Search dblp for Publications

export results for "toc:db/conf/atis/atis2020.bht:"

 download as .bib file

@inproceedings{DBLP:conf/atis/AlzakariV20,
  author       = {Sarah A. Alzakari and
                  Poorvi L. Vora},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round {SPARX}
                  Cipher},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {108--121},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_8},
  doi          = {10.1007/978-981-33-4706-9\_8},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/AlzakariV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/BeightonBSW20,
  author       = {Matthew Beighton and
                  Harry Bartlett and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {42--60},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_4},
  doi          = {10.1007/978-981-33-4706-9\_4},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/BeightonBSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/JiWHL20,
  author       = {Wenping Ji and
                  Jian Wang and
                  Xudong He and
                  Jiqiang Liu},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Malware Analysis Method Based Random Access Memory in Android},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {78--94},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_6},
  doi          = {10.1007/978-981-33-4706-9\_6},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atis/JiWHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/LiXLM20,
  author       = {Lin Li and
                  Chungen Xu and
                  Zhongyi Liu and
                  Lin Mei},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption
                  Using Shamir Threshold Secret Sharing Scheme},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_2},
  doi          = {10.1007/978-981-33-4706-9\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atis/LiXLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/MooneyBZ20,
  author       = {Digby Mooney and
                  Lynn Margaret Batten and
                  Leo Yu Zhang},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {A New Rabin-Type Cryptosystem with Modulus p\({}^{\mbox{2}}\)q},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {61--77},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_5},
  doi          = {10.1007/978-981-33-4706-9\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/MooneyBZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/NerwichGPN20,
  author       = {Mark Nerwich and
                  Praveen Gauravaram and
                  Hye{-}young Paik and
                  Surya Nepal},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Vulnerability Database as a Service for IoT},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {95--107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_7},
  doi          = {10.1007/978-981-33-4706-9\_7},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atis/NerwichGPN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/SureshS20,
  author       = {Anjali J. Suresh and
                  Sriram Sankaran},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {A Framework for Evaluation of Software Obfuscation Tools for Embedded
                  Devices},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_1},
  doi          = {10.1007/978-981-33-4706-9\_1},
  timestamp    = {Thu, 14 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atis/SureshS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/ViswanathanB20,
  author       = {Sowmya Vishvanathan and
                  Zubair A. Baig},
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Digital Forensics for Drones: {A} Study of Tools and Techniques},
  booktitle    = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  pages        = {29--41},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9\_3},
  doi          = {10.1007/978-981-33-4706-9\_3},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/ViswanathanB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atis/2020,
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9},
  doi          = {10.1007/978-981-33-4706-9},
  isbn         = {978-981-33-4705-2},
  timestamp    = {Thu, 14 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atis/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics