Search dblp for Publications

export results for "toc:db/conf/cans/cans2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cans/AnandSS15,
  author       = {S. Abhishek Anand and
                  Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic
                  Passwords Using Acoustic Signals},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_7},
  doi          = {10.1007/978-3-319-26823-1\_7},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AnandSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BossiV15,
  author       = {Simone Bossi and
                  Andrea Visconti},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {What Users Should Know About Full Disk Encryption Based on {LUKS}},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {225--237},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_16},
  doi          = {10.1007/978-3-319-26823-1\_16},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BossiV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Bouij-PasquierK15,
  author       = {Imane Bouij{-}Pasquier and
                  Anas Abou El Kalam and
                  Abdellah Ait Ouahman and
                  Mina De Montfort},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {A Security Framework for Internet of Things},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {19--31},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_2},
  doi          = {10.1007/978-3-319-26823-1\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Bouij-PasquierK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CarterMTB15,
  author       = {Henry Carter and
                  Benjamin Mood and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Outsourcing Secure Two-Party Computation as a Black Box},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {214--222},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_15},
  doi          = {10.1007/978-3-319-26823-1\_15},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CarterMTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DongK15,
  author       = {Changyu Dong and
                  Franziskus Kiefer},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Secure Set-Based Policy Checking and Its Application to Password Registration},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {59--74},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_5},
  doi          = {10.1007/978-3-319-26823-1\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DongK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DoussAYF15,
  author       = {Aida Ben Chehida Douss and
                  Ryma Abassi and
                  Nihel Ben Youssef and
                  Sihem Guemara El Fatmi},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {A Formal Environment for {MANET} Organization and Security},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_11},
  doi          = {10.1007/978-3-319-26823-1\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DoussAYF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GharamSB15,
  author       = {Maroua Gharam and
                  Meriem Salhi and
                  Noureddine Boudriga},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {An LTE-Based {VPN} for Enhancing QoS and Authentication in Smallcell
                  Enterprise Networks},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {248--256},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_18},
  doi          = {10.1007/978-3-319-26823-1\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GharamSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GhilenAB15,
  author       = {Aymen Ghilen and
                  Mostafa Azizi and
                  Ridha Bouallegue},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Q-OpenVPN: {A} New Extension of OpenVPN Based on a Quantum Scheme
                  for Authentication and Key Distribution},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {238--247},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_17},
  doi          = {10.1007/978-3-319-26823-1\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GhilenAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GiacomelliOR15,
  author       = {Irene Giacomelli and
                  Ruxandra F. Olimid and
                  Samuel Ranellucci},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Security of Linear Secret-Sharing Schemes Against Mass Surveillance},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {43--58},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_4},
  doi          = {10.1007/978-3-319-26823-1\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/GiacomelliOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GrossHSS15,
  author       = {Hannes Gro{\ss} and
                  Marko H{\"{o}}lbl and
                  Daniel Slamanig and
                  Raphael Spreitzer},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Privacy-Aware Authentication in the Internet of Things},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {32--39},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_3},
  doi          = {10.1007/978-3-319-26823-1\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/GrossHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KawaiHKM15,
  author       = {Yutaka Kawai and
                  Takato Hirano and
                  Yoshihiro Koseki and
                  Tatsuji Munaka},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {{SEPM:} Efficient Partial Keyword Search on Encrypted Data},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {75--91},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_6},
  doi          = {10.1007/978-3-319-26823-1\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KawaiHKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KikuchiCIH15,
  author       = {Ryo Kikuchi and
                  Koji Chida and
                  Dai Ikarashi and
                  Koki Hamada},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Practical Password-Based Authentication Protocol for Secret Sharing
                  Based Multiparty Computation},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {179--196},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_13},
  doi          = {10.1007/978-3-319-26823-1\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KikuchiCIH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KilicE15,
  author       = {Fatih Kili{\c{c}} and
                  Claudia Eckert},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {iDeFEND: Intrusion Detection Framework for Encrypted Network Data},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {111--118},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_8},
  doi          = {10.1007/978-3-319-26823-1\_8},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/KilicE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LeontiadisEOM15,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {{PUDA} - Privacy and Unforgeability for Data Aggregation},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_1},
  doi          = {10.1007/978-3-319-26823-1\_1},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/LeontiadisEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LiangLC15,
  author       = {Bei Liang and
                  Hongda Li and
                  Jinyong Chang},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Verifiable Random Functions from (Leveled) Multilinear Maps},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {129--143},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_10},
  doi          = {10.1007/978-3-319-26823-1\_10},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LiangLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LipmaaP15,
  author       = {Helger Lipmaa and
                  Kateryna Pavlyk},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Analysis and Implementation of an Efficient Ring-LPN Based Commitment
                  Scheme},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_12},
  doi          = {10.1007/978-3-319-26823-1\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LipmaaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ViscontiBRC15,
  author       = {Andrea Visconti and
                  Simone Bossi and
                  Hany Ragab and
                  Alexandro Cal{\`{o}}},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {On the Weaknesses of {PBKDF2}},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {119--126},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_9},
  doi          = {10.1007/978-3-319-26823-1\_9},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ViscontiBRC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZiegeldorfHHWW15,
  author       = {Jan Henrik Ziegeldorf and
                  Jens Hiller and
                  Martin Henze and
                  Hanno Wirtz and
                  Klaus Wehrle},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Bandwidth-Optimized Secure Two-Party Computation of Minima},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_14},
  doi          = {10.1007/978-3-319-26823-1\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ZiegeldorfHHWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2015,
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1},
  doi          = {10.1007/978-3-319-26823-1},
  isbn         = {978-3-319-26822-4},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics