BibTeX record: conf/icics/BoudotT99

download as .bib file

@inproceedings{DBLP:conf/icics/BoudotT99,
  author    = {Fabrice Boudot and
               Jacques Traor{\'{e}}},
  title     = {Efficient Publicly Verifiable Secret Sharing Schemes with Fast or
               Delayed Recovery},
  booktitle = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  year      = {1999},
  pages     = {87--102},
  crossref  = {DBLP:conf/icics/1999},
  url       = {http://dx.doi.org/10.1007/978-3-540-47942-0_8},
  doi       = {10.1007/978-3-540-47942-0_8},
  timestamp = {Sat, 25 Oct 2014 23:37:17 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icics/BoudotT99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icics/1999,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  year      = {1999},
  volume    = {1726},
  publisher = {Springer},
  isbn      = {3-540-66682-6},
  timestamp = {Sat, 25 Oct 2014 23:37:17 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icics/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}