BibTeX records: Ghassan Karame

download as .bib file

@inproceedings{DBLP:conf/ccs/KarameNOR17,
  author    = {Ghassan Karame and
               Matthias Neugschwandtner and
               Melek {\"{O}}nen and
               Hubert Ritzdorf},
  title     = {Reconciling Security and Functional Requirements in Multi-tenant Clouds},
  booktitle = {Proceedings of the Fifth {ACM} International Workshop on Security
               in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
               April 2, 2017},
  pages     = {11--18},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017scc},
  url       = {http://doi.acm.org/10.1145/3055259.3055265},
  doi       = {10.1145/3055259.3055265},
  timestamp = {Mon, 24 Apr 2017 19:28:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/KarameNOR17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBFK17,
  author    = {Frederik Armknecht and
               Jens{-}Matthias Bohli and
               David Froelicher and
               Ghassan Karame},
  title     = {Sharing Proofs of Retrievability across Tenants},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {275--287},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017asia},
  url       = {http://doi.acm.org/10.1145/3052973.3052997},
  doi       = {10.1145/3052973.3052997},
  timestamp = {Thu, 20 Apr 2017 14:32:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/ArmknechtBFK17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/RitzdorfSKMGC17,
  author    = {Hubert Ritzdorf and
               Claudio Soriente and
               Ghassan O. Karame and
               Srdjan Marinovic and
               Damian Gruber and
               Srdjan Capkun},
  title     = {Towards Shared Ownership in the Cloud},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {227},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/227},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/RitzdorfSKMGC17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tifs/CuiKKB16,
  author    = {Heng Cui and
               Ghassan O. Karame and
               Felix Klaedtke and
               Roberto Bifulco},
  title     = {On the Fingerprinting of Software-Defined Networks},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {10},
  pages     = {2160--2173},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2016.2573756},
  doi       = {10.1109/TIFS.2016.2573756},
  timestamp = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tifs/CuiKKB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GervaisKWGRC16,
  author    = {Arthur Gervais and
               Ghassan O. Karame and
               Karl W{\"{u}}st and
               Vasileios Glykantzis and
               Hubert Ritzdorf and
               Srdjan Capkun},
  title     = {On the Security and Performance of Proof of Work Blockchains},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {3--16},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2978341},
  doi       = {10.1145/2976749.2978341},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/GervaisKWGRC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RitzdorfKSC16,
  author    = {Hubert Ritzdorf and
               Ghassan Karame and
               Claudio Soriente and
               Srdjan Capkun},
  title     = {On Information Leakage in Deduplicated Storage Systems},
  booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
               {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages     = {61--72},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016ccsw},
  url       = {http://doi.acm.org/10.1145/2996429.2996432},
  doi       = {10.1145/2996429.2996432},
  timestamp = {Wed, 23 Nov 2016 15:44:39 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/RitzdorfKSC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Karame16,
  author    = {Ghassan Karame},
  title     = {On the Security and Scalability of Bitcoin's Blockchain},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1861--1862},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2976756},
  doi       = {10.1145/2976749.2976756},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/Karame16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/GkounisKBK16,
  author    = {Dimitrios Gkounis and
               Felix Klaedtke and
               Roberto Bifulco and
               Ghassan O. Karame},
  title     = {Cases for Including a Reference Monitor to {SDN}},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis,
               Brazil, August 22-26, 2016},
  pages     = {599--600},
  year      = {2016},
  crossref  = {DBLP:conf/sigcomm/2016},
  url       = {http://doi.acm.org/10.1145/2934872.2959066},
  doi       = {10.1145/2934872.2959066},
  timestamp = {Tue, 15 Aug 2017 16:26:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigcomm/GkounisKBK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/ArmknechtBBK16,
  author    = {Frederik Armknecht and
               Ludovic Barman and
               Jens{-}Matthias Bohli and
               Ghassan O. Karame},
  title     = {Mirror: Enabling Proofs of Data Replication and Retrievability in
               the Cloud},
  booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016.},
  pages     = {1051--1068},
  year      = {2016},
  crossref  = {DBLP:conf/uss/2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/armknecht},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/ArmknechtBBK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/LiuLKA16,
  author    = {Jian Liu and
               Wenting Li and
               Ghassan O. Karame and
               N. Asokan},
  title     = {Towards Fairness of Cryptocurrency Payments},
  journal   = {CoRR},
  volume    = {abs/1609.07256},
  year      = {2016},
  url       = {http://arxiv.org/abs/1609.07256},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/LiuLKA16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/LiuLKA16a,
  author    = {Jian Liu and
               Wenting Li and
               Ghassan O. Karame and
               N. Asokan},
  title     = {Scalable Byzantine Consensus via Hardware-assisted Secret Sharing},
  journal   = {CoRR},
  volume    = {abs/1612.04997},
  year      = {2016},
  url       = {http://arxiv.org/abs/1612.04997},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/LiuLKA16a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ercim/CrespoOK16,
  author    = {Beatriz Gallego{-}Nicasio Crespo and
               Melek {\"{O}}nen and
               Ghassan Karame},
  title     = {{TREDISEC:} Towards Realizing a Truly Secure and Trustworthy Cloud},
  journal   = {{ERCIM} News},
  volume    = {2016},
  number    = {104},
  year      = {2016},
  url       = {http://ercim-news.ercim.eu/en104/r-i/tredisec-towards-realizing-a-truly-secure-and-trustworthy-cloud},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ercim/CrespoOK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GervaisKWGRC16,
  author    = {Arthur Gervais and
               Ghassan O. Karame and
               Karl W{\"{u}}st and
               Vasileios Glykantzis and
               Hubert Ritzdorf and
               Srdjan Capkun},
  title     = {On the Security and Performance of Proof of Work Blockchains},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {555},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/555},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GervaisKWGRC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBFK16,
  author    = {Frederik Armknecht and
               Jens{-}Matthias Bohli and
               David Froelicher and
               Ghassan O. Karame},
  title     = {{SPORT:} Sharing Proofs of Retrievability across Tenants},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {724},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/724},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/ArmknechtBFK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tissec/KarameARGC15,
  author    = {Ghassan O. Karame and
               Elli Androulaki and
               Marc Roeschlin and
               Arthur Gervais and
               Srdjan Capkun},
  title     = {Misbehavior in Bitcoin: {A} Study of Double-Spending and Accountability},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {18},
  number    = {1},
  pages     = {2:1--2:32},
  year      = {2015},
  url       = {http://doi.acm.org/10.1145/2732196},
  doi       = {10.1145/2732196},
  timestamp = {Tue, 22 Nov 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tissec/KarameARGC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GervaisRKC15,
  author    = {Arthur Gervais and
               Hubert Ritzdorf and
               Ghassan O. Karame and
               Srdjan Capkun},
  title     = {Tampering with the Delivery of Blocks and Transactions in Bitcoin},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  pages     = {692--705},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {http://doi.acm.org/10.1145/2810103.2813655},
  doi       = {10.1145/2810103.2813655},
  timestamp = {Sat, 03 Oct 2015 19:54:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/GervaisRKC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBKY15,
  author    = {Frederik Armknecht and
               Jens{-}Matthias Bohli and
               Ghassan O. Karame and
               Franck Youssef},
  title     = {Transparent Data Deduplication in the Cloud},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  pages     = {886--900},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {http://doi.acm.org/10.1145/2810103.2813630},
  doi       = {10.1145/2810103.2813630},
  timestamp = {Sat, 03 Oct 2015 19:54:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/ArmknechtBKY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/BringerGKKLORSV15,
  author    = {Julien Bringer and
               Beatriz Gallego{-}Nicasio and
               Ghassan Karame and
               Mathias Kohler and
               Panos Louridas and
               Melek {\"{O}}nen and
               Hubert Ritzdorf and
               Alessandro Sorniotti and
               David Vallejo},
  title     = {{TREDISEC:} Trust-Aware REliable and Distributed Information SEcurity
               in the Cloud},
  booktitle = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
               - 6th International Conference, E-Democracy 2015, Athens, Greece,
               December 10-11, 2015, Proceedings},
  pages     = {193--197},
  year      = {2015},
  crossref  = {DBLP:conf/edemocracy/2015},
  url       = {https://doi.org/10.1007/978-3-319-27164-4_14},
  doi       = {10.1007/978-3-319-27164-4_14},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/edemocracy/BringerGKKLORSV15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icnp/BifulcoCKK15,
  author    = {Roberto Bifulco and
               Heng Cui and
               Ghassan O. Karame and
               Felix Klaedtke},
  title     = {Fingerprinting Software-Defined Networks},
  booktitle = {23rd {IEEE} International Conference on Network Protocols, {ICNP}
               2015, San Francisco, CA, USA, November 10-13, 2015},
  pages     = {453--459},
  year      = {2015},
  crossref  = {DBLP:conf/icnp/2015},
  url       = {https://doi.org/10.1109/ICNP.2015.26},
  doi       = {10.1109/ICNP.2015.26},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icnp/BifulcoCKK15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/KlaedtkeKBC15,
  author    = {Felix Klaedtke and
               Ghassan O. Karame and
               Roberto Bifulco and
               Heng Cui},
  title     = {Towards an access control scheme for accessing flows in {SDN}},
  booktitle = {Proceedings of the 1st {IEEE} Conference on Network Softwarization,
               NetSoft 2015, London, United Kingdom, April 13-17, 2015},
  pages     = {1--6},
  year      = {2015},
  crossref  = {DBLP:conf/netsoft/2015},
  url       = {https://doi.org/10.1109/NETSOFT.2015.7116185},
  doi       = {10.1109/NETSOFT.2015.7116185},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/netsoft/KlaedtkeKBC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SorienteKRMC15,
  author    = {Claudio Soriente and
               Ghassan O. Karame and
               Hubert Ritzdorf and
               Srdjan Marinovic and
               Srdjan Capkun},
  title     = {Commune: Shared Ownership in an Agnostic Cloud},
  booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
               Technologies, Vienna, Austria, June 1-3, 2015},
  pages     = {39--50},
  year      = {2015},
  crossref  = {DBLP:conf/sacmat/2015},
  url       = {http://doi.acm.org/10.1145/2752952.2752972},
  doi       = {10.1145/2752952.2752972},
  timestamp = {Fri, 03 Feb 2017 13:23:25 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacmat/SorienteKRMC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/trust/ArmknechtKMYZ15,
  author    = {Frederik Armknecht and
               Ghassan O. Karame and
               Avikarsha Mandal and
               Franck Youssef and
               Erik Zenner},
  title     = {Ripple: Overview and Outlook},
  booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
               2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  pages     = {163--180},
  year      = {2015},
  crossref  = {DBLP:conf/trust/2015},
  url       = {https://doi.org/10.1007/978-3-319-22846-4_10},
  doi       = {10.1007/978-3-319-22846-4_10},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/trust/ArmknechtKMYZ15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/trust/KarameL15,
  author    = {Ghassan O. Karame and
               Wenting Li},
  title     = {Secure Erasure and Code Update in Legacy Sensors},
  booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
               2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  pages     = {283--299},
  year      = {2015},
  crossref  = {DBLP:conf/trust/2015},
  url       = {https://doi.org/10.1007/978-3-319-22846-4_17},
  doi       = {10.1007/978-3-319-22846-4_17},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/trust/KarameL15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/CuiKKB15,
  author    = {Heng Cui and
               Ghassan O. Karame and
               Felix Klaedtke and
               Roberto Bifulco},
  title     = {Fingerprinting Software-defined Networks},
  journal   = {CoRR},
  volume    = {abs/1512.06585},
  year      = {2015},
  url       = {http://arxiv.org/abs/1512.06585},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/CuiKKB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GervaisRKC15,
  author    = {Arthur Gervais and
               Hubert Ritzdorf and
               Ghassan O. Karame and
               Srdjan Capkun},
  title     = {Tampering with the Delivery of Blocks and Transactions in Bitcoin},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {578},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/578},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GervaisRKC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieeesp/GervaisKCC14,
  author    = {Arthur Gervais and
               Ghassan O. Karame and
               Vedran Capkun and
               Srdjan Capkun},
  title     = {Is Bitcoin a Decentralized Currency?},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {12},
  number    = {3},
  pages     = {54--60},
  year      = {2014},
  url       = {https://doi.org/10.1109/MSP.2014.49},
  doi       = {10.1109/MSP.2014.49},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieeesp/GervaisKCC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/toit/KarameFBCC14,
  author    = {Ghassan Karame and
               Aur{\'{e}}lien Francillon and
               Victor Budilivschi and
               Srdjan Capkun and
               Vedran Capkun},
  title     = {Microcomputations as Micropayments in Web-based Services},
  journal   = {{ACM} Trans. Internet Techn.},
  volume    = {13},
  number    = {3},
  pages     = {8:1--8:23},
  year      = {2014},
  url       = {http://doi.acm.org/10.1145/2611526},
  doi       = {10.1145/2611526},
  timestamp = {Tue, 03 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/toit/KarameFBCC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GervaisCKG14,
  author    = {Arthur Gervais and
               Srdjan Capkun and
               Ghassan O. Karame and
               Damian Gruber},
  title     = {On the privacy provisions of Bloom filters in lightweight bitcoin
               clients},
  booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference,
               {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages     = {326--335},
  year      = {2014},
  crossref  = {DBLP:conf/acsac/2014},
  url       = {http://doi.acm.org/10.1145/2664243.2664267},
  doi       = {10.1145/2664243.2664267},
  timestamp = {Sat, 06 Dec 2014 14:20:32 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/GervaisCKG14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DimitriouK14,
  author    = {Tassos Dimitriou and
               Ghassan Karame},
  title     = {Privacy-Friendly Planning of Energy Distribution in Smart Grids},
  booktitle = {Proceedings of the 2nd Workshop on Smart Energy Grid Security, SEGS@CCS
               2014, Scottsdale, AZ, USA, November 7, 2014},
  pages     = {1--6},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014segs},
  url       = {http://doi.acm.org/10.1145/2667190.2667191},
  doi       = {10.1145/2667190.2667191},
  timestamp = {Wed, 25 May 2016 10:19:57 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/DimitriouK14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBKLR14,
  author    = {Frederik Armknecht and
               Jens{-}Matthias Bohli and
               Ghassan O. Karame and
               Zongren Liu and
               Christian A. Reuter},
  title     = {Outsourced Proofs of Retrievability},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {831--843},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {http://doi.acm.org/10.1145/2660267.2660310},
  doi       = {10.1145/2660267.2660310},
  timestamp = {Mon, 10 Nov 2014 10:57:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/ArmknechtBKLR14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KlaedtkeKBC14,
  author    = {Felix Klaedtke and
               Ghassan O. Karame and
               Roberto Bifulco and
               Heng Cui},
  title     = {Access control for {SDN} controllers},
  booktitle = {Proceedings of the third workshop on Hot topics in software defined
               networking, HotSDN '14, Chicago, Illinois, USA, August 22, 2014},
  pages     = {219--220},
  year      = {2014},
  crossref  = {DBLP:conf/sigcomm/2014hotsdn},
  url       = {http://doi.acm.org/10.1145/2620728.2620773},
  doi       = {10.1145/2620728.2620773},
  timestamp = {Thu, 23 Apr 2015 15:29:29 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigcomm/KlaedtkeKBC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/trust/BohliDKL14,
  author    = {Jens{-}Matthias Bohli and
               Dan Dobre and
               Ghassan O. Karame and
               Wenting Li},
  title     = {PrivLoc: Preventing Location Tracking in Geofencing Services},
  booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
               2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  pages     = {143--160},
  year      = {2014},
  crossref  = {DBLP:conf/trust/2014},
  url       = {https://doi.org/10.1007/978-3-319-08593-7_10},
  doi       = {10.1007/978-3-319-08593-7_10},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/trust/BohliDKL14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/trust/AndroulakiK14,
  author    = {Elli Androulaki and
               Ghassan O. Karame},
  title     = {Hiding Transaction Amounts and Balances in Bitcoin},
  booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
               2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  pages     = {161--178},
  year      = {2014},
  crossref  = {DBLP:conf/trust/2014},
  url       = {https://doi.org/10.1007/978-3-319-08593-7_11},
  doi       = {10.1007/978-3-319-08593-7_11},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/trust/AndroulakiK14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BohliDKL14,
  author    = {Jens{-}Matthias Bohli and
               Dan Dobre and
               Ghassan Karame and
               Wenting Li},
  title     = {PrivLoc: Preventing Location Tracking in Geofencing Services},
  journal   = {CoRR},
  volume    = {abs/1404.4744},
  year      = {2014},
  url       = {http://arxiv.org/abs/1404.4744},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/BohliDKL14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/KarameSLC14,
  author    = {Ghassan O. Karame and
               Claudio Soriente and
               Krzysztof Lichota and
               Srdjan Capkun},
  title     = {Securing Cloud Data in the New Attacker Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {556},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/556},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/KarameSLC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GervaisKGC14,
  author    = {Arthur Gervais and
               Ghassan O. Karame and
               Damian Gruber and
               Srdjan Capkun},
  title     = {On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin
               Clients},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {763},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/763},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GervaisKGC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tifs/KarameDBC13,
  author    = {Ghassan Karame and
               Boris Danev and
               Cyrill Bannwart and
               Srdjan Capkun},
  title     = {On the Security of End-to-End Measurements Based on Packet-Pair Dispersions},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {8},
  number    = {1},
  pages     = {149--162},
  year      = {2013},
  url       = {https://doi.org/10.1109/TIFS.2012.2226579},
  doi       = {10.1109/TIFS.2012.2226579},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tifs/KarameDBC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DobreKLMSV13,
  author    = {Dan Dobre and
               Ghassan Karame and
               Wenting Li and
               Matthias Majuntke and
               Neeraj Suri and
               Marko Vukolic},
  title     = {PoWerStore: proofs of writing for efficient and robust storage},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {285--298},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {http://doi.acm.org/10.1145/2508859.2516750},
  doi       = {10.1145/2508859.2516750},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/DobreKLMSV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/AndroulakiKRSC13,
  author    = {Elli Androulaki and
               Ghassan Karame and
               Marc Roeschlin and
               Tobias Scherer and
               Srdjan Capkun},
  title     = {Evaluating User Privacy in Bitcoin},
  booktitle = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  pages     = {34--51},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013},
  url       = {https://doi.org/10.1007/978-3-642-39884-1_4},
  doi       = {10.1007/978-3-642-39884-1_4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/AndroulakiKRSC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sac/DimitriouK13,
  author    = {Tassos Dimitriou and
               Ghassan Karame},
  title     = {Privacy-friendly tasking and trading of energy in smart grids},
  booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
               {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages     = {652--659},
  year      = {2013},
  crossref  = {DBLP:conf/sac/2013},
  url       = {http://doi.acm.org/10.1145/2480362.2480488},
  doi       = {10.1145/2480362.2480488},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sac/DimitriouK13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/trust/Karame13,
  author    = {Ghassan Karame},
  title     = {Towards Trustworthy Network Measurements},
  booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
               2013, London, UK, June 17-19, 2013. Proceedings},
  pages     = {83--91},
  year      = {2013},
  crossref  = {DBLP:conf/trust/2013},
  url       = {https://doi.org/10.1007/978-3-642-38908-5_6},
  doi       = {10.1007/978-3-642-38908-5_6},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/trust/Karame13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/SorienteKRMC13,
  author    = {Claudio Soriente and
               Ghassan Karame and
               Hubert Ritzdorf and
               Srdjan Marinovic and
               Srdjan Capkun},
  title     = {Commune: Shared Ownership in an Agnostic Cloud},
  journal   = {CoRR},
  volume    = {abs/1311.6236},
  year      = {2013},
  url       = {http://arxiv.org/abs/1311.6236},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/SorienteKRMC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GervaisKCC13,
  author    = {Arthur Gervais and
               Ghassan Karame and
               Srdjan Capkun and
               Vedran Capkun},
  title     = {Is Bitcoin a Decentralized Currency?},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {829},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/829},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GervaisKCC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarameAC12,
  author    = {Ghassan Karame and
               Elli Androulaki and
               Srdjan Capkun},
  title     = {Double-spending fast payments in bitcoin},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {906--917},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {http://doi.acm.org/10.1145/2382196.2382292},
  doi       = {10.1145/2382196.2382292},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/KarameAC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1212-3555,
  author    = {Dan Dobre and
               Ghassan Karame and
               Wenting Li and
               Matthias Majuntke and
               Neeraj Suri and
               Marko Vukolic},
  title     = {Proofs of Writing for Efficient and Robust Storage},
  journal   = {CoRR},
  volume    = {abs/1212.3555},
  year      = {2012},
  url       = {http://arxiv.org/abs/1212.3555},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1212-3555},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/KarameAC12,
  author    = {Ghassan Karame and
               Elli Androulaki and
               Srdjan Capkun},
  title     = {Two Bitcoins at the Price of One? Double-Spending Attacks on Fast
               Payments in Bitcoin},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {248},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/248},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/KarameAC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AndroulakiKRSC12,
  author    = {Elli Androulaki and
               Ghassan Karame and
               Marc Roeschlin and
               Tobias Scherer and
               Srdjan Capkun},
  title     = {Evaluating User Privacy in Bitcoin},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {596},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/596},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AndroulakiKRSC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DanevMKC11,
  author    = {Boris Danev and
               Ramya Jayaram Masti and
               Ghassan Karame and
               Srdjan Capkun},
  title     = {Enabling secure VM-vTPM migration in private clouds},
  booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
               2011, Orlando, FL, USA, 5-9 December 2011},
  pages     = {187--196},
  year      = {2011},
  crossref  = {DBLP:conf/acsac/2011},
  url       = {http://doi.acm.org/10.1145/2076732.2076759},
  doi       = {10.1145/2076732.2076759},
  timestamp = {Mon, 04 Aug 2014 17:08:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/DanevMKC11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarameCM11,
  author    = {Ghassan Karame and
               Srdjan Capkun and
               Ueli Maurer},
  title     = {Privacy-preserving outsourcing of brute-force key searches},
  booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
               2011, Chicago, IL, USA, October 21, 2011},
  pages     = {101--112},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011ccsw},
  url       = {http://doi.acm.org/10.1145/2046660.2046681},
  doi       = {10.1145/2046660.2046681},
  timestamp = {Wed, 25 Jan 2012 19:15:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/KarameCM11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/www/KarameFC11,
  author    = {Ghassan Karame and
               Aur{\'{e}}lien Francillon and
               Srdjan Capkun},
  title     = {Pay as you browse: microcomputations as micropayments in web-based
               services},
  booktitle = {Proceedings of the 20th International Conference on World Wide Web,
               {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011},
  pages     = {307--316},
  year      = {2011},
  crossref  = {DBLP:conf/www/2011},
  url       = {http://doi.acm.org/10.1145/1963405.1963451},
  doi       = {10.1145/1963405.1963451},
  timestamp = {Mon, 12 Sep 2016 08:22:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/KarameFC11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tmc/CapkunCKT10,
  author    = {Srdjan Capkun and
               Mario Cagalj and
               Ghassan Karame and
               Nils Ole Tippenhauer},
  title     = {Integrity Regions: Authentication through Presence in Wireless Networks},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {9},
  number    = {11},
  pages     = {1608--1621},
  year      = {2010},
  url       = {https://doi.org/10.1109/TMC.2010.127},
  doi       = {10.1109/TMC.2010.127},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tmc/CapkunCKT10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KarameC10,
  author    = {Ghassan Karame and
               Srdjan Capkun},
  title     = {Low-Cost Client Puzzles Based on Modular Exponentiation},
  booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  pages     = {679--697},
  year      = {2010},
  crossref  = {DBLP:conf/esorics/2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3_41},
  doi       = {10.1007/978-3-642-15497-3_41},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/KarameC10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijahuc/DimakisGKKTSP09,
  author    = {Nikolaos Dimakis and
               Georgios Gkekas and
               Ghassan Karame and
               Theofilos Karachristos and
               Stamatis Tsolakidis and
               John Soldatos and
               Lazaros Polymenakos},
  title     = {Facilitating human-centric service delivery using a pluggable service
               development framework},
  journal   = {{IJAHUC}},
  volume    = {4},
  number    = {3/4},
  pages     = {223--236},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJAHUC.2009.024525},
  doi       = {10.1504/IJAHUC.2009.024525},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ijahuc/DimakisGKKTSP09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icics/KarameSC09,
  author    = {Ghassan Karame and
               Mario Strasser and
               Srdjan Capkun},
  title     = {Secure Remote Execution of Sequential Computations},
  booktitle = {Information and Communications Security, 11th International Conference,
               {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  pages     = {181--197},
  year      = {2009},
  crossref  = {DBLP:conf/icics/2009},
  url       = {https://doi.org/10.1007/978-3-642-11145-7_15},
  doi       = {10.1007/978-3-642-11145-7_15},
  timestamp = {Sun, 04 Jun 2017 10:06:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icics/KarameSC09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/nca/KarameCC09,
  author    = {Ghassan Karame and
               Mario Cagalj and
               Srdjan Capkun},
  title     = {Small Coalitions: Lightweight Collaboration for Efficient {P2P} Downloads},
  booktitle = {Proceedings of The Eighth {IEEE} International Symposium on Networking
               Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge,
               Massachusetts, {USA}},
  pages     = {278--283},
  year      = {2009},
  crossref  = {DBLP:conf/nca/2009},
  url       = {https://doi.org/10.1109/NCA.2009.25},
  doi       = {10.1109/NCA.2009.25},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nca/KarameCC09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KarameGC09,
  author    = {Ghassan Karame and
               David Gubler and
               Srdjan Capkun},
  title     = {On the Security of Bottleneck Bandwidth Estimation Techniques},
  booktitle = {Security and Privacy in Communication Networks - 5th International
               {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
               2009, Revised Selected Papers},
  pages     = {121--141},
  year      = {2009},
  crossref  = {DBLP:conf/securecomm/2009},
  url       = {https://doi.org/10.1007/978-3-642-05284-2_8},
  doi       = {10.1007/978-3-642-05284-2_8},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/securecomm/KarameGC09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/KarameC09,
  author    = {Ghassan Karame and
               Srdjan Capkun},
  title     = {Efficient Client Puzzles based on Repeated-Squaring},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {607},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/607},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/KarameC09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/DimitriouKC08,
  author    = {Tassos Dimitriou and
               Ghassan Karame and
               Ioannis T. Christou},
  title     = {SuperTrust - {A} Secure and Efficient Framework for Handling Trust
               in Super Peer Networks},
  booktitle = {Distributed Computing and Networking, 9th International Conference,
               {ICDCN} 2008, Kolkata, India, January 5-8, 2008.},
  pages     = {350--362},
  year      = {2008},
  crossref  = {DBLP:conf/icdcn/2008},
  url       = {https://doi.org/10.1007/978-3-540-77444-0_37},
  doi       = {10.1007/978-3-540-77444-0_37},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icdcn/DimitriouKC08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/avss/KarameSKPP07,
  author    = {Ghassan Karame and
               Andreas Stergiou and
               Nikos Katsarakis and
               Panagiotis Papageorgiou and
               Aristodemos Pnevmatikakis},
  title     = {2D and 3D face localization for complex scenes},
  booktitle = {Fourth {IEEE} International Conference on Advanced Video and Signal
               Based Surveillance, {AVSS} 2007, 5-7 September, 2007, Queen Mary,
               University of London, London, United Kingdom},
  pages     = {371--376},
  year      = {2007},
  crossref  = {DBLP:conf/avss/2007},
  url       = {https://doi.org/10.1109/AVSS.2007.4425339},
  doi       = {10.1109/AVSS.2007.4425339},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/avss/KarameSKPP07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/clear/StergiouKPP07,
  author    = {Andreas Stergiou and
               Ghassan Karame and
               Aristodemos Pnevmatikakis and
               Lazaros Polymenakos},
  title     = {The {AIT} 2D Face Detection and Tracking System for {CLEAR} 2007},
  booktitle = {Multimodal Technologies for Perception of Humans, International Evaluation
               Workshops {CLEAR} 2007 and {RT} 2007, Baltimore, MD, USA, May 8-11,
               2007, Revised Selected Papers},
  pages     = {113--125},
  year      = {2007},
  crossref  = {DBLP:conf/clear/2007},
  url       = {https://doi.org/10.1007/978-3-540-68585-2_9},
  doi       = {10.1007/978-3-540-68585-2_9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/clear/StergiouKPP07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/podc/DimitriouKC07,
  author    = {Tassos Dimitriou and
               Ghassan Karame and
               Ioannis T. Christou},
  title     = {SuperTrust: a secure and efficient framework for handling trust in
               super-peer networks},
  booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August
               12-15, 2007},
  pages     = {374--375},
  year      = {2007},
  crossref  = {DBLP:conf/podc/2007},
  url       = {http://doi.acm.org/10.1145/1281100.1281180},
  doi       = {10.1145/1281100.1281180},
  timestamp = {Wed, 23 May 2012 14:26:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/DimitriouKC07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017scc,
  editor    = {Cong Wang and
               Murat Kantarcioglu},
  title     = {Proceedings of the Fifth {ACM} International Workshop on Security
               in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
               April 2, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3055259},
  doi       = {10.1145/3055259},
  isbn      = {978-1-4503-4970-3},
  timestamp = {Mon, 24 Apr 2017 19:28:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2017scc},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asia,
  editor    = {Ramesh Karri and
               Ozgur Sinanoglu and
               Ahmad{-}Reza Sadeghi and
               Xun Yi},
  title     = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3052973},
  doi       = {10.1145/3052973},
  isbn      = {978-1-4503-4944-4},
  timestamp = {Thu, 20 Apr 2017 14:32:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2017asia},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016ccsw,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Elli Androulaki and
               Michael K. Reiter},
  title     = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
               {CCSW} 2016, Vienna, Austria, October 28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2996429},
  doi       = {10.1145/2996429},
  isbn      = {978-1-4503-4572-9},
  timestamp = {Wed, 23 Nov 2016 15:44:39 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2016ccsw},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2016,
  editor    = {Marinho P. Barcellos and
               Jon Crowcroft and
               Amin Vahdat and
               Sachin Katti},
  title     = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis,
               Brazil, August 22-26, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2934872},
  doi       = {10.1145/2934872},
  isbn      = {978-1-4503-4193-6},
  timestamp = {Tue, 15 Aug 2017 16:26:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigcomm/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor    = {Thorsten Holz and
               Stefan Savage},
  title     = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Sat, 03 Oct 2015 19:54:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/edemocracy/2015,
  editor    = {Sokratis K. Katsikas and
               Alexander B. Sideridis},
  title     = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
               - 6th International Conference, E-Democracy 2015, Athens, Greece,
               December 10-11, 2015, Proceedings},
  series    = {Communications in Computer and Information Science},
  volume    = {570},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27164-4},
  doi       = {10.1007/978-3-319-27164-4},
  isbn      = {978-3-319-27163-7},
  timestamp = {Thu, 25 May 2017 00:42:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/edemocracy/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icnp/2015,
  title     = {23rd {IEEE} International Conference on Network Protocols, {ICNP}
               2015, San Francisco, CA, USA, November 10-13, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7435833},
  isbn      = {978-1-4673-8295-3},
  timestamp = {Fri, 01 Apr 2016 11:27:56 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icnp/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/netsoft/2015,
  title     = {Proceedings of the 1st {IEEE} Conference on Network Softwarization,
               NetSoft 2015, London, United Kingdom, April 13-17, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7111753},
  isbn      = {978-1-4799-7899-1},
  timestamp = {Wed, 10 Jun 2015 17:04:05 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/netsoft/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2015,
  editor    = {Edgar R. Weippl and
               Florian Kerschbaum and
               Adam J. Lee},
  title     = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
               Technologies, Vienna, Austria, June 1-3, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://doi.acm.org/10.1145/2752952},
  doi       = {10.1145/2752952},
  isbn      = {978-1-4503-3556-0},
  timestamp = {Fri, 03 Feb 2017 13:23:25 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacmat/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/trust/2015,
  editor    = {Mauro Conti and
               Matthias Schunter and
               Ioannis G. Askoxylakis},
  title     = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
               2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9229},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-22846-4},
  doi       = {10.1007/978-3-319-22846-4},
  isbn      = {978-3-319-22845-7},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/trust/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acsac/2014,
  editor    = {Charles N. Payne Jr. and
               Adam Hahn and
               Kevin R. B. Butler and
               Micah Sherr},
  title     = {Proceedings of the 30th Annual Computer Security Applications Conference,
               {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2664243},
  isbn      = {978-1-4503-3005-3},
  timestamp = {Sat, 06 Dec 2014 14:20:32 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014segs,
  editor    = {Klaus Kursawe and
               Benessa Defend},
  title     = {Proceedings of the 2nd Workshop on Smart Energy Grid Security, SEGS@CCS
               2014, Scottsdale, AZ, USA, November 7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2667190},
  isbn      = {978-1-4503-3154-8},
  timestamp = {Wed, 25 May 2016 10:19:57 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2014segs},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014,
  editor    = {Gail{-}Joon Ahn and
               Moti Yung and
               Ninghui Li},
  title     = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2660267},
  isbn      = {978-1-4503-2957-6},
  timestamp = {Mon, 10 Nov 2014 10:57:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2014hotsdn,
  editor    = {Aditya Akella and
               Albert G. Greenberg},
  title     = {Proceedings of the third workshop on Hot topics in software defined
               networking, HotSDN '14, Chicago, Illinois, USA, August 22, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://doi.acm.org/10.1145/2620728},
  doi       = {10.1145/2620728},
  isbn      = {978-1-4503-2989-7},
  timestamp = {Thu, 23 Apr 2015 15:29:29 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigcomm/2014hotsdn},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/trust/2014,
  editor    = {Thorsten Holz and
               Sotiris Ioannidis},
  title     = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
               2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8564},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08593-7},
  doi       = {10.1007/978-3-319-08593-7},
  isbn      = {978-3-319-08592-0},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/trust/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2013,
  editor    = {Ahmad{-}Reza Sadeghi},
  title     = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7859},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39884-1},
  doi       = {10.1007/978-3-642-39884-1},
  isbn      = {978-3-642-39883-4},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sac/2013,
  editor    = {Sung Y. Shin and
               Jos{\'{e}} Carlos Maldonado},
  title     = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
               {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2480362},
