Search dblp for Publications

export results for "toc:db/conf/iwsec/iwsec2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iwsec/BanikFI19,
  author       = {Subhadeep Banik and
                  Yuki Funabiki and
                  Takanori Isobe},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {More Results on Shortest Linear Programs},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_7},
  doi          = {10.1007/978-3-030-26834-3\_7},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/BanikFI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BaninD19,
  author       = {Sergii Banin and
                  Geir Olav Dyrkolbotn},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Correlating High- and Low-Level Features: - Increased Understanding
                  of Malware Classification},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_9},
  doi          = {10.1007/978-3-030-26834-3\_9},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BaninD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BuldasFLLT19,
  author       = {Ahto Buldas and
                  Denis Firsov and
                  Risto Laanoja and
                  Henri Lakk and
                  Ahto Truu},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {A New Approach to Constructing Digital Signature Schemes - (Short
                  Paper)},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {363--373},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_21},
  doi          = {10.1007/978-3-030-26834-3\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BuldasFLLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DesmedtM19,
  author       = {Yvo Desmedt and
                  Kirill Morozov},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{VSS} Made Simpler},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_19},
  doi          = {10.1007/978-3-030-26834-3\_19},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DesmedtM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Dumas0FLOPP19,
  author       = {Jean{-}Guillaume Dumas and
                  Pascal Lafourcade and
                  Julio L{\'{o}}pez Fenner and
                  David Lucas and
                  Jean{-}Baptiste Orfila and
                  Cl{\'{e}}ment Pernet and
                  Maxime Puys},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd
                  Algorithm},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {67--88},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_5},
  doi          = {10.1007/978-3-030-26834-3\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/Dumas0FLOPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DurakV19,
  author       = {F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {343--362},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_20},
  doi          = {10.1007/978-3-030-26834-3\_20},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DurakV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HayataK0HM19,
  author       = {Junichiro Hayata and
                  Fuyuki Kitagawa and
                  Yusuke Sakai and
                  Goichiro Hanaoka and
                  Kanta Matsuura},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Equivalence Between Non-malleability Against Replayable {CCA} and
                  Other RCCA-Security Notions},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_15},
  doi          = {10.1007/978-3-030-26834-3\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HayataK0HM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HirutaIST19,
  author       = {Shohei Hiruta and
                  Satoshi Ikeda and
                  Shigeyoshi Shima and
                  Hiroki Takakura},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{IDS} Alert Priority Determination Based on Traffic Behavior},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_11},
  doi          = {10.1007/978-3-030-26834-3\_11},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HirutaIST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ItoSU19,
  author       = {Takuma Ito and
                  Naoyuki Shinohara and
                  Shigenori Uchiyama},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {An Efficient F{\_}4 -style Based Algorithm to Solve {MQ} Problems},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_3},
  doi          = {10.1007/978-3-030-26834-3\_3},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ItoSU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KoayWS19,
  author       = {Abigail Koay and
                  Ian Welch and
                  Winston K. G. Seah},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {(Short Paper) Effectiveness of Entropy-Based Features in High- and
                  Low-Intensity DDoS Attacks Detection},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {207--217},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_12},
  doi          = {10.1007/978-3-030-26834-3\_12},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KoayWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaUMS19,
  author       = {Kaoru Kurosawa and
                  Akinaga Ueda and
                  Hayato Matsuhashi and
                  Yusuke Sakagami},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {How to Solve Multiple Short-Exponent Discrete Logarithm Problem},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {53--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_4},
  doi          = {10.1007/978-3-030-26834-3\_4},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaUMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuCW19,
  author       = {Fukang Liu and
                  Zhenfu Cao and
                  Gaoli Wang},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {287--305},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_17},
  doi          = {10.1007/978-3-030-26834-3\_17},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LiuI19,
  author       = {Fukang Liu and
                  Takanori Isobe},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {306--326},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_18},
  doi          = {10.1007/978-3-030-26834-3\_18},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/LiuI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MantasP19,
  author       = {Evangelos Mantas and
                  Constantinos Patsakis},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{GRYPHON:} Drone Forensics in Dataflash and Telemetry Logs},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {377--390},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_22},
  doi          = {10.1007/978-3-030-26834-3\_22},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MantasP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MimuraO19,
  author       = {Mamoru Mimura and
                  Taro Ohminami},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Towards Efficient Detection of Malicious {VBA} Macros with {LSI}},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {168--185},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_10},
  doi          = {10.1007/978-3-030-26834-3\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/MimuraO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OkishimaN19,
  author       = {Ryo Okishima and
                  Toru Nakanishi},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {An Anonymous Credential System with Constant-Size Attribute Proofs
                  for {CNF} Formulas with Negations},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_6},
  doi          = {10.1007/978-3-030-26834-3\_6},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OkishimaN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnukiAYT19,
  author       = {Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsutomu Yamazaki and
                  Tsuyoshi Takagi},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {(Short Paper) {A} Faster Constant-Time Algorithm of {CSIDH} Keeping
                  Two Points},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {23--33},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_2},
  doi          = {10.1007/978-3-030-26834-3\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnukiAYT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OtsukiKIMFL19,
  author       = {Yuto Otsuki and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Jun Miyoshi and
                  Jacob Faires and
                  Terrence Lillard},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Toward the Analysis of Distributed Code Injection in Post-mortem Forensics},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {391--409},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_23},
  doi          = {10.1007/978-3-030-26834-3\_23},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OtsukiKIMFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakamotoMSSKFBM19,
  author       = {Kosei Sakamoto and
                  Kazuhiko Minematsu and
                  Nao Shibata and
                  Maki Shigeri and
                  Hiroyasu Kubo and
                  Yuki Funabiki and
                  Andrey Bogdanov and
                  Sumio Morioka and
                  Takanori Isobe},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Tweakable {TWINE:} Building a Tweakable Block Cipher on Generalized
                  Feistel Structure},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_8},
  doi          = {10.1007/978-3-030-26834-3\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakamotoMSSKFBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SatoIOY19,
  author       = {Masaya Sato and
                  Yuta Imamura and
                  Rintaro Orito and
                  Toshihiro Yamauchi},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {(Short Paper) Method for Preventing Suspicious Web Access in Android
                  WebView},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {241--250},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_14},
  doi          = {10.1007/978-3-030-26834-3\_14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SatoIOY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TomitaOK19,
  author       = {Toi Tomita and
                  Wakaha Ogata and
                  Kaoru Kurosawa},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from
                  Simple (Not {\textbackslash}mathtt q -type) Assumptions},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_1},
  doi          = {10.1007/978-3-030-26834-3\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TomitaOK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangLX19,
  author       = {Xin Wang and
                  Shimin Li and
                  Rui Xue},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation
                  Techniques (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {273--283},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_16},
  doi          = {10.1007/978-3-030-26834-3\_16},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZeierWH19,
  author       = {Alexander Zeier and
                  Alexander Wiesmaier and
                  Andreas Heinemann},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {{API} Usability of Stateful Signature Schemes},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {221--240},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_13},
  doi          = {10.1007/978-3-030-26834-3\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZeierWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2019,
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3},
  doi          = {10.1007/978-3-030-26834-3},
  isbn         = {978-3-030-26833-6},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics