Search dblp for Publications

export results for "toc:db/conf/acns/acns2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acns/AuHLSWY08,
  author       = {Man Ho Au and
                  Qiong Huang and
                  Joseph K. Liu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Guomin Yang},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Traceable and Retrievable Identity-Based Encryption},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {94--110},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_6},
  doi          = {10.1007/978-3-540-68914-0\_6},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AuHLSWY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaekZB08,
  author       = {Joonsang Baek and
                  Jianying Zhou and
                  Feng Bao},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Generic Constructions of Stateful Public Key Encryption and Their
                  Applications},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {75--93},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_5},
  doi          = {10.1007/978-3-540-68914-0\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BaekZB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Blanton08,
  author       = {Marina Blanton},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Improved Conditional E-Payments},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {188--206},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_12},
  doi          = {10.1007/978-3-540-68914-0\_12},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Blanton08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BorisovM08,
  author       = {Nikita Borisov and
                  Soumyadeb Mitra},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Restricted Queries over an Encrypted Index with Applications to Regulatory
                  Compliance},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {373--391},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_23},
  doi          = {10.1007/978-3-540-68914-0\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BorisovM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BurmesterM08,
  author       = {Mike Burmester and
                  Breno de Medeiros},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {The Security of {EPC} Gen2 Compliant {RFID} Protocols},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {490--506},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_30},
  doi          = {10.1007/978-3-540-68914-0\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BurmesterM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CanardG08,
  author       = {S{\'{e}}bastien Canard and
                  Aline Gouget},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Anonymity in Transferable E-cash},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {207--223},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_13},
  doi          = {10.1007/978-3-540-68914-0\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CanardG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CanardLM08,
  author       = {S{\'{e}}bastien Canard and
                  Fabien Laguillaumie and
                  Michel Milhau},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {TrapdoorSanitizable Signatures and Their Application to Content Protection},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {258--276},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_16},
  doi          = {10.1007/978-3-540-68914-0\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CanardLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CanrightB08,
  author       = {David Canright and
                  Lejla Batina},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {A Very Compact "Perfectly Masked" S-Box for {AES}},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {446--459},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_27},
  doi          = {10.1007/978-3-540-68914-0\_27},
  timestamp    = {Mon, 08 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CanrightB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DamgardKT08,
  author       = {Ivan Damg{\aa}rd and
                  Lars R. Knudsen and
                  S{\o}ren S. Thomsen},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric
                  Cryptography},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {144--155},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_9},
  doi          = {10.1007/978-3-540-68914-0\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DamgardKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DingYCCC08,
  author       = {Jintai Ding and
                  Bo{-}Yin Yang and
                  Chia{-}Hsin Owen Chen and
                  Ming{-}Shing Chen and
                  Chen{-}Mou Cheng},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {New Differential-Algebraic Attacks and Reparametrization of Rainbow},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {242--257},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_15},
  doi          = {10.1007/978-3-540-68914-0\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DingYCCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DodisP08,
  author       = {Yevgeniy Dodis and
                  Prashant Puniya},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Getting the Best Out of Existing Hash Functions; or What if We Are
                  Stuck with SHA?},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {156--173},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_10},
  doi          = {10.1007/978-3-540-68914-0\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DodisP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FouqueMVZ08,
  author       = {Pierre{-}Alain Fouque and
                  Gwena{\"{e}}lle Martinet and
                  Fr{\'{e}}d{\'{e}}ric Valette and
                  S{\'{e}}bastien Zimmer},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {On the Security of the {CCM} Encryption Mode and of a Slight Variant},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {411--428},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_25},
  doi          = {10.1007/978-3-540-68914-0\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FouqueMVZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HammouriS08,
  author       = {Ghaith Hammouri and
                  Berk Sunar},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {{PUF-HB:} {A} Tamper-Resilient {HB} Based Authentication Protocol},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {346--365},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_21},
  doi          = {10.1007/978-3-540-68914-0\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HammouriS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/King08,
  author       = {Brian King},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {429--445},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_26},
  doi          = {10.1007/978-3-540-68914-0\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/King08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KlonowskiKL08,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Anna Lauks},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Repelling Detour Attack Against Onions with Re-encryption},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {296--308},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_18},
  doi          = {10.1007/978-3-540-68914-0\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KlonowskiKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiKZW08,
  author       = {Jin Li and
                  Kwangjo Kim and
