Search dblp for Publications

export results for "toc:db/conf/scn/scn2002.bht:"

 download as .bib file

@proceedings{DBLP:conf/scn/2002,
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36413-7},
  doi          = {10.1007/3-540-36413-7},
  isbn         = {3-540-00420-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseCMD02,
  author       = {Giuseppe Ateniese and
                  Reza Curtmola and
                  Breno de Medeiros and
                  Darren Davis},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Medical Information Privacy Assurance: Cryptographic and System Aspects},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {199--218},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_15},
  doi          = {10.1007/3-540-36413-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AtenieseCMD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BarretoLS02,
  author       = {Paulo S. L. M. Barreto and
                  Ben Lynn and
                  Michael Scott},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Constructing Elliptic Curves with Prescribed Embedding Degrees},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {257--267},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_19},
  doi          = {10.1007/3-540-36413-7\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BarretoLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BeimelS02,
  author       = {Amos Beimel and
                  Yoav Stahl},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Robust Information-Theoretic Private Information Retrieval},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_24},
  doi          = {10.1007/3-540-36413-7\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BeimelS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BorissovNPV02,
  author       = {Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On a Resynchronization Weakness in a Class of Combiners with Memory},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {164--173},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_12},
  doi          = {10.1007/3-540-36413-7\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BorissovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischL02,
  author       = {Jan Camenisch and
                  Anna Lysyanskaya},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {A Signature Scheme with Efficient Protocols},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {268--289},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_20},
  doi          = {10.1007/3-540-36413-7\_20},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/CamenischL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CatuognoV02,
  author       = {Luigi Catuogno and
                  Ivan Visconti},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {A Format-Independent Architecture for Run-Time Integrity Checking
                  of Executable Code},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_16},
  doi          = {10.1007/3-540-36413-7\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/CatuognoV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CheungDLZ02,
  author       = {Shirley H. C. Cheung and
                  Xiaotie Deng and
                  Chan H. Lee and
                  Yunlei Zhao},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {A New Notion of Soundness in Bare Public-Key Model},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {318--325},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_23},
  doi          = {10.1007/3-540-36413-7\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CheungDLZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Crescenzo02,
  author       = {Giovanni Di Crescenzo},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Equivocable and Extractable Commitment Schemes},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {74--87},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_6},
  doi          = {10.1007/3-540-36413-7\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Crescenzo02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CrescenzoK02,
  author       = {Giovanni Di Crescenzo and
                  Olga Kornievskaia},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Efficient Re-keying Protocols for Multicast Encryption},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_9},
  doi          = {10.1007/3-540-36413-7\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CrescenzoK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DedicRV02,
  author       = {Nenad Dedic and
                  Leonid Reyzin and
                  Salil P. Vadhan},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {An Improved Pseudorandom Generator Based on Hardness of Factoring},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {88--101},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_7},
  doi          = {10.1007/3-540-36413-7\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DedicRV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DengLZZ02,
  author       = {Xiaotie Deng and
                  Chan H. Lee and
                  Yunlei Zhao and
                  Hong Zhu},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Reduction Zero-Knowledge},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {303--317},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_22},
  doi          = {10.1007/3-540-36413-7\_22},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DengLZZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DesmedtW02,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Efficient Zero-Knowledge Proofs for Some Practical Graph Problems},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {290--302},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_21},
  doi          = {10.1007/3-540-36413-7\_21},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/DesmedtW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DodisR02,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On the Power of Claw-Free Permutations},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_5},
  doi          = {10.1007/3-540-36413-7\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DodisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Granboulan02,
  author       = {Louis Granboulan},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {How to Repair {ESIGN}},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {234--240},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_17},
  doi          = {10.1007/3-540-36413-7\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Granboulan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Itkis02,
  author       = {Gene Itkis},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Intrusion-Resilient Signatures: Generic Constructions, or Defeating
                  Strong Adversary with Minimal Assumptions},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {102--118},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_8},
  doi          = {10.1007/3-540-36413-7\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Itkis02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KatzOY02,
  author       = {Jonathan Katz and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Forward Secrecy in Password-Only Key Exchange Protocols},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_3},
  doi          = {10.1007/3-540-36413-7\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KatzOY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KozlovR02,
  author       = {Anton Kozlov and
                  Leonid Reyzin},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Forward-Secure Signatures with Fast Key Update},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_18},
  doi          = {10.1007/3-540-36413-7\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KozlovR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KurnioSW02,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {A Group Key Distribution Scheme with Decentralised User Join},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_11},
  doi          = {10.1007/3-540-36413-7\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KurnioSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Kushilevitz02,
  author       = {Eyal Kushilevitz},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Some Applications of Polynomials for the Design of Cryptographic Protocols},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_1},
  doi          = {10.1007/3-540-36413-7\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Kushilevitz02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Marti-FarreP02,
  author       = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Secret Sharing Schemes on Access Structures with Intersection Number
                  Equal to One},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {354--363},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_26},
  doi          = {10.1007/3-540-36413-7\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Marti-FarreP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Maurer02,
  author       = {Ueli M. Maurer},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Secure Multi-party Computation Made Simple},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_2},
  doi          = {10.1007/3-540-36413-7\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Maurer02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NiedermeyerS02,
  author       = {Frank Niedermeyer and
                  Werner Schindler},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On a Class of Key Agreement Protocols Which Cannot Be Unconditionally
                  Secure},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {133--145},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_10},
  doi          = {10.1007/3-540-36413-7\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NiedermeyerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PrabhuSR02,
  author       = {B. Prabhu and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Trading Players for Efficiency in Unconditional Multiparty Computation},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {342--353},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_25},
  doi          = {10.1007/3-540-36413-7\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PrabhuSR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/SelcukB02,
  author       = {Ali Aydin Sel{\c{c}}uk and
                  Ali Bi{\c{c}}ak},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On Probability of Success in Linear and Differential Cryptanalysis},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {174--185},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_13},
  doi          = {10.1007/3-540-36413-7\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/SelcukB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Tsudik02,
  author       = {Gene Tsudik},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Weak Forward Security in Mediated {RSA}},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {45--54},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_4},
  doi          = {10.1007/3-540-36413-7\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Tsudik02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YanamiS02,
  author       = {Hitoshi Yanami and
                  Takeshi Shimoyama},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Differential Cryptanalysis of a Reduced-Round {SEED}},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {186--198},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_14},
  doi          = {10.1007/3-540-36413-7\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YanamiS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}