Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iwsec/iwsec2013.bht:"
@inproceedings{DBLP:conf/iwsec/0002H13, author = {Takahiro Matsuda and Goichiro Hanaoka}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {226--243}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_15}, doi = {10.1007/978-3-642-41383-4\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/0002H13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DengZCS13, author = {Yi Deng and Yang Zhang and Liang Cheng and Xiaoshan Sun}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Static Integer Overflow Vulnerability Detection in Windows Binary}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {19--35}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_2}, doi = {10.1007/978-3-642-41383-4\_2}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/DengZCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Hashimoto13, author = {Yasufumi Hashimoto}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Cryptanalysis of the Quaternion Rainbow}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {244--257}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_16}, doi = {10.1007/978-3-642-41383-4\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Hashimoto13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HigoTY13, author = {Haruna Higo and Keisuke Tanaka and Kenji Yasunaga}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Game-Theoretic Security for Bit Commitment}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {303--318}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_20}, doi = {10.1007/978-3-642-41383-4\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HigoTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HiranoHIM13, author = {Takato Hirano and Mitsuhiro Hattori and Takashi Ito and Nori Matsuda}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {183--200}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_12}, doi = {10.1007/978-3-642-41383-4\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HiranoHIM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HuangPST13, author = {Yun{-}Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Improvement of Faug{\`{e}}re et al.'s Method to Solve {ECDLP}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {115--132}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_8}, doi = {10.1007/978-3-642-41383-4\_8}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/HuangPST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IsshikiNT13, author = {Toshiyuki Isshiki and Manh Ha Nguyen and Keisuke Tanaka}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Attacks to the Proxy Re-Encryption Schemes from {IWSEC2011}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {290--302}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_19}, doi = {10.1007/978-3-642-41383-4\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IsshikiNT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KiyomuraT13, author = {Yutaro Kiyomura and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Efficient Algorithm for Tate Pairing of Composite Order}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {201--216}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_13}, doi = {10.1007/978-3-642-41383-4\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KiyomuraT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaU13, author = {Kaoru Kurosawa and Takuma Ueda}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {How to Factor {N} 1 and {N} 2 When {\textdollar}p{\_}1=p{\_}2 {\textbackslash}bmod 2t{\textdollar}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {217--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_14}, doi = {10.1007/978-3-642-41383-4\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MoreiraFK13, author = {Jos{\'{e}} Moreira and Marcel Fernandez and Grigory Kabatiansky}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {53--67}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_4}, doi = {10.1007/978-3-642-41383-4\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MoreiraFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NaitoSWY13, author = {Yusuke Naito and Yu Sasaki and Lei Wang and Kan Yasuda}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on {NMAC/HMAC}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {83--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_6}, doi = {10.1007/978-3-642-41383-4\_6}, timestamp = {Wed, 13 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NaitoSWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OgataKKM13, author = {Wakaha Ogata and Keita Koiwa and Akira Kanaoka and Shin'ichiro Matsuo}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Toward Practical Searchable Symmetric Encryption}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {151--167}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_10}, doi = {10.1007/978-3-642-41383-4\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OgataKKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PalmieriP13, author = {Paolo Palmieri and Olivier Pereira}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Unconditionally Secure Oblivious Transfer from Real Network Behavior}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {168--182}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_11}, doi = {10.1007/978-3-642-41383-4\_11}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PalmieriP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SanoOO13, author = {Shotaro Sano and Takuma Otsuka and Hiroshi G. Okuno}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Solving Google's Continuous Audio {CAPTCHA} with HMM-Based Automatic Speech Recognition}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {36--52}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_3}, doi = {10.1007/978-3-642-41383-4\_3}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SanoOO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoY13, author = {Masaya Sato and Toshihiro Yamauchi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Secure Log Transfer by Replacing a Library in a Virtual Machine}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_1}, doi = {10.1007/978-3-642-41383-4\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TahaS13, author = {Mostafa M. I. Taha and Patrick Schaumont}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Differential Power Analysis of MAC-Keccak at Any Key-Length}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {68--82}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_5}, doi = {10.1007/978-3-642-41383-4\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TahaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TodoS13, author = {Yosuke Todo and Yu Sasaki}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {New Property of Diffusion Switching Mechanism on {CLEFIA} and Its Application to {DFA}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {99--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_7}, doi = {10.1007/978-3-642-41383-4\_7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TodoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TsengLCL13, author = {Fu{-}Kuo Tseng and Yung{-}Hsiang Liu and Rong{-}Jaye Chen and Bao{-}Shuh Paul Lin}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Statistics on Encrypted Cloud Data}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {133--150}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_9}, doi = {10.1007/978-3-642-41383-4\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TsengLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMT13, author = {Rui Xu and Kirill Morozov and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {258--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_17}, doi = {10.1007/978-3-642-41383-4\_17}, timestamp = {Mon, 06 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Yoneyama13, author = {Kazuki Yoneyama}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {One-Round Authenticated Key Exchange without Implementation Trick}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {272--289}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_18}, doi = {10.1007/978-3-642-41383-4\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Yoneyama13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2013, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4}, doi = {10.1007/978-3-642-41383-4}, isbn = {978-3-642-41382-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.