Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iwsec/iwsec2016.bht:"
@inproceedings{DBLP:conf/iwsec/AguessyBBCD16, author = {Fran{\c{c}}ois{-}Xavier Aguessy and Olivier Bettan and Gregory Blanc and Vania Conan and Herv{\'{e}} Debar}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Hybrid Risk Assessment Model Based on Bayesian Networks}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {21--40}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_2}, doi = {10.1007/978-3-319-44524-3\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/AguessyBBCD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BarenghiP16, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {A Note on Fault Attacks Against Deterministic Signature Schemes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {182--192}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_11}, doi = {10.1007/978-3-319-44524-3\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BarenghiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BeatoHM16, author = {Filipe Beato and Kimmo Halunen and Bart Mennink}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Recipient Privacy in Online Social Networks}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {254--264}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_15}, doi = {10.1007/978-3-319-44524-3\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BeatoHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ButinDB16, author = {Denis Butin and Denise Demirel and Johannes Buchmann}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Formal Policy-Based Provenance Audit}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {234--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_14}, doi = {10.1007/978-3-319-44524-3\_14}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/ButinDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DingKOTT16, author = {Jintai Ding and Momonari Kudo and Shinya Okumura and Tsuyoshi Takagi and Chengdong Tao}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted {LLL} Reduction}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {305--315}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_18}, doi = {10.1007/978-3-319-44524-3\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DingKOTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HiranoHKMIOSM16, author = {Takato Hirano and Mitsuhiro Hattori and Yutaka Kawai and Nori Matsuda and Mitsugu Iwamoto and Kazuo Ohta and Yusuke Sakai and Tatsuji Munaka}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {91--110}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_6}, doi = {10.1007/978-3-319-44524-3\_6}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HiranoHKMIOSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JeongKPN16, author = {Ji{-}Hoon Jeong and Hyung Chan Kim and Il Hwan Park and Bong{-}Nam Noh}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Hooking Graceful Moments: {A} Security Analysis of Sudo Session Handling}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {41--60}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_3}, doi = {10.1007/978-3-319-44524-3\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JeongKPN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KawachiTT16, author = {Akinori Kawachi and Hirotoshi Takebe and Keisuke Tanaka}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {195--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_12}, doi = {10.1007/978-3-319-44524-3\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KawachiTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KudoYGY16, author = {Momonari Kudo and Junpei Yamaguchi and Yang Guo and Masaya Yasuda}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Practical Analysis of Key Recovery Attack Against Search-LWE Problem}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {164--181}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_10}, doi = {10.1007/978-3-319-44524-3\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KudoYGY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16, author = {Kaoru Kurosawa and Keisuke Sasaki and Kiyohiko Ohta and Kazuki Yoneyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {73--90}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_5}, doi = {10.1007/978-3-319-44524-3\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaSOY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/LinWJZW16, author = {Zimin Lin and Rui Wang and Xiaoqi Jia and Shengzhi Zhang and Chuankun Wu}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {3--20}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_1}, doi = {10.1007/978-3-319-44524-3\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/LinWJZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnukiTKU16, author = {Hiroshi Onuki and Tadanori Teruya and Naoki Kanayama and Shigenori Uchiyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {319--334}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_19}, doi = {10.1007/978-3-319-44524-3\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnukiTKU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XiangZL16, author = {Zejun Xiang and Wentao Zhang and Dongdai Lin}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {On the Division Property of Simon48 and Simon64}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {147--163}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_9}, doi = {10.1007/978-3-319-44524-3\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/XiangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XieTCZG16, author = {Wei Xie and Yong Tang and Shuhui Chen and Yi Zhang and Yuanming Gao}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Security of Web of Things: {A} Survey}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {61--70}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_4}, doi = {10.1007/978-3-319-44524-3\_4}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XieTCZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Yamamoto16, author = {Hiroaki Yamamoto}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Secure Automata-Based Substring Search Scheme on Encrypted Data}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {111--131}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_7}, doi = {10.1007/978-3-319-44524-3\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Yamamoto16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YangHSS16, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Related-Key Impossible Differential Analysis of Full Khudra}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {135--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_8}, doi = {10.1007/978-3-319-44524-3\_8}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/YangHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YashiroMIS16, author = {Risa Yashiro and Takanori Machida and Mitsugu Iwamoto and Kazuo Sakiyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter {PUF} and Its Variants}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {267--285}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_16}, doi = {10.1007/978-3-319-44524-3\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YashiroMIS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangCZL16, author = {Tao Zhang and Sherman S. M. Chow and Zhe Zhou and Ming Li}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {215--233}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_13}, doi = {10.1007/978-3-319-44524-3\_13}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangCZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhangT16, author = {Wenbin Zhang and Chik How Tan}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {On the Security and Key Generation of the {ZHFE} Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {289--304}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_17}, doi = {10.1007/978-3-319-44524-3\_17}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhangT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2016, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3}, doi = {10.1007/978-3-319-44524-3}, isbn = {978-3-319-44523-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.