  isbn      = {978-1-4503-1656-9},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sac/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/trust/2013,
  editor    = {Michael Huth and
               N. Asokan and
               Srdjan Capkun and
               Ivan Flechais and
               Lizzie Coles{-}Kemp},
  title     = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
               2013, London, UK, June 17-19, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7904},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38908-5},
  doi       = {10.1007/978-3-642-38908-5},
  isbn      = {978-3-642-38907-8},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/trust/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acsac/2011,
  editor    = {Robert H'obbes' Zakon and
               John P. McDermott and
               Michael E. Locasto},
  title     = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
               2011, Orlando, FL, USA, 5-9 December 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://doi.acm.org/10.1145/2076732},
  doi       = {10.1145/2076732},
  isbn      = {978-1-4503-0672-0},
  timestamp = {Mon, 04 Aug 2014 17:08:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011ccsw,
  editor    = {Christian Cachin and
               Thomas Ristenpart},
  title     = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW}
               2011, Chicago, IL, USA, October 21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2046660},
  isbn      = {978-1-4503-1004-8},
  timestamp = {Wed, 25 Jan 2012 19:15:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2011ccsw},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/www/2011,
  editor    = {Sadagopan Srinivasan and
               Krithi Ramamritham and
               Arun Kumar and
               M. P. Ravindra and
               Elisa Bertino and
               Ravi Kumar},
  title     = {Proceedings of the 20th International Conference on World Wide Web,
               {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0632-4},
  timestamp = {Mon, 12 Sep 2016 08:22:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
  editor    = {Dimitris Gritzalis and
               Bart Preneel and
               Marianthi Theoharidou},
  title     = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6345},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3},
  doi       = {10.1007/978-3-642-15497-3},
  isbn      = {978-3-642-15496-6},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icics/2009,
  editor    = {Sihan Qing and
               Chris J. Mitchell and
               Guilin Wang},
  title     = {Information and Communications Security, 11th International Conference,
               {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5927},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-11145-7},
  doi       = {10.1007/978-3-642-11145-7},
  isbn      = {978-3-642-11144-0},
  timestamp = {Sun, 04 Jun 2017 10:06:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icics/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/nca/2009,
  title     = {Proceedings of The Eighth {IEEE} International Symposium on Networking
               Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge,
               Massachusetts, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5190341},
  isbn      = {978-0-7695-3698-9},
  timestamp = {Thu, 09 Oct 2014 16:51:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nca/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2009,
  editor    = {Yan Chen and
               Tassos Dimitriou and
               Jianying Zhou},
  title     = {Security and Privacy in Communication Networks - 5th International
               {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
               2009, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {19},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-05284-2},
  doi       = {10.1007/978-3-642-05284-2},
  isbn      = {978-3-642-05283-5},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/securecomm/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icdcn/2008,
  editor    = {Shrisha Rao and
               Mainak Chatterjee and
               Prasad Jayanti and
               C. Siva Ram Murthy and
               Sanjoy Kumar Saha},
  title     = {Distributed Computing and Networking, 9th International Conference,
               {ICDCN} 2008, Kolkata, India, January 5-8, 2008},
  series    = {Lecture Notes in Computer Science},
  volume    = {4904},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-77444-0},
  doi       = {10.1007/978-3-540-77444-0},
  isbn      = {978-3-540-77443-3},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icdcn/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/avss/2007,
  title     = {Fourth {IEEE} International Conference on Advanced Video and Signal
               Based Surveillance, {AVSS} 2007, 5-7 September, 2007, Queen Mary,
               University of London, London, United Kingdom},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4425265},
  isbn      = {978-1-4244-1695-0},
  timestamp = {Wed, 13 Jan 2016 10:10:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/avss/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/clear/2007,
  editor    = {Rainer Stiefelhagen and
               Rachel Bowers and
               Jonathan G. Fiscus},
  title     = {Multimodal Technologies for Perception of Humans, International Evaluation
               Workshops {CLEAR} 2007 and {RT} 2007, Baltimore, MD, USA, May 8-11,
               2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4625},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68585-2},
  doi       = {10.1007/978-3-540-68585-2},
  isbn      = {978-3-540-68584-5},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/clear/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/podc/2007,
  editor    = {Indranil Gupta and
               Roger Wattenhofer},
  title     = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August
               12-15, 2007},
  publisher = {{ACM}},
  year      = {2007},
  url       = {http://dl.acm.org/citation.cfm?id=1281100},
  isbn      = {978-1-59593-616-5},
  timestamp = {Wed, 23 May 2012 14:26:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier