Search dblp for Publications

export results for "toc:db/conf/iwsec/iwsec2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwsec/0002H13,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Achieving Chosen Ciphertext Security from Detectable Public Key Encryption
                  Efficiently via Hybrid Encryption},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {226--243},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_15},
  doi          = {10.1007/978-3-642-41383-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/0002H13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DengZCS13,
  author       = {Yi Deng and
                  Yang Zhang and
                  Liang Cheng and
                  Xiaoshan Sun},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Static Integer Overflow Vulnerability Detection in Windows Binary},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_2},
  doi          = {10.1007/978-3-642-41383-4\_2},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/DengZCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Hashimoto13,
  author       = {Yasufumi Hashimoto},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Cryptanalysis of the Quaternion Rainbow},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_16},
  doi          = {10.1007/978-3-642-41383-4\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Hashimoto13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HigoTY13,
  author       = {Haruna Higo and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Game-Theoretic Security for Bit Commitment},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {303--318},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_20},
  doi          = {10.1007/978-3-642-41383-4\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HigoTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHIM13,
  author       = {Takato Hirano and
                  Mitsuhiro Hattori and
                  Takashi Ito and
                  Nori Matsuda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Cryptographically-Secure and Efficient Remote Cancelable Biometrics
                  Based on Public-Key Homomorphic Encryption},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_12},
  doi          = {10.1007/978-3-642-41383-4\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HiranoHIM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HuangPST13,
  author       = {Yun{-}Ju Huang and
                  Christophe Petit and
                  Naoyuki Shinohara and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Improvement of Faug{\`{e}}re et al.'s Method to Solve {ECDLP}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {115--132},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_8},
  doi          = {10.1007/978-3-642-41383-4\_8},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/HuangPST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IsshikiNT13,
  author       = {Toshiyuki Isshiki and
                  Manh Ha Nguyen and
                  Keisuke Tanaka},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Attacks to the Proxy Re-Encryption Schemes from {IWSEC2011}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {290--302},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_19},
  doi          = {10.1007/978-3-642-41383-4\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IsshikiNT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KiyomuraT13,
  author       = {Yutaro Kiyomura and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Efficient Algorithm for Tate Pairing of Composite Order},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_13},
  doi          = {10.1007/978-3-642-41383-4\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KiyomuraT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaU13,
  author       = {Kaoru Kurosawa and
                  Takuma Ueda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {How to Factor {N} 1 and {N} 2 When {\textdollar}p{\_}1=p{\_}2 {\textbackslash}bmod
                  2t{\textdollar}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {217--225},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_14},
  doi          = {10.1007/978-3-642-41383-4\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MoreiraFK13,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fernandez and
                  Grigory Kabatiansky},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Constructions of Almost Secure Frameproof Codes Based on Small-Bias
                  Probability Spaces},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {53--67},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_4},
  doi          = {10.1007/978-3-642-41383-4\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MoreiraFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NaitoSWY13,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Lei Wang and
                  Kan Yasuda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on {NMAC/HMAC}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {83--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_6},
  doi          = {10.1007/978-3-642-41383-4\_6},
  timestamp    = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NaitoSWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OgataKKM13,
  author       = {Wakaha Ogata and
                  Keita Koiwa and
                  Akira Kanaoka and
                  Shin'ichiro Matsuo},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Toward Practical Searchable Symmetric Encryption},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {151--167},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_10},
  doi          = {10.1007/978-3-642-41383-4\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OgataKKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PalmieriP13,
  author       = {Paolo Palmieri and
                  Olivier Pereira},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Unconditionally Secure Oblivious Transfer from Real Network Behavior},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {168--182},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_11},
  doi          = {10.1007/978-3-642-41383-4\_11},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PalmieriP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SanoOO13,
  author       = {Shotaro Sano and
                  Takuma Otsuka and
                  Hiroshi G. Okuno},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Solving Google's Continuous Audio {CAPTCHA} with HMM-Based Automatic
                  Speech Recognition},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {36--52},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_3},
  doi          = {10.1007/978-3-642-41383-4\_3},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SanoOO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoY13,
  author       = {Masaya Sato and
                  Toshihiro Yamauchi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Secure Log Transfer by Replacing a Library in a Virtual Machine},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_1},
  doi          = {10.1007/978-3-642-41383-4\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TahaS13,
  author       = {Mostafa M. I. Taha and
                  Patrick Schaumont},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Differential Power Analysis of MAC-Keccak at Any Key-Length},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {68--82},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_5},
  doi          = {10.1007/978-3-642-41383-4\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TahaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TodoS13,
  author       = {Yosuke Todo and
                  Yu Sasaki},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {New Property of Diffusion Switching Mechanism on {CLEFIA} and Its
                  Application to {DFA}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_7},
  doi          = {10.1007/978-3-642-41383-4\_7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TodoS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TsengLCL13,
  author       = {Fu{-}Kuo Tseng and
                  Yung{-}Hsiang Liu and
                  Rong{-}Jaye Chen and
                  Bao{-}Shuh Paul Lin},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Statistics on Encrypted Cloud Data},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {133--150},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_9},
  doi          = {10.1007/978-3-642-41383-4\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TsengLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMT13,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {On Cheater Identifiable Secret Sharing Schemes Secure against Rushing
                  Adversary},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {258--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_17},
  doi          = {10.1007/978-3-642-41383-4\_17},
  timestamp    = {Mon, 06 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yoneyama13,
  author       = {Kazuki Yoneyama},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {One-Round Authenticated Key Exchange without Implementation Trick},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_18},
  doi          = {10.1007/978-3-642-41383-4\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Yoneyama13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2013,
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4},
  doi          = {10.1007/978-3-642-41383-4},
  isbn         = {978-3-642-41382-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics