Search dblp for Publications

export results for "toc:db/conf/acisp/acisp2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acisp/AhmadiSA18,
  author       = {Ahmad Ahmadi and
                  Reihaneh Safavi{-}Naini and
                  Md. Mamunur Rashid Akand},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {New Attacks and Secure Design for Anonymous Distance-Bounding},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {598--616},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_34},
  doi          = {10.1007/978-3-319-93638-3\_34},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AhmadiSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AnadaKMW18,
  author       = {Hiroaki Anada and
                  Akira Kanaoka and
                  Natsume Matsuzaki and
                  Yohei Watanabe},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Key-Updatable Public-Key Encryption with Keyword Search: Models and
                  Generic Constructions},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {341--359},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_20},
  doi          = {10.1007/978-3-319-93638-3\_20},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AnadaKMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BarbarSZCX18,
  author       = {Mohamad Barbar and
                  Yulei Sui and
                  Hongyu Zhang and
                  Shiping Chen and
                  Jingling Xue},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Live Path {CFI} Against Control Flow Hijacking Attacks},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {768--779},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_45},
  doi          = {10.1007/978-3-319-93638-3\_45},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BarbarSZCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoyenH18,
  author       = {Xavier Boyen and
                  Thomas Haines},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Forward-Secure Linkable Ring Signatures},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_15},
  doi          = {10.1007/978-3-319-93638-3\_15},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoyenH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CheonJKL18,
  author       = {Jung Hee Cheon and
                  Jinhyuck Jeong and
                  Dongwoo Kim and
                  Jongchan Lee},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A Reusable Fuzzy Extractor with Practical Storage Size: Modifying
                  Canetti et al.'s Construction},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {28--44},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_3},
  doi          = {10.1007/978-3-319-93638-3\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CheonJKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiHX018,
  author       = {Jie Cui and
                  Jiantao He and
                  Yan Xu and
                  Hong Zhong},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {{TDDAD:} Time-Based Detection and Defense Scheme Against DDoS Attack
                  on {SDN} Controller},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {649--665},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_37},
  doi          = {10.1007/978-3-319-93638-3\_37},
  timestamp    = {Wed, 20 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiHX018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DavidDL18,
  author       = {Bernardo David and
                  Rafael Dowsley and
                  Mario Larangeira},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {21 - Bringing Down the Complexity: Fast Composable Protocols for Card
                  Games Without Secret State},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {45--63},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_4},
  doi          = {10.1007/978-3-319-93638-3\_4},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DavidDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DingFR18,
  author       = {Jintai Ding and
                  Scott R. Fluhrer and
                  Saraswathy RV},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Complete Attack on {RLWE} Key Exchange with Reused Keys, Without Signal
                  Leakage},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {467--486},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_27},
  doi          = {10.1007/978-3-319-93638-3\_27},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DingFR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Heys18,
  author       = {Howard M. Heys},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application
                  to Stream Ciphers and Counter Mode)},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {135--153},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_9},
  doi          = {10.1007/978-3-319-93638-3\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Heys18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuLCL18,
  author       = {Ziyuan Hu and
                  Shengli Liu and
                  Kefei Chen and
                  Joseph K. Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Revocable Identity-Based Encryption from the Computational Diffie-Hellman
                  Problem},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {265--283},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_16},
  doi          = {10.1007/978-3-319-93638-3\_16},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuLCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuZ18,
  author       = {Kexin Hu and
                  Zhenfeng Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Fast Lottery-Based Micropayments for Decentralized Currencies},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {669--686},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_38},
  doi          = {10.1007/978-3-319-93638-3\_38},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ItoM18,
  author       = {Ryoma Ito and
                  Atsuko Miyaji},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {New Iterated {RC4} Key Correlations},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {154--171},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_10},
  doi          = {10.1007/978-3-319-93638-3\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ItoM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KikuchiIMHC18,
  author       = {Ryo Kikuchi and
                  Dai Ikarashi and
                  Takahiro Matsuda and
                  Koki Hamada and
                  Koji Chida},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Efficient Bit-Decomposition and Modulus-Conversion Protocols with
                  an Honest Majority},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {64--82},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_5},
