- A Bibliography of Publications on : 2010–2019

Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 09 June 2021 Version 1.518

Title word cross-reference $9 [APPVP15]. = [JJUW10]. + [PYH+18]. 2 [YNX+16]. 3 [LHM14]. MT [HRB13]. α [TTL10]. c [KRDH13]. d [QD16]. d × d [KA17]. ` [ZTL15]. F + νF [WGF16]. γ (2, 2) [KSSY12, LTC+15b]. (K, N) p p [DWZ12]. GF(2)[x] [SF12]. GF(2m) [Bai10, YC11]. (n, t, n) [LHYZ12]. (t, n) [HJ19, SKH15]. GF(2n) [LBOX12]. K [QD16, ZPWY12]. 0 [XHX+17]. 1 [FXP12, FR16, CHX13, SG19a, XMY+17, [XHX+17]. 1, 2, 3 [SMDS11]. $100 [Sch16a]. XLP+18, ZZC17, ZHT16]. L(1/4+o(1)) 11 [LJ17]. 13 [Blo15]. 2 [Jou13]. M [MMSD13, O¸¨ S11]. F 6509 [AM19, DBPS12, EAA+16, ESS12, JR13, 3 [AMORH13]. F [SS13]. NP [HN10]. MCDB12, PGLL10, WK18, WY12]. 22 GF(24)2 [GM16b]. GF(28) [GM16b]. GF(q) [MNP12]. 2k [Sun16]. 3 [LPdS10]. LWE [BV14]. µ [Jia14a]. N [AP10, Bro19, CG12b, DWWZ12, FWS13, [FR16]. n × k(k ≥ n/2) [MC11]. O(d13d) GZHD12, GH11a, KWS+12, LJ17, LJ15, [KA17]. O(n2) [KS11]. P [DG17, GT19]. π MKH+12, RS16, SS10b, SS12a, SGS14, [EHKSS19]. 1 [HZW+14]. q WSSO12, tWmC12, YT11a, YI14, YPRI17]. [CZCD18, GMS11]. S [LJ15]. t 32 × 32 [SA14]. 3 × 3[AMVZ12].´ 4 [HJM+11, Oba11]. w [Kre13]. [COP+14, DWZ12, HLYS14]. $49.00 [Sch15a]. 5 [YN19]. 8 [LPO+17, ZSH+19].

2 3

-ary [CZCD18]. -band [MMSD13]. -Bit 384-bit [MMN12]. 3GPP [FPBG14]. [LPO+17, ZSH+19]. -boxes [LJ15]. -Cheater [Oba11]. -Cipher [EHKSS19]. -D 4 [Jac16, YYO15]. 42-step [AKY13]. 4765 [AM19, MCDB12]. -dimensional [ABC+12]. 4G [FMA+18]. 4th [Yan11]. [DWZ12, QD16]. -Diversity [ZTL15]. -Encoded [DG17]. -Encoding [XHX+17]. 5/3 [Ara13]. 512 [GV14b]. 512-bit -Means [KRDH13, SG19a]. -Multiple [APPVP15]. 51st [IEE10]. 52nd [IEE11b]. [LTC+15b]. -nearest [XMY+17]. -NN 5G [BBTC20, CML+18, FMA+18, GLL16, [ZZC17, ZHT16]. -Party [JR13]. -private PSM+18, SAM+18, YHSW19]. 5G-based [HJM+11]. -Round [COP+14, LJ17, Blo15]. [BBTC20]. 5th [BYL10, vDKS11]. -SDH [GMS11]. -Security [Jia14a]. -spotty [O¸¨ S11]. -trimmed [TTL10]. 6 [Ano17b, Bai12, Mur10]. 64/128 [LJ18]. 65th [Nac12]. 6LoWPAN [BNNH19]. .onion [Boy16]. 72 [HYS18]. 768-bit [KFL+10]. 795-bit 0.13um [KLM+12]. [BGG+19].

1 [AAE+14, Ano15b, BH15, Bar16a, 8.8/11.2 [GLIC10]. 800 [MMKP16]. CGCS12, Con17, Ful10, MSas12, SKP15]. 800-160 [MMKP16]. 802.11 1-58488-551-3 [Ful10]. ’10 [Ano10a]. 1024 [FLH13, ZBR11]. 802.11s [BOB13]. [Bro17, Win17]. 10Gbps [PRGBSAC19]. 802.15.4 [NBZP17]. 802.16e [CL11]. 10th [LTW11, Pie10, Sah13]. 11th 802.16m [FZZ+12]. 85 [WZM12a]. [GG10, Lin14b]. 128 [LJ18, LYD+18, TSLL11]. 128-Bit [GV14b]. 959 [ACZ16].´ 978 12th [BC11, LH10a]. 13-round [TSLL11]. [Ano15b, Ano17b, Bai12, Mur10]. 13th [Che11]. 15th [Dan12, FBM12]. 16 978-0-691-14175-6 [Ano17b]. [ZAG19]. 160 [MMKP16, WLC12]. 16th 978-0-8218-8321-1 [Sch15a]. [Abe10]. 17th [LW11a, Wes16, Ano10a]. 978-1-4200-4757-8 [Joh10]. 18th [MV12]. 192 [Blo15]. 1st [CGB+10]. 978-1-78548-004-1 [Ano15b]. 978-1-84832-615-6 [Bai12]. 2-Party [BBKL19]. 2-torsion [HR19]. 2.0 978-3-540-49243-6 [Mur10]. 9798 [NVM+17, PC16]. 2000 [ZC12]. 2003 [BCM12, BCM13]. 9th [Sha10]. 2008 [Mei10]. 2010 [Cra12, GLIC10, HWG10]. [Ano10a, Ano11b, CGB+10]. 2011 [Gre11, LCK11]. 2013 [IEE13]. 2015 AAA [BT18, MLM16]. AAA-based [IEE15]. 2016 [MSH+16, Wes16]. 2018 [MLM16]. AAoT [FQZF18]. Abandon [Ten18]. 2019 [TBL19]. 21st [IEE13, JY14]. [Loe15]. ABE 23nd [MSH+16]. 256 [FJHJ12, HQZH14, HLC+19, OSNZ19, [AKY13, App15, MAK+12]. 25th [TT18]. QZZ18, TY16a, YMC+17, ZSW+18b]. 26th [TBL19]. 29th [Gil10]. 2D abelian [HIDFGPC15]. [CDSLY14, HWS+19, LR15, Sch19b]. ability [WS12]. abnormal [AKM+15]. ABO 3 [ABM+12, BD15, jCPB+12, Ful10, LC17, [ZYY19]. ABO-LTFs [ZYY19]. Abort Mor19a, NIS15]. 30th [Rab10]. 31st [PJ12]. [EFGT18]. absence [AGH+17]. Abstract 4

[Bul10a, CFR11, MZ17b]. Abstraction [LLG15]. Across [HZS+19]. absurd [Fai19]. abuse [LQD+16, HWZP18, HFS+19, TYK+12]. [JSMG18a, QRW+18]. Abusing [VWC19]. activation [BCND19]. Active Academic [NSP+18, SDC+17]. Accelerate [LJ15, LHW18, WJ19, AGLW16, BAB+13]. [Roh19]. Accelerating [AVAH18, CMO+16, Activities [HWZZ19, DIMT12]. Activity DOS15, SKH15, XZL+19]. acceleration [NTKG17, uHAN+18]. Ad [LH12, PD14, [BYDC19]. Accelerator She14, SS15, XHC+12, BBB19, KM10b, [LLD19, MSR+17, MRL+18, ODSS17,¨ PC16, LXJ14, PY19, SGGCR+16, WXSH19]. WOLP15, PABC´ +19]. Accelerators Ad-Hoc [PD14, PY19]. Adam [Bar12]. [AW15, AW17, GP17, HKL+14, OSH16, adaptation [MCRB19]. adapted [IMB17]. BAB+13, KKJ+16]. accelerometers Adaptive [ACKB19, CT11a, zGXW12, [ZZL+18]. ACCENT [PP11]. Acceptance GLG12, HZW+14, HXHP17, HLAZ15, [SPM+13]. Access [AMSPL19, AWSS17, IAD10, Jin10, KD12a, Lin15, PWLL13, BFK+10, CO11, CGH11, DLZ+16b, FCM14, PMG+19b, SOS15, VFFHF19, CLP+13b, GRRZ18, HLC+18, HP12, LGLK17, LPL15, dCCSM+12, dCCSB+16, DRN16, EEAZ13, MSI18, MK12b, NA10b, PV17, PB12, FXP12, GKCK11, GLM+16, KS11, LHM14, QZL+16a, RSN14, SGC14, SC12, WS13, LWW +10, PC14, SH11, Wan13, WKH11]. XMLC13, XHZ+19, YTH17, YSS14, ARL13, Adaptively [HP14, OT12, LJY16]. ATKH+17, ACK+10, AMHJ10, BBTC20, adaptively-secure [LJY16]. adder BCGS16, CLH+16, Cra11, DFJ+10, [MS13a]. Adding [CFVP16, CSL+14]. FNWL18, FS18, HZL18, HK17, JAS+11, Additive [TM18, ZDL12, YJC18]. LCL+17a, LCL+15, LLH17, LHH+18, Additively [Mor19b, PKTK12]. Address MDHM18, MLM16, NZM10, NAL17, [Bel15, WLY17, PSJ+13]. addresses QCX18, RR17, Shy15, Tan12b, TODQ18, [AZH11, CBL10]. Addressing Wan18a, WS12, XHH12, XYML19, YWJ+19, [SVG16, SRB+12, VKK+19]. Adelson ZZ15, ZML17, ZDHZ18, ZVH14, ZDW+16, [BBB16b]. Adelson-Velskii [BBB16b]. ZWS+18, ZFH+18, ZZL+18]. adjacency [SA15]. adjacent [Kre13, Khl18]. Access-Control [LGLK17]. AccessAuth adjustable [BWR12b]. adjustments [TODQ18]. accessing [CSD18, KCS+18]. [GSGM16]. Administering [Pal16]. Account [Bro11]. Accountability [KS18a]. administration [ZVH14]. Adoption Accountable [SCGW+14, XHZ+19, [LKKL13, YWK10b]. Advance [KMJ18]. YMC+17, Wan18b, ZZ12]. Accumulable Advanced [B¨oh10, CSYY18, DR10, [SEXY18]. Accumulating [DGL19]. SXH+19, TC10, WRP70, YWF18, ALL+18, accumulator [KYH18, LZY+16]. DDFR13, GLIC10, Kra12, MKRM10, accumulator-based [LZY+16]. NdMMW16, SKK10]. Advances Accumulators [PTT16, JCL+18]. [LLK18, PHWM10, WP15, IAA+19, Abe10, Accuracy [CC14, Sar10a]. Accurate Gil10, LW11a, PJ12, Rab10]. Advantage [HD19, SM19a, VTY18, HQY+16, WYZ+17]. [WSSO12]. Adversarial ACE [YM19]. Achieve [BBC+13, Tan15a]. [BAG12, GA19, BCND19, BJR+14]. Achieved [YM16, Con17, Goo12]. Adversaries [BC14, XTK10]. Adversary Achieving [BN14, JLC18, KTUI16, LW12, [Yon12, KS11, LXLY12, OSNZ19, ZPWY12]. Pan14, PH12b, SLZ12, TK19]. ACIS Advert [MT17]. Advertisement [Ano11a]. ACM [ACM10, ACM11, Orm16]. [Ano16j, AMHJ10]. Advertises [AHS13]. Acoustic [DLMM+18, GST13]. ACPN AEP [LZD+19]. AEP-PPA [LZD+19]. 5

AES [ARG19, ABO+17, BW16, BBBP13, HEC+12, KMZS19, MNS11, TM12, WSS12, BKR11, BB10, DGP10, FAA+18, FLYL16a, XLM+12, XGLM14, XZLW15, YLSZ19, FLYL16b, GLMS18, GM16b, HMKG19, AAL19, AQRH+18, APK+18, AN15, HF14b, LB13, Mar10c, MM14b, PBCC14, BGAD12, CSD18, CTL13, DLK+16, RMTA18, SY15a, VGA19, WJ19, YWF18]. EBAC17, ¸ GH16, HPC12, HWB10, HWB12, AES-Like [BW16, WJ19]. AET [HTC+15]. ISC+16, IB11, IOV+18, KS11, KIH19, KP18, Affiliation [XLM+12, XGLM14, XZLW15]. KLW+16, KDW+17, LLLS13, LLY06, Affiliation-Hiding LIK+17, MHL18, NCL13, Nos11, Nos14, [XLM+12, XGLM14, XZLW15]. Affiliations ODK+17, OSANAM19, PY19, hSZZ15, [VKK+19]. Affine TLL12, WXK+17, XCL13, XXCY19, [BCEM15, LYL+18, GZHD12, ZWM14]. XMHD13, XHM14, YZZ+14, YY13, affine-transformation-invariant ZWQ+11, ZTZ16, ZGL+18a, ZZC15, OHJ10]. [GZHD12]. Afraid [Par12a]. Africa [BL10]. agriculture [APK+18]. Aided Africacrypt [BL10]. after [Sch18]. Against [BGK12, BCGK12, BGB12, Gop19, [Ano17e, BVS+13, BCHC19, BL15, BL16, GMSV14, LNWZ19, MV19, Vua10, ABBD13, CW12b, CMA14, DZS+18, DL17, FDY+19, LYL15, SGJ+18, SSAF11, WLFX17]. GDLL18, GDCC16, HCETPL+12, HLC+19, AIPISteg [AGLW16]. Air KMZS19, MSS+18, MWES19, Sch13, SGH15, [AUMT16, KTM+18, VOGB18, ZXW+18]. SLY+16, WSA15, AATM18, ASBdS16, aircraft [XWZW16]. Airflow [RSCX18]. AYSZ14, BBBP13, BD18, BVIB12, BPR14a, Airway [RSCX18]. AK [XHC+12]. BPR14b, BFK16, BSR+14, BK12b, Bud16, AK-PPM [XHC+12]. AKA [LLLS13]. BCFK15, CKHP19, Che15, CG14a, CGCS12, AKF [KDH15]. al [LLW16, LLSW16, CBJY16, CGH17, DHLAW10, DK17, Dya19, MWZ12, PLPW13, SBS+12, Mac14, Keb15]. EWS14, FTV+10, zGXW12, GSC17, al-Qaeda [Mac14, Keb15]. al. HLLG18, HYL+19, JSMG18a, JHHN12, [ABJ13, SPLHCB14]. Alan LDC13, LHM+10, LGL+12, LLY+12a, [CS12, Don14, Hel17, LCKBJ12]. Algebra LWCJ14, MCL+19, Maf16, MD12b, MNP12, [PWBJ17, Xie12a, Xie12b, BS15, Bul10b, NDNR13, OF11, OSNZ19, QRW+18, CFR11, DWZ12, FGPGP14, Nag19]. SBM15, SEY14, SY15b, SD12, TLL13, Algebraic [ACA+16, HIJ+19, HLC+19, WHN+12, Yon12, ZLQ15, ZHS+19, vV16]. LYK19, SK11, Tam15, Wat10, WCXZ17, Age [Bla12, SR14, Lan17, Sto12]. Aged Bul10a, CFR11, FMB+18, SA14, YTM+14]. [Ree15]. agency [Ald11, Kum10, ABJ13]. Algorithm agent [GPVCdBRO12]. Aggregate [AA19, ABCL17, Ano11b, AK14b, BGJT14, [CCT+14, PSM17, WCD19, GLB+18, LLY15, BKLS18, CNR14, CS10, jCPB+12, DCM18, LLL+18, ZQWZ10, ZDHZ18, CLW16]. ESS12, GKSB17, HZSL05, JLH12, JSZS12, Aggregated [NLY15]. Aggregated-Proof JHHN12, JL16, KB10, LL11, LT14a, LLL17a, [NLY15]. Aggregating [DP12]. LLLH18, LYL+18, MSR+17, MRL+18, Aggregation NdMMW16, NV10, RR11, RVRSCM12, [ARWK19, BJL16, EKOS19, LHKR10, WHZ12, WZCC18, YPRI17, YH16, SP15b, YM18, ZHW+16, DXWD16, DZC16, ZSW+12, ZWWW17, AIA+18b, Ang16, GLM+19, RR17, WMYR16]. Aging Ant14, ARG19, BYDC19, BGJT13, BMB16, [SKV12]. Agnes [Bur11, Joh15]. Agnostic CG12b, CJL16, Chm10, EEAZ13, GJ19, [HFW+19]. Agreement HZW19, JK13, Jou13, KY10, KHMB13, [ADSH18, BSBB19, Chi16, HCL+14, LC17, LR15, MS12a, MM14b, MNM+16, 6

MN14, PGLL10, PA10, PC14, SH11, SLM10, RZZ+15, Rao10, RBS+17, SK11, SY15a, SWW+17, jT12b, TTL10, WGZ+12, XTK10, SR12a, Shi11, SRRM18, SZDL14, SCGW+14, XWK+17, YWL+17, ZLW+12, ZL12, VKC15, WRP70, WDDW12, YZLC12, ZH15, sCR19a, ACZ16,´ ZOC10]. Algorithmic ZAG19, ZBPF18, Aia15, ACF16, AN15, [GO17, KRH18, RZ19, AY12a, AY12b]. BNY14, CFH+13, CFL13, CDWM19, Algorithmics [Gas13]. Algorithms DMV15, DK17, DHW+13, DIMT12, [AMKA17, ABSSS19, AB10b, BCG12a, FTV+10, FAA+18, FHM+12, HM10, Lan11, BJ10b, CN12, GP17, KRDH13, KHRG19, LFH18, MFH13, NLYZ12, OMPSPL+19, MR14a, MM17a, RPHJ11, TKM12, WH18, PPA18, PL16, QGGL13, RITF+11, SKEG14, WRP70, YS15, ZW15, AGHP14, FLYL16a, TQL+14, TLMM13, Tso13, VS11, Ven14, Fri10a, LK10, Mac12, NACLR12, NC13, WZC16, ZMYB17, ZZKA17, ZCZ+19]. OO10, OO18, SD17, Xie12a, Xie12b]. Ali Analysis-Based [RZZ+15]. Analytic [ABJ13]. Aliens [Sch18]. ALIGNet [Kuz11, Sha10, Shp03, ZW15]. analytical [HFW+19]. Alignment [CDPLCA16, TKMZ13]. analytics [Don14, HFW+19, IA15, AJYG18, LYC+10]. [BLV17, GQH17, KPB18]. Analyzing alignment-free [AJYG18, LYC+10]. [BWS19, HREJ14, KLN15, YGD+17]. All-But-Many [CCL+19]. all-seeing anchors [BCC+19]. Ancient [Tox14]. Allies [Pau19]. Allocation [Fox13, Rao10]. AND-gate [JSMG18b]. [JWNS19]. Allowing [PRC12]. Allows and/or [YLA+13]. Andrew [Ano16a]. [Bro17]. Almost Android [BKST18, FFL12, GDCC16, IM16, Oba11]. [Ano13a, Chi13b, EBFK13, FHM+12, Almost-Tight [GDCC16]. KGP+19, MMF15, SFE10, YTF+18]. Almost-Universal [BKST18]. Alpha Android-Powered [SFE10]. ANEL [MV18]. Altera [SMOP15]. alternate [BBB19]. Angle [ZPW16, PKS18]. [ZLW+12]. Alternating [BKLS12, KDH15]. Angle-Based [ZPW16]. Angular AMBTC [KSSY12]. AMD [pNyWyY+14]. animation [WSS+19]. [Arm19, BWS19, MZLS18]. America Anisotropic [ZZCJ14]. Annotated [AB10a, Bha16, Fag17]. American [ATS15]. Announcing [SBK+17]. Annual [Sch15a, Mun17]. Americans [ABJ13]. [Ano10a, IEE10, IEE11b, PJ12, Gil10, Rab10]. Amherst [TT18]. Amoeba [MPA+18]. anomaly [AKKY17, JDV16]. among [BP11, MPJ+16, SS17a]. amount anomaly-based [JDV16]. Anonymisation [EEAZ13]. Amplification [ABF12, HMR14]. [VV18]. Anonymity Analog [KOP12, SOS15, Pau19]. [CDFS10, FVB+18, HEC+12, MV16b, analog-to-digital [Pau19]. Analyses MR10, SCGW+14, TFS19, VFV17a, [ZPXX17]. Analysing [GRL12]. Analysis VFV17b, WLY17, ZYZ+19, AIB+16, BAG12, [ABS+12, ARP12, BRS17, BBB+16a, BC14, GH15, GH16, HLS18, HLR11, Par12b, BS14, BKLS18, Bul18, CFE16, CCG+16, PSJ+13, SGJ+18, WW14, YHL16, ZX11]. CGL+12, DKMR15, FSWF11, GZZ+13, Anonymity-Based [HEC+12]. GWM16, GLG12, GA19, HC12, HHH+13, anonymity-preserving [AIB+16]. HZWW17, HB17, IBM13a, IS12, JT12a, anonymization [XTK10]. anonymized KE19, KOP12, Kre13, LPS12, LTKP16, [BDK11, TG12]. anonymizing [TMK11]. LCK11, LYK19, LLW16, LGLL12, MD12b, Anonymous [APMCR13, CG12a, CZLC12a, MAS16, MRTV12, MR10, NDC+13, NSA15, CCF17, Chi12, DK12, FHH10b, FHZW18, NAL17, OMNER19, PH12a, PFS12, PS14, HLT+15, KP18, LIK+17, LSQX19, LZCK14, 7

Muf16, Per13, RSN14, SYWX19, TAKS10, Ter11, TYK+12, WH17, YR11, ZZQ+19, Ver17, Wan14, WXL+17, WYML16, ZJ14, ZYY19, APMCR13, Ano11a, AKS19, BDK16, ZMW16, AIKC18, AKS19, ATK11, BT18, CFR11, CSZ+11, CQX18, CDA14, Dur15, CCSW11, Chi13a, CGH11, FSGW12, Gop19, EBFK13, FES10, Fri10a, GJJ18, GHD19, GTSS19, HL14, ISC+16, KCS+18, LNK+18b, Gil10, KKK+18b, KO16, LWZG10, LSQ15, LZD+19, LWK+19, LHM14, LSQ15, LYL15, LR15, LBOX12, LTT10, MS13c, MZL+19, LY14, MYYR13, MML16, QMC17, VS11, MM14b, OSP+19, OK18, PHWM10, PKA15, WLS14, XXCY19, YZL+18, YYK+19]. SWW+17, WMC17, ZZ15, ZSMS18]. ANSI [Ano11b]. answer [Pec12]. answers Applied [BSS11, KP10, MR10, BTW15, [Wu16]. Anti [Alz19, KKK+18b, QZ14]. OPHC16, Xie12a, Xie12b]. Applying Anti-Counterfeiting [Alz19]. [Bar12, Elb09, NML19, sCR19a]. Approach anti-forensics [QZ14]. Anti-reversible [CTC+15, Chi16, DZS+18, DBT19, HMKG19, [KKK+18b]. Antinoise [WXL+17]. HLAZ15, HLW12, KRH18, KKA15, MKN13, Antispoofing [MR14b]. Antoine MZ17b, MHMSGH16, PS14, RP12, SLGZ12, [AY12a, AY12b]. Any Sia12, SH15, SC12, TCN+17, TLW12, Vle12, [BHT18, Goo12, LP11]. anything [Nor17]. VKC15, WYCF14, yWXyZ+18, ZW15, AODV [SS15]. Apache [Lit14]. APBT AHG18, AL15, AT10, BSS11, CWZL13, [ZWWW17]. API [FLW12, PTRV18, QF19]. CLZ+17, CO11, CML16, DEL19, DZS+12, Append [YNR12b]. Append-Only FMB+18, GGH+16b, Ham19, JKA+18, [YNR12b]. Applicability [Scr18]. KL13, LFGCGCRP14, MCP15, Application MSGCDPSS18, NC13, PJ18, SAM+19b, [AKP12, AK14b, BD15, BRT12, BS12, SE16, SPK17, SA19, Tan18, WMYR16]. CCL+19, CKLM13, CCKM16, CCW+10, Approaches [GWM16, LC15, NR15, CWZ19, CSTR16, CLCZ10, CHS15, JS18b, SBV14, TCMLN19, MKH+12, OK18]. K¨up15, LW11a, LWKP12, MNS11, OO12, Appropriate [SP15b]. Approximate SEHK12, SS13, XJW+16, YWK10b, YTS12, [CN12, JSCM17, SGS14]. AppSec ZH15, ZM16, Abe10, BGE+18, BBBP13, [RQD+15]. April BT18, CZ15b, CBJY16, GLIC10, GSGM16, [GLIC10, IEE13, PJ12, vDKS11]. Arab HURU11, HH15, JZU+19, Jia14b, LGKY10, [Bro11]. Arabic [AIF+19]. Arbiter LWKP14, MSM+18b, NAL17, OTO18, SE18, [CCKM16]. arbitrarily [BCDN17]. SGFCRM+18, WYZ+17, WDG19, XHH12, Arbitrary [FHR14, DWZ12, Gen10]. YY11, ZWQ+11, ZAC17].´ Arbitrary-State [FHR14]. Arbitration Application-Level [CCW+10]. [K¨up15]. Arbitrator [WSA15]. architect Application-Specific [BD15]. [GW14]. Architectural Applications [MD12b, VCK+12, ZWT13]. Architecture [AMVZ12,´ AEP18, Ana14, ABL+18, BBD19, [ADSH18, BCE+10, BEM16, HEP+11, BKPW12, Ber18, BKST18, BCG+12b, HKL+14, Int19, KS18b, KCR11, KCC17, BJCHA17, BSV12, CZLC12a, CZLC12b, KAK18, LGR14, LWML16, MCDB12, CPS16, CK18, DK02, DK07, DK15, FSK10, MJGS12, MC11, NdMMW16, NVM+17, GKM16, GRL12, HSC19, HvS12, HJ19, RC18, RMP10, SG12, SWM+10, SLI11, HN10, HGOZ19, HVP+18, JWJ+17, SM18, VDB+16, YHSW19, AL15, Ano13f, LATV17, Nac12, NV10, Nie02, ODSS17,¨ ABO+17, BVIB12, LXMW12, MJS13, PJ12, RBS+17, RQD+15, Sas18, SCPSN10a, SSSA18, SSS11, SSPL+13, XHM14, SAAB10]. SCPSN10b, SG19b, Sha10, Shp03, SYv+19, architecture-independent [BVIB12]. 8

Architectures [AMKA17, BGG+13, Assurance [BMBS10, Bar15, KMP+11, BJCHA17, CMO+16, CHS15, DFKC17, RBNB15, WL11, Ser12]. Assured FP19, MTM18, MKAA17, MKASJ18, [Tan15a, WMYR16]. Asymmetric [DBT19, RMERM19, SRT12, ST19, FPBG14, HL14, HG12, XLM+12, XGLM14, XZLW15, LGP19, MK11, Nov10, SHC+16]. archiving ZZQ+19, ZWQ+11, CSS+13, ZGL+18a]. [VBC+15]. Area asymmetric-histogram [CSS+13]. [GMVV17, GM16b, HC17, LZCK14, asymptotic [DTZZ12, TD14]. RMTA18, WH17, ABO+17, KP18, LMJC11, Asymptotically [LPS12]. Attack LIK+17, LZZ19b, Nov10, SGJ+18, WDV18]. [ABSSS19, Ano15d, BRS17, BEM16, BMS12, Area-Optimal [GM16b]. Area-Time Bro17, Che18, CWZ19, CJP12, DHT+19, [HC17]. Areas [MV12, JY14]. DSB15, FXP+17, zGXW12, GDLL18, [BDK16]. Argon2i [AB17]. argues [Dya19]. GV14b, GDCC16, HSC19, HCETPL+12, Arguments [BCI+13, ABM+12, LLM+19]. HLAZ15, JLH12, JKP12, LLSW16, LGL+12, ARIA [PH12a]. ARITH LJ17, LCLW17, LJ19, LBC18, LWKP12, [MSH+16, TBL19]. ARITH-26 [TBL19]. LWPF12, LFK19, MSS17, MSS+18, Arithmetic MPA+18, MWES19, MS12b, Pud12, [AIK14, AAB17, BF19, BdD19, CATB19, SKE+18, SBM15, SP13, SS15, SDM+12, DDE+19, EZW18, Fre10, GH11a, HSA14, WLC12, XJWW13, YTF+18, YWM19, IEE13, KHF10, MSH+16, PG12, Roh19, Ano17a, AYSZ14, BD18, Blo15, BNST17, TBL19, TT18, ZAG19, DTZZ12, MO14]. CAM19, CJP15, DDFR13, FLZ+12, Goo12, ARM [BYDC19]. ARM-FPGA [BYDC19]. GSAV18, KA17, LLY+12a, LC13, LYHH14, ARMv8 [SD18]. ARMv8-A [SD18]. LWKP14, MBB11, MNP12, NZL+15, OPS14, Array [BL12, MCDB12, NKWF14]. Arrays SB17, SXL16, SCBL16, WYL13, vV16]. [LB13, TRD11, EAB+19, KM10a]. Attacker ARSENAL [SM18]. Art [BCEO19, BCEO20, PLGMCdF18]. [ABJ13, BLM17a, BLM17b, LLK18, Attackers [BL15, BL16]. Attacking OMNER19, Sen17, BDK11]. Artificial [Bon19, GJ19]. Attacks [SG19b]. Arvind [Ano16a]. ARX [AMMV18, AB17, ARP12, Ano17e, BGK12, [KN10, SJLK18, PBP19]. ARX-Based BCHL19, BCHC19, BFK16, BKBK14, CZ19, [SJLK18]. ary [CZCD18]. Asa [Bai12]. CKHP19, CBRZ19, Che15, CMA14, ASBUS [YWF18]. ASIACRYPT DZS+18, DGlS12, DL17, DHLAW10, [LW11a, Abe10]. ASIC DHB16, EWS14, GPT14, HLLG18, HIJ+19, [CFZ+10, KMY18, MKAA17]. Asking Hay13, HLC+19, HRS16, JSK+16, JWJ+17, [DL15]. ASM [Vle12]. ASM-Based [Vle12]. KNR10, LLC11, LWZ12, LH14, LJ18, LW19, ASP.NET [DR11]. Assessing [CBL13]. LWCJ14, LWML16, LCL17b, LYD+18, assets [WHJ17]. Assignment [LMS16]. LSG+19, MD12b, PDJ+19, PYM+13, PS12, Assisted [KCC17, LLKA19, GM13b, Sas12, SEY14, SY15a, SP15a, SH15, SVG16, GPR+19, HZWZ18, WDV18]. Associated SGH15, VWC19, WW14, WHN+12, [Sar10b]. associative [BS15]. Associativity XNG+14, YKA16, YL17, YCM+13, ZLQ15, [ABR12]. Assumption ZHS+19, AATM18, ACD18, BBBP13, [CCL+19, LZC12a, LZC14, ZG10]. BVIB12, BCDN17, BSR+14, BCFK15, Assumptions CBJY16, CGH17, dCCSM+12, DCAT12, [BDH11, CZF12, DN12, EKOS19, GKS17, DJL+12, DK17, Dra16, Eng15, EA12, KZZ17, KM10c, PDNH15, SBM15, ABW10]. FTV+10, FIO15, GPP+16, GLMS18, 9

GBNM11, HAK19, HAGTdFR13, KM10a, auctions [MR14c, QS18]. Audience KPS10, LDC13, LHM+10, LWK11, NDNR13, [DTE17]. Audio OF11, PX13, SGP+17, TK19, TS16a, [Ber18, DA12, FM15, GCK12, HGT15, TY16b, TLL13, VS11, WWBC14, XWDN12]. KD12a, KD12b, Lal14, LSL12b, NXH+17, attempt [Fel13]. Attestation QF19, TC10, gWpNyY+14, XNG+14, [BWS19, FQZF18]. ATtiny [EGG+12]. XNRG15, XNP+18, ZS12, LSQ11a, SKEG14, Attribute [AAC+16, AHL+12, BFK+10, yWpNyL11, YWYZ12, YQH12]. Boy13, CD16b, CDL18, CDLW19, CHH+19, Audio-Visual [Lal14]. Audit [YNR12b]. FHR14, GZZ+13, GSW+16, Gli12, GVW15, Auditing [LMD16, LCDP15, TCN+17, HSMY12, HBC+19, Her14, KGP12, LW11b, XWK+17, YYS+16, YXA+16]. LW11c, LW12, LJLC12, LYZ+13, LHL+14, Augmenting [AV18]. August LAL+15, LHL15, LW16, OT12, PPA18, [AB10a, JY14, MV12, Rab10]. Aura PB12, RVH+16, Rao17, SSW12, TYM+17, [HFCR13]. Austin [IEE13]. AuthCropper WDCL18, WLH15, WHLH16, WHLH17, [KLK+19]. Authentic XMLC13, XWLJ16, XHX+17, ZPM+15, [ASV+18, HLT+15, SZMK13]. ZQQ15, ZZM17, ZHW15, BTK15, CPPT18, Authenticate [HM12]. Authenticated FNWL18, HZL18, HZWZ18, HYS18, [Alo12, ADSH18, BSBB19, BCO13, HKHK13, JSMG18a, JSMG18b, LCL+15, BDMLN16, CLL16, CLY14, CCS14, CRE+12, LFZ+17, LFWS15, LYL15, LJW+17, DS11, EAA12, ESS12, FVS17, FFL12, LJWY18, LDZW19, Nam19, QRW+18, GTT11, GL12, GZ12, HC12, HL10a, HCL+14, RD17, SLL+19, WLWG11, WZC16, XWS17, HEC+12, KMY18, KLK+19, LHKR10, LY16, XZP+19, XTZ+19, YSQM19, YCT15, LH11c, LCCJ13, LTT10, MR14a, MMY12, ZWM14, ZML17, ZGL+18a, ZWY+19, MMS17b, MHKS14, MSU13, PTT16, Sar10b, Ver17]. Attribute-Based Smi11b, Tan11, TW14, WDV18, XLM+12, [AAC+16, BFK+10, Boy13, CD16b, CDLW19, XHC+12, XGLM14, XZLW15, YS12, CHH+19, FHR14, GZZ+13, GSW+16, YLSZ19, YLW13, YRT+16, Yon12, ZPZ+16, GVW15, HSMY12, HBC+19, LW11b, LW11c, ZXH16, ABC+18, AIB+16, ABR15, CTL13, LW12, LJLC12, LYZ+13, LHL+14, LAL+15, FA14b, FIO15, GPN+12, GLM+11, HPC12, LHL15, LW16, PB12, RVH+16, Rao17, HWB10, HWB12, HL11, HPY10, ISC+16, SSW12, TYM+17, WDCL18, WLH15, JKA+18, KMTG12, LWS10, LHH11, WHLH17, XMLC13, XWLJ16, XHX+17, LML+13, NCL13, Nos11, Nos14, ODK+17, ZPM+15, ZQQ15, ZZM17, AHL+12, CDL18, OSANAM19, PPTT15, PJ18, PPG19, Her14, WHLH16, CPPT18, HZL18, HYS18, SMBA10, TCS14, Tso13, TKHK14, WZM12a, HKHK13, JSMG18a, JSMG18b, LCL+15, WZM12b, WTT12, XWXC14, XCL13, LFZ+17, LFWS15, LYL15, LJW+17, XWZ+18, YC12, YZZ+14, YZL+18, YLL+18, LJWY18, LDZW19, Nam19, QRW+18, ZTZ16, ZGL+18a, ZXWA18, ZG10, ZZC15]. RD17, WLWG11, WZC16, XWS17, XZP+19, Authenticating XTZ+19, YSQM19, YCT15, ZML17, [BS12, CHX13, GRL12, OKG+12, RPG12, ZWY+19, Ver17]. Attribute-Hiding WY12, ZCWS15, Bel18b, Cer18, [OT12, ZWM14]. Attributes LFGCGCRP14, PGLL10, RR16, ZLDD14]. [CG12a, VKK+19, Yon11, LCL+17a]. Authentication Attribution [AIF+19, XHC+12, FNP+15]. [AV18, AA19, ADM19, AAA+19, AMSPL19, Au-Id [HWZZ19]. Auction ASO14, AAZ+16, ACAT+15, ACKB19, [Con10, JWNS19, DDL15, HJM+11]. AUMT16, ABB19a, ATC17, BL12, BCE+12, 10

BCM12, BNNH19, BSSV12, Bel18a, BHvOS15, BT18, BTW15, BM11, CLM+12, BKST18, BCD+12, Bis17, BF11, Boy16, CML+18, CLP+13b, CAM19, CTL12, BKJP12, BSV12, CGCGPDMG12, CTC+15, CJXX19, CSD18, CNF+18, CH10, CCSW11, CC14, CSH+18, CRS+18, CCW+10, CCF17, CHS11, CLHJ13, CZ15a, Chi13a, CCMB19, CCC19, CJ13, CD12, CJP12, CLH13, DL15, CJP15, Cho14, CL11, CHL19, CRS13, DCM18, DBPS12, DKPW12, DP12, FLH13, CDWM19, DCAT12, DSCS12, DRN16, FR16, FMTR12, FD11, GWP+19, GHS14, DEL19, DLK+16, DMV15, DLN13, DZS+12, Gli12, GI12, GMDR19, GM14, GU13, DIMT12, uHAN+18, EA12, ED19, EA11, GMVV17, GCK12, HZC+12, HvS12, FPBG14, FHH10a, FLL+14, FXP12, Far14, HQY+18, HKK19, HLLC11, Har13, Hay13, FA14a, FHZW18, FQZF18, FMA+18, HBCC13, HM10, HCPLSB12, HCETPL+12, FHM+10, FZZ+12, GJ13, GMSW14, HKL+12, HFS+19, HFCR13, HXC+11, GHD19, GEAHR11, GPLZ13, GH15, GH16, HLCL11, HCYZ18, HWZZ19, HRK18, GAI+18, Gop19, GCSAddP11,´ GMMJ11, IGR+16, JN12, JCM12, Jia17, JLX+19, GLB+18, GBC19, GTSS19, HU15, HSH11, JAE10, KP12, KS18b, KLN15, KTM+18, Ham12, Ham19, HZW19, HW19, HHBS18, KRM+10, KSD+17, KPC+11, KLY+12, HDPC13, HZC+14, HK17, HZWW17, HL12, KTA12, KGP12, Kim15, KPKS12, KLM+12, HL14, HCM11, HLC16, HPL+19, HCC10, KO16, KH10, LLC11, LKBK19, LH12, HS11, IMB17, IAA+19, IC17, IG11, IB11, LFH18, LLG15]. Authentication IOV+18, Jac16]. authentication [LCLL15, LNZ+13, LZCK14, LNXY15, [JNUH17, JKAU19, Jia16, JKL+16, LCR+18, LLZ+12, MWZ12, MEFO12, JMW+16, JAS+11, JXLZ15, KPP16, Kem11, MKH+12, MBC15, MRRT17, MRS+17, KKG14, KSB+17, KCS+18, KVvE18, Kim11, May15, MLBL12, Mor12, MSKRJ17, Kim16, KIH19, KS19, KP18, KPB17, MPM+17, NR11, NR12, NSBM17, NLLJ12, KLW+16, KLW+17, KDW+17, KKD+18, NLY15, OdH12, OO12, OS12,´ PSSK19, LLLS13, LLZ+16, LC17, LLY06, LH11b, PCDG14, PPRT12, PDT12, PWVT12, RS11, LT13, LH10c, LNM+11, LMJC11, LXMW12, RWLL14, RSX18, RSN14, SGG18, Saa12a, LNNH13, LNKL13, LXJ14, LIK+17, SBS+12, SBS18, Sar12, SGC16, Sch15b, LCM+17, LNK+18a, LWK+18, LNK+18b, SKV12, ST14, SM12, SD12, Shi11, SGC14, LZD+19, LWK+19, LW19, LHM14, LH13, SSA13, SPK17, SRRM18, SC12, SCMS18, LSQ15, LHH+18, Lit14, LWLW11, LTC+15a, SZDL14, SHS12, SAA12b, SRK+17, SRK+18, LYL15, LZZ19b, LBR12, LTT10, MM12, TGC16, TWNC18, TYK+12, TM12, Vet10, MMLN15, MCN+18, MDHM18, MvO11, WgMdZlZ12, WHZ12, WZXL12, WgMW12, MMP19, MA17b, MMS17c, MWW+18, WZCC18, WSS12, WAK+19, WT10b, Xio12, MZL+19, MCRB19, MHL18, MK12a, YTP11, YFT17, ZBR11, ZHW+16, ZWZ17a, MGB19, NDSA17, NR17, NACLR12, ZLDD12, ZLDC15, AMN18, AaBT16, NCCG13, NM18, NLYZ12, NML19, NB13, ABK13, AATM18, AMKC19, ARL13, Aia15, NXS10, NMX15, OSP+19, OF11, OCDG11, AL15, APMCR13, AHM+18, APK+18, OYHSB14, PYH+18, PYP10, Par12b, AIM+19, Alp18, AIKC18, ACF16, AZF+12, PLGMCdF18, PCK19, PZBF18, PA10, AKS19, ATI+10, ACC+13, AN15, ACM12, PKA15, PRN+19, QMC17, QMW17, QLZ19, BK19, BOP14]. authentication RR17, SSSA18, SCFB15, SPLHCB14, SB17, [BS13a, BGE+18, BDM18, BDL+19, BD18, SGGCR+16, Sar10a, SK18, SSNS15]. BCM13, BGAD12, BBTC20, BDM+19, authentication [SVY19, SGJ+18, hSZZ15, BBB19, BLAN+16, BAL10, BMM12, SCKH10, SYWX19, SNG+17, SCR19b, 11

SA15, SYW17, SSS11, SKEG14, SA19, [Lim11, YL11]. avoid [CFZ+10]. SMS+16, SHBC19, Tan12b, Tan15b, Tan18, Avoidance [RVH+16]. Avoiding TODQ18, TZTC16, TG17, TLL12, Wan13, [AMMV18, BHCdFR12]. AV R [LPO+17]. WW14, WLZ+16, Wan18b, WCFW18, award [Ano16i, Orm16]. Awarded [Ten18]. WXSH19, Wat14a, Wat15, WDKV19, Aware [ARWK19, BCF16, HFS+19, JSA17, WT10a, WKH11, WXK+17, XHH12, LJP17, LMHH14, LMS16, QLL17, YTH17, XWDN12, XHCH14, XXCY19, XMHD13, ARL13, AKS19, DDY+19, GHD19, XHM14, YI17, YHL16, YHHS16, YYK+19, LWYM16, MGP10, TODQ18, Wan13, YWK+10a, YSL+10, YMM13, YN19, YY13, ZDHZ18, ZFH+18]. Awareness [HSC19, YD17, ZYL+10, ZQWZ10, ZCLL14, ZQD16, MSas12, SAM+18, HPJ+19, Li10, MSas13]. ZGL+18b, ZDHZ18, ZZY+19, ZHH+17, axiomatic [AT10]. axis [WMU14]. Azure ZX11, ZLY+19, ZZL+18, OHJ10]. [Sti19]. authentication-chaining [EA11]. authenticators [SYY+17]. authenticity B [Tan12a]. B-Spline [Tan12a]. B3G [ADF12, VBC+15]. Authority [NXS10]. Back [LNXY15, XZLW15, ZQQ15, JB11, SLL+19, [KRM+10, SKS+18, YZLC12, Fai19, Ran10]. ZWY+19, ZZ12]. Authorization Backdoor [Sch13, Fel13]. Backside [CS14, LMGC17, MPM+17, YKK18, AL15, [DDR+16]. Backup [MPA+18, Cor14a]. DFJ+17, FHM+10, JAE10, JAS+11]. backward [BM11, EBAC17, ¸ NJB19]. Authorized [GHY18, HTC+15, LLSW16, Bacterial [Kar12]. Bad Ma17a, WZCH19]. authorizing [Bel18b]. [KMZS19, Hai17, RY10]. BAF [YNR12a]. Authorship Bake [Boy16]. Balanced [YTP11]. [AIF+19, BTW15, BAG12, LCM+17]. balancing [FXP12, PRN+19, Zha15a]. Autoblocking [LLLH18, YH16]. Balloon [AB17, BCGS16]. Ballot [vdG17]. Automata Ballots [CW12b, LHF12]. balls [Svo14]. [CCD15, Gas13, dRSdlVC12, Ang16, DGL19, band [MMSD13]. Bandwidth HBBRNM+16, KFE19, SS11, WOLS12]. [GST13, NR11, LLZ+12]. automata-based [SS11]. Automated Bandwidth-Efficient [LLZ+12]. Banking [BCHC19, CCK12, CCCK16, DRS16, [Eya17, KSD+17, RBS+17, GMMJ11, GLLSN12, JGP+18, LGM+16, Ste15a, KVvE18]. banned [Eve16]. BANs Tom16, YSS14, BJR+14, GMMJ11, [BLL+19]. Baptiste [Dew11]. Barbara KKK+16]. Automatic [Rab10]. Barcodes [WY12]. Barrier [HWZZ19, MMP19, WW12, HL19]. [JR14, KS11]. barriers [LKKL13]. Base Automation [DBT19, MS12a, XSWC10]. Based [BGK12, DZS+18, IEE11a, KPP16]. [ADM12, ADM19, AGW15, ASM12, Automotive [HK18, LMS16, MPM+17]. ABSSS19, AAC+16, ABCL17, Ano11b, Autonomic [SEK+19]. Autonomous ASS15, AYS15, ATC17, BWLA16, BL12, [MPA+18, BT18, SMS+16]. Auxiliary BCEO19, BCEO20, BBB+16a, BSSV12, [DMS+16, DL12, GGHW17, XXZ12, BHG12, BKPW12, BRT12, BHH+15, YCZY12, Kom18]. Auxiliary-Input BBKL19, BS13b, BFK+10, Bon12, BSJ15, [XXZ12, Kom18]. Availability BF19, Boy13, BKJP12, BDH11, BCF+14, [CK11, ADF12, CFVP16]. Available But17, CMLS15, CLL16, CGMO14, [Ano16e, HGOZ19]. avatars [NSX+18]. CKHP19, CMRH17, CCM17, CSH+18, AVC [JSZS12, JHHN12, LW13c]. average CZLC12a, CZLC12b, CLHC12, CCZC13, 12

CLY14, CZLC14, CST+17, CZCD18, TWZ11, TW12, TWZ+12, TYM+17, TSH17, CLND19, CGL+12, CDD13, CGY+13, CD12, TT12, TTH15, TFS19, TC10, VDB+16, Chi12, CK18, CD16b, CDLW19, CHH+19, VGA15, VGA19, Vle12, WY10, Wan10, DSMM14, DHT+19, DL17, DS19, DA12, WSSO12, WgMW12, WYW+13, Wan14, DLZ+16b, EM12, EKB+16, EFGT18, FM15, WZCC18, yWXyZ+18, WDCL18, WLH15, FHH10b, FHR14, FZT14, FGRQ18, FGM10, WHLH17, WCL+18, WT10b, WMS+12, FYD+19, FR15, FVS17, FP19, FSX12b, WZCH19, XNG+14, XNRG15, XXZ12, FSX12c, FSX12a, GT19, GWWC15, XMLC13, XLQ09, XQL11, Xio12, XGLM14, GDLL18, GZZ+13, GSW+16, GV14b, GI12, XWLJ16, XJW+16, XJR+17, XHX+17, GY13, GDCC16, GVW15, GJJ15, GJZ17, XHZ+19, YE12, YZLC12, YZX+12, YGFL15, GRRZ18, HZC+12, HSMY12, HSM14, YHSW19, YTS12, Ye10, Ye14, YH16, YTH17, HBC+19, HEP+11, HIJ+19, HL10a, HZX15, YYO15, Y+17, YKNS12, YHK+10, YMWS11, HWZP18, HCPLSB12, HKL+12]. Based YKC+11, YFK+12, YCZY12, ZSP+19, [HG12, HMR12, HSA14, HWS+19, HPO+15, ZPM+15, ZJ11, ZXZ+11, ZDL12, ZLH+12]. HKR+18, HGT15, HCL+14, HLN+10, H¨ul13, Based [ZQQ15, ZMW16, ZXYL16, HRS16, HBG+17, HEC+12, HM19, HP12, ZWWW17, ZZM17, ZWZ17b, ZYZ+19, HP17, JTZ+16, JP19, JHHN12, JEA+15, ZPW16, ZHW15, ZVG16, ZPXX17, ZGCZ18, JKHeY12, KMZS19, KS18b, KZG10, KK12, ZYM18, ZYH+19, ZHL15, AMN18, KKA15, Kha10, KLY+12, KSSY12, KPKS12, AGLW16, AaBT16, ARL13, AY14a, AHS14, KHRG19, KRB12, KAK18, KS15, LMGC17, AAL19, AAT16, AA14, ASO14, AIA+18a, LMG+18, LYY+18a, LYX+19, LTKP16, AIM+19, AKG13, ASVE13, ACA+16, LSL12a, LKBK19, LSL12b, LW11b, LW11c, ARG19, AM19, Ara13, ATI+10, ACC+13, LW12, LHF12, LJLC12, LYZ+13, LHL+14, AHL+12, BK19, AVAH18, BS15, BDM18, LTH+15, LLC+15, LDZ16, LTZY16, LLZ+17, BDL+19, BBBP13, BD18, BGAD12, LLLH18, LPL15, LSLW15, LAL+15, LH11c, BAAS13, BBTC20, BDM+19, BOB13, Lin15, LYL+18, LP12, LNWZ19, LNZ+13, BWR12a, BW13, BWA13, BMM12, BZD16, LCCJ13, LWCJ14, LNXY15, LHL15, LW16, BC18, BTK15, BBB16b, BK12b, CPPT18, LPO+17, LHW18, LLD19, LZZ+19a, CML+18, CXX+19, CFL13, CFY+10, LGPRH14, LDB+15, LD13, LSC12, LBR12, CCLL11, CTL12, CLSW12, CNF+18, LLH18, MWZ12, Ma17a, MLO17, MEFO12, CRS+18, CG12b, CSZ+11, CHX13, CSS+13, MCDB12, MVV12, MD12b, MBC15, CW14a, CLC+19, CWZ19, CXWT19, MKN13, MZ17b, MCS+15, MMS17b, CCMB19, CTHP13, CJP12, CJP15, CCG10, MKF+16, MCF17, Men13a, MST18, Mor12, CTL13, Cho14, Con12, CHL19, dCCSM+12, MSKRJ17, MKAA17, Muf16, NIS15, NC12, Cra11, CDL18, DSCS12, DGMT19, DZ14, NXH+17, NDR+19, NXB13, NLLJ12, DLN13, Dra16, uHAN+18, EZ15, FH13, NLY15, pNyWyY+14]. Based FG19, Far14, FA14a, FA14b, FIO15]. based [OTD10, PB12, PSSK19, PTT16, PYM+15, [Fay16, FLYL16b, FHZW18, FMC19, PDNH15, PPS12b, PYS18, PG12, PAS13b, FNWL18, Gal13, GJ13, GCH+19, PNRC17, QJC+18, QF19, RVH+16, RSR+19, GMOGCCC15, GMRT+15, GKCK11, RZZ+15, RS16, Rao17, RR11, RDZ+16, GJMP15, GCSAddP11,´ GAB19, GMS11, RVRSCM12, RW12, RJV+18, SBS18, SSW12, GLL+18, GBC19, HSH11, HT11, HKA+18, Sar18a, SS13, Sen17, SJLK18, SXH+19, SJ12, Ham19, HZW19, HW19, HHBS18, HGWY11, SGP+12, SPG+19, SP15b, SSA13, SRAA17, HSM13, HZC+14, HZL18, HF14a, HRK+19, SNCK18, SH15, SGH15, TB18, TKR14, HWDL16, HZWW17, HZWZ18, 13

HBBRNM+16, HLR11, Her14, HWB10, WMX+17, Wan18a, WXMZ19, WXSH19, HWB12, HB13, HL14, HL11, HLC12, WDZ19, WGZ+12, WHLH16, WS14, WS12, HLC16, HYWS11, HYS18, HYF18, HPY10, WTT12, WOLS12, WCCH18, XHH12, HKHK13, HCC10, Hwa11, IMB17, IM14, XWZW16, XW12, XCL13, XWS17, XZP+19, ISC+16, IB11, IA15, IOV+18, Jac16, XHCH14, XWZ+18, XTZ+19, XMHD13, JNUH17, JKAU19, JK13, JLT+12, JCL+18, XHM14, YWL+17, YWJ+19, yYqWqZC13, JZS+10, JMW+16, JSMG18a, JSMG18b, Yan14, YTM+14, YCC16, YXA+18, JLX+19, JDV16, KFE19, KPP16, KK13, YSQM19, YWY+19, YCT15, YTF+18, KM10a, KHMB13, KTM+18, KKG14, YY13, YLS12, YMSH10, YKC+12, YLZ+16, KCS+18, Khl18, KD18, Kim11, KGO10, YXA+16, YL11, ZZKA17, ZAAB17, KD19, KLW+17, KKD+18, KL11, KSH18a, ZYGT17, ZLW+12, ZCLL14, ZT14, ZTZ16, KSH18b, LXLY12, LLZ+16, Lau12, LLC10, ZQD16, ZML17, ZGL+18a, ZGL+18b, LK14, LHM13, LYC+10, LHM+10, LH10c, ZWY+19, ZZ12, ZHH+17, ZL12, ZVH14, LZJX10, LNM+11, LMJC11, LK12, ZDW+16, ZYM19, ZLY+19, LZJX10, Ver17, LXMW12, LKAT12, LLHS12, LNKL13, HZC+14, MM12, PP11, ZBR11, Kat13]. LXJ14, LDZ+14, LCL+15]. based [LZY+16, Based- [ZHW15]. LWYM16, LFZ+17, LNK+18a, LWK+18, based-wireless [HKA+18]. Bases LWW +19, LCT+14, LFWS15, LLM+19, [EVP10, TSH14, FES10]. Basing LPdS10, Lin14a, LHH+18, LLY+12a, LW10, [Mat14, MN10]. Basis LSQ11a, LSQ11b, LWK11, LW13b, LZC14, [BNA15, ERRMG15, RMERM19, CG12b, LPZJ15, LTC+15a, LYL15, LY15, LJW+17, Har15, LLP+18, Tam15]. Batch [WSQ+16, LJWY18, LDZW19, LWW+10, LL16a, ZPXX17, AGHP14, CCG10, MGB19]. LW13c, LWY12, LY14, MCN+18, MCP15, batch-based [CCG10]. Batters [Chi13b]. MJGS12, MJS13, MLM16, MWW+18, Battery [CKHP19]. battles MZL+19, MMF15, MMZ12, MM13, Mes15, [Ano15e, Ano16h, Sch15c]. Bay MCRB19, MBB11, MO14, MSGCDPSS18, [Ano10a, DDS12]. Bayes [McG11, Sim10]. MHT+13, MG15, MS17, Nam19, NR11, Bayesian [Alz19, WYW+13, ZLW+17]. BC NM18, NCL13, NZL+15, NMX15, [LSG+19]. Be OMPSPL+19, PPA18, PYH+18, PLPW13, [ASV+18, DSMM14, Mos18, Par12a, YM16, PTK14, Par18, PWW10, PGLL10, PZL+19, AZH11, Ana14, Dya19, Eve16, Ree15, RK11]. PPB16, PLGMCdF18, PCK19, PS14, PL16, BeagleBone [Cri16]. Beat [LTKP16]. PKA15, PC14, PPR+12, QZDJ16, QRW+18, BECAN [LLZ+12]. Becomes [Bra13]. QYWX16, QMW17, QLZ19, RD17, RG10, been [Ana14]. before [GST12, Goo12]. RS15, SPLHCB14, SERF12, SGGCR+16, Beginner [Gre19a, She17]. Beginning SLL+19, SAM+19b, SI12, SD17, SYL13, [Chu16, Zor12]. Behavior SE14, SE16, SK18, SH11, SM11, SNM14, [ASV+18, GSC17, RSX18, KLN15, SPK17]. SZHY19, SR10, hSZZ15, SCKH10, SA16b, behavioral SPK17, SSAF11, SHC+16, SWW+16]. [BOP14, CAM19, HT11, MWW+18]. based Behaviors [GAF+15, HL19, ZMYB17]. [SSS11, SKEG14, SC19b, Sun16, SGM16, Behavioural [MT17]. Behind SHBC19, SS11, TPL16, TQL+14, Tia15, [Fre10, Sti19]. Beijing [BYL10, Yan10]. TH16, THA+13, TTL10, TPKT12, TKHK14, Being [NSP+18]. Beissinger [Ayu12]. VS11, VN17, WWYZ11, WWYY11, Belief [BT12]. Bell [JEA+15, QD16]. WLWG11, WLDB11, WZC16, WLFX17, Benchmarked [MKAA17]. Benchmarking 14

[MTM18, ZZKA17]. Benefit [HB14]. [BDM+19, GBC19, KCS+18, SR10]. benefits [Wat14a]. Benford [AOT13]. Biometrics [AHN+18, BW13, ERLM16, Bessel [GJ13]. best [Cha13c, Tay19]. bet SP13, ZPW16, AGBR19, BOP14, CNF+18, [Rom12]. Beta [MV18]. Beth [CTHP13]. FHZW18, GM16a, KLW+17, LXLY12, better [LCL+17a]. Between LH10c, LNM+11, LH14, LNK+18a, [HSUS11, KA18, LRVW14, SAKM16, MRRT17, Rom11, SS17a, SCFB15, YY13]. CLM+12, HLR11, KPP16, Kim16, PBCC14, biometrics-based [CNF+18, FHZW18, WDDW12]. Beyond [JL18, LST12, MJS13, KLW+17, LXLY12, LH10c, LNM+11, YY13]. RS18, TS16b, FNP+15, JR14]. BGP biosensor [Kim16]. Birk¨auser [Sha10]. [SVG16]. BGV [GHPS12, GHPS13]. birth [YY17a]. Birthday BGV-Style [GHPS12, GHPS13]. Bias [ACD18, LST12, GJ19, SXL16, Nac12]. [BHT18]. Biased [USH19, LLP+18]. Birthday-Bound [LST12]. birthday-type Biclique [BKR11, KDH13]. Bidirectional [GJ19]. Birthmarking [TLZ+17]. Bit [GMNS15, GH12]. bifurcation [SE18]. Big [CK17, CG14a, GV14b, HG12, HS18, [FYD+19, GRRZ18, HLC+18, KPB18, KTM19, LJK17, LPO+17, NIS12, Ros11, LLSL19, MLO17, Mal13, MMS17b, PH16, YLL+12, APPVP15, BGG+19, KS11, PNRC17, PWS+19b, YDY+16, ZLW+17, KFL+10, MMN12, PLSvdLE10, RH10, FS18, HL19, JLC18, LSBN14, QCX18, SLXX16, TWZ+12, VN17, ZSH+19]. Rom12, Tan17b, WS14, WS19]. biggest bit-pair [SLXX16]. Bit-Wise [CG14a]. [Rom11]. Biggs [Low12]. bilateral [jT12b]. BitCoding [HS18]. Bitcoin bile [RBS+17]. Bilinear [Abe12, ASS15, [ADMM16, BRS17, BH15, Bra15, Chi13b, IL15, LZY+16, YS12, ZZ15, ZY17b]. HB14, Hur16, IM16, JSK+17, Mic16, Sir16, Bilinear-map [LZY+16]. Bill [Bel15]. Tay17, TS16b, VFV17a, VFV17b, WLY17, billions [Hof16, SMBA10]. Binary WHJ17, Ano16a]. Bitcoins [MPJ+16]. [ADI11, ABSSS19, ADSH18, AK14b, BitErrant [Ano17a]. Bits MBR15, MBF18, DGK18, SA14]. [BF12, LLL17a, YCL17]. Bitsliced Binary-Ternary [ADI11]. Binding [HMKG19]. Bitstream [SMOP15]. [HEC+12, LBC18, ZLQ15, LZ11]. Bio Bivariate [TWZ11]. Bivium [EVP10]. BIX [OK18, VGA19, AJYG18, GPVCdBRO12, [Muf16]. BLAC [TAKS10]. Black ZHL+11]. bio-cryptographic [ZHL+11]. [BR14, CPS16, HHP17, KOS16, KMO14, bio- [AJYG18]. MSas13, JB11, Rja12, SS10b, YKA16, DD13, Bio-inspired [OK18, GPVCdBRO12]. SK14, YSC16, ZZ12, Cri16]. Black-Box Bio- [VGA19]. BioAura [MSKRJ17]. [BR14, HHP17, KMO14, Rja12, SS10b, biographical [Maf16]. biomedical KOS16, MSas13, ZZ12]. Blackbox [AIA+18b]. Biometric [MSas12, SS12a]. Blackhole [SS15]. [Alp18, ATI+10, BDM+19, BCTPL16, BlackWatch [HSC19]. BLAKE DWB12, HFS+19, JN12, KHMB13, LGM+16, [AMPH14, GV14b]. BLAKE-512-Based May15, NGAuHQ16, PMG+19b, Sar12, [GV14b]. Blanchette [SR14]. Blended SKV12, SRRM18, SSP19, Vet10, YYK+17, [ACAT+15]. Bletchley [Bai12, Ano11c, AAL19, AHM+18, BK19, DEL19, DIMT12, Bri11, Cop06, Cop10a, Cop10b, GMT+12, GCSAddP11,´ GBC19, HT11, Ham19, GW14, McK10, McK11, McK12, Pea11, KCS+18, LK12, LTC+15a, MLBL12, Sar10a, Sim10, Smi11a, Smi15b, Smi15a]. Blind Sar18a, SR10, SC19b, YWZ+18, ZQD16]. [AP10, Ano15a, BCPV11, LCLW17, Biometric-based LGPRH14, MR16, MMN12, RS16, 15

YMWS11, HKB14, MO14, RSM15, RMG18, Boomerang [BCG10]. Bootstrapping WLDB11, yWpWyYpN13]. Blindfold [BGV14, GM14, KKJ+16]. Border [Nac16]. Blindfolded [Vai11]. Blinding [LGM+16, ZTSR12]. Born [LJY16]. [CLHC12, KHHH14]. Block BotMosaic [HB13]. Botnet [NSA15]. [AMVZ12,´ BRS17, BSS+13, BFMT16, botnets [HB13]. Bottom [Smi11b]. Bound BDGH15, BCG+12b, CWP12, DWWZ12, [GR19a, LST12, Raz19, WJ19, TK19]. EGG+12, FXP+17, GLLSN12, GT12, Bounded [GVW12, GJO+13, PDNH15, GST12, GNL12, IS12, KR11, KWS+12, QZZ18, SS12a, ZYT13, IM14]. Bounding LYK19, LWZ12, LJ17, LCLW17, LGLL12, [ABB+19b, PYH+18]. Bounds LWKP12, LWPF12, MCDB12, MRTV12, [BCG19, CK17, Jia17, LJ15, SNJ11, SS10b, OGK+15, PH12a, PDJ+19, PRC12, Pud12, Sha10, Shp03]. Bouzefrane [Ano15b]. Box SJLK18, SGP+12, SSA13, WW12, YCL17, [BW16, BCGN16, BCKP17, BR14, CPS16, ZSW+12, BNY14, Jeo13, KM11, LGP19, HHP17, KMO14, LYL+18, Mic10b, LPZJ15, LC13, LYHH14, LWKP14, RMTA18, Rja12, SS10b, SWF+19, KOS16, MCL+19, MNP12, MHV15, MHY+18, PL16, KCS+18, LRW13, MSas13, RMP10, Sar11, SKK10, TQL+14, Tan17a, WB12, SGFCRM+18, ZZ12, ZSW+18a]. WWBC14, ZSW+18a, JKP12]. Box/Inverse [RMTA18]. Boxes Block-Parallel [MCDB12]. Block-Wise [MM17b, NN12, WJ19, LJ15, SS11]. Boyle [SSA13]. BlockA [CHL19]. Blockchain [Mat19]. BRAMs [DGP10]. Branch [Alz19, Ano19c, ATD17, AHWB20, CLC+19, [EPAG16, ZYY19]. Branchless [RBS+17]. Eya17, Hur16, HM19, JWNS19, KV18, Brandt [DDL15]. Brave [KM10c]. Brazil NML19, Pec17, Scr18, SG19b, SJZG19, [BA18]. Brazilian [Uto13]. Breach TBY17, VFS+19, ZXL19, HHBS18, JLX+19, [SD12, JB11]. Break [Ayu12, BP06, Win17]. LHH+18, Nor17, CHL19]. Breakers [Sti15, Mun17]. Breaking Blockchain-Based [AP13, CN12, Che18, Cop10a, GMT+12, [HM19, HHBS18, JLX+19, LHH+18]. KS11, RSMA19, TPL16, WgMdZlZ12, Blockchain-Enabled [KV18, NML19]. Ant14, Bri11, SJ19]. Breaks [Ano17e]. Blockchains [BNMH17, RM19, WSL+19]. breakthrough [Goo12]. breath [LSR13]. blockcipher [CMMS17]. Blockciphers Breathing [CSH+18, CRS+18, HCYZ18]. [LST12]. Blocks [JSK+17, Bra15]. Bloom Breathing-Based [CSH+18, CRS+18]. [ATKH+17]. Blowfish [KB10]. BLS [BP18]. BreathLive [HCYZ18]. Bregman BlueKrypt [Gir15]. Boardroom [LHF12]. [CCZC13]. Bribery [CW12b]. Bridging Bodacious [KM10c]. Body [LRVW14, TMGP13]. Briggs [Bai12]. [LZCK14, LCR+18, ASO14, KP18, LIK+17, Bring [Zha15a]. Bringing LZZ19b, SGJ+18, WDV18]. body-sensor [Ano15c, OYHSB14]. Britain [Ald11]. [ASO14]. bogus [XWDN12]. Bombe British [And13]. Broadcast [Bur11, Car10]. Bonebrake [SS10c]. Boneh [BS14, GMVV17, HMR14, KH10, LMGC17, [TK19]. Bonneau [Ano16a]. Book [Ano15b, LMG+18, PSM17, PPS12a, RMZW19, Ano16a, Ano17b, Ayu12, Bar12, Dew11, SXH+19, WQZ+16, XJW+16, Yan14, Ful10, Joh10, Keb15, Kob10, Low12, Mei10, ZHW15, CPPT18, DLN13, SM19b, Mur10, Sch15a, Sha10, SR14, Ter11, Sto12]. WWYY11, WDZ19, XWDN12, XZP+19, Boolean [ACZ16,´ AS17, CW14a, DQFL12, YMM13, ZWQ+11, ZZ12, Zhu13]. FY11, LVV11, WT13, YCC16, ZZQ+19]. Broadcasting Boolean-based [CW14a, YCC16]. [OO12, MK11, OCDG11, SM19b, YY11]. 16 broke [Bat10, Hea15]. Broken [MDAB10]. SEHK12]. -192 [Blo15]. Camera Broker [TKR14]. Broker-Less [TKR14]. [ATC17]. Cameras [ASV+18, MKH+12]. Browse [NA14]. Browser Can [Alo12, AZH11, Bar15, DSMM14, [QF19, ABR13, ACC+13, BCFK15, GIJ+12]. KNTU13, YM16, Pec17, RK11, Rus15, Sto12, browser-based [ACC+13]. Browsers GMVV17, LMS16]. Canada [JY14, MV12]. [FVJ19, Ree15]. browsing Canal [GWP+19]. Cancelable [MWW+18, YYK+19]. Bruce [Sev16]. [QLZ19, AJYG18, LZ11, LH14, YWZ+18]. Brute [CJP12, JR14, CJP15]. Brute-Force Cancellation [DLMM+18]. cancelled [JR14, CJP12, CJP15]. BRW [CMLRHS13]. [Ano14c]. Candidate [GGH+16a]. BSeIn [LHH+18]. BTC [CLF11, QJC+18]. candidates [ABM+12]. canonical [Bul10a]. BTC-compressed [CLF11]. Bubbles CANS [HWG10, LTW11]. Can’t [HHBS18]. Buchwald [ABJ13]. Bucket [ASV+18, Kni17, RAZS15, PZ15]. [BKKV10]. Bug [Chi13b]. Build [IM16]. CAOVerif [ABF+14]. Capabilities Building [BPS16, GB19, KMP+11, MJS13, [CHN+18, GFBF12, Lop15a, KMG17]. Sev16, WL11, LCKBJ12]. built [GSAV18]. Capability [IA15, LLZ+17, LT13]. built-in [GSAV18]. Bullet [McG16]. Capability-Based [LLZ+17]. Capacity Burdens [Bla12, SR14]. Bus [AN17]. [LLY+18, TODQ18, WYL18, XNRG15, Business [LDB+15]. Butterfly [HQY+18]. YWW10, BCND19, CLZ+17, GZHD12, Buyer [Fra16, KJN+16]. Buyer-Friendly PWLL13, WLH13]. Capacity-aware [Fra16]. BYOE [Tan17a]. byte [TODQ18]. Capacity-Raising [YWW10]. [Hof15, Hof16]. Bytecode [SEK+19]. bytes Capitalism [Fid18]. CAPTCHA [PBCC14]. Byzantine [OTO18, SKEG14]. CAPTCHA-based [KS11, LLKA19, YKGK13]. [SKEG14]. Capture Byzantine-resistant [YKGK13]. [ASV+18, MBC+18, NYR+14]. Capture-the-Flag [MBC+18]. Captured C [AD12, ACZ16,´ Cra14, DGJN14]. C&C [HWZZ19, SPK17]. capturing [PKS18]. [GN16]. C1G2 [MK12a]. CA [ACM11, Card [BDFK12, HMR12, HCL+14, PDT12, Dun12b, Kia11, Lin14b, Pie10, Rab10]. Ano17c, CLHJ13, GLIC10, LNKL13, CABA [MSKRJ17]. CABE [XHX+17]. Mar10b, Cho10, SD12]. CARDIS [GLIC10]. Cache [AB15, ADR18, CBRZ19, DKMR15, Cards [BSJ15, LA10, PWVT12, FDY+19, HLAZ15, LWML16, SY15a, WgMdZlZ12, WgMW12, CHS11, HCC10, YDV19, DJL+12, DK17, MCL+19]. KY10, LH10c, LNM+11, LXMW12, MM12, CacheAudit [DKMR15]. Caches SGGCR+16, YZZ+14, YSL+10, YY13]. care [LLGJ16, CDPLCA16, DJL+12]. Caching [FHV16]. caricature [CLY18]. CariGANs [ADR18, HLAZ15]. cackled [Bai12]. CAD [CLY18]. Carlo [CR12, FVK17, GQH17]. [PGLL10]. Caernarvon [KMP+11]. Carol [Xie12a, Xie12b]. Carry [GWM16]. Calculus [MR10, Jou13]. Calibrated Carrying [PV17]. Carved [LC15]. [LC15]. California CASCA [DZS+18]. Cascade [WGD18]. [Ano10a, IEE11b, IEE15, MSH+16]. Call cascaded [DGL19]. Cascading [GT12]. [Ano16b, Ano16c, Ano16j, CS14, Hor19, Case [Ano17c, DR11, Kni17, SBS+12, KRM+10]. Call-Back [KRM+10]. Calls SY15a, SRT12, Uto13, YL17, Dya19, KD18, [Mur16, KGP+19]. cam [PKS18]. LKKL13, MD12a, SS17a]. Cases [SG19b]. Cambridge [ACM10, PJ12]. Camellia Cash [YMWS11, Bro12, Pec12, Zor12]. [Blo15, LWKP12, LWPF12, LWKP14, Casting [CW12b]. cat [Pow14]. Catalan 17

[SAM+19b]. Catalog [AHS13]. Catching [EAA+16, FVK17, KPW13, QZL+16a, [SXH+19]. CBA [KRM+10]. CCA QZL+16b, YFT17, YSF+18, YFT18, CR12, [AHS14, BWLA16, CBJX19, CZLC14, Par18, CL16, SJWH+17]. Chaining HWS+19, LLPY19, LTZY16, LSLW15, [GGK18, YM18, EA11]. Chains LLG19, MSas12, PDNH15, SYL13, SLZ12, [GKG19, JSK+17, HLYS14, JCHS16]. yYqWqZC13, ZYY19, ZY17a, ZSW+18b]. Challenge CCA-Secure [BWLA16, CZLC14, LTZY16, [AD12, GHS14, SPK17, YDH+15, ZCC15]. SYL13, yYqWqZC13, ZSW+18b]. CCA1 Challenges [MSas13]. CCA2 [Gal13, GV14b, LLW16, [CN12, FREP17, FS15, Fra15, Lal14, LLGJ16, LLSW16, MVVR12, RG10, ZZ12, ZY17b]. MRS+17, PCY+17, SBV14, TCMLN19, CCA2-secure [LLW16, ZY17b]. CCM ALL+18, Hod19, KJN+16, WS14]. Chances [SKK10]. CDF [Ara13]. CDH [ALL+18]. Change [KMJ18, ZWT13]. [PDNH15, ZG10]. CDPS [LLL+17b]. Changeable [FGM10, ZCL+12]. changed CDTA [YFT17]. cell [LLY+12a]. [Mac12]. changes [PTRV18]. Changing cell-counting-based [LLY+12a]. Cells [Abb12]. Channel [DSB16]. Cellular [dRSdlVC12, Ang16, [AMMV18, AN17, ASN11, ACA+16, Bar16b, FMA+18, HBBRNM+16, HCM11, KFE19, BCHC19, Bul18, CDK+10, CBL13, CATB19, KRM+10, SS11, WOLS12]. Censorship DZS+18, EWS14, GWM16, GPT14, HLH19, [DRS16]. Centers [SDC+17]. centralized KOP12, LGR14, LWML16, NDC+13, PRC12, [NACLR12]. centre SG15, TT12, YL17, ZBPF18, ADG16, [McK10, McK11, Pal16, ISC+16]. Centric BVIB12, BCDN17, CPPT18, CAM19, [DLZ+16b, FP19, Vle12, XHZ+19, ZVG16, DMWS12, DJL+12, GZSW19, GSAV18, AHM+18, BLV17, BPP10, PN10, YWY+19]. JLT+12, LM14, LFK19, MFH13, ZYGY18]. centroid [LWY12]. Centuries Channels [Gri15, McG11]. Century [Wes16]. Cerf [ASN12, BGN17, DKMR15, EPAG16, [Cer15, Cer18]. Certificate FDY+19, KW14, SS19, VCD16, Vua10, [GWWC15, HP12, LTH+15, LDZ16, YDV19, AGH+17, BCND19, BEB+18, CL16, WMS+12, YLZ+16, ZGCZ18, BJR+14, DMV15, DKL+16, LWZG10, MCL+19, GLL+18, Lan13, LHM+10, LDZ+14, LL16a, NR11, SM19b, SRB+12, WMU14, ZPZ+16]. MBF+13, NPH+14, JB11]. Chaos [AIA+18a, LW13c, RR11, Certificate-Based RVRSCM12, ARG19, CCLL11, LW13b, [GWWC15, HP12, LTH+15, LDZ16, jT12b, ZLW+12, SGFCRM+18]. WMS+12, ZGCZ18, YLZ+16, GLL+18, chaos-and-Hamming [CCLL11]. LHM+10, LDZ+14, LL16a]. Certificateless Chaos-Based [RR11, RVRSCM12, [CT18, GWWC15, IL15, LSQZ17, LSQL18a, AIA+18a, LW13c, ZLW+12]. Chaotic LZCK14, RSD19, SZS14, TCL15, WMS+12, [BCGH11, IAD10, LFX+18, Ye10, Bro19, YT11a, YT11b, YJSL18, YY17b, ZM18, GCH15, ISC+16, KCS+18, KLW+16, ZSY19, DXWD16, HPC12, JXLZ15, LL16b, LWK +18, LWW+19, LW10, LZKX19, SGJ+18, ZQWZ10, ZY17b]. Certificates NES+14, WDG19, WGZ+12, ZT14]. [HP17, Muf16, SC12, GIJ+12, HREJ14]. Chapman [Ful10]. Character [SS12b]. Certification [LDB+15, Ver17]. Certified Characteristic [BGJT14, NR15, SR10, [ABBD13, CLL16, STC11, HL14, LH13, ZWZ17a, BGJT13, Jou13]. Characteristics XWXC14, YN19]. CertShim [NPH+14]. [SSP19, TCMLN19, BEB+18]. chaff [KHMB13]. Chain Characterization 18

[ALR13, BS13b, CRS+18, DPCM16, RZ19, NN12, PDJ+19, Pud12, Sas12, SEHK12, YZLC12, YDV19, DDD14, PLGMCdF18]. SJLK18, Sta11a, Vua10, WH18, WW12, Characterizing Xie12a, Xie12b, ZH15, ZSW+12, Zha12, [Ash14, JR13, RVS+18, MPJ+16]. Charging Bay10, Bia12, Bor10, Die12, GMT+12, [CKHP19, LSY+16]. chart [Pec17]. KM10a, LGP19, LWK11, MCL+19, MRT10, Chattarjee [Kat13]. cheat [WS12]. MHV15, MHY+18, QGGL13, SKK10, cheat-preventing [WS12]. Cheater TQL+14, WB12]. [KI11, Oba11]. Chebyshev [BDPS12, CWWL12, CHH+19, zGXW12, [HD19, LWW+19, LPdS10]. Check [GST12]. HLW12, JMG+16, JSMG18a, KA17, Check-before-Output [GST12]. LZC12a, LLML12, MH14, PDNH15, PPS12b, Checkability [LHL+14]. Checkable Rao17, RWZ12, RS10, SSW12, VSR12, [IW14]. Checking [FYMY15, YL17, WWHL12, XMLC13, XWLJ16, YM19, SYY+17, YXA+16, PZL+19]. Chen ZHW15, CPPT18, FSGW12, GLM+16, [LLLK10]. Chennai [BC11]. China GH12, HPY10, HKHK13, JSMG18b, KTT12, [BYL10, IEE11a, LTW11, Yan10]. Chinese LCT+14, LFWS15, LZC14, LDZW19, [HF14a]. Chip [Bis17, HZS+19, KS18a, QRW+18, RD17, SGM16, WZC16, WLFX17, LGLK17, MDAB10, BAB+13, BGG+13]. XWS17, LAL+15, LHL15]. Chips [Man13, SOS15]. Chirp [OWHS12]. Ciphertext-only [KA17]. Cho [SPLHCB14]. chocolate [Svo14]. Ciphertext-Policy [CHH+19, Rao17, choice [LLP+18]. choosing [BL17]. XMLC13, XWLJ16, ZHW15, JSMG18a, Choquet [SH11, SM11, SNM14]. Chosen JSMG18b, LFWS15, LDZW19, QRW+18, [FSGW12, zGXW12, HLW12, HPY10, WZC16, XWS17, LAL+15, LHL15]. LCT+14, LZC12a, LLML12, MH14, RS10, [LLPY19, Sta12, WQZ+16, WWHL12, GLM+16, GH12, LZC14]. AHL+12, JSMG18b, LCT+14, NMP+13, Chosen-Ciphertext WXLY16, ZWY+19]. Circle [SC10]. [RS10, FSGW12, LCT+14, GH12, LZC14]. Circuit [AH19, EAAAA19, Kar12, MTY11, Church [ABJ13]. CHURNs [RBNB15]. XWS17, XWLJ16, Lau12, MS13a]. Cipher [BW16, BFMT16, BCG+12b, Circuit-Size [MTY11]. Circuits CMLS15, CGCS12, DM18, DG12, DWWZ12, [AIK14, AS17, BCKP17, BR14, GGH+16a, EHKSS19, Fis15, FXP+17, GLLSN12, GH11a, GVW15, MBF18, SS10b, SS12a]. GCS+13, HZ11, Hey17, IOM12, JKP12, circumstance [ZLY+19]. Circumventing KR11, KWS+12, LPS12, LYK19, LWZ12, [BAG12]. CISSP [STC11]. cities LJ17, LJ19, LWKP12, LWPF12, MRTV12, [LZD+19, SSSA18]. Citizen [Ano16e]. City MHC12, MS12b, OGK+15, PH12a, PRC12, [Ano17d, GAI+18, JZU+19, LNK+18a]. WSSO12, WHN+12, YCL17, ZAG19, claimant [YI17]. Claims [SKGY14]. Clara AMS+10, BNY14, CR12, FVK17, HKT11, [MSH+16]. Class [BCG12a, SY15a, Hol12, Jeo13, KDH15, Lew10, LC13, LYHH14, XYXYX11, BJ16, Goo12, KK10]. Classes LWKP14, MNP12, PL16, Ree15, RS14, Sar11, [ACZ16].´ Classical [BCDN17, DSLB18, WYL14, WWBC14, ZSW+18a, LGL+12]. JEA+15, MSU13, SSU12, CR12, RK11]. Ciphers [ABS+12, BMS12, BSS+13, BM18, Classical-quantum [BCDN17]. BKLS12, Bru12, CWP12, DGFH18, DGlS12, Classification [CHH+19, HPC10, HS18, DJG+15, EGG+12, EKP+13, GT12, GST12, KAHKB17, SGP+12, ZLW+17, ACMP19, GNL12, Has16, Hey17, IS12, KE19, KPC+16, HZW19, LHL+18]. Classifiers Kla10, LCLW17, LGLL12, LJ16, MD12b, [KGV16, LCM+17]. classroom [Pow14]. 19

Claudius [Hol12]. Clean [Fri13]. CLEFIA SWW+17, SA19, TLMM13, WLWG11, [LWZ12, TSLL11, TS16a, WB12]. WL12, WSC14, WMX+17, WXMZ19, CLEFIA-128 [TSLL11]. CLEFIA-type WDV18, WLS14, WS19, WCCH18, WL19, [WB12]. Client XXX15, XWK+17, XWY+18, XTZ+19, [ASM12, CTC+15, FD11, RAZS15, Vle12, XYML19, YYS+16, YZCT17, YHHM18, BK19, FA14a, FA14b, GSGM16, JLX+19, YQOL17, YQZ+19, YWT+12, ZYC+17, MHL18, SG19a, hSZZ15, WT10a]. ZVH14, ZDW+16, ZZC17, ZWS+18, Client-Based [ASM12]. Client-Centric ZFH+18, ZLY+19, ZHT16, ZZL+19]. [Vle12]. client-server Cloud-aided [SGJ+18, WLFX17]. [BK19, FA14b, MHL18, hSZZ15]. cloud-assisted [WDV18]. Cloud-Based client-side [SG19a]. Clients [KS18b, SRAA17, ASO14, BK12b, WCCH18]. [Chi16, LLPY19, LH13]. cloaking [NZL+15]. cloud-edge [CXWT19]. Cloud-Edges Clock [VTY18]. Close [Wal18]. Cloud [BDL+19]. cloud-hosted [SG19a]. [AJA16, BDL+19, BCQ+13, BTK15, BCK17, Cloud-Manager-Based [KKA15]. CWL+14, CWL16, CDFZ16, CCT+14, Cloud-of-Clouds [BCQ+13]. Cloud/Fog CLW16, CDLW19, DK16a, DXA14, FYD+19, [JWNS19, LWW+19]. Cloudier [CFE16]. FCM14, FPY15, HWZP18, Her19, JLS12, Clouds [BCQ+13, HLC+18, RHLK18, JWNS19, KMSM15, KS18b, KKA15, K¨up15, RSN14, HFT16, IC17, JKL+16, LFWS15, LA15, LLPY19, LYZ+13, LGR14, LLC+15, LL16a, Wu17, YNX+16]. cluster [BYDC19]. LCDP15, LNXY15, MLO17, MJW+18, Clustered [DS11, KS18b]. Clustering MGJ19, PSM17, Pet12, PBC+17, RSGG15, [KRDH13, VSV15]. CMAC [SKK10]. Co SGG18, SGJ+18, SKH17, SRAA17, SOR16, [LFH18, MBR15, MRL+18, HFCR13]. TV15, Vle12, VFFHF19, WLFX17, WRP70, Co-analysis [LFH18]. Co-Design WHLH17, WWW17, XNKG15, XWSW16, [MRL+18]. Co-operative [HFCR13]. XMLC13, XWLJ16, XJW+16, YDY+16, Co-Processor [MBR15]. coal [KO16]. YZDZ19, YHL16, YJSL18, YXA+16, cocktail [OHJ10]. Coda [Ber16a]. Code YMC+17, ZZQ+19, ZDL12, ZLDC15, [AD12, Bud16, CCL+13, Cop10a, Fox13, ZVG16, ZLW+17, ZZL+18, AaBT16, HG12, KSSY12, Mun17, PYM+13, SS13, AKKY17, AZPC14, ASO14, AAZ+16, Sen17, Sti15, War11, ABBD13, Ant14, AKK+17, ABR13, ADH17, ALL+18, Bel18b, Bha16, Bri11, CCLL11, CCMB19, CBJY16, BSBG19, BZD16, BG14, BK12b, CFVP16, GIJ+12, GAB19, MCP15, McG11, McK12, CSD18, CLH+16, CXWT19, CZ15b, CDL18, Moo14, OF11, PTRV18, PA10, Wes15]. DDY+19, DYZ+15, EAAAA19, FH13, Code-Based [HG12, SS13, Sen17, CCMB19, FLYL16a, FNWL18, GQH17, GLB+18, GAB19, MCP15]. code-breaking GZS+18, HSM13, HZWZ18, HK19, HYL+19, [Ant14, Bri11]. Code-cracking [War11]. HYS18, IMB17, Jeo13, KKA14, KKM+13, codebreaker [Car11]. codebreakers KKM+14, KSB+17]. cloud [KLW+17, [Ano11c, Bud16, Maf16, McK12, Smi11a]. KKD+18, LXK+14, LZY+16, LLH17, Codebreaking [Bai12, RS18, Cop06, LZWZ19, LWW+19, LAL+15, LW13a, Cop10b, McK10, McK11]. Coded [She14]. LYL15, LHL15, LCY+16, LZC17, MLM16, Codes [ACA+16, Ano19b, BBC+13, Bay10, MSGCDPSS18, NR17, Nam19, NB13, BP06, BKST18, Big08, DBPS12, DPW18, ODK+17, PPA18, PP11, PPG19, PWS19a, FMNV14, GMNS15, Gri15, HC17, KW14, Rao17, RR16, SG19a, SLL+19, SYY+17, MBR15, OTD10, PWBJ17, SEY14, ST14, SAR18b, SLM10, SKB+17, SWW+16, TLW12, WGF16, WSS12, Xie12a, Xie12b, 20

YTP11, Yek10, ATI+10, Bul10a, CZ15a, Combinatorial [ZAC17].´ Combined Chi13a, Fag17, Hea15, LTT10, MG15, O¸¨ S11, [PP10b, PDJ+19, RMTA18]. Combining Tan15b, YSJL14, Ayu12, Low12, Nag19]. [AGBR19, Chi13a, CDF+10]. Coming Codevelopment [DF16]. Coding [SOG15]. Comment [LCLL15, Ver17]. [ACA+16, Che11, CWL16, CJ13, CG14a, Comments [IC17, Kim15, hSZZ15, Tan11, DG17, Hes12, LCLL15, Per13, SSKL16, TCL15, XWS17]. Commerce WCXZ17, AZF+12, Bul10b, CJXX19, [Bla16, HvS12, Orm16, Ano11a]. DTZZ12, JZS+10, KM11, LLP+18, NDNR13, Commitment [CK17]. Commitments OF11, Tan15b, YTM+14, Kim15]. [Pas13a, CSZ+11, LP11]. Committee CoDiP2P [NCCG13]. Codon [HEK18]. [Bla16]. commodity [KKJ+16]. Common Coefficients [BDB14]. Coercion [CW12b]. [CN12, DHB16, ESRI14]. Communication Cognitive [ADM19, Alz19, BPSD17, Big08, BCG19, [PP11, BSBG19, Kim11, OK18, RPG12]. CCM17, CCW+10, FMS12b, Gas13, Cohen [Ara13]. Coherence [YDV19]. Coin GPVCdBRO12, KW14, Low12, OKG+12, [ALR13, BHT18, CLP13a, CK17, DSMM14, Wan13, ZC13, ZHW+16, AASSAA18, Mat14, BB14, Wag16]. Coins [Fok12]. ADG16, BEB+18, DKL+16, GM13b, CoinTerra [BH15]. COIP [BCF16]. HCCC11, HLYS14, HPY10, KRM+10, COIP-Continuous [BCF16]. Colbert KTUI16, LT13, LyWSZ10, MCN+18, [Dew11]. Collaborating [SDC+17]. QMC17, RK11, SSAF11, SSPL+13, Tso13, Collaboration [CRE+12, PCPK14, WLZ+16, YKGK13, Zhu13, vDKS11]. CWZL13, DYZ+15, HYS18]. communication-efficient [Tso13, Zhu13]. Collaboration-Preserving [CRE+12]. Communication-resource-aware [Wan13]. Collaborative communicationless [DGL19]. [MJW+18, LLY06, LT14b, HB13]. Communications [FMC19, JTZ+16, Collabratec [Ano16g]. collect [Sch15c]. KSD+17, KYEV+18, OO12, PSM+18, Collective [IM16]. Collision [BK12a, ZL12, RSD19, SSKL16, SMS14, AMN18, Ang16, AKY13, Con17, SKP15, SBK+17]. BC16, DMM10, DZC16, Edw17, FHH10a, Collision-based [ZL12]. Han12, LFGCGCRP14, LLZ+16, MHY+18, Collision-Resistant [BK12a]. Collusion RS15, TKG+17, WDZL13, ZZY+19]. [MMSD13, RVH+16, FLZ+12, GMRT+15, Community [BPS16]. Commutative SCBL16, ZZL+19]. [CLHC12, SLGZ12]. Commutativity collusion-attack-resilient [SCBL16]. [ABR12]. Commuting [Fuc11, AKG13]. collusion-resistant [GMRT+15]. Compact [CFOR12, CKLM13, EGG+12, collusion-resisting [ZZL+19]. Collusions LYX+19, LSQX19, MAS16, SJLK18, Seo18, [GVW12]. Color [BCPV11, DD13, FR16, TV19, VSR12, YM19, ZMW16]. HD19, LW10, MR16, RMG18, ST15, compacting [CPPT18]. Companion yWXyZ+18, YWNW15, Bro19, MSM+18b, [KR11]. Comparable [XHX+17]. SNM14, yWpWyYpN13, WGZ+12, YSC16]. Comparative colors [MMLN15]. Colossal [Hai17]. [DDR+16, MHV15, BKR19, NR11]. Colossus Comparing [KTM+18]. Comparison [Cop06, Cop10a, Cop10b, HP18, Wil18]. [CGCS12, DWB12, HPC10, KU12, KA18, Coloured [PS14]. Column [FS15]. MZLS18, ST14, HM10, LCM+17]. combating [FTV+10]. combination comparisons [Mid10]. compartmented [Wat14a]. combinational [MS13a]. [EZ15]. Compensated [GKSB17]. 21

Compensation [JSZS12, WMU14]. GST12, GVW12, GHKL11, HP14, HC17, Competition [jCPB+12]. competitive HZX+18, IEE11a, Jin10, KW14, KMO14, [MD15]. Compilation [CHS15]. compiler LHM+15, LQD+16, MMP14, Mal13, [LWS10]. Compiling [CR10]. NSMS14, PST13, RS17a, SZHY19, SVCV15, complementary [MMLN15]. Complete SZQ+17, TX16, TM18, Wat10, ABDP15, [Ash14, BCEO19, BCEO20, BS14, FLH13, AB10b, BHH19, DEL19, DGL19, LDDAM12, GHKL11]. completely [Con17, Win17]. PHGR16, TG12, YSQM19, vDKS11]. Completeness [FKS+13]. Completion Computational [MHW+19]. Complex [BBD19, BCO13, GKS17, RD17, RPHJ11, [pNyWyY+14, VGA15, BW13, LZKX19]. TBCB15, HRS13, SJ19, SDM14]. Complexity Computationally [BCEO19, BCEO20]. [BBD19, BIKK14, BCG19, BW12, DP12, Computations [ARM15b, CK18, KHPP16, FS15, Gas13, HHS+15, Shp03, AAT16, Nac16, PH16, ADMM16, BK12b, LWW+19, DJL+12, Jou13, KGO10, LWW+10, SDM14]. LR15, SSAF11, TLMM13]. Compute Compliance [SOF12, Tay19]. compliant [MJW+18, Vai12, PZ15]. Computer [BP10, Lan11]. Component [BGK12, BCGK12, BGB12, BdD19, Bul10b, [BKLS18, MV16a, Bre18]. components DF16, Gas13, IEE10, IEE11b, IEE13, LL15, [RITF+11]. Composable [DN12, KMO14]. MSH+16, Nag19, Nie02, Orm16, PWBJ17, Composing [TW14]. Composite Roh19, TBL19, TT18, Ter11, Vua10, [Dun12a, GM16b, ZL19, BBDL+17, NDSA17]. ABBD13, DK12, FGPGP14, PHWM10, Composite-Field [GM16b]. Composition Sta11c]. Computer-Aided [LJS+14, NRZQ15, Ana14, AGH+17]. [BGK12, BCGK12, BGB12, ABBD13]. compound [BJ16, KPS10, jT12b]. Computers Comprehensive [GSFT16, YFT17, YJSL18, [Mos18, Bre18, Cop06, Cop10b, Dya19, ZBPF18, Bul10a, KAS15]. compress LCKBJ12, Mac12, MvO11, PHWM10]. [LC13]. Compressed [DG17, JSCM17, Computing KD12a, SR12a, WLZL12, CLF11, Fay16]. [ACM10, ACM11, AMMV18, Abb12, AJA16, Compressed-Domain [WLZL12]. Ano17e, BCG+12b, BTK15, CLB19, Cer14, Compressibility [HN10]. Compression CGB+10, DXA14, EAA12, FES10, Gen10, [CNT12, DLGT19, DA12, JSA17, LJF19, GB19, JWNS19, KMSM15, KP17, LCK11, LD13, MAL10, PMZ13, PP10b, TCN+17, LT14a, LYZ+13, LLC+15, LLGJ16, LNXY15, WHZ12, ZSP+19, Ara13, CMMS17, DTZZ12, MLO17, OS16, PAF18, Pet12, RS18, Roh19, KV19, LK14, Li10, LPZJ15, PP11, QZ14, SJWH+17, SLM10, Vai11, Vle12, WRP70, RSMA19, SI12]. compression-based [SI12]. XMLC13, XWLJ16, YE12, YZDZ19, YHL16, Compression/Decompression [PP10b]. ZLDC15, AaBT16, AAZ+16, And13, And19, Compressive [CCZC13]. Compromise ABR13, BZD16, CXWT19, CZ15b, CSTR16, [YNR12b, GBNM11, PX13]. Compromised DKL+16, DWZ12, DYZ+15, Dya19, GQH17, [DSSDW14, DSSDW17, ZYL+10]. Gop19, HSM13, HYS18, Jeo13, JSMG18a, Compromising [BC14, BM18]. KKA14, KKM+13, KKM+14, KSB+17, Compulsory [QRW+18]. Comput [HYS18]. KH18, LXK+14, LLH17, LYL15, LHL15, Computability [Gas13]. Computable MS12a, NR17, Nam19, NCCG13, ODK+17, [LGH+17, FWS13]. Computation PPA18, PP11, PKA15, QZDJ16, QRW+18, [ARM15a, ARH14, ABPP16, ABL+18, Rao17, Tan12b, WSC14, Wan18a, WDKV19, Ash14, Bee17, BDOZ11, CATB19, Fri10b, WLS14, WL19, XXX15, XZP+19, XWY+18, 22

XTZ+19, YHHM18, YWK+10a, YQOL17, considering [MLMSMG12]. Consistency YY11, ZWS+18, ZLY+19, ZSW+18b, [BCK17, SES+16]. Consolidated [KKA14]. YXA+18]. conceal [EEAZ13]. Concealed Constant [App14, AEHS15, BBCL19, [ARWK19]. Concept [GKG19, TMC15]. BHT18, CWWL12, KOTY17, KHPP16, Conceptual [PMZ12, SPM+13, TSH14]. KMO14, LP11, LSQX19, MWES19, Pan14, Concise [MC19]. Concrete [BS14]. ZMW16, AHL+12, DWZ12, LCT+14, Concurrent SGM16, ZWY+19]. Constant-Round [CLP13a, FCM14, GJO+13, MKRM10, [KOTY17, KMO14, LP11]. Constant-Size OOR+14, AKG13, SRB+12, XLWZ16]. [AEHS15, AHL+12, LCT+14, SGM16, condition [TD14]. Conditional ZWY+19]. Constant-Time [HBCC13, KPW13, LK18, LLG15, LSLW15, [BBCL19, MWES19]. constants [DWZ12]. MLO17, XJW+16, FSGW11, FSGW12, Constrained HWDL16, HYF18, IOV+18, LCT+14, [BSJ15, CSH+18, CRS+18, EAA12, MGB19, PZBF18, SKB+17, Tan12b]. JMG+16, KO14,¨ YNR12a, Yon12, DMV15, Conditionally [ZJ14]. Conditions KAS15, LLZ+16, LCL+17a, PCK19]. [Ano17d]. Conference Constrained-Version [KO14].¨ Constraint [BC11, CGB+10, Che11, Cra12, Dan12, [ZSH+19, GLMS18]. Constraints Dun12b, FBM12, GLIC10, IEE11a, JY14, [CCKM16]. Construct [SGY11, WT13]. LCK11, LW11a, LTW11, Lin14b, PJ12, Constructed [Ye10, ZH15, Dya19]. SNJ11, Sah13, Yan10, AB10a, Abe10, Constructing BYL10, BL10, Gil10, GG10, HWG10, Kia11, [CDSLY14, KO14,¨ ZSW+12, HRV10]. LH10a, Pie10, Rab10, vDKS11]. Construction [BWLA16, DF11, EM12, Conferences [NSP+18]. Confidential FZT14, GWWC15, HHP17, KMO14, [HS11, AZPC14]. Confidentiality MM17b, MSas12, Rog16, Sar10b, ST14, [BFK+10, DGFH18, HLLC11, OFMR16, WZ15, WCL+18, WMS+12, XHX+17, ZL19, PWS+19b, SZQ+17, WDDW12, Bia12, LFZ+17, LW19, MSas13, SA14, YWL+17, CHX13, EBAC17, ¸ ZHT16]. YT11b, YKC+12, ZCLL14, ZYM19]. Confidentiality-Preserving Constructions [BCF+14, DQFL12, HL10b, [OFMR16, SZQ+17]. Configurable KOTY17, LHM+10, SNJ11, SES+16, CZ15a, [CVG+13]. Configuration [Bis17, SHBC19]. CGKO11, NAL17, Zim10]. Constructive Configurations [SS10b]. confirmation [Mau12, WB12]. constructs [BP10]. [LH11a]. Congruence [VM14]. conjecture consumption [JS18a, MMF15]. [GV14a]. conjunction [Kre13]. Containers [HVP+18]. Containing Conjunctive [CWWL12, BL11, WL19, [XWDN12]. contemporaries [LCKBJ12]. XTZ+19, XLC+19, YQZ+19, ZZ11]. Contemporary [Opp11]. Content conjunctive-subset [ZZ11]. connected [AAA+19, ADR18, BCP14a, KD19, [ZAAB17]. Connection MHT+13, PMZ13, PZPS15, WHZ12, [CW12b, HLYS14, WGD18, MZ17a]. WZXL12, YT12, ZXZ+11, GPN+12, Connectivity [GTT11]. conscious [Ree15]. HPL+19, JS18a, YWY+19]. Content-based Consecutive [Tan12a]. Consensus [KD19, MHT+13, YWY+19]. [ABCL17, JSK+17, LLKA19]. content-centric [YWY+19]. Contents Consequences [Ess17, SS19, VWC19]. [BCG10, MSM+18b, SKS+18]. contest Consideration [CJP12, CJP15, KM10b]. [Cra14]. Contests [WXY+17]. Context Considerations [BF19, KD12b]. [AKS19, Fra16, SYv+19, ZCWS15, BGE+18, 23

SSSA18]. Context-aware [AKS19]. cookies [DCAT12]. CookiExt [BCFK15]. Context-Driven [SYv+19]. contextual Cooperative [Svo14]. Continual [LLZ+12, SJWH+17, ZLDC15, WQZ+13]. [BKKV10, XZY+12, YZ12, YCZY12]. Coordinate [YKK18]. Coppersmith Continual-Leakage [YZ12]. Continually [Dra16]. Coprime [GL19]. coprocessor [DLWW11]. Continuous [ABC+12, BGG+13, IBM13b]. coprocessors [ACAT+15, BCF16, DHLAW10, uHAN+18, [GCVR17]. Copy [YT12, MHT+13]. FMNV14, GMDR19, LKBK19, MSKRJ17, Copyright [SJ12, ZWWW17, GJ13]. Core PYP10, SCFB15, Sch15b, SRT12, Yam12, [LB13, YWF18, YS15, AVAH18, RS17c, ZY17a, ZYM18, ZYH+19, ARL13, BTW15, HLYS14]. Cores [MGG+19]. CXX+19, CRS13, HYL+19, LWYM16, CORMORANT [HFS+19]. cornerstone PLGMCdF18, SCR19b, ZYM19]. [Tan17b]. Correct [PST13, Lan11]. Continuous-Tone [Yam12]. contract CorrectDB [BS13a]. correcting [MMP19, Men13b]. Contracts [BNMH17]. [ATI+10, LTT10, MCP15]. Correction contrast [KSH18a, LSC+15, yWXyZ+18, Chi13a, [DDD14, GLW13, LWL10a, MM14a]. Sun16]. Correctness [YGS+17, WS13]. Contributors [Ma17a]. Contributory Correlated [RS10, Jia16, ZPZ+16]. [WQZ+16]. Control Correlation [BW12, FAA+18, LD13, [AMSPL19, ATS15, BFK+10, DLZ+16b, SDM+12, WWBC14, XHH12, YCL17]. GGK18, GRRZ18, HBC+19, HHS+15, correlations [Sar14]. Correspondence HLC+18, LGM+16, LGLK17, LJP17, [SY14]. corresponding [DWZ12]. MM17a, MK12b, NA10b, PV17, QZL+16a, Corrigendum [HYS18, WZM12a]. RSN14, SGC14, SYv+19, TBCB15, XMLC13, Corrupted [Fyo19]. cosmography [Pet11]. XHZ+19, YTH17, ARL13, ACK+10, Cost [ABC+17, AMH+16, CMLS15, CJP12, AMHJ10, BBTC20, CLH+16, CO11, Cra11, GI12, HLT+15, LZZ+19a, Man13, NVM+17, FG19, FNWL18, FS18, GHD19, HPJ+19, WMX+17, WHLH17, CZ14, CJP15, LEW19, JAS+11, LCL+17a, LCL+15, LLH17, Sar10a, YL11]. Cost-Effective LHH+18, MDHM18, NZM10, QCX18, RR17, [HLT+15, WHLH17, WMX+17]. Costas Sch15c, SA15, Tan12b, Wan18a, XHH12, [TRD11]. Costs [KHPP16, RPHJ11]. could XYML19, YWJ+19, ZML17, ZDHZ18, [And19]. couldn’t [Bha16]. Countdown ZVH14, ZWS+18, ZFH+18, ZZL+18]. [Zet14]. Counter Controllable [FH13, ZLDC15, ZHT16]. [ARP12, KMJ18, MKASJ18, Fay16]. Controlled [FMTR12, HKK19, WP17, Counterexample [KPW13]. Counterfeit WXMZ19, Har16, SM10c, XLC+19]. [YFT17]. Counterfeiting Controller [GMVV17]. Controllers [Alz19, Ano16f, Bro12]. counterfeits [AMH+16]. controls [CGH11]. controversy [GSN+16]. Countermeasure [McG11]. conundrum [Eve12]. [BBB+16a, MD12b, GJ19, HYL+19]. Conversations [WBC+10]. Converse Countermeasures [BGN17, DZS+18, [KPKS12]. Conversion [BJ10b]. converter EWS14, PZPS15, DK17, FAA+18]. [Pau19]. Convertible Counters [BM18]. Counting [CLL16, LH11c, HL11, LHH11, XWXC14]. [Bul18, LLY+12a]. Coupling [SMS14]. Convex [LLSL19]. Convolution course [KKM11]. Cousins [BPBF12]. [DWZ18, HZW19, HW19]. Convolutional cover [UUN13]. Covert [WYL18, KMG17, MG15]. Cookie [FVJ19]. [EPAG16, JTZ+16, NSA15, VCD16, YDV19, 24

LT13, LyWSZ10, SRB+12]. CovertBand Sun11, SvT10, Tam15, TSLL11, WYL14, [NTKG17]. Cozzens [Led16, Sch15a]. CP WWBC14, AY12a, AY12b]. [TY16a, YMC+17]. CP-ABE [YMC+17]. Cryptanalyzing CPM [PYM+13]. CPS [FQZF18]. CPU [LLL17a, LLLH18, ZLW+12]. CryptDB [LLD19, ZBPF18]. CPUs [AVAH18]. Crack [PRZB12]. Cryptic [Mar10a]. Crypto [Fox13]. cracked [Ano13a, BCC+19, DMO+19, Goo12, [Ano13d, McG11, McK12, Moo14]. MWES19, Pfl10, Rab10, SCPSN10a, Cracking [Gri15, GAS+16, War11]. SCPSN10b, SMSK18, WL11, BSR+14, crawlers [GPN+12]. CRC BGG+13, PTRV18, Hom17]. [Ful10, Joh10, GMSW14]. CRC/Taylor Crypto-Currency [DMO+19]. [Joh10]. Create [DFKC17, HGOZ19]. Crypto-stego [SMSK18]. cryptoanarchist creating [Bre18, OO10, Pau19]. creation [Pec12]. Cryptoclub [Ayu12, BP06]. [GJJ18]. Creativity [WP15]. Credential [BNMH17, JSK+17]. [YLSZ19, JMW+16, KKM+13, XMHD13]. Credentials [CG12a, SSW12]. Credible [Ano16a, BH15, Eya17, FVB+18, RM19]. [ZW15]. credit [Mar10b]. cribs [Pea11]. cryptograms [Shy15]. Cryptographer Crisis [OdH12]. Criteria [PYS18, ZZKA17]. [Dun12b, Kia11, Pie10]. Cryptographers Criteria-Based [PYS18]. critical [Ano16e, BPS16, Goo12]. Cryptographic [YWZ+18]. crittografia [Sac14]. CRM [Abe12, AMKA17, AD12, ARH+18b, [LHM+15]. Cropper [KLK+19]. Cropping ARH+18a, AMVZ12,´ App15, AHWB20, [SR12b]. Cross [AKK+17, CLY14, DSB15, BMP12, BBD19, BEM16, BCGK12, BGB12, LHM+15, MV16a, YGFL15, YZL+18, Bar15, BCM+15, BCHL19, BIKK14, BLS12, ZXH16, ZTSR12, SS17a, der10]. BDP11, BFCZ12, BDGH15, Bla12, BKL+13, Cross-Border [ZTSR12]. Cross-Domain BSJ15, BNA15, CCK12, CCCK16, CK17, [CLY14, YZL+18]. Cross-group [AKK+17]. CFE16, jCPB+12, CBL13, CHN+18, Cor14b, Cross-Layer [LHM+15, ZXH16]. CATB19, CFG+17, DB16, Des10a, DQFL12, cross-matching [SS17a]. Cross-Site DR11, Ess17, FKS+13, FY11, FLW12, Gir15, [DSB15]. Crossword [Mar10a]. Crowd GM11, GLR10, GG11, Har16, HN10, [Lal14, MJS+19]. CRT [PT19]. HHH+13, HST14, HSA14, IBM13b, JR13, CRT-exponent [PT19]. Crypsis [GSC17]. JHW+19, KOP12, LVV11, LLK18, Loe15, [HHAW19]. MVV12, MKK17, MP12, MKAA17, Muf16, [Bar16b, BW12, Bor10, CWP12, CGCS12, MK12b, NIS13, NA10b, PTT16, PFS12, DG12, DJG+15, Far14, GST13, Gor10, PS14, PJ12, RMP10, RSBGN12, RPHJ11, HK14a, Hin10, IOM12, Jeo13, JL18, Kha10, Rja12, RBHP15, SK11, SEY14, SFKR15, KN10, KWS+12, LH10b, LNM+11, LJF16, Sch12c, Sev16, SGY11, SP15b, Shp03, LFX+18, LSQL18a, LSQX19, LJ16, MWZ12, SDM+12, SR14, SOF12, TW12, Tom16, MV19, MZ15, NXB13, OTD10, PSOMPL13, WSL+19, WRP70, XZL+19, YZLC12, SPLHCB14, SM10a, SM10b, TY16a, TG17, YNR12a, YNR12b, YS15, ZSY19, ABDP15, Vua10, Wag10, WWYZ11, WWYY11, AY14a]. cryptographic WSSO12, WYW14, XQL11, YCL17, [ABB+14, ABF+14, ABC+12, ABO+17, YMWS11, AP11, BMB16, BKR11, Bul10a, BYDC19, Bar19, BFG+14, BJ10a, Bon19, Bul10b, CJL16, Con12, DMSD18, Eis10, CFL13, Cha13a, CFZ+10, CR10, CP13, FVK17, Her10, KDH13, LLLK10, LFW+16, CLCZ10, Cra11, DGJN14, EBFK13, ESRI14, Nov10, PT19, RITF+11, SDM10, SDM14, GGH+16b, GJJ18, Gil10, GLR13, HYL+19, 25

JCL+18, KKJ+16, KSU13, KAS15, Ksi12, BAB+13, Bl¨o12, BSR+14, BSW12, BBB16b, KKK+16, LGKY10, LLL+17b, MS13c, CFR11, Cha13b, CQX18, Cho14, CSTR16, Mat19, MMZ12, MM13, Mes15, Con12, CDSLY14, DDD14, DA18, Dav11, MSGCDPSS18, MN10, NDNR13, OO18, DD13, DGMT19, Dur15, Far14, GCVR17, OMPSPL+19, Pal15, PLPW13, PSdO+13, GAB19, Har15, HH15, HZWW17, Hod19, QZDJ16, SD10, WT13, WMX+17, YSM14, Hof16, IM14, JLT+12, JY14, JW14, KL08, ZHL+11, ZVH14, Zim10, Sha10]. KL15, KD18, KKM11, KK10, KGO10]. Cryptographic-Key [SK11]. cryptography [Kre13, KKD+18, KSH18a, Cryptographical [KU12]. KSH18b, Lam13, Lan11, LLLK10, Lin14b, Cryptographically LWL10a, L¨ud12, LY14, MCN+18, MS13b, [ADD10, BCGH11, BJL12, BKLS18, MC11, MD12a, MCP15, Mic10a, MHL18, NLYZ12, NDG+17, PLSvdLE10, SVCV15, CBL10, Nov10, OK18, OTO18, Opp11, PHWM10, GCH15, HJM+11, SA14]. Cryptography PP11, RY10, Sac14, Sah13, SK14, SSAF11, [ACZ16,´ Alz19, Ano15c, Ano15d, Ano16b, Sta11c, Sti11, Svo14, UK18, VDO14, VN17, Ano16c, Ano16j, Ano19a, Ano19b, App14, WHJ17, WYK12, YT11a, YSC16, YXA+18, AAB17, AG18, ACM+17, ARM15b, Bar12, YDH+15, YR11, YN19, ZXW+18, vDKS11, BGK12, Bar15, BBCL19, BRT12, BCGN16, Che11, LZJX10, Nac12, Cou12b, Ful10, Big08, Bon12, BF19, BKKV10, BJ10b, Gas13, Low12, Mei10, Mur10, Ter11]. Buc10, BLM17a, BLM17b, BLM18, BCF+14, cryptography-based [BOB13]. CNR14, CT18, CJFH14, Cas10, CGMO14, Cryptography-Related [Cil11]. Cryptol Che17, CST+17, CDFZ16, CSW12, Cil11, [Lau12]. CryptoLocker [Ano13b, Ano14a]. Cra12, DDS12, Dan12, DK02, DK07, DK15, Cryptology [BC11, Bro11, Dun12b, LW11a, DXA14, DP17, DBT19, DHLAW10, DF16, Nag19, PWBJ17, PJ12, AB10a, Abe10, DKS12, DR11, Eis10, Elb09, FPS12, BYL10, BL10, FES10, FGPGP14, Gil10, FHLD19, Feh10, FSK10, Fid18, FBM12, GG10, Kia11, LH10a, MZ17a, Pal16, Pie10, Fre10, GT19, GO17, GFBF12, Gol19, G´13, Rab10, HWG10, LTW11, Kob10]. Gre19a, GPT12, GLW12, Ham17, HEP+11, Cryptomania [Gen13]. Cryptoprocessor Hes12, HG12, HR19, HPS08, HKR+18, [EHKSS19, GV14b, SWM+10]. JS18b, JT12a, KM10c, KP10, KAK18, cryptoscheme [SLXX16]. LSL12a, Lin17, LWL10b, LGWY12, [CCT+14, KD19, LH10b, SZHY19, LMHH14, LGH+17, LWHS17, LPO+17, SWM+10, WSQ+16, Zaj19, ACD18, AK14a, MO12, MSI10, Mau12, Men13a, MR14c, BS15, Chi13a, Gal13, GV14a, GLB+18, IB11, Mic10b, MST18, MV12]. Cryptography LZ11, LYC+10, MM13, MG15, NZM10, [MMB17, NNA10, NDR+19, Nie02, NS12, SvT10, yYqWqZC13, YY11, YY13, sCR19a]. Orm16, PP10a, PABC´ +19, PPH12, PG12, Cryptosystems [ADI11, CLND19, OTD10, RW12, Rog16, SY14, SG15, SOG15, Sch16c, PSM17, ZSP+19, AHG18, AJYG18, Sch18, Sch19b, Sen10, SS13, Sen17, SK12b, AVAH18, BNST17, FWS13, SA16b, ZYM19]. Seo18, She17, SA16a, Sim15a, SGS14, Sma16, [YY17a]. CryptRndTest Sta11b, Ste15a, VS16, VGA19, WWL+14, [DB16]. CS [LJ19]. Csec [AD12]. CT WY12, Wes16, Yam12, Yan11, YTS12, YL17, [Dun12b, Kia11, Pie10]. CT-RSA YYW19, ZZCJ14, ZAC17,´ vRDHSP17, [Dun12b, Kia11, Pie10]. CTRL [HKK19]. vTJ11, AMN18, AMORH13, AEH17, AAT16, CTRL-PACE [HKK19]. Cube AA14, ABBD13, And19, Ano11a, ABW10, [HIJ+19, MS12b, YWM19]. Cubic ACK+10, BOB13, BB14, Ber14, BL14, BL17, [RW12, VM14]. Cuckoo [BHKN13, sCR19a]. 26

CUDA [DLV16]. Cue [KTM+18]. D-PUF [SRK+17, SRK+18]. D2D Cue-based [KTM+18]. CueAuth [Gop19, PSM+18]. D2D-Aided [Gop19]. [KTM+18]. cultural [Mid10]. Culture DaaS [AAH+19]. DALP [LWYM16]. Dana [Bla12, SR14]. Currencies [TS16b]. [Ano10a]. Dandelion Currency [AHWB20, DMO+19, Cou12a]. [FVB+18, VFV17a, VFV17b]. Dangerous Current [DP17, GCK12, FPBG14]. Curse [HLW12, GIJ+12]. Dao [FMS12a]. Dao-Fa [GG11, HB14]. curvature [GJ13]. [FMS12a]. Daoism [FMS12a]. Darel curvature-feature [GJ13]. Curve [Xie12a, Xie12b]. Darmstadt [ARM15a, ADI11, ADSH18, ARM15b, [FBM12, Sen10]. DASH [KCC17]. Data BJ10b, FHLD19, GT19, GPT12, LGH+17, [AAA+19, ARWK19, Ano13e, ADF12, LWHS17, MSTA17, NR15, PABC´ +19, Bar12, BJL16, BCD+12, BJL12, BW12, PPH12, SG15, vRDHSP17, AMN18, BL14, BKLS18, CWL+14, CMLS15, CCW+10, BL17, BBB16b, Cho14, Far14, FWS13, IB11, CSV15, CCT+14, CLW16, CDLW19, Khl18, KKM11, KK10, Kre13, KKD+18, CHH+19, DDS12, Dan12, DR12, DK16a, MCN+18, MS13b, MHL18, NZM10, SKH15, DMS+16, DA12, DCA18, DLZ+16b, Elb09, WHJ17, YY13, JL16]. Curve25519 [SG15]. EKOS19, EKB+16, FYMY15, FYD+19, Curve41417 [BCL14]. Curves FPY15, FRS+16, GTT11, GRRZ18, HSM14, [AMMV18, ACA+16, AK14b, BSCTV17, HWZP18, HLC+18, HLT+15, HVP+18, BWR12a, CMRH17, DW12, Gre19a, LL11, HZX+18, HK14b, IBM13a, KRDH13, KGV16, LT14a, MST18, Nag19, PWBJ17, Sch19b, KPB18, KD19, LLPY19, LLZ+17, LLSL19, She17, TX16, YTS12, BL17, BP18, FK19]. LWCJ14, LCDP15, LLZ+12, LZC+12b, Custom [ODSS17].¨ Customization Ma17a, MLO17, Mal13, MMS17b, MJW+18, [OdH12]. cut [Fai19]. Cyber MGJ19, MM14b, NNAM10, NR12, PV17, [LJS+14, vdWEG18, GQH17, GHD19, PD14, PSM17, PZL+19, PBC+17, PH12b, HZWZ18, KSA16, QMC17]. PH16, PNRC17, PWS+19b, QZL+16a, Cyber-Espionage [LJS+14]. QZZ18, RCP+18, Rea16, RDK19, RSN14, cyber-physical SGG18, SAKM16, Sar10b, SMSK18, SP15b, [GHD19, HZWZ18, QMC17]. SKH17, Sia12, SC19a, SLM10, SOR16, Cyber-security [vdWEG18]. Cybernetica TCN+17, Tan15a, Vai12, VSV15, WZCC18, [Ano17c]. Cybersecurity [Bel15, DF16, WHLH17, XNKG15, XWSW16, YDY+16, Hel17, Lan17, LRVW14, Mos18, Sch19a, YZDZ19, YJSL18, YMC+17, ZXYL16, SDC+17, SPG+19, YK16, AP18, GQH17]. ZPXX17, ZTL15, ZLW+17, AP10, AAH+19]. CybSI [YK16]. Cycle data [HG12, KU12, MKN13]. Cycle-Based [ASO14, AIM+19, Ana14, Ano11a, Ara13, [MKN13]. Cycles ADH17, ALL+18, BLL+19, BC16, BHH19, [BSCTV17, WBA17, CLCZ10]. Cyclic BTPLST15, BC18, BCGS16, BKV13, BTK15, [Che18, OTD10]. CD16a, CDGC12, CLH+16, CDF+10, CDL18, DDY+19, DFJ+10, DTZZ12, DRD11, D [AM19, AP10, Bro19, CG12b, DBPS12, DYZ+15, DZC16, ED17, FS18, GHD19, DWWZ12, EAA+16, GZHD12, KWS+12, Gen10, GSAMCA18, GLB+18, GZS+18, LJ17, LJ15, MCDB12, MKH+12, PGLL10, HKA+18, HSM13, HKA19, HWK+15, HL19, RS16, SGS14, SRK+17, SRK+18, WSSO12, HK19, HMCK12, HH16, HYS18, HYF18, WK18, WY12, tWmC12, YI14, YPRI17]. JKA+18, JLC18, JHCC14, KCS+18, Kim16, D-Based [WSSO12]. D-like [LJ15]. KV19, KH18, KWH16, LSBN14, LT14b, 27

