Search dblp for Publications

export results for "toc:db/conf/acns/acns2007.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acns/AimaniV07,
  author       = {Laila El Aimani and
                  Damien Vergnaud},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Gradually Convertible Undeniable Signatures},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {478--496},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_31},
  doi          = {10.1007/978-3-540-72738-5\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AimaniV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BakhshiS07,
  author       = {Bahador Bakhshi and
                  Babak Sadeghiyan},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {A Timing Attack on Blakley's Modular Multiplication Algorithm, and
                  Applications to {DSA}},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {129--140},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_9},
  doi          = {10.1007/978-3-540-72738-5\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BakhshiS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BidderBC07,
  author       = {Diana von Bidder and
                  David A. Basin and
                  Germano Caronni},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Midpoints Versus Endpoints: From Protocols to Firewalls},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {46--64},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_4},
  doi          = {10.1007/978-3-540-72738-5\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BidderBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BuchmannDKOV07,
  author       = {Johannes Buchmann and
                  Erik Dahmen and
                  Elena Klintsevich and
                  Katsuyuki Okeya and
                  Camille Vuillaume},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Merkle Signatures with Virtually Unlimited Signature Capacity},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_3},
  doi          = {10.1007/978-3-540-72738-5\_3},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BuchmannDKOV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenZSM07,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Efficient Generic On-Line/Off-Line Signatures Without Key Exposure},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_2},
  doi          = {10.1007/978-3-540-72738-5\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ChenZSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChoiPHL07,
  author       = {Kyu Young Choi and
                  Jong Hwan Park and
                  Jung Yeon Hwang and
                  Dong Hoon Lee},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Efficient Certificateless Signature Schemes},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {443--458},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_29},
  doi          = {10.1007/978-3-540-72738-5\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChoiPHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DuttaCM07,
  author       = {Ratna Dutta and
                  Ee{-}Chien Chang and
                  Sourav Mukhopadhyay},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Efficient Self-healing Key Distribution with Revocation for Wireless
                  Sensor Networks Using One Way Key Chains},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {385--400},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_25},
  doi          = {10.1007/978-3-540-72738-5\_25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DuttaCM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Frikken07,
  author       = {Keith B. Frikken},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Privacy-Preserving Set Union},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {237--252},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_16},
  doi          = {10.1007/978-3-540-72738-5\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Frikken07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GreenA07,
  author       = {Matthew Green and
                  Giuseppe Ateniese},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Identity-Based Proxy Re-encryption},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {288--306},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_19},
  doi          = {10.1007/978-3-540-72738-5\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GreenA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GuZZ07,
  author       = {Chunxiang Gu and
                  Yuefei Zhu and
                  Yonghui Zheng},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Certified E-Mail Protocol in the ID-Based Setting},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {340--353},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_22},
  doi          = {10.1007/978-3-540-72738-5\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GuZZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HuangWZ07,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Yiming Zhao},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Generic Transformation to Strongly Unforgeable Signatures},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_1},
  doi          = {10.1007/978-3-540-72738-5\_1},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/HuangWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JareckiL07,
  author       = {Stanislaw Jarecki and
                  Xiaomin Liu},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Unlinkable Secret Handshakes and Key-Private Group Key Management
                  Schemes},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {270--287},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_18},
  doi          = {10.1007/978-3-540-72738-5\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/JareckiL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LaurL07,
  author       = {Sven Laur and
                  Helger Lipmaa},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {A New Protocol for Conditional Disclosure of Secrets and Its Applications},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {207--225},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_14},
  doi          = {10.1007/978-3-540-72738-5\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LaurL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LeeKSP07,
  author       = {Mun{-}Kyu Lee and
                  Jung Woo Kim and
                  Jeong Eun Song and
                  Kunsoo Park},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Sliding Window Method for {NTRU}},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {432--442},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_28},
  doi          = {10.1007/978-3-540-72738-5\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LeeKSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiHZ07,
  author       = {Fagen Li and
                  Yupu Hu and
                  Chuanrong Zhang},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {373--384},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_24},
  doi          = {10.1007/978-3-540-72738-5\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiHZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiLX07,
  author       = {Jiangtao Li and
                  Ninghui Li and
                  Rui Xue},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Universal Accumulators with Efficient Nonmembership Proofs},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {253--269},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_17},
  doi          = {10.1007/978-3-540-72738-5\_17},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiLX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiW07,
  author       = {Ronghua Li and
                  Chuankun Wu},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {An Unconditionally Secure Protocol for Multi-Party Set Intersection},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {226--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_15},
  doi          = {10.1007/978-3-540-72738-5\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LuSHS07,
  author       = {Liang Lu and
                  Reihaneh Safavi{-}Naini and
                  Jeffrey Horton and
                  Willy Susilo},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {An Adversary Aware and Intrusion Detection Aware Attack Model Ranking
                  Scheme},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {65--86},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_5},
  doi          = {10.1007/978-3-540-72738-5\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LuSHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LuoCPD07,
  author       = {Zhengqin Luo and
                  Xiaojuan Cai and
                  Jun Pang and
                  Yuxin Deng},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Analyzing an Electronic Cash Protocol Using Applied Pi Calculus},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_6},
  doi          = {10.1007/978-3-540-72738-5\_6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LuoCPD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NamPKW07,
  author       = {Junghyun Nam and
                  Juryon Paik and
                  Ung{-}Mo Kim and
                  Dongho Won},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Constant-Round Authenticated Group Key Exchange with Logarithmic Computation
                  Complexity},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {158--176},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_11},
  doi          = {10.1007/978-3-540-72738-5\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NamPKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NieHDLW07,
  author       = {Xuyun Nie and
                  Lei Hu and
                  Jintai Ding and
                  Jianyu Li and
                  John Wagner},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Cryptanalysis of the {TRMC-4} Public Key Cryptosystem},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {104--115},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_7},
  doi          = {10.1007/978-3-540-72738-5\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NieHDLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SchallerCB07,
  author       = {Patrick Schaller and
                  Srdjan Capkun and
                  David A. Basin},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {{BAP:} Broadcast Authentication Using Cryptographic Puzzles},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {401--419},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_26},
  doi          = {10.1007/978-3-540-72738-5\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SchallerCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ShiraseHHKT07,
  author       = {Masaaki Shirase and
                  Dong{-}Guk Han and
                  Yasushi Hibino and
                  Ho Won Kim and
                  Tsuyoshi Takagi},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Compressed {XTR}},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {420--431},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_27},
  doi          = {10.1007/978-3-540-72738-5\_27},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ShiraseHHKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SunWC07,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Yao{-}Hsin Chen},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Estimating the Prime-Factors of an {RSA} Modulus and an Extension
                  of the Wiener Attack},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {116--128},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_8},
  doi          = {10.1007/978-3-540-72738-5\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SunWC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TamassiaT07,
  author       = {Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Efficient Content Authentication in Peer-to-Peer Networks},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {354--372},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_23},
  doi          = {10.1007/978-3-540-72738-5\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TamassiaT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TillichHM07,
  author       = {Stefan Tillich and
                  Christoph Herbst and
                  Stefan Mangard},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Protecting {AES} Software Implementations on 32-Bit Processors Against
                  Power Analysis},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_10},
  doi          = {10.1007/978-3-540-72738-5\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TillichHM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuWYZ07,
  author       = {Xuxin Xu and
                  Lingyu Wang and
                  Amr M. Youssef and
                  Bo Zhu},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Preventing Collusion Attacks on the One-Way Function Tree {(OFT)}
                  Scheme},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {177--193},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_12},
  doi          = {10.1007/978-3-540-72738-5\_12},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuWYZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YangCWDW07,
  author       = {Guomin Yang and
                  Jing Chen and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Dongsheng Wang},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {A More Natural Way to Construct Identity-Based Identification Schemes},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {307--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_20},
  doi          = {10.1007/978-3-540-72738-5\_20},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/YangCWDW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YapCHG07,
  author       = {Wun{-}She Yap and
                  Sherman S. M. Chow and
                  Swee{-}Huay Heng and
                  Bok{-}Min Goi},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Security Mediated Certificateless Signatures},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {459--477},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_30},
  doi          = {10.1007/978-3-540-72738-5\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/YapCHG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Zhang07,
  author       = {Rui Zhang},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Tweaking {TBE/IBE} to {PKE} Transforms with Chameleon Hash Functions},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {323--339},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_21},
  doi          = {10.1007/978-3-540-72738-5\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Zhang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZigorisJ07,
  author       = {Philip Zigoris and
                  Hongxia Jin},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Bayesian Methods for Practical Traitor Tracing},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {194--206},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_13},
  doi          = {10.1007/978-3-540-72738-5\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZigorisJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2007,
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5},
  doi          = {10.1007/978-3-540-72738-5},
  isbn         = {978-3-540-72737-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics