BibTeX records: Michael Clear

download as .bib file

@article{DBLP:journals/ijact/ClearG17,
  author    = {Michael Clear and
               Ciar{\'{a}}n Mc Goldrick},
  title     = {Attribute-based fully homomorphic encryption with a bounded number
               of inputs},
  journal   = {{IJACT}},
  volume    = {3},
  number    = {4},
  pages     = {363--376},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJACT.2017.10010329},
  doi       = {10.1504/IJACT.2017.10010329},
  timestamp = {Thu, 01 Feb 2018 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ijact/ClearG17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/RowanCGHG17,
  author    = {Sean Rowan and
               Michael Clear and
               Mario Gerla and
               Meriel Huggard and
               Ciar{\'{a}}n Mc Goldrick},
  title     = {Securing Vehicle to Vehicle Communications using Blockchain through
               Visible Light and Acoustic Side-Channels},
  journal   = {CoRR},
  volume    = {abs/1704.02553},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02553},
  archivePrefix = {arXiv},
  eprint    = {1704.02553},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/RowanCGHG17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ClearM17,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Attribute-Based Group Homomorphic Encryption and Additively Homomorphic
               {IBE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {752},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/752},
  timestamp = {Fri, 25 Aug 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ClearM17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearM16,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number
               of Inputs},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
               on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  pages     = {307--324},
  year      = {2016},
  crossref  = {DBLP:conf/africacrypt/2016},
  url       = {https://doi.org/10.1007/978-3-319-31517-1_16},
  doi       = {10.1007/978-3-319-31517-1_16},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/ClearM16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ClearM16,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number
               of Inputs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {99},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/099},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ClearM16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/computer/PatsakisLCBS15,
  author    = {Constantinos Patsakis and
               Paul Laird and
               Michael Clear and
               M{\'{e}}lanie Bouroche and
               Agusti Solanas},
  title     = {Interoperable Privacy-Aware E-Participation within Smart Cities},
  journal   = {{IEEE} Computer},
  volume    = {48},
  number    = {1},
  pages     = {52--58},
  year      = {2015},
  url       = {https://doi.org/10.1109/MC.2015.16},
  doi       = {10.1109/MC.2015.16},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/computer/PatsakisLCBS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ClearM15,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Multi-identity and Multi-key Leveled {FHE} from Learning with Errors},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  pages     = {630--656},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48000-7_31},
  doi       = {10.1007/978-3-662-48000-7_31},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/ClearM15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RhinowC15,
  author    = {Florian Rhinow and
               Michael Clear},
  title     = {Scargos: Towards Automatic Vulnerability Distribution},
  booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
               on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
               2015.},
  pages     = {369--376},
  year      = {2015},
  crossref  = {DBLP:conf/secrypt/2015},
  url       = {https://doi.org/10.5220/0005566203690376},
  doi       = {10.5220/0005566203690376},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/RhinowC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearTM14,
  author    = {Michael Clear and
               Hitesh Tewari and
               Ciaran McGoldrick},
  title     = {Anonymous {IBE} from Quadratic Residuosity with Improved Performance},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  pages     = {377--397},
  year      = {2014},
  crossref  = {DBLP:conf/africacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6_23},
  doi       = {10.1007/978-3-319-06734-6_23},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/ClearTM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cans/ClearM14,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Bootstrappable Identity-Based Fully Homomorphic Encryption},
  booktitle = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  pages     = {1--19},
  year      = {2014},
  crossref  = {DBLP:conf/cans/2014},
  url       = {https://doi.org/10.1007/978-3-319-12280-9_1},
  doi       = {10.1007/978-3-319-12280-9_1},
  timestamp = {Wed, 24 May 2017 08:27:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cans/ClearM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cbms/PatsakisCLZB14,
  author    = {Constantinos Patsakis and
               Michael Clear and
               Paul Laird and
               Athanasios Zigomitros and
               M{\'{e}}lanie Bouroche},
  title     = {Privacy-Aware Large-Scale Virological and Epidemiological Data Monitoring},
  booktitle = {2014 {IEEE} 27th International Symposium on Computer-Based Medical
               Systems, New York, NY, USA, May 27-29, 2014},
  pages     = {78--81},
  year      = {2014},
  crossref  = {DBLP:conf/cbms/2014},
  url       = {https://doi.org/10.1109/CBMS.2014.89},
  doi       = {10.1109/CBMS.2014.89},
  timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cbms/PatsakisCLZB14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PatsakisCL14,
  author    = {Constantinos Patsakis and
               Michael Clear and
               Paul Laird},
  title     = {Private Aggregation with Custom Collusion Tolerance},
  booktitle = {Information Security and Cryptology - 10th International Conference,
               Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
               Papers},
  pages     = {72--89},
  year      = {2014},
  crossref  = {DBLP:conf/cisc/2014},
  url       = {https://doi.org/10.1007/978-3-319-16745-9_5},
  doi       = {10.1007/978-3-319-16745-9_5},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/cisc/PatsakisCL14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/ClearPL14,
  author    = {Michael Clear and
               Constantinos Patsakis and
               Paul Laird},
  title     = {Lightweight Self-Bootstrapping Multiparty Computations of Time-Series
               Data with Custom Collusion Tolerance},
  journal   = {CoRR},
  volume    = {abs/1402.7118},
  year      = {2014},
  url       = {http://arxiv.org/abs/1402.7118},
  archivePrefix = {arXiv},
  eprint    = {1402.7118},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/ClearPL14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ClearM14,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Bootstrappable Identity-Based Fully Homomorphic Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {491},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/491},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ClearM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ClearTM14,
  author    = {Michael Clear and
               Hitesh Tewari and
               Ciaran McGoldrick},
  title     = {Anonymous {IBE} from Quadratic Residuosity with Improved Performance},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {778},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/778},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ClearTM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ClearM14a,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Multi-Identity and Multi-Key Leveled {FHE} from Learning with Errors},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {798},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/798},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ClearM14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ClearHT13,
  author    = {Michael Clear and
               Arthur Hughes and
               Hitesh Tewari},
  title     = {Homomorphic Encryption with Access Policies: Characterization and
               New Constructions},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  pages     = {61--87},
  year      = {2013},
  crossref  = {DBLP:conf/africacrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38553-7_4},
  doi       = {10.1007/978-3-642-38553-7_4},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/ClearHT13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ClearM13,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Policy-based Non-interactive Outsourcing of Computation using Multikey
               {FHE} and {CP-ABE}},
  booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  pages     = {444--452},
  year      = {2013},
  crossref  = {DBLP:conf/secrypt/2013},
  url       = {http://ieeexplore.ieee.org/document/7223196/},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/ClearM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-1192,
  author    = {Michael Clear and
               Arthur Hughes and
               Hitesh Tewari},
  title     = {Homomorphic Encryption with Access Policies: Characterization and
               New Constructions},
  journal   = {CoRR},
  volume    = {abs/1302.1192},
  year      = {2013},
  url       = {http://arxiv.org/abs/1302.1192},
  archivePrefix = {arXiv},
  eprint    = {1302.1192},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1302-1192},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ClearM13,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Policy-Based Non-interactive Outsourcing of Computation using multikey
               {FHE} and {CP-ABE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {875},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/875},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ClearM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/WarrenCM12,
  author    = {Jeff Warren and
               Michael Clear and
               Ciaran McGoldrick},
  title     = {Metadata Independent Hashing for Media Identification {\&} {P2P}
               Transfer Optimisation},
  booktitle = {2012 International Conference on Cyber-Enabled Distributed Computing
               and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12,
               2012},
  pages     = {58--65},
  year      = {2012},
  crossref  = {DBLP:conf/cyberc/2012},
  url       = {https://doi.org/10.1109/CyberC.2012.19},
  doi       = {10.1109/CyberC.2012.19},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cyberc/WarrenCM12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isw/ClearREHT12,
  author    = {Michael Clear and
               Karl Reid and
               Desmond Ennis and
               Arthur Hughes and
               Hitesh Tewari},
  title     = {Collaboration-Preserving Authenticated Encryption for Operational
               Transformation Systems},
  booktitle = {Information Security - 15th International Conference, {ISC} 2012,
               Passau, Germany, September 19-21, 2012. Proceedings},
  pages     = {204--223},
  year      = {2012},
  crossref  = {DBLP:conf/isw/2012},
  url       = {https://doi.org/10.1007/978-3-642-33383-5_13},
  doi       = {10.1007/978-3-642-33383-5_13},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isw/ClearREHT12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2016,
  editor    = {David Pointcheval and
               Abderrahmane Nitaj and
               Tajjeeddine Rachidi},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
               on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9646},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-31517-1},
  doi       = {10.1007/978-3-319-31517-1},
  isbn      = {978-3-319-31516-4},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9216},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48000-7},
  doi       = {10.1007/978-3-662-48000-7},
  isbn      = {978-3-662-47999-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2015-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2015,
  editor    = {Mohammad S. Obaidat and
               Pascal Lorenz and
               Pierangela Samarati},
  title     = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
               on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
               2015},
  publisher = {SciTePress},
  year      = {2015},
  isbn      = {978-989-758-117-5},
  timestamp = {Thu, 06 Aug 2015 12:56:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2014,
  editor    = {David Pointcheval and
               Damien Vergnaud},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8469},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6},
  doi       = {10.1007/978-3-319-06734-6},
  isbn      = {978-3-319-06733-9},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cans/2014,
  editor    = {Dimitris Gritzalis and
               Aggelos Kiayias and
               Ioannis G. Askoxylakis},
  title     = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8813},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12280-9},
  doi       = {10.1007/978-3-319-12280-9},
  isbn      = {978-3-319-12279-3},
  timestamp = {Wed, 24 May 2017 08:27:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cans/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cbms/2014,
  title     = {2014 {IEEE} 27th International Symposium on Computer-Based Medical
               Systems, New York, NY, USA, May 27-29, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6881324},
  isbn      = {978-1-4799-4435-4},
  timestamp = {Fri, 27 Mar 2015 19:02:21 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/cbms/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cisc/2014,
  editor    = {Dongdai Lin and
               Moti Yung and
               Jianying Zhou},
  title     = {Information Security and Cryptology - 10th International Conference,
               Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8957},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-16745-9},
  doi       = {10.1007/978-3-319-16745-9},
  isbn      = {978-3-319-16744-2},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/cisc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2013,
  editor    = {Amr Youssef and
               Abderrahmane Nitaj and
               Aboul Ella Hassanien},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7918},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38553-7},
  doi       = {10.1007/978-3-642-38553-7},
  isbn      = {978-3-642-38552-0},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2013,
  editor    = {Pierangela Samarati},
  title     = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  publisher = {SciTePress},
  year      = {2013},
  isbn      = {978-989-8565-73-0},
  timestamp = {Tue, 05 Nov 2013 12:35:25 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cyberc/2012,
  title     = {2012 International Conference on Cyber-Enabled Distributed Computing
               and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12,
               2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6383189},
  isbn      = {978-1-4673-2624-7},
  timestamp = {Thu, 23 Oct 2014 11:41:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cyberc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isw/2012,
  editor    = {Dieter Gollmann and
               Felix C. Freiling},
  title     = {Information Security - 15th International Conference, {ISC} 2012,
               Passau, Germany, September 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7483},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33383-5},
  doi       = {10.1007/978-3-642-33383-5},
  isbn      = {978-3-642-33382-8},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isw/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier