BibTeX records: Ananth Raghunathan

download as .bib file

@inproceedings{DBLP:conf/soda/ErlingssonFMRTT19,
  author    = {{\'{U}}lfar Erlingsson and
               Vitaly Feldman and
               Ilya Mironov and
               Ananth Raghunathan and
               Kunal Talwar and
               Abhradeep Thakurta},
  title     = {Amplification by Shuffling: From Local to Central Differential Privacy
               via Anonymity},
  booktitle = {Proceedings of the Thirtieth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2019, San Diego, California, USA, January 6-9,
               2019},
  pages     = {2468--2479},
  year      = {2019},
  crossref  = {DBLP:conf/soda/2019},
  url       = {https://doi.org/10.1137/1.9781611975482.151},
  doi       = {10.1137/1.9781611975482.151},
  timestamp = {Tue, 12 Mar 2019 15:52:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/soda/ErlingssonFMRTT19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/RaghunathanSV18,
  author    = {Ananth Raghunathan and
               Gil Segev and
               Salil P. Vadhan},
  title     = {Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext
               Distributions},
  journal   = {J. Cryptology},
  volume    = {31},
  number    = {4},
  pages     = {1012--1063},
  year      = {2018},
  url       = {https://doi.org/10.1007/s00145-018-9287-y},
  doi       = {10.1007/s00145-018-9287-y},
  timestamp = {Tue, 25 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/RaghunathanSV18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/PapernotSMRTE18,
  author    = {Nicolas Papernot and
               Shuang Song and
               Ilya Mironov and
               Ananth Raghunathan and
               Kunal Talwar and
               {\'{U}}lfar Erlingsson},
  title     = {Scalable Private Learning with {PATE}},
  booktitle = {6th International Conference on Learning Representations, {ICLR} 2018,
               Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings},
  year      = {2018},
  crossref  = {DBLP:conf/iclr/2018},
  url       = {https://openreview.net/forum?id=rkZB1XbRZ},
  timestamp = {Thu, 04 Apr 2019 13:20:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iclr/PapernotSMRTE18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-08908,
  author    = {Nicolas Papernot and
               Shuang Song and
               Ilya Mironov and
               Ananth Raghunathan and
               Kunal Talwar and
               {\'{U}}lfar Erlingsson},
  title     = {Scalable Private Learning with {PATE}},
  journal   = {CoRR},
  volume    = {abs/1802.08908},
  year      = {2018},
  url       = {http://arxiv.org/abs/1802.08908},
  archivePrefix = {arXiv},
  eprint    = {1802.08908},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1802-08908},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-12469,
  author    = {{\'{U}}lfar Erlingsson and
               Vitaly Feldman and
               Ilya Mironov and
               Ananth Raghunathan and
               Kunal Talwar and
               Abhradeep Thakurta},
  title     = {Amplification by Shuffling: From Local to Central Differential Privacy
               via Anonymity},
  journal   = {CoRR},
  volume    = {abs/1811.12469},
  year      = {2018},
  url       = {http://arxiv.org/abs/1811.12469},
  archivePrefix = {arXiv},
  eprint    = {1811.12469},
  timestamp = {Mon, 03 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1811-12469},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/BittauEMMRLRKTS17,
  author    = {Andrea Bittau and
               {\'{U}}lfar Erlingsson and
               Petros Maniatis and
               Ilya Mironov and
               Ananth Raghunathan and
               David Lie and
               Mitch Rudominer and
               Ushasree Kode and
               Julien Tinn{\'{e}}s and
               Bernhard Seefeld},
  title     = {Prochlo: Strong Privacy for Analytics in the Crowd},
  booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles,
               Shanghai, China, October 28-31, 2017},
  pages     = {441--459},
  year      = {2017},
  crossref  = {DBLP:conf/sosp/2017},
  url       = {https://doi.org/10.1145/3132747.3132769},
  doi       = {10.1145/3132747.3132769},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/BittauEMMRLRKTS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-00901,
  author    = {Andrea Bittau and
               {\'{U}}lfar Erlingsson and
               Petros Maniatis and
               Ilya Mironov and
               Ananth Raghunathan and
               David Lie and
               Mitch Rudominer and
               Usharree Kode and
               Julien Tinn{\'{e}}s and
               Bernhard Seefeld},
  title     = {Prochlo: Strong Privacy for Analytics in the Crowd},
  journal   = {CoRR},
  volume    = {abs/1710.00901},
  year      = {2017},
  url       = {http://arxiv.org/abs/1710.00901},
  archivePrefix = {arXiv},
  eprint    = {1710.00901},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1710-00901},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BosCDMNNRS16,
  author    = {Joppe W. Bos and
               Craig Costello and
               L{\'{e}}o Ducas and
               Ilya Mironov and
               Michael Naehrig and
               Valeria Nikolaenko and
               Ananth Raghunathan and
               Douglas Stebila},
  title     = {Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from
               {LWE}},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1006--1018},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2978425},
  doi       = {10.1145/2976749.2978425},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BosCDMNNRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCDMNNRS16,
  author    = {Joppe W. Bos and
               Craig Costello and
               L{\'{e}}o Ducas and
               Ilya Mironov and
               Michael Naehrig and
               Valeria Nikolaenko and
               Ananth Raghunathan and
               Douglas Stebila},
  title     = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from
               {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {659},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/659},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BosCDMNNRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehLMR15,
  author    = {Dan Boneh and
               Kevin Lewi and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Key Homomorphic PRFs and Their Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {220},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/220},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BonehLMR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbadiBMRS15,
  author    = {Mart{\'{\i}}n Abadi and
               Dan Boneh and
               Ilya Mironov and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Message-Locked Encryption for Lock-Dependent Messages},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {440},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/440},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AbadiBMRS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LewiMR14,
  author    = {Kevin Lewi and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Improved Constructions of PRFs Secure Against Related-Key Attacks},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  pages     = {44--61},
  year      = {2014},
  crossref  = {DBLP:conf/acns/2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5\_4},
  doi       = {10.1007/978-3-319-07536-5\_4},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/LewiMR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehRS13,
  author    = {Dan Boneh and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Function-Private Subspace-Membership Encryption and Its Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  pages     = {255--275},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-42033-7\_14},
  doi       = {10.1007/978-3-642-42033-7\_14},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BonehRS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiBMRS13,
  author    = {Mart{\'{\i}}n Abadi and
               Dan Boneh and
               Ilya Mironov and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Message-Locked Encryption for Lock-Dependent Messages},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {374--391},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4\_21},
  doi       = {10.1007/978-3-642-40041-4\_21},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AbadiBMRS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehLMR13,
  author    = {Dan Boneh and
               Kevin Lewi and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Key Homomorphic PRFs and Their Applications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {410--428},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4\_23},
  doi       = {10.1007/978-3-642-40041-4\_23},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BonehLMR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehRS13,
  author    = {Dan Boneh and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Function-Private Identity-Based Encryption: Hiding the Function in
               Functional Encryption},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  pages     = {461--478},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-40084-1\_26},
  doi       = {10.1007/978-3-642-40084-1\_26},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BonehRS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RaghunathanSV13,
  author    = {Ananth Raghunathan and
               Gil Segev and
               Salil P. Vadhan},
  title     = {Deterministic Public-Key Encryption for Adaptively Chosen Plaintext
               Distributions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  pages     = {93--110},
  year      = {2013},
  crossref  = {DBLP:conf/eurocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9\_6},
  doi       = {10.1007/978-3-642-38348-9\_6},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/RaghunathanSV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaghunathanSV13,
  author    = {Ananth Raghunathan and
               Gil Segev and
               Salil P. Vadhan},
  title     = {Deterministic Public-Key Encryption for Adaptively Chosen Plaintext
               Distributions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {125},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/125},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RaghunathanSV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehRS13,
  author    = {Dan Boneh and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Function-Private Identity-Based Encryption: Hiding the Function in
               Functional Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {283},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/283},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BonehRS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehRS13a,
  author    = {Dan Boneh and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Function-Private Subspace-Membership Encryption and Its Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {403},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/403},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BonehRS13a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehMR10,
  author    = {Dan Boneh and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Algebraic pseudorandom functions with improved efficiency from the
               augmented cascade},
  booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages     = {131--140},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010},
  url       = {https://doi.org/10.1145/1866307.1866323},
  doi       = {10.1145/1866307.1866323},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BonehMR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehMR10,
  author    = {Dan Boneh and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Algebraic Pseudorandom Functions with Improved Efficiency from the
               Augmented Cascade},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {442},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/442},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BonehMR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/NarayananRV09,
  author    = {Srivatsan Narayanan and
               Ananth Raghunathan and
               Ramarathnam Venkatesan},
  title     = {Obfuscating straight line arithmetic programs},
  booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
               Chicago, Illinois, USA, November 9, 2009},
  pages     = {47--58},
  year      = {2009},
  crossref  = {DBLP:conf/drm/2009},
  url       = {https://doi.org/10.1145/1655048.1655057},
  doi       = {10.1145/1655048.1655057},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/drm/NarayananRV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soda/2019,
  editor    = {Timothy M. Chan},
  title     = {Proceedings of the Thirtieth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2019, San Diego, California, USA, January 6-9,
               2019},
  publisher = {{SIAM}},
  year      = {2019},
  url       = {https://doi.org/10.1137/1.9781611975482},
  doi       = {10.1137/1.9781611975482},
  isbn      = {978-1-61197-548-2},
  timestamp = {Tue, 12 Mar 2019 15:52:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/soda/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iclr/2018,
  title     = {6th International Conference on Learning Representations, {ICLR} 2018,
               Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings},
  publisher = {OpenReview.net},
  year      = {2018},
  url       = {https://openreview.net/group?id=ICLR.cc/2018/Conference},
  timestamp = {Thu, 04 Apr 2019 13:20:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iclr/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sosp/2017,
  title     = {Proceedings of the 26th Symposium on Operating Systems Principles,
               Shanghai, China, October 28-31, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3132747},
  isbn      = {978-1-4503-5085-3},
  timestamp = {Thu, 19 Oct 2017 21:45:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sosp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2014,
  editor    = {Ioana Boureanu and
               Philippe Owesarski and
               Serge Vaudenay},
  title     = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8479},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5},
  doi       = {10.1007/978-3-319-07536-5},
  isbn      = {978-3-319-07535-8},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-1,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8269},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42033-7},
  doi       = {10.1007/978-3-642-42033-7},
  isbn      = {978-3-642-42032-0},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2013-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40041-4},
  doi       = {10.1007/978-3-642-40041-4},
  isbn      = {978-3-642-40040-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2013-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-2,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8043},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40084-1},
  doi       = {10.1007/978-3-642-40084-1},
  isbn      = {978-3-642-40083-4},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2013-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9},
  doi       = {10.1007/978-3-642-38348-9},
  isbn      = {978-3-642-38347-2},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010,
  editor    = {Ehab Al{-}Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0245-6},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2009,
  editor    = {Ehab Al{-}Shaer and
               Hongxia Jin and
               Gregory L. Heileman},
  title     = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
               Chicago, Illinois, USA, November 9, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-779-0},
  timestamp = {Wed, 25 Nov 2009 10:59:03 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/drm/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier