default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw2016.bht:"
@proceedings{DBLP:conf/spw/2016, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-62033-6}, doi = {10.1007/978-3-319-62033-6}, isbn = {978-3-319-62032-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaqerA16, author = {Khaled Baqer and Ross J. Anderson}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {SMAPs: Short Message Authentication Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {133--140}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_16}, doi = {10.1007/978-3-319-62033-6\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaqerA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaqerBAK16, author = {Khaled Baqer and S. Johann Bezuidenhoudt and Ross J. Anderson and Markus G. Kuhn}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {SMAPs: Short Message Authentication Protocols}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {119--132}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_15}, doi = {10.1007/978-3-319-62033-6\_15}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaqerBAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella16, author = {Giampaolo Bella}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Invisible Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {10--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_2}, doi = {10.1007/978-3-319-62033-6\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaC016, author = {Giampaolo Bella and Bruce Christianson and Luca Vigan{\`{o}}}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Invisible Security}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {1--9}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_1}, doi = {10.1007/978-3-319-62033-6\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaC016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson16, author = {Bruce Christianson}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {The Price of Belief: Insuring Credible Trust? (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {39--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_6}, doi = {10.1007/978-3-319-62033-6\_6}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor16, author = {Virgil D. Gligor}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Defending Against Evolving DDoS Attacks: {A} Case Study Using Link Flooding Incidents (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {58--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_8}, doi = {10.1007/978-3-319-62033-6\_8}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GoldbergJLS16, author = {Ian Goldberg and Graeme Jenkinson and David Llewellyn{-}Jones and Frank Stajano}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Red Button and Yellow Button: Usable Security for Lost Security Tokens}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {165--171}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_19}, doi = {10.1007/978-3-319-62033-6\_19}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GoldbergJLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Happe16, author = {Andreas Happe}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Malicious Clients in Distributed Secret Sharing Based Storage Networks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {215--218}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_24}, doi = {10.1007/978-3-319-62033-6\_24}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Happe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HappeKL16, author = {Andreas Happe and Stephan Krenn and Thomas Lor{\"{u}}nser}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Malicious Clients in Distributed Secret Sharing Based Storage Networks}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {206--214}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_23}, doi = {10.1007/978-3-319-62033-6\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HappeKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jonker16, author = {Hugo Jonker}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {26--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_4}, doi = {10.1007/978-3-319-62033-6\_4}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Jonker16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMT16, author = {Hugo L. Jonker and Sjouke Mauw and Rolando Trujillo{-}Rasua}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {19--25}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_3}, doi = {10.1007/978-3-319-62033-6\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KangGS16, author = {Min Suk Kang and Virgil D. Gligor and Vyas Sekar}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Defending Against Evolving DDoS Attacks: {A} Case Study Using Link Flooding Incidents}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {47--57}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_7}, doi = {10.1007/978-3-319-62033-6\_7}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KangGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kidney16, author = {Brian J. Kidney}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Exploiting Autocorrect to Attack Privacy (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {110--118}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_14}, doi = {10.1007/978-3-319-62033-6\_14}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Kidney16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KidneyA16, author = {Brian J. Kidney and Jonathan Anderson}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Exploiting Autocorrect to Attack Privacy}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {103--109}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_13}, doi = {10.1007/978-3-319-62033-6\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/KidneyA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Llewellyn-Jones16, author = {David Llewellyn{-}Jones and Graeme Jenkinson and Frank Stajano}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Explicit Delegation Using Configurable Cookies}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {141--152}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_17}, doi = {10.1007/978-3-319-62033-6\_17}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Llewellyn-Jones16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Llewellyn-Jones16a, author = {David Llewellyn{-}Jones}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Explicit Delegation Using Configurable Cookies (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {153--164}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_18}, doi = {10.1007/978-3-319-62033-6\_18}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Llewellyn-Jones16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/OstadalSM16, author = {Radim Ost{\'{a}}dal and Petr Svenda and Vashek Maty{\'{a}}s}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Reconsidering Attacker Models in Ad-Hoc Networks}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {219--227}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_25}, doi = {10.1007/978-3-319-62033-6\_25}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/OstadalSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PieczulF16, author = {Olgierd Pieczul and Simon N. Foley}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {The Evolution of a Security Control}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {67--84}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_9}, doi = {10.1007/978-3-319-62033-6\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/PieczulF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PieczulF16a, author = {Olgierd Pieczul and Simon N. Foley}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {85--89}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_10}, doi = {10.1007/978-3-319-62033-6\_10}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PieczulF16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roscoe16, author = {A. W. Roscoe}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Detecting Failed Attacks on Human-Interactive Security Protocols}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {181--197}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_21}, doi = {10.1007/978-3-319-62033-6\_21}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roscoe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roscoe16a, author = {A. W. Roscoe}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {198--205}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_22}, doi = {10.1007/978-3-319-62033-6\_22}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roscoe16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano16, author = {Frank Stajano}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {172--180}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_20}, doi = {10.1007/978-3-319-62033-6\_20}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Svenda16, author = {Petr Svenda}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {228--231}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_26}, doi = {10.1007/978-3-319-62033-6\_26}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Svenda16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WernickC16, author = {Paul Wernick and Bruce Christianson}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {The Price of Belief: Insuring Credible Trust?}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {35--38}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_5}, doi = {10.1007/978-3-319-62033-6\_5}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WernickC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan16, author = {Jeff Yan}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Novel Security and Privacy Perspectives of Camera Fingerprints}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {90--95}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_11}, doi = {10.1007/978-3-319-62033-6\_11}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan16a, author = {Jeff Yan}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {96--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_12}, doi = {10.1007/978-3-319-62033-6\_12}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.