = {10.1007/978-3-540-72738-5\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BidderBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BuchmannDKOV07, author = {Johannes Buchmann and Erik Dahmen and Elena Klintsevich and Katsuyuki Okeya and Camille Vuillaume}, editor = {Jonathan Katz and Moti Yung}, title = {Merkle Signatures with Virtually Unlimited Signature Capacity}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {31--45}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_3}, doi = {10.1007/978-3-540-72738-5\_3}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BuchmannDKOV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenZSM07, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Yi Mu}, editor = {Jonathan Katz and Moti Yung}, title = {Efficient Generic On-Line/Off-Line Signatures Without Key Exposure}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {18--30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_2}, doi = {10.1007/978-3-540-72738-5\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ChenZSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChoiPHL07, author = {Kyu Young Choi and Jong Hwan Park and Jung Yeon Hwang and Dong Hoon Lee}, editor = {Jonathan Katz and Moti Yung}, title = {Efficient Certificateless Signature Schemes}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {443--458}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_29}, doi = {10.1007/978-3-540-72738-5\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChoiPHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DuttaCM07, author = {Ratna Dutta and Ee{-}Chien Chang and Sourav Mukhopadhyay}, editor = {Jonathan Katz and Moti Yung}, title = {Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {385--400}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_25}, doi = {10.1007/978-3-540-72738-5\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DuttaCM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Frikken07, author = {Keith B. Frikken}, editor = {Jonathan Katz and Moti Yung}, title = {Privacy-Preserving Set Union}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {237--252}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_16}, doi = {10.1007/978-3-540-72738-5\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Frikken07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GreenA07, author = {Matthew Green and Giuseppe Ateniese}, editor = {Jonathan Katz and Moti Yung}, title = {Identity-Based Proxy Re-encryption}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {288--306}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_19}, doi = {10.1007/978-3-540-72738-5\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GreenA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GuZZ07, author = {Chunxiang Gu and Yuefei Zhu and Yonghui Zheng}, editor = {Jonathan Katz and Moti Yung}, title = {Certified E-Mail Protocol in the ID-Based Setting}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {340--353}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_22}, doi = {10.1007/978-3-540-72738-5\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GuZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HuangWZ07, author = {Qiong Huang and Duncan S. Wong and Yiming Zhao}, editor = {Jonathan Katz and Moti Yung}, title = {Generic Transformation to Strongly Unforgeable Signatures}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {1--17}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_1}, doi = {10.1007/978-3-540-72738-5\_1}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/HuangWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JareckiL07, author = {Stanislaw Jarecki and Xiaomin Liu}, editor = {Jonathan Katz and Moti Yung}, title = {Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {270--287}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_18}, doi = {10.1007/978-3-540-72738-5\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/JareckiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LaurL07, author = {Sven Laur and Helger Lipmaa}, editor = {Jonathan Katz and Moti Yung}, title = {A New Protocol for Conditional Disclosure of Secrets and Its Applications}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {207--225}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_14}, doi = {10.1007/978-3-540-72738-5\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LaurL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LeeKSP07, author = {Mun{-}Kyu Lee and Jung Woo Kim and Jeong Eun Song and Kunsoo Park}, editor = {Jonathan Katz and Moti Yung}, title = {Sliding Window Method for {NTRU}}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {432--442}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_28}, doi = {10.1007/978-3-540-72738-5\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LeeKSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiHZ07, author = {Fagen Li and Yupu Hu and Chuanrong Zhang}, editor = {Jonathan Katz and Moti Yung}, title = {An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {373--384}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_24}, doi = {10.1007/978-3-540-72738-5\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiHZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiLX07, author = {Jiangtao Li and Ninghui Li and Rui Xue}, editor = {Jonathan Katz and Moti Yung}, title = {Universal Accumulators with Efficient Nonmembership Proofs}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {253--269}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_17}, doi = {10.1007/978-3-540-72738-5\_17}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiLX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiW07, author = {Ronghua Li and Chuankun Wu}, editor = {Jonathan Katz and Moti Yung}, title = {An Unconditionally Secure Protocol for Multi-Party Set Intersection}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {226--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_15}, doi = {10.1007/978-3-540-72738-5\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LuSHS07, author = {Liang Lu and Reihaneh Safavi{-}Naini and Jeffrey Horton and Willy Susilo}, editor = {Jonathan Katz and Moti Yung}, title = {An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {65--86}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_5}, doi = {10.1007/978-3-540-72738-5\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LuSHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LuoCPD07, author = {Zhengqin Luo and Xiaojuan Cai and Jun Pang and Yuxin Deng}, editor = {Jonathan Katz and Moti Yung}, title = {Analyzing an Electronic Cash Protocol Using Applied Pi Calculus}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {87--103}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_6}, doi = {10.1007/978-3-540-72738-5\_6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LuoCPD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NamPKW07, author = {Junghyun Nam and Juryon Paik and Ung{-}Mo Kim and Dongho Won}, editor = {Jonathan Katz and Moti Yung}, title = {Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {158--176}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_11}, doi = {10.1007/978-3-540-72738-5\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NamPKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NieHDLW07, author = {Xuyun Nie and Lei Hu and Jintai Ding and Jianyu Li and John Wagner}, editor = {Jonathan Katz and Moti Yung}, title = {Cryptanalysis of the {TRMC-4} Public Key Cryptosystem}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {104--115}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_7}, doi = {10.1007/978-3-540-72738-5\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NieHDLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchallerCB07, author = {Patrick Schaller and Srdjan Capkun and David A. Basin}, editor = {Jonathan Katz and Moti Yung}, title = {{BAP:} Broadcast Authentication Using Cryptographic Puzzles}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {401--419}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_26}, doi = {10.1007/978-3-540-72738-5\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchallerCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ShiraseHHKT07, author = {Masaaki Shirase and Dong{-}Guk Han and Yasushi Hibino and Ho Won Kim and Tsuyoshi Takagi}, editor = {Jonathan Katz and Moti Yung}, title = {Compressed {XTR}}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {420--431}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_27}, doi = {10.1007/978-3-540-72738-5\_27}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ShiraseHHKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SunWC07, author = {Hung{-}Min Sun and Mu{-}En Wu and Yao{-}Hsin Chen}, editor = {Jonathan Katz and Moti Yung}, title = {Estimating the Prime-Factors of an {RSA} Modulus and an Extension of the Wiener Attack}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {116--128}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_8}, doi = {10.1007/978-3-540-72738-5\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SunWC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TamassiaT07, author = {Roberto Tamassia and Nikos Triandopoulos}, editor = {Jonathan Katz and Moti Yung}, title = {Efficient Content Authentication in Peer-to-Peer Networks}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {354--372}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_23}, doi = {10.1007/978-3-540-72738-5\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TamassiaT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TillichHM07, author = {Stefan Tillich and Christoph Herbst and Stefan Mangard}, editor = {Jonathan Katz and Moti Yung}, title = {Protecting {AES} Software Implementations on 32-Bit Processors Against Power Analysis}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {141--157}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_10}, doi = {10.1007/978-3-540-72738-5\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TillichHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuWYZ07, author = {Xuxin Xu and Lingyu Wang and Amr M. Youssef and Bo Zhu}, editor = {Jonathan Katz and Moti Yung}, title = {Preventing Collusion Attacks on the One-Way Function Tree {(OFT)} Scheme}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {177--193}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_12}, doi = {10.1007/978-3-540-72738-5\_12}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuWYZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YangCWDW07, author = {Guomin Yang and Jing Chen and Duncan S. Wong and Xiaotie Deng and Dongsheng Wang}, editor = {Jonathan Katz and Moti Yung}, title = {A More Natural Way to Construct Identity-Based Identification Schemes}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {307--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_20}, doi = {10.1007/978-3-540-72738-5\_20}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/YangCWDW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YapCHG07, author = {Wun{-}She Yap and Sherman S. M. Chow and Swee{-}Huay Heng and Bok{-}Min Goi}, editor = {Jonathan Katz and Moti Yung}, title = {Security Mediated Certificateless Signatures}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {459--477}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_30}, doi = {10.1007/978-3-540-72738-5\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/YapCHG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Zhang07, author = {Rui Zhang}, editor = {Jonathan Katz and Moti Yung}, title = {Tweaking {TBE/IBE} to {PKE} Transforms with Chameleon Hash Functions}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {323--339}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_21}, doi = {10.1007/978-3-540-72738-5\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Zhang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZigorisJ07, author = {Philip Zigoris and Hongxia Jin}, editor = {Jonathan Katz and Moti Yung}, title = {Bayesian Methods for Practical Traitor Tracing}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {194--206}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_13}, doi = {10.1007/978-3-540-72738-5\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZigorisJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2007, editor = {Jonathan Katz and Moti Yung}, title = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5}, doi = {10.1007/978-3-540-72738-5}, isbn = {978-3-540-72737-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.