  doi          = {10.1007/978-3-319-93638-3\_5},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/KikuchiIMHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KilincV18,
  author       = {Handan Kilin{\c{c}} and
                  Serge Vaudenay},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Secure Contactless Payment},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {579--597},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_33},
  doi          = {10.1007/978-3-319-93638-3\_33},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KilincV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimLP18,
  author       = {Eunkyung Kim and
                  Hyang{-}Sook Lee and
                  Jeongeun Park},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Towards Round-Optimal Secure Multiparty Computations: Multikey {FHE}
                  Without a {CRS}},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {101--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_7},
  doi          = {10.1007/978-3-319-93638-3\_7},
  timestamp    = {Tue, 26 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiHAM18,
  author       = {Junzuo Lai and
                  Zhengan Huang and
                  Man Ho Au and
                  Xianping Mao},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption
                  from Indistinguishability Obfuscation},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {805--812},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_49},
  doi          = {10.1007/978-3-319-93638-3\_49},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiHAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiYYCD18,
  author       = {Qiqi Lai and
                  Bo Yang and
                  Yong Yu and
                  Yuan Chen and
                  Liju Dong},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Anonymous Identity-Based Hash Proof System from Lattices in the Standard
                  Model},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {539--557},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_31},
  doi          = {10.1007/978-3-319-93638-3\_31},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiYYCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LauT18,
  author       = {Terry Shue Chien Lau and
                  Chik How Tan},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A New Encryption Scheme Based on Rank Metric Codes},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {750--758},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_43},
  doi          = {10.1007/978-3-319-93638-3\_43},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LauT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeWZ18,
  author       = {Hyung Tae Lee and
                  Huaxiong Wang and
                  Kai Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Security Analysis and Modification of ID-Based Encryption with Equality
                  Test from {ACISP} 2017},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {780--786},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_46},
  doi          = {10.1007/978-3-319-93638-3\_46},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiLNP18,
  author       = {Haoyu Li and
                  Renzhang Liu and
                  Abderrahmane Nitaj and
                  Yanbin Pan},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Cryptanalysis of the Randomized Version of a Lattice-Based Signature
                  Scheme from PKC'08},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {455--466},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_26},
  doi          = {10.1007/978-3-319-93638-3\_26},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiLNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiLX18,
  author       = {Shimin Li and
                  Bei Liang and
                  Rui Xue},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Private Functional Signatures: Definition and Construction},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {284--303},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_17},
  doi          = {10.1007/978-3-319-93638-3\_17},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuCWW18,
  author       = {Chi Liu and
                  Rongmao Chen and
                  Yi Wang and
                  Yongjun Wang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Asymmetric Subversion Attacks on Signature Schemes},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {376--395},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_22},
  doi          = {10.1007/978-3-319-93638-3\_22},
  timestamp    = {Thu, 21 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuCWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Ximeng Liu and
                  Xiaofeng Wang and
                  Shuhui Chen and
                  Ho{-}fung Leung},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
                  Data from Multiple Parties},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_25},
  doi          = {10.1007/978-3-319-93638-3\_25},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuZA18,
  author       = {Xingye Lu and
                  Zhenfei Zhang and
                  Man Ho Au},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Practical Signatures from the Partial Fourier Recovery Problem Revisited:
                  {A} Provably-Secure and Gaussian-Distributed Construction},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {813--820},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_50},
  doi          = {10.1007/978-3-319-93638-3\_50},
  timestamp    = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LuZA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaWL18,
  author       = {Xuecheng Ma and
                  Xin Wang and
                  Dongdai Lin},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Anonymous Identity-Based Encryption with Identity Recovery},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {360--375},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_21},
  doi          = {10.1007/978-3-319-93638-3\_21},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MarriereNV18,
  author       = {Nicolas Marri{\`{e}}re and
                  Val{\'{e}}rie Nachef and
                  Emmanuel Volte},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Differential Attacks on Reduced Round {LILLIPUT}},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {188--206},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_12},
  doi          = {10.1007/978-3-319-93638-3\_12},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MarriereNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MengWLLLP18,
  author       = {Weizhi Meng and
                  Yu Wang and
                  Wenjuan Li and
                  Zhe Liu and
                  Jin Li and
                  Christian W. Probst},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection
                  Systems via Edge Computing},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {759--767},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_44},
  doi          = {10.1007/978-3-319-93638-3\_44},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MengWLLLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Naito18,
  author       = {Yusuke Naito},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Keyed Sponge with Prefix-Free Padding: Independence Between Capacity
                  and Online Queries Without the Suffix Key},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {225--242},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_14},
  doi          = {10.1007/978-3-319-93638-3\_14},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Naito18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PaulS18,
  author       = {Souradyuti Paul and
                  Ananya Shrivastava},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Robust Multiparty Computation with Faster Verification Time},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {114--131},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_8},
  doi          = {10.1007/978-3-319-93638-3\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PaulS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengLKZH18,
  author       = {Liqiang Peng and
                  Yao Lu and
                  Noboru Kunihiro and
                  Rui Zhang and
                  Lei Hu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A Deterministic Algorithm for Computing Divisors in an Interval},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_1},
  doi          = {10.1007/978-3-319-93638-3\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengLKZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SarkarBN18,
  author       = {Pinaki Sarkar and
                  Mayank Baranwal and
                  Sukumar Nandi},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {{CRT-KPS:} {A} Key Predistribution Schemes Using {CRT}},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {821--830},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_51},
  doi          = {10.1007/978-3-319-93638-3\_51},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SarkarBN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SarkarS18,
  author       = {Sumanta Sarkar and
                  Habeeb Syed},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Bounds on Differential and Linear Branch Number of Permutations},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_13},
  doi          = {10.1007/978-3-319-93638-3\_13},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SarkarS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShenL0HCZ18,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Jiageng Chen and
                  Mingwu Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Secure Publicly Verifiable Computation with Polynomial Commitment
                  in Cloud Computing},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {417--430},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_24},
  doi          = {10.1007/978-3-319-93638-3\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ShenL0HCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunCHC18,
  author       = {Yeali S. Sun and
                  Chien{-}Chun Chen and
                  Shun{-}Wen Hsiao and
                  Meng Chang Chen},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis
                  for Android Apps},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {796--804},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_48},
  doi          = {10.1007/978-3-319-93638-3\_48},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunCHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunZF18,
  author       = {Yinxia Sun and
                  Futai Zhang and
                  Anmin Fu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Revocable Certificateless Encryption with Ciphertext Evolution},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {741--749},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_42},
  doi          = {10.1007/978-3-319-93638-3\_42},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SunZF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TorresSSLKBAC18,
  author       = {Wilson Abel Alberto Torres and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Joseph K. Liu and
                  Veronika Kuchta and
                  Nandita Bhattacharjee and
                  Man Ho Au and
                  Jacob Cheng},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Post-Quantum One-Time Linkable Ring Signature and Application to Ring
                  Confidential Transactions in Blockchain (Lattice RingCT v1.0)},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {558--576},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_32},
  doi          = {10.1007/978-3-319-93638-3\_32},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TorresSSLKBAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangIDT18,
  author       = {Yacheng Wang and
                  Yasuhiko Ikematsu and
                  Dung Hoang Duong and
                  Tsuyoshi Takagi},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Efficient Decryption Algorithms for Extension Field Cancellation Type
                  Encryption Schemes},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {487--501},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_28},
  doi          = {10.1007/978-3-319-93638-3\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangIDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangT18,
  author       = {Yuntao Wang and
                  Tsuyoshi Takagi},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Improving the {BKZ} Reduction Algorithm by Quick Reordering Technique},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {787--795},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_47},
  doi          = {10.1007/978-3-319-93638-3\_47},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WenL18,
  author       = {Yunhua Wen and
                  Shengli Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Reusable Fuzzy Extractor from {LWE}},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_2},
  doi          = {10.1007/978-3-319-93638-3\_2},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WenL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XiaS0ZZ18,
  author       = {Zhe Xia and
                  Liuying Sun and
                  Bo Yang and
                  Yanwei Zhou and
                  Mingwu Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications
                  to Optimal Resilient Proactive Cryptosystems},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {83--100},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_6},
  doi          = {10.1007/978-3-319-93638-3\_6},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XiaS0ZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuDC018,
  author       = {Yan Xu and
                  Ran Ding and
                  Jie Cui and
                  Hong Zhong},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud
                  Computing},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {399--416},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_23},
  doi          = {10.1007/978-3-319-93638-3\_23},
  timestamp    = {Wed, 20 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/XuDC018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangAXY18,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Qiuliang Xu and
                  Zuoxia Yu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Decentralized Blacklistable Anonymous Credentials with Reputation},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {720--738},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_41},
  doi          = {10.1007/978-3-319-93638-3\_41},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangAXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YeT18,
  author       = {Chen{-}Dong Ye and
                  Tian Tian},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A New Framework for Finding Nonlinear Superpolies in Cube Attacks
                  Against Trivium-Like Ciphers},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_11},
  doi          = {10.1007/978-3-319-93638-3\_11},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YeT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YinWZL18,
  author       = {Jiayuan Yin and
                  Changren Wang and
                  Zongyang Zhang and
                  Jianwei Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Revisiting the Incentive Mechanism of Bitcoin-NG},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {706--719},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_40},
  doi          = {10.1007/978-3-319-93638-3\_40},
  timestamp    = {Wed, 11 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YinWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuAYLX18,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Rupeng Yang and
                  Junzuo Lai and
                  Qiuliang Xu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Lattice-Based Universal Accumulator with Nonmembership Arguments},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {502--519},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_29},
  doi          = {10.1007/978-3-319-93638-3\_29},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuAYLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZengLYXW18,
  author       = {Yali Zeng and
                  Xu Li and
                  Xu Yang and
                  Qikui Xu and
                  Dongcheng Wang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A Practical Privacy Preserving Protocol in Database-Driven Cognitive
                  Radio Networks},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {634--648},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_36},
  doi          = {10.1007/978-3-319-93638-3\_36},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZengLYXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLLLG18,
  author       = {Yuncong Zhang and
                  Yu Long and
                  Zhen Liu and
                  Zhiqiang Liu and
                  Dawu Gu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Z-Channel: Scalable and Efficient Scheme in Zerocash},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {687--705},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_39},
  doi          = {10.1007/978-3-319-93638-3\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLLLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangZLLXL18,
  author       = {Daode Zhang and
                  Kai Zhang and
                  Bao Li and
                  Xianhui Lu and
                  Haiyang Xue and
                  Jie Li},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Lattice-Based Dual Receiver Encryption and More},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {520--538},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_30},
  doi          = {10.1007/978-3-319-93638-3\_30},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangZLLXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhengWQZHL18,
  author       = {Haibin Zheng and
                  Qianhong Wu and
                  Bo Qin and
                  Lin Zhong and
                  Shuangyu He and
                  Jianwei Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Linkable Group Signature for Auditing Anonymous Communication},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {304--321},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_18},
  doi          = {10.1007/978-3-319-93638-3\_18},
  timestamp    = {Wed, 29 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhengWQZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhongWQZL18,
  author       = {Lin Zhong and
                  Qianhong Wu and
                  Bo Qin and
                  Haibin Zheng and
                  Jianwei Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Auditable Hierarchy-Private Public-Key Encryption},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {322--340},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_19},
  doi          = {10.1007/978-3-319-93638-3\_19},
  timestamp    = {Wed, 29 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhongWQZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZouDL018,
  author       = {Deqing Zou and
                  Zhijun Deng and
                  Zhen Li and
                  Hai Jin},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Automatically Identifying Security Bug Reports via Multitype Features
                  Analysis},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {619--633},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_35},
  doi          = {10.1007/978-3-319-93638-3\_35},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZouDL018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2018,
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3},
  doi          = {10.1007/978-3-319-93638-3},
  isbn         = {978-3-319-93637-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics