BibTeX records: Cédric Van Rompay

download as .bib file

@inproceedings{DBLP:conf/ccs/RompayMO18,
  author    = {C{\'{e}}dric Van Rompay and
               Refik Molva and
               Melek {\"{O}}nen},
  title     = {Secure and Scalable Multi-User Searchable Encryption},
  booktitle = {Proceedings of the 6th International Workshop on Security in Cloud
               Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08,
               2018},
  pages     = {15--25},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018scc},
  url       = {https://doi.org/10.1145/3201595.3201597},
  doi       = {10.1145/3201595.3201597},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/RompayMO18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RompayO18,
  author    = {C{\'{e}}dric Van Rompay and
               Melek {\"{O}}nen},
  title     = {Breaking and Fixing the Security Proof of Garbled Bloom Filters},
  booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
               Proceedings},
  pages     = {263--277},
  year      = {2018},
  crossref  = {DBLP:conf/dbsec/2018},
  url       = {https://doi.org/10.1007/978-3-319-95729-6\_17},
  doi       = {10.1007/978-3-319-95729-6\_17},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/RompayO18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/RompayMO18,
  author    = {C{\'{e}}dric Van Rompay and
               Refik Molva and
               Melek {\"{O}}nen},
  title     = {Fast Two-Server Multi-User Searchable Encryption with Strict Access
               Pattern Leakage},
  booktitle = {Information and Communications Security - 20th International Conference,
               {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  pages     = {393--408},
  year      = {2018},
  crossref  = {DBLP:conf/icics/2018},
  url       = {https://doi.org/10.1007/978-3-030-01950-1\_23},
  doi       = {10.1007/978-3-030-01950-1\_23},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/RompayMO18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RompayMO18,
  author    = {C{\'{e}}dric Van Rompay and
               Refik Molva and
               Melek {\"{O}}nen},
  title     = {Secure and Scalable Multi-User Searchable Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {90},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/090},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RompayMO18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RompayMO17,
  author    = {C{\'{e}}dric Van Rompay and
               Refik Molva and
               Melek {\"{O}}nen},
  title     = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption},
  journal   = {PoPETs},
  volume    = {2017},
  number    = {3},
  pages     = {168},
  year      = {2017},
  url       = {https://doi.org/10.1515/popets-2017-0034},
  doi       = {10.1515/popets-2017-0034},
  timestamp = {Wed, 20 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/RompayMO17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RompayMO17,
  author    = {C{\'{e}}dric Van Rompay and
               Refik Molva and
               Melek {\"{O}}nen},
  title     = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {400},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/400},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RompayMO17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/RompayMO15,
  author    = {C{\'{e}}dric Van Rompay and
               Refik Molva and
               Melek {\"{O}}nen},
  title     = {Multi-user Searchable Encryption in the Cloud},
  booktitle = {Information Security - 18th International Conference, {ISC} 2015,
               Trondheim, Norway, September 9-11, 2015, Proceedings},
  pages     = {299--316},
  year      = {2015},
  crossref  = {DBLP:conf/isw/2015},
  url       = {https://doi.org/10.1007/978-3-319-23318-5\_17},
  doi       = {10.1007/978-3-319-23318-5\_17},
  timestamp = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/RompayMO15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018scc,
  editor    = {Aziz Mohaisen and
               Qian Wang},
  title     = {Proceedings of the 6th International Workshop on Security in Cloud
               Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08,
               2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3201595},
  doi       = {10.1145/3201595},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018scc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2018,
  editor    = {Florian Kerschbaum and
               Stefano Paraboschi},
  title     = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10980},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-95729-6},
  doi       = {10.1007/978-3-319-95729-6},
  isbn      = {978-3-319-95728-9},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2018,
  editor    = {David Naccache and
               Shouhuai Xu and
               Sihan Qing and
               Pierangela Samarati and
               Gregory Blanc and
               Rongxing Lu and
               Zonghua Zhang and
               Ahmed Meddahi},
  title     = {Information and Communications Security - 20th International Conference,
               {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11149},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01950-1},
  doi       = {10.1007/978-3-030-01950-1},
  isbn      = {978-3-030-01949-5},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2015,
  editor    = {Javier L{\'{o}}pez and
               Chris J. Mitchell},
  title     = {Information Security - 18th International Conference, {ISC} 2015,
               Trondheim, Norway, September 9-11, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9290},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-23318-5},
  doi       = {10.1007/978-3-319-23318-5},
  isbn      = {978-3-319-23317-8},
  timestamp = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics