Search dblp for Publications

export results for "toc:db/conf/isw/isc2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isw/AfzalL15,
  author       = {Zeeshan Afzal and
                  Stefan Lindskog},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Multipath {TCP} {IDS} Evasion and Mitigation},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {265--282},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_15},
  doi          = {10.1007/978-3-319-23318-5\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AfzalL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AryalMIA15,
  author       = {Anu Aryal and
                  Kazuma Motegi and
                  Shoko Imaizumi and
                  Naokazu Aoki},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Improvement of Multi-bit Information Embedding Algorithm for Palette-Based
                  Images},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {511--523},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_28},
  doi          = {10.1007/978-3-319-23318-5\_28},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AryalMIA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BringerCML15,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Daniel Le M{\'{e}}tayer and
                  Roch Lescuyer},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Reasoning about Privacy Properties of Biometric Systems Architectures
                  in the Presence of Information Leakage},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {493--510},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_27},
  doi          = {10.1007/978-3-319-23318-5\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BringerCML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenalT15,
  author       = {Massimo Chenal and
                  Qiang Tang},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption
                  Schemes},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {397--418},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_22},
  doi          = {10.1007/978-3-319-23318-5\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ChenalT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DattaDM15,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {General Circuit Realizing Compact Revocable Attribute-Based Encryption
                  from Multilinear Maps},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {336--354},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_19},
  doi          = {10.1007/978-3-319-23318-5\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DattaDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DebnathD15,
  author       = {Sumit Kumar Debnath and
                  Ratna Dutta},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Secure and Efficient Private Set Intersection Cardinality Using Bloom
                  Filter},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {209--226},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_12},
  doi          = {10.1007/978-3-319-23318-5\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DebnathD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Draper-GilFHZ15,
  author       = {Gerard Draper{-}Gil and
                  Josep Llu{\'{\i}}s Ferrer{-}Gomila and
                  M. Francisca Hinarejos and
                  Jianying Zhou},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {On the Efficiency of Multi-party Contract Signing Protocols},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {227--243},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_13},
  doi          = {10.1007/978-3-319-23318-5\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/Draper-GilFHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FalzonB15,
  author       = {Kevin Falzon and
                  Eric Bodden},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Dynamically Provisioning Isolation in Hierarchical Architectures},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {83--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_5},
  doi          = {10.1007/978-3-319-23318-5\_5},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/FalzonB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FanVH15,
  author       = {Xinyu Fan and
                  Vijay Varadharajan and
                  Michael Hitchens},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Provenance Based Classification Access Policy System Based on Encrypted
                  Search for Cloud Data Storage},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {283--298},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_16},
  doi          = {10.1007/978-3-319-23318-5\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/FanVH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FukumitsuH15,
  author       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable
                  Random Oracle Model},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_1},
  doi          = {10.1007/978-3-319-23318-5\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/FukumitsuH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JaatunCBTR15,
  author       = {Martin Gilje Jaatun and
                  Daniela S. Cruzes and
                  Karin Bernsmed and
                  Inger Anne T{\o}ndel and
                  Lillian R{\o}stad},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Software Security Maturity in Public Organisations},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {120--138},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_7},
  doi          = {10.1007/978-3-319-23318-5\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JaatunCBTR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JiaXWLZJ15,
  author       = {Shijie Jia and
                  Luning Xia and
                  Zhan Wang and
                  Jingqiang Lin and
                  Guozhu Zhang and
                  Yafei Ji},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Extracting Robust Keys from {NAND} Flash Physical Unclonable Functions},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {437--454},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_24},
  doi          = {10.1007/978-3-319-23318-5\_24},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JiaXWLZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JiaoZW15,
  author       = {Lin Jiao and
                  Bin Zhang and
                  Mingsheng Wang},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Two Generic Methods of Analyzing Stream Ciphers},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {379--396},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_21},
  doi          = {10.1007/978-3-319-23318-5\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JiaoZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Karpman15,
  author       = {Pierre Karpman},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {From Distinguishers to Key Recovery: Improved Related-Key Attacks
                  on Even-Mansour},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {177--188},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_10},
  doi          = {10.1007/978-3-319-23318-5\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Karpman15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiayiasOT15,
  author       = {Aggelos Kiayias and
                  Murat Osmanoglu and
                  Qiang Tang},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Graded Signatures},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_4},
  doi          = {10.1007/978-3-319-23318-5\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiayiasOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiayiasOT15a,
  author       = {Aggelos Kiayias and
                  Ozgur Oksuz and
                  Qiang Tang},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation
                  and Applications},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {548--567},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_30},
  doi          = {10.1007/978-3-319-23318-5\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiayiasOT15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KieferM15,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Oblivious {PAKE:} Efficient Handling of Password Trials},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_11},
  doi          = {10.1007/978-3-319-23318-5\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/KieferM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LadakisVPIP15,
  author       = {Evangelos Ladakis and
                  Giorgos Vasiliadis and
                  Michalis Polychronakis and
                  Sotiris Ioannidis and
                  Georgios Portokalidis},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {GPU-Disasm: {A} GPU-Based {X86} Disassembler},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {472--489},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_26},
  doi          = {10.1007/978-3-319-23318-5\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/LadakisVPIP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LancrenonS15,
  author       = {Jean Lancrenon and
                  Marjan Skrobot},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {On the Provable Security of the Dragonfly Protocol},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {244--261},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_14},
  doi          = {10.1007/978-3-319-23318-5\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LancrenonS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiangLC15,
  author       = {Bei Liang and
                  Hongda Li and
                  Jinyong Chang},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {The Generic Transformation from Standard Signatures to Identity-Based
                  Aggregate Signatures},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {21--41},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_2},
  doi          = {10.1007/978-3-319-23318-5\_2},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LiangLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MieleL15,
  author       = {Andrea Miele and
                  Arjen K. Lenstra},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Efficient Ephemeral Elliptic Curve Cryptographic Keys},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {524--547},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_29},
  doi          = {10.1007/978-3-319-23318-5\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/MieleL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/OthmaneCBTBM15,
  author       = {Lotfi Ben Othmane and
                  Golriz Chehrazi and
                  Eric Bodden and
                  Petar Tsalovski and
                  Achim D. Brucker and
                  Philip Miseldine},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Factors Impacting the Effort Required to Fix Security Vulnerabilities
                  - An Industrial Case Study},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {102--119},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_6},
  doi          = {10.1007/978-3-319-23318-5\_6},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/OthmaneCBTBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/RompayMO15,
  author       = {C{\'{e}}dric Van Rompay and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Multi-user Searchable Encryption in the Cloud},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {299--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_17},
  doi          = {10.1007/978-3-319-23318-5\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/RompayMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ShiF15,
  author       = {Yang Shi and
                  Hongfei Fan},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {On Security of a White-Box Implementation of {SHARK}},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {455--471},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_25},
  doi          = {10.1007/978-3-319-23318-5\_25},
  timestamp    = {Sun, 15 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ShiF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SunHWYQMSS15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Meiqin Wang and
                  Qianqian Yang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Ling Song and
                  Jinyong Shan},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Extending the Applicability of the Mixed-Integer Programming Technique
                  in Automatic Differential Cryptanalysis},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_8},
  doi          = {10.1007/978-3-319-23318-5\_8},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SunHWYQMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangWLG15,
  author       = {Fuqun Wang and
                  Kunpeng Wang and
                  Bao Li and
                  Yuanyuan Gao},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {42--60},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_3},
  doi          = {10.1007/978-3-319-23318-5\_3},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangWLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangY15,
  author       = {Zhiwei Wang and
                  Siu{-}Ming Yiu},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {{CCA} Secure {PKE} with Auxiliary Input Security and Leakage Resiliency},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {319--335},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_18},
  doi          = {10.1007/978-3-319-23318-5\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Yao0W15,
  author       = {Yuan Yao and
                  Bin Zhang and
                  Wenling Wu},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Automatic Search for Linear Trails of the {SPECK} Family},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {158--176},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_9},
  doi          = {10.1007/978-3-319-23318-5\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Yao0W15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YuWLHT15,
  author       = {Wei Yu and
                  Kunpeng Wang and
                  Bao Li and
                  Xiaoyang He and
                  Song Tian},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Hashing into Jacobi Quartic Curves},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {355--375},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_20},
  doi          = {10.1007/978-3-319-23318-5\_20},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YuWLHT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhangLMJ15,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Cunqing Ma and
                  Jiwu Jing},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Bit Error Probability Evaluation of {RO} PUFs},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {421--436},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_23},
  doi          = {10.1007/978-3-319-23318-5\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhangLMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2015,
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5},
  doi          = {10.1007/978-3-319-23318-5},
  isbn         = {978-3-319-23317-8},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics