BibTeX records: David Derler

download as .bib file

@article{DBLP:journals/dcc/DerlerS18,
  author    = {David Derler and
               Daniel Slamanig},
  title     = {Practical witness encryption for algebraic languages or how to encrypt
               under Groth-Sahai proofs},
  journal   = {Des. Codes Cryptography},
  volume    = {86},
  number    = {11},
  pages     = {2525--2547},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10623-018-0460-y},
  doi       = {10.1007/s10623-018-0460-y},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/DerlerS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DerlerS18,
  author    = {David Derler and
               Daniel Slamanig},
  title     = {Highly-Efficient Fully-Anonymous Dynamic Group Signatures},
  booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications
               Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages     = {551--565},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018asia},
  url       = {https://doi.org/10.1145/3196494.3196507},
  doi       = {10.1145/3196494.3196507},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/DerlerS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DerlerJSS18,
  author    = {David Derler and
               Tibor Jager and
               Daniel Slamanig and
               Christoph Striecks},
  title     = {Bloom Filter Encryption and Applications to Efficient Forward-Secret
               0-RTT Key Exchange},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  pages     = {425--455},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-3},
  url       = {https://doi.org/10.1007/978-3-319-78372-7\_14},
  doi       = {10.1007/978-3-319-78372-7\_14},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DerlerJSS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/DerlerRS18,
  author    = {David Derler and
               Sebastian Ramacher and
               Daniel Slamanig},
  title     = {Short Double- and N-Times-Authentication-Preventing Signatures from
               {ECDSA} and More},
  booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  pages     = {273--287},
  year      = {2018},
  crossref  = {DBLP:conf/eurosp/2018},
  url       = {https://doi.org/10.1109/EuroSP.2018.00027},
  doi       = {10.1109/EuroSP.2018.00027},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/DerlerRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DerlerKLRSS18,
  author    = {David Derler and
               Stephan Krenn and
               Thomas Lor{\"{u}}nser and
               Sebastian Ramacher and
               Daniel Slamanig and
               Christoph Striecks},
  title     = {Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security,
               and Applications},
  booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
               Brazil, March 25-29, 2018, Proceedings, Part {I}},
  pages     = {219--250},
  year      = {2018},
  crossref  = {DBLP:conf/pkc/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-76578-5\_8},
  doi       = {10.1007/978-3-319-76578-5\_8},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/DerlerKLRSS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/DerlerRS18,
  author    = {David Derler and
               Sebastian Ramacher and
               Daniel Slamanig},
  title     = {Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications
               to Ring Signatures from Symmetric-Key Primitives},
  booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  pages     = {419--440},
  year      = {2018},
  crossref  = {DBLP:conf/pqcrypto/2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3\_20},
  doi       = {10.1007/978-3-319-79063-3\_20},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/DerlerRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DerlerRS18,
  author    = {David Derler and
               Sebastian Ramacher and
               Daniel Slamanig},
  title     = {Generic Double-Authentication Preventing Signatures and a Post-quantum
               Instantiation},
  booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
               South Korea, October 25-28, 2018, Proceedings},
  pages     = {258--276},
  year      = {2018},
  crossref  = {DBLP:conf/provsec/2018},
  url       = {https://doi.org/10.1007/978-3-030-01446-9\_15},
  doi       = {10.1007/978-3-030-01446-9\_15},
  timestamp = {Thu, 11 Oct 2018 15:07:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/DerlerRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerJSS18,
  author    = {David Derler and
               Tibor Jager and
               Daniel Slamanig and
               Christoph Striecks},
  title     = {Bloom Filter Encryption and Applications to Efficient Forward-Secret
               0-RTT Key Exchange},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {199},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/199},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerJSS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerKLRSS18,
  author    = {David Derler and
               Stephan Krenn and
               Thomas Lor{\"{u}}nser and
               Sebastian Ramacher and
               Daniel Slamanig and
               Christoph Striecks},
  title     = {Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security,
               and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {321},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/321},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerKLRSS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerRS18,
  author    = {David Derler and
               Sebastian Ramacher and
               Daniel Slamanig},
  title     = {Generic Double-Authentication Preventing Signatures and a Post-Quantum
               Instantiation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {790},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/790},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BeckCDKPSS17,
  author    = {Michael Till Beck and
               Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Practical Strongly Invisible and Strongly Accountable Sanitizable
               Signatures},
  booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
               2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  pages     = {437--452},
  year      = {2017},
  crossref  = {DBLP:conf/acisp/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-60055-0\_23},
  doi       = {10.1007/978-3-319-60055-0\_23},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BeckCDKPSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChaseDGORRSZ17,
  author    = {Melissa Chase and
               David Derler and
               Steven Goldfeder and
               Claudio Orlandi and
               Sebastian Ramacher and
               Christian Rechberger and
               Daniel Slamanig and
               Greg Zaverucha},
  title     = {Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {1825--1842},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {https://doi.org/10.1145/3133956.3133997},
  doi       = {10.1145/3133956.3133997},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChaseDGORRSZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DerlerRS17,
  author    = {David Derler and
               Sebastian Ramacher and
               Daniel Slamanig},
  title     = {Homomorphic Proxy Re-Authenticators and Applications to Verifiable
               Multi-User Data Aggregation},
  booktitle = {Financial Cryptography and Data Security - 21st International Conference,
               {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  pages     = {124--142},
  year      = {2017},
  crossref  = {DBLP:conf/fc/2017},
  url       = {https://doi.org/10.1007/978-3-319-70972-7\_7},
  doi       = {10.1007/978-3-319-70972-7\_7},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/DerlerRS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDKPSS17,
  author    = {Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible
               Sanitizable Signatures},
  booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  pages     = {152--182},
  year      = {2017},
  crossref  = {DBLP:conf/pkc/2017-2},
  url       = {https://doi.org/10.1007/978-3-662-54388-7\_6},
  doi       = {10.1007/978-3-662-54388-7\_6},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CamenischDKPSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDKPSS17,
  author    = {Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible
               Sanitizable Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {11},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/011},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDKPSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerRS17,
  author    = {David Derler and
               Sebastian Ramacher and
               Daniel Slamanig},
  title     = {Homomorphic Proxy Re-Authenticators and Applications to Verifiable
               Multi-User Data Aggregation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {86},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/086},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerRS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseDGORRSZ17,
  author    = {Melissa Chase and
               David Derler and
               Steven Goldfeder and
               Claudio Orlandi and
               Sebastian Ramacher and
               Christian Rechberger and
               Daniel Slamanig and
               Greg Zaverucha},
  title     = {Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {279},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/279},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChaseDGORRSZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckCDKPSS17,
  author    = {Michael Till Beck and
               Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Practical Strongly Invisible and Strongly Accountable Sanitizable
               Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {445},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/445},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BeckCDKPSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerRS17a,
  author    = {David Derler and
               Sebastian Ramacher and
               Daniel Slamanig},
  title     = {Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications
               to Ring Signatures from Symmetric-Key Primitives},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1154},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1154},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerRS17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerRS17b,
  author    = {David Derler and
               Sebastian Ramacher and
               Daniel Slamanig},
  title     = {Short Double- and N-Times-Authentication-Preventing Signatures from
               {ECDSA} and More},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1203},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1203},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerRS17b},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DerlerKS16,
  author    = {David Derler and
               Stephan Krenn and
               Daniel Slamanig},
  title     = {Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based
               Data Sharing},
  booktitle = {Cryptology and Network Security - 15th International Conference, {CANS}
               2016, Milan, Italy, November 14-16, 2016, Proceedings},
  pages     = {211--227},
  year      = {2016},
  crossref  = {DBLP:conf/cans/2016},
  url       = {https://doi.org/10.1007/978-3-319-48965-0\_13},
  doi       = {10.1007/978-3-319-48965-0\_13},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cans/DerlerKS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BlazyDSS16,
  author    = {Olivier Blazy and
               David Derler and
               Daniel Slamanig and
               Raphael Spreitzer},
  title     = {Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures
               with Verifiable Controllable Linkability},
  booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  pages     = {127--143},
  year      = {2016},
  crossref  = {DBLP:conf/ctrsa/2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8\_8},
  doi       = {10.1007/978-3-319-29485-8\_8},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/BlazyDSS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyDSS16,
  author    = {Olivier Blazy and
               David Derler and
               Daniel Slamanig and
               Raphael Spreitzer},
  title     = {Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures
               with Verifiable Controllable Linkability},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {82},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/082},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BlazyDSS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerS16,
  author    = {David Derler and
               Daniel Slamanig},
  title     = {Fully-Anonymous Short Dynamic Group Signatures Without Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {154},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/154},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerS16a,
  author    = {David Derler and
               Daniel Slamanig},
  title     = {Key-Homomorphic Signatures and Applications to Multiparty Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {792},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/792},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerS16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerKS16,
  author    = {David Derler and
               Stephan Krenn and
               Daniel Slamanig},
  title     = {Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based
               Data Sharing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1064},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1064},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerKS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerORRS16,
  author    = {David Derler and
               Claudio Orlandi and
               Sebastian Ramacher and
               Christian Rechberger and
               Daniel Slamanig},
  title     = {Digital Signatures from Symmetric-Key Primitives},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1085},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1085},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerORRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DerlerHS15,
  author    = {David Derler and
               Christian Hanser and
               Daniel Slamanig},
  title     = {Revisiting Cryptographic Accumulators, Additional Properties and Relations
               to Other Primitives},
  booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
               the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
               Proceedings},
  pages     = {127--144},
  year      = {2015},
  crossref  = {DBLP:conf/ctrsa/2015},
  url       = {https://doi.org/10.1007/978-3-319-16715-2\_7},
  doi       = {10.1007/978-3-319-16715-2\_7},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/DerlerHS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DerlerPSS15,
  author    = {David Derler and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {A General Framework for Redactable Signatures and New Constructions},
  booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International
               Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
               Papers},
  pages     = {3--19},
  year      = {2015},
  crossref  = {DBLP:conf/icisc/2015},
  url       = {https://doi.org/10.1007/978-3-319-30840-1\_1},
  doi       = {10.1007/978-3-319-30840-1\_1},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/DerlerPSS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DerlerHS15,
  author    = {David Derler and
               Christian Hanser and
               Daniel Slamanig},
  title     = {A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials},
  booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
               2015, Oxford, UK, December 15-17, 2015. Proceedings},
  pages     = {57--74},
  year      = {2015},
  crossref  = {DBLP:conf/ima/2015},
  url       = {https://doi.org/10.1007/978-3-319-27239-9\_4},
  doi       = {10.1007/978-3-319-27239-9\_4},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ima/DerlerHS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/DerlerHPS15,
  author    = {David Derler and
               Christian Hanser and
               Henrich C. P{\"{o}}hls and
               Daniel Slamanig},
  title     = {Towards Authenticity and Privacy Preserving Accountable Workflows},
  booktitle = {Privacy and Identity Management. Time for a Revolution? - 10th {IFIP}
               {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer
               School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers},
  pages     = {170--186},
  year      = {2015},
  crossref  = {DBLP:conf/primelife/2015},
  url       = {https://doi.org/10.1007/978-3-319-41763-9\_12},
  doi       = {10.1007/978-3-319-41763-9\_12},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/DerlerHPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DerlerS15,
  author    = {David Derler and
               Daniel Slamanig},
  title     = {Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box
               Construction of Strongly Private Schemes},
  booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
               Japan, November 24-26, 2015, Proceedings},
  pages     = {455--474},
  year      = {2015},
  crossref  = {DBLP:conf/provsec/2015},
  url       = {https://doi.org/10.1007/978-3-319-26059-4\_25},
  doi       = {10.1007/978-3-319-26059-4\_25},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/DerlerS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerHS15,
  author    = {David Derler and
               Christian Hanser and
               Daniel Slamanig},
  title     = {Revisiting Cryptographic Accumulators, Additional Properties and Relations
               to other Primitives},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {87},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/087},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerHS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerS15,
  author    = {David Derler and
               Daniel Slamanig},
  title     = {Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box
               Construction of Strongly Private Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {843},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/843},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerPSS15,
  author    = {David Derler and
               Henrich Christopher P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {A General Framework for Redactable Signatures and New Constructions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1059},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1059},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerPSS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerS15a,
  author    = {David Derler and
               Daniel Slamanig},
  title     = {Practical Witness Encryption for Algebraic Languages And How to Reply
               an Unknown Whistleblower},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1073},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1073},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerS15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HorschDRHW14,
  author    = {Moritz Horsch and
               David Derler and
               Christof Rath and
               Hans{-}Martin Haase and
               Tobias Wich},
  title     = {Open Source f{\"{u}}r europ{\"{a}}ische Signaturen},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {38},
  number    = {4},
  pages     = {237--241},
  year      = {2014},
  url       = {https://doi.org/10.1007/s11623-014-0098-5},
  doi       = {10.1007/s11623-014-0098-5},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dud/HorschDRHW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DerlerHS14,
  author    = {David Derler and
               Christian Hanser and
               Daniel Slamanig},
  title     = {Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous
               Credentials},
  booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
               {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
               July 14-16, 2014. Proceedings},
  pages     = {49--65},
  year      = {2014},
  crossref  = {DBLP:conf/dbsec/2014},
  url       = {https://doi.org/10.1007/978-3-662-43936-4\_4},
  doi       = {10.1007/978-3-662-43936-4\_4},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/DerlerHS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/DerlerHS14,
  author    = {David Derler and
               Christian Hanser and
               Daniel Slamanig},
  title     = {Blank Digital Signatures: Optimization and Practical Experiences},
  booktitle = {Privacy and Identity Management for the Future Internet in the Age
               of Globalisation - 9th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG
               9.2.2 International Summer School, Patras, Greece, September 7-12,
               2014, Revised Selected Papers},
  pages     = {201--215},
  year      = {2014},
  crossref  = {DBLP:conf/primelife/2014},
  url       = {https://doi.org/10.1007/978-3-319-18621-4\_14},
  doi       = {10.1007/978-3-319-18621-4\_14},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/DerlerHS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerHS14,
  author    = {David Derler and
               Christian Hanser and
               Daniel Slamanig},
  title     = {Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous
               Credentials},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {285},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/285},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DerlerHS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/DerlerPWD11,
  author    = {David Derler and
               Klaus Potzmader and
               Johannes Winter and
               Kurt Dietrich},
  title     = {Anonymous Ticketing for NFC-Enabled Mobile Phones},
  booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011,
               Beijing, China, November 27-29, 2011, Revised Selected Papers},
  pages     = {66--83},
  year      = {2011},
  crossref  = {DBLP:conf/intrust/2011},
  url       = {https://doi.org/10.1007/978-3-642-32298-3\_5},
  doi       = {10.1007/978-3-642-32298-3\_5},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/DerlerPWD11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asia,
  editor    = {Jong Kim and
               Gail{-}Joon Ahn and
               Seungjoo Kim and
               Yongdae Kim and
               Javier L{\'{o}}pez and
               Taesoo Kim},
  title     = {Proceedings of the 2018 on Asia Conference on Computer and Communications
               Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3196494},
  doi       = {10.1145/3196494},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-3,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10822},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78372-7},
  doi       = {10.1007/978-3-319-78372-7},
  isbn      = {978-3-319-78371-0},
  timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2018,
  title     = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8405665},
  isbn      = {978-1-5386-4228-3},
  timestamp = {Wed, 11 Jul 2018 11:39:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2018-1,
  editor    = {Michel Abdalla and
               Ricardo Dahab},
  title     = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
               Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10769},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-76578-5},
  doi       = {10.1007/978-3-319-76578-5},
  isbn      = {978-3-319-76577-8},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2018,
  editor    = {Tanja Lange and
               Rainer Steinwandt},
  title     = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10786},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3},
  doi       = {10.1007/978-3-319-79063-3},
  isbn      = {978-3-319-79062-6},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2018,
  editor    = {Joonsang Baek and
               Willy Susilo and
               Jongkil Kim},
  title     = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
               South Korea, October 25-28, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11192},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01446-9},
  doi       = {10.1007/978-3-030-01446-9},
  isbn      = {978-3-030-01445-2},
  timestamp = {Thu, 11 Oct 2018 15:07:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-1,
  editor    = {Josef Pieprzyk and
               Suriadi Suriadi},
  title     = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
               2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10342},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-60055-0},
  doi       = {10.1007/978-3-319-60055-0},
  isbn      = {978-3-319-60054-3},
  timestamp = {Wed, 31 May 2017 15:29:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017,
  editor    = {Aggelos Kiayias},
  title     = {Financial Cryptography and Data Security - 21st International Conference,
               {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10322},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70972-7},
  doi       = {10.1007/978-3-319-70972-7},
  isbn      = {978-3-319-70971-0},
  timestamp = {Tue, 02 Jan 2018 13:47:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-2,
  editor    = {Serge Fehr},
  title     = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10175},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54388-7},
  doi       = {10.1007/978-3-662-54388-7},
  isbn      = {978-3-662-54387-0},
  timestamp = {Thu, 23 Nov 2017 13:00:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2016,
  editor    = {Sara Foresti and
               Giuseppe Persiano},
  title     = {Cryptology and Network Security - 15th International Conference, {CANS}
               2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10052},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-48965-0},
  doi       = {10.1007/978-3-319-48965-0},
  isbn      = {978-3-319-48964-3},
  timestamp = {Wed, 24 May 2017 08:27:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2016,
  editor    = {Kazue Sako},
  title     = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9610},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8},
  doi       = {10.1007/978-3-319-29485-8},
  isbn      = {978-3-319-29484-1},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2015,
  editor    = {Kaisa Nyberg},
  title     = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
               the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9048},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-16715-2},
  doi       = {10.1007/978-3-319-16715-2},
  isbn      = {978-3-319-16714-5},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2015,
  editor    = {Soonhak Kwon and
               Aaram Yun},
  title     = {Information Security and Cryptology - {ICISC} 2015 - 18th International
               Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9558},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-30840-1},
  doi       = {10.1007/978-3-319-30840-1},
  isbn      = {978-3-319-30839-5},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2015,
  editor    = {Jens Groth},
  title     = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
               2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9496},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27239-9},
  doi       = {10.1007/978-3-319-27239-9},
  isbn      = {978-3-319-27238-2},
  timestamp = {Sun, 04 Jun 2017 10:06:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2015,
  editor    = {David Aspinall and
               Jan Camenisch and
               Marit Hansen and
               Simone Fischer{-}H{\"{u}}bner and
               Charles D. Raab},
  title     = {Privacy and Identity Management. Time for a Revolution? - 10th {IFIP}
               {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer
               School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {476},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-41763-9},
  doi       = {10.1007/978-3-319-41763-9},
  isbn      = {978-3-319-41762-2},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2015,
  editor    = {Man Ho Au and
               Atsuko Miyaji},
  title     = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
               Japan, November 24-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9451},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26059-4},
  doi       = {10.1007/978-3-319-26059-4},
  isbn      = {978-3-319-26058-7},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2014,
  editor    = {Vijay Atluri and
               G{\"{u}}nther Pernul},
  title     = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
               {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
               July 14-16, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8566},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43936-4},
  doi       = {10.1007/978-3-662-43936-4},
  isbn      = {978-3-662-43935-7},
  timestamp = {Fri, 26 May 2017 00:49:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2014,
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Marit Hansen},
  title     = {Privacy and Identity Management for the Future Internet in the Age
               of Globalisation - 9th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG
               9.2.2 International Summer School, Patras, Greece, September 7-12,
               2014, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {457},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-18621-4},
  doi       = {10.1007/978-3-319-18621-4},
  isbn      = {978-3-319-18620-7},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2011,
  editor    = {Liqun Chen and
               Moti Yung and
               Liehuang Zhu},
  title     = {Trusted Systems - Third International Conference, {INTRUST} 2011,
               Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7222},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32298-3},
  doi       = {10.1007/978-3-642-32298-3},
  isbn      = {978-3-642-32297-6},
  timestamp = {Fri, 26 May 2017 00:49:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier