Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cans/cans2015.bht:"
@inproceedings{DBLP:conf/cans/AnandSS15, author = {S. Abhishek Anand and Prakash Shrestha and Nitesh Saxena}, editor = {Michael K. Reiter and David Naccache}, title = {Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {95--110}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_7}, doi = {10.1007/978-3-319-26823-1\_7}, timestamp = {Mon, 02 Jan 2023 08:05:35 +0100}, biburl = {https://dblp.org/rec/conf/cans/AnandSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BossiV15, author = {Simone Bossi and Andrea Visconti}, editor = {Michael K. Reiter and David Naccache}, title = {What Users Should Know About Full Disk Encryption Based on {LUKS}}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {225--237}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_16}, doi = {10.1007/978-3-319-26823-1\_16}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/BossiV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Bouij-PasquierK15, author = {Imane Bouij{-}Pasquier and Anas Abou El Kalam and Abdellah Ait Ouahman and Mina De Montfort}, editor = {Michael K. Reiter and David Naccache}, title = {A Security Framework for Internet of Things}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {19--31}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_2}, doi = {10.1007/978-3-319-26823-1\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/Bouij-PasquierK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CarterMTB15, author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin R. B. Butler}, editor = {Michael K. Reiter and David Naccache}, title = {Outsourcing Secure Two-Party Computation as a Black Box}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {214--222}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_15}, doi = {10.1007/978-3-319-26823-1\_15}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/CarterMTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DongK15, author = {Changyu Dong and Franziskus Kiefer}, editor = {Michael K. Reiter and David Naccache}, title = {Secure Set-Based Policy Checking and Its Application to Password Registration}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {59--74}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_5}, doi = {10.1007/978-3-319-26823-1\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DongK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DoussAYF15, author = {Aida Ben Chehida Douss and Ryma Abassi and Nihel Ben Youssef and Sihem Guemara El Fatmi}, editor = {Michael K. Reiter and David Naccache}, title = {A Formal Environment for {MANET} Organization and Security}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {144--159}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_11}, doi = {10.1007/978-3-319-26823-1\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DoussAYF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GharamSB15, author = {Maroua Gharam and Meriem Salhi and Noureddine Boudriga}, editor = {Michael K. Reiter and David Naccache}, title = {An LTE-Based {VPN} for Enhancing QoS and Authentication in Smallcell Enterprise Networks}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {248--256}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_18}, doi = {10.1007/978-3-319-26823-1\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/GharamSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GhilenAB15, author = {Aymen Ghilen and Mostafa Azizi and Ridha Bouallegue}, editor = {Michael K. Reiter and David Naccache}, title = {Q-OpenVPN: {A} New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {238--247}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_17}, doi = {10.1007/978-3-319-26823-1\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/GhilenAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GiacomelliOR15, author = {Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci}, editor = {Michael K. Reiter and David Naccache}, title = {Security of Linear Secret-Sharing Schemes Against Mass Surveillance}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {43--58}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_4}, doi = {10.1007/978-3-319-26823-1\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/GiacomelliOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GrossHSS15, author = {Hannes Gro{\ss} and Marko H{\"{o}}lbl and Daniel Slamanig and Raphael Spreitzer}, editor = {Michael K. Reiter and David Naccache}, title = {Privacy-Aware Authentication in the Internet of Things}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {32--39}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_3}, doi = {10.1007/978-3-319-26823-1\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/GrossHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KawaiHKM15, author = {Yutaka Kawai and Takato Hirano and Yoshihiro Koseki and Tatsuji Munaka}, editor = {Michael K. Reiter and David Naccache}, title = {{SEPM:} Efficient Partial Keyword Search on Encrypted Data}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {75--91}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_6}, doi = {10.1007/978-3-319-26823-1\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/KawaiHKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KikuchiCIH15, author = {Ryo Kikuchi and Koji Chida and Dai Ikarashi and Koki Hamada}, editor = {Michael K. Reiter and David Naccache}, title = {Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {179--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_13}, doi = {10.1007/978-3-319-26823-1\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/KikuchiCIH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KilicE15, author = {Fatih Kili{\c{c}} and Claudia Eckert}, editor = {Michael K. Reiter and David Naccache}, title = {iDeFEND: Intrusion Detection Framework for Encrypted Network Data}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {111--118}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_8}, doi = {10.1007/978-3-319-26823-1\_8}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/KilicE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LeontiadisEOM15, author = {Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, editor = {Michael K. Reiter and David Naccache}, title = {{PUDA} - Privacy and Unforgeability for Data Aggregation}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {3--18}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_1}, doi = {10.1007/978-3-319-26823-1\_1}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/LeontiadisEOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LiangLC15, author = {Bei Liang and Hongda Li and Jinyong Chang}, editor = {Michael K. Reiter and David Naccache}, title = {Verifiable Random Functions from (Leveled) Multilinear Maps}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {129--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_10}, doi = {10.1007/978-3-319-26823-1\_10}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LiangLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LipmaaP15, author = {Helger Lipmaa and Kateryna Pavlyk}, editor = {Michael K. Reiter and David Naccache}, title = {Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {160--175}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_12}, doi = {10.1007/978-3-319-26823-1\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LipmaaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ViscontiBRC15, author = {Andrea Visconti and Simone Bossi and Hany Ragab and Alexandro Cal{\`{o}}}, editor = {Michael K. Reiter and David Naccache}, title = {On the Weaknesses of {PBKDF2}}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {119--126}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_9}, doi = {10.1007/978-3-319-26823-1\_9}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ViscontiBRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ZiegeldorfHHWW15, author = {Jan Henrik Ziegeldorf and Jens Hiller and Martin Henze and Hanno Wirtz and Klaus Wehrle}, editor = {Michael K. Reiter and David Naccache}, title = {Bandwidth-Optimized Secure Two-Party Computation of Minima}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {197--213}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_14}, doi = {10.1007/978-3-319-26823-1\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ZiegeldorfHHWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2015, editor = {Michael K. Reiter and David Naccache}, title = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1}, doi = {10.1007/978-3-319-26823-1}, isbn = {978-3-319-26822-4}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.