Search dblp for Publications

export results for "toc:db/conf/cans/cans2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cans/AnandSS15,
  author    = {S. Abhishek Anand and
               Prakash Shrestha and
               Nitesh Saxena},
  title     = {Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic
               Passwords Using Acoustic Signals},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {95--110},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/BossiV15,
  author    = {Simone Bossi and
               Andrea Visconti},
  title     = {What Users Should Know About Full Disk Encryption Based on {LUKS}},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {225--237},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/Bouij-PasquierK15,
  author    = {Imane Bouij{-}Pasquier and
               Anas Abou El Kalam and
               Abdellah Ait Ouahman and
               Mina De Montfort},
  title     = {A Security Framework for Internet of Things},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {19--31},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/CarterMTB15,
  author    = {Henry Carter and
               Benjamin Mood and
               Patrick Traynor and
               Kevin R. B. Butler},
  title     = {Outsourcing Secure Two-Party Computation as a Black Box},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {214--222},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/DongK15,
  author    = {Changyu Dong and
               Franziskus Kiefer},
  title     = {Secure Set-Based Policy Checking and Its Application to Password Registration},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {59--74},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/DoussAYF15,
  author    = {Aida Ben Chehida Douss and
               Ryma Abassi and
               Nihel Ben Youssef and
               Sihem Guemara El Fatmi},
  title     = {A Formal Environment for {MANET} Organization and Security},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {144--159},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/GharamSB15,
  author    = {Maroua Gharam and
               Meriem Salhi and
               Noureddine Boudriga},
  title     = {An LTE-Based {VPN} for Enhancing QoS and Authentication in Smallcell
               Enterprise Networks},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {248--256},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/GhilenAB15,
  author    = {Aymen Ghilen and
               Mostafa Azizi and
               Ridha Bouallegue},
  title     = {Q-OpenVPN: {A} New Extension of OpenVPN Based on a Quantum Scheme
               for Authentication and Key Distribution},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {238--247},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/GiacomelliOR15,
  author    = {Irene Giacomelli and
               Ruxandra F. Olimid and
               Samuel Ranellucci},
  title     = {Security of Linear Secret-Sharing Schemes Against Mass Surveillance},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {43--58},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/GrossHSS15,
  author    = {Hannes Gro{\ss} and
               Marko H{\"{o}}lbl and
               Daniel Slamanig and
               Raphael Spreitzer},
  title     = {Privacy-Aware Authentication in the Internet of Things},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {32--39},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/KawaiHKM15,
  author    = {Yutaka Kawai and
               Takato Hirano and
               Yoshihiro Koseki and
               Tatsuji Munaka},
  title     = {{SEPM:} Efficient Partial Keyword Search on Encrypted Data},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {75--91},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/KikuchiCIH15,
  author    = {Ryo Kikuchi and
               Koji Chida and
               Dai Ikarashi and
               Koki Hamada},
  title     = {Practical Password-Based Authentication Protocol for Secret Sharing
               Based Multiparty Computation},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {179--196},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/KilicE15,
  author    = {Fatih Kili{\c{c}} and
               Claudia Eckert},
  title     = {iDeFEND: Intrusion Detection Framework for Encrypted Network Data},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {111--118},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/LeontiadisEOM15,
  author    = {Iraklis Leontiadis and
               Kaoutar Elkhiyaoui and
               Melek {\"{O}}nen and
               Refik Molva},
  title     = {{PUDA} - Privacy and Unforgeability for Data Aggregation},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {3--18},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/LiangLC15,
  author    = {Bei Liang and
               Hongda Li and
               Jinyong Chang},
  title     = {Verifiable Random Functions from (Leveled) Multilinear Maps},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {129--143},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/LipmaaP15,
  author    = {Helger Lipmaa and
               Kateryna Pavlyk},
  title     = {Analysis and Implementation of an Efficient Ring-LPN Based Commitment
               Scheme},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {160--175},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/ViscontiBRC15,
  author    = {Andrea Visconti and
               Simone Bossi and
               Hany Ragab and
               Alexandro Cal{\`{o}}},
  title     = {On the Weaknesses of {PBKDF2}},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {119--126},
  publisher = {Springer},
  year      = {2015}
}
@inproceedings{DBLP:conf/cans/ZiegeldorfHHWW15,
  author    = {Jan Henrik Ziegeldorf and
               Jens Hiller and
               Martin Henze and
               Hanno Wirtz and
               Klaus Wehrle},
  title     = {Bandwidth-Optimized Secure Two-Party Computation of Minima},
  booktitle = {{CANS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  pages     = {197--213},
  publisher = {Springer},
  year      = {2015}
}
@proceedings{DBLP:conf/cans/2015,
  editor    = {Michael Reiter and
               David Naccache},
  title     = {Cryptology and Network Security - 14th International Conference, {CANS}
               2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9476},
  publisher = {Springer},
  year      = {2015}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics