Search dblp for Publications

export results for "toc:db/conf/isw/isc2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isw/0001TY16,
  author       = {Ahmed Abdelkhalek and
                  Mohamed Tolba and
                  Amr M. Youssef},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Improved Linear Cryptanalysis of Round-Reduced {ARIA}},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_2},
  doi          = {10.1007/978-3-319-45871-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/0001TY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AshurM16,
  author       = {Tomer Ashur and
                  Bart Mennink},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Damaging, Simplifying, and Salvaging p-OMD},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {73--92},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_6},
  doi          = {10.1007/978-3-319-45871-7\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AshurM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BagS16,
  author       = {Samiran Bag and
                  Kouichi Sakurai},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {167--180},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_11},
  doi          = {10.1007/978-3-319-45871-7\_11},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BagS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BansarkhaniMP16,
  author       = {Rachid El Bansarkhani and
                  Mohamed Saied Emam Mohamed and
                  Albrecht Petzoldt},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {{MQSAS} - {A} Multivariate Sequential Aggregate Signature Scheme},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {426--439},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_25},
  doi          = {10.1007/978-3-319-45871-7\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BansarkhaniMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BiswasSK16,
  author       = {Prosunjit Biswas and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Uni-ARBAC: {A} Unified Administrative Model for Role-Based Access
                  Control},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {218--230},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_14},
  doi          = {10.1007/978-3-319-45871-7\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BiswasSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/EppsteinGLMMT16,
  author       = {David Eppstein and
                  Michael T. Goodrich and
                  Jenny Lam and
                  Nil Mamano and
                  Michael Mitzenmacher and
                  Manuel R. Torres},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Models and Algorithms for Graph Watermarking},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {283--301},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_18},
  doi          = {10.1007/978-3-319-45871-7\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/EppsteinGLMMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FukumitsuH16,
  author       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures
                  in the Non-programmable Random Oracle Model},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {389--407},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_23},
  doi          = {10.1007/978-3-319-45871-7\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/FukumitsuH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HanzlikK16,
  author       = {Lucjan Hanzlik and
                  Miroslaw Kutylowski},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Chip Authentication for E-Passports: {PACE} with Chip Authentication
                  Mapping v2},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_8},
  doi          = {10.1007/978-3-319-45871-7\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HanzlikK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KieferM16,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Blind Password Registration for Two-Server Password Authenticated
                  Key Exchange and Secret Sharing Protocols},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {95--114},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_7},
  doi          = {10.1007/978-3-319-45871-7\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/KieferM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KieferM16a,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Universally Composable Two-Server {PAKE}},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_10},
  doi          = {10.1007/978-3-319-45871-7\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/KieferM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LinTGF16,
  author       = {Yan Lin and
                  Xiaoxiao Tang and
                  Debin Gao and
                  Jianming Fu},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Control Flow Integrity Enforcement with Dynamic Code Optimization},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {366--385},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_22},
  doi          = {10.1007/978-3-319-45871-7\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/LinTGF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/OuWSZAP16,
  author       = {Changhai Ou and
                  Zhu Wang and
                  Degang Sun and
                  Xinping Zhou and
                  Juan Ai and
                  Na Pang},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Enhanced Correlation Power Analysis by Biasing Power Traces},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {59--72},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_5},
  doi          = {10.1007/978-3-319-45871-7\_5},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/OuWSZAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Partial Key Exposure Attacks on {CRT-RSA:} General Improvement for
                  the Exposed Least Significant Bits},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_3},
  doi          = {10.1007/978-3-319-45871-7\_3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Tolba0Y16,
  author       = {Mohamed Tolba and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Truncated and Multiple Differential Cryptanalysis of Reduced Round
                  Midori128},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_1},
  doi          = {10.1007/978-3-319-45871-7\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Tolba0Y16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/TomidaAO16,
  author       = {Junichi Tomida and
                  Masayuki Abe and
                  Tatsuaki Okamoto},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Efficient Functional Encryption for Inner-Product Values with Full-Hiding
                  Security},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {408--425},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_24},
  doi          = {10.1007/978-3-319-45871-7\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/TomidaAO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WagnerE16,
  author       = {Steffen Wagner and
                  Claudia Eckert},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Policy-Based Implicit Attestation for Microkernel-Based Virtualized
                  Systems},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {305--322},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_19},
  doi          = {10.1007/978-3-319-45871-7\_19},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/WagnerE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangW16,
  author       = {Li Wang and
                  Dinghao Wu},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Moving Target Defense Against Network Reconnaissance with Software
                  Defined Networking},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_13},
  doi          = {10.1007/978-3-319-45871-7\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangenSH16,
  author       = {Gaute Wangen and
                  Andrii Shalaginov and
                  Christoffer Hallstensen},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Cyber Security Risk Assessment of a DDoS Attack},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {183--202},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_12},
  doi          = {10.1007/978-3-319-45871-7\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangenSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WasedaN16,
  author       = {Atsushi Waseda and
                  Ryo Nojima},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Analyzing Randomized Response Mechanisms Under Differential Privacy},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_17},
  doi          = {10.1007/978-3-319-45871-7\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WasedaN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WebsterHLLZE16,
  author       = {George D. Webster and
                  Zachary D. Hanif and
                  Andre L. P. Ludwig and
                  Tamas K. Lengyel and
                  Apostolis Zarras and
                  Claudia Eckert},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {{SKALD:} {A} Scalable Architecture for Feature Extraction, Multi-user
                  Analysis, and Real-Time Information Sharing},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {231--249},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_15},
  doi          = {10.1007/978-3-319-45871-7\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WebsterHLLZE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/XuHSZHP16,
  author       = {Jun Xu and
                  Lei Hu and
                  Santanu Sarkar and
                  Xiaona Zhang and
                  Zhangjie Huang and
                  Liqiang Peng},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Cryptanalysis of Multi-Prime {\textbackslash}varPhi -Hiding Assumption},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {440--453},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_26},
  doi          = {10.1007/978-3-319-45871-7\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/XuHSZHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/XuHZPH16,
  author       = {Jun Xu and
                  Lei Hu and
                  Xiaona Zhang and
                  Liqiang Peng and
                  Zhangjie Huang},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Cryptanalysis and Improved Construction of a Group Key Agreement for
                  Secure Group Communication},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {48--58},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_4},
  doi          = {10.1007/978-3-319-45871-7\_4},
  timestamp    = {Sun, 13 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/XuHZPH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/XuMW16,
  author       = {Dongpeng Xu and
                  Jiang Ming and
                  Dinghao Wu},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Generalized Dynamic Opaque Predicates: {A} New Control Flow Obfuscation
                  Method},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {323--342},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_20},
  doi          = {10.1007/978-3-319-45871-7\_20},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/XuMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YanKSL16,
  author       = {Guanhua Yan and
                  Yunus Kucuk and
                  Max Slocum and
                  David C. Last},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {A Bayesian Cogntive Approach to Quantifying Software Exploitability
                  Based on Reachability Testing},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {343--365},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_21},
  doi          = {10.1007/978-3-319-45871-7\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YanKSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangYZQF16,
  author       = {Bo Yang and
                  Kang Yang and
                  Zhenfeng Zhang and
                  Yu Qin and
                  Dengguo Feng},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {{AEP-M:} Practical Anonymous E-Payment for Mobile Devices Using {ARM}
                  TrustZone and Divisible E-Cash},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {130--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_9},
  doi          = {10.1007/978-3-319-45871-7\_9},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/YangYZQF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Zarras16,
  author       = {Apostolis Zarras},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Leveraging Internet Services to Evade Censorship},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {253--270},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_16},
  doi          = {10.1007/978-3-319-45871-7\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Zarras16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2016,
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7},
  doi          = {10.1007/978-3-319-45871-7},
  isbn         = {978-3-319-45870-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics