BibTeX records: Mike Bond

download as .bib file

@article{DBLP:journals/ieeesp/BondCMSA15,
  author       = {Mike Bond and
                  Marios O. Choudary and
                  Steven J. Murdoch and
                  Sergei P. Skorobogatov and
                  Ross J. Anderson},
  title        = {Be Prepared: The {EMV} Preplay Attack},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {2},
  pages        = {56--64},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.24},
  doi          = {10.1109/MSP.2015.24},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BondCMSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BondCMSA14,
  author       = {Mike Bond and
                  Omar Choudary and
                  Steven J. Murdoch and
                  Sergei P. Skorobogatov and
                  Ross J. Anderson},
  title        = {Chip and Skim: Cloning {EMV} Cards with the Pre-play Attack},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {49--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.11},
  doi          = {10.1109/SP.2014.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BondCMSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BondFSW13,
  author       = {Mike Bond and
                  George French and
                  Nigel P. Smart and
                  Gaven J. Watson},
  editor       = {Ed Dawson},
  title        = {The Low-Call Diet: Authenticated Encryption for Call Counting {HSM}
                  Users},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {359--374},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_23},
  doi          = {10.1007/978-3-642-36095-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BondFSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MurdochBA12,
  author       = {Steven J. Murdoch and
                  Mike Bond and
                  Ross J. Anderson},
  title        = {How Certification Systems Fail: Lessons from the Ware Report},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {6},
  pages        = {40--44},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.89},
  doi          = {10.1109/MSP.2012.89},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MurdochBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-2531,
  author       = {Mike Bond and
                  Omar Choudary and
                  Steven J. Murdoch and
                  Sergei P. Skorobogatov and
                  Ross J. Anderson},
  title        = {Chip and Skim: cloning {EMV} cards with the pre-play attack},
  journal      = {CoRR},
  volume       = {abs/1209.2531},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.2531},
  eprinttype    = {arXiv},
  eprint       = {1209.2531},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-2531.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BondFFS12,
  author       = {Mike Bond and
                  Riccardo Focardi and
                  Sibylle B. Fr{\"{o}}schle and
                  Graham Steel},
  title        = {Analysis of Security APIs (Dagstuhl Seminar 12482)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {11},
  pages        = {155--168},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.11.155},
  doi          = {10.4230/DAGREP.2.11.155},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/BondFFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BondFSW12,
  author       = {Mike Bond and
                  George French and
                  Nigel P. Smart and
                  Gaven J. Watson},
  title        = {The low-call diet: Authenticated Encryption for call counting {HSM}
                  users},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BondFSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AndersonBCMS11,
  author       = {Ross J. Anderson and
                  Mike Bond and
                  Omar Choudary and
                  Steven J. Murdoch and
                  Frank Stajano},
  editor       = {George Danezis},
  title        = {Might Financial Cryptography Kill Financial Innovation? - The Curious
                  Case of {EMV}},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {220--234},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_18},
  doi          = {10.1007/978-3-642-27576-0\_18},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AndersonBCMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FrenchB10,
  author       = {George French and
                  Mike Bond},
  title        = {Caveat venditor},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {15},
  number       = {1},
  pages        = {28--32},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.istr.2010.10.003},
  doi          = {10.1016/J.ISTR.2010.10.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FrenchB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MurdochDAB10,
  author       = {Steven J. Murdoch and
                  Saar Drimer and
                  Ross J. Anderson and
                  Mike Bond},
  title        = {Chip and {PIN} is Broken},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {433--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.33},
  doi          = {10.1109/SP.2010.33},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MurdochDAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Bond07,
  author       = {Mike Bond},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Leaving Room for the Bad Guys},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {1},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_1},
  doi          = {10.1007/978-3-540-77366-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Bond07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ThorpeHCCB07,
  author       = {Christopher Thorpe and
                  Jessica Hammer and
                  L. Jean Camp and
                  Jon Callas and
                  Mike Bond},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Virtual Economies: Threats and Risks},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {239--244},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_21},
  doi          = {10.1007/978-3-540-77366-5\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ThorpeHCCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LinBC07,
  author       = {Amerson Lin and
                  Mike Bond and
                  Jolyon Clulow},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Modeling Partial Attacks with Alloy},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_4},
  doi          = {10.1007/978-3-642-17773-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LinBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AdidaBCLAR07,
  author       = {Ben Adida and
                  Mike Bond and
                  Jolyon Clulow and
                  Amerson Lin and
                  Ross J. Anderson and
                  Ronald L. Rivest},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {On the Security of the {EMV} Secure Messaging {API} (Extended Abstract)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {147--149},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_17},
  doi          = {10.1007/978-3-642-17773-6\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AdidaBCLAR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YounABCHLRA07,
  author       = {Paul Youn and
                  Ben Adida and
                  Mike Bond and
                  Jolyon Clulow and
                  Jonathan Herzog and
                  Amerson Lin and
                  Ronald L. Rivest and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Robbing the Bank with a Theorem Prover - (Abstract)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {171},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_21},
  doi          = {10.1007/978-3-642-17773-6\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YounABCHLRA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BondC06,
  author       = {Mike Bond and
                  Jolyon Clulow},
  title        = {Integrity of intention (a theory of types for security APIs)},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {93--99},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.003},
  doi          = {10.1016/J.ISTR.2006.03.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BondC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/AndersonBCS06,
  author       = {Ross J. Anderson and
                  Mike Bond and
                  Jolyon Clulow and
                  Sergei P. Skorobogatov},
  title        = {Cryptographic Processors-A Survey},
  journal      = {Proc. {IEEE}},
  volume       = {94},
  number       = {2},
  pages        = {357--369},
  year         = {2006},
  url          = {https://doi.org/10.1109/JPROC.2005.862423},
  doi          = {10.1109/JPROC.2005.862423},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/AndersonBCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BondD06,
  author       = {Mike Bond and
                  George Danezis},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {A pact with the devil},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl,
                  Germany, September 19-22, 2006},
  pages        = {77--82},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1278952},
  timestamp    = {Thu, 29 Nov 2018 11:17:10 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BondD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AdidaBCLMAR06,
  author       = {Ben Adida and
                  Mike Bond and
                  Jolyon Clulow and
                  Amerson Lin and
                  Steven J. Murdoch and
                  Ross J. Anderson and
                  Ronald L. Rivest},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Phish and Chips},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {40--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_7},
  doi          = {10.1007/978-3-642-04904-0\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AdidaBCLMAR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bond06,
  author       = {Mike Bond},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Phish and Chips},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {49--51},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_8},
  doi          = {10.1007/978-3-642-04904-0\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bond06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonB06,
  author       = {Ross J. Anderson and
                  Mike Bond},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Man-in-the-Middle Defence},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {153--156},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_20},
  doi          = {10.1007/978-3-642-04904-0\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BondD05,
  author       = {Mike Bond and
                  George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Dining Freemasons (Security Protocols for Secret Societies)},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {258--265},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_32},
  doi          = {10.1007/978-3-540-77156-2\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BondD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bond05,
  author       = {Mike Bond},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Dining Freemasons (Security Protocols for Secret Societies)},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {266--275},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_33},
  doi          = {10.1007/978-3-540-77156-2\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bond05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cau/BondC04,
  author       = {Mike Bond and
                  Jolyon Clulow},
  editor       = {Ed Dawson and
                  Wolfgang Klemm},
  title        = {Encrypted? Randomised? Compromised? (When Cryptographically Secured
                  Data is Not Secure)},
  booktitle    = {Cryptographic Algorithms and their Uses - 2004, International Workshop,
                  Gold Coast, Australia, July 5-6, 2004, Proceedings},
  pages        = {140--151},
  publisher    = {Queensland University of Technology},
  year         = {2004},
  timestamp    = {Fri, 16 Jul 2004 13:22:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cau/BondC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BondC05,
  author       = {Mike Bond and
                  Jolyon Clulow},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Extending Security Protocol Analysis: New Challenges},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {13--24},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.09.036},
  doi          = {10.1016/J.ENTCS.2004.09.036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/BondC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClaytonB02,
  author       = {Richard Clayton and
                  Mike Bond},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Experience Using a Low-Cost {FPGA} Design to Crack {DES} Keys},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {579--592},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_42},
  doi          = {10.1007/3-540-36400-5\_42},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ClaytonB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BondA01,
  author       = {Mike Bond and
                  Ross J. Anderson},
  title        = {API-Level Attacks on Embedded Systems},
  journal      = {Computer},
  volume       = {34},
  number       = {10},
  pages        = {67--75},
  year         = {2001},
  url          = {https://doi.org/10.1109/2.955101},
  doi          = {10.1109/2.955101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BondA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Bond01,
  author       = {Mike Bond},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Attacks on Cryptoprocessor Transaction Sets},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {220--234},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_19},
  doi          = {10.1007/3-540-44709-1\_19},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Bond01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}