                  Fangguo Zhang and
                  Duncan S. Wong},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Generic Security-Amplifying Methods of Ordinary Digital Signatures},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {224--241},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_14},
  doi          = {10.1007/978-3-540-68914-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiKZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LimLS08,
  author       = {Tong{-}Lee Lim and
                  Anantharaman Lakshminarayanan and
                  Vira Saksen},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {A Practical and Efficient Tree-List Structure for Public-Key Certificate
                  Validation},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {392--410},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_24},
  doi          = {10.1007/978-3-540-68914-0\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LimLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MitchellRRS08,
  author       = {John C. Mitchell and
                  Arnab Roy and
                  Paul D. Rowe and
                  Andre Scedrov},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Analysis of {EAP-GPSK} Authentication Protocol},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {309--327},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_19},
  doi          = {10.1007/978-3-540-68914-0\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MitchellRRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NishideYO08,
  author       = {Takashi Nishide and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified
                  Access Structures},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {111--129},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_7},
  doi          = {10.1007/978-3-540-68914-0\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NishideYO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/OuafiP08,
  author       = {Khaled Ouafi and
                  Raphael C.{-}W. Phan},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Traceable Privacy of Recent Provably-Secure {RFID} Protocols},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {479--489},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_29},
  doi          = {10.1007/978-3-540-68914-0\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/OuafiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PointchevalZ08,
  author       = {David Pointcheval and
                  S{\'{e}}bastien Zimmer},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Multi-factor Authenticated Key Exchange},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {277--295},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_17},
  doi          = {10.1007/978-3-540-68914-0\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PointchevalZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PrasadS08,
  author       = {Ramnath Prasad and
                  Nitesh Saxena},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual
                  Patterns},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {328--345},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_20},
  doi          = {10.1007/978-3-540-68914-0\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PrasadS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PuigserverPFR08,
  author       = {Maci{\`{a}} Mut Puigserver and
                  Magdalena Payeras{-}Capell{\`{a}} and
                  Josep Llu{\'{\i}}s Ferrer{-}Gomila and
                  Lloren{\c{c}} Huguet i Rotger},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Replay Attack in a Fair Exchange Protocol},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {174--187},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_11},
  doi          = {10.1007/978-3-540-68914-0\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/PuigserverPFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/RajabMTP08,
  author       = {Moheeb Abu Rajab and
                  Fabian Monrose and
                  Andreas Terzis and
                  Niels Provos},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Peeking Through the Cloud: DNS-Based Estimation and Its Applications},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {21--38},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_2},
  doi          = {10.1007/978-3-540-68914-0\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/RajabMTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SanadhyaS08,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Attacking Reduced Round {SHA-256}},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {130--143},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_8},
  doi          = {10.1007/978-3-540-68914-0\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SanadhyaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ShpilrainU08,
  author       = {Vladimir Shpilrain and
                  Alexander Ushakov},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {An Authentication Scheme Based on the Twisted Conjugacy Problem},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {366--372},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_22},
  doi          = {10.1007/978-3-540-68914-0\_22},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ShpilrainU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/StajanoCL08,
  author       = {Frank Stajano and
                  Daniel Cvrcek and
                  Matt Lewis},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Steel, Cast Iron and Concrete: Security Engineering for Real World
                  Wireless Sensor Networks},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {460--478},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_28},
  doi          = {10.1007/978-3-540-68914-0\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/StajanoCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/StavrouLK08,
  author       = {Angelos Stavrou and
                  Michael E. Locasto and
                  Angelos D. Keromytis},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Pushback for Overlay Networks: Protecting Against Malicious Insiders},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {39--54},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_3},
  doi          = {10.1007/978-3-540-68914-0\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/StavrouLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TsangS08,
  author       = {Patrick P. Tsang and
                  Sean W. Smith},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {{PPAA:} Peer-to-Peer Anonymous Authentication},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {55--74},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_4},
  doi          = {10.1007/978-3-540-68914-0\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TsangS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XieSZ08,
  author       = {Liang Xie and
                  Hui Song and
                  Sencun Zhu},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {On the Effectiveness of Internal Patching Against File-Sharing Worms},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {1--20},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_1},
  doi          = {10.1007/978-3-540-68914-0\_1},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/XieSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2008,
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0},
  doi          = {10.1007/978-3-540-68914-0},
  isbn         = {978-3-540-68913-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}