Search dblp for Publications

export results for "toc:db/conf/wisa/wisa2010.bht:"

 download as .bib file

@proceedings{DBLP:conf/wisa/2010,
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-17955-6},
  doi          = {10.1007/978-3-642-17955-6},
  isbn         = {978-3-642-17954-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AllailouMM10,
  author       = {Boufeldja Allailou and
                  Abdelaziz Marjane and
                  Abdellah Mokrane},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_6},
  doi          = {10.1007/978-3-642-17955-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AllailouMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AmakiHMO10,
  author       = {Takehiko Amaki and
                  Masanori Hashimoto and
                  Yukio Mitsuyama and
                  Takao Onoye},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {A Design Procedure for Oscillator-Based Hardware Random Number Generator
                  with Stochastic Behavior Modeling},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {107--121},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_8},
  doi          = {10.1007/978-3-642-17955-6\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AmakiHMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BaoZ10,
  author       = {Kehua Bao and
                  Zhenfeng Zhang},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Collusion Attack on a Self-healing Key Distribution with Revocation
                  in Wireless Sensor Networks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {221--233},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_16},
  doi          = {10.1007/978-3-642-17955-6\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/BaoZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DottlingLMA10,
  author       = {Nico D{\"{o}}ttling and
                  Dejan E. Lazich and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Antonio Sobreira de Almeida},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {206--220},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_15},
  doi          = {10.1007/978-3-642-17955-6\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DottlingLMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DowsleyGMN10,
  author       = {Rafael Dowsley and
                  Jeroen van de Graaf and
                  Davidson Marques and
                  Anderson C. A. Nascimento},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {A Two-Party Protocol with Trusted Initializer for Computing the Inner
                  Product},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {337--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_25},
  doi          = {10.1007/978-3-642-17955-6\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DowsleyGMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DowsleyHIN10,
  author       = {Rafael Dowsley and
                  Goichiro Hanaoka and
                  Hideki Imai and
                  Anderson C. A. Nascimento},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Round-Optimal Deniable Ring Authentication in the Presence of Big
                  Brother},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_23},
  doi          = {10.1007/978-3-642-17955-6\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DowsleyHIN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ElaabidMGD10,
  author       = {M. Abdelaziz Elaabid and
                  Olivier Meynard and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combined Side-Channel Attacks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_13},
  doi          = {10.1007/978-3-642-17955-6\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FujiokaSY10,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Predicate-Based Authenticated Key Exchange Resilient to Ephemeral
                  Key Leakage},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {15--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_2},
  doi          = {10.1007/978-3-642-17955-6\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FujiokaSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GallaisKT10,
  author       = {Jean{-}Fran{\c{c}}ois Gallais and
                  Ilya Kizhvatov and
                  Michael Tunstall},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES}
                  Implementations},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_18},
  doi          = {10.1007/978-3-642-17955-6\_18},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/GallaisKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JangYLY10,
  author       = {Jae{-}hoon Jang and
                  Don{-}Gu Yeo and
                  Dong{-}hee Lee and
                  Heung{-}Youl Youm},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {An {IP} Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {150--159},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_11},
  doi          = {10.1007/978-3-642-17955-6\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JangYLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JinLKP10,
  author       = {Changlong Jin and
                  Shengzhe Li and
                  Hakil Kim and
                  Eunsoo Park},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Fingerprint Liveness Detection Based on Multiple Image Quality Features},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {281--291},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_21},
  doi          = {10.1007/978-3-642-17955-6\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JinLKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JingXL10,
  author       = {Wenpan Jing and
                  Haixia Xu and
                  Bao Li},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {A New Efficient Construction for Non-Malleable Zero-Knowledge Sets},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {31--43},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_3},
  doi          = {10.1007/978-3-642-17955-6\_3},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JingXL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Kabasele-Tenday10,
  author       = {Jean{-}Marie Kabasele{-}Tenday},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Using Special Use Cases for Security in the Software Development Life
                  Cycle},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {122--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_9},
  doi          = {10.1007/978-3-642-17955-6\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Kabasele-Tenday10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeCKP10,
  author       = {Hansung Lee and
                  Yunsu Chung and
                  Jeongnyeo Kim and
                  Daihee Park},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP
                  Histogram},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {273--280},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_20},
  doi          = {10.1007/978-3-642-17955-6\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeCKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuQGT10,
  author       = {Hongying Liu and
                  Guoyu Qian and
                  Satoshi Goto and
                  Yukiyasu Tsunoo},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Correlation Power Analysis Based on Switching Glitch Model},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {191--205},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_14},
  doi          = {10.1007/978-3-642-17955-6\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuQGT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MiyajiO10,
  author       = {Atsuko Miyaji and
                  Kazumasa Omote},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Efficient and Optimally Secure In-Network Aggregation in Wireless
                  Sensor Networks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {135--149},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_10},
  doi          = {10.1007/978-3-642-17955-6\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MiyajiO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MiyajiRS10,
  author       = {Atsuko Miyaji and
                  Mohammad Shahriar Rahman and
                  Masakazu Soshi},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Hidden Credential Retrieval without Random Oracles},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_12},
  doi          = {10.1007/978-3-642-17955-6\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MiyajiRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NakatsuLSO10,
  author       = {Daisuke Nakatsu and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combination of {SW} Countermeasure and {CPU} Modification on {FPGA}
                  against Power Analysis},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {258--272},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_19},
  doi          = {10.1007/978-3-642-17955-6\_19},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NakatsuLSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NguyenNK10,
  author       = {Thi Hai Binh Nguyen and
                  Van Huan Nguyen and
                  Hakil Kim},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Robust Feature Extraction for Facial Image Quality Assessment},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {292--306},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_22},
  doi          = {10.1007/978-3-642-17955-6\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NguyenNK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NishideS10,
  author       = {Takashi Nishide and
                  Kouichi Sakurai},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Distributed Paillier Cryptosystem without Trusted Dealer},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {44--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_4},
  doi          = {10.1007/978-3-642-17955-6\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NishideS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PandeyB10,
  author       = {Sumit Kumar Pandey and
                  Rana Barua},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Construction of Identity Based Signcryption Schemes},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_1},
  doi          = {10.1007/978-3-642-17955-6\_1},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PandeyB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SuWZL10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Full-Round Differential Attack on {TWIS} Block Cipher},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {234--242},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_17},
  doi          = {10.1007/978-3-642-17955-6\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SuWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Walter10,
  author       = {Colin D. Walter},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Fast Scalar Multiplication for {ECC} over GF(\emph{p}) Using Division
                  Chains},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_5},
  doi          = {10.1007/978-3-642-17955-6\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Walter10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WengerFF10,
  author       = {Erich Wenger and
                  Martin Feldhofer and
                  Norbert Felber},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless
                  Devices},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_7},
  doi          = {10.1007/978-3-642-17955-6\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WengerFF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Yoneyama10,
  author       = {Kazuki Yoneyama},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Cross-Realm Password-Based Server Aided Key Exchange},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_24},
  doi          = {10.1007/978-3-642-17955-6\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Yoneyama10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics