BibTeX records: Berkant Ustaoglu

download as .bib file

@article{DBLP:journals/ijisec/KhayatiOSU16,
  author    = {Leyli Javid Khayati and
               Cengiz {\"{O}}rencik and
               Erkay Savas and
               Berkant Ustaoglu},
  title     = {A practical privacy-preserving targeted advertising scheme for {IPTV}
               users},
  journal   = {Int. J. Inf. Sec.},
  volume    = {15},
  number    = {4},
  pages     = {335--360},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10207-015-0296-7},
  doi       = {10.1007/s10207-015-0296-7},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/KhayatiOSU16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GoldbergSU13,
  author    = {Ian Goldberg and
               Douglas Stebila and
               Berkant Ustaoglu},
  title     = {Anonymity and one-way authentication in key exchange protocols},
  journal   = {Des. Codes Cryptogr.},
  volume    = {67},
  number    = {2},
  pages     = {245--269},
  year      = {2013},
  url       = {https://doi.org/10.1007/s10623-011-9604-z},
  doi       = {10.1007/s10623-011-9604-z},
  timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/GoldbergSU13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ManulisSU13,
  author    = {Mark Manulis and
               Koutarou Suzuki and
               Berkant Ustaoglu},
  title     = {Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {1},
  pages     = {101--110},
  year      = {2013},
  url       = {https://doi.org/10.1587/transfun.E96.A.101},
  doi       = {10.1587/transfun.E96.A.101},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/ManulisSU13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaHKSUY13,
  author    = {Atsushi Fujioka and
               Fumitaka Hoshino and
               Tetsutaro Kobayashi and
               Koutarou Suzuki and
               Berkant Ustaoglu and
               Kazuki Yoneyama},
  title     = {id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and
               Asymmetric Pairing},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {6},
  pages     = {1139--1155},
  year      = {2013},
  url       = {https://doi.org/10.1587/transfun.E96.A.1139},
  doi       = {10.1587/transfun.E96.A.1139},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/FujiokaHKSUY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/MoscaSU13,
  author    = {Michele Mosca and
               Douglas Stebila and
               Berkant Ustaoglu},
  title     = {Quantum Key Distribution in the Classical Authenticated Key Exchange
               Framework},
  booktitle = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013,
               Limoges, France, June 4-7, 2013. Proceedings},
  pages     = {136--154},
  year      = {2013},
  crossref  = {DBLP:conf/pqcrypto/2013},
  url       = {https://doi.org/10.1007/978-3-642-38616-9\_9},
  doi       = {10.1007/978-3-642-38616-9\_9},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/MoscaSU13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimFU12,
  author    = {Minkyu Kim and
               Atsushi Fujioka and
               Berkant Ustaoglu},
  title     = {Strongly Secure Authenticated Key Exchange without NAXOS' Approach
               under Computational Diffie-Hellman Assumption},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {29--39},
  year      = {2012},
  url       = {https://doi.org/10.1587/transfun.E95.A.29},
  doi       = {10.1587/transfun.E95.A.29},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/KimFU12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FujiokaMSU12,
  author    = {Atsushi Fujioka and
               Mark Manulis and
               Koutarou Suzuki and
               Berkant Ustaoglu},
  title     = {Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite
               Key Exchange},
  booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
               2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  pages     = {15--28},
  year      = {2012},
  crossref  = {DBLP:conf/acisp/2012},
  url       = {https://doi.org/10.1007/978-3-642-31448-3\_2},
  doi       = {10.1007/978-3-642-31448-3\_2},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/FujiokaMSU12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhayatiSUO12,
  author    = {Leyli Javid Khayati and
               Erkay Savas and
               Berkant Ustaoglu and
               Cengiz {\"{O}}rencik},
  title     = {Privacy-preserving Targeted Advertising Scheme for {IPTV} using the
               Cloud},
  booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
               and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  pages     = {74--83},
  year      = {2012},
  crossref  = {DBLP:conf/secrypt/2012},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/KhayatiSUO12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoscaSU12,
  author    = {Michele Mosca and
               Douglas Stebila and
               Berkant Ustaoglu},
  title     = {Quantum Key Distribution in the Classical Authenticated Key Exchange
               Framework},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {361},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/361},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MoscaSU12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Ustaoglu11,
  author    = {Berkant Ustaoglu},
  title     = {Integrating identity-based and certificate-based authenticated key
               exchange protocols},
  journal   = {Int. J. Inf. Sec.},
  volume    = {10},
  number    = {4},
  pages     = {201--212},
  year      = {2011},
  url       = {https://doi.org/10.1007/s10207-011-0136-3},
  doi       = {10.1007/s10207-011-0136-3},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/Ustaoglu11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChatterjeeMU11,
  author    = {Sanjit Chatterjee and
               Alfred Menezes and
               Berkant Ustaoglu},
  title     = {A Generic Variant of NIST's {KAS2} Key Agreement Protocol},
  booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
               2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  pages     = {353--370},
  year      = {2011},
  crossref  = {DBLP:conf/acisp/2011},
  url       = {https://doi.org/10.1007/978-3-642-22497-3\_23},
  doi       = {10.1007/978-3-642-22497-3\_23},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/ChatterjeeMU11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/KarabinaU10,
  author    = {Koray Karabina and
               Berkant Ustaoglu},
  title     = {Invalid-curve attacks on (hyper)elliptic curve cryptosystems},
  journal   = {Adv. in Math. of Comm.},
  volume    = {4},
  number    = {3},
  pages     = {307--321},
  year      = {2010},
  url       = {https://doi.org/10.3934/amc.2010.4.307},
  doi       = {10.3934/amc.2010.4.307},
  timestamp = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amco/KarabinaU10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/MenezesU10,
  author    = {Alfred Menezes and
               Berkant Ustaoglu},
  title     = {On reusing ephemeral keys in Diffie-Hellman key agreement protocols},
  journal   = {{IJACT}},
  volume    = {2},
  number    = {2},
  pages     = {154--158},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJACT.2010.038308},
  doi       = {10.1504/IJACT.2010.038308},
  timestamp = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijact/MenezesU10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChatterjeeMU10,
  author    = {Sanjit Chatterjee and
               Alfred Menezes and
               Berkant Ustaoglu},
  title     = {Combined Security Analysis of the One- and Three-Pass Unified Model
               Key Agreement Protocols},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
               on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  pages     = {49--68},
  year      = {2010},
  crossref  = {DBLP:conf/indocrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-17401-8\_5},
  doi       = {10.1007/978-3-642-17401-8\_5},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/ChatterjeeMU10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/FujiokaSU10,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Berkant Ustaoglu},
  title     = {Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share
               Identities, Private and Master Keys},
  booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
               Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  pages     = {187--205},
  year      = {2010},
  crossref  = {DBLP:conf/pairing/2010},
  url       = {https://doi.org/10.1007/978-3-642-17455-1\_12},
  doi       = {10.1007/978-3-642-17455-1\_12},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pairing/FujiokaSU10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/MenezesU09,
  author    = {Alfred Menezes and
               Berkant Ustaoglu},
  title     = {Comparing the pre- and post-specified peer models for key agreement},
  journal   = {{IJACT}},
  volume    = {1},
  number    = {3},
  pages     = {236--250},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJACT.2009.023472},
  doi       = {10.1504/IJACT.2009.023472},
  timestamp = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijact/MenezesU09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/StebilaU09,
  author    = {Douglas Stebila and
               Berkant Ustaoglu},
  title     = {Towards Denial-of-Service-Resilient Key Agreement Protocols},
  booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  pages     = {389--406},
  year      = {2009},
  crossref  = {DBLP:conf/acisp/2009},
  url       = {https://doi.org/10.1007/978-3-642-02620-1\_27},
  doi       = {10.1007/978-3-642-02620-1\_27},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/StebilaU09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoldbergUGC09,
  author    = {Ian Goldberg and
               Berkant Ustaoglu and
               Matthew Van Gundy and
               Hao Chen},
  title     = {Multi-party off-the-record messaging},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {358--368},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009},
  url       = {https://doi.org/10.1145/1653662.1653705},
  doi       = {10.1145/1653662.1653705},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GoldbergUGC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ManulisSU09,
  author    = {Mark Manulis and
               Koutarou Suzuki and
               Berkant Ustaoglu},
  title     = {Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange},
  booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International
               Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  pages     = {16--33},
  year      = {2009},
  crossref  = {DBLP:conf/icisc/2009},
  url       = {https://doi.org/10.1007/978-3-642-14423-3\_2},
  doi       = {10.1007/978-3-642-14423-3\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/ManulisSU09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChatterjeeMU09,
  author    = {Sanjit Chatterjee and
               Alfred Menezes and
               Berkant Ustaoglu},
  title     = {Reusing Static Keys in Key Agreement Protocols},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  pages     = {39--56},
  year      = {2009},
  crossref  = {DBLP:conf/indocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6\_3},
  doi       = {10.1007/978-3-642-10628-6\_3},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/ChatterjeeMU09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KimFU09,
  author    = {Minkyu Kim and
               Atsushi Fujioka and
               Berkant Ustaoglu},
  title     = {Strongly Secure Authenticated Key Exchange without NAXOS' Approach},
  booktitle = {Advances in Information and Computer Security, 4th International Workshop
               on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  pages     = {174--191},
  year      = {2009},
  crossref  = {DBLP:conf/iwsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04846-3\_12},
  doi       = {10.1007/978-3-642-04846-3\_12},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/KimFU09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Ustaoglu09,
  author    = {Berkant Ustaoglu},
  title     = {Comparing \emph{SessionStateReveal} and \emph{EphemeralKeyReveal}
               for Diffie-Hellman Protocols},
  booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  pages     = {183--197},
  year      = {2009},
  crossref  = {DBLP:conf/provsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1\_16},
  doi       = {10.1007/978-3-642-04642-1\_16},
  timestamp = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/Ustaoglu09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuU09,
  author    = {Jiang Wu and
               Berkant Ustaoglu},
  title     = {Efficient Key Exchange with Tight Security Reduction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {288},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/288},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WuU09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ustaoglu09,
  author    = {Berkant Ustaoglu},
  title     = {Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman
               protocols (extended version)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {353},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/353},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Ustaoglu09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaSU09,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Berkant Ustaoglu},
  title     = {Utilizing postponed ephemeral and pseudo-static keys in tripartite
               and identity-based key agreement protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {423},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/423},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FujiokaSU09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Ustaoglu08,
  author    = {Berkant Ustaoglu},
  title     = {Key establishment - security models, protocols and usage},
  school    = {University of Waterloo, Ontario, Canada},
  year      = {2008},
  url       = {http://hdl.handle.net/10012/3827},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/basesearch/Ustaoglu08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ustaoglu08,
  author    = {Berkant Ustaoglu},
  title     = {Obtaining a secure and efficient key agreement protocol from {(H)MQV}
               and {NAXOS}},
  journal   = {Des. Codes Cryptogr.},
  volume    = {46},
  number    = {3},
  pages     = {329--342},
  year      = {2008},
  url       = {https://doi.org/10.1007/s10623-007-9159-1},
  doi       = {10.1007/s10623-007-9159-1},
  timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/Ustaoglu08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MenezesU08,
  author    = {Alfred Menezes and
               Berkant Ustaoglu},
  title     = {Comparing the Pre- and Post-specified Peer Models for Key Agreement},
  booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
               2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  pages     = {53--68},
  year      = {2008},
  crossref  = {DBLP:conf/acisp/2008},
  url       = {https://doi.org/10.1007/978-3-540-70500-0\_5},
  doi       = {10.1007/978-3-540-70500-0\_5},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/MenezesU08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MenezesU08,
  author    = {Alfred Menezes and
               Berkant Ustaoglu},
  title     = {Security arguments for the {UM} key agreement protocol in the {NIST}
               {SP} 800-56A standard},
  booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  pages     = {261--270},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008asia},
  url       = {https://doi.org/10.1145/1368310.1368348},
  doi       = {10.1145/1368310.1368348},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MenezesU08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ustaoglu07,
  author    = {Berkant Ustaoglu},
  title     = {Obtaining a secure and efficient key agreement protocol from {(H)MQV}
               and {NAXOS}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {123},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/123},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Ustaoglu07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MenezesU06,
  author    = {Alfred Menezes and
               Berkant Ustaoglu},
  title     = {On the Importance of Public-Key Validation in the {MQV} and {HMQV}
               Key Agreement Protocols},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
               on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  pages     = {133--147},
  year      = {2006},
  crossref  = {DBLP:conf/indocrypt/2006},
  url       = {https://doi.org/10.1007/11941378\_11},
  doi       = {10.1007/11941378\_11},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/MenezesU06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2013,
  editor    = {Philippe Gaborit},
  title     = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013,
               Limoges, France, June 4-7, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7932},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38616-9},
  doi       = {10.1007/978-3-642-38616-9},
  isbn      = {978-3-642-38615-2},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2012,
  editor    = {Willy Susilo and
               Yi Mu and
               Jennifer Seberry},
  title     = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
               2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7372},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31448-3},
  doi       = {10.1007/978-3-642-31448-3},
  isbn      = {978-3-642-31447-6},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2012,
  editor    = {Pierangela Samarati and
               Wenjing Lou and
               Jianying Zhou},
  title     = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
               and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  publisher = {SciTePress},
  year      = {2012},
  isbn      = {978-989-8565-24-2},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2011,
  editor    = {Udaya Parampalli and
               Philip Hawkes},
  title     = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
               2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6812},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22497-3},
  doi       = {10.1007/978-3-642-22497-3},
  isbn      = {978-3-642-22496-6},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2010,
  editor    = {Guang Gong and
               Kishan Chand Gupta},
  title     = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
               on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6498},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17401-8},
  doi       = {10.1007/978-3-642-17401-8},
  isbn      = {978-3-642-17400-1},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2010,
  editor    = {Marc Joye and
               Atsuko Miyaji and
               Akira Otsuka},
  title     = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
               Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6487},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17455-1},
  doi       = {10.1007/978-3-642-17455-1},
  isbn      = {978-3-642-17454-4},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pairing/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2009,
  editor    = {Colin Boyd and
               Juan Manuel Gonz{\'{a}}lez Nieto},
  title     = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5594},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02620-1},
  doi       = {10.1007/978-3-642-02620-1},
  isbn      = {978-3-642-02619-5},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009,
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-894-0},
  timestamp = {Wed, 25 Nov 2009 10:26:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2009,
  editor    = {Dong Hoon Lee and
               Seokhie Hong},
  title     = {Information, Security and Cryptology - {ICISC} 2009, 12th International
               Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5984},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14423-3},
  doi       = {10.1007/978-3-642-14423-3},
  isbn      = {978-3-642-14422-6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2009,
  editor    = {Bimal K. Roy and
               Nicolas Sendrier},
  title     = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5922},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6},
  doi       = {10.1007/978-3-642-10628-6},
  isbn      = {978-3-642-10627-9},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2009,
  editor    = {Tsuyoshi Takagi and
               Masahiro Mambo},
  title     = {Advances in Information and Computer Security, 4th International Workshop
               on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5824},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04846-3},
  doi       = {10.1007/978-3-642-04846-3},
  isbn      = {978-3-642-04845-6},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2009,
  editor    = {Josef Pieprzyk and
               Fangguo Zhang},
  title     = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5848},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1},
  doi       = {10.1007/978-3-642-04642-1},
  isbn      = {978-3-642-04641-4},
  timestamp = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2008,
  editor    = {Yi Mu and
               Willy Susilo and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
               2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5107},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70500-0},
  doi       = {10.1007/978-3-540-70500-0},
  isbn      = {978-3-540-69971-2},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008asia,
  editor    = {Masayuki Abe and
               Virgil D. Gligor},
  title     = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-979-1},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2006,
  editor    = {Rana Barua and
               Tanja Lange},
  title     = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
               on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4329},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11941378},
  doi       = {10.1007/11941378},
  isbn      = {3-540-49767-6},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics