BibTeX record: conf/icics/BoudotT99

download as .bib file

@inproceedings{DBLP:conf/icics/BoudotT99,
  author    = {Fabrice Boudot and
               Jacques Traor{\'{e}}},
  title     = {Efficient Publicly Verifiable Secret Sharing Schemes with Fast or
               Delayed Recovery},
  booktitle = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  pages     = {87--102},
  year      = {1999},
  crossref  = {DBLP:conf/icics/1999},
  url       = {http://dx.doi.org/10.1007/978-3-540-47942-0_8},
  doi       = {10.1007/978-3-540-47942-0_8},
  timestamp = {Mon, 20 Jun 2011 17:29:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icics/BoudotT99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icics/1999,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1726},
  publisher = {Springer},
  year      = {1999},
  isbn      = {3-540-66682-6},
  timestamp = {Thu, 03 Jan 2002 12:01:14 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icics/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}