callback( { "result":{ "query":":facetid:toc:\"db/conf/acns/acns2007.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"191.61" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"32", "@dc":"32", "@oc":"32", "@id":"43377494", "text":":facetid:toc:db/conf/acns/acns2007.bht" } }, "hits":{ "@total":"32", "@computed":"32", "@sent":"32", "@first":"0", "hit":[{ "@score":"1", "@id":"5515112", "info":{"authors":{"author":[{"@pid":"90/4159","text":"Laila El Aimani"},{"@pid":"04/4983","text":"Damien Vergnaud"}]},"title":"Gradually Convertible Undeniable Signatures.","venue":"ACNS","pages":"478-496","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/AimaniV07","doi":"10.1007/978-3-540-72738-5_31","ee":"https://doi.org/10.1007/978-3-540-72738-5_31","url":"https://dblp.org/rec/conf/acns/AimaniV07"}, "url":"URL#5515112" }, { "@score":"1", "@id":"5515113", "info":{"authors":{"author":[{"@pid":"59/2551","text":"Bahador Bakhshi"},{"@pid":"07/301","text":"Babak Sadeghiyan"}]},"title":"A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA.","venue":"ACNS","pages":"129-140","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/BakhshiS07","doi":"10.1007/978-3-540-72738-5_9","ee":"https://doi.org/10.1007/978-3-540-72738-5_9","url":"https://dblp.org/rec/conf/acns/BakhshiS07"}, "url":"URL#5515113" }, { "@score":"1", "@id":"5515114", "info":{"authors":{"author":[{"@pid":"b/DianavonBidder","text":"Diana von Bidder"},{"@pid":"b/DavidABasin","text":"David A. Basin"},{"@pid":"99/1475","text":"Germano Caronni"}]},"title":"Midpoints Versus Endpoints: From Protocols to Firewalls.","venue":"ACNS","pages":"46-64","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/BidderBC07","doi":"10.1007/978-3-540-72738-5_4","ee":"https://doi.org/10.1007/978-3-540-72738-5_4","url":"https://dblp.org/rec/conf/acns/BidderBC07"}, "url":"URL#5515114" }, { "@score":"1", "@id":"5515115", "info":{"authors":{"author":[{"@pid":"b/JohannesBuchmann","text":"Johannes Buchmann 0001"},{"@pid":"48/2729","text":"Erik Dahmen"},{"@pid":"99/6286","text":"Elena Klintsevich"},{"@pid":"19/2673","text":"Katsuyuki Okeya"},{"@pid":"97/4240","text":"Camille Vuillaume"}]},"title":"Merkle Signatures with Virtually Unlimited Signature Capacity.","venue":"ACNS","pages":"31-45","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/BuchmannDKOV07","doi":"10.1007/978-3-540-72738-5_3","ee":"https://doi.org/10.1007/978-3-540-72738-5_3","url":"https://dblp.org/rec/conf/acns/BuchmannDKOV07"}, "url":"URL#5515115" }, { "@score":"1", "@id":"5515116", "info":{"authors":{"author":[{"@pid":"c/XiaofengChen1","text":"Xiaofeng Chen 0001"},{"@pid":"52/2421","text":"Fangguo Zhang"},{"@pid":"12/3447","text":"Willy Susilo"},{"@pid":"m/YiMu","text":"Yi Mu 0001"}]},"title":"Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.","venue":"ACNS","pages":"18-30","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/ChenZSM07","doi":"10.1007/978-3-540-72738-5_2","ee":"https://doi.org/10.1007/978-3-540-72738-5_2","url":"https://dblp.org/rec/conf/acns/ChenZSM07"}, "url":"URL#5515116" }, { "@score":"1", "@id":"5515117", "info":{"authors":{"author":[{"@pid":"44/3196","text":"Kyu Young Choi"},{"@pid":"11/5543","text":"Jong Hwan Park"},{"@pid":"60/11","text":"Jung Yeon Hwang"},{"@pid":"l/DongHoonLee","text":"Dong Hoon Lee 0001"}]},"title":"Efficient Certificateless Signature Schemes.","venue":"ACNS","pages":"443-458","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/ChoiPHL07","doi":"10.1007/978-3-540-72738-5_29","ee":"https://doi.org/10.1007/978-3-540-72738-5_29","url":"https://dblp.org/rec/conf/acns/ChoiPHL07"}, "url":"URL#5515117" }, { "@score":"1", "@id":"5515118", "info":{"authors":{"author":[{"@pid":"06/4343","text":"Ratna Dutta"},{"@pid":"67/4662","text":"Ee-Chien Chang"},{"@pid":"31/3850","text":"Sourav Mukhopadhyay"}]},"title":"Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.","venue":"ACNS","pages":"385-400","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/DuttaCM07","doi":"10.1007/978-3-540-72738-5_25","ee":"https://doi.org/10.1007/978-3-540-72738-5_25","url":"https://dblp.org/rec/conf/acns/DuttaCM07"}, "url":"URL#5515118" }, { "@score":"1", "@id":"5515119", "info":{"authors":{"author":{"@pid":"30/3344","text":"Keith B. Frikken"}},"title":"Privacy-Preserving Set Union.","venue":"ACNS","pages":"237-252","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/Frikken07","doi":"10.1007/978-3-540-72738-5_16","ee":"https://doi.org/10.1007/978-3-540-72738-5_16","url":"https://dblp.org/rec/conf/acns/Frikken07"}, "url":"URL#5515119" }, { "@score":"1", "@id":"5515120", "info":{"authors":{"author":[{"@pid":"74/4531-1","text":"Matthew Green 0001"},{"@pid":"66/3575","text":"Giuseppe Ateniese"}]},"title":"Identity-Based Proxy Re-encryption.","venue":"ACNS","pages":"288-306","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/GreenA07","doi":"10.1007/978-3-540-72738-5_19","ee":"https://doi.org/10.1007/978-3-540-72738-5_19","url":"https://dblp.org/rec/conf/acns/GreenA07"}, "url":"URL#5515120" }, { "@score":"1", "@id":"5515121", "info":{"authors":{"author":[{"@pid":"76/1420","text":"Chunxiang Gu"},{"@pid":"81/5261","text":"Yuefei Zhu"},{"@pid":"81/2388","text":"Yonghui Zheng"}]},"title":"Certified E-Mail Protocol in the ID-Based Setting.","venue":"ACNS","pages":"340-353","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/GuZZ07","doi":"10.1007/978-3-540-72738-5_22","ee":"https://doi.org/10.1007/978-3-540-72738-5_22","url":"https://dblp.org/rec/conf/acns/GuZZ07"}, "url":"URL#5515121" }, { "@score":"1", "@id":"5515122", "info":{"authors":{"author":[{"@pid":"58/5215-1","text":"Qiong Huang 0001"},{"@pid":"85/5606","text":"Duncan S. Wong"},{"@pid":"83/6856","text":"Yiming Zhao"}]},"title":"Generic Transformation to Strongly Unforgeable Signatures.","venue":"ACNS","pages":"1-17","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/HuangWZ07","doi":"10.1007/978-3-540-72738-5_1","ee":"https://doi.org/10.1007/978-3-540-72738-5_1","url":"https://dblp.org/rec/conf/acns/HuangWZ07"}, "url":"URL#5515122" }, { "@score":"1", "@id":"5515123", "info":{"authors":{"author":[{"@pid":"10/6573","text":"Stanislaw Jarecki"},{"@pid":"57/3906","text":"Xiaomin Liu"}]},"title":"Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.","venue":"ACNS","pages":"270-287","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/JareckiL07","doi":"10.1007/978-3-540-72738-5_18","ee":"https://doi.org/10.1007/978-3-540-72738-5_18","url":"https://dblp.org/rec/conf/acns/JareckiL07"}, "url":"URL#5515123" }, { "@score":"1", "@id":"5515124", "info":{"authors":{"author":[{"@pid":"19/4825","text":"Sven Laur"},{"@pid":"l/HelgerLipmaa","text":"Helger Lipmaa"}]},"title":"A New Protocol for Conditional Disclosure of Secrets and Its Applications.","venue":"ACNS","pages":"207-225","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/LaurL07","doi":"10.1007/978-3-540-72738-5_14","ee":"https://doi.org/10.1007/978-3-540-72738-5_14","url":"https://dblp.org/rec/conf/acns/LaurL07"}, "url":"URL#5515124" }, { "@score":"1", "@id":"5515125", "info":{"authors":{"author":[{"@pid":"50/3988","text":"Mun-Kyu Lee"},{"@pid":"79/4379","text":"Jung Woo Kim"},{"@pid":"72/6527","text":"Jeong Eun Song"},{"@pid":"p/KunsooPark","text":"Kunsoo Park"}]},"title":"Sliding Window Method for NTRU.","venue":"ACNS","pages":"432-442","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/LeeKSP07","doi":"10.1007/978-3-540-72738-5_28","ee":"https://doi.org/10.1007/978-3-540-72738-5_28","url":"https://dblp.org/rec/conf/acns/LeeKSP07"}, "url":"URL#5515125" }, { "@score":"1", "@id":"5515126", "info":{"authors":{"author":[{"@pid":"39/3025","text":"Fagen Li"},{"@pid":"52/917","text":"Yupu Hu"},{"@pid":"87/6633","text":"Chuanrong Zhang"}]},"title":"An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.","venue":"ACNS","pages":"373-384","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/LiHZ07","doi":"10.1007/978-3-540-72738-5_24","ee":"https://doi.org/10.1007/978-3-540-72738-5_24","url":"https://dblp.org/rec/conf/acns/LiHZ07"}, "url":"URL#5515126" }, { "@score":"1", "@id":"5515127", "info":{"authors":{"author":[{"@pid":"62/6011-1","text":"Jiangtao Li 0001"},{"@pid":"l/NinghuiLi","text":"Ninghui Li"},{"@pid":"30/4367-1","text":"Rui Xue 0001"}]},"title":"Universal Accumulators with Efficient Nonmembership Proofs.","venue":"ACNS","pages":"253-269","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/LiLX07","doi":"10.1007/978-3-540-72738-5_17","ee":"https://doi.org/10.1007/978-3-540-72738-5_17","url":"https://dblp.org/rec/conf/acns/LiLX07"}, "url":"URL#5515127" }, { "@score":"1", "@id":"5515128", "info":{"authors":{"author":[{"@pid":"37/548","text":"Ronghua Li"},{"@pid":"21/3011","text":"Chuankun Wu"}]},"title":"An Unconditionally Secure Protocol for Multi-Party Set Intersection.","venue":"ACNS","pages":"226-236","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/LiW07","doi":"10.1007/978-3-540-72738-5_15","ee":"https://doi.org/10.1007/978-3-540-72738-5_15","url":"https://dblp.org/rec/conf/acns/LiW07"}, "url":"URL#5515128" }, { "@score":"1", "@id":"5515129", "info":{"authors":{"author":[{"@pid":"22/1183","text":"Liang Lu"},{"@pid":"s/ReihanehSafaviNaini","text":"Reihaneh Safavi-Naini"},{"@pid":"73/1506","text":"Jeffrey Horton"},{"@pid":"12/3447","text":"Willy Susilo"}]},"title":"An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.","venue":"ACNS","pages":"65-86","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/LuSHS07","doi":"10.1007/978-3-540-72738-5_5","ee":"https://doi.org/10.1007/978-3-540-72738-5_5","url":"https://dblp.org/rec/conf/acns/LuSHS07"}, "url":"URL#5515129" }, { "@score":"1", "@id":"5515130", "info":{"authors":{"author":[{"@pid":"51/5734","text":"Zhengqin Luo"},{"@pid":"45/4384","text":"Xiaojuan Cai"},{"@pid":"p/JunPang","text":"Jun Pang 0001"},{"@pid":"25/1197","text":"Yuxin Deng"}]},"title":"Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.","venue":"ACNS","pages":"87-103","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/LuoCPD07","doi":"10.1007/978-3-540-72738-5_6","ee":"https://doi.org/10.1007/978-3-540-72738-5_6","url":"https://dblp.org/rec/conf/acns/LuoCPD07"}, "url":"URL#5515130" }, { "@score":"1", "@id":"5515131", "info":{"authors":{"author":[{"@pid":"42/2310","text":"Junghyun Nam"},{"@pid":"83/5379","text":"Juryon Paik"},{"@pid":"62/951","text":"Ung-Mo Kim"},{"@pid":"38/3038","text":"Dongho Won"}]},"title":"Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.","venue":"ACNS","pages":"158-176","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/NamPKW07","doi":"10.1007/978-3-540-72738-5_11","ee":"https://doi.org/10.1007/978-3-540-72738-5_11","url":"https://dblp.org/rec/conf/acns/NamPKW07"}, "url":"URL#5515131" }, { "@score":"1", "@id":"5515132", "info":{"authors":{"author":[{"@pid":"02/4281","text":"Xuyun Nie"},{"@pid":"09/6501","text":"Lei Hu"},{"@pid":"42/393","text":"Jintai Ding"},{"@pid":"47/2786","text":"Jianyu Li"},{"@pid":"21/2241","text":"John Wagner"}]},"title":"Cryptanalysis of the TRMC-4 Public Key Cryptosystem.","venue":"ACNS","pages":"104-115","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/NieHDLW07","doi":"10.1007/978-3-540-72738-5_7","ee":"https://doi.org/10.1007/978-3-540-72738-5_7","url":"https://dblp.org/rec/conf/acns/NieHDLW07"}, "url":"URL#5515132" }, { "@score":"1", "@id":"5515133", "info":{"authors":{"author":[{"@pid":"38/4101","text":"Patrick Schaller"},{"@pid":"51/1639","text":"Srdjan Capkun"},{"@pid":"b/DavidABasin","text":"David A. Basin"}]},"title":"BAP: Broadcast Authentication Using Cryptographic Puzzles.","venue":"ACNS","pages":"401-419","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/SchallerCB07","doi":"10.1007/978-3-540-72738-5_26","ee":"https://doi.org/10.1007/978-3-540-72738-5_26","url":"https://dblp.org/rec/conf/acns/SchallerCB07"}, "url":"URL#5515133" }, { "@score":"1", "@id":"5515134", "info":{"authors":{"author":[{"@pid":"00/823","text":"Masaaki Shirase"},{"@pid":"41/1916","text":"Dong-Guk Han"},{"@pid":"30/1637","text":"Yasushi Hibino"},{"@pid":"k/HowonKim","text":"Ho Won Kim 0001"},{"@pid":"t/TsuyoshiTakagi","text":"Tsuyoshi Takagi"}]},"title":"Compressed XTR.","venue":"ACNS","pages":"420-431","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/ShiraseHHKT07","doi":"10.1007/978-3-540-72738-5_27","ee":"https://doi.org/10.1007/978-3-540-72738-5_27","url":"https://dblp.org/rec/conf/acns/ShiraseHHKT07"}, "url":"URL#5515134" }, { "@score":"1", "@id":"5515135", "info":{"authors":{"author":[{"@pid":"42/1523","text":"Hung-Min Sun"},{"@pid":"20/1550","text":"Mu-En Wu"},{"@pid":"75/4511","text":"Yao-Hsin Chen"}]},"title":"Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.","venue":"ACNS","pages":"116-128","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/SunWC07","doi":"10.1007/978-3-540-72738-5_8","ee":"https://doi.org/10.1007/978-3-540-72738-5_8","url":"https://dblp.org/rec/conf/acns/SunWC07"}, "url":"URL#5515135" }, { "@score":"1", "@id":"5515136", "info":{"authors":{"author":[{"@pid":"t/RobertoTamassia","text":"Roberto Tamassia"},{"@pid":"29/4200","text":"Nikos Triandopoulos"}]},"title":"Efficient Content Authentication in Peer-to-Peer Networks.","venue":"ACNS","pages":"354-372","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/TamassiaT07","doi":"10.1007/978-3-540-72738-5_23","ee":"https://doi.org/10.1007/978-3-540-72738-5_23","url":"https://dblp.org/rec/conf/acns/TamassiaT07"}, "url":"URL#5515136" }, { "@score":"1", "@id":"5515137", "info":{"authors":{"author":[{"@pid":"21/5558","text":"Stefan Tillich"},{"@pid":"56/747","text":"Christoph Herbst"},{"@pid":"91/4831","text":"Stefan Mangard"}]},"title":"Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.","venue":"ACNS","pages":"141-157","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/TillichHM07","doi":"10.1007/978-3-540-72738-5_10","ee":"https://doi.org/10.1007/978-3-540-72738-5_10","url":"https://dblp.org/rec/conf/acns/TillichHM07"}, "url":"URL#5515137" }, { "@score":"1", "@id":"5515138", "info":{"authors":{"author":[{"@pid":"99/3793","text":"Xuxin Xu"},{"@pid":"w/LingyuWang","text":"Lingyu Wang 0001"},{"@pid":"05/4817","text":"Amr M. Youssef"},{"@pid":"63/6089-1","text":"Bo Zhu 0001"}]},"title":"Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.","venue":"ACNS","pages":"177-193","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/XuWYZ07","doi":"10.1007/978-3-540-72738-5_12","ee":"https://doi.org/10.1007/978-3-540-72738-5_12","url":"https://dblp.org/rec/conf/acns/XuWYZ07"}, "url":"URL#5515138" }, { "@score":"1", "@id":"5515139", "info":{"authors":{"author":[{"@pid":"78/2235","text":"Guomin Yang"},{"@pid":"27/4364-1","text":"Jing Chen 0001"},{"@pid":"85/5606","text":"Duncan S. Wong"},{"@pid":"d/XiaotieDeng","text":"Xiaotie Deng"},{"@pid":"21/841-2","text":"Dongsheng Wang 0002"}]},"title":"A More Natural Way to Construct Identity-Based Identification Schemes.","venue":"ACNS","pages":"307-322","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/YangCWDW07","doi":"10.1007/978-3-540-72738-5_20","ee":"https://doi.org/10.1007/978-3-540-72738-5_20","url":"https://dblp.org/rec/conf/acns/YangCWDW07"}, "url":"URL#5515139" }, { "@score":"1", "@id":"5515140", "info":{"authors":{"author":[{"@pid":"26/3778","text":"Wun-She Yap"},{"@pid":"c/ShermanSMChow","text":"Sherman S. M. Chow"},{"@pid":"45/873","text":"Swee-Huay Heng"},{"@pid":"74/2851","text":"Bok-Min Goi"}]},"title":"Security Mediated Certificateless Signatures.","venue":"ACNS","pages":"459-477","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/YapCHG07","doi":"10.1007/978-3-540-72738-5_30","ee":"https://doi.org/10.1007/978-3-540-72738-5_30","url":"https://dblp.org/rec/conf/acns/YapCHG07"}, "url":"URL#5515140" }, { "@score":"1", "@id":"5515141", "info":{"authors":{"author":{"@pid":"z/RuiZhang2","text":"Rui Zhang 0002"}},"title":"Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions.","venue":"ACNS","pages":"323-339","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/Zhang07","doi":"10.1007/978-3-540-72738-5_21","ee":"https://doi.org/10.1007/978-3-540-72738-5_21","url":"https://dblp.org/rec/conf/acns/Zhang07"}, "url":"URL#5515141" }, { "@score":"1", "@id":"5515142", "info":{"authors":{"author":[{"@pid":"85/3559","text":"Philip Zigoris"},{"@pid":"55/2789","text":"Hongxia Jin"}]},"title":"Bayesian Methods for Practical Traitor Tracing.","venue":"ACNS","pages":"194-206","year":"2007","type":"Conference and Workshop Papers","access":"open","key":"conf/acns/ZigorisJ07","doi":"10.1007/978-3-540-72738-5_13","ee":"https://doi.org/10.1007/978-3-540-72738-5_13","url":"https://dblp.org/rec/conf/acns/ZigorisJ07"}, "url":"URL#5515142" }, { "@score":"1", "@id":"5622380", "info":{"authors":{"author":[{"@pid":"k/JonathanKatz","text":"Jonathan Katz"},{"@pid":"y/MotiYung","text":"Moti Yung"}]},"title":"Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings","venue":["ACNS","Lecture Notes in Computer Science"],"volume":"4521","publisher":"Springer","year":"2007","type":"Editorship","key":"conf/acns/2007","doi":"10.1007/978-3-540-72738-5","ee":"https://doi.org/10.1007/978-3-540-72738-5","url":"https://dblp.org/rec/conf/acns/2007"}, "url":"URL#5622380" } ] } } } )