Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2017-1.bht:"
@inproceedings{DBLP:conf/acisp/AvoineCKT17, author = {Gildas Avoine and Xavier Carpent and Barbara Kordy and Florent Tardif}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {How to Handle Rainbow Tables with External Memory}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {306--323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_16}, doi = {10.1007/978-3-319-60055-0\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AvoineCKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BeckCDKPSS17, author = {Michael Till Beck and Jan Camenisch and David Derler and Stephan Krenn and Henrich C. P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {437--452}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_23}, doi = {10.1007/978-3-319-60055-0\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BeckCDKPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BuldasGB17, author = {Ahto Buldas and Matthias Geihs and Johannes Buchmann}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Long-Term Secure Commitments via Extractable-Binding Commitments}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {65--81}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_4}, doi = {10.1007/978-3-319-60055-0\_4}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BuldasGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChakrabortyPR17, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Efficient Compilers for After-the-Fact Leakage: From {CPA} to {CCA-2} Secure {PKE} to {AKE}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {343--362}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_18}, doi = {10.1007/978-3-319-60055-0\_18}, timestamp = {Sun, 17 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChakrabortyPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiAGR17, author = {Shujie Cui and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Secure and Practical Searchable Encryption: {A} Position Paper}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {266--281}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_14}, doi = {10.1007/978-3-319-60055-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiAGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiDLL17, author = {Hui Cui and Robert H. Deng and Joseph K. Liu and Yingjiu Li}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Attribute-Based Encryption with Expressive and Authorized Keyword Search}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {106--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_6}, doi = {10.1007/978-3-319-60055-0\_6}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiDLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiSCW17, author = {Tingting Cui and Ling Sun and Huaifeng Chen and Meiqin Wang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Statistical Integral Distinguisher with Multi-structure and Its Application on {AES}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {402--420}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_21}, doi = {10.1007/978-3-319-60055-0\_21}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiSCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FunabikiTIM17, author = {Yuki Funabiki and Yosuke Todo and Takanori Isobe and Masakatu Morii}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Improved Integral Attack on {HIGHT}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {363--383}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_19}, doi = {10.1007/978-3-319-60055-0\_19}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FunabikiTIM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanL17, author = {Shuai Han and Shengli Liu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {KDM-Secure Public-Key Encryption from Constant-Noise {LPN}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {44--64}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_3}, doi = {10.1007/978-3-319-60055-0\_3}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KermanshahiLS17, author = {Shabnam Kasra Kermanshahi and Joseph K. Liu and Ron Steinfeld}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Multi-user Cloud-Based Secure Keyword Search}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {227--247}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_12}, doi = {10.1007/978-3-319-60055-0\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/KermanshahiLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MahriSBDW17, author = {Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon{-}Ho Wong}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Fault Attacks on {XEX} Mode with Application to Certain Authenticated Encryption Modes}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {285--305}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_15}, doi = {10.1007/978-3-319-60055-0\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MahriSBDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Takashima17, author = {Katsuyuki Takashima}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {85--105}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_5}, doi = {10.1007/978-3-319-60055-0\_5}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Takashima17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Takayasu017, author = {Atsushi Takayasu and Yohei Watanabe}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {184--204}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_10}, doi = {10.1007/978-3-319-60055-0\_10}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Takayasu017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TjuawinataHW17, author = {Ivan Tjuawinata and Tao Huang and Hongjun Wu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Cryptanalysis of Simpira v2}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {384--401}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_20}, doi = {10.1007/978-3-319-60055-0\_20}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TjuawinataHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WatanabeIM17, author = {Yuhei Watanabe and Takanori Isobe and Masakatu Morii}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Conditional Differential Cryptanalysis for Kreyvium}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {421--434}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_22}, doi = {10.1007/978-3-319-60055-0\_22}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WatanabeIM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeiWZY17, author = {Puwen Wei and Wei Wang and Bingxin Zhu and Siu{-}Ming Yiu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {3--22}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_1}, doi = {10.1007/978-3-319-60055-0\_1}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WeiWZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuMMZ17, author = {Tong Wu and Sha Ma and Yi Mu and Shengke Zeng}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {ID-Based Encryption with Equality Test Against Insider Attack}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {168--183}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_9}, doi = {10.1007/978-3-319-60055-0\_9}, timestamp = {Thu, 06 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WuMMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuL0SWJ17, author = {Peng Xu and Shuai Liang and Wei Wang and Willy Susilo and Qianhong Wu and Hai Jin}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {207--226}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_11}, doi = {10.1007/978-3-319-60055-0\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuL0SWJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuYMS17, author = {Shengmin Xu and Guomin Yang and Yi Mu and Willy Susilo}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Mergeable and Revocable Identity-Based Encryption}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {147--167}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_8}, doi = {10.1007/978-3-319-60055-0\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuYMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangLWH17, author = {Yanjiang Yang and Joseph K. Liu and Zhuo Wei and Xinyi Huang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {127--144}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_7}, doi = {10.1007/978-3-319-60055-0\_7}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangLWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLG17, author = {Xiao Zhang and Shengli Liu and Dawu Gu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {453--468}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_24}, doi = {10.1007/978-3-319-60055-0\_24}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangMYW17, author = {Shiwei Zhang and Yi Mu and Guomin Yang and Xiaofen Wang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Hierarchical Functional Encryption for Linear Transformations}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {23--43}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_2}, doi = {10.1007/978-3-319-60055-0\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangMYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhengKH17, author = {Mengce Zheng and Noboru Kunihiro and Honggang Hu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Improved Factoring Attacks on Multi-prime {RSA} with Small Prime Difference}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {324--342}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_17}, doi = {10.1007/978-3-319-60055-0\_17}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhengKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhuMWLC17, author = {Hong Zhu and Zhuolin Mei and Bing Wu and Hongbo Li and Zongmin Cui}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {248--265}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_13}, doi = {10.1007/978-3-319-60055-0\_13}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhuMWLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2017-1, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0}, doi = {10.1007/978-3-319-60055-0}, isbn = {978-3-319-60054-3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.