Search dblp for Publications

export results for "toc:db/conf/acisp/acisp2017-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acisp/AvoineCKT17,
  author       = {Gildas Avoine and
                  Xavier Carpent and
                  Barbara Kordy and
                  Florent Tardif},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {How to Handle Rainbow Tables with External Memory},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {306--323},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_16},
  doi          = {10.1007/978-3-319-60055-0\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AvoineCKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BeckCDKPSS17,
  author       = {Michael Till Beck and
                  Jan Camenisch and
                  David Derler and
                  Stephan Krenn and
                  Henrich C. P{\"{o}}hls and
                  Kai Samelin and
                  Daniel Slamanig},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Practical Strongly Invisible and Strongly Accountable Sanitizable
                  Signatures},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {437--452},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_23},
  doi          = {10.1007/978-3-319-60055-0\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BeckCDKPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BuldasGB17,
  author       = {Ahto Buldas and
                  Matthias Geihs and
                  Johannes Buchmann},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Long-Term Secure Commitments via Extractable-Binding Commitments},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {65--81},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_4},
  doi          = {10.1007/978-3-319-60055-0\_4},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BuldasGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChakrabortyPR17,
  author       = {Suvradip Chakraborty and
                  Goutam Paul and
                  C. Pandu Rangan},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Efficient Compilers for After-the-Fact Leakage: From {CPA} to {CCA-2}
                  Secure {PKE} to {AKE}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {343--362},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_18},
  doi          = {10.1007/978-3-319-60055-0\_18},
  timestamp    = {Sun, 17 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChakrabortyPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiAGR17,
  author       = {Shujie Cui and
                  Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Giovanni Russello},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Secure and Practical Searchable Encryption: {A} Position Paper},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {266--281},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_14},
  doi          = {10.1007/978-3-319-60055-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiAGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiDLL17,
  author       = {Hui Cui and
                  Robert H. Deng and
                  Joseph K. Liu and
                  Yingjiu Li},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Attribute-Based Encryption with Expressive and Authorized Keyword
                  Search},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {106--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_6},
  doi          = {10.1007/978-3-319-60055-0\_6},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiDLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiSCW17,
  author       = {Tingting Cui and
                  Ling Sun and
                  Huaifeng Chen and
                  Meiqin Wang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Statistical Integral Distinguisher with Multi-structure and Its Application
                  on {AES}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {402--420},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_21},
  doi          = {10.1007/978-3-319-60055-0\_21},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiSCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FunabikiTIM17,
  author       = {Yuki Funabiki and
                  Yosuke Todo and
                  Takanori Isobe and
                  Masakatu Morii},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Improved Integral Attack on {HIGHT}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {363--383},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_19},
  doi          = {10.1007/978-3-319-60055-0\_19},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FunabikiTIM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanL17,
  author       = {Shuai Han and
                  Shengli Liu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {KDM-Secure Public-Key Encryption from Constant-Noise {LPN}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {44--64},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_3},
  doi          = {10.1007/978-3-319-60055-0\_3},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KermanshahiLS17,
  author       = {Shabnam Kasra Kermanshahi and
                  Joseph K. Liu and
                  Ron Steinfeld},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Multi-user Cloud-Based Secure Keyword Search},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {227--247},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_12},
  doi          = {10.1007/978-3-319-60055-0\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/KermanshahiLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MahriSBDW17,
  author       = {Hassan Qahur Al Mahri and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Fault Attacks on {XEX} Mode with Application to Certain Authenticated
                  Encryption Modes},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {285--305},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_15},
  doi          = {10.1007/978-3-319-60055-0\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MahriSBDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Takashima17,
  author       = {Katsuyuki Takashima},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based
                  Encryption},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {85--105},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_5},
  doi          = {10.1007/978-3-319-60055-0\_5},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Takashima17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Takayasu017,
  author       = {Atsushi Takayasu and
                  Yohei Watanabe},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption
                  Key Exposure Resistance},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {184--204},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_10},
  doi          = {10.1007/978-3-319-60055-0\_10},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Takayasu017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TjuawinataHW17,
  author       = {Ivan Tjuawinata and
                  Tao Huang and
                  Hongjun Wu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Cryptanalysis of Simpira v2},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {384--401},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_20},
  doi          = {10.1007/978-3-319-60055-0\_20},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TjuawinataHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WatanabeIM17,
  author       = {Yuhei Watanabe and
                  Takanori Isobe and
                  Masakatu Morii},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Conditional Differential Cryptanalysis for Kreyvium},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {421--434},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_22},
  doi          = {10.1007/978-3-319-60055-0\_22},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WatanabeIM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeiWZY17,
  author       = {Puwen Wei and
                  Wei Wang and
                  Bingxin Zhu and
                  Siu{-}Ming Yiu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting
                  with Improved Efficiency},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_1},
  doi          = {10.1007/978-3-319-60055-0\_1},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WeiWZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuMMZ17,
  author       = {Tong Wu and
                  Sha Ma and
                  Yi Mu and
                  Shengke Zeng},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {ID-Based Encryption with Equality Test Against Insider Attack},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_9},
  doi          = {10.1007/978-3-319-60055-0\_9},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WuMMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuL0SWJ17,
  author       = {Peng Xu and
                  Shuai Liang and
                  Wei Wang and
                  Willy Susilo and
                  Qianhong Wu and
                  Hai Jin},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Dynamic Searchable Symmetric Encryption with Physical Deletion and
                  Small Leakage},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {207--226},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_11},
  doi          = {10.1007/978-3-319-60055-0\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuL0SWJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuYMS17,
  author       = {Shengmin Xu and
                  Guomin Yang and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Mergeable and Revocable Identity-Based Encryption},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {147--167},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_8},
  doi          = {10.1007/978-3-319-60055-0\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuYMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangLWH17,
  author       = {Yanjiang Yang and
                  Joseph K. Liu and
                  Zhuo Wei and
                  Xinyi Huang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing
                  Trust upon Cloud},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_7},
  doi          = {10.1007/978-3-319-60055-0\_7},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangLWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLG17,
  author       = {Xiao Zhang and
                  Shengli Liu and
                  Dawu Gu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Tightly-Secure Signatures from the Decisional Composite Residuosity
                  Assumption},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {453--468},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_24},
  doi          = {10.1007/978-3-319-60055-0\_24},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangMYW17,
  author       = {Shiwei Zhang and
                  Yi Mu and
                  Guomin Yang and
                  Xiaofen Wang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Hierarchical Functional Encryption for Linear Transformations},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_2},
  doi          = {10.1007/978-3-319-60055-0\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangMYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhengKH17,
  author       = {Mengce Zheng and
                  Noboru Kunihiro and
                  Honggang Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Improved Factoring Attacks on Multi-prime {RSA} with Small Prime Difference},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {324--342},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_17},
  doi          = {10.1007/978-3-319-60055-0\_17},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhengKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuMWLC17,
  author       = {Hong Zhu and
                  Zhuolin Mei and
                  Bing Wu and
                  Hongbo Li and
                  Zongmin Cui},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud
                  Computing},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {248--265},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_13},
  doi          = {10.1007/978-3-319-60055-0\_13},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhuMWLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-1,
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0},
  doi          = {10.1007/978-3-319-60055-0},
  isbn         = {978-3-319-60054-3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics