Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/scn/scn2008.bht:"
@inproceedings{DBLP:conf/scn/BaekGSZ08, author = {Joonsang Baek and David Galindo and Willy Susilo and Jianying Zhou}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Constructing Strong {KEM} from Weak {KEM} (or How to Revive the {KEM/DEM} Framework)}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {358--374}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_24}, doi = {10.1007/978-3-540-85855-3\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaekGSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BagherzandiJ08, author = {Ali Bagherzandi and Stanislaw Jarecki}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {218--235}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_15}, doi = {10.1007/978-3-540-85855-3\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BagherzandiJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaldiBC08, author = {Marco Baldi and Marco Bodrato and Franco Chiaraluce}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {A New Analysis of the McEliece Cryptosystem Based on {QC-LDPC} Codes}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {246--262}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_17}, doi = {10.1007/978-3-540-85855-3\_17}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/BaldiBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BeimelP08, author = {Amos Beimel and Anat Paskin}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {On Linear Secret Sharing for Connectivity in Directed Graphs}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {172--184}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_12}, doi = {10.1007/978-3-540-85855-3\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/BeimelP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BoyenD08, author = {Xavier Boyen and C{\'{e}}cile Delerabl{\'{e}}e}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Expressive Subgroup Signatures}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {185--200}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_13}, doi = {10.1007/978-3-540-85855-3\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BoyenD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BringerCI08, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {77--91}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_6}, doi = {10.1007/978-3-540-85855-3\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BringerCI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Castagnos08, author = {Guilhem Castagnos}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Two Generic Constructions of Probabilistic Cryptosystems and Their Applications}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {92--108}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_7}, doi = {10.1007/978-3-540-85855-3\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Castagnos08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Chevallier-MamesNS08, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Jacques Stern}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Linear Bandwidth Naccache-Stern Encryption}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {327--339}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_22}, doi = {10.1007/978-3-540-85855-3\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Chevallier-MamesNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChowRR08, author = {Sherman S. M. Chow and Volker Roth and Eleanor Gilbert Rieffel}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {General Certificateless Encryption and Timed-Release Encryption}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {126--143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_9}, doi = {10.1007/978-3-540-85855-3\_9}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/ChowRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Coron08, author = {Jean{-}S{\'{e}}bastien Coron}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {A New {DPA} Countermeasure Based on Permutation Tables}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {278--292}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_19}, doi = {10.1007/978-3-540-85855-3\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Coron08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FuchsbauerP08, author = {Georg Fuchsbauer and David Pointcheval}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Anonymous Proxy Signatures}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {201--217}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_14}, doi = {10.1007/978-3-540-85855-3\_14}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/FuchsbauerP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FurukawaAK08, author = {Jun Furukawa and Frederik Armknecht and Kaoru Kurosawa}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {392--408}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_26}, doi = {10.1007/978-3-540-85855-3\_26}, timestamp = {Sat, 30 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/FurukawaAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Halevi08, author = {Shai Halevi}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Storage Encryption: {A} Cryptographer's View}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {1}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_1}, doi = {10.1007/978-3-540-85855-3\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Halevi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/IzabacheneP08, author = {Malika Izabach{\`{e}}ne and David Pointcheval}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {New Anonymity Notions for Identity-Based Encryption}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {375--391}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_25}, doi = {10.1007/978-3-540-85855-3\_25}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/IzabacheneP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/JerschowLSM08, author = {Yves Igor Jerschow and Christian Lochert and Bj{\"{o}}rn Scheuermann and Martin Mauve}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {{CLL:} {A} Cryptographic Link Layer for Local Area Networks}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {21--38}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_3}, doi = {10.1007/978-3-540-85855-3\_3}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/JerschowLSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KanukurthiR08, author = {Bhavana Kanukurthi and Leonid Reyzin}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {An Improved Robust Fuzzy Extractor}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {156--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_11}, doi = {10.1007/978-3-540-85855-3\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KanukurthiR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KiayiasXY08, author = {Aggelos Kiayias and Shouhuai Xu and Moti Yung}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Privacy Preserving Data Mining within Anonymous Credential Systems}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {57--76}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_5}, doi = {10.1007/978-3-540-85855-3\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KiayiasXY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LindellPS08, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {2--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_2}, doi = {10.1007/978-3-540-85855-3\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/LindellPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LiuZ08, author = {Joseph K. Liu and Jianying Zhou}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Efficient Certificate-Based Encryption in the Standard Model}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {144--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_10}, doi = {10.1007/978-3-540-85855-3\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/LiuZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/MollerR08, author = {Bodo M{\"{o}}ller and Andy Rupp}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Faster Multi-exponentiation through Caching: Accelerating {(EC)DSA} Signature Verification}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {39--56}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_4}, doi = {10.1007/978-3-540-85855-3\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/MollerR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NikovaRS08, author = {Svetla Nikova and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Using Normal Bases for Compact Hardware Implementations of the {AES} S-Box}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {236--245}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_16}, doi = {10.1007/978-3-540-85855-3\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/NikovaRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PatersonW08, author = {Kenneth G. Paterson and Gaven J. Watson}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Immunising {CBC} Mode Against Padding Oracle Attacks: {A} Formal Security Treatment}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {340--357}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_23}, doi = {10.1007/978-3-540-85855-3\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PatersonW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PatraCR08, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {309--326}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_21}, doi = {10.1007/978-3-540-85855-3\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PatraCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PetitLQ08, author = {Christophe Petit and Kristin E. Lauter and Jean{-}Jacques Quisquater}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Full Cryptanalysis of {LPS} and Morgenstern Hash Functions}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {263--277}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_18}, doi = {10.1007/978-3-540-85855-3\_18}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/PetitLQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/SchriddeSF08, author = {Christian Schridde and Matthew Smith and Bernd Freisleben}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {An Identity-Based Key Agreement Protocol for the Network Layer}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {409--422}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_27}, doi = {10.1007/978-3-540-85855-3\_27}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/SchriddeSF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/TeranishiO08, author = {Isamu Teranishi and Wakaha Ogata}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {109--125}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_8}, doi = {10.1007/978-3-540-85855-3\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/TeranishiO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Wikstrom08, author = {Douglas Wikstr{\"{o}}m}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Simplified Submission of Inputs to Protocols}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {293--308}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_20}, doi = {10.1007/978-3-540-85855-3\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Wikstrom08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2008, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, publisher = {Springer}, year = {2008}, url = {http://www.springerlink.com/content/978-3-540-85854-6/\#section=249631\&page=1}, isbn = {978-3-540-85854-6}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.