Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isw/isc2015.bht:"
@inproceedings{DBLP:conf/isw/AfzalL15, author = {Zeeshan Afzal and Stefan Lindskog}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Multipath {TCP} {IDS} Evasion and Mitigation}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {265--282}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_15}, doi = {10.1007/978-3-319-23318-5\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/AfzalL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AryalMIA15, author = {Anu Aryal and Kazuma Motegi and Shoko Imaizumi and Naokazu Aoki}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {511--523}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_28}, doi = {10.1007/978-3-319-23318-5\_28}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/AryalMIA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BringerCML15, author = {Julien Bringer and Herv{\'{e}} Chabanne and Daniel Le M{\'{e}}tayer and Roch Lescuyer}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {493--510}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_27}, doi = {10.1007/978-3-319-23318-5\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BringerCML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenalT15, author = {Massimo Chenal and Qiang Tang}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {397--418}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_22}, doi = {10.1007/978-3-319-23318-5\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ChenalT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DattaDM15, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {336--354}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_19}, doi = {10.1007/978-3-319-23318-5\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/DattaDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DebnathD15, author = {Sumit Kumar Debnath and Ratna Dutta}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {209--226}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_12}, doi = {10.1007/978-3-319-23318-5\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/DebnathD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Draper-GilFHZ15, author = {Gerard Draper{-}Gil and Josep Llu{\'{\i}}s Ferrer{-}Gomila and M. Francisca Hinarejos and Jianying Zhou}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {On the Efficiency of Multi-party Contract Signing Protocols}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {227--243}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_13}, doi = {10.1007/978-3-319-23318-5\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/Draper-GilFHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/FalzonB15, author = {Kevin Falzon and Eric Bodden}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Dynamically Provisioning Isolation in Hierarchical Architectures}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {83--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_5}, doi = {10.1007/978-3-319-23318-5\_5}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/FalzonB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/FanVH15, author = {Xinyu Fan and Vijay Varadharajan and Michael Hitchens}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {283--298}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_16}, doi = {10.1007/978-3-319-23318-5\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/FanVH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/FukumitsuH15, author = {Masayuki Fukumitsu and Shingo Hasegawa}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_1}, doi = {10.1007/978-3-319-23318-5\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/FukumitsuH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JaatunCBTR15, author = {Martin Gilje Jaatun and Daniela S. Cruzes and Karin Bernsmed and Inger Anne T{\o}ndel and Lillian R{\o}stad}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Software Security Maturity in Public Organisations}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {120--138}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_7}, doi = {10.1007/978-3-319-23318-5\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JaatunCBTR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JiaXWLZJ15, author = {Shijie Jia and Luning Xia and Zhan Wang and Jingqiang Lin and Guozhu Zhang and Yafei Ji}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Extracting Robust Keys from {NAND} Flash Physical Unclonable Functions}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {437--454}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_24}, doi = {10.1007/978-3-319-23318-5\_24}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JiaXWLZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JiaoZW15, author = {Lin Jiao and Bin Zhang and Mingsheng Wang}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Two Generic Methods of Analyzing Stream Ciphers}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {379--396}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_21}, doi = {10.1007/978-3-319-23318-5\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JiaoZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Karpman15, author = {Pierre Karpman}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {177--188}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_10}, doi = {10.1007/978-3-319-23318-5\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Karpman15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiayiasOT15, author = {Aggelos Kiayias and Murat Osmanoglu and Qiang Tang}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Graded Signatures}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {61--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_4}, doi = {10.1007/978-3-319-23318-5\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiayiasOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiayiasOT15a, author = {Aggelos Kiayias and Ozgur Oksuz and Qiang Tang}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {548--567}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_30}, doi = {10.1007/978-3-319-23318-5\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiayiasOT15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KieferM15, author = {Franziskus Kiefer and Mark Manulis}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Oblivious {PAKE:} Efficient Handling of Password Trials}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {191--208}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_11}, doi = {10.1007/978-3-319-23318-5\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/KieferM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LadakisVPIP15, author = {Evangelos Ladakis and Giorgos Vasiliadis and Michalis Polychronakis and Sotiris Ioannidis and Georgios Portokalidis}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {GPU-Disasm: {A} GPU-Based {X86} Disassembler}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {472--489}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_26}, doi = {10.1007/978-3-319-23318-5\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/LadakisVPIP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LancrenonS15, author = {Jean Lancrenon and Marjan Skrobot}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {On the Provable Security of the Dragonfly Protocol}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {244--261}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_14}, doi = {10.1007/978-3-319-23318-5\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LancrenonS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiangLC15, author = {Bei Liang and Hongda Li and Jinyong Chang}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {21--41}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_2}, doi = {10.1007/978-3-319-23318-5\_2}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LiangLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MieleL15, author = {Andrea Miele and Arjen K. Lenstra}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Efficient Ephemeral Elliptic Curve Cryptographic Keys}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {524--547}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_29}, doi = {10.1007/978-3-319-23318-5\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/MieleL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/OthmaneCBTBM15, author = {Lotfi Ben Othmane and Golriz Chehrazi and Eric Bodden and Petar Tsalovski and Achim D. Brucker and Philip Miseldine}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {102--119}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_6}, doi = {10.1007/978-3-319-23318-5\_6}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/OthmaneCBTBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/RompayMO15, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Multi-user Searchable Encryption in the Cloud}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {299--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_17}, doi = {10.1007/978-3-319-23318-5\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/RompayMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ShiF15, author = {Yang Shi and Hongfei Fan}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {On Security of a White-Box Implementation of {SHARK}}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {455--471}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_25}, doi = {10.1007/978-3-319-23318-5\_25}, timestamp = {Sun, 15 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ShiF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SunHWYQMSS15, author = {Siwei Sun and Lei Hu and Meiqin Wang and Qianqian Yang and Kexin Qiao and Xiaoshuang Ma and Ling Song and Jinyong Shan}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {141--157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_8}, doi = {10.1007/978-3-319-23318-5\_8}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/SunHWYQMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangWLG15, author = {Fuqun Wang and Kunpeng Wang and Bao Li and Yuanyuan Gao}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {42--60}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_3}, doi = {10.1007/978-3-319-23318-5\_3}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangWLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangY15, author = {Zhiwei Wang and Siu{-}Ming Yiu}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {{CCA} Secure {PKE} with Auxiliary Input Security and Leakage Resiliency}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {319--335}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_18}, doi = {10.1007/978-3-319-23318-5\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Yao0W15, author = {Yuan Yao and Bin Zhang and Wenling Wu}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Automatic Search for Linear Trails of the {SPECK} Family}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {158--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_9}, doi = {10.1007/978-3-319-23318-5\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Yao0W15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YuWLHT15, author = {Wei Yu and Kunpeng Wang and Bao Li and Xiaoyang He and Song Tian}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Hashing into Jacobi Quartic Curves}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {355--375}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_20}, doi = {10.1007/978-3-319-23318-5\_20}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/YuWLHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhangLMJ15, author = {Qinglong Zhang and Zongbin Liu and Cunqing Ma and Jiwu Jing}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Bit Error Probability Evaluation of {RO} PUFs}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {421--436}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_23}, doi = {10.1007/978-3-319-23318-5\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhangLMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2015, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5}, doi = {10.1007/978-3-319-23318-5}, isbn = {978-3-319-23317-8}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.