BibTeX records: Anton Mityagin

download as .bib file

@inproceedings{DBLP:conf/sigir/YangMSM10,
  author    = {Hui Yang and
               Anton Mityagin and
               Krysta Marie Svore and
               Sergey Markov},
  title     = {Collecting high quality overlapping labels at low cost},
  booktitle = {Proceeding of the 33rd International {ACM} {SIGIR} Conference on Research
               and Development in Information Retrieval, {SIGIR} 2010, Geneva, Switzerland,
               July 19-23, 2010},
  pages     = {459--466},
  year      = {2010},
  crossref  = {DBLP:conf/sigir/2010},
  url       = {http://doi.acm.org/10.1145/1835449.1835526},
  doi       = {10.1145/1835449.1835526},
  timestamp = {Wed, 08 Feb 2017 13:37:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigir/YangMSM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/LawMC09,
  author    = {Edith Law and
               Anton Mityagin and
               David Maxwell Chickering},
  title     = {Intentions: a game for classifying search query intent},
  booktitle = {Proceedings of the 27th International Conference on Human Factors
               in Computing Systems, {CHI} 2009, Extended Abstracts Volume, Boston,
               MA, USA, April 4-9, 2009},
  pages     = {3805--3810},
  year      = {2009},
  crossref  = {DBLP:conf/chi/2009a},
  url       = {http://doi.acm.org/10.1145/1520340.1520575},
  doi       = {10.1145/1520340.1520575},
  timestamp = {Mon, 26 Feb 2018 13:34:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/LawMC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/BennettCM09,
  author    = {Paul N. Bennett and
               David Maxwell Chickering and
               Anton Mityagin},
  title     = {Picture this: preferences for image search},
  booktitle = {Proceedings of the {ACM} {SIGKDD} Workshop on Human Computation, Paris,
               France, June 28, 2009},
  pages     = {25--26},
  year      = {2009},
  crossref  = {DBLP:conf/kdd/2009hcomp},
  url       = {http://doi.acm.org/10.1145/1600150.1600157},
  doi       = {10.1145/1600150.1600157},
  timestamp = {Thu, 29 Oct 2009 21:21:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/kdd/BennettCM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BennettCM09,
  author    = {Paul N. Bennett and
               David Maxwell Chickering and
               Anton Mityagin},
  title     = {Learning consensus opinion: mining data from a labeling game},
  booktitle = {Proceedings of the 18th International Conference on World Wide Web,
               {WWW} 2009, Madrid, Spain, April 20-24, 2009},
  pages     = {121--130},
  year      = {2009},
  crossref  = {DBLP:conf/www/2009},
  url       = {http://doi.acm.org/10.1145/1526709.1526727},
  doi       = {10.1145/1526709.1526727},
  timestamp = {Tue, 05 May 2009 16:01:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/BennettCM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/kdd/2009hcomp,
  editor    = {Paul N. Bennett and
               Raman Chandrasekar and
               Max Chickering and
               Panagiotis G. Ipeirotis and
               Edith Law and
               Anton Mityagin and
               Foster J. Provost and
               Luis von Ahn},
  title     = {Proceedings of the {ACM} {SIGKDD} Workshop on Human Computation, Paris,
               France, June 28, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-672-4},
  timestamp = {Thu, 29 Oct 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/kdd/2009hcomp},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/RaghavanPM07,
  author    = {Barath Raghavan and
               Saurabh Panjwani and
               Anton Mityagin},
  title     = {Analysis of the {SPV} secure routing protocol: weaknesses and lessons},
  journal   = {Computer Communication Review},
  volume    = {37},
  number    = {2},
  pages     = {29--38},
  year      = {2007},
  url       = {http://doi.acm.org/10.1145/1232919.1232923},
  doi       = {10.1145/1232919.1232923},
  timestamp = {Tue, 24 Apr 2007 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/RaghavanPM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LaMacchiaLM07,
  author    = {Brian A. LaMacchia and
               Kristin E. Lauter and
               Anton Mityagin},
  title     = {Stronger Security of Authenticated Key Exchange},
  booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
               Australia, November 1-2, 2007, Proceedings},
  pages     = {1--16},
  year      = {2007},
  crossref  = {DBLP:conf/provsec/2007},
  url       = {https://doi.org/10.1007/978-3-540-75670-5\_1},
  doi       = {10.1007/978-3-540-75670-5\_1},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/LaMacchiaLM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ChellapillaMC07,
  author    = {Kumar Chellapilla and
               Anton Mityagin and
               Denis Xavier Charles},
  title     = {GigaHash: scalable minimal perfect hashing for billions of urls},
  booktitle = {Proceedings of the 16th International Conference on World Wide Web,
               {WWW} 2007, Banff, Alberta, Canada, May 8-12, 2007},
  pages     = {1165--1166},
  year      = {2007},
  crossref  = {DBLP:conf/www/2007},
  url       = {http://doi.acm.org/10.1145/1242572.1242747},
  doi       = {10.1145/1242572.1242747},
  timestamp = {Tue, 12 May 2009 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/ChellapillaMC07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Mityagin06,
  author    = {Anton Mityagin},
  title     = {Protocols and security proofs for data authentication},
  school    = {University of California, San Diego, {USA}},
  year      = {2006},
  url       = {http://www.escholarship.org/uc/item/767372fz},
  timestamp = {Wed, 22 Mar 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/phd/basesearch/Mityagin06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/MironovMN06,
  author    = {Ilya Mironov and
               Anton Mityagin and
               Kobbi Nissim},
  title     = {Hard Instances of the Constrained Discrete Logarithm Problem},
  booktitle = {Algorithmic Number Theory, 7th International Symposium, ANTS-VII,
               Berlin, Germany, July 23-28, 2006, Proceedings},
  pages     = {582--598},
  year      = {2006},
  crossref  = {DBLP:conf/ants/2006},
  url       = {https://doi.org/10.1007/11792086\_41},
  doi       = {10.1007/11792086\_41},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ants/MironovMN06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LauterM06,
  author    = {Kristin E. Lauter and
               Anton Mityagin},
  title     = {Security Analysis of {KEA} Authenticated Key Exchange Protocol},
  booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
               April 24-26, 2006, Proceedings},
  pages     = {378--394},
  year      = {2006},
  crossref  = {DBLP:conf/pkc/2006},
  url       = {https://doi.org/10.1007/11745853\_25},
  doi       = {10.1007/11745853\_25},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/LauterM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-math-0606771,
  author    = {Ilya Mironov and
               Anton Mityagin and
               Kobbi Nissim},
  title     = {Hard Instances of the Constrained Discrete Logarithm Problem},
  journal   = {CoRR},
  volume    = {abs/math/0606771},
  year      = {2006},
  url       = {http://arxiv.org/abs/math/0606771},
  archivePrefix = {arXiv},
  eprint    = {math/0606771},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-math-0606771},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaMacchiaLM06,
  author    = {Brian A. LaMacchia and
               Kristin E. Lauter and
               Anton Mityagin},
  title     = {Stronger Security of Authenticated Key Exchange},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {73},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/073},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LaMacchiaLM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaghavanPM06,
  author    = {Barath Raghavan and
               Saurabh Panjwani and
               Anton Mityagin},
  title     = {Analysis of the {SPV} Secure Routing Protocol: Weaknesses and Lessons},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {87},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/087},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RaghavanPM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MironovMN06,
  author    = {Ilya Mironov and
               Anton Mityagin and
               Kobbi Nissim},
  title     = {Hard Instances of the Constrained Discrete Logarithm Problem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {253},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/253},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MironovMN06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KiltzMPR05,
  author    = {Eike Kiltz and
               Anton Mityagin and
               Saurabh Panjwani and
               Barath Raghavan},
  title     = {Append-Only Signatures},
  booktitle = {Automata, Languages and Programming, 32nd International Colloquium,
               {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  pages     = {434--445},
  year      = {2005},
  crossref  = {DBLP:conf/icalp/2005},
  url       = {https://doi.org/10.1007/11523468\_36},
  doi       = {10.1007/11523468\_36},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/KiltzMPR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/CamenischM05,
  author    = {Jan Camenisch and
               Anton Mityagin},
  title     = {Mix-Network with Stronger Security},
  booktitle = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
               2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  pages     = {128--146},
  year      = {2005},
  crossref  = {DBLP:conf/pet/2005},
  url       = {https://doi.org/10.1007/11767831\_9},
  doi       = {10.1007/11767831\_9},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/CamenischM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzMPR05,
  author    = {Eike Kiltz and
               Anton Mityagin and
               Saurabh Panjwani and
               Barath Raghavan},
  title     = {Append-Only Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {124},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/124},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KiltzMPR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterM05,
  author    = {Kristin E. Lauter and
               Anton Mityagin},
  title     = {Security Analysis of {KEA} Authenticated Key Exchange Protocol},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {265},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/265},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LauterM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Mityagin04,
  author    = {Anton Mityagin},
  title     = {On the complexity of finding a local maximum of functions on discrete
               planar subsets},
  journal   = {Theor. Comput. Sci.},
  volume    = {310},
  number    = {1-3},
  pages     = {355--363},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0304-3975(03)00426-2},
  doi       = {10.1016/S0304-3975(03)00426-2},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/Mityagin04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareGM04,
  author    = {Mihir Bellare and
               Oded Goldreich and
               Anton Mityagin},
  title     = {The Power of Verification Queries in Message Authentication and Authenticated
               Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {309},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/309},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BellareGM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/Mityagin03,
  author    = {Anton Mityagin},
  title     = {On the Complexity of Finding a Local Maximum of Functions on Discrete
               Planar Subsets},
  booktitle = {{STACS} 2003, 20th Annual Symposium on Theoretical Aspects of Computer
               Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings},
  pages     = {203--211},
  year      = {2003},
  crossref  = {DBLP:conf/stacs/2003},
  url       = {https://doi.org/10.1007/3-540-36494-3\_19},
  doi       = {10.1007/3-540-36494-3\_19},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stacs/Mityagin03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KlimovMS02,
  author    = {Alexander Klimov and
               Anton Mityagin and
               Adi Shamir},
  title     = {Analysis of Neural Cryptography},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  pages     = {288--298},
  year      = {2002},
  crossref  = {DBLP:conf/asiacrypt/2002},
  url       = {https://doi.org/10.1007/3-540-36178-2\_18},
  doi       = {10.1007/3-540-36178-2\_18},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/KlimovMS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigir/2010,
  editor    = {Fabio Crestani and
               St{\'{e}}phane Marchand{-}Maillet and
               Hsin{-}Hsi Chen and
               Efthimis N. Efthimiadis and
               Jacques Savoy},
  title     = {Proceeding of the 33rd International {ACM} {SIGIR} Conference on Research
               and Development in Information Retrieval, {SIGIR} 2010, Geneva, Switzerland,
               July 19-23, 2010},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://doi.acm.org/10.1145/1835449},
  doi       = {10.1145/1835449},
  isbn      = {978-1-4503-0153-4},
  timestamp = {Wed, 08 Feb 2017 13:37:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigir/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2009a,
  editor    = {Dan R. Olsen Jr. and
               Richard B. Arthur and
               Ken Hinckley and
               Meredith Ringel Morris and
               Scott E. Hudson and
               Saul Greenberg},
  title     = {Proceedings of the 27th International Conference on Human Factors
               in Computing Systems, {CHI} 2009, Extended Abstracts Volume, Boston,
               MA, USA, April 4-9, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-247-4},
  timestamp = {Mon, 26 Feb 2018 13:34:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2009a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/kdd/2009hcomp,
  editor    = {Paul N. Bennett and
               Raman Chandrasekar and
               Max Chickering and
               Panagiotis G. Ipeirotis and
               Edith Law and
               Anton Mityagin and
               Foster J. Provost and
               Luis von Ahn},
  title     = {Proceedings of the {ACM} {SIGKDD} Workshop on Human Computation, Paris,
               France, June 28, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-672-4},
  timestamp = {Thu, 29 Oct 2009 21:21:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/kdd/2009hcomp},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2009,
  editor    = {Juan Quemada and
               Gonzalo Le{\'{o}}n and
               Yo{\"{e}}lle S. Maarek and
               Wolfgang Nejdl},
  title     = {Proceedings of the 18th International Conference on World Wide Web,
               {WWW} 2009, Madrid, Spain, April 20-24, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-487-4},
  timestamp = {Tue, 05 May 2009 16:01:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2007,
  editor    = {Willy Susilo and
               Joseph K. Liu and
               Yi Mu},
  title     = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
               Australia, November 1-2, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4784},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-75670-5},
  doi       = {10.1007/978-3-540-75670-5},
  isbn      = {978-3-540-75669-9},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2007,
  editor    = {Carey L. Williamson and
               Mary Ellen Zurko and
               Peter F. Patel{-}Schneider and
               Prashant J. Shenoy},
  title     = {Proceedings of the 16th International Conference on World Wide Web,
               {WWW} 2007, Banff, Alberta, Canada, May 8-12, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-654-7},
  timestamp = {Wed, 22 Aug 2007 09:51:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ants/2006,
  editor    = {Florian Hess and
               Sebastian Pauli and
               Michael E. Pohst},
  title     = {Algorithmic Number Theory, 7th International Symposium, ANTS-VII,
               Berlin, Germany, July 23-28, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4076},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11792086},
  doi       = {10.1007/11792086},
  isbn      = {3-540-36075-1},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ants/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor    = {Moti Yung and
               Yevgeniy Dodis and
               Aggelos Kiayias and
               Tal Malkin},
  title     = {Public Key Cryptography - {PKC} 2006, 9th International Conference
               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
               April 24-26, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3958},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11745853},
  doi       = {10.1007/11745853},
  isbn      = {3-540-33851-9},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2005,
  editor    = {Lu{\'{\i}}s Caires and
               Giuseppe F. Italiano and
               Lu{\'{\i}}s Monteiro and
               Catuscia Palamidessi and
               Moti Yung},
  title     = {Automata, Languages and Programming, 32nd International Colloquium,
               {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3580},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11523468},
  doi       = {10.1007/11523468},
  isbn      = {3-540-27580-0},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2005,
  editor    = {George Danezis and
               David M. Martin Jr.},
  title     = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
               2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3856},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11767831},
  doi       = {10.1007/11767831},
  isbn      = {3-540-34745-3},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stacs/2003,
  editor    = {Helmut Alt and
               Michel Habib},
  title     = {{STACS} 2003, 20th Annual Symposium on Theoretical Aspects of Computer
               Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2607},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36494-3},
  doi       = {10.1007/3-540-36494-3},
  isbn      = {3-540-00623-0},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stacs/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2002,
  editor    = {Yuliang Zheng},
  title     = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2501},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36178-2},
  doi       = {10.1007/3-540-36178-2},
  isbn      = {3-540-00171-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier