BibTeX records: Myrto Arapinis

download as .bib file

@article{DBLP:journals/iacr/ArapinisGKK19,
  author    = {Myrto Arapinis and
               Andriana Gkaniatsou and
               Dimitris Karakostas and
               Aggelos Kiayias},
  title     = {A Formal Treatment of Hardware Wallets},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {34},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/034},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ArapinisGKK19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SinghTMA18,
  author    = {Rajkarn Singh and
               George Theodorakopoulos and
               Mahesh K. Marina and
               Myrto Arapinis},
  title     = {On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory
               Data Sharing},
  booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  pages     = {1--9},
  year      = {2018},
  crossref  = {DBLP:conf/cns/2018},
  url       = {https://doi.org/10.1109/CNS.2018.8433178},
  doi       = {10.1109/CNS.2018.8433178},
  timestamp = {Thu, 16 Aug 2018 12:45:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/SinghTMA18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-05083,
  author    = {Myrto Arapinis and
               Elham Kashefi and
               Nikolaos Lamprou and
               Anna Pappa},
  title     = {A Comprehensive Analysis of Quantum E-voting Protocols},
  journal   = {CoRR},
  volume    = {abs/1810.05083},
  year      = {2018},
  url       = {http://arxiv.org/abs/1810.05083},
  archivePrefix = {arXiv},
  eprint    = {1810.05083},
  timestamp = {Thu, 01 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1810-05083},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArapinisMRR17,
  author    = {Myrto Arapinis and
               Loretta Ilaria Mancini and
               Eike Ritter and
               Mark Dermot Ryan},
  title     = {Analysis of privacy in mobile telephony systems},
  journal   = {Int. J. Inf. Sec.},
  volume    = {16},
  number    = {5},
  pages     = {491--523},
  year      = {2017},
  url       = {https://doi.org/10.1007/s10207-016-0338-9},
  doi       = {10.1007/s10207-016-0338-9},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/ArapinisMRR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/ArapinisLRR17,
  author    = {Myrto Arapinis and
               Jia Liu and
               Eike Ritter and
               Mark Ryan},
  title     = {Stateful applied pi calculus: Observational equivalence and labelled
               bisimilarity},
  journal   = {J. Log. Algebr. Meth. Program.},
  volume    = {89},
  pages     = {95--149},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.jlamp.2017.03.001},
  doi       = {10.1016/j.jlamp.2017.03.001},
  timestamp = {Thu, 18 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jlp/ArapinisLRR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GkaniatsouAK17,
  author    = {Andriana Gkaniatsou and
               Myrto Arapinis and
               Aggelos Kiayias},
  title     = {Low-Level Attacks in Bitcoin Wallets},
  booktitle = {Information Security - 20th International Conference, {ISC} 2017,
               Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  pages     = {233--253},
  year      = {2017},
  crossref  = {DBLP:conf/isw/2017},
  url       = {https://doi.org/10.1007/978-3-319-69659-1\_13},
  doi       = {10.1007/978-3-319-69659-1\_13},
  timestamp = {Mon, 13 Nov 2017 18:16:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/GkaniatsouAK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArapinisCK16,
  author    = {Myrto Arapinis and
               V{\'{e}}ronique Cortier and
               Steve Kremer},
  title     = {When Are Three Voters Enough for Privacy Properties?},
  booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {II}},
  pages     = {241--260},
  year      = {2016},
  crossref  = {DBLP:conf/esorics/2016-2},
  url       = {https://doi.org/10.1007/978-3-319-45741-3\_13},
  doi       = {10.1007/978-3-319-45741-3\_13},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/ArapinisCK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ArapinisFG16,
  author    = {Myrto Arapinis and
               Diego Figueira and
               Marco Gaboardi},
  title     = {Sensitivity of Counting Queries},
  booktitle = {43rd International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  pages     = {120:1--120:13},
  year      = {2016},
  crossref  = {DBLP:conf/icalp/2016},
  url       = {https://doi.org/10.4230/LIPIcs.ICALP.2016.120},
  doi       = {10.4230/LIPIcs.ICALP.2016.120},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/ArapinisFG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArapinisCK16,
  author    = {Myrto Arapinis and
               V{\'{e}}ronique Cortier and
               Steve Kremer},
  title     = {When Are Three Voters Enough for Privacy Properties?},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {690},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/690},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ArapinisCK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisCD15,
  author    = {Myrto Arapinis and
               Vincent Cheval and
               St{\'{e}}phanie Delaune},
  title     = {Composing Security Protocols: From Confidentiality to Privacy},
  booktitle = {Principles of Security and Trust - 4th International Conference, {POST}
               2015, Held as Part of the European Joint Conferences on Theory and
               Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
               Proceedings},
  pages     = {324--343},
  year      = {2015},
  crossref  = {DBLP:conf/post/2015},
  url       = {https://doi.org/10.1007/978-3-662-46666-7\_17},
  doi       = {10.1007/978-3-662-46666-7\_17},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/ArapinisCD15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ArapinisDK14,
  author    = {Myrto Arapinis and
               St{\'{e}}phanie Delaune and
               Steve Kremer},
  title     = {Dynamic Tags for Security Protocols},
  journal   = {Logical Methods in Computer Science},
  volume    = {10},
  number    = {2},
  year      = {2014},
  url       = {https://doi.org/10.2168/LMCS-10(2:11)2014},
  doi       = {10.2168/LMCS-10(2:11)2014},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ArapinisDK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ArapinisD14,
  author    = {Myrto Arapinis and
               Marie Duflot},
  title     = {Bounding messages for free in security protocols - extension to various
               security properties},
  journal   = {Inf. Comput.},
  volume    = {239},
  pages     = {182--215},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ic.2014.09.003},
  doi       = {10.1016/j.ic.2014.09.003},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iandc/ArapinisD14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArapinisPRR14,
  author    = {Myrto Arapinis and
               Joshua Phillips and
               Eike Ritter and
               Mark Dermot Ryan},
  title     = {StatVerif: Verification of stateful processes},
  journal   = {Journal of Computer Security},
  volume    = {22},
  number    = {5},
  pages     = {743--821},
  year      = {2014},
  url       = {https://doi.org/10.3233/JCS-140501},
  doi       = {10.3233/JCS-140501},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/ArapinisPRR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ArapinisMRR14,
  author    = {Myrto Arapinis and
               Loretta Ilaria Mancini and
               Eike Ritter and
               Mark Ryan},
  title     = {Privacy through Pseudonymity in Mobile Telephony Systems},
  booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS}
               2014, San Diego, California, USA, February 23-26, 2014},
  year      = {2014},
  crossref  = {DBLP:conf/ndss/2014},
  url       = {https://www.ndss-symposium.org/ndss2014/privacy-through-pseudonymity-mobile-telephony-systems},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/ArapinisMRR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisLRR14,
  author    = {Myrto Arapinis and
               Jia Liu and
               Eike Ritter and
               Mark Ryan},
  title     = {Stateful Applied Pi Calculus},
  booktitle = {Principles of Security and Trust - Third International Conference,
               {POST} 2014, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
               2014, Proceedings},
  pages     = {22--41},
  year      = {2014},
  crossref  = {DBLP:conf/post/2014},
  url       = {https://doi.org/10.1007/978-3-642-54792-8\_2},
  doi       = {10.1007/978-3-642-54792-8\_2},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/ArapinisLRR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ArapinisCD14,
  author    = {Myrto Arapinis and
               Vincent Cheval and
               St{\'{e}}phanie Delaune},
  title     = {Composing security protocols: from confidentiality to privacy},
  journal   = {CoRR},
  volume    = {abs/1407.5444},
  year      = {2014},
  url       = {http://arxiv.org/abs/1407.5444},
  archivePrefix = {arXiv},
  eprint    = {1407.5444},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ArapinisCD14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArapinisBR13,
  author    = {Myrto Arapinis and
               Sergiu Bursuc and
               Mark Ryan},
  title     = {Privacy-supporting cloud computing by in-browser key translation},
  journal   = {Journal of Computer Security},
  volume    = {21},
  number    = {6},
  pages     = {847--880},
  year      = {2013},
  url       = {https://doi.org/10.3233/JCS-130489},
  doi       = {10.3233/JCS-130489},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/ArapinisBR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisCKR13,
  author    = {Myrto Arapinis and
               V{\'{e}}ronique Cortier and
               Steve Kremer and
               Mark Ryan},
  title     = {Practical Everlasting Privacy},
  booktitle = {Principles of Security and Trust - Second International Conference,
               {POST} 2013, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
               2013. Proceedings},
  pages     = {21--40},
  year      = {2013},
  crossref  = {DBLP:conf/post/2013},
  url       = {https://doi.org/10.1007/978-3-642-36830-1\_2},
  doi       = {10.1007/978-3-642-36830-1\_2},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/ArapinisCKR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArapinisMRRGRB12,
  author    = {Myrto Arapinis and
               Loretta Ilaria Mancini and
               Eike Ritter and
               Mark Ryan and
               Nico Golde and
               Kevin Redon and
               Ravishankar Borgaonkar},
  title     = {New privacy issues in mobile telephony: fix and verification},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {205--216},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382221},
  doi       = {10.1145/2382196.2382221},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ArapinisMRRGRB12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisCD12,
  author    = {Myrto Arapinis and
               Vincent Cheval and
               St{\'{e}}phanie Delaune},
  title     = {Verifying Privacy-Type Properties in a Modular Way},
  booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
               MA, USA, June 25-27, 2012},
  pages     = {95--109},
  year      = {2012},
  crossref  = {DBLP:conf/csfw/2012},
  url       = {https://doi.org/10.1109/CSF.2012.16},
  doi       = {10.1109/CSF.2012.16},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/ArapinisCD12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisBR12,
  author    = {Myrto Arapinis and
               Sergiu Bursuc and
               Mark Ryan},
  title     = {Privacy Supporting Cloud Computing: ConfiChair, a Case Study},
  booktitle = {Principles of Security and Trust - First International Conference,
               {POST} 2012, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
               - April 1, 2012, Proceedings},
  pages     = {89--108},
  year      = {2012},
  crossref  = {DBLP:conf/post/2012},
  url       = {https://doi.org/10.1007/978-3-642-28641-4\_6},
  doi       = {10.1007/978-3-642-28641-4\_6},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/ArapinisBR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisBR12a,
  author    = {Myrto Arapinis and
               Sergiu Bursuc and
               Mark Dermot Ryan},
  title     = {Reduction of Equational Theories for Verification of Trace Equivalence:
               Re-encryption, Associativity and Commutativity},
  booktitle = {Principles of Security and Trust - First International Conference,
               {POST} 2012, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
               - April 1, 2012, Proceedings},
  pages     = {169--188},
  year      = {2012},
  crossref  = {DBLP:conf/post/2012},
  url       = {https://doi.org/10.1007/978-3-642-28641-4\_10},
  doi       = {10.1007/978-3-642-28641-4\_10},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/ArapinisBR12a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisRR11,
  author    = {Myrto Arapinis and
               Eike Ritter and
               Mark Dermot Ryan},
  title     = {StatVerif: Verification of Stateful Processes},
  booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
               {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages     = {33--47},
  year      = {2011},
  crossref  = {DBLP:conf/csfw/2011},
  url       = {https://doi.org/10.1109/CSF.2011.10},
  doi       = {10.1109/CSF.2011.10},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/ArapinisRR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-2066,
  author    = {Myrto Arapinis and
               Loretta Ilaria Mancini and
               Eike Ritter and
               Mark Ryan},
  title     = {Formal Analysis of {UMTS} Privacy},
  journal   = {CoRR},
  volume    = {abs/1109.2066},
  year      = {2011},
  url       = {http://arxiv.org/abs/1109.2066},
  archivePrefix = {arXiv},
  eprint    = {1109.2066},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1109-2066},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisCRR10,
  author    = {Myrto Arapinis and
               Tom Chothia and
               Eike Ritter and
               Mark Ryan},
  title     = {Analysing Unlinkability and Anonymity Using the Applied Pi Calculus},
  booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
               {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages     = {107--121},
  year      = {2010},
  crossref  = {DBLP:conf/csfw/2010},
  url       = {https://doi.org/10.1109/CSF.2010.15},
  doi       = {10.1109/CSF.2010.15},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/ArapinisCRR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/ArapinisCDFGKMRRSUY09,
  author    = {Myrto Arapinis and
               Muffy Calder and
               Louise A. Dennis and
               Michael Fisher and
               Philip D. Gray and
               Savas Konur and
               Alice Miller and
               Eike Ritter and
               Mark Ryan and
               Sven Schewe and
               Chris Unsworth and
               Rehana Yasmin},
  title     = {Towards the Verification of Pervasive Systems},
  journal   = {{ECEASST}},
  volume    = {22},
  year      = {2009},
  url       = {https://doi.org/10.14279/tuj.eceasst.22.315},
  doi       = {10.14279/tuj.eceasst.22.315},
  timestamp = {Wed, 12 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/eceasst/ArapinisCDFGKMRRSUY09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArapinisCRR09,
  author    = {Myrto Arapinis and
               Tom Chothia and
               Eike Ritter and
               Mark Ryan},
  title     = {Untraceability in the applied pi-calculus},
  booktitle = {Proceedings of the 4th International Conference for Internet Technology
               and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
               2009},
  pages     = {1--6},
  year      = {2009},
  crossref  = {DBLP:conf/icitst/2009},
  url       = {http://ieeexplore.ieee.org/document/5402514/},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icitst/ArapinisCRR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/ArapinisDK08,
  author    = {Myrto Arapinis and
               St{\'{e}}phanie Delaune and
               Steve Kremer},
  title     = {From One Session to Many: Dynamic Tags for Security Protocols},
  booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th
               International Conference, {LPAR} 2008, Doha, Qatar, November 22-27,
               2008. Proceedings},
  pages     = {128--142},
  year      = {2008},
  crossref  = {DBLP:conf/lpar/2008},
  url       = {https://doi.org/10.1007/978-3-540-89439-1\_9},
  doi       = {10.1007/978-3-540-89439-1\_9},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lpar/ArapinisDK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/ArapinisD07,
  author    = {Myrto Arapinis and
               Marie Duflot},
  title     = {Bounding Messages for Free in Security Protocols},
  booktitle = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
               Computer Science, 27th International Conference, New Delhi, India,
               December 12-14, 2007, Proceedings},
  pages     = {376--387},
  year      = {2007},
  crossref  = {DBLP:conf/fsttcs/2007},
  url       = {https://doi.org/10.1007/978-3-540-77050-3\_31},
  doi       = {10.1007/978-3-540-77050-3\_31},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fsttcs/ArapinisD07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/ArapinisLGD03,
  author    = {Myrto Arapinis and
               Fr{\'{e}}d{\'{e}}ric Loulergue and
               Fr{\'{e}}d{\'{e}}ric Gava and
               Fr{\'{e}}d{\'{e}}ric Dabrowski},
  title     = {Semantics of Minimally Synchronous Parallel {ML}},
  booktitle = {Proceedings of the {ACIS} Fourth International Conference on Software
               Engineering, Artificial Intelligence, Networking and Parallel/Distributed
               Computing (SNPD'03), October 16-18, 2003, L{\"{u}}beck, Germany},
  pages     = {260--267},
  year      = {2003},
  crossref  = {DBLP:conf/snpd/2003},
  timestamp = {Wed, 26 Nov 2003 12:28:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/snpd/ArapinisLGD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2018,
  title     = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8410986},
  isbn      = {978-1-5386-4586-4},
  timestamp = {Thu, 16 Aug 2018 12:45:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2017,
  editor    = {Phong Q. Nguyen and
               Jianying Zhou},
  title     = {Information Security - 20th International Conference, {ISC} 2017,
               Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10599},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-69659-1},
  doi       = {10.1007/978-3-319-69659-1},
  isbn      = {978-3-319-69658-4},
  timestamp = {Mon, 13 Nov 2017 18:16:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-2,
  editor    = {Ioannis G. Askoxylakis and
               Sotiris Ioannidis and
               Sokratis K. Katsikas and
               Catherine A. Meadows},
  title     = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9879},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45741-3},
  doi       = {10.1007/978-3-319-45741-3},
  isbn      = {978-3-319-45740-6},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2016,
  editor    = {Ioannis Chatzigiannakis and
               Michael Mitzenmacher and
               Yuval Rabani and
               Davide Sangiorgi},
  title     = {43rd International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  series    = {LIPIcs},
  volume    = {55},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2016},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-013-2},
  isbn      = {978-3-95977-013-2},
  timestamp = {Tue, 30 Aug 2016 15:33:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2015,
  editor    = {Riccardo Focardi and
               Andrew C. Myers},
  title     = {Principles of Security and Trust - 4th International Conference, {POST}
               2015, Held as Part of the European Joint Conferences on Theory and
               Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9036},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46666-7},
  doi       = {10.1007/978-3-662-46666-7},
  isbn      = {978-3-662-46665-0},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2014,
  title     = {21st Annual Network and Distributed System Security Symposium, {NDSS}
               2014, San Diego, California, USA, February 23-26, 2014},
  publisher = {The Internet Society},
  year      = {2014},
  url       = {https://www.ndss-symposium.org/ndss2014/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2014,
  editor    = {Mart{\'{\i}}n Abadi and
               Steve Kremer},
  title     = {Principles of Security and Trust - Third International Conference,
               {POST} 2014, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
               2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8414},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54792-8},
  doi       = {10.1007/978-3-642-54792-8},
  isbn      = {978-3-642-54791-1},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2013,
  editor    = {David A. Basin and
               John C. Mitchell},
  title     = {Principles of Security and Trust - Second International Conference,
               {POST} 2013, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
               2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7796},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-36830-1},
  doi       = {10.1007/978-3-642-36830-1},
  isbn      = {978-3-642-36829-5},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2012,
  editor    = {Stephen Chong},
  title     = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
               MA, USA, June 25-27, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6265867},
  isbn      = {978-1-4673-1918-8},
  timestamp = {Fri, 13 May 2016 11:46:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2012,
  editor    = {Pierpaolo Degano and
               Joshua D. Guttman},
  title     = {Principles of Security and Trust - First International Conference,
               {POST} 2012, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
               - April 1, 2012, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7215},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28641-4},
  doi       = {10.1007/978-3-642-28641-4},
  isbn      = {978-3-642-28640-7},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2011,
  title     = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
               {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5991608},
  isbn      = {978-1-61284-644-6},
  timestamp = {Fri, 13 May 2016 11:47:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2010,
  title     = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
               {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5552633},
  isbn      = {978-0-7695-4082-5},
  timestamp = {Fri, 13 May 2016 11:47:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2009,
  title     = {Proceedings of the 4th International Conference for Internet Technology
               and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
               2009},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5393958},
  isbn      = {978-1-4244-5648-2},
  timestamp = {Wed, 25 Nov 2015 16:11:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icitst/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lpar/2008,
  editor    = {Iliano Cervesato and
               Helmut Veith and
               Andrei Voronkov},
  title     = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th
               International Conference, {LPAR} 2008, Doha, Qatar, November 22-27,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5330},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89439-1},
  doi       = {10.1007/978-3-540-89439-1},
  isbn      = {978-3-540-89438-4},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lpar/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2007,
  editor    = {Vikraman Arvind and
               Sanjiva Prasad},
  title     = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
               Computer Science, 27th International Conference, New Delhi, India,
               December 12-14, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4855},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77050-3},
  doi       = {10.1007/978-3-540-77050-3},
  isbn      = {978-3-540-77049-7},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fsttcs/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/snpd/2003,
  editor    = {Walter Dosch and
               Roger Y. Lee},
  title     = {Proceedings of the {ACIS} Fourth International Conference on Software
               Engineering, Artificial Intelligence, Networking and Parallel/Distributed
               Computing (SNPD'03), October 16-18, 2003, L{\"{u}}beck, Germany},
  publisher = {{ACIS}},
  year      = {2003},
  isbn      = {0-9700776-7-X},
  timestamp = {Wed, 26 Nov 2003 12:28:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/snpd/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier