Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iwsec/iwsec2019.bht:"
@inproceedings{DBLP:conf/iwsec/BanikFI19, author = {Subhadeep Banik and Yuki Funabiki and Takanori Isobe}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {More Results on Shortest Linear Programs}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {109--128}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_7}, doi = {10.1007/978-3-030-26834-3\_7}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/BanikFI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BaninD19, author = {Sergii Banin and Geir Olav Dyrkolbotn}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {149--167}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_9}, doi = {10.1007/978-3-030-26834-3\_9}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BaninD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BuldasFLLT19, author = {Ahto Buldas and Denis Firsov and Risto Laanoja and Henri Lakk and Ahto Truu}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {A New Approach to Constructing Digital Signature Schemes - (Short Paper)}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {363--373}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_21}, doi = {10.1007/978-3-030-26834-3\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BuldasFLLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DesmedtM19, author = {Yvo Desmedt and Kirill Morozov}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{VSS} Made Simpler}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {329--342}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_19}, doi = {10.1007/978-3-030-26834-3\_19}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DesmedtM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Dumas0FLOPP19, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Julio L{\'{o}}pez Fenner and David Lucas and Jean{-}Baptiste Orfila and Cl{\'{e}}ment Pernet and Maxime Puys}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {67--88}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_5}, doi = {10.1007/978-3-030-26834-3\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/Dumas0FLOPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DurakV19, author = {F. Bet{\"{u}}l Durak and Serge Vaudenay}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {343--362}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_20}, doi = {10.1007/978-3-030-26834-3\_20}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DurakV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HayataK0HM19, author = {Junichiro Hayata and Fuyuki Kitagawa and Yusuke Sakai and Goichiro Hanaoka and Kanta Matsuura}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Equivalence Between Non-malleability Against Replayable {CCA} and Other RCCA-Security Notions}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {253--272}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_15}, doi = {10.1007/978-3-030-26834-3\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HayataK0HM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HirutaIST19, author = {Shohei Hiruta and Satoshi Ikeda and Shigeyoshi Shima and Hiroki Takakura}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{IDS} Alert Priority Determination Based on Traffic Behavior}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {189--206}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_11}, doi = {10.1007/978-3-030-26834-3\_11}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HirutaIST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ItoSU19, author = {Takuma Ito and Naoyuki Shinohara and Shigenori Uchiyama}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {An Efficient F{\_}4 -style Based Algorithm to Solve {MQ} Problems}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {37--52}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_3}, doi = {10.1007/978-3-030-26834-3\_3}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ItoSU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KoayWS19, author = {Abigail Koay and Ian Welch and Winston K. G. Seah}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {207--217}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_12}, doi = {10.1007/978-3-030-26834-3\_12}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KoayWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaUMS19, author = {Kaoru Kurosawa and Akinaga Ueda and Hayato Matsuhashi and Yusuke Sakagami}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {How to Solve Multiple Short-Exponent Discrete Logarithm Problem}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {53--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_4}, doi = {10.1007/978-3-030-26834-3\_4}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaUMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuCW19, author = {Fukang Liu and Zhenfu Cao and Gaoli Wang}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {287--305}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_17}, doi = {10.1007/978-3-030-26834-3\_17}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/LiuCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LiuI19, author = {Fukang Liu and Takanori Isobe}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {306--326}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_18}, doi = {10.1007/978-3-030-26834-3\_18}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/LiuI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MantasP19, author = {Evangelos Mantas and Constantinos Patsakis}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{GRYPHON:} Drone Forensics in Dataflash and Telemetry Logs}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {377--390}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_22}, doi = {10.1007/978-3-030-26834-3\_22}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MantasP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MimuraO19, author = {Mamoru Mimura and Taro Ohminami}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Towards Efficient Detection of Malicious {VBA} Macros with {LSI}}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {168--185}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_10}, doi = {10.1007/978-3-030-26834-3\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/MimuraO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OkishimaN19, author = {Ryo Okishima and Toru Nakanishi}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {An Anonymous Credential System with Constant-Size Attribute Proofs for {CNF} Formulas with Negations}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {89--106}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_6}, doi = {10.1007/978-3-030-26834-3\_6}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OkishimaN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnukiAYT19, author = {Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {(Short Paper) {A} Faster Constant-Time Algorithm of {CSIDH} Keeping Two Points}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {23--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_2}, doi = {10.1007/978-3-030-26834-3\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnukiAYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OtsukiKIMFL19, author = {Yuto Otsuki and Yuhei Kawakoya and Makoto Iwamura and Jun Miyoshi and Jacob Faires and Terrence Lillard}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Toward the Analysis of Distributed Code Injection in Post-mortem Forensics}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {391--409}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_23}, doi = {10.1007/978-3-030-26834-3\_23}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OtsukiKIMFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakamotoMSSKFBM19, author = {Kosei Sakamoto and Kazuhiko Minematsu and Nao Shibata and Maki Shigeri and Hiroyasu Kubo and Yuki Funabiki and Andrey Bogdanov and Sumio Morioka and Takanori Isobe}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Tweakable {TWINE:} Building a Tweakable Block Cipher on Generalized Feistel Structure}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {129--145}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_8}, doi = {10.1007/978-3-030-26834-3\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SakamotoMSSKFBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoIOY19, author = {Masaya Sato and Yuta Imamura and Rintaro Orito and Toshihiro Yamauchi}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {(Short Paper) Method for Preventing Suspicious Web Access in Android WebView}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {241--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_14}, doi = {10.1007/978-3-030-26834-3\_14}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoIOY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TomitaOK19, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not {\textbackslash}mathtt q -type) Assumptions}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {3--22}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_1}, doi = {10.1007/978-3-030-26834-3\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TomitaOK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangLX19, author = {Xin Wang and Shimin Li and Rui Xue}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {273--283}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_16}, doi = {10.1007/978-3-030-26834-3\_16}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/WangLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZeierWH19, author = {Alexander Zeier and Alexander Wiesmaier and Andreas Heinemann}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {{API} Usability of Stateful Signature Schemes}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {221--240}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_13}, doi = {10.1007/978-3-030-26834-3\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZeierWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2019, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3}, doi = {10.1007/978-3-030-26834-3}, isbn = {978-3-030-26833-6}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.