LXK+14, LZY+16, LLL+17b, LLH17, GG10, HWG10, LH10a, LW11a, LTW11, LHL+18, LZWZ19, LFWS15, LAL+15, Yan10, Yan11]. Decentralization [JP19]. LCW+16, LZC17, LLL+18, LL16a, LHA+16, Decentralized [ABCL17, CD16b, GZZ+13, MHKS14, MRR+18, MSGCDPSS18, NJB19, HSMY12, HK14b, MT17, PPS12a, PAS13b, Nam19, OO18, OSSK16, OSANAM19, RVH +16, RSN14, TS16b, XTZ+19, YM19, PPG19, PMG19a, PWS19a, PZ15, QCX18, HHBS18, SLL+19, WZC16]. Decentralizing QLZ19, RR16, RR17, SLL+19, Sch15c, SD17, [LW11b]. Deception [GA19, vdWEG18]. SYY+17, SM19a, SM19b, SAR18b, SPK17, Deciding [CLCZ10, Sch12c]. Decipher SWW+17, Tan17b, TMK11, TKMZ13, [Cor14b]. Deciphering WLWG11, WLH13, WMC17, WXMZ19, [Bla16, GMNS15, GSAV18]. decision WDZ19, WLS14, WZLW13, WS14, WS19, [PKA15, RPG12]. Decisional WL19, XXX15]. data [XWZ+18, XWY+18, [CCL+19, LZC14]. Decisions YYS+16, YQOL17, YQZ+19, YJC18, [Bel18a, YWK10b]. declarations YXA+16, YNX+16, ZZKA17, ZMM+10, [HWYW14]. Declassified [ABJ13]. ZWY+13, ZZC17, ZHT16, ZZL+18, ZZL+19, Decodable [Yek10]. decoder [PMG19a]. AEH17, HLYS14, SJ19, Sch15c, VJH+18]. Decoding Data-Centric [DLZ+16b]. [DBPS12, GMNS15, Bax14, Bul10a]. Data-Classifiers [KGV16]. Decomposition Data-Compression [DA12]. [AGH+17, LSL12b, gWpNyY+14, BWA13]. data-independent [BCGS16]. Decompression [PP10b, SHC+16]. Data-Minimizing [BCD+12]. Deconstructing [Tar10]. Decoupling Data-Oriented [NNAM10]. Database [DMO+19, IM16]. Decrypted [Kob10]. [BTHJ12, SBV14, WCL+18, AAH+19, BL11, Decrypting [CR12, Tay19]. Decryption JHCC14, LW13a, PBP19, PRZB12, SVGE14, [AN12, KB10, PKTK12, FNWL18, LJW+17, Suc12, XMY+17, YXD18]. LJWY18, SES+16, SM10a, SM10b, Wu16, database-as-a-service [AAH+19]. XTZ+19, XYML19, ZSW+18b]. Dedicated Databases [ABL+18, FCM14, HPC10, [Lin17, Nac12, NSP+18, AKS19]. deductive JKHeY12, Kaw15, RP12, WP17, GA11, [ABF+14]. Deduplication JK13, LCY+16, SS17a, TG12]. datacenters [CDLW19, MGJ19, QLL17, SKH17, YDY+16, [PRN+19]. Dataset [SP13]. datasets YZDZ19, ZHZ+19, KH18, SAR18b, ZFH+18]. [LVRY10]. DATS [HVP+18]. Daubechies Deep [BNMH17, CRS+18, DLGT19, [Ara13, SM12, ST15]. Daunting [IBM13a]. FGR+17, HCYZ18, Mor19b, RDK19, Day [MMB17, Zet14, Hof16]. Days RHLK18, WYL18, ACMP19]. default [Bai12, Bri11]. DB [PYH+18]. DBDH [BMDT19]. defeated [Kap13]. defects [CW14b]. DBMS [SERF12]. DC [LHF12]. [FES10]. defences [NDNR13]. Defend DC-Net [LHF12]. DCT [Ano17e, FDY+19, Sch13]. Defending [BDB14, LP12, SS17b]. DDH [LZC12a]. [LWCJ14, YFT18]. Defense DDoS [PSJ+13, SP15a]. [MPA+18, RCK17, YDV19, PSJ+13]. De-synchronization [XNG+14, AATM18]. Defenses [AN17]. Defensive [Pfl10]. deadly [HLV10]. Dealing [Sha13, VN16]. Defined [KYEV+18, SAM+18]. definition Death [Moo14]. Debate [Bla16]. [LWL10a, WSC14, YKC+12]. Definitions Debiasing [USH19]. Debs [Smi15b]. [BBD19, GLW12, Mau12, CGKO11, KM14, debugging [MFH13]. Decade [SOG15]. KGO10, XWXC14]. Degeneracy [WH18]. December [Abe10, BYL10, BC11, Che11, degradation [MMS+17a]. Degree 28

[CMRH17, KA18, LHW18]. degrees Designated [MZ17a]. Delay [WHJ17, HYWS11, RPSL10, SY15b]. [CCKM16, GMNS15, LFX+18, LBR12, Designated-verifier [WHJ17]. MKK17, JLT+12, XW13, MCL+19]. Designation [Che15, LSQL18b]. designed Delegatable [WZ11, XLC+19]. Delegated [Goo12]. Designer [KMY18]. Designing [MZHY15, TMC15]. Delegation [CDK+10, DZS+18, FLW12, MRT10, PSD15, [FMTR12, GLL16, SSW12, XWLJ16, YZ12, SR10]. Designs [BGK12, PCY+17, KDH15]. YAM+15, JSMG18a, NAL17, XWS17, desynchronisation [LDC13]. Detailed XZP+19, ZWM14]. Deletion [DLV16, ZPXX17]. Detect [DMS+16, MGJ19, Rea16]. Delfs [Mur10]. [JWJ+17, NSA15, WOLP15, Lan11]. Delivery [PSS+13, SSPC12]. demand detectability [LRW17]. Detectable [KKJ+16, LWYM16]. demand-aware [Ess17]. Detecting [LWYM16]. Demodulation [KOP12]. [BKBK14, CZ19, Ess17, GAS+16, HLW12, demonstrating [LHA+16]. KW14, SH15, VCD16, YSC+15, LWLW11]. Demonstration [GKG19]. demosaicking Detection [AMKA17, ATS15, ARWK19, [HLC16]. Deniability [TCS14]. Deniable BEM16, CBO+18, DSB15, DF11, GN16, [DF11, zGXW12, HLLC11, GCH+19, HS11, GZH17, HDWH12, HCYZ18, KU14, Jia14b, JXLZ15, LXJ14]. Denial [BKBK14]. LGL+12, LC15, MKRM10, MKAA17, Dense [BFM12]. Density MKASJ18, NDC+13, NSMS14, SAJL16, [Gre19b, LC15, LSQ11b]. density-based SBV14, SXH+19, SP15a, SRAA17, SGS14, [LSQ11b]. Dependable [BCQ+13]. TLZ+17, TM18, YFT17, AKKY17, AOT13, Dependency [MWES19, SGP+12]. BM13, CBJY16, HB13, JC13, JDV16, dependent [GdM16, PKA15]. deployed KKK+18b, KLC+10, LDC13, Maz13, [MFH13, RY10]. Deployment MMF15, MHT+13, WYL13, vdWEG18]. [BSA+19, WXK+17]. DepSky [BCQ+13]. Detective [Cho10]. Detector [LTKP16]. Depth [GH11a, RS16, SS10b, SS12a]. Detector-Based [LTKP16]. Depth- [GH11a, SS10b, SS12a]. determination [JK19]. Determine Depth-Based [RS16]. Derivation [FSWF11, Sto12]. Determining [LBR12, Cha13a, Lau12]. Derivative [Bar19, NN12, Scr18]. Deterministic [LSQ11a]. Derivative-based [LSQ11a]. [MPRS12, NIS12, XXZ12, DTZZ12]. derived [JS18a, ZMM+10]. DES-like Deterring [WGJT10]. DEUCE [YNQ15]. [AHG18, CGCS12]. Description develop [Ham19]. Developed [Har16]. [WH18, PLCGS11]. Design developers [Ano14c]. Developing [CH11]. [AMN18, Abe12, ARH+18b, AIB+16, Development [Pau10]. Developments ADD10, AUMT16, Bel18a, BKL+13, [GCK12, Vai11]. Device [ADM19, ABCL17, DZS+18, DHB16, DR11, FSK10, HSA14, CFXY17, DFKC17, HSUS11, KLM+12, JLZ18, JWJ+17, KPP16, KW14, KLW+17, SRK+17, SRK+18, TYK+12, ZSH+19, Lop12, MS13a, MFG16, MRL+18, Mur16, CRS13, GM16a, KKG14, Kim16, OSP+19, NBZP17, NYR+14, PC16, QLL17, RYF+13, Par12b, SHBC19, VV19, XHH12]. Sch13, SAAB10, SZDL14, THA+13, VKPI17, Device-to-Device [ADM19]. Devices WKB16, WDKV19, YJC18, ZXH16, [AAC+16, ATC17, BDM+19, CSH+18, BBDP16, CZ14, DRN16, Gor10, KHF10, CRS+18, DLWW11, EGG+12, FMC19, KDW+17, MNNW15, MAK+12, MHY+18, GPT12, GdM16, GMSV14, HHH+13, OSANAM19, SVGE14, ZYC+17]. HDWH12, HFS+19, JMG+16, LFH18, 29

LWHS17, LLD19, MFG16, May15, MS16, AGHP14, BPP10, Bro19, CCG10, Cla18, NVM+17, RC18, RSX18, RPHJ11, Sch15b, FLZ+12, Fri10a, GMS11, Har14, SFE10, SWF+19, VWC19, WKB16, WT10b, HAGTdFR13, KM11, Lan13, LWZG10, XJR+17, Aia15, BMDT19, CLP+13b, CFL13, MS13b, MM14a, MO14, Pau19, QCX18, CTL12, Chi13a, FRT13, GTSS19, IB11, Sim15b, SLM10, yWpNyL11, ZZKA17, KPP16, LKAT12, MvO11, MHV15, NSBM17, Zet14, ZSMS18, Ano13c, Ano15b, Mou15]. OYHSB14, PCK19, SSNS15, SCR19b, Dilly [Bat10]. Dimensional SHBC19, TZTC16, TG17, Wan18b, ZPZ+16]. [Ano17d, LLY+18, LZC+12b, XYXYX11, DFA [PDJ+19, WH17]. DFA-Resistant XLP+18, DWZ12, HZW19, LZWZ19, QD16]. [WH17]. DFT [DDFR13]. DHA [AKY13]. dimensions [Pal15]. direct [GH12]. DHA-256 [AKY13]. DHTs [YKGK13]. Directed [NLLJ12, KPS10]. Direction Diagram [WGD18]. dickory [NN15]. [NS12]. Directional [JS18a]. Directions dictionaries [ABR15]. dictionary [BKBK14, CDFZ16, Hof16, PPA18]. [Maf16, MBB11]. did [CMG+18]. Diego Directly [LZC12a]. directory [SMBA10]. [Ano10a, Lin14b]. Dies [Mar10a, MMB17]. Disability [S¨od13]. disabled [HFT16]. Difference [BS14, YTP11, JK13]. disassociation [TMLS12]. Disaster differences [LHM13]. Differencing [NRZQ15, BBG+17]. Disclosure [LyWlZZ12, YWW10]. Different [GR19a, SYv+19, DZS+12, PKA15, SB17, [GZ12, HHH+13, KU12, AKK+17, ABW10]. WGJT10, ZZC17]. Discovery Differential [BMS12, Bar16b, BNY14, [MJW+18, MJS+19, Ano11a, MMP19]. CWP12, CGCS12, DMSD18, ESS15, Discrete [BGJT14, CLL16, HKR+18, FXP+17, HRK+19, KWS+12, LYK19, KLM+12, SRT12, Xie12a, Xie12b, LGL+12, LJF16, LJ15, LYHH14, MSS17, AMORH13, BGJT13, BGG+19, MM13, MRTV12, PH12a, QGGL13, RCP+18, Mes15, ST15, TPL16, VM14]. SBM15, Sun11, WHN+12, Blo15, DDFR13, Discrete-Continuous [SRT12]. GLMS18, LLLK10, MNP12, PBCC14, discrimination [GPVCdBRO12]. SDM10, SDM14, TSLL11, TS16a, WYL14]. Discriminative [DLGT19, YI14]. Differential-linear [DMSD18]. Discussion [Gli12, Wil18, Bul10a]. Differentially [RCBK19]. Differentials Discussions [KD12b]. Disk [GM14, Ran16]. [WW12]. Differentiation [S¨od13]. Disks [Mar10c]. disparate [SSY12]. Differing [GGHW17]. Differing-Inputs Dispatching [YTH17]. dispersed [ED19]. [GGHW17]. Diffie [LZC14, ABD+15, display [KNTU13]. display-equipped ABD+19, Chi16, FHLOJRH18, Hof16, [KNTU13]. Displays [KTM+18]. HLCL11, HLYS14, LNL+19, Orm16, RH10]. Disreputable [ABJ13]. Disruption Diffusion [ZHL15, WB12, jT12b]. DIG [HK14b]. Disruption-Tolerant [HK14b]. [NKWF14]. digest [BK19]. DigiNotar Dissection [Dun12a]. Dissent [SCGW+14]. [JB11]. Digit [MH16, KWH16]. Digital Distance [AAA+19, AYS15, BBC+13, BM13, BCP14a, [ABB+19b, HRK18, PYH+18, Lam13]. FMS12a, FR15, GP17, HPO+15, Jin10, Distance-Bounding [ABB+19b]. Joh10, JL16, LZC+12b, MBF+13, MSI10, Distillation [BJ16]. Distinguisher MMN12, MHMSGH16, NC12, pNyWyY+14, [DWWZ12, AMS+10]. Distinguishers Orm16, PH12b, PAS13b, RCK17, SAA15, [LJF19, SEHK12, ZSW+12, AY14b, AP11]. SM13, S¨od13, SC12, SOS15, TC11, TAP19, Distinguishing [KM10a]. Distortion TS16b, Yon11, Y+17, YLS12, dRSdlVC12, [FHS13, Jia17, LGWY12, MM17a]. 30

Distortions [WLZL12]. Distributed [BCK17, Sch16b, FHV16]. Dopant [ADH19, Ano10a, BKBK14, BCEM15, [BRPB13]. Dopant-Level [BRPB13]. CGB+10, DCA19, FCM14, GYW+19, DoS-resistant [HCC10]. dots [L¨ud12]. HSM14, HEP+11, HXC+11, HCL+14, Double [AK14b, ARM15b, BCG10, HZX+18, LMD16, LLY06, LL15, LNZ+13, DLGT19, EZW18, Lin15, LEW19, MCRB19, LWCJ14, PBC+17, SSKL16, SWF+19, SB18, PKTK12, Sas12]. Double-Boomerang YZX+12, YKKL12, ZLDC15, BLV17, [BCG10]. Double-SP [Sas12]. Doubling CSTR16, CHL19, dCCSB+16, FG19, [Zha12]. Doubly [CZF12, CW14b]. GAI+18, KKK+18b, LJY16, NDSA17, Doubly-Spatial [CZF12]. Douglas NCCG13, ODK+17, PRN+19, TG12, XW13]. [Ber16b]. Down [Ano17e, McG11]. Distributed-Healthcare [ZLDC15]. Download [ZGC16]. DPA [MM17b, ZJ11]. Distributing [K¨up13, MS16]. Distribution Draft [MCF17]. DRAM [BCG19, EAA+16, JEA+15, LWL+17, [SRK+17, SRK+18]. DRAMs [LSC+15]. Lop15b, MT17, MSU13, NNA10, SK11, DRAW [NSBM17]. DRAW-A-PIN SNJ11, Sas18, TC10, AASSAA18, ABB+14, [NSBM17]. drawn [NSBM17]. DRBG BB14, BGP+17, CML16, FHZW18, JSK+16, [YGS+17]. Dreams [Eya17]. Drift JLT+12, LLP+18, LM14, NACLR12, [GKSB17, JSZS12]. Drift-Compensated SPD+10, VV19, WMU14, YWL+17, Yan14, [GKSB17]. Driscoll [Bur11, Joh15]. Drive YHHS16, YL11, ZWS+18]. distributively [DGFH18, SYC+17, Mac12, SYW17]. [LJY16]. dithered [UUN13]. Diversity Drive-Thru [SYC+17, SYW17]. Driven [ZTL15]. Division [BMP12, DLMM+18, SYv+19, APMCR13, [HIJ+19, HZSL05, SS12b, YWM19, MN14]. LSQ15]. driver [GBC19]. DriverAuth Divisors [CN12]. Divulges [ABJ13]. [GBC19]. DriverGuard [CDD13]. DRM DLSeF [PNRC17]. Dmail [CCS14]. DNA [Pet12]. Drones [SNCK18]. drop [KCS+18]. [AEH17, HEK18, WGZ+12]. DNP3 drops [Ano13b]. DSA [Dra16]. DSC [LJ19]. [ACF16, CDWM19]. DNS [HLAZ15]. DSP [MS13c]. DSPs [DGP10]. DSS DNSSEC [vRDHSP17]. Do [Bow11, Pec17]. [Ano13c]. DSSH [YLS12]. DTKI [YCR16]. doc [NN15]. Document [BTHJ12, BPP10, DTLS [AP13]. DTRAB [FTV+10]. Dual DBPS12, DS19, MHMSGH16]. [BWR12a, CCG+16, CMG+18, HF14b, Document-centric [BPP10]. Documents HHS18, HPL+19, LZ11, NLYZ12, PAF18, [Bla12, HCDM12, Sta13, XZZ18, ZDL12, BW13, CFN+14]. Dual-Form [HHS18]. CH11, GA11, SR14]. Does [GA19, LRW17]. Dual-key-binding [LZ11]. Dual-Mode Doesn’t [RS11, SS12a]. dog [Ran14]. [PAF18]. Dual-Rail [HF14b]. Dubai Doing [JCM12]. Domain [Nor17]. Duet [VJH+18]. Dummy [GST12]. [AGW15, BDFK12, BBM15, CLY14, DG17, duplication [LWLW11]. Duqu [BPBF12]. LA15, MR16, PDMR12, SZHY19, SGY11, Durable [LY15]. Durfee [TK19]. During SAM+18, WLZL12, gWpNyY+14, ZWZ17b, [FGR+17, ABJ13, BDM+19, RS17c]. DWT AMK12, BGAD12, GJ13, IG11, LXCM11, [AM19, LD13, SJ12]. dyadic [MO14]. Dyck LPZJ15, LBR12, PWW10, QMC17, [SAM+19b]. Dynamic SCKH10, yWpWyYpN13, YZL+18, [ABB19a, BK19, BCG10, EKB+16, FHR14, YWK+10a, YCM+13]. Domain-Specific HH15, HK19, KYH18, LHM+15, MWZ12, [BDFK12]. Domains MM12, NKWF14, OMNER19, PPS12a, [LQD+16, LRVW14, KGO10, NES+14]. PNRC17, RC18, SSW12, SY14, SKV12, domination [GJMP15]. Don’t SGC14, SHC+16, VMV15, XNKG15, 31

XWSW16, XZY+12, XWZ+18, YLSZ19, Echo-Based [HGT15]. economic [WDZ19]. ZXYL16, BSBG19, CTL12, CBJY16, economy [Sir16]. Ecosystem CSTR16, DSCS12, EA11, GLM+11, [Fri13, RVS+18]. Ecosystems GLB+18, JZS+10, KKM+13, KKK+18b, [LDB+15, MMP19]. eCryptfs [XZL+19]. KH18, KPB17, LDC13, LLY06, LXMW12, Ed25519 [TV19]. EDAK [ABB19a]. LHM14, LZC17, LZZ19b, NSX+18, NPH+14, EdDSA [JL16]. Edge PZL+19, PSJ+13, SES+16, SSS11, SM10c, [AHM+18, DF16, KA18, XHZ+19, CXWT19, SGM16, WDZ19, XHM14, YZL+18, YD17, JZU+19, MD15, PRN+19, Sun16, XZP+19]. ZSMS18, ZZL+18]. dynamic-identity Edge-Based [XHZ+19]. Edge-centric [JZS+10]. dynamical [jT12b]. Dynamics [AHM+18]. edge-enabled [JZU+19]. Edges [RSCX18, AaBT16, GEAHR11, LTC+15a, [BDL+19]. Edition L¨ud12, MCRB19, TZTC16]. [Cor14a, Kob10, Gre19b]. Editorial dynamics-based [AaBT16]. dyslexic [LSQZ17, OK18, Ano19a]. Editors [Bha16]. [BdD19, LLK18]. Education [LRVW14]. Edward [Ano16a, Sim10]. Edwards e-commerce [Ano11a]. E-exam [Mor12]. [ADSH18, JL16, LT14a, YTS12]. E-Health [AMSPL19, WMX+17, AKS19, Edwards-curve [JL16]. EFADS [WLS14]. IC17, OSP+19, YZL+18, JKL+16]. Effect [PLGMCdF18, WB12]. Effective E-Learning [Yon11]. e-mail [HLT+15, KRDH13, WHLH17, WMX+17]. [BTW15, Sch16b]. e-Passport Effectively [YMC+17]. effectiveness [HKK19, LZJX10]. e-Passports [LG10]. [Eng15]. Effects e-rental [LY14]. E-Voting [ASV+18, MAL10, SKV12, SHBC19]. [KV18, LGPRH14, KZZ17]. E.T. [Sch16a]. Efficiency [WYL14]. E2E [KZZ17]. EAC [ABF12, Chi16, DG17, FRS+16, HRV10, [LZJX10]. Each [YLL+12]. EAP LLML12, LCL+17a, MS13b, WXLY16]. [FLH13, HZC+14, ZCLL14]. EAP-based Efficient [ABBD13, ASBdS16, ABB19a, [HZC+14, ZCLL14]. Ear [GWP+19]. BWLA16, BCGH11, BHG12, BBKL19, EarEcho [GWP+19]. Early BV11, BV14, CG12a, CML+18, CS10, [Bel18a, Bro11, And13]. Earth [Har14]. CMLRHS13, CWWL12, CZCD18, CJ13, easier [MBF+13]. Easy DA18, DZC16, DWB12, Dun12a, DG17, [Bel16, SMDS11, Tay14, Wu16, ZDW+16]. EM12, FLH13, FHS13, GT12, GH13, GTT11, Eat [DSSDW14, DSSDW17]. GPN+12, GPT12, GJJ15, GH12, GZH17, Eavesdropping GCH15, HZC+12, HZC+14, HZL18, HL10b, [CWL16, Han12, PX13, YSJL14]. EbH HBCC13, HZX15, HKL+12, HIDFGPC15, [GMdFPLC17]. EC HCDM12, HH16, HC17, HZSL05, IAD10, [Dra16, CFN+14, CCG+16, CMG+18]. JCL+18, KZZ17, KPC+11, Kim15, KHPP16, ECB4CI [YWZ+18]. ECC KKK+18a, KH10, LLP+18, LDDAM12, [BSSV12, CBL10, HJ19, JMW+16, KRH18, LZT12, LNNH13, LXK+14, LCLL15, MMBS19, ZSH+19]. ECC-Based [BSSV12]. LZWZ19, LSLW15, LLSL19, LHYZ12, ECDSA [BBB+16a, DHB16]. ECG LCDP15, LSY+16, LWHS17, LZC17, LLD19, [GMdFPLC17, HZW19, HW19, LBOX12, MX13, MTY11, MVVR12, MU12, PLGMCdF18, ZAAB17]. ECG-based MP12, MKASJ18, MC11, MN14, NES+14, [PLGMCdF18]. Echo NdMMW16, NZM10, OSP+19, PB12, [DLMM+18, GWP+19, HGT15]. PAF18, PZL+19, PRC12, PG12, PCPK14, 32

PNRC17, RSD19, RS17a, RM19, RBHP15, Elements [Kra12]. Elevation [LZC+12b]. SLL+19, SGY11, SZS14, SOR16, SGM16, ElGamal [HLH19, ADM19]. ElGamal-like TSB18, TLCF16, TWZ11, TT12, TM18]. [HLH19]. Eliminating [S¨od13]. Efficient Elimination [FGRQ18]. Elliptic [USH19, WDCL18, WLS14, WQZ+16, [AMMV18, ARM15a, ADM19, ADI11, WCCH18, XLWZ16, XMLC13, XMY+17, AK14b, ARM15b, BSCTV17, CMRH17, XHZ+19, YHL16, YNR12a, YNR12b, DW12, FHLD19, Gre19a, GPT12, KKM11, YLW13, YNQ15, YLA+13, YS15, ZYGY18, LGH+17, LWHS17, MSTA17, MST18, NR15, ZQWZ10, ZLH+12, ZSW+12, ZXJ+14, PABC´ +19, PPH12, SG15, Sch19b, She17, ZXYL16, ZCL+19, ZHS+19, ZPW16, vRDHSP17, AMN18, BAAS13, BL14, BL17, ZHW15, ZZC17, AHG18, AQRH+18, BBB16b, Cho14, Far14, FK19, IB11, Khl18, AZPC14, AZF+12, ABR15, BBB19, CH11, KK10, KKD+18, MCN+18, MS13b, MHL18, CCSW11, CLHJ13, CZ14, Cho14, Cra11, NZM10, SKH15, WHJ17, YY13]. CGKO11, EA12, FLL+14, Far14, FA14a, elliptic-curve [BL17]. FA14b, FIO15, FLYL16b, FZZ+12, Elliptic-Elgamal-Based [ADM19]. ELmD FNWL18, GH16, GLM+11, HPC12, HYS18, [BDMLN16]. Elsevier [Ano15b]. Email ISC+16, IB11, IOV+18, JCHS16, JZS+10, [Bel16, CCS14, RS19, XJW+16, WR15]. KKG14, KV19, KIH19, KL11, KSH18a, embed [KPS10]. Embedded KSH18b, LLLS13, LH11b, LH10c, LYW+10, [AEP18, AB15, BS12, BJCHA17, CFXY17, LXMW12, LLH17, LZD+19, LAL+15, HJ19, HC17, JWJ+17, LJP17, LWHS17, MDHM18, MLM16, Mes15, MGB19, Nov10, MGG+19, SOG15, SK12b, SWF+19, SS17b, NXS10, OCDG11, PZBF18, PC14, Rao17, SDM+12, WXY+17, YGD+17, YS15, SZMK13, SM19b, THA+13, TLL12, Tso13, ZSH+19, Ano11a, CVG+13, Eis10, MFH13, TKHK14, VN17, WYL13, WLZ+16, WT10a, WHZ+19, XWZW16]. Embedding WXK+17, XWZW16, XWK+17, [CMRH17, FR15, KD12a, MCDB12, yYqWqZC13, ZLY10, ZZ11, ZCLL14, ZTZ16, XNRG15, XNP+18, XZZ18, YE12, ZS12, ZZC15, Zhu13, sCR19a, LLZ+12, TCL15]. EA11, LHM13, MKH+12, PWLL13]. Efficiently [FWS13, LGH+17, SLY+16]. Embeddings [FHS13]. Emergable [YT12]. Effort [RSBGN12]. Effort-Release emerged [McG11]. Emergence [LMB12]. [RSBGN12]. EGHR [CML+18]. eHealth Emergency [TMGP13]. eID [SGGCR+16]. eight [HLKL15, YTH17, BDM+19, KLC+10]. [Sun11]. eight-round [Sun11]. Einf¨uhrung Emerging [BSV12, KSA16, OS16, FPBG14, [Buc10]. Einstein [HR13, Wes15]. Elbirt GLL16, ZHH+17]. emphasis [GMT+12]. [Bar12]. Election Empirical [gWpNyY+14, EBFK13, Sar14]. [ADH19, Ess17, RS17b, TKM12]. Elections Employees [Mor12]. Employing [LGLK17]. [CEL+19, QS18]. Electoral [CEL+19]. EMV [Cho10]. Enable [SMS14]. Enabled Electric [LSY+16]. Electrical [VTY18]. [GPT12, HFT16, KV18, QZL+16a, QZL+16b, electrocardiogram SG12, SGC16, SSPC12, YSF+18, BMM12, [BLL+19, OMPSPL+19, ZGL+18b]. JZU+19, NML19, TODQ18, YFT18]. electrocardiogram-based [ZGL+18b]. Enabled/disabled [HFT16]. Enables Electrocardiography [LLLH18, YH16]. [IBM13a]. Enabling Electromagnetic [HHH+13]. Electronic [FRS+16, GYW+19, JSM+18, PSM+18, [Bla12, PWVT12, SR14, YMWS11, CLC+19]. SSY12, WPZM16, YYS+16, MMP19, Sch12b]. Elementary [Led16, Sch15a, CM13]. eNB [CLM+12]. Encapsulation [KG19]. 33

Enciphering [CMLRHS13, HMR12, Chi12, Chu16, CRE+12, Con18, CNT12, MLCH10, MKASJ18, Sar11]. Enclaves CLW16, CD16b, DR10, DN12, DFJ+10, [WBA17]. Encoded [DG17, HS18]. DSLB18, Des10b, DGFH18, DOS15, Dun12a, encoder [PMG19a]. Encoding DF11, EAA12, ESS12, FHH10b, FHR14, [BR14, CK18, SK12a, TJZF12, XHX+17, FJHJ12, Fei19, FFL12, Fuc11, GWWC15, CJL16, PC14, SM19a, Sun16]. Encounter GGH+16a, GGHW17, GM13a, GZZ+13, [NA10a]. Encrypt [RAZS15, Ran14]. GSW+16, GH11a, GH11b, GHS12, GHPS12, Encrypted GDCC16, GVW12, GVW15, GM14, GL12, [ADR18, BTHJ12, BSA+19, CWL+14, GKS17, Gue16, HSMY12, HLLG18, HZ11, CWL16, Cor14a, CDLW19, CHH+19, HG12, HWS+19, Hor19, HC17, HTC+15, DWB12, DCA18, FGRQ18, FCM14, HLH19, HP12, Int19, IAD10, JLS12, JSA17, FRS+16, Fyo19, Gen13, GLG12, GKG19, JLH12]. Encryption GZH17, GYW+19, HWZP18, HTZR12, [Jia14a, JR14, Kam13, KB10, KME+12, HB17, HCDM12, IMB17, IBM13a, JSCM17, KMY18, KTT12, KOS16, KKA15, KFOS12, Kaw15, KGV16, LA15, LGLK17, LQD+16, KHPP16, KKK+18a, KMJ18, KS12, Lop12, Mur16, NBZP17, NNAM10, PBC+17, KHRG19, LMGC17, LMG+18, Lau17, QLL17, Roh19, SAKM16, SZHY19, Sia12, Led16, LLSW16, LLPY19, LW11b, LW11c, SOR16, TM18, Uto13, Vai12, WBC+10, LW12, LJLC12, LYZ+13, LHL+14, LLC+15, XWSW16, YDY+16, ZDL12, ZXYL16, LTZY16, LLL17a, LFX+18, LLLH18, ZVG16, ZLW+17, ACMP19, AAH+19, LSLW15, LH11c, LSQL18b, LNWZ19, LB13, AHM+18, AZH11, BBDP16, BTPLST15, LY15, LW16, LYY+18b, LATV17, LLML12, BGP+17, BKV13, BTK15, BL11, CH11, LLH18, MZHY15, MLO17, MMP14, MR14a, Cri16, CDL18, DDY+19, DKL+16, DRD11, MTY11, MSM18a, MVVR12, MMS17b, DJ19, ED17, FTV+10, Gen10, GSAMCA18, MSR+17, MRL+18, MBF18, MPRS12, GZS+18, GSGM16, HKA19, HH16, JLC18, MZLS18, Mor19b, MT12, MKRM10, MSas12, KH18, LXK+14, LZY+16, LHL+18, Nac16, NdMMW16, NTY12, NMS14, LZWZ19, LW13a, MRR+18, NJB19, NAL17, OT12, OGK+15, ODSS17,¨ PMZ13, OSSK16, PWS19a, PBP19, PRZB12, SG19a, PR12, PB12, PDNH15, PRGBSAC19, Per13, Sch16b, SEXY18, SM19b, SWW+17, Suc12, PKTK12, PPS12a, PYS18, PMZ12, PCY+17, TKMZ13, WR15, WS19, WL19, XMY+17, PRSV17, PWS+19b, RVH+16, RCP+18, XWY+18, Yaa19, YXD18, YQOL17]. RZZ+15, RM18, RSBGN12, RDZ+16, encrypted [YQZ+19, YJC18, ZLY10, RVRSCM12, Roh19, SGG18, Saa12a, SSW12, ZZC17, ZFH+18, ZHT16, ZZL+19]. SERF12, Sar10b, SJ19, Sch15a, SLGZ12, Encrypting [CC10, Mar10c, dRSdlVC12, SXH+19, SZS14, She14, SWF+19, Smi11b]. Cla18, LFGCGCRP14, Pow14]. Encryption Encryption [ADM12, AV12, AAUC18, AEH17, Alo12, [Sta12, SGH15, SMOP15, Tan11, TCN+17, AAC+16, AEP18, Ano13e, Ano14b, Ano15c, TCL15, TMC15, Tan17b, TDTD13, TKR14, Ano17d, Arm19, AKP12, ABF12, AS16, TT12, TFS19, Unr15, Vai11, VSR12, AG18, BVS+13, BWLA16, BPR14a, VOG15, Wal18, WHC+15, WP17, WDCL18, BPR14b, Bel16, BDOZ11, BWR12a, BS14, WSS12, Wat12, WLC12, WDDW12, WZ15, BV18, Bla16, BKLS12, BDPS12, BHJP14, WHLH17, WWHL12, WMS+12, WQZ+16, BDMLN16, Boy13, BV11, BV14, BGV14, WZCH19, XNKG15, XY18, XXZ12, CVM14, CMO+16, CLL16, CWWL12, CN12, XJWW13, XWLJ16, XJW+16, XHX+17, CZF12, CLHC12, Che15, Che18, CGL+12, YZ12, YZX+12, Ye10, Ye14, YH16, YKNS12, 34

YNQ15, YKC+11, YFK+12, YCZY12, XSWC10, XXX15, XWS17, XZP+19, YKKL12, ZOC10, Zaj19, ZPM+15, ZZQ+19, XWZ+18, XTZ+19, XLC+19, YWJ+19, ZDL12, ZYT13, ZWTM15, ZQQ15, ZMW16, YT11b, yYqWqZC13, Yan14, YZCT17, ZZM17, ZYZ+19, ZHW15, ZY17a, ZYM18, YHHM18, YSQM19, YWY+19, YCT15, ZWS+18, ZYH+19, ZHZ+19, ABC+18, YJC18, YLZ+16, YL11, ZCZQ19, ZAAB17, AHS14, AASSAA18, ATKH+17, AKKY17, ZWQ+11, ZZ11, ZLW+12, ZXJ+14, ZWM14, Ana14, Ang16, Ano13d, Ano15e, Ano16h, ZT14, Zha15a, ZCC15, ZML17, ZYC+17, ARG19, ABR12, AMHJ10, ACD+15, ZGL+18a, ZCL+19, ZWY+19, ZZ12, ZL12, AHL+12, BLL+19, BAAS13, BZD16, BC18, ZDW+16, ZY17b, ZCZ+19, Zhu13, Wan14, BKR19, BG14, BSW12, BGP+17, BTK15, GMdFPLC17, LAL+15, Sar18a, Kat13]. Bro19, CPPT18, CFVP16, CFZ+10, CW14b, Encryption-based CLH+16, CMMS17, CLC+19, CXWT19, [SERF12, BC18, XWZ+18]. CZ15b, CS11, Chm10, CW12a, CDF+10, Encryption/Decryption [KB10]. CM13]. encryption [CGKO11, DLZ16a, DDM17, DTZZ12, DMD18, Eve12, Eve16, [zGXW12, LG12, SLY+16, RD17]. FAA +18, FH13, FSGW11, FSGW12, Encyclopedia [vTJ11]. End FMB+18, Fay16, GMOGCCC15, GH13, [Ano15c, BRR+15, BGP+17, CFE16, Chu16, GHPS13, GLM+16, GH12, GLL+18, MHMSGH16, RST15a, RST15b, Bel18b, GZXA19, HGWY11, HQZH14, HZL18, Bro12, Chi13a, JZU+19, Wan18b, Zor12]. HKA19, HWDL16, HZWZ18, HL19, HT13, end-devices [Wan18b]. End-to-End HLR11, HK19, HL11, HYL+19, HFT16, [CFE16, MHMSGH16, RST15a, RST15b, HTC17, HYS18, HYF18, HHAW19, Ano15c, BRR+15, BGP+17, JZU+19]. HKHK13, JZU+19, JCHS16, JCL+18, endomorphism [FWS13]. Jia14b, JSMG18a, JSMG18b, JHCC14, Endomorphisms [AK14b, LGH+17]. JSM+18, Kam16, KHMB13, KKM+14, Endurance [JSA17]. Endurance-Aware KV19, LLW16, LCL+17a, LGP19, LCL+15, [JSA17]. enemies [Fag17]. Enemy LFZ+17, LWW+19, LCT+14, LFWS15, [BC14, CAC14]. Energetic [PDMR12]. LLM+19, LPdS10, LHH11, LW10, LK10, Energy [Ano15d, AZF+12, ABC+17, Bla16, LW13b, LZC14, LPZJ15, LCY+16, LZC17, CKHP19, GPR+19, JEA+15, LSC+15, LJW+17, LJWY18, LLL+18, LZKX19, LLD19, MP12, PAF18, RPHJ11, TLCF16, LDZW19, LL16a, LW13c, LSC12, LLG19, TCN+17, VN17, AHG18, CZ14, Fai19, Mar10b, MMS17c, Mes15, MML16, Mid10, HRK+19, MMF15, ZTZ16]. energy-based Mon13, MSas13, NES+14, Nam19, OPHC16, [MMF15]. Energy-Efficient OSNZ19, PPA18, Pet12, PBP19, QRW+18, [LLD19, MP12, TLCF16, AHG18]. Ran16, RG10, RWZ13, RPSL10, SES+16, Energy-Harvesting [ABC+17]. SE18, SLL+19, Sar11, SYL13, SE14, SE16, Energy-time [Ano15d]. Enforced [Set16]. SH11, SM11, SNM14, SLZ12, SY15b, Sha13]. Enforcement encryption [SVGE14, SGFCRM+18, [LLZ+17, Tan15a, Cra11, CFG+17]. Engage SLM10, SKB+17, Spa16, SGP+17, SGM16, [SDC+17]. engagement [LSBN14]. Tam15, TPL16, jT12b, WGJT10, WY10, engaging [ISC+16]. engine [BS13a]. WWYZ11, WWYY11, WLWG11, WHY+12, Engineering [BCHL19, Bel18a, FSK10, WDZL13, WZC16, WLFX17, Wan18a, GHD19, LLK18, MMKP16, MSM18a, MP12, WXMZ19, WDG19, WDZ19, WGZ+12, PGLL10, SNG+17, TQL+14]. Engines WLS14, WCCH18, XWZW16, XWXC14, [LB13, BGG+13]. Enhance 35

[DHT+19, CZ14, SLM10]. Enhanced [CHH+19, HTC+15, LLSW16, MZHY15, [DTE17, KY10, KKM+13, MS17, SGG18, WZCH19, HTC17, ZCZQ19, ZCL+19]. SS15, TV15, YI17, YCC16, AMN18, AM19, Equational [ABR12]. Equations ACK+10, DLK+16, DXWD16, GM16a, [BB10, SR12a, DGL19, ZYGT17]. Equi LNKL13, YWZ+18, YQOL17]. [Ma17a, PD14]. Equi-Join [PD14, Ma17a]. Enhancement [FSX12b, JSA17, LA15, Equifax [Ber17]. Equijoin [WP17]. NNA10, CHS11, SVY19]. Enhancements equipped [KNTU13]. Equivalence [Che18, FSX12c]. Enhancing [CSW12, [ABR12, CCK12, CCCK16, GLW12, IA15, Lan13, MZL+19, YS15, AGBR19]. LYL+18, SS13, WGD18, HKT11]. Era Enigma [KM15, KM16, LHA+16, Ore14, [Mos18, OMNER19, QCX18, ABJ13]. Ano16d, Bur11, Cas15, Kap11, Kap13, Ergodic [IAD10]. Erratum [YFK+12]. McG11, McK12]. Enigmas [Bat10]. Error [GSGM16, KW14, LSC+15, MCP15, Enough [JCM12, Ano14b]. Enrollment MKASJ18, TLCF16, Zaj19, ATI+10, BZD16, [YWZ+12, DEL19]. ensuing [SS17a]. Chi13a, LTT10]. Error-correcting Ensure [PWS+19b]. entangled [EAB+19]. [MCP15, LTT10]. error-tolerant [BZD16]. Entanglement [Ano15d, JEA+15]. Errors [TM18, CSS+13]. ErsatzPasswords Entanglement-Based [JEA+15]. [GAS+16]. Escapers [SXH+19]. Escrow Enterprise [BMDT19, TGC16, XZL+19, [MR10, WLY17, ZLH+12, HKHK13]. Din10, KLN15, NB13]. Enterprise-Level Escrow-Free [ZLH+12]. Escrowable [XZL+19]. Enterprises [KCR11]. Entities [NCL13]. eSkyline [BKV13]. ESORICS [GZ12]. Entity [BCM12, BCM13]. [Ver17]. Espionage [LJS+14]. Essay Entrepreneur [IM16]. Entropy [Bai12]. Essays [Nac12]. ESTA [SS15]. [DSSDW14, DSSDW17, DK16b, KPW13, Establishing [DKL+16, GSFT16]. VS16, YGFL15, BNY14]. Entropy-Based Establishment [ASN12, Ano11b, BCO13, [YGFL15]. enTTS [YL17]. enumerators DL12, NYR+14, BEB+18, GTSS19, [O¸¨ S11]. Environment SZMK13, ZPZ+16, ZXW+18]. Estimating [AARJ12, BCGN16, FYD+19, HQY+18, [VJH+18, MMF15]. Estimation KKA15, MLO17, MRS+17, RQD+15, [BCF16, GSN+16]. Estonian [Ano17c]. SGG18, SAM+19a, TV15, VFFHF19, Ethereum [Fai19]. Ethernet [KCR11]. EU YMA17, FHZW18, GAI+18, HL19, HLYS14, [PH12b]. eUCI [GSGM16]. EUROCRYPT KKM+14, Kim16, KS19, NR17, Par12b, [PJ12, Gil10]. Europe [GOPB12, Mid10]. RR16, SYWX19, SKB+17, WL12, WCFW18, European [GOPB12]. Evaluating WT10a, XXX15, YWK+10a]. [RAZS15, WP15]. Evaluation Environment-Independent [HQY+18]. [BCG10, BBKL19, BKLS18, CGCS12, Environments DM15, DCA19, EGG+12, FVJ19, JGP+18, [HXHP17, HLKL15, LQY10, PAS13b, KVvE18, KLM+12, LYL+18, MKN13, TMGP13, VFS+19, XLP+18, CNF+18, MLBL12, RJV+18, SSP19, SMOP15, CLHJ13, CTL13, KPP16, KAS15, LNK+18b, WRP70, ZLDD12, BNNH19, BKR19, LW13a, LCY+16, MHL18, NACLR12, FPBG14, FLYL16a, KS19, LGP19, LW19, SCY15, SA19, Tan12b, VDO14, VGL14]. THA+13, TPKT12, ZZKA17, ZLDD14]. Eof [Gup15]. ePassport [ABHC+16]. Evaluations [ZM16]. evaluators [ZZKA17]. Ephemerizer [Tan15a]. Episodic Evasive [BBC+14]. Eve [WAK+19]. Epistemic [Sch12c]. EPR [AAE+14, ERLM16, FHM+12]. Even [UUN11]. Equality [ARH14, Faa19, Kni17, LPS12, Ana14, 36

DKS12]. Even-Mansour [LPS12]. [RK11]. Exponentiation Even-Odd [Faa19]. event [EZW18, VN17, WSQ+16]. exponents [CWZL13, CXX+19]. EventGuard [SLI11]. [SM10b]. Exposing every [Hof16]. everyday [HST14]. [ERLM16, FVJ19, OF12, YQH12, YSC+15]. Everyone [Ano15c]. everywhere [Laz15]. Exposure [BVS+13, TK19, XYML19]. Evidence [Bla12, Lal14, SR14]. evident expression [WR15]. Expressions [MN10]. Evolution [TCMLN19]. Extend [TMC15]. [LQY10, Tay17, BHvOS15]. Exact Extendable [NIS15]. Extendable-Output [TKM12]. exam [Mor12]. Examination [NIS15]. Extended [MMKP16, VCK+12]. Examining [SP13]. [BFMT16, DGP10, Gre17, HZW+14, Example [KD12b]. Excellence [SDC+17]. HBG+17, SH15, Yam12, YSC16]. Exchange [CLY14, CST+17, DG15, Extending [ZSW+12, PY19]. Extensible EFGT18, FHLOJRH18, FVS17, GDLL18, [YZ12]. Extension GZ12, HC12, LY16, MSU13, SD18, TYM+17, [ARH14, DBT19, EKP+13, GFBF12, GT12, WSA15, WT10b, YS12, YLW13, YRT+16, RW12, SGY11, HTC17, LYW+10, ZXJ+14]. Yon12, ZXH16, AKG13, AIB+16, Bon19, Extensions [FVJ19, LWL10b, RS17a]. FHH10a, FA14b, FIO15, GBNM11, GLM+11, Extensive [AIF+19, FVJ19]. external Jia14b, KMTG12, LWS10, LML+13, [ZZKA17]. Extract [AN12]. SEXY18, TCS14, Tso13, TKHK14, WHJ17, Extract-Transform-Load [AN12]. WZM12a, WZM12b, WT10a, WTT12, Extractability [BCP14b]. Extractable XW12, YC12, YLL+18, ZXWA18, ZG10]. [CZLC12b, CZLC14, GGHW17]. Excitation [SOS15]. Exclusive Extraction [BWLA16, GST13, GPT14, [Men13b, WDZ19]. Execution [AARJ12, PCPK14, GPP+16, HZW19]. Extractor Bul18, CBRZ19, RQD+15, YS15, AAH+19]. [USH19]. extractors [Zim10]. exhaustive [AHG18]. existence [VBC+15]. extraordinary [Hol12]. extreme [GJ13]. existing [FMA+18, HT13]. Expanding Extruded [CJFH14]. Eye [MS16, Sch15b]. Expansion [LTC+15b, [ERLM16, SRRM18, SM13, Tox14]. TS16a, BAB+13, Die12, JK13, Pet11]. expect [Sch16b]. Expectations [DY13]. F2654hD4 [Ber16a]. F5 [LLY+12b]. Fa Expected [DMV15, KOTY17]. Experience [FMS12a]. Fabric [BHH19]. fabricating [AD12, BSA+19, SK18]. Experiences [WW13]. Fabrication [VDB+16]. [HGOZ19, JAE10]. Experimental Fabrication-Induced [VDB+16]. Face [LCW+16, DHW+13]. Experimentally [AQD12, MHW+19, RSX18, XHH12]. Facial [LHA+16]. Experts [Sto12]. Explicit [KRB12, TCMLN19, WSS+19]. facilitate [AQD12, FHS13, HP17, FIO15, ZZC15]. [Chi13a]. Facsimile [Ano16e]. Factor exploitability [CFN+14]. exploitation [AMSPL19, ATC17, HXC+11, LLC11, [MAK+12, NCCG13]. Exploiting PSSK19, AIB+16, BD18, CLP+13b, CNF+18, [ACK+10, BDGH15, HIJ+19, HL12, VDB+16, DRN16, DMWS12, ED19, GMMJ11, HC12, VTY18, YDV19, YWYZ12, ZPZ+16]. IC17, JKL+16, JMW+16, Kem11, LNK+18a, Exploits [ZGC16]. Exploration LNK+18b, LW19, Lit14, MDHM18, NMX15, [AUMT16, ABDP15, RYF+13]. Exploring SNG+17, WW14, Wat14a]. Factoring [Cil11, FNP+15, HPJ+19, HSUS11, KMG17, [APPVP15, LLML12, BGG+19, MM13, TLCF16, WHC+15]. explosion [YY17a]. SD17]. Factorization exponent [PT19, SM10a]. exponentially [Cou12b, FS15, HWS+19, KKK+18a, 37

KFL+10, Kuz11, YAM+15, Mes15, TPL16]. DDS12, Dan12, Dun12b, Kia11, Lin14b]. factors [HK17]. failed [And19]. Failing FedCohesion [CCFM12]. Federated [Cer14]. Fails [ABD+15, ABD+19]. Failure [BS13b, CCFM12, CSL+14, MJW+18, [WCL+18]. Fair [ALR13, CSV15, DSMM14, SAM+19a, BMBS10, BSBG19, JAS+11, DG15, WSA15, SEXY18]. Fair-Exchange TODQ18]. federated-IoT-enabled [DG15]. Fairness [TODQ18]. Federation [SS10a, NB13]. [ALR13, Ash14, GHKL11, Wag16, MV16b]. federations [MMS+17a, MLM16]. Fake [KU14]. Fallen [HCPLSB12]. False Feedback [HZ11, Hey17, PYM+15, [LLZ+12, MWES19, CDGC12]. Families SKGY14, ZH15, LWK11]. Feedback-Based [BSS+13, KU12, FK19]. Family [PYM+15]. FEIPS [DG15]. Feistel [ARH+18b, BMS12, BKST18, CBJX19, [BFMT16, KDH15, Sas12, SEHK12]. Felten DGlS12, DJG+15, FLS+10, FFL12, GNL12, [Ano16a]. FESSD [LGLK17]. Few [SBM15]. LYY+18b, MFG16, SBM15, YCL17, FHE [CK18]. FHE-Based [CK18]. FHSD BDPV12]. Fanin [SS12a]. Fast [BLAN+16, [SP15a]. fi [BMDT19, YNR12a]. FI-BAF Bru12, CHS15, DSLB18, DGK18, GSN+16, [YNR12a]. Fiat [BDSG+13]. Fibonacci HMKG19, JGP+18, Khl18, LGLK17, NR12, [FM15, LLP+18]. Fibonacci-number PRSV17, Raz19, Rom11, SRRM18, WHZ12, [LLP+18]. Fidelity [BCP14a]. Field WBA17, WQZ+13, ZHW+16, FHH10a, [Alz19, CLF+17, GHPS13, GM16b, HSA14, KHMB13, LNNH13, MBB11, YM18]. SS12a, TGC16, ZAG19, EAB+19]. Fields FastAD [SMBA10]. Faster [ARH14, BGJT14, HVL17, NR15, ZL19, [CN12, EZW18, FHLOJRH18, HVL17, AA14, BGJT13, CZ15a, LBOX12, O¸¨ S11]. TH16, ZSP+19, Ant14]. Fault Fight [Ano16f, Wu16]. File [AMKA17, BMS12, BBB+16a, FXP+17, [DMS+16, LY16, TLCF16, XZL+19, ZGC16, GST12, JWJ+17, JKP12, JT12a, LYK19, FLYL16b, GSGM16, YHHM18]. Files LGL+12, LCLW17, LGLL12, MSS17, [Uto13, Con17]. Filling [BWR12a]. Filter MKRM10, MKAA17, PH12a, RZZ+15, [Kaw15, ATKH+17]. filtered [HTC17]. SBM15, SEY14, WCD19, YGD+17, BEM16, filtered-equality-test [HTC17]. Filtering BBBP13, PBCC14, WMYR16]. [LLZ+12, CDGC12]. Finance Fault-Based [BBB+16a]. fault-resistant [Eya17, TBY17]. Financial [PBCC14]. Fault-Tolerant [Ano11b, Ber12, GQH17, DDS12, Dan12]. [WCD19, WMYR16]. Faults Finding [Hof16, Ste15a]. Fine [EFGT18, SBM15]. Faulty [LYY+16]. [CDD13, PV17, YTH17, ZML17, CLH+16, FBAC [YWJ+19]. FBI [Bha16]. FC FSGW11, LHH+18, XYML19]. [DDS12, Dan12]. FCMDT [BSBG19]. Fine-Grained [CDD13, PV17, YTH17, FDM [BD18]. FEAD [ZWM14]. ZML17, CLH+16, LHH+18, XYML19]. Feasibility Finely [GT19]. Finely-Pipelined [GT19]. [AAC+16, FKS+13, OMPSPL+19, WHC+15]. FinFET [ZJ11]. FinFET-Based [ZJ11]. Feature Finger [KLY+12, NSBM17]. finger-drawn [Ber18, SGP+12, YKA16, ZWWW17, [NSBM17]. Fingerprint FTV+10, GJ13, HZW19, MHT+13]. [DS19, MR14b, AJYG18, HW19, KKG14, Feature-Based [ZWWW17]. Features LYC+10, ZHL+11, ZHH+17]. [MHW+19, YI14, ZTL15, AAL19, FNP+15, Fingerprint-Based [DS19]. JS18a, LCM+17, LTC+15a, NMX15]. Fingerprinting [QF19, SNCK18, TSH17, Feauveau [Ara13]. February [Ano10a, ZS12, FLZ+12, KPB18, RS17c]. 38

Fingerprints [YYK+17]. Finite KGO10, PLCGS11, ZW15, Aia15, CDWM19, [BGJT14, CHS15, GMNS15, HVL17, THA+13, XWXC14]. Formalization HWS+19, WDG19, ZL19, AA14, BGJT13, [LNWZ19]. Formalized [YCR16, NML19]. CZ15a, GPLZ13, LBOX12, O¸¨ S11]. Formally [KRH18, HKA+18]. formats Finite-State-Machine [CHS15]. [ZT14]. forms [TY16a]. formula [DWZ12]. Finite-time [WDG19]. FinTech [MZL+19]. forthcoming [DGK18, MMP19]. FORTIS firms [Ano15e]. First [Ano17d, BH15, [GSFT16]. Forum [Rau15]. Forward DR10, LFX+18, LSQZ17, MS17, PC16, [ABD+15, BVS+13, BDH11, FLH13, Wil18, AB10a, BCV12, Bre18, Con17, GSFT16, HLT+15, KME+12, KZG10, Kim11, LCKBJ12, Mic10a, SBK+17, Zet14]. LTH+15, NMS14, WLH15, WHLH17, XW12, First-Generation [BH15]. First-Order Yon12, YHK+10, YKC+11, ABD+19, [LFX+18]. Fischlin [ABGR13]. Fishbone ATKH+17, BM11, NJB19, TCS14, WL19, [KS19]. fistful [MPJ+16]. fit [KGO10]. Fix YFK+12]. Forward-Secure [DLV16, HLV10]. Fixed [Chm10, Lim11]. [BVS+13, KME+12, LTH+15, NMS14, Flag [MBC+18]. Flame [BPBF12, Goo12]. WLH15, YKC+11, YFK+12]. Flat [LHW18]. Flaw ForwardDiffsig [BAL10]. forwarding [Moo12, SH15, Ste15a, Ano13a, ACC+13]. [VN17]. Found [Moo12, Ano13a]. Flaw-Finding [Ste15a]. Flaws Foundations [DR11, FVJ19, HLV10]. FlexDPDP [BCHL19, Des10a, Gol19, IEE10, IEE11b, [EKB+16]. Flexible Lin17, Nie02, SN10, NS10, Sta11c, Ter11]. [GT19, JSMG18b, LGWY12, PAF18, TV19, Four [LyWlZZ12, MSL13]. Four-Pixel BGG+13, WDZ19, WLS14, ZL12, ZFH+18]. [LyWlZZ12]. Fourier Flexlist [EKB+16]. Flexlist-Based [GJ13, yWpWyYpN13]. Fourth [Kob10]. [EKB+16]. flip [Bre18, Wag16]. flip-flop FOX [LJF16]. FPGA [Bre18]. Flipping [BHT18, CK17]. [AMKA17, Ang16, BCE+10, BYDC19, Floating [EZW18, AKM+15]. Flood BDGH15, CFZ+10, CHS15, EAAAA19, [DHT+19]. flop [Bre18]. Flow GFBF12, HJ19, HF14b, LLD19, MM14a, [ATS15, DJ19, HBC+19, WXL+17, CFG+17, MAK+12, RJV+18, TV19, YT16, ZLQ15]. KL13, LWY12, PPR+12, SRB+12]. Flowers FPGA-Based [RJV+18]. FPGA/ASIC [Hai17]. Flows [CDD13, HKB14, WYL13]. [CFZ+10]. FPGAs fly [PS14]. Fog [FMC19, JWNS19, Gop19, [DGP10, GT19, RHLK18, SMOP15, VMV15]. JSMG18a, KH18, LWW+19, QRW+18, Fractal [JTZ+16, KM11]. fraction [IK15]. Wan18a, WDKV19, ZSW+18b, YXA+18]. fractional [BW13, VM14]. Fragile Fog-based [FMC19]. Follows [Arm19]. [AAA+19, CHHW12, MCDB12, SSA13, FontCode [XZZ18]. Foolproof [FFL12]. WK18, ZWZ17a, CCLL11, PGLL10, WHZ12]. Force [JR14, CJP12, CJP15]. forensic fragment [BPP10]. Fragmentation [Har14]. Forensics [Ber18, CFXY17, [BDPS12, CDF+10]. frame DLGT19, AKM+11, Har14, QZ14, SM13]. [FMB+18, YQH12]. Frames [DG17, IM14]. Foreseeable [ATD17, Dya19]. Forex Framework [BJL16, CD12, DG17, HXC+11, [DMO+19]. forged [HREJ14]. forgeries KPC+16, KYEV+18, LLG15, LSC+15, [YQH12]. Forgery [LC15, BM13, LWLW11]. LY15, LQD+16, LNG19, MSU13, SK11, forgotten [And13]. Form Scr18, SYC+17, SEK+19, TSH14, VKPI17, [HHS18, DWZ12, Kre13, Khl18]. Formal XHZ+19, ZJ14, ATKH+17, BHCdFR12, [ACF16, EWS14, FVB+18, HK14a, HSA14, CRS13, GQH17, GM13b, HPL+19, JZU+19, 39

KKGK10, KM14, KS19, MMS+17a, SGY11, WSSO12, YWJ+19, AKY13, MBF+13, PSdO+13, PLCGS11, PKA15, ABO+17, AP11, Bar19, BDPV12, CMMS17, SD10, SA16b, SYW17, SA19, ZYC+17]. Con17, LK14, LP11, RS14, Sar11, SXL16, frameworks [LSBN14]. France [Kap11]. SCBL16, TQL+14, WYW14]. Francis [Joh10]. Francisco Function-based [YWJ+19]. Functional [Dun12b, Kia11, Pie10]. Francois [SR14]. [AS16, BV18, BSW12, Boy13, GGH+16a, Frank [ABJ13, Joh10, Mar10a]. GVW12, LQD+16, MVV12, Rus15, Wat12, frankencerts [BJR+14]. Fraud ZYT13, ZWTM15, ZWM14]. [Ber12, CEL+19, MT17]. Fred Functionalities [JR13]. Functions [Xie12a, Xie12b]. Free [App13, Boy16, [ACZ16,´ ALR13, BBC+14, BIKK14, CCDD19, CCDD20, HLH19, IL15, LSQZ17, BKPW12, BHT18, BK12a, CCL+19, CPS16, LSQL18a, TWZ+12, TTH15, WZCH19, DSMM14, DQFL12, FY11, LVV11, NIS15, YY17b, ZLH+12, ZM18, AJYG18, ATK11, NR12, Rja12, RW12, SMS14, SLY+16, ED19, LYC+10, LL16a, SA12, SE16, YT11b]. Tan12a, WCXZ17, YTP11, AY14a, BDP11, Free-View [TWZ+12]. FreeBSD BDK16, BCGS16, CG12b, CQX18, CW12a, [MNNW15]. Freedom [Con18]. Freestart ESRI14, Gen10, HRV10, HL12, Kom18, Li10, [SKP15]. Freeze [HHAW19]. French QZDJ16, WT13]. fundamental [Bre18]. [Ant14]. Frequency Fundamentals [Joh10]. Further [BBM15, KAHKB17, LTKP16, LWCJ14, [HCL+14, WHY+12]. Fus [FMS12a]. TC10, CJP12, CJP15, EA12, NLYZ12]. Fusion [ABCL17, YYK+17, HW19]. Future Frequency-Based [LWCJ14]. fresh [GJ19]. [AYS15, BCE+12, BKBK14, Bon12, BLU+15, Freshness [RBNB15]. Fresnelet [FMB+18]. CDFZ16, Fri13, GCK12, HYS18, KHN+11, Friendly [Fra16, KCC17, SZDL14, ACM12, Mon13, SG19b, AP18, Ano13f, Dya19, BP18, FK19, KLW+16, RD17, WOLS12]. FPBG14, Mac12, PPA18, PHWM10, MJS13]. Frontside [DDR+16]. FSR [MD12b]. Future-proof [Mon13]. Fuzzy FSR-Based [MD12b]. [AP11]. [HWZP18, KRDH13, NC12, SH11, USH19, Fujisaki [TFS19]. Full [Arm19, ALR13, XJWW13, Alp18, BSBG19, HK17, KHMB13, DGFH18, HR19, HEC+12, LW12, VS16, LYC+10, MMSD13, SM11, SNM14, SC19b]. WLC12, BKR11, DDM17, LC13, Ran16, FV [MRL+18, RJV+18]. SWW+17, SKP15, Tam15, TY16b]. full-hiding [DDM17]. full-text [SWW+17]. G [HLYS14, YN19]. G2 [BP18]. G2C Fully [AKP12, BV11, BV14, BGV14, [BMP12]. GA [MMSD13]. GA-fuzzy CMO+16, CN12, CZF12, CNT12, DOS15, [MMSD13]. gadgets [Gel13]. Gait GH11a, GH11b, GHS12, HLLC11, KKK+18a, [DM19, XJR+17, NMX15, XJR+17]. LMGC17, LSLW15, LJY16, LATV17, LSC12, Gait-Based [XJR+17]. Gait-Key MVV12, MSM18a, Nac16, NCCG13, PB12, [XJR+17]. Gaithashing [NMX15]. Gallai SGH15, Vai11, VV19, WHC+15, XWZ+18, [SS10b]. Galois [CFR11, CLF+17, HSA14]. ZZ12, DDL15, GH13, ZXJ+14, ZML17]. gambling [Ana14]. Game [ADH19, Fully-Homomorphic [GH11b]. MZA+13, LPZJ15, Pro15, SD10, SKEG14]. Fully-Homomorphic-Encryption [CN12]. Game-Theoretic [ADH19, SD10, SKEG14]. Fun [APPVP15]. Function Games [Alz19]. Gap [AMPH14, Bee17, BKST18, BBKL19, [LRVW14, TMGP13, PPA18]. Gaps CJZ13, FLS+10, GGK18, GKG19, GHY18, [SPM+13, DKL+16]. Garble [AIK14]. LJF19, LyWlZZ12, MMS17b, RJV+18, Garbling [App13]. Gard [Kap11]. Gate 40

[Kar12, EAB+19, JSMG18b]. Gates HXC+11, Sar10b, SY15a, WCL+18, ZCLL14, [App13, BBKL19]. Gateway GM13b, HQY+16, NXS10, YT11b, ZYM19]. [WZM12a, WZM12b, WL11, WXK+17]. generically [MHKS14]. Genetic Gateway-oriented [WZM12a, WZM12b]. [JK13, MM17a, ASVE13, EEAZ13, PTK14]. Gateways [RVS+18]. Gathen [Hom17]. genius [Hai17]. Genomic Gauss [BPBF12]. Gaussian [BKLS18, RCP+18]. Gentry [GH11b]. [HKR+18, RMERM19, YWL+17]. gave Genuine [HR13]. genus [FWS13]. geo [Pau19]. Gaze [KTM+18]. GCD [FG19, Har14]. geo-distributed [FG19]. [ABSSS19, KI11]. GCHQ [Ald11]. GCM geo-location [Har14]. geodesics [ZZCJ14]. [SKK10]. GCM/GMAC [SKK10]. GDLP Geographic [LC17]. Geolocation [FPY15]. [MMZ12]. Gear [AHS13]. Geckos [GSC17]. Geometric geese [Bai12]. Gender [Abb12]. [ACA+16, DSB16, GTT11, WLZL12, GenePrint [HQY+16]. Gener [HYS18]. YWNW15, CLZ+17, GZHD12, LZWZ19]. General [Bar16a, BCKP17, CJXX19, geometrical [TLL13]. Geometrically FJHJ12, GFBF12, Gue16, HP12, KOTY17, [WYW+13]. Geometry LPL15, LNG19, PB12, SJWH+17, YFF12, [tWmC12, CFR11, CZ15a]. geospatial ABDP15, Bai12, DGJN14, GMT+12, [HK19]. German HQZH14, LWS10, WS12, YC11, ZYC+17]. [BDFK12, Bl¨o12, Buc10, Cop10a]. Germany General-Purpose [FBM12, GLIC10, Sen10, Wat10]. Gesture [Gue16, ABDP15, DGJN14]. generalisation [LCL17b, RSX18, SCR19b, SHBC19]. [LR15]. Generalised [Hes12]. gesture-based [SHBC19]. gesture-typing Generalization [GMNS15]. Generalized [SCR19b]. Gestures [BFMT16, GL19, LPL15, PT19, PC14, [AUMT16, KTM+18, GCSAddP11].´ Get TY16b, Ye14, ZGCZ18, ZAC17,´ ADG16, [GPT14, Sch11]. gets [Cou12a, Kum10]. BNST17, KL11, NC13, YMSH10]. Getting [ESS15]. GF [GT19]. GGH Generated [CJL16, LH10b]. GH [AK14a]. GH-public [ADD10, LCL17b, NN12, XYXYX11, YM18, [AK14a]. Ghost [CDA14]. GHZ [CCL+13]. AGHP14, CBL10, JS18a, LW13b]. GHZ-State [CCL+13]. giant [Joh15]. Generating [Ano16f, Con17]. Generation GIFT [CWZ19]. girls [Mun17]. Girod [ABS+12, BCGH11, BH15, GT19, HEP+11, [GMNS15]. given [Bar19]. GLARM LKBK19, LTC+15b, MR14a, MJGS12, [LLZ+16]. Glass [Fyo19]. glimpse [Mic10a]. NIS12, PS14, SOS15, SRK+17, SRK+18, Global [CLP13a, CLH13, MRS+17, GH16, XJR+17, Aia15, ACD+15, BDK16, CJXX19, LH11b, TMK11, ZX11, LNK+18a]. Globally GMRT+15, GMdFPLC17, GCH15, [CCS14, LG10]. Glyph [XZZ18]. GMAC KHMB13, KKM+13, OMPSPL+19, [SKK10]. Goal [BMP12]. Goal-Driven SGFCRM+18, SPK17, XW13, YDH+15, [BMP12]. Goes [BCD+12, RY10]. ZYGT17, ZYGY18, ZHL+11]. Generator Goldfeder [Ano16a]. Goldreich [Lin17]. [ADD10, BK12a, CDK+10, MVV12, Goldstrike [BH15]. Goldwasser [Gol19]. NNAM10, NKWF14, CFY+10, LGKY10, Goliath [Sch15c]. Gong [LLW16]. Good MRT10, PLSvdLE10, SH11, SM11, XSWC10]. [DQFL12, FY11, Raz19, LSBN14, RY10, Generators [AS17, DSLB18, LTKP16, SA14, WT13]. goodbye [HU15]. Google MFG16, NIS12, PFS12, CP13, GR19b, [Har14, Loe15, VGN14]. Goppa [MBR15]. HRV10, MG15, Sti11, Zim10]. Generic Gordon [GW14]. gossip [FG19]. [BWLA16, BR14, Chi16, DL17, GWWC15, gossip-based [FG19]. GOST 41

[LJF19, LC13, WYW14]. Govern [Nor17]. Groups Government [Ano15e]. GPG [Ran14]. [Abe12, GZ12, HWS+19, XNKG15, YS12, GPGPU [CBL10, RVRSCM12]. GPGPUs YKNS12, LLY06, MZ17a, WQZ+13, ZZ15]. [TLCF16]. GPU [AHG18, BCGH11, Grover [JL18]. GRS [TD14]. GSR [LC17]. EZW18, GCH15, HBBRNM+16, JHCC14, Guangdong [IEE11a]. Guaranteed KFE19, LGP19, LFK19, MBB11, ZOC10]. [TBCB15]. Guarantees [FVB+18]. GPUs [AVAH18, VKPI17]. Graded [BR14]. Guerrillas [Has16]. Guess grail [Wat15, Mic10a]. Grain [FSWF11, Fok12]. Guessing [BMS12, SBM15, FSGW11]. Grained [Che15, LCL17b, XJWW13, FIO15]. Guest [CDD13, PV17, YTH17, CLH+16, LHH+18, [Ano19a, Gup15, BdD19, LLK18]. XYML19, ZML17]. Granular [SYv+19]. Guidance [BD15]. Guide Graph [ATS15, GTT11, WH18, GJMP15]. [She17, STC11, Han12, Gre19a]. Guided graph-based [GJMP15]. graphic [SKH15]. [CJFH14, ZSMS18]. Guiding [DGJN14]. Graphical [BCV12, MC19, CTL12, Eng15, GVW [HLC+19]. gwAs [SAM+19a]. LTC+15a, MZL+19]. graphical-based Gyroscopes [SNCK18]. GyrosFinger [CTL12]. Graphics [SNCK18]. [HHMK14, ABDP15, KY10, PGLL10]. Graphs [BFM12, KU12, KA18, Lau17, H.264 [JSZS12, JHHN12, LLHS12, LW13c, PMZ12, BBGT12, KLN15]. Grassroots MU12, WDDW12, ZLDD12, ZLDD14]. [GB19]. Gray [DA10, UUN13]. Gray-Level H.264/AVC [JSZS12, JHHN12, LW13c]. [DA10]. Great [Acz11]. green H.264/SVC [dCCSB+16, ZTZ16]. Grey [MU12, WDDW12, ZLDD12, ZLDD14]. [BCKP17, LRW13]. Grey-box [LRW13]. H.265 [GKSB17]. H.265/HEVC GREYC [AGBR19]. GREYC-Hashing [GKSB17]. H˚astad [Ten18]. Hack [AGBR19]. Grid [DLV16, Fol16, Ran10, Ran14, Ran16]. [CGB+10, DLZ+16b, KS15, LPL15, VTY18, Hacker [ZGC16]. Hacking AMN18, BC16, CDWM19, DZC16, JAS+11, [GHS14, Hea15, JEA+15, Sta13]. hacks MCN+18, WS12, YY11, ZZY+19]. [Ran10]. HAIFA [DL17]. Half [BBKL19]. Grid-Based [LPL15, WS12]. Grids [SC10, Halftone [GL10]. Hall [Ful10, Don14]. CT11b, GLW13, LWK+19, Shy15, JAE10]. Hall-CRC [Ful10]. Hamming Gr¨obner [EVP10, FES10, Tam15]. Gros [HRK18, CCLL11, KSSY12]. Hand [Dan12]. Grøstl [ABO+17]. Ground [SR12a, Cho10]. hand-held [Cho10]. [KP17]. Group [AEHS15, BSBB19, BSV12, Handauth [HBCC13]. Handbook CZCD18, CGY+13, CLW16, DT13, FVS17, [Bee17, AB10b]. Handheld HL10a, Har13, LLZ+16, LCCJ13, LWL+17, [RPHJ11, CTL12]. Handoff [HZC+12, TW14, XLM+12, XGLM14, XZLW15, HZC+14, XHCH14, ZBR11, ZCLL14]. YJSL18, ZXH16, AKK+17, CML+18, Handover [HBCC13, LBR12, CLM+12, GBNM11, HCCC11, HPY10, IOV+18, CML+18, FZZ+12, HZWW17, LNNH13, LLLS13, LWS10, LLM+19, PY19, RS15, QMW17, YHL16, YHHS16, YLS12]. Hands SCBL16, WDZL13, WTT12, YZL+18, [Bre18, GPT14, BSS11]. hands-on [BSS11]. YLL+18, ZZKA17, ZWQ+11, ZGL+18a]. Handshake [KK12, KK13, SM10c, WZ11]. Group-based [LLZ+16, CML+18]. Handwriting [SKV12]. Handwritten group-key [IOV+18]. Grouping [LNZ+13]. [GdM16, ASVE13]. Hankel [Ye10]. Hans Grouping-Proofs-Based [LNZ+13]. [Mur10]. haptic [ASVE13]. Hard 42

[KPC+11, Mar10c, ZWTM15, BDK16, Hash-Counter-Hash [MKASJ18]. BCGS16, RPG12]. Hard-to-Invert Hashing [AAE+14, AB17, ASBdS16, [ZWTM15]. Hardcover [Joh10]. Harder BHKN13, BKL+13, BP18, Kaw15, BDK16, [KTA12, Sch16c]. Hardness BCGS16, CP13, AGBR19]. Haskell [Rus15]. [AH19, BHKN13, SS13]. Hardware hatching [WYK12]. HB [HSH11, PYH+18]. [AW15, AW17, ARH+18a, ADSH18, HDH [PDNH15]. Headline [YGFL15]. BNMH17, BRPB13, BDMLN16, BJCHA17, Health [AMSPL19, LYZ+13, LHL15, Rao17, CMLRHS13, DZS+18, DOS15, ERRMG15, ZVG16, AKS19, BC18, CLC+19, Ham19, GP17, GPR+19, GCVR17, GM16b, GCS+13, IC17, OSP+19, WMX+17, YZL+18, HKL+14, HG12, HSA14, HC17, HLN+10, ZAAB17, ZDHZ18, JKL+16]. Healthcare KAK18, LGH+17, LLKA19, LRVW14, [BN14, HLKL15, ZLDC15, ASO14, Kim16, MLCH10, MCS+15, MRL+18, MHY+18, ZGL+18b]. Hearing [Bla16]. Heart NDC+13, NdMMW16, PC16, PG12, RMP10, [GMdFPLC17, HCYZ18]. Heartbeat [IA15]. SN10, Set16, Sti19, Tay17, VCD16, Heartbleed [DKA+14, Ven14]. hedging WOLP15, YSF+18, YDV19, ZL19, ZHS+19, [RY10]. Heights [Gen13]. held [Cho10]. ZAG19, AMN18, ABO+17, BDM18, Helios [CFE16]. Hell [Han12]. Hellman BGG+13, EAB+19, KHF10, MD12a, NS10, [ABD+15, ABD+19, Chi16, FHLOJRH18, Nov10, PABC´ +19]. Hardware-Assisted Hof16, HLCL11, HLYS14, LZC14, LNL+19, [LLKA19, GPR+19]. Hardware-Based McG16, Orm16, RH10]. Helmut [Mur10]. [HLN+10]. Hardware-Enabled [YSF+18]. helped [Smi11a]. helper [RWZ13]. HeNB Hardware-Enforced [Set16]. [CLM+12]. HEPCloud [RJV+18]. Here hardware-entangled [EAB+19]. [Dya19]. Hermitian [ACA+16]. Herodotus Hardware-Intrinsic [SN10, NS10]. [Keb15, Mac14]. heroine [Fag17]. Hess Hardware/Software [MRL+18]. [HP17]. Hess-Like [HP17]. Heterogeneous hardwares [SKH15]. Hardy [KS18a, SP15b, YZDZ19, AIKC18, ABB19a, [Xie12a, Xie12b]. Harmonic [YWNW15]. SZMK13, SCKH10, SHC+16]. Heuristic Harnessing [DFKC17]. Harvesting [BGJT14]. Heuristics [SKE+18, KO14].¨ [ABC+17, ZGC16]. HAS-160 [WLC12]. HEVC [DG17, GKSB17]. HIBE Hash [Ano12, AMPH14, BHH+15, BKST18, [LW11c, LSQX19]. Hickory [NN15]. BK12a, But17, CLP13a, jCPB+12, CZLC12a, Hidden CZLC12b, CZLC14, CJP12, DCM18, DL17, [FMS12b, PSS+13, YLL+12, ZYT13, ZYY19, EAA+16, FLS+10, GI12, HCPLSB12, H¨ul13, BDK11, LCL+17a, Sch15c, Smi15a, XZP+19]. HRS16, HBG+17, LYY+18a, LYX+19, Hiding LJF19, MSTA17, MKF+16, MCF17, [AAA+19, DCA18, GGH+16b, GL10, MKAA17, MKASJ18, NIS15, NTY12, NR12, JHHN12, KD19, MK12b, OT12, XLM+12, NXB13, PTT16, Rja12, SGY11, WSSO12, XGLM14, XZLW15, Ara13, DDM17, HZL18, ZZM17, ZHZ+19, AY14a, AKY13, ABO+17, KWH16, LXLY12, LT14b, SM19a, UUN11, AP11, BCGS16, CJP15, Con17, ESRI14, WLH13, WZLW13, ZWM14]. hiera [Lac15]. HL12, KKG14, Par18, PPB16, RS14, Hierarchical [ADM12, BSSV12, DBT19, SPLHCB14, SXL16, WYW14, ZCZQ19]. FSX12a, LSLW15, LHW18, NMS14, NLY15, Hash-Based [BHH+15, But17, DL17, GI12, OT12, SSSA18, WLWG11, WYML16, HCPLSB12, H¨ul13, HRS16, HBG+17, WHLH17, ZMW16, ZHW+16, ZYZ+19, MKF+16, MCF17, MKAA17, NXB13, DSCS12, HYS18, JCL+18, KPB17, LFZ+17, CJP12, CJP15, PPB16, SPLHCB14]. NZM10, RG10, SE14, SE16, WWYZ11]. 43

Hierarchies [DMM10]. Hierarchy HMAC-SHA256 [GWM16]. Hoc [NA10b, VN16]. High [LH12, PD14, She14, SS15, XHC+12, [AW17, ASBdS16, Ano17d, ARM15b, Bar15, BBB19, KM10b, LXJ14, PY19, SGGCR+16, BDL+11, CLB19, DM15, DG17, FHLD19, WXSH19]. Hoffstein [Mei10]. HOL4 FYD+19, GL12, GCS+13, HMKG19, HZ11, [HK14a]. Holden [Ano17b]. Hole KFE19, KMP+11, KPC+16, KAK18, [Ano15d, BKKV10, PC16, YKA16]. LTKP16, LCK11, LLY+18, LPO+17, MS13b, Holocaust [Han12]. holy [Wat15, Mic10a]. MS13c, MM17b, MSR+17, PCPK14, Home [BD18, HXHP17, KHN+11, KPP16, WYCF14, WL11, XNRG15, XLP+18, SYWX19, Cor14a]. Homes [VJH+18]. AHG18, ABBD13, GZHD12, GCVR17, Homogeneous [HT11]. Homomorphic JLC18, KL13, MAK+12, PABC´ +19, RS17c, [AAUC18, AKP12, BV11, BV14, BGV14, WLH13, WXLY16, WZLW13, WKH11]. CMO+16, CN12, CJ13, CK18, CNT12, High-Assurance [Bar15, KMP+11, WL11]. DOS15, GH11a, GH11b, GHS12, GHPS12, high-capacity [GZHD12]. GHY18, KOS16, KGV16, Kim15, KKK+18a, High-Dimensional [Ano17d, XLP+18]. KHRG19, Lau17, LCLL15, LATV17, MLO17, High-Efficiency [DG17]. High-Impact MSM18a, MSR+17, MRL+18, MBF18, [DM15]. High-Level Mor19b, Nac16, ODSS17,¨ PKTK12, RCP+18, [AW17, KPC+16, ABBD13]. High-Order RMZW19, Roh19, RJV+18, Tan15b, Vai11, [FYD+19]. High-Performance WHC+15, WCXZ17, XWZ+18, AKKY17, [GCS+13, KAK18, LPO+17, CLB19, BDOZ11, BC18, CJXX19, CW12a, DMD18, FHLD19, AHG18, GCVR17, PABC´ +19]. GH13, GHPS13, GLM+16, LLW16, SEXY18, High-Rate [PCPK14]. High-Security Tam15, WSC14, YJC18, ZXJ+14, ZYC+17]. [WYCF14, BDL+11]. High-Speed Homomorphically [SG19a]. [ARM15b, HZ11, LTKP16, MSR+17, Homomorphism [Bra13]. Honey [JR14]. BDL+11, KFE19, KL13]. Hop [RWLL14, LCT+14]. Hop-by-Hop High-Throughput [HMKG19, MAK+12]. [RWLL14]. Hope [SD18]. Hopf [Kuz11]. Higher [LWKP12, PRC12, gWpNyY+14, hose [BSR+14]. Host ZSW+12, LWKP14]. Higher-Order [THA+13, LKKL13, der10]. hosted [SG19a]. [LWKP12, PRC12, ZSW+12, gWpNyY+14, hostile [CDA14]. HotCalls [WBA17]. LWKP14]. Highly House [Ano16j, Bla16]. HP [CGB+10]. [CD16a, SZDL14, SC19b, ACD+15, DT13]. HPC [KV19]. Hromkovic [Gas13]. HTTP HIGHT [CWP12, WWBC14]. HiiMap [BHCdFR12]. Huang [LLSW16]. Huffman [HEP+11]. hijacking [BCFK15, DCAT12]. [Sun16]. Hui [FMS12a]. Hui-Yuan HILL [KPW13, KA17]. HIMMO [FMS12a]. Human [GMRT+15]. himself [Pro15]. Hindering [HHS+15, HWZZ19, IA15, DIMT12, HZW19, [BTPLST15]. HISS [DT13]. histogram HW19, LWW+10, PYH+18]. Humans [CSS+13, Lin14a]. Historians [Cer14]. [RBNB15, RB17]. Hummingbird [ESS12]. Historical [Hai17, Han12]. History Hummingbird- [ESS12]. hunt [Bha16]. [ABJ13, Ano19b, Cer14, Cop10a, LT14b, hunted [McG11]. HVS [RMG18]. HWMP McK10, McK11, SE16, Smi15a]. [BOB13]. Hybrid [ADI11, ARM15b, JLZ18, history-free [SE16]. Hitler [Hea15, Moo14]. JHW+19, KBL11, KKA15, LP12, LLD19, hitting [GR19b]. HIV [GSGM16]. HMAC MMBS19, NGAuHQ16, OO12, Per13, [GWM16, MAK+12, YGS+17]. RCBK19, SGG18, SRT12, XWLJ16, Zaj19, HMAC-DRBG [YGS+17]. SAM+19a, AM19, BYDC19, EEAZ13, KP18, 44

WXLY16, WS14, XWS17, BOB13]. SVG16, ZCWS15, CAM19]. Identities Hybrid-Double [ARM15b]. [KHN+11, LBC18, GLM+11]. Identity hybrid-indexed [WXLY16]. hybridization [AHN+18, AQD12, ASM12, ASVE13, [MMSD13]. Hyderabad [GG10]. Hyper Ano15b, ACAT+15, ASS15, BWLA16, [BL14, KO14,¨ LZKX19, WGZ+12]. BCF16, BHG12, BKPW12, BDFK12, Ber12, Hyper-and-elliptic-curve [BL14]. Ber17, BS13b, Bow11, Cal13, CCFM12, hyper-chaotic [WGZ+12]. CSL+14, CSZ+11, CZLC12a, CZLC12b, Hyper-heuristics [KO14].¨ Hyperchaotic CLHC12, CZLC14, CLND19, CGL+12, [GMOGCCC15]. hyperelliptic CGY+13, Chi12, dCCSM+12, Faa19, [FWS13, Kre13]. hypergeometric [YL11]. FHH10b, FZT14, FR15, FSX12b, FSX12c, Hyperledger [BHH19]. HyPoRes FSX12a, GOPB12, GR19a, Gla11, GY13, [MMBS19]. GDCC16, GJJ15, GJZ17, HZC+12, HvS12, HSM13, HSM14, HZX15, HYWS11, HYF18, i-NVMM [CS11]. I/O [CDD13]. i2b2 JGP+18, KKA14, KRB12, Kuz11, LMG+18, [RCP+18]. IB [CZLC14]. IBBE [SXH+19]. LYX+19, LMB12, LSL12a, LKAT12, LXJ14, IBC [BOB13]. IBC-HWMP [BOB13]. LLC+15, LTZY16, LSLW15, LH11c, LSC12, IBM [ABC+12, ACD+15, BAB+13, LBR12, MLO17, MHW+19, MBF+13, HKL+14, JSM+18]. ICA [tWmC12]. MJGS12, MJW+18, MR10, OdH12, Par12a, ICICTA [IEE11a]. ICISC [LH10a]. PSS+13, PSJ+13, PWVT12, RDZ+16, RS15, ICISSP [Ano19a]. ICN [CHL19]. ICs SS10a, SG12, SS10b, SS12a, SAAB10, Sch11, [GSFT16]. ID Ser12, SXH+19, SSPC12, SKGY14, [Ano17c, CTL13, CDPLCA16, EZ15, HCC10, SWW+16, SGH15, TKR14, Tia15, TH16, IB11, KGO10, LMGC17, LY14, MWZ12, THA+13, TMGP13, TAP19, TFS19, MM12, MMZ12, Mes15, PLPW13, Rom11, VJH+18, Vle12, VFFHF19, WY10, Wan14]. TPL16, TT12, TTH15, Wan18a, WDZ19, Identity WT10b, WTT12, HWZZ19]. ID-based [WZCH19, XXZ12, XLQ09, XQL11, [MM12, LMGC17, MWZ12, TT12, TTH15, XJW+16, YZX+12, YTM+14, Yon11, WT10b, CTL13, EZ15, HCC10, IB11, YHK+10, YKC+11, YFK+12, YCZY12, KGO10, LY14, MMZ12, Mes15, PLPW13, ZLH+12, ZMW16, ZYZ+19, ZDW+16, TPL16, Wan18a, WDZ19, WTT12]. ZPXX17, ZYM18, ZYH+19, ZTSR12, ID-card [Ano17c]. ID2S [YRT+16]. IDEA vdWEG18, ATKH+17, Ano13f, BMBS10, [BNY14]. Ideal BOB13, BSBG19, BMM12, BBGT12, [LPO+17, WCL+18, HKT11, yYqWqZC13]. CTHP13, dCCSB+16, DZ14, Din10, DWZ12, idealness [TD14]. Ideas [FREP17, Mac12]. FA14b, GMRT+15, GR19b, GPVCdBRO12, idempotent [Dur15]. Identical [Bow11]. HPJ+19, HZC+14, HWDL16, HZWW17, Identifiable [Oba11]. Identification HLR11, HFCR13, HWB10, HWB12, HL11, [CZCD18, FSX12b, FSX12c, FSX12a, HPY10, Hwa11, JCL+18, JZS+10, KKGK10, HWZZ19, KGP+19, VGA15, YGFL15, KKM+13, KL11, LKKL13, LK12, LXMW12, YKK18, AGLW16, BOP14, CTHP13, CJP12, LCT+14, MMS+17a, MD15, MGP10, MJS13, CJP15, DJ19, EA12, HQY+16, HL19, KI11, MLM16, MM13, NCL13, NML19, O¸¨ S11, KL13, NLYZ12, WYZ+17, YTM+14, PZL+19, PLCGS11, QYWX16, RG10, ZAAB17]. identified [AZH11]. Identifier Rom12, SSY12, SE14, SE16, SR10, hSZZ15, [LHW18, GSGM16, MJS13]. identifiers SA16b, Sim15b, SSAF11, SSS11, SGM16, [Cer18]. Identifying [Bel18b, CZ19, CSV15, VGL14, WWYZ11, WWYY11, WSC14, 45

WLFX17, WMX+17, Wan18b, WXMZ19, [ABJ13]. Illinois [Nor17]. Illogical [Hel17]. WHZ+19, Wat14b, WWW17, XW12, XCL13, Illumination [KLY+12]. Illusion [GHS14]. XHM14, YWL+17, YWJ+19, yYqWqZC13, Illustrated [Cop10a]. Im YYS+16, YMSH10, YKC+12, YXA+16, [BGI+10, BGI+12]. IMA [Che11]. IMACC YNX+16, ZMYB17, ZZ12, ZYM19]. [Che11]. Image [BS11, Bai10, BAAS13, Identity [LZJX10, PN10, Sar18a, Kat13]. BDB14, BWR12a, CJFH14, CCC19, DA10, Identity-as-a-Service [VFFHF19]. DCM18, DS19, GRRZ18, HD19, IAD10, identity-authentication [NML19]. JKHeY12, KPS10, KLK+19, LA15, LLL17a, Identity-Based [ASS15, BWLA16, BHG12, LFX+18, LLLH18, LZKX19, MBC15, BKPW12, CZLC12a, CZLC12b, CZLC14, MAL10, MSM+18b, PWW10, QJC+18, CLND19, CGL+12, CGY+13, Chi12, RS16, RVRSCM12, SH11, SM11, SZHY19, FHH10b, FZT14, FR15, FSX12b, FSX12c, SJ12, SGP+12, SMSK18, SS17b, SSA13, FSX12a, GY13, GJJ15, GJZ17, HZC+12, SRAA17, SZZT18, TB18, VGA19, WHZ12, HSM14, HZX15, LMG+18, LYX+19, LSL12a, WZXL12, WYW+13, WYCF14, yWXyZ+18, LLC+15, LTZY16, LSLW15, LH11c, LSC12, WYK12, WYL18, YLL+12, YWNW15, Ye10, LBR12, MLO17, RDZ+16, SGH15, TKR14, Ye14, YH16, YXD18, ZXZ+11, ZWWW17, TFS19, Wan14, WZCH19, XXZ12, XJW+16, ZWZ17a, ZWZ17b, ARG19, AM19, BWA13, YZX+12, YHK+10, YKC+11, YFK+12, BM13, Bro19, CT11a, CW14a, EA11, YCZY12, ZLH+12, ZMW16, ZYZ+19, FMB+18, GKCK11, HAK19, HLC16, ZPXX17, ZYM18, ZYH+19, CSZ+11, HSM13, KMG17, KM11, KKK+18b, LXCM11, LW10, HYWS11, HYF18, LKAT12, LXJ14, MJGS12, LWLW11, LW13b, LPZJ15, MO14, MS17, RS15, SXH+19, SWW+16, Tia15, TH16, NES+14, PTK14, SE18, Sch12a, SM13, ZDW+16, BOB13, BMM12, CTHP13, DZ14, SM12, SNM14, ST15, SGFCRM+18, Sun16, FA14b, GMRT+15, HZC+14, HWDL16, jT12b, TTL10, TLL13, UUN11, UUN13, HZWW17, HLR11, HWB10, HWB12, HL11, yWpWyYpN13, WDG19, WHZ+19, HPY10, Hwa11, JCL+18, LK12, LCT+14, WGZ+12, WSS+19, WKH11, WOLS12, MJS13, MM13, NCL13, PZL+19, QYWX16, XSWC10, YWL+17, YC11, YCC16]. image RG10, SE14, SE16, hSZZ15, SA16b, SSAF11, [YSC16, ZLW+12, ZT14, ZSMS18, ZL12]. SGM16, WLFX17, XW12, XCL13, YWL+17, Image-Guided [CJFH14]. YWJ+19, yYqWqZC13, YKC+12, YXA+16, Image-Scrambling [LLL17a]. ZZ12, ZYM19, LZJX10, Kat13]. ImageMagick [Tay14]. Imagery Identity-Enabled [SG12]. [BCP14a, Ara13]. Images Identity-Hidden [PSS+13]. [BCPV11, BBM15, CLF11, FR16, GL10, Identity-Preserving [MHW+19]. IdM LC15, LLY+12b, MR16, NC12, Yam12, [ACAT+15]. IDs [SOS15]. IEC dRSdlVC12, AM19, AMK12, DD13, [BCM12, BCM13]. IEEE HWYW14, LW13b, MM14a, MKH+12, [IEE10, IEE11b, IEE13, IEE15, MSH+16, UUN13, WLH13, WZLW13]. imaging TBL19, Yan10, Ano16g, BOB13, CL11, [WW13]. IMFlexCom [PAF18]. IMI FLH13, FZZ+12, NBZP17, ZBR11]. [PN10]. imitation [Hai17, Pro15]. Impact IEEE802.16e [HLCL11]. if [Alo12, ACC+13, ATD17, BLS12, DM15, [ABJ13, Pec17, Rus15]. IFIP [GLIC10]. IFP SF12, vRDHSP17, BGE+18, HURU11]. [MMZ12]. IFTTT [BD18]. Igor [Sha10]. II Impartial [BCF16]. Imperceptibility [Mun17, SCPSN10b, SMOP15, ZWS+18]. [HGT15]. Imperceptible [Lin14a]. III [SMOP15]. ILA [HZS+19]. Illegal Imperfect [ABD+15, ABD+19, BHvOS15]. 46 impersonation [AATM18, GBNM11]. CBL10, GLW13, HWB12, Nam19, PWLL13, Implantable [BDM+19]. Implants SDM10, XHH12, YSQM19, Wan14]. [Mic16, SSPL+13]. Implausibility Improvement [FRS+16, LFX+18, LYL+18, [GGHW17]. Implementation LJ19, MWZ12, PLPW13, AN15, BMB16, [AAUC18, BW16, BKLS18, BSJ15, CHS11, Far14, LNM+11]. improvements BDMLN16, EGG+12, FHLOJRH18, [EA12, HRV10, Tso13]. Improving [AB15, FHLD19, GP17, GL12, GPT12, GM16b, BCM+15, Chi16, FMS12b, GMS11, HLCL11, GCS+13, HMKG19, HJ19, HF14b, JLZ18, MHC12, Sar10a, SS11, YWF18, YKBS10]. KB10, KGV16, LYL+18, MFG16, MAS16, impulse [LZKX19]. IMS NdMMW16, QLL17, RMP10, Seo18, TV19, [IG11, MEFO12, VGL14]. in-browser VKPI17, ZPM+15, AMN18, Ang16, [ABR13]. In-Memory [PAF18]. In-Order BDP+12, GH13, GAB19, HBBRNM+16, [ZBPF18]. In-Situ [GRRZ18]. Incentive KFE19, KY10, KSH18a, KSH18b, MM14a, [SJWH+17, YTH17]. Incentive-Aware MNNW15, NES+14, PBCC14, SK14, [YTH17]. Incident SAAB10, SVGE14, SF12]. [CCG+16, CMG+18, GQH17]. Inclusive Implementations [FD11]. Incomplete [VJH+18]. [BFCZ12, BFK16, BDGH15, BJ10b, Bru12, Inconsistencies [YSC+15]. inconsistent CMLRHS13, CBL13, ERRMG15, EKOS19, [OF12]. Increase [NNAM10]. Increasing GZSW19, LGH+17, MLCH10, MWES19, [AEH17, CLZ+17, HSC19, PKS18, RSX18]. NDR+19, SJLK18, SG19b, Tom16, VV18, Incremental [KKM+14, MPRS12, CS11]. YZLC12, ZSH+19, ABBD13, ABF+14, Incrementing [KS15]. IND-CCA [AHS14]. BFG+14, BJR+14, CFN+14, CGH17, IND-CCA2 [Gal13, MVVR12]. indefinite LBOX12, RSMA19, Sta11c, ZSW+18a]. [Svo14]. Independent [FCM14, HQY+18, Implementing MTY11, MKRM10, YE12, ZTL15, BVIB12, [Dav11, GH11b, HTZR12, KV19, LTC+15a, BCGS16, DDD14, SCR19b, VV19]. Index SG15, SVGE14, SLM10, VOG15, SA16b]. [LHKR10, PSS+13, ZXYL16, Jou13, Implications [DK16a, OSH16, SC19a]. LLHS12, LW13a]. Index-Based Implicit [BBD19, HP17, DWZ12, SSNS15]. [ZXYL16, LLHS12]. indexed [WXLY16]. Implies [BHT18]. Imply [ALR13, LRW17]. Indexing [HCDM12]. India Importance [YL17, MLMSMG12]. [BC11, CGB+10, GG10, Rom12]. Indicator Important [TC10]. Impossibility [KU12]. Indicators [YT12, Pal16]. Indirect [ACM+17, BCF+14, Mat14]. Impossible [ABS+12]. Indistinguishability [Blo15, CWP12, LJF16, TSLL11, WYL14, [AS16, BCEO19, BCEO20, BV18, FYMY15, WW12, MNP12, SDM10, SDM14]. GGHR14, GGH+16a]. Indistinguishable improbable [TS16a]. Improve [LG12]. Individual [LMB12]. [AQD12, PMG19a]. Improved INDOCRYPT [BC11, GG10]. Induced [Ber18, BCP14a, Chi12, CGKO11, DL17, [VDB+16]. induction [BBBP13]. FVK17, GLLSN12, GR19a, HLS18, HIJ+19, industrial [GHD19, LW19, OSP+19]. IK15, JLH12, KZG10, LT14a, LWZ12, Industry LJF16, LJF19, LHH11, LCCJ13, LC15, [Ano11b, ATD17, QZL+16a, SXH+19, LYD+18, LSG+19, LLML12, MM17b, Cha13c, LHH+18, Men13b, ZSMS18]. PH12a, QZ14, SK12a, SEHK12, SS10b, Infective [GST12]. Inference SP15a, TS16a, WCD19, WLC12, WWBC14, [Bro11, DBPS12, NC12, RHLK18]. YHHS16, ZJ11, ZLDD12, ZZL+19, CNF+18, Inferring [BPSD17, BSA+19, PTRV18]. 47

Influence [RSCX18]. Information Inspires [SPG+19]. Instability [LMB12]. [AQD12, ABCL17, Bai10, Big08, BF11, Installment [SYC+17]. instance [BRT12]. CVM14, CDGC12, CBRZ19, CGB+10, Instances [HN10]. Instantiating CST+17, CBL13, Dew11, DP12, FHKP17, [CMRH17]. Instantiation [LNWZ19]. FHS13, FP19, HBC+19, HHH+13, IF16, Instantiations [LYY+16]. instead JHHN12, KD19, LG12, LW11a, Low12, [AGH+17]. Institute [Wes16]. Instruction MA17b, MAL10, NTKG17, RZ19, SGC14, [ARP12, AB15, EKP+13, HZS+19, RS17a, STC11, TWZ11, Uto13, WSS12, XZZ18, YM18, BVIB12, DGK18, SF12]. XHZ+19, Yan10, Yek10, ZZ15, ZHL15, Instruction-Cache [AB15]. ZBPF18, AB10a, Abe10, AL15, ASVE13, Instruction-Level [HZS+19]. Instructions BSS11, BGP+17, CFG+17, DMWS12, [FHLD19, KG19]. Insulated DGL19, GLM+19, HPJ+19, KL13, KPB18, [FZT13, LDZ16, LH11c, HL11, LDZ+14, LZ11, LWK+18, MKH+12, Mar10b, SRB+12, RG10, RWZ13, WWYZ11]. insurance TKG+17, WHZ+19, WW13, Ano19a, [GQH17]. INSuRE [SDC+17]. Integer BYL10, LH10a]. Information-Centric [Cou12b, KTM19, LLY+18, AMK12, MM13, [FP19]. Information-Theoretic Mes15, MN14, PC14, SD17]. [CVM14, WSS12, CDGC12, GLM+19]. integer-factoring [SD17]. Integers Information-theoretical [ZZ15, KL13]. [CN12, CNT12, MH16]. Integral InfraStructs [WW13]. Infrastructure [AY14b, LWZ12, LJF19, ZSW+12, SM11, [GM13a, HEP+11, PN10, VFFHF19, SNM14, SH11]. Integrated GAI+18, JAE10, SA12, LG10]. [LY15, MU12, AL15, SSY12]. Integrating Infrastructures [CFZ+10, LH12, OdH12, AEH17, HLYS14, [MJW+18, FHM+10, YWZ+18]. ingenious MCL+19]. Integration [Mac12]. Inhibiting [GAS+16]. Initial [AQD12, Kar12, ZWY+13]. Integrity [PAS13b]. initialization [PCK19]. [BCP14a, BCK17, DGFH18, FYMY15, initiation [AN15]. initiative [Sch16a]. MV16a, PZL+19, PH12b, SB18, TSB18, Injected [LLZ+12]. Injecting VBC+15, BC16, ED17, HKA+18, PPG19, [BBGT12, LZKX19]. Injection SWW+16, YXA+16, YNX+16]. Intel [ABS+12, ARP12, DDR+16, JWJ+17, [Arm19, MZLS18, SF12]. Intellectual PYM+13, YGD+17, CBJY16]. Injections [FREP17, Bar19]. Intelligence [LCLW17]. Ink [Keb15, Mac14]. Inner [Dew11, SG19b, Ald11, Bud16, GW14, [ADM12, LMG+18, OT12, YKNS12, Han12, Maf16]. Intelligent DDM17]. Inner-Product [YKNS12]. [AMK12, IEE11a, SAJL16, VFS+19, Wat14a, innovations [JSM+18]. Input HLYS14, MKH+12, SMS+16, ZCZ+19]. [GGHW17, XXZ12, Kom18, PBCC14]. intensify [HL12]. Inter Inputs [GGHW17]. INSCRYPT [BYL10]. [LBR12, OMPSPL+19, BGAD12, SCKH10, Insecure [BCGN16, BWS19, Mur16, Lan17]. SA15, SHBC19, YWK+10a]. Inter-domain Insecurity [Bel19, HZX15, LSQ15, LRW17, [LBR12, BGAD12, SCKH10, YWK+10a]. LCDP15, SWYP12, WY10, Wan14]. Inter-Pulse [OMPSPL+19]. inter-router insertion [XWDN12]. inside-out [AP11]. [SA15]. inter-session [SHBC19]. Insider [AJA16, ERLM16, LJS+14]. Interaction Insights [AH19]. Inspection [FMA+19, HSUS11, BBDP16, HK17]. [FGR+17, VCK+12, AZH11]. Inspired Interactive [RMG18, BW13, GPVCdBRO12, OK18]. [CJFH14, DF11, FSGW11, BCI+13, LH11a, 48

LK18, LJY16, Pas13a, PPR+12, Yan14]. DK15, Gas13, G´13, Gre19b, HPS08, interceptor [Cho10]. Intercepts [Don14]. JSK+17, KL08, KL15, LLK18, Low12, Mei10, Intercloud [DCA19]. Interest [Sch19a]. Men13a, Sch15a, SOG15, Sta11c, Big08, Interface [WBA17]. interference CM13, Buc10, Led16, Sch15a, Ful10, Mur10]. [BBCL19]. Intermittent [VJH+18, CL16]. Intrusion [NSMS14, SAJL16, SBV14, Internal [LCR+18]. International YKC+12, MMF15]. Intrusion-resilient [ACM10, ACM11, BC11, CGB+10, Che11, [YKC+12]. Intrusive [AARJ12, MFH13]. Dan12, FBM12, GLIC10, JY14, LCK11, invariance [yWpNyL11]. Invariant LW11a, LTW11, MV12, PJ12, Sen10, TT18, [CSW12, NKWF14, RS16, WYW+13, Wat10, Yan10, Yan11, AB10a, Abe10, YWNW15, GZHD12, GMdFPLC17, Ano11a, BYL10, BL10, Gil10, GG10, LXCM11]. Invariants HWG10, LH10a, IEE11a]. Internet [NKWF14, CDSLY14, KK10, MZ17a, TLL13]. [Ano13f, LFGCGCRP14, TW14, AAC+16, Invention [Orm16]. invents [Ant14]. Ano13d, AKS19, BCHL19, Bel18b, BLU+15, Inverse [JS18b, RMTA18, RMERM19]. CLF+17, CCMB19, CW12b, CEL+19, Inversion [ABSSS19, KHHH14]. Invert DRS16, DG15, FREP17, FMA+19, Fri13, [ZWTM15]. Inverted [ZXYL16]. Invertible Gel13, GMDR19, HKA+18, Ham19, HZL18, [SLY+16, UUN13]. Investigating HEP+11, JKAU19, JTZ+16, KHRG19, [SPM+13]. Investigations [Bla16, Har14]. LNK+18b, LW19, LGH+17, LSG16, Invisibility [BN14]. Invisible MJGS12, MJS13, MSL13, MCF17, NLLJ12, [AAA+19, Keb15, Mac14, SYL13]. NLY15, Orm16, PLGMCdF18, SB17, InvisiMem [AN17]. INVISIOS [AARJ12]. SXH+19, SS19, S¨od13, SYv+19, SYW17, Invited [SS19]. Involution [Bru12]. SYC+17, SKEG14, VWC19, WCCH18, Involvement [LKBK19]. Involving XLC+19, YCT15, ZDHZ18, ZSY19]. [HLCL11, RB17]. IoT Internet-Draft [MCF17]. [AATM18, AMSPL19, AMKC19, APMCR13, Internet-of-Things [LW19]. BDL+19, BBTC20, CCM17, CSH+18, Internetworking [SAAB10]. FQZF18, FMC19, GAI+18, HHBS18, Hod19, interoperability [HWK+15]. KKK+18b, KKD+18, LSQ15, LZZ+19a, Interoperable [LG10]. interplay [JW14]. MMP19, NVM+17, OSANAM19, PCK19, Interpolation [JTZ+16, KU14]. RC18, SSSA18, SGC16, SJLK18, TODQ18, Interpretation [MZ17b]. TG17, Wan18b, WCFW18, WXK+17, Interpretation-Based [MZ17b]. XYML19, YWJ+19, YFT17, YFT18, Interpreter [MSI18]. intersection YTH17, ZCWS15, ZLY+19]. IoT-Based [Eng15, LZY+16]. Interval [YTH17, ZLY+19]. IoT-Enabled [SGC16]. [PPR+12, Cra11, DTZZ12, LWY12, MO14]. IoT-FBAC [YWJ+19]. IoTs Interval-based [PPR+12, Cra11]. [SAJL16, ZSW+18a]. IP Intervals [OMPSPL+19]. Intra [AGLW16, AZH11, LMS10, PJ18, PA10, [HF14b, GM13b]. Intra-Masking [HF14b]. RS17c, SP15a, TJZF12, WBC+10]. IP-SEC intra-node [GM13b]. Intrinsic [PA10]. IPE [ZM16]. iPhone [Wu16]. IPs [HRK18, SN10, NS10, RCW15]. [EAAAA19, GSFT16, NDG+17]. IPv6 Intrinsically [SRK+17, SRK+18]. [KP12]. IRC [HB13]. IRC-based [HB13]. Introducing [Ano16g, Fay16]. iris [HURU11]. IRIW [JKHeY12]. Introduction irregular [YWL+17]. ISBN [Ano15b, [AG18, BCHL19, BdD19, DK02, DK07, Ano17b, Bai12, Joh10, Mur10, Sch15a]. 49

ISBN-13 [Joh10]. Islet [Dan12]. ISO JPEG [AOT13, DLGT19, LSQ11b, LC15, [BCM12, BCM13, TS16a, WWBC14]. MAL10, QZ14, SK12a, SHC+16, WHZ12, ISO/IEC [BCM12, BCM13]. Isogenies WLH13, ZC12]. JPEG-2000 [ZC12]. Julia [Y+17]. Isogenous [AMMV18]. Isogeny [KD18]. Julia/Nemo [KD18]. July [BF19, FHLOJRH18, KD18, KAK18, Lau17, [MSH+16, Wat10]. Junction [VDB+16]. LNL+19, ZSP+19]. Isogeny-Based June [ACM10, ACM11, Gil10, Kap11, [BF19, KAK18, ZSP+19, KD18]. Isolated TBL19, TT18, Wes16]. Juniper [GKG19, Sch19b, YS15, KKJ+16]. Isolating [CCG+16, CMG+18]. Juraj [Gas13]. Just [LG12]. Isolation [GGK18]. Isomorphic [Pfl10]. JXTA [AMHJ10]. [AMMV18]. Isopleth [HGOZ19]. ISSAC [Wat10]. Issue [Ano13f, Ano16b, Ano16c, K2 [PS12]. Kaaniche [Ver17]. Kalyna Ano16j, Ano19a, AHWB20, BCHL19, [OGK+15]. Karatsuba CWZL13, CSYY18, GO17, LW13a, LLK18, [BCL14, MSR+17, MRL+18]. Karhunen XW13, YYW19, PHWM10, Sim15b]. Issues [BCPV11]. KASE [CLW16]. Katz [ABHC+16, PZPS15, VKK+19, JAE10, [Ful10, Mou15]. KDM [CBJX19, MTY11]. KJN+16, MHV15, SVGE14]. ISTE Keccak [BDPV12, RS17a, BDP+12]. keep [Ano15b]. Italian [Sac14]. Italy [Cra12]. [Rus15]. Keeping [CG14b, Man13, Gup15]. Item [CZ19]. Items [CZ19, YD17]. Iterate KEM [CZLC14]. Kepler [LGP19]. kept [HHR11]. Iterated [LPS12]. Iteration [Cha13c]. Kerberos [SCKH10, TW14]. [CCZC13]. Iterative [QJC+18, SXL16]. kernel [GM13b, HHAW19]. kernel-assisted ITUbee [FXP+17]. iVector [RSR+19]. [GM13b]. Key iVector-Based [RSR+19]. [ASN12, Alz19, ADSH18, Ano11b, ABB19a, BN14, BVS+13, BL12, BSBB19, BBB+16a, J [Bar12, Led16, Sch15a, WZM12a]. J2ME BD15, Bar16a, Ber16a, BM18, BCO13, [GPT12]. J2ME-Enabled [GPT12]. BKLS12, BF11, BKKV10, BB10, CVM14, Jacobian [BAAS13]. Jacobians [Hes12]. CT18, CLY14, Che15, CLND19, CWZ19, Jacques [Nac12]. jamming CJ13, Chi16, CCT+14, CNT12, Cou12b, [BCDN17, YSJL14]. Janet [Ayu12]. Jannie CMA14, DWWZ12, DL12, EAA+16, [KNTU13]. Japan [Sah13, TBL19, Maf16]. EFGT18, FZT13, FHLOJRH18, FVS17, Japanese [Don14]. Java [GPT12, XHH12]. FBM12, GDLL18, GFBF12, GT12, GZZ+13, Jaypee [CGB+10]. Jean GSW+16, GST13, GPT14, Gir15, GKS17, [Dew11, Nac12, SR14]. Jean-Baptiste GZ12, GLB+18, GYW+19, HSMY12, [Dew11]. Jean-Francois [SR14]. HLLG18, HEP+11, HC12, HL10a, HWS+19, Jean-Jacques [Nac12]. Jeffrey [Mei10]. HCL+14, HTC+15, HEC+12, HLH19, Jia14a, Jill [Mei10]. Joachim [Hom17]. Joe JEA+15, KP12, KMZS19, KTT12, KFOS12, [Car11]. Johan [Ten18]. John [Wes16]. Kim15, KG19, LYX+19, LLSW16, LKBK19, Johnny [HM12, RAZS15, RS19]. Join LG10, LCLL15, LDZ16, LQY10, LY16, [PD14, Ma17a]. Joint [ABF12, LC15, LH11c, LSQL18b, LCCJ13, LWL+17, PMZ13, TCN+17, LSQ11b, ZC12]. Joltik LYY+18b, LBR12, LLH18, MZHY15, [LSG+19]. Joltik-BC [LSG+19]. Jonathan MVV12, MMP14, MTY11, MMY12, MV19, [Ful10, Mou15]. Jones [Ber16b]. Jose MKK17, MPRS12, MNS11, MSU13, NNA10, [ACM11, IEE15]. Joseph [Ano16a, Mei10]. NYR+14, NTY12, Orm16, PSM17, PDNH15, Joshua [Ano17b]. Journey PCPK14, Pud12, PNRC17, RVH+16]. Key [CFST17, RS19]. Joux [AY12a, AY12b]. [RSBGN12, RW12, Saa12a, SK11, SNJ11, 50

SEHK12, Sas18, SK12b, Seo18, SWM+10, ZTZ16, ZGL+18a, ZXW+18, ZXWA18]. key Sia12, SD18, SGH15, SLY+16, TMC15, [ZCL+19, ZG10, ZZC15, ZZC17, ZY17b, TYM+17, TM12, VGA19, WP17, WSS12, ZWS+18, ZCZ+19, ZHT16, vV16, CLW16, WLC12, WZ15, WCL+18, WWHL12, OHJ10, XJR+17]. Key-Aggregate WT10b, WSQ+16, WCXZ17, XNKG15, [CCT+14, PSM17, GLB+18, CLW16]. XXZ12, Xio12, XLM+12, XJWW13, Key-Agreement [WSS12, APK+18]. XGLM14, XZLW15, XJR+17, YM16, Key-Alternating [BKLS12]. Key-Based YZX+12, YS12, YLSZ19, YLW13, YRT+16, [Xio12]. key-correlations [Sar14]. YL17, Yon12, YKC+11, YFK+12, ZSP+19, key-delegation [JSMG18a]. ZXH16, ZY17a, AHG18, AAL19, AA14, key-disclosure [ZZC17]. AQRH+18, ATKH+17, APK+18, ABB+14, Key-Establishment [BCO13]. AKG13, AIB+16, ABW10, ABR13, AN15, Key-Extraction [GPT14]. key-hash AK14a, AYSZ14, AVAH18, BS15, BGAD12, [KKG14]. Key-Insulated BB14, BZD16, BJ16, BSW12, Bon19, [FZT13, LDZ16, LH11c, HL11, LDZ+14, BGG+13, BEB+18, BBB16b, CFL13, RG10, RWZ13, WWYZ11]. Key-Length Cha13a, CSD18, CLZ+17, CTL13, CML16, [GT12]. Key-Length-Based [PNRC17]. CLCZ10, DLK+16, DGlS12, Dur15, Key-Policy DMSD18, EBAC17, ¸ FHH10a, FA14b, FIO15, [GZZ+13, GSW+16, HSMY12, RVH+16]. FHZW18, GMRT+15, GPP+16, GLMS18, Keyed [KE19, MMS17b, YHHM18]. GMdFPLC17, GH16, GBNM11, GLM+11, Keyed-Function [MMS17b]. KEYing GSAV18, GTSS19, HPC12, HZWW17, [TW14, BCPV11, ABC+18, GJ19]. Keyless Hod19, HWB10, HWB12]. key [PDMR12, ZXW+18]. keyrings [MBB11]. [HL11, HYL+19, HLYS14, HTC17, IM14, Keys [ASN11, ABL+18, BF12, Bro17, CC10, ISC+16, IB11, IOV+18, JSK+16, JLT+12, HDWH12, LSQX19, MS16, PSM17, TW14, Jia14b, JSMG18a, KDH15, KMTG12, ZMW16, CMG+18, DMM10, HL14, IK15, KKG14, KV19, KIH19, KP18, KLW+16, LLY15, LH13, LW10, LLL+18, RWZ13]. KDW+17, LLLS13, LLP+18, LLY06, LZ11, keystream [SM11]. Keystroke LHM+10, LYW+10, LWS10, LDZ+14, [AaBT16, SP13, BGE+18, CTL12, LIK+17, LPdS10, LW13b, LZC14, LM14, GEAHR11, LTC+15a, MCRB19]. Keyword LML+13, LLG19, MNP12, MHL18, MRT10, [CWL+14, Che15, HWZP18, HCDM12, NACLR12, NCL13, Nos11, Nos14, ODK+17, HLH19, LSQL18b, WDCL18, XWSW16, OSANAM19, PY19, RR16, RG10, RWZ13, XJWW13, ZXYL16, BZD16, BL11, CLH+16, RPSL10, SES+16, SPD+10, Sar14, Sav16, DDY+19, FSGW12, GZS+18, LXK+14, SLZ12, SY15b, SZMK13, hSZZ15, SA15, OSSK16, SY15b, WHY+12, WXLY16, SLXX16, SCBL16, SGP+17, SvT10, TK19, XWY+18, XTZ+19, XLC+19, YZCT17, TCS14, TLL12, Tso13, TKHK14, VV19, YQZ+19]. Keywords [CWWL12, ZZ11]. VN17, WWYZ11, WRP70, WMU14, WDV18, KGC [YT11a]. Khudra [CWZ19]. Kiasu WDKV19, WZM12a, WZM12b, WT10a, [LSG+19]. Kiasu-BC [LSG+19]. kid WTT12, WQZ+13, WXK+17, XW12, XW13, [Tan17a]. Kind [WJ19]. King [ABJ13]. kiss XCL13, XXCY19, XYML19, XLC+19, [HU15, KYEV+18, Ros11]. KLEIN XMHD13, XHM14, YT11b, YC12, Yan14, [GNL12]. Klepto [XY18]. knapsack YZZ+14, YHHS16, YZL+18, YLL+18, YN19, [ACD18]. Knapsacks [Dun12a]. Knaves YY13, YLZ+16, ZCZQ19, ZPZ+16, ZYGT17, [CEL+19]. Knebl [Mur10]. KNEM ZYGY18, ZWQ+11, ZZ11, ZHL+11, ZCC15, [GM13b]. Knights [CEL+19]. knocking 51

[KSB+17]. Know [BC14, CAC14, XTK10]. EFGT18, HPO+15, HKR+18, LNWZ19, Knowledge [BSCTV17, CLP13a, COP+14, LPO+17, MLO17, NDR+19, PG12, GJO+13, GOS12, IW14, LYY+16, MX13, GCH+19, AAT16, LLM+19]. Lattices MBC+18, MT12, OOR+14, Pan14, TSH14, [Boy13, LYY+18a, LYX+19, Lau17, TH16, Ano11a, KPP16, LLM+19, MDHM18]. XXZ12, ZQQ15, Kre13, Tia15, XLWZ16, Known [DWWZ12, JLH12, SEHK12]. yYqWqZC13]. launch [Zet14]. LAUP Known-Key [DWWZ12, SEHK12]. Knuth [BNNH19]. Laurent [Ano15b, Ver17]. Law [Ten18]. Koblitz [BJ10b, TX16]. Kode [Bla12, SR14, Wu16, AOT13]. Layer [NN15]. Korea [LH10a, LW11a]. KP [HQY+18, LHM+15, PRGBSAC19, ZXH16, [FJHJ12, HQZH14]. KP-ABE HQY+16, LKKL13, ZHH+17]. Layered [FJHJ12, HQZH14]. Kristie [Keb15]. [Bel19, BS14, GRL12, WWL+14, JCHS16, Kryptografie [Bl¨o12]. Kryptographie Tan18, ZC12]. Layering [YYK+17]. LBlock [Buc10]. Kuala [HWG10]. Kummer [KDH13, MNP12]. LDGM [BBC+13]. Lead [HR19]. Kurtosis [YYO15]. Kyoto [Arm19]. Leader [ADH19, TKM12]. leads [TBL19]. [Ano14a]. leak [BBG+17]. Leakage [AV12, Bar16b, BKKV10, CBRZ19, CBL13, L [Low12, Xie12a, Xie12b]. LAAP [Gop19]. DCA18, DHB16, FPS12, GDLL18, HHH+13, Labs [Ven14]. Labyrinth [Fox13]. Lacks HHP17, HHS18, IL15, Kom18, LTZY16, [BDSG+13]. LACO [AMSPL19]. LAKE LSQZ17, NTKG17, NTY12, Pan14, SGH15, [BCO13]. Lanczos [FYD+19]. TTH15, Wan18a, XZY+12, YZLC12, YZ12, Lanczos-Based [FYD+19]. Land [Sch18]. YCZY12, ZYT13, ZWTM15, ZM16, ZZM17, Landis [BBB16b]. language [Ksi12]. ZYZ+19, ZYY19, ZY17a, ZY17b, ZYM18, Languages [MX13, Wat12]. LANs [FLH13]. ZYH+19, ZBPF18, ABC+18, CQX18, Lapin [HKL+12]. Laptop [GPT14]. Large DLZ16a, DMWS12, GV14a, GLL+18, [AN12, DM15, FNWL18, JLS12, JKHeY12, HYL+19, LLG19, SGP+17, YLZ+16, KCR11, KU12, LLSL19, LW16, LQD+16, ZWM14, ZCC15, ZYM19]. Leakage-Free MC11, SP13, And19, dCCSB+16, DEL19, [IL15, LSQZ17, TTH15]. EEAZ13, FXP12, GSN+16, LFZ+17, Leakage-Resilience [NTY12]. LBOX12, SR10, ZZKA17, ZVH14]. Leakage-Resilient Large-Scale [DM15, JKHeY12, LLSL19, [AV12, FPS12, HHS18, LTZY16, Pan14, LQD+16, And19, dCCSB+16, DEL19, XZY+12, ZYT13, ZZM17, ZYZ+19, ZY17a, FXP12, GSN+16, SR10, ZZKA17, ZVH14]. ZYM18, ZYH+19, ZY17b, ABC+18, CQX18, LARK [DS11]. Laser DLZ16a, GV14a, LLG19, ZYM19]. [DDR+16, FNP+15, L¨ud12]. Last leakage-tolerating [ZWM14]. Leaking [Hof15, Hof16]. Latency [BF11]. Leaks [AYS15, BCG+12b]. Latency-Optimized [CATB19, DLV16, JGP+18, Sav13a]. Leaky [AYS15]. lateral [SCY15]. Latest [Ber17]. [DLWW11]. Leap [Ano16d]. Learned Latin [AB10a]. Latincrypt [AB10a]. [KMP+11, WL11]. Learning [BNMH17, Lattice [ADM12, Ano11b, AYS15, BSJ15, Bar16b, CTC+15, CRS+18, GN16, HFW+19, EM12, EFGT18, FGM10, GCH+19, HXHP17, HGOZ19, KPC+11, KRB12, HPO+15, HKR+18, LNWZ19, LPO+17, Mor19b, Raz19, RDK19, RHLK18, SPG+19, MLO17, NDR+19, PG12, AAT16, AVAH18, Yon11, ACMP19, GJ13, GSAMCA18, Dra16, LLM+19, MGB19]. Lattice-Based KMG17, KD19, Sch12a, WS14, BCV12]. [ADM12, Ano11b, AYS15, BSJ15, EM12, learning-based [WS14]. Least [KTM19]. 52

Leave [GA19, CMG+18]. Lecture [Hel17]. ZSY19, ZLY+19, ZSH+19, AMN18, LED [IS12, JKP12, MRTV12]. Ledger AATM18, AMKC19, AKKY17, BLL+19, [Muf16]. Leeds [vDKS11]. Left [BBG+17]. BC16, BBB19, Bor10, BBB16b, CL11, DA18, Left-to-right [BBG+17]. Legacy FLL+14, GH15, GTSS19, KDH15, LLZ+16, [CS12, Smi11b, CGH17]. Legal [ZTSR12]. MCN+18, MNP12, MHV15, MHY+18, LeGall [Ara13]. Legislation [PH12b]. OSANAM19, PJ18, PSdO+13, SGJ+18, Legitimacy [IM16]. Lemonade [DFKC17]. Tan12b, TG17, WLZ+16, WCFW18, Lemons [DFKC17]. Length [AS17, GT12, WWBC14, XWZ+18, XXCY19, XHM14, Gir15, PDNH15, PNRC17, Zha12]. YCT15, ZZY+19, ZSW+18a]. Like [BW16, Length-Doubling [Zha12]. lens [PHN+12]. ERLM16, HP17, WJ19, AHG18, CGCS12, LEO [RM18]. LESPP [WLZ+16]. Less CJZ13, HLH19, KO16, LJ15, LJ16, RS14]. [TKR14, GM13a, Kam16]. Lessons Lilliput [BFMT16]. Limitations [KMP+11, TGC16, WL11, CMG+18]. Level [CK17, DR12]. Limited [DFKC17, ZZC17]. [AW17, Ano15a, BBCL19, BRPB13, Limited-Use [DFKC17]. Limits BKJP12, CCW+10, DA10, FGRQ18, Gli12, [AS16, GV14a, KS12]. Lindell [Ful10]. Line HZS+19, HS18, JWJ+17, KPC+16, KGP12, [FFL12, LKBK19, YMWS11]. Linear MV16a, XZL+19, ZLDC15, ABBD13, CJL16, [BCI+13, BW12, CGCS12, CMA14, MEFO12, RS17c, UUN13, VS11, YT11a, EKP+13, FGMP12, HK14a, LGLL12, LJ15, Bai12]. Leveled [BGV14]. leveling [LY15]. LJ16, LFW+16, WGF16, YCL17, BBEPT14, Levels [HLCL11, LRW17]. Leveraging Bul10a, DMSD18, FES10, GMOGCCC15, [DMS+16, GMDR19, HCM11, MvO11, Her10, HCCC11, LWK11, O¸¨ S11, SA14, SKGY14, ZYGY18]. Lewis [Mar10a]. XSWC10]. Linear/Linear [EKP+13]. Lexicographic [ZAC17].´ LFSR Linearly [ADD10]. Lines [HR19]. [HLC12, MRT10, WGD18]. LFSRs Linguistic [OO18, OO10, OTO18]. [QGGL13]. Liability [Bra13]. Liars linguists [Maf16]. link [Ham12, VS11]. [Sch12b]. Libertarian [Eya17]. Libgcrypt link-state [Ham12]. Linkable [YLA+13]. [DK16b, Bro17, Win17]. LiBrA [GMVV17]. Linkage [RCBK19]. linked [JCHS16]. Library linking [GSGM16, NPH+14]. Links [ACZ16,´ Bee17, BLS12, FLW12, KRH18]. [PRGBSAC19]. Linux [Fel13, HHAW19]. Licensing [EAAAA19]. Lie [HWS+19]. Life Lipreading [OS12].´ LISA [PCK19]. [MKN13, SCMS18, McK10, McK11, War11]. LISISAP [VS11]. List [AEHS15]. Lifecycle [Tan15a]. Lifetime [HSUS11]. Listening [Lan17, Sch16a]. Listless [SS17b]. Lifting [LSL12b]. Light literature [IAA+19]. live [ZZCJ14]. [JEA+15, SWF+19, PCK19, SJ19, ARH+18a]. live-wire [ZZCJ14]. Liveness Light-Weight [SWF+19]. lightning [HCYZ18, OS12].´ Lives [Acz11, McK12]. [Ran10]. Lightweight Lizard [MSS+18]. LLL [NV10]. Load [ADM19, AMSPL19, AMKA17, AARJ12, [AN12, FXP12, PRN+19, SG19a]. Loc BNNH19, BCHL19, BSS+13, BFMT16, [CDPLCA16]. Loc/ID [CDPLCA16]. Local BKL+13, BM11, CGCGPDMG12, CWP12, [pNyWyY+14, TMK11, VGA15, WYW+13, CCF17, DS11, ESS12, EKP+13, FVB+18, LMJC11, LWW+10, PTK14]. Locality FQZF18, GNL12, GAI+18, Gop19, GMVV17, [Kaw15, NCCG13]. Localization GMSV14, HZWZ18, HCETPL+12, IS12, [SRAA17, GAI+18, NC13, SCY15]. Locally IOM12, KE19, MO12, MFG16, MPM+17, [Yek10]. locating [ZYL+10]. Location PCDG14, SBS18, She14, YN19, ZWY+13, [AV18, JP19, Kim11, PSD15, PKA15, 53

RSX18, SNCK18, VKK+19, WPZM16, [ABC+17, GI12, LZZ+19a, Man13, NVM+17, WK18, CXX+19, CHX13, Har14, JK19, LEW19]. Low-Distortion [FHS13]. LWYM16, NZL+15, PC14, YXA+18]. low-end [Chi13a]. Low-Latency Location-Based [JP19, Kim11, CXX+19, [BCG+12b]. low-level [CJL16]. CHX13, LWYM16, NZL+15]. Low-Overhead [AWSS17]. Low-Power Location-dependent [PKA15]. [SAJL16, WT10b, FMC19]. low-resource Location-Privacy [PSD15]. Locations [FQZF18, MHV15, ZPZ+16]. Lower [KD12a, Alp18]. Locator [LHW18, MJS13]. [BCG19, LJ15, Raz19, Sha10, Shp03]. lp231 loci [FES10]. Lock [YTF+18]. Locking [LK14]. LPM [LD13, PJ18]. LPN [AB15, FHS13, LCW+16, LHA+16]. locus [HKL+12]. LPSNR [LP12]. LR [HPJ+19]. Lo`eve [BCPV11]. Log [YZ12, ZWM14]. LR-FEAD [ZWM14]. [YKK18, PGLL10]. Log-polar LR-UESDE [YZ12]. LSB [YKK18, PGLL10]. Logarithm [DA10, LHM13, Tan12a]. LTE [CLM+12, [BGJT14, CLL16, VM14, AMORH13, DLK+16, LLLS13, QMW17, SGC16, TM12]. BGJT13, MM13, Mes15, TPL16]. LTFs [ZYY19]. Lucas [RW12]. Lucia logarithms [BGG+19]. LogCA [DDS12, Dan12]. Lucky [AP13]. Lumpur [AW15, AW17]. Logging [HWG10]. Luo [RSD19]. LUT [HF14b]. [YNR12a, YNR12b]. Logic [Che18, Cil11, Luther [ABJ13]. LW E [BV11, XY18]. DGP10, Hel17, Nie02, RZZ+15, Ter11]. LW T [TB18]. Lyra2 [ASBdS16]. LZSS logical [CO11]. Logistic [JHW+19]. logo [CFY+10]. [BWR12b]. Loiss [DG12]. Long [Lam13, vdG17, CFVP16, VBC+15, BF12]. M [Orm16, Ver17, HvS12]. M-Identity Long-distance [Lam13]. Long-Term [HvS12]. M2M [TKG+17]. MA [vdG17, CFVP16, VBC+15]. look [AY14a]. [ACM10, TT18]. MAC [Kim15, LCLL15, look-up [AY14a]. Looks ABS+12, CJ13, GKM16, MS13a, MS13b, [ERLM16, KTA12, Sch16c]. lookup MS13c, OPS14, VN16, WCXZ17]. [LDDAM12]. lookup-table [LDDAM12]. MacGuffin [LGL+12]. Machine [AGHP14, Loop [EFGT18, JS18b, DWZ12]. Ano16d, CHS15, GN16, KD19, Sch12a, Loop-Abort [EFGT18]. losing [SLZ12]. TKG+17, ABBD13, GJ13, GSAMCA18, Loss [DK16b, JTZ+16, DMV15]. Lossless Gup15, LLZ+16, LHA+16, QMC17, RY10, [DA12, LZC+12b, GJ13, TTL10, WLH13]. TTL10, War11, WS14, TKG+17]. Lossy [BKPW12, CCL+19, CW12a, DN12, Machine-generated [AGHP14]. ASO14, CQX18]. Lost [WBA17]. love Machine-learning [KD19]. [Fag17, FHM+12]. Lovers [Keb15, Mac14]. machine-to-machine [QMC17]. Machines Low [ABC+17, AWSS17, Bai10, BCO13, [Ber16b, HB17, BBDL+17, KSU13, PWW10]. BCG+12b, CMLS15, DJL+12, FHS13, Macrakis [Keb15]. MACs [DL17]. FMC19, GST13, GI12, LJK17, LZZ+19a, MacWilliams [O¸¨ S11]. Made LBR12, Man13, NVM+17, RM18, RS17c, [Orm16, Sma16, SD18]. Magic SAJL16, WT10b, ZJ11, ABO+17, CZ14, [KO14,¨ PHN+12]. Magnetic [VDB+16]. CJL16, Chi13a, FQZF18, LGKY10, LKAT12, Magnifying [DKL+16]. mail LEW19, MHV15, NR11, SG19a, ZPZ+16]. [BTW15, Sch16b]. Main low-area [ABO+17]. Low-Bandwidth [AMH+16, LY15, ZHZ+19, CS11, HHAW19]. [GST13, NR11]. Low-Bit-Rate [LJK17]. Maintaining [WP15]. Make Low-complexity [DJL+12]. Low-Cost [Ayu12, BP06]. makes [Kem11]. Making 54

[BG14, dCCSB+16, Gel13, LA10, ZDW+16, IEE11a, Pie10, Sah13, WZM12a]. Marche Kni17]. Malaysia [HWG10]. Malicious [CCFM12]. Margaret [Led16, Sch15a]. [AAE+14, ARWK19, BL15, BL16, Mor19a, Marian [Kap13]. Market TM18, VGA15, BK12b, OSNZ19, WTT12]. [DMO+19, YWK10b]. marking [PJ18]. malleability [KTT12]. Malleable Markov [CR12, FVK17]. Marotto [SE18]. [CKLM13, DPW18, MSas12, CG14a, Marshall [Don14]. Martin FMNV14, LP11, MSas13, OOR+14, Pas13a]. [ABJ13, Hof16, McG16]. Maryline Mallory [FHM+12]. Malware [Ano15b]. Mashup [HTZR12]. [ATS15, GN16, GAF+15, JC13, OMNER19, Mashup-Providing [HTZR12]. Masked Uto13, Ano14a, Goo12, KGP+19, Yaa19]. [GZSW19, WH17]. Masking man [And13, Bat10, Kap13, Moo14]. [HF14b, PYM+13, USH19]. Mass Management [BPR14a, BPR14b]. Masses [ASM12, ABB19a, BD15, Bar16a, BS13b, [Ano15c, BCHC19]. massive [FLYL16a]. CCFM12, CSL+14, GOPB12, Gla11, KP12, Master [Dew11, LYX+19, Mar10a]. KKA14, Lop15b, MKF+16, MJW+18, Matching [Lin15, RCBK19, Tan12a, DA18, MKK17, MHMSGH16, PN10, RC18, LHM13, MR14c, MHT+13, PPTT15, SS17a, TMGP13, Vle12, YZDZ19, YZX+12, YSS14, SM10c, YZL+18]. MathCW [Bee17]. ZJ11, ZTSR12, BMBS10, BSBG19, BBB16b, Mathematical CFL13, Cha13c, dCCSM+12, dCCSB+16, [Bee17, FGPGP14, Ham17, HPS08, IBM13a, Din10, KH18, MLMSMG12, MGP10, Mei10, Sch15a, Wes16, KM14, OO10, Sta11c]. PLCGS11, Sch11, SK18, SR10, SA15, Mathematical-Function [Bee17]. SWW+16, SCBL16, THA+13, WSC14, Mathematician [Ano17e]. WDV18, WDKV19, WWW17, WQZ+13, Mathematicians [Acz11]. Mathematics YZL+18, YLS12, ZMM+10, Ano15b]. [Ano17b, Ayu12, BP06, Led16, Nie02, Sch15a, Manager [KKA15, Kim16]. Managing Ter11, CM13, Kra12, PHWM10, Wes16]. [Lal14, MD15, BC18]. MANET [KTUI16]. MATLAB [TRD11]. Matrices MANETs [Yan14, ZYGY18]. Manhattan [AMVZ12,´ BNA15, AKG13, FES10]. Matrix [SS10c]. manipulation [OF12]. Mansour [BFMT16, IAD10, KKK+18a, LYY+18b, [DKS12, LPS12]. Manual [Sac14]. Manuale SK12a, TDTD13, Ye10, Cha13b, LLM+19, [Sac14]. Manuscript [Ano16e]. Many TK14]. matrix-vector [LLM+19]. Matter [CCL+19, LB13, HRS13, ZQWZ10]. [Rau15, SS12a, DKA+14]. Maturity Many-Core [LB13]. many-to-one [ABPP16]. Max [And13]. Maximizing [ZQWZ10]. Map [WK18, XYXYX11, Bro19, [DBPS12]. Maxims [Kob10]. Maxwell CJL16, ISC+16, LZY+16, LWK+18, [LGP19]. May MZL+19, PC14, SE18, ZT14]. map-based [BL10, FBM12, Gil10, IEE15, Sen10]. maze [LWK+18, MZL+19]. Maple [G´13]. [LLC10]. mbedTLS [YGS+17]. MC Mapping [HIDFGPC15]. MC-2D [HIDFGPC15]. [CBL13, LHW18, MS17, JS18a, MM14a]. McEliece [DN12, GV14b, MBR15, MT12, Mappings [MC11, CDPLCA16]. MG15, OTD10, SWM+10, VOG15, Zaj19]. mapreduce [DMD18, LJLC12]. Maps Mclaughlin [GL19]. McOE [FFL12]. [Ye14, BAAS13, BSBG19, KCS+18, MDPC [GAB19, HC17, VOG15]. Me KLW+16, LWW+19, LW10]. maps-based [Wil11, XHH12]. Mean [SZHY19, TTL10]. [LWW+19]. March Meaningful [LTC+15b, SA16a]. Means [Ano10a, Cra12, DDS12, Dan12, Dun12b, [KRDH13, AMHJ10, Kam16, LG10, Pal16, 55

SG19a]. Measure [DDD14]. [McK10, McK11, McK12, MPJ+16]. Measure-independent [DDD14]. mercurial [CSZ+11]. Merkle measurement [QLZ19, VGN14]. [CCC19, XWZ+18]. Mesh [BOB13, LLY+18, Measurements [DTE17]. Measuring YI14, CG12b, HGWY11, HCCC11, LNNH13, [MMF15, DMWS12]. Mechanical WLDB11, XHCH14, YHHS16, ZZCJ14]. [RSCX18, Mat19]. Mechanism Meshes [SGS14]. Meshram [PLPW13]. [ABB19a, KG19, KD12b, LL15, LLY+18, Message [ABS+12, AEP18, AK14a, Lin15, PKTK12, Saa12a, SMOP15, ZHS+19, DKPW12, HLLC11, Jia17, KHHH14, BBTC20, CL11, FXP12, KKJ+16, MCRB19, PSS+13, PPS12b, PA10, RWLL14, BCDN17, NXS10, PLPW13, PSJ+13, WB12, YXA+16, BCND19, CJXX19, CMMS17, EEAZ13, ZWM14]. Mechanisms [CBO+18, CCC19, Jia16, LC17, LWK+19, YMM13, YJC18]. GPR+19, JWNS19, JSK+17, SGG18, Message-Based [PPS12b]. Messages FHH10a, KSA16, MMZ12, PLGMCdF18]. [CCDD19, CCDD20, Gen13, YLL+12, Media [KBL11, Fri10a, vdWEG18]. BMM12, BTW15, KPS10, LCM+17, MSL13, Mediated [Fra16, YHK+10]. Medical SA15]. Messaging [BFK+10, Wu17]. messy [BDM+19, KBL11, UUN11, AIA+18a, [BBDL+17]. Meta [SKE+18]. AM19, AMK12, KCS+18, KSA16, AMKC19, Meta-Heuristics [SKE+18]. Metadata KLC+10]. Medicine [MA17b, LWK+18]. [Gla11]. Metaheuristic [HCETPL+12]. MEDiSN [KLC+10]. Meet Metamorphic [ATS15]. metaphors [LJ17, LJ18, LYD+18, LSG+19, LWKP12, [Mat19]. metering LWPF12, LWKP14, vV16]. Meet-in-the [HRK+19, JLC18, WMYR16]. Meters [LYD+18]. Meet-in-the-Middle [DM15]. Method [LJ17, LJ18, LSG+19, LWKP12, LWPF12, [AGW15, Ara13, BBB+16a, CZ19, FLH13, LWKP14, vV16]. meeting [Hof16, JK19]. GLLSN12, GMNS15, HXHP17, HHS+15, Meets [RBHP15, BSR+14, MZA+13, KTM19, LyWlZZ12, LP12, LD13, LBR12, PYH+18, SM13]. Mega [WYL18]. MU12, OWHS12, PS14, PWS+19b, QF19, Members [YWZ+12]. Membership SAA15, SY15a, SXH+19, SP15a, SZDL14, [FHR14]. MemGuard [CZ14]. MemJam USH19, WZXL12, WZCC18, WJ19, XNG+14, [MWES19]. Memorial [Ano11c]. XNRG15, YYO15, AGLW16, AIA+18a, Memoriam [Gre11]. Memories [AWSS17, ARG19, BLL+19, CSS+13, DJ19, Dra16, BDGH15, JSA17, RM18, SM18, YNQ15]. FVK17, JS18a, JDV16, Khl18, KHHH14, Memory LLC10, LH11a, LT13, LT14b, LPZJ15, MO14, [AN17, ABSSS19, ASBdS16, Arm19, PWW10, SI12, WT13, YWT+12, ZYGT17]. AMH+16, BKKV10, DLZ16a, DHLAW10, Methodology [CBL13, Uto13, ZZKA17]. GKM16, GM13a, GPR+19, Gue16, HT13, Methods HF14b, Int19, KMJ18, LGLK17, LY15, [BCEO19, BCEO20, BKBK14, Kob10, LW12, MZLS18, PAF18, RC18, Raz19, SB18, GMT+12, GSGM16, IAA+19, KSB+17, TLCF16, WAK+19, XZL+19, ZHZ+19, KVvE18, OO10, TMK11, TPKT12]. Metric BDK16, BAB+13, CZ14, CS11, CVG+13, [YGFL15, DMWS12]. Metrics HHAW19, VCK+12, ZWT13, vV16]. [CVM14, PGLCX17, SSP19, BC18]. Mexico memory-hard [BDK16]. Memory-less [AB10a]. Meyer [Bur11, Joh15]. MIBS [GM13a]. memoryless [BJ16]. Memristor [CWZ19]. Micali [Gol19]. [MCS+15, WDG19]. Memristor-Based Microarchitectural [MSI18]. [MCS+15]. MEMS [SNCK18]. men Microarchitecture [ZBPF18]. 56

Microcontroller [GL12]. ZLDD12, Aia15, AAZ+16, ALL+18, Microcontrollers [LPO+17]. Microcosmic CLP+13b, CTL12, CCSW11, CWXW16, [WWC+11]. Micropayment [RM19]. CTL13, CRS13, uHAN+18, FHH10a, FA14b, microphones [GSAV18]. Microprocessors FHZW18, FHM+10, GM16a, GH16, [SK12b]. Microsoft [Loe15]. Mid HZWW17, HZWZ18, HL14, IAA+19, IB11, [AUMT16, KTM+18]. Mid-Air Kem11, KKA14, KKM+13, KKM+14, [AUMT16, KTM+18]. Middle KKG14, KSB+17, KS19, LH11a, LZD+19, [LJ17, LJ18, LYD+18, LSG+19, LWKP12, LH13, MHL18, ODK+17, OYHSB14, Par12b, LWPF12, LWKP14, vV16]. Middlebox SSSA18, SLL+19, SSNS15, hSZZ15, SM19b, [FGRQ18, FGR+17]. Middlebox-Based SCR19b, SSAF11, SKB+17, SHBC19, [FGRQ18]. Midway [Car11]. Might TZTC16, TKHK14, WSC14, WT10a, [Hur16]. Migration [SHS12]. MIKEY YHHM18, YNX+16, ZLDD14, ZDW+16, [TW14]. Military [HK14b]. Miller ZC12, ACMP19, MBF+13, SLL10]. [Ano16a, Sch15a, LL11, LT14a, Led16, LR15]. mobile-cloud [KKM+13]. mobiles million [Sch16a]. Millionaire [GKS17]. [GCSAddP11].´ Mobility MILP [CWZ19]. MILP-based [CWZ19]. [CLH13, LNK+18a, CL11, GH16, LH11b, MIMETIC [ACMP19]. Mind MYYR13, THA+13, YLS12, ZX11]. Modal [SNG+17, WP15]. mines [KO16]. MinHash [HFS+19, BOP14, GBC19, SCFB15]. [HWZP18]. MinHash-Based [HWZP18]. Modality [SSP19]. Mode Miniature [HWS+19]. Minimal [HZ11, Mar10c, PAF18, gWpNyY+14, [ARH+18b, BDH11, MZ17a, SBM15]. WLC12, ZHZ+19, Fay16]. Model Minimalism [DKS12]. Minimally [AW15, AW17, App13, BBCL19, Bul18, [AARJ12]. Minimization [AH19]. CT18, CLP13a, CBJX19, Fyo19, GLG12, Minimizing [BCD+12]. Minimum GJO+13, GJJ15, GJZ17, GGK18, GRRZ18, [KHPP16, DZS+12]. Mining HZX15, IA15, JHW+19, Kar12, KP17, [BH15, BJL12, CZ19, DK16a, HDWH12, LYX+19, LK18, LDZ16, LHM+15, LZC+12b, WZCC18, ZW15, Ano11a, ZMYB17]. Minus MVVR12, PYM+15, PNRC17, RSD19, [NXB13]. miracles [MR14c]. Mirror SZS14, SPM+13, TBCB15, WWC+11, [Ano10b]. Misbehaving [TAKS10, ATK11]. WWHL12, XZY+12, Yon12, ZYY19, ZHL15, Misson [Ano10a]. Mistakes [DHB16]. BSBG19, BL11, CK11, CWXW16, misuse [EBFK13]. Mitigate CDPLCA16, DFJ+17, HKT11, HTC17, [BKJP12, SS15]. Mitigating KSU13, KS19, LZT12, LCY+16, LL16b, [EPAG16, HRS16, SNG+17]. Mitigation MGP10, Mas17, MM13, NDSA17, NB13, [BRS17, DHT+19, LGR14, DJL+12]. RR16, SERF12, SK18, WYL13, WZM12a, miTLS [BFK16]. MitM [TY16b]. mix WZM12b, YC12, YLL+18, ZCL+19, TCL15]. [WGJT10]. mix-networks [WGJT10]. Model-based [IA15]. Model-Predictive Mixed [ST16]. ML [Ksi12]. mMTC [TBCB15]. Modeling [CML+18]. MNC [IM16]. Mo [RBS+17]. [BL16, CJFH14, GBNM11, LTKP16, Mobile [ATC17, BCD+12, CBJY16, FD11, MKN13, PAS13b, RSX18, ZMYB17, Ana14, GPT12, GdM16, HvS12, HFS+19, HLKL15, CDGC12, MHY+18]. Modelling KP12, KKA15, LH12, LBC18, May15, [BDB14, BL15, ACF16, Eng15, Ksi12]. NRZQ15, PH16, RSX18, Sch15b, SFE10, Models [BSA+19, CRS+18, KMSM15, She14, SS15, SAA12b, WPZM16, WT10b, OS16, VN16, ABR15, GZHD12, ZCZ+19]. XHH12, XNKG15, XHC+12, YHL16, Yon11, Modern 57

[AG18, Fri12, Ful10, OMNER19, RAZS15, YYK+17, ZC13, ZQQ15, ZWY+19, ZLDC15, She17, KL08, KL15, KAS15, Gre19a]. AVAH18, BOP14, BGG+13, CPPT18, Modes [GLLSN12, PC16, FAA+18, SKK10]. CLP+13b, CFVP16, CJXX19, CG12b, MODI [MBF+13]. Modification CLHJ13, CW14a, CZ15b, DDY+19, DRN16, [LLSW16]. modified DFJ+17, DGL19, FHZW18, GMOGCCC15, [CTHP13, EEAZ13, MM14b]. Modular GPVCdBRO12, GZS+18, GBC19, HL14, [Abe12, DDE+19, EZW18, GL19, LNL+19, HL11, HCCC11, HLC12, ISC+16, JCHS16, Bro19, VN17]. modulation [KPB17]. KM11, KLW+17, LXMW12, LXK+14, Moduli [APPVP15, GL19]. Modulus LZWZ19, LCT+14, LH13, LWY12, Mas17, [CNT12, LyWlZZ12, SEY14, KFL+10]. MML16, QMC17, SCFB15, SLL+19, SCY15, Moment SWW+16, SSS11, TLL12, WDZL13, [PTK14, GJ13, TPKT12, yWpNyL11]. WSQ+16, WXK+17, XLWZ16, XHM14, Moment-based [PTK14, TPKT12]. YCC16, YQZ+19, YN19, YY13, ZZKA17]. Moments [HD19, WLDB11]. Monaco multi-agent [GPVCdBRO12]. [Gil10]. Money [RBS+17]. Monitoring multi-authenticated [HL11]. [BCE+10, ASO14, APK+18, KO16]. Multi-Authority Monitors [IF16]. monopolizable [ZQQ15, ZWY+19, SLL+19]. [DJL+12]. Monte [CR12, FVK17, GQH17]. Multi-Biometric Montr´eal [JY14]. Morphing [MBC15]. [NGAuHQ16, YYK+17, MLBL12]. Morphology [IA15]. MorphoSys [MD12a]. Multi-bit [TWZ+12]. multi-channel Morris [Gre11]. MORUS [YWM19]. most [CPPT18]. Multi-ciphertext [KTT12]. [Ald11, ESRI14, GIJ+12]. Motion multi-cloud [CFVP16, SWW+16]. [GZH17, JHHN12, LFH18, AP10, SYW17]. multi-cloud-server [KLW+17]. multi-core Motions [HWZZ19]. Mouse [AVAH18]. multi-criteria [ZZKA17]. [ZPW16, HT11]. mouse-based [HT11]. multi-crypto-processor [BGG+13]. Movement [ERLM16, GB19, ZPW16]. multi-dimensional [LZWZ19]. Movements [SRRM18]. Mozilla [Loe15]. Multi-Directional [JS18a]. MP3 [YWYZ12, YQH12]. MPC Multi-Domain [SAM+18, IG11, QMC17]. [GGHR14, RSMA19]. MPEG [YYO15]. multi-exponentiation [WSQ+16]. MPEG-4 [YYO15]. MPI [GM13b]. MPSS Multi-Factor [SLL10]. MRAM [PSSK19, HC12, CLP+13b, DRN16]. [DSB16, PAF18, VDB+16]. MRAM-Based Multi-fault [BEM16]. multi-flow [LWY12]. [VDB+16]. MrCrypt [TLMM13]. MSP430 multi-gateway [WXK+17]. [KSH18a, KSH18b]. MSP430X multi-generation [CJXX19]. multi-hop [GL12, Seo18]. MST 1tn3 [SvT10]. Much [LCT+14]. Multi-instance [BRT12]. [DL15]. Muhammad [ABJ13]. Multi Multi-Keyword [ABL+18, ASS15, BEM16, BBEPT14, [CWL+14, XWSW16, OSSK16, DDY+19, BRT12, CWL+14, Chi12, DLGT19, GVW12, GZS+18, LXK+14, YQZ+19]. multi-lateral GJZ17, HYS11, HC12, HFS+19, HRS16, [SCY15]. multi-layered [JCHS16]. IG11, JS18a, KTT12, KMO14, LyWSZ10, Multi-Level [ZLDC15, MEFO12]. MZHY15, MEFO12, MLBL12, NGAuHQ16, Multi-linear [BBEPT14]. Multi-Modal OKG+12, OSSK16, PSSK19, SK12b, SOR16, [HFS+19, BOP14, GBC19, SCFB15]. SAM+18, TWZ+12, TYM+17, TFS19, Multi-Party [ABL+18, KMO14, TYM+17, Wan14, WOLP15, XWSW16, YWW10, Ye14, GVW12, LyWSZ10, DGL19, XLWZ16]. 58

Multi-Pixel [YWW10]. Multi-precision LWZG10, LTC+15a, LZC17, MN14, PZL+19, [SK12b]. multi-privileged [WDZL13]. RWZ13, TKHK14, YQZ+19, YJC18]. Multi-Proxy [ASS15, GJZ17]. Multiple-Layered [WWL+14]. multi-purpose [KM11]. Multi-Receiver Multiple-Parameter [NDC+13]. [TFS19, Wan14, Chi12]. Multi-sawtooth Multiple-Precision [HZSL05, MN14]. [Ye14]. Multi-scale [DLGT19, CG12b]. Multiple-Secret [SC10]. Multiplication multi-scroll [GMOGCCC15]. [ARM15a, AK14b, CMO+16, GL19, HVL17, Multi-Secret LNL+19, NR15, SK12b, YTS12, AAT16, [HYS11, ZC13, CW14a, HCCC11, HLC12]. DGK18, Khl18, SKH15, SF12]. Multi-Segment [WOLP15]. multi-server Multiplicative [RMERM19, KHHH14]. [CLHJ13, FHZW18, HL14, ISC+16, multiplicity [LH14]. Multipliers LXMW12, LH13, SSS11, TLL12, XHM14, [ARM15b, GT19]. Multireceiver [FHH10b]. YN19, YY13]. Multi-Signature [ASS15]. multisecret [FGMP12]. multiserver multi-stage [Mas17]. Multi-target [CNF+18]. Multiset [Faa19, MSTA17]. [HRS16]. multi-use [CZ15b]. Multi-User Multispectral [DCM18]. Multistream [MZHY15, SOR16, OKG+12, MML16]. [WXL+17]. Multithreaded [TLZ+17]. multibit [KPS10]. Multicast Multitone [GL10]. Multivariate [CLND19, [CC14, PSM+18, BAL10, DMM10, DP17, ST16, YT16, YL17, YDH+15]. HGWY11, LTT10, NACLR12]. Multicore multiview [WSS+19]. multiwatermarking [RJV+18, SHC+16]. Multicoupon [WL12]. multiwavelet [PWW10]. Munich [HIDFGPC15]. multidesignated [AYSZ14]. [Wat10]. Music [NTKG17, Wes16]. musical Multidevice [DPCM16]. Multidimension [Ana14]. Mutt [Ran14]. Mutual [AJA16]. Multidimensional [CJP12, GI12, GM14, Kim16, RZ19, SBS+12, [Her10, WWBC14, HMCK12, JLC18]. WT10b, AATM18, BDM18, BDL+19, CJP15, Multifactor [MMY12, KS19]. Cho14, CL11, FHH10a, Far14, GPLZ13, Multigigabit [PP10b]. multihop [ADF12]. GH16, HDPC13, IB11, JNUH17, JKAU19, Multikey [LATV17]. Multilayer KIH19, KP18, KLW+16, LIK+17, LHH+18, [NXH+17]. Multilevel MMP19, SPLHCB14, TG17, XXCY19, [FMS12b, HF14a, NSA15, SERF12]. XMHD13]. MVP [CD12]. mvSERS multilinear [CJL16]. Multimedia [HLKL15]. My [GPT14, CMG+18]. Myself [BCG10, NSA15, PMZ13, PZPS15, PYM+15, [ASV+18, Wil11]. WLY+15, ZW15, Zha15b, ZSA12, GJJ18, HM10, HWYW14, HPL+19, LLLK10, N [Ver17]. Naccache [ACD18]. NAF Wan13, XWZW16, TW14]. Multimodal [TX16]. Na¨ıve [ZLW+17]. Name [GM16a, Sar18a, ACMP19, AHM+18, [FP19, YCM+13]. Name-Based [FP19]. ATI+10, MHT+13]. MultiObjective Named [LLZ+17]. Names [ZAC17].´ Multipartite [HR13]. [ABJ13, MPJ+16]. Narayanan [Ano16a]. Multiparty [BDOZ11, CCL+13, Fri10b, National [Fid18, ABJ13]. Natural ADMM16, BHH19, LDDAM12]. Multipath [MC19, ZCWS15]. nature [KL13]. Naval [LH12, OPHC16]. Multiple [Don14]. navigation [JS18a]. Navy [Maf16]. [DSB15, Dun12a, FR16, HWZP18, HZSL05, Nazis [Hea15]. NDSS [Ano10a]. Near KBL11, LTC+15b, LQD+16, Ma17a, [Alz19]. Nearest NDC+13, SY14, SC10, SKS+18, Sta12, [XLP+18, LVRY10, XMY+17, ZZL+19]. WWL+14, XNP+18, GJJ18, GZS+18, nearest-neighbor [LVRY10]. nearly 59

[PHGR16]. necessary [TD14]. NECPPA TCN+17, WXL+17, WLY+15, WZCH19, [PZBF18]. Need [LNG19, BMDT19, Pec17]. XHC+12, XHZ+19, YM16, YHSW19, ZC13, needs [And19, Sch12b]. neglect [YY17a]. ZW15, Zha15b, ZLDD12, ZSA12, Aia15, neglected [Joh15]. Negligible [DF11]. AQRH+18, ASO14, APK+18, AIB+16, negotiation [MMP19]. Neighbor AIKC18, ADF12, BDK11, BNNH19, BBB19, [KA18, LVRY10, ZZL+19]. Neighborhood BLAN+16, BBB16b, CDGC12, CLM+12, [DA10, WXSH19]. Neighboring CML+18, CLSW12, CL11, DSCS12, DK12, [LSQ11b, LC15]. Neighbors [XLP+18]. DLN13, EEAZ13, FA14b, FMA+18, GLL16, neighbour [XMY+17]. Neil [Pea11]. GH16, HKA+18, HGWY11, HZC+14, NeMHIP [THA+13]. Nemo [KD18]. HZWW17, HCCC11, HCM11, HTC+10, NEON [SD18, ZMM+10]. nested HYF18, JNUH17, JLT+12, JMW+16, [FHH10a]. Net [LHF12]. Nets [PS14]. KMG17, KM10b, KLC+10, KO16, KLW+16, Nets-based [PS14]. Network KDW+17, LLLS13, LC17, LMJC11, LNNH13, [AA19, Ano10a, Bis17, CWL16, CJ13, LXJ14, LIK+17, LNK+18b, LZZ19b]. CLH13, DRS16, FGRQ18, Hay13, HDWH12, networks [MSM+18b, NXS10, OPHC16, HS18, Kim15, KCC17, LH12, LCLL15, LY16, OSANAM19, PY19, QMW17, RR17, RPG12, LTW11, MJGS12, NNAM10, NRZQ15, SPD+10, SGGCR+16, SA12, SGJ+18, SGC16, She14, TLW12, VV18, VKPI17, SZMK13, hSZZ15, SKK10, TODQ18, VFV17a, VFV17b, VGA15, VKC15, WP15, TKHK14, WGJT10, Wan13, WW14, WCXZ17, WYL18, YZLC12, YSJL14, WMC17, WXSH19, WDV18, WXK+17, AKM+11, AL15, Ang16, Ano11a, AZF+12, XW13, XWDN12, XHCH14, XMHD13, CJXX19, CWXW16, CL11, DLK+16, YHHS16, YWY+19, YN19, ZYGT17, FPBG14, FZZ+12, HZW19, HW19, HL19, ZWQ+11, ZBR11, ZCLL14, ZTZ16, HWG10, HB13, HKB14, JZS+10, KLN15, ZLDD14, ZHH+17, ZX11, LNK+18a]. KP18, LH11b, LKKL13, MZA+13, MJS13, Neural [CSH+18, RSX18, SKS+18, NDNR13, OF11, PL16, RCW15, Ser12, YZLC12, EEAZ13, HZW19, HW19, KMG17]. SCKH10, SKS+18, Sta11b, Tan15b, THA+13, Neuroscience [BSR+14, JW14]. WYL13, WS14, YLS12, ZOSZ17, Ste15b]. Neutrality [Kha10]. Neutrality-Based Network-Assisted [KCC17]. [Kha10]. Neutrosophic [JS18b]. Nevada network-based [YLS12]. Network-Coded [IEE10]. never [Bai12]. Newcache [She14]. Network-on-Chip [Bis17]. [LWML16]. Newly [ABJ13]. Newman Networking [And13]. News [And19, Edw14, Edw17, [CKHP19, FVB+18, FP19, KYEV+18, Lam13, Sav13a, Sav15, Sav16]. Next LCK11, LLZ+17, ZHL15, Kim11, LCM+17]. [HEP+11, MR14a, MJGS12, Aia15, ACD+15]. Networks [ABCL17, ABC+17, BN14, Next-Generation [MR14a]. NFC BPSD17, BCG10, BFMT16, CS14, CSH+18, [LY14, Mic16]. NFSR [WGD18]. DLGT19, DS11, DF16, FMS12b, GMVV17, Niederreiter [HC17, MVVR12]. HZC+12, HBCC13, HK14b, JWNS19, Nievergelt [Ter11]. Nine [Mac12, LYHH14]. KHN+11, KH10, LLC11, LL15, LHM+15, NIST [MMKP16, ZSH+19]. NIZK [Pas13a]. LZCK14, LWCJ14, LLZ+12, MKK17, NIZKCTF [MBC+18]. NIZKs [CKLM13]. MPM+17, NSA15, NYR+14, OO12, NLM [OPS14]. NN [ZZC17, ZHT16]. No OKG+12, PYM+15, PSM+18, PCPK14, [WDDW12, Wu16, KHHH14, MPJ+16]. RWLL14, RSX18, SWYP12, She14, SP15b, ’nobody [Sto12]. Node SS15, Smi11b, SLI11, SZZT18, SAM+18, [AA19, ARWK19, NYR+14, OKG+12, 60

GM13b, LC17, PX13, SAAB10]. [KOS16, GOS12, MBC+18]. Nonlinear Node-Capture [NYR+14]. Nodes [CCM+15, KW14, LW13a, L¨ud12]. [VGA15, ZYL+10]. Noise Nonlinearity [MM17b]. Nonlinearly [ASN11, Fyo19, LKBK19, YMA17, BCND19, [Fyo19]. Nonvolatile [ZHZ+19]. Norm QLZ19, ZHH+17]. Noised [JLS12]. Noisy [FHS13]. Normal [RMERM19, TY16a]. [ASN12, HZW+14]. Non Normalization [KLY+12, SJ12]. [AH19, AS17, AMH+16, BBCL19, BCI+13, Normalized [YGFL15]. Norman [Low12]. CG14a, CPS16, DJL+12, DPW18, EKP+13, Note FHKP17, FMNV14, GL19, GZXA19, [HYS11, Gal13, GR19b, Hwa11, Lim11]. HWS+19, HKB14, JSA17, KTT12, LK18, nothing [Cer15]. Notifications [LBC18]. LLG15, MFH13, MSas12, OOR+14, Pas13a, Notions [KFOS12, SNJ11, Sar12, BP11]. QJC+18, RM18, RMG18, Svo14, SM18, Novel WgMW12, XZL+19, YNQ15, YKKL12, [CLHC12, DCM18, KRDH13, LYY+18a, ZLDD12, AY14a, AM19, BS15, CS11, LYX+19, LLG15, LyWlZZ12, LH11c, ESRI14, GIJ+12, Kre13, Lan11, LJY16, MJGS12, MCS+15, SSKL16, SWM+10, LP11, MSas13, SES+16, SXL16, VBC+15, SC12, VN16, WHZ12, WZXL12, YZX+12, XSWC10, Yan14, Khl18]. Non- [AH19]. YLSZ19, Ye14, ZZM17, BOB13, BSBG19, Non-abelian [HWS+19]. non-adjacent BBB19, CH10, DDFR13, GPLZ13, HZW19, [Kre13, Khl18]. non-associative [BS15]. HCCC11, JXLZ15, LXCM11, LMJC11, Non-Black-Box [CPS16]. Non-blind LH13, LWW+10, LML+13, MRT10, NZL+15, [HKB14, RMG18]. Non-Boolean [AS17]. PZBF18, SAM+19b, SCR19b, SYW17, non-browser [GIJ+12]. non-compliant Sun16, TG17, jT12b, WYL13, WXMZ19, [Lan11]. Non-contextual [Svo14]. WGZ+12, YWT+12, ZYGT17, ZBR11]. Non-Coprime [GL19]. November [Kap11, LCK11, Yan11]. NSA non-cryptographic [AY14a, ESRI14]. [ABJ13, Ano13d, AHS13, Bud16, Men13b, non-dynamic [SES+16]. Non-interactive Sta13, Tox14]. NSDG [SSPC12]. NTOW [BCI+13, LK18, Pas13a, LJY16, Yan14]. [BS15]. NTRU [AA19, CJL16, vV16]. Non-interference [BBCL19]. NTRUEncrypt [DWZ18, KY10]. Non-intrusive [MFH13]. non-iterative NTRUSign [Wan10]. NTT [MCDB12]. [SXL16]. Non-Linear [EKP+13, XSWC10]. NTT-Based [MCDB12]. Nuclear [Hel17]. Non-Linear/Linear [EKP+13]. Number [ADI11, BKLS12, CDK+10, Non-malleability [KTT12]. DSLB18, DDE+19, Fok12, Ham17, KA18, Non-Malleable [DPW18, MSas12, CG14a, LTKP16, LCLW17, MFG16, NIS12, FMNV14, OOR+14, Pas13a, LP11, MSas13]. NNAM10, Sha10, Shp03, SRAA17, SRK+17, non-medical [AM19]. Non-monopolizable SRK+18, WJ19, CFY+10, CP13, LLP+18, [DJL+12]. Non-perfect [FHKP17]. LGKY10, Lim11, MS12a, MRT10, SH11, Non-Repudiation [LLG15, VBC+15]. Sti11, XSWC10, Gre19b]. Numbering Non-stationary [ZLDD12]. Non-tamper [MNS11]. Numbers [BCGH11, CK18, [WgMW12]. Non-transferable [GZXA19]. FM15, MC19, Shp10, AZH11, Ana14, Non-uniform [QJC+18]. Non-uniformly GCH15, SMDS11, SAM+19b, ZOC10]. [YKKL12]. Non-Volatile [AMH+16, JSA17, numeral [GKCK11]. Numerical [CML16]. RM18, SM18, XZL+19, YNQ15, CS11]. Numerology [GG11]. NV [XZL+19]. Nonce [KMZS19]. Nonce-Based NV-eCryptfs [XZL+19]. NVMM [CS11]. [KMZS19]. NonInteractive 61

O [CDD13]. Obfuscated LML+13, Nor17, RK11, Rus15, SM10a, [LMS16, OWHS12, ZM16]. Obfuscating SPK17, SCBL16, TCS14, ZQWZ10]. [BGI+10, BGI+12]. Obfuscation One-Dimensional [XYXYX11]. [ABCL17, AS16, AWSS17, BBC+14, One-Round [TYM+17, XZLW15, Yon12, BCKP17, BV18, BCP14b, BR14, CZ15b, XW12, JK19, TCS14]. One-Sided [HP14]. DRS16, EMW14, FKOV15, GGHR14, One-Time GGH+16a, GGHW17, MH14, ZL19, [NA10a, DCAT12, Par18, BM15, FHH10a, BBGT12, CFVP16, GGH+16b, OSSK16]. GPLZ13, LW10, LW13b, LML+13, SPK17]. Obfuscation-Based [ABCL17]. One-Time- [FD11]. One-Way Obfuscator [FDY+19]. Obfuscators [BHT18, CBJX19, CPS16, DSMM14, Mat14, [PSD15]. ObfusMem [AWSS17]. Object WCXZ17, HRV10, Kom18, LP11, RK11, [BCK17, SSSA18]. Objects [LLY+18, SCBL16]. Onion [KZG10]. Online ZCWS15, Bel18b, HST14, SMBA10, WW13]. [BPSD17, HL19, JMG+16, KSD+17, PSM17, Oblivious [DN12, WCL+18, CGH11, SKGY14, SZZT18, WXY+17, WZCH19, GLM+19, RYF+13]. Obscure [GLM+19]. ZHL15, AQRH+18, CCG10, DJ19, HYF18, Obscuring [VGL14]. obscurity [Edw14]. KVvE18, LKAT12, LJW+17, MSM+18b, observation [WHY+12]. Observations SKS+18, SYW17, XTZ+19]. Online/Offline [CJZ13, HCL+14]. Obtaining [BB10]. [JMG+16, LKAT12, XTZ+19]. Only Occasion [Nac12]. Ocean [FG19]. October [BB10, YNR12b, YLW13, Bul10a, KMTG12, [CGB+10, IEE10, IEE11b]. octonions KA17, Sar11]. Open [SS19, ABF+14, [BS15]. Odd [Faa19, GJMP15]. Oded MHV15, Pow14, Win17, ZWQ+11]. [Lin17]. ODIN [ABCL17]. odyssey [Car11]. open-source [ABF+14, Pow14]. OpenCL OFDM [CLZ+17]. Off [ABDP15]. Opening [GPT14, GHS14, YMWS11]. Off-Line [GDCC16, LZC12a, LLH18, LZC14]. [YMWS11]. Off-Path [GHS14]. offering Openings [SP13]. openness [Bia12]. [Par12b]. Offers [Pau10]. Office [Mor12]. OpenPGP [MBB11]. OpenStack officers [Maf16]. Official [K¨up15]. Offline [CSL+14]. Operable [BCF16]. Operand [Ano15a, GAS+16, JMG+16, LJW+17, [MSI18]. Operating LKAT12, RSM15, XTZ+19, ZZC17]. [KMP+11, CDA14, MNNW15]. Operation Offline/online [LJW+17]. Offloading [GLLSN12, JB11, SBS18, ALL+18, Fay16, [JHCC14]. Offs Lin14a, SKK10, WGZ+12]. Operational [ASBdS16, BS14, GPR+19, SR10]. offsets [CRE+12, CM11, RZ19]. Operations [YQH12]. Okamoto [TFS19]. Old [Cil11, SEY14, SZHY19, YWW10, KKJ+16, [Che17, FREP17, GY13]. On-Chip LZY+16]. operative [HFCR13]. [LGLK17, BAB+13]. On-cloud [EAAAA19]. Opportunistic [AA19]. Opportunities On-demand [KKJ+16]. On-Line [FFL12]. [Lau17, Mic10b]. opportunity [Sch11]. On-siteDriverID [SGGCR+16]. Optical [PRGBSAC19]. Optimal On-the-fly [PS14]. One [AS17, CK17, DSSDW14, DSSDW17, GJJ18, [BHT18, CBJX19, CMRH17, CPS16, GM16b, HRB13, PDNH15, PPS12b, DSMM14, DCAT12, FD11, HP14, HG12, QJC+18, TX16, WMU14, Cha13a, CXWT19, Mat14, NA10a, Par18, PC16, TYM+17, DDD14, MCL+19, PPTT15, SVY19]. WCXZ17, XW12, XYXYX11, XZLW15, Optimality [MM17a, SDM+12]. Optimally Yon12, BM15, FHH10a, GPLZ13, HRV10, [DSMM14, GT12]. Optimally-Fair JK19, Kom18, LP11, LW10, LW13b, [DSMM14]. Optimised [CMO+16]. 62

Optimising [EVP10]. Optimistic XMY+17]. outwitted [Car11, Fag17]. [WSA15, SEXY18]. Optimization Over-the-Air [VOGB18, ZXW+18]. [AEP18, KD19, WH17, ZAC17,´ FLZ+12, Overcoming [BKKV10, DY13]. Overhead GCSAddP11,´ KHF10, PTK14, RYF+13, [AWSS17, Bai10, CCW+10, GHS12, RM18, ZSMS18, sCR19a]. Optimizations [ZAG19]. ZJ11, CXWT19, RS17c]. Overheads Optimized [TSB18]. Overlay [CHS15, MJS13]. [ARH+18a, AYS15, EKB+16, GAB19, Oversight [Bla16]. overview HGT15, LNL+19, MBF+13, MBR15, JS18a]. [AA14, BDP+12]. own Optimizing [DWZ18, ZSMS18]. Optimum [Kum10, NA14, Zha15a]. owner [ZZC17]. [Oba11, YFF12]. Optional [PC16]. owners [GZS+18, YQZ+19]. Ownership OR-Proof [FSX12c]. Oracle [AMSPL19, FMTR12, RR11, HWYW14, [CBJX19, GLM+16, HKT11]. Oracles KH18]. Oxford [Che11, Wes16]. Ozarow [FZT14, FSX12a, GSW+16, XLQ09, XQL11, [ADG16]. YS12, YKC+11, YLA+13, ZYM18, LLY15, RG10, SYL13, WWYY11, YFK+12]. P [GT19, ZSH+19]. P-256 [ZSH+19]. P2P ORAM [RM18]. Order [dCCSM+12]. P3 [HK18]. PACE [HKK19]. [DCA18, FYD+19, KS12, LFX+18, Package [DB16]. Packet LWKP12, PRC12, YKKL12, ZDL12, [FGR+17, FGRQ18, JTZ+16, VKPI17, ZSW+12, ZBPF18, AKY13, BKR19, LW13a, XHC+12, AASSAA18, MV16b, PJ18, PX13, LCY+16, LWKP14, gWpNyY+14, YL11]. XWDN12]. Packet-Level [FGRQ18]. Order-Hiding [DCA18]. Packets [Bis17]. Pads [NA10a, BM15]. Order-Preserving [KS12, YKKL12, YL11]. paGAN [NSX+18]. Paging [TSB18]. order-revealing [BKR19]. ordered Paillier [Gal13, SZHY19]. Paillier-based [AAL19]. organisational [Smi15a]. [Gal13]. Pair [Lin15, SLXX16]. Pairing Organization [RSGG15]. Orientated [Bon12, CMRH17, CWWL12, CST+17, [TJZF12]. Oriented KZG10, KHPP16, LKBK19, LSQL18a, [NNAM10, Rog16, RSGG15, WW12, LGPRH14, Men13a, MST18, WZCH19, NML19, SK18, WZM12a, WZM12b]. YTS12, YY17b, ZM18, BP18, Con12, FK19, Origins [SJZG19]. Orthogonal KSH18a, KSH18b, LL16a, LR15, [FYD+19, tWmC12, XNP+18]. Oscillator MSGCDPSS18, YT11b, ZY17b]. [YKBS10]. OSN [BCF16, BBDP16]. OSNs Pairing-Based [Bon12, CMRH17, CST+17, [SZZT18, PZPS15]. other [BDK16, Smi15b]. KZG10, LGPRH14, Men13a, MST18, YTS12, OTS [H¨ul13]. outliers [Sch12b]. Outlive Con12, KSH18a, KSH18b, MSGCDPSS18]. [Hur16]. Output [DK16b, GST12, NIS15, Pairing-Free [LSQL18a, WZCH19, YY17b, NR12, Uto13, PBCC14]. Outputs ZM18, LL16a, YT11b]. pairing-friendly [SNCK18]. Outright [ABJ13]. outsource [BP18, FK19]. Pairings [XTZ+19]. Outsourceable [QZZ18]. [ASS15, Hof15, IL15, LT14a, HWB10, Outsourced [FRS+16, LLC+15, LHL+18, HWB12, QYWX16, RS15, UK18]. pairs LQD+16, PD14, RDZ+16, XLP+18, YMA17, [MCP15]. Pairwise [DL12, YM16]. Palash YMC+17, DFJ+10, FS18, HKA19, HMCK12, [Kat13]. Palm [IEE11b]. palmprint LCL+15, LCY+16, LJW+17, QZDJ16, [LZ11, QLZ19, SC19b]. Pan [GOPB12]. YSQM19, ZML17, ZSW+18b]. Outsourcing Pan-European [GOPB12]. Panacea [DR12, LJLC12, LHL+14, LLSL19, LJWY18, [Hor19]. Paper OSNZ19, LWW+19, SKB+17, SWW+16, [TSH17, Ano16i, SK14, YFK+12]. Papers 63

[Ano16b, Ano16c, Ano16j, CWZL13, LW13a, [LG10]. Password XW13, DDS12, Dan12, MV12, BYL10, JY14, [ASBdS16, BRT12, CLY14, DM15, DGMT19, LH10a, vDKS11]. Paradigm FVS17, FD11, GAS+16, HKK19, HCL+14, [ABGR13, BSV12, Mau12, MP12, TAP19, LLD19, Lop15a, Lop15b, RS11, SD12, Shi11, Gop19, KKM11, WQZ+13]. Parallel WgMW12, YLW13, YRT+16, ZXH16, [AAH+19, App14, ARM15b, BBM15, ABK13, AIKC18, BDK16, CTL12, DSCS12, BTK15, CGB+10, GP17, HW19, LY16, Eng15, FA14a, FIO15, FHV16, GPLZ13, LB13, MCDB12, MC11, NdMMW16, NR15, HCC10, IOV+18, KMTG12, LWS10, SMDS11, YE12, ZGL+18b, CSTR16, LNKL13, LZZ19b, MM12, MvO11, MZL+19, FLYL16a, FLYL16b, MRT10, RG10, RWZ13, MCRB19, Par18, SVY19, Tso13, TKHK14, WWYZ11]. parallelism [SD17]. WZM12a, WZM12b, YC12, ZXWA18]. Parameter [NDC+13, MZ15]. Password-Authenticated parameterized [GR19b]. Parameters [HCL+14, YRT+16, ZXH16, LWS10, [HRB13, MBF18, LZKX19]. parametric WZM12a, WZM12b]. Password-Based [Bul10a]. Paranoia [Cor14a]. Parity [BRT12, CLY14, FVS17, WgMW12, [Raz19]. Park [Ano11c, Bri11, Cop06, DGMT19, DSCS12, FA14a, FIO15, IOV+18, Cop10a, Cop10b, GMT+12, GW14, McK10, TKHK14]. Password-Only McK11, McK12, Pea11, Sim10, Smi11a, [YLW13, KMTG12]. [BHvOS15, Smi15b, Smi15a, Bai12]. Parsing LCL17b, BCV12, Che13, GPLZ13]. Past [MHW+19]. Part [Bon12]. Patching [BCFK15]. Patchwork [BLM18, VM14, BD15, Bar16a, BBCL19]. [NXH+17, XNG+14]. Patchwork-Based Partial [NXH+17, XNG+14]. Path [DMS+16, [CBJX19, DLV16, GFBF12, HFW+19, LG12, GHS14, NLLJ12, ZW15, Ham12, RYF+13]. SGS14, TK19, WDDW12, Bax14, EBAC17]. ¸ Patient [ZLDC15, ZVG16]. Partial-Shape [HFW+19]. Partially Patient-Centric [ZVG16]. Pattern [KB10, XZP+19]. participants [DCA18, PSSK19, YTF+18, ATKH+17, [KSU13, WTT12]. participating [CH10]. DA18, uHAN+18, KPS10, OSSK16, PPTT15]. Participation [Abb12]. particle [ZSMS18]. Pattern-Based [PSSK19]. Patterns Parties [YCR16, K¨up13]. Partitioned [Ano16f, BPSD17, TSH17, WOLP15, [FVS17]. Partitioning BDK11, BCGS16, LHM13, NML19, SPK17]. [ADR18, DMD18, SHC+16, AP11]. PAWN [JNUH17]. Pay partitioning-based [SHC+16]. partitions [EAAAA19, CCSW11]. Pay-per-use [CFG+17]. Party [EAAAA19]. pay-TV [CCSW11]. Payload [ABL+18, Ash14, BBKL19, HL10b, HP14, [CHHW12, AZH11, JNUH17, JKAU19]. JR13, KOS16, KMO14, NSMS14, OSH16, payload-based [JNUH17, JKAU19]. QZL+16b, TYM+17, ZM16, DGL19, ED19, Payment [DG15, SYC+17, SYW17]. FIO15, GVW12, HPC12, HWB10, HWB12, Payments [RBHP15, MPJ+16]. PC [YE12]. LyWSZ10, LML+13, OSANAM19, Tso13, PC-Based [YE12]. PCIe [IBM13b]. PCM TKHK14, XLWZ16, XCL13, YC12, YZZ+14, [LY15]. PCM-based [LY15]. PCPs ZZC15, GHKL11]. Pascal [LGP19]. Passau [MX13]. PCs [GPT14, GPP+16]. PDF [GLIC10]. PASSERINE [Saa12a]. Passion [Con17]. PDGC [CGB+10]. PEA [Hof15]. Passive [DHB16, GSC17, HQY+18, [ZGL+18b]. Peaks [TC10]. pearl [Rus15]. SB17, BM13, uHAN+18, LWLW11, MK12a]. Pecherskii [Kuz11]. PEDCKS [XLC+19]. Passport [HKK19, LZJX10]. Passports peer [LLY06, NCCG13, ZWY+13]. 64 peer-to-peer [NCCG13, ZWY+13]. PEKS Phase-change [ZWT13]. [ZQD16]. People [S¨od13]. Per-File Phase-Encrypted [NBZP17]. philosophy [DMS+16]. Per-session [DGMT19]. [Mat19]. phishing [HAK19]. Phone Perceived [CSW12]. perceptions [Mur16, SAA12b, KRM+10, LTC+15a]. [GMMJ11]. Perceptual [DCM18, MK11]. photo [CLY18, OF12]. PEREA [ATK11]. Perfect [Pas13a, Sch13, photo-to-caricature [CLY18]. CZ15a, FHKP17, LLC10, Lew10, XW12]. Photographic [YSC+15]. Photographs perfectly [ADG16]. Performance [TCMLN19]. Photorealistic [MHW+19]. [Alo12, AW15, AW17, AB15, ABPP16, photos [Pow14]. Phrases [WBC+10]. BM18, CRS+18, CGL+12, CCG10, DHT+19, Physical [BEB+18, CK17, GPT14, GPP+16, DLK+16, DGFH18, DBPS12, EGG+12, HQY+18, HHH+13, PRGBSAC19, SMOP15, ESRI14, FPBG14, GLG12, GPR+19, GHD19, HQY+16, HZWZ18, KSA16, GCS+13, HKL+14, KHRG19, KAK18, QMC17, VCK+12, WW13, YD17, ZHH+17]. LCK11, LGP19, LPO+17, MHC12, SKV12, Physical-Layer SSP19, TPKT12, WRP70, WDDW12, Xio12, [HQY+18, HQY+16, ZHH+17]. physicist YWF18, ZLDD12, vRDHSP17, ABDP15, [Dya19]. physio [HT11]. AHG18, BGE+18, CLB19, FHLD19, physio-behavioral [HT11]. Pi FLYL16a, GCVR17, HURU11, JLC18, [MR10, EHKSS19]. Pi-Calculus [MR10]. MCL+19, MMS+17a, MS13c, PABC´ +19, PICADOR [BGP+17]. PICARO [PRC12]. ZLDD14]. performances [CBL10]. Piccolo [IS12, Jeo13]. picture [SM13]. Performed [Ano17d]. Perils [FMA+19]. piecewise [GMOGCCC15]. PIN perimeter [Cal13]. periodic [KPS10]. [MDAB10, NSBM17]. Pinch [DGP10]. periodical [CLSW12]. Permission [VN16]. PinMe [MDMJ17]. Pinning [AV18]. Permutation Pinocchio [PHGR16]. pioneer [Men13b]. [LJ16, NIS15, Bar19, GMSW14, LK14]. Pioneers [Orm16]. Pipeline [PPG19]. Permutation-Based [NIS15, LK14]. Pipeline-integrity [PPG19]. Pipelineable Permutations [ARH+18b, ARH+18a, [BDMLN16]. Pipelined BKLS12, Faa19, Mat14]. Persistent [GT19, HZ11, KB10, NdMMW16]. Pipher [CSYY18, SXH+19, TYK+12, ALL+18, [Mei10]. pitfall [ZHL+11]. Pixel KV19, PKA15]. person [PN10]. [DA10, LLL17a, LyWlZZ12, Lin15, person-centric [PN10]. Personal LTC+15b, SSA13, YWW10, LHM13]. [ESS15, LYZ+13, Rao17, RSD19, ALL+18, Pixel-Value [YWW10]. Pixel-Wise BC18, MvO11, SVY19, WHZ+19, LHL15]. [SSA13]. Pixels [PDMR12, Tan12a]. PKC Personalized [FRS+16, VGA19, AT10]. [FBM12, Ma17a]. PKC-Based [Ma17a]. Personnel [YTH17]. Perspective PKCS#11 [CFL13]. PKDS [ADH19, KMY18, MSM18a, RSGG15, Sir16, [HLCL11, HLYS14]. PKE [HTC+15]. Wag16, Bon19, JW14, Suc12, ZWT13]. PKE-AET [HTC+15]. PKI Perspectives [PMG+19b, Sen17, SPM+13]. [Dav11, JLX+19, YI17, YCR16]. PKIs Perturbation [XZZ18]. Pervasive [KGO10]. PKZIP [JLH12]. Plagiarism [ACAT+15, BCG+12b, FHM+10, YD17, [TLZ+17]. plain [LW13b]. Plaintext JSM+18, PKA15, SCY15, Tan12b, [BM15, JLH12, MSas12, MSas13]. YWK+10a]. Petri [PS14]. PGP [RAZS15]. Plaintexts [YKKL12]. plan [SJ19]. Plane Pharmaceutical [YSF+18]. Phase [GGK18, YLL+12]. Planning [LLY+18]. [KMJ18, LD13, NBZP17, ZWT13, ZHH+17]. Plantlet [MSS17]. Platform [MBC+18, 65

YE12, YK16, ABF+14, NCCG13, Nor17]. possibility [BGI+10, BGI+12]. Possible Platforms [HTZR12, LMS16, SOG15, [BF12, Fra15, Orm16]. Post GBC19, LT14b, vdWEG18]. Plausibility [KG19, LLK18, MKAA17, NDR+19, SD18, [KD12b]. Play [But17, Shp10, VGN14]. Y+17, ZCC15, YDH+15, Sen10, Yan11]. Player [GJO+13]. Pless [Ayu12]. plugged Post-challenge [ZCC15]. Post-Quantum [PP11]. plus [WXMZ19]. PN [XNP+18]. [LLK18, MKAA17, NDR+19, SD18, Y+17, POB [SRAA17]. Podolsky [HR13]. Point YDH+15, Sen10, Yan11]. postcamera [AK14b, EZW18, MH14, ZC13, ZM16, [Lin14a]. Postfix [HEK18]. Postquantum AKM+15, Khl18]. Point-To-Point [ZC13]. [Ano16b, Ano16c, BLM17a, BLM17b, Point/Polynomial [ZM16]. Pointers BLM18, Lau17, MGG+19, YZCT17]. Posts [Lop12, PYM+13]. Points [AIF+19]. posture [SHBC19]. Potential [SC12, Chm10, Lim11]. Poisoning [Cil11, VS16, ZW15]. Power [HLAZ15, YCM+13]. PokeEMU [YM18]. [ARP12, AS16, CS10, CKHP19, HHR11, Polar [YWNW15, PGLL10, YKK18]. LKBK19, MMP14, MD12b, MAS16, MS17, Polarities [XNP+18]. policies SAJL16, SDM+12, TQL+14, WT10b, [Cra11, CFG+17, DFJ+10, LHM14]. Policy YAM+15, ZH15, ZJ11, And19, FAA+18, [CHH+19, FVJ19, GZZ+13, GSW+16, FMC19, LGKY10, LKAT12, MMF15, HSMY12, MK12b, PV17, RVH+16, Rao17, QGGL13, RITF+11, SJ19]. Power-Positive SVG16, XMLC13, XWLJ16, ZHW15, [CKHP19]. POWER7 [BAB+13]. Powered FSGW11, FS18, HZL18, HKHK13, [SFE10]. PowerEN [HKL+14]. Powerful JSMG18a, JSMG18b, LFWS15, LJWY18, [IF16]. pp [Joh10, Sch15a, CGCS12]. PP-1 LDZW19, QRW+18, TY16a, WZC16, [CGCS12]. PPA [LZD+19]. PPFM [MS17]. XWS17, XZP+19, LAL+15, LHL15]. PPM [XHC+12]. PQCrypto Policy-Carrying [PV17]. policy-hidden [Sen10, Yan11]. Practical [XZP+19]. Polish [Kap11]. pollution [AB17, ATK11, AG18, BHH+15, BSA+19, [NDNR13, OF11]. Poly [AS17]. Poly-Size BDH11, CLSW12, CGH17, Cra11, DZY10, [AS17]. Polylog [GHS12]. Polynomial EA12, FPS12, FLYL16a, FSK10, GDLL18, [Ano11b, BGJT14, DWZ18, DDE+19, HSA14, HPO+15, HKR+18, LW16, LJWY18, ERRMG15, FS15, HVL17, NKWF14, MBF18, OPS14, PPTT15, PDJ+19, RWZ13, WSSO12, ZM16, AAT16, BGJT13, Bul10a, TSH17, WHLH16, XW13, YZLC12, ZYD10, GR19b, Bul10a]. Polynomial-Advantage ZLW+17, AMS+10, BS13a, CFN+14, Con17, [WSSO12]. Polynomials [CMLRHS13, JSK+16, LFZ+17, PHGR16, WR15, YJC18, GM16b, SS12b, TWZ11, DGK18, LPdS10]. YKGK13, ZSW+18a]. practicality Pont [Kap11]. Popular [Wal18]. [NDNR13, Zha15a]. Practice [ABD+15, Population [Gla11]. port BNMH17, CDFZ16, FBM12, PWVT12, [AZH11, KSB+17]. port-knocking Rog16, RBHP15, RST15a, RST15b, SN10, [KSB+17]. Portability [CHS15, ABDP15]. SAKM16, ABD+19, NS10, Sta11b]. Portable [Bee17, LA10]. Portals [CLB19]. Practice-Oriented [Rog16]. practices Portfolio [KD19]. posed [Lan10]. Position [Tay19]. Practitioners [PP10a]. Pre [BCF+14, CGMO14, MS17, SOR16, [ARM15a, TX16, YWL+17, YHHS16]. VJH+18, YXA+18]. Position-Based Pre-Computation [ARM15a, TX16]. [BCF+14, CGMO14]. Positioning [HK18]. pre-distribution [YHHS16]. Pre-image Positive [CKHP19]. Possession [YWL+17]. Preaveraging [GWM16]. [EKB+16, YJSL18, ZPXX17, SYY+17]. precaution [AQRH+18]. Precise 66

[MC19, HYF18]. Precision WS12]. Prevention [CWL16, VS11]. price [EZW18, HZSL05, MN14, SK12b]. [Ano13b]. Primality [Cou12b]. PRIME Precomputation [GKM16, Bon19]. [ACK+10, GM13a]. Primes [Gre19b]. Predicate [KHPP16, LNWZ19, NMS14, Primitive [App15, MCS+15]. Primitives YKNS12, ZYT13, FH13, HFT16]. [BSJ15, CK17, EAA12, HLN+10, SP15b, Predictability [DK16b]. prediction ABDP15, BSR+14, Gor10, WSL+19]. [CSS+13]. Predictive [TBCB15]. [BCG+12b]. Princeton Predictors [EPAG16]. Predistribution [Ano17b]. Principal [BKLS18]. Principle [YM16]. Preface [Ano19c, YYW19]. [KYEV+18, WW14]. Principles [DK02, Prefetch [FDY+19]. Prefetch-Obfuscator DK07, DK15, FSK10, KL08, Fri10a, Sta11b]. [FDY+19]. Preimage [Li10]. Preseeding print [KPS10, PKS18]. print-cam [PKS18]. [Ran16]. Presence [BDPS12]. Present print-scan [KPS10]. Printer [Bon12, LJ16, WH17]. PRESENT-like [EMW14, FNP+15]. Prior [NA10a]. [LJ16]. Preservation Priority [LMS16, Bia12]. Prisoners [BCP14a, LLG15, VSV15, YJSL18, Yon11, [Mac14, GSGM16, Keb15]. PriSTE FZZ+12, LVRY10, TMLS12]. preserve [CXX+19]. Privacy [AKM+11, AKKY17, [BAG12]. preserved [SWW+17]. ABCL17, Ano19a, ABR13, ALL+18, ACM12, Preserving ABHC+16, BN14, BCF16, BA18, BJL16, [ABCL17, BJL16, BHKN13, BJL12, BLV17, BS13b, BJL12, CVM14, CWL+14, CWL+14, CRE+12, EKOS19, GZZ+13, CDFS10, DCA19, DTE17, ESS15, EKOS19, HSMY12, HLLC11, HXC+11, HHMK14, FGR+17, Fei19, Fri13, GZZ+13, HSMY12, HK18, KKK+18a, KLK+19, KS12, LMGC17, HBCC13, HXHP17, HXC+11, HK18, IEE15, LNXY15, LSY+16, LQD+16, MHW+19, JN12, JLX+19, JP19, KM10b, KKK+18a, MJS+19, Mor19b, MTM18, NSMS14, KLK+19, KCC17, Kni17, KS12, KH18, OFMR16, PR12, PD14, PSS+13, PPRT12, LMGC17, LSBN14, LLG15, LCDP15, Pet12, RVH+16, RSR+19, RHLK18, LNXY15, LSY+16, LQD+16, MYYR13, RBHP15, SZDL14, SZQ+17, SZZT18, MJS+19, MV18, Mor19b, MTM18, NSMS14, VFFHF19, WPZM16, WZCC18, YKKL12, PD14, PSS+13, PPRT12, PZPS15, PSD15, ZDL12, ZHW+16, ZM16, ZHW15, ZLDC15, Pet12, PH16, RVH+16, RSR+19, RCP+18, ZTL15, AKM+11, AKKY17, APMCR13, RWLL14, Roh19, RHLK18, RBHP15, SS17a, AIB+16, ALL+18, BC16, BBDP16, BLV17, SG12, Set16, SZDL14, SZZT18, SOF12, CCMB19, DZC16, FH13, FMA+18, GH15, TMLS12, TMGP13, VKK+19, VFFHF19, GH16, GAI+18, GA11, HSH11, HLS18, WPZM16, WMC17, WZCC18, WMYR16, HKA19, IC17, IOV+18, JKL+16, JLC18, YJSL18, YYK+17, YMM13, Yon11, YY17a, JLX+19, KH18, LHL+18, LZD+19, LSQ15, ZHW+16, ZM16, ZOSZ17, ZXL19, ZHW15, LW13a, LCDP15, LCY+16, LLG19, MGB19, ZLDC15, ZHL15, ZTL15, vdG17, ARL13, OSP+19, PZBF18, QLZ19, RR16, SYY+17, APMCR13, AIA+18b, ACK+10, BGE+18]. SMS+16, Tan12b, TSH14, WLZ+16, WZC16, privacy [BC16, BBDP16, BP11, BAG12, WMC17, Wan18b, YYK+19, YMM13, CD16a, CXX+19, CCMB19, CDF+10, YNX+16, YL11, ZWY+13, ZOSZ17]. Press DZC16, DZS+12, FH13, FMA+18, FZZ+12, [Ano15b, Ano17b]. Press/Elsevier GAI+18, HSH11, HKA19, HRK+19, [Ano15b]. Prevent HPL+19, IC17, IOV+18, JKL+16, JLC18, [HLAZ15, PYM+13, JSK+16]. Preventing Kam16, KKGK10, KM14, LYW+10, [DCAT12, HAK19, MT17, CAM19, SKEG14, LWYM16, LHL+18, LZD+19, LSQ15, 67

MZA+13, MGP10, MGB19, NJB19, OSP+19, [BFG+14, Rao10, WP17, KSU13]. PX13, PZBF18, QLZ19, RR16, Sav16, Sch11, Probabilistically [IW14]. Probability SSNS15, SLZ12, SYY+17, SCY15, SWW+17, [DF11, HLC16]. Probability-based SMS+16, Tan12b, WLZ+16, WZC16, [HLC16]. probable [Sav13b]. Probably Wan18b, WWW17, WS13, YYS+16, [MMS17b]. probe [Edw14]. Problem YXA+18, YYK+19, YQOL17, YNX+16, [CLL16, GR19a, GKS17, HWS+19, Hor19, ZWY+13, ZDHZ18, ZZY+19]. LLGJ16, NA10b, TKM12, Bar19, Mes15, Privacy-assured [WMYR16]. MR14c, Pec17, RH10, VM14]. Problems Privacy-Aware [AH19, Dun12a, Fra15, GTT11, KRDH13, [BCF16, ARL13, MGP10, ZDHZ18]. KPC+11, Lal14, RBS+17, CJL16, SK14, Privacy-Based [BS13b]. TPL16, WS14]. Procedure [CS14, OS12].´ Privacy-Enhanced Proceedings [LCK11, TT18, Wat10, [DTE17, ACK+10, YQOL17]. ACM10, ACM11, Abe10, BC11, CGB+10, Privacy-Friendly [KCC17, ACM12]. Che11, Cra12, Dun12b, FBM12, Gil10, Privacy-Preservation [LLG15]. GG10, HWG10, IEE10, IEE11b, IEE13, privacy-preserved [SWW+17]. LW11a, LTW11, Pie10, PJ12, Rab10, Sen10, Privacy-Preserving Yan10, Yan11, AB10a, BL10, GLIC10, [ABCL17, BJL16, BJL12, CWL+14, IEE11a, Kia11, Lin14b, Sah13]. process EKOS19, GZZ+13, HSMY12, KKK+18a, [CWZL13]. Processing [JGP+18, SAKM16, LMGC17, LNXY15, LSY+16, LQD+16, SZHY19, TKMZ13, VKPI17, BKV13, MJS+19, Mor19b, MTM18, NSMS14, PD14, HWK+15, MS13b, PRZB12, WS14]. PPRT12, Pet12, RVH+16, RSR+19, Processor [BH15, CLF+17, HKL+14, LB13, RHLK18, RBHP15, SZDL14, SZZT18, MBR15, RJV+18, YT16, YS15, ABDP15, VFFHF19, WPZM16, WZCC18, ZHW+16, BAB+13, BGG+13, KSH18b, SSPL+13, ZM16, ZHW15, ZLDC15, ZTL15, AKM+11, Tar10, KSH18a]. Processors AKKY17, ALL+18, JLX+19, KH18, [GFBF12, Gue16, SJLK18, RYF+13]. LCDP15, WMC17, ZOSZ17, APMCR13, PrODACT [FDY+19]. producer [CHL19]. BC16, BBDP16, BLV17, CCMB19, DZC16, Product [ADM12, CCM+15, OT12, FMA+18, GAI+18, HSH11, HKA19, JLC18, YKNS12, And19, Cha13b, DDM17, YI17]. LHL+18, LZD+19, LSQ15, MGB19, PZBF18, productivity [Tay19]. Products QLZ19, RR16, SYY+17, SMS+16, Tan12b, [LMG+18, RS10]. Professional WZC16, Wan18b, YYK+19, ZWY+13]. [HGOZ19, STC11]. Profiled [Bar16b]. Privacy-Protecting [Roh19, CD16a]. Profiles [BCF16]. Profiling [DP12]. Profit Privacy-supporting [ABR13]. Private [APPVP15]. Program [BBKL19, BKLS18, GM13a, Jia14a, [MZ17b, TLZ+17, Wal18, CLZ+17, DMD18, LSQX19, MV19, QZL+16b, RCBK19, GGH+16b, MFH13]. Programmability RDK19, Sia12, WCL+18, Yek10, ZMW16, [HP18]. Programmable ZXYL16, BHH19, DDL15, HJM+11, HYF18, [ABPP16, CLF+17, Ang16, EAB+19]. IK15, WR15, vV16]. Private-Key [MV19]. Programming [Bee17, BCEM15, LLSL19, private-keys [IK15]. Privilege SY14, ASVE13, GLMS18, HLV10]. [Cha13c, QRW+18]. Privileged Programs [BGI+10, BGI+12, CL16]. [Din10, WDZL13]. Prize [Ten18]. PRNG Progress [AB10a, BL10, BC11, GG10]. [DK16b]. Proactive [SLL10, WMYR16]. Progressive [SA16a]. Prohibition [Hor19]. Proactively [OPHC16]. Probabilistic Project [SPG+19, Ano14c, Rom11, 68

ACK+10, SS10c, Wil18]. Project-Based TYK+12, WT10b, XJR+17, YS12, YWF18, [SPG+19]. projective [CZ15a]. Prominent YLSZ19, YWZ+12, ZXZ+11, ZSY19, [ABJ13]. Promise [Pau10, PWVT12]. AATM18, AMKC19, AQRH+18, AKG13, promised [HS11]. Proof [BDSG+13, Bla12, AIB+16, AIKC18, AN15, BDM18, BGAD12, CZLC12a, CZLC14, FSX12c, GKG19, Kuz11, CSD18, CCSW11, CCMB19, CJP15, LYY+18a, LYX+19, LW12, LYY+16, NLY15, DLK+16, DDL15, EA12, EBAC17, ¸ FA14b, SR14, Ste15a, ZZM17, HLS18, Mon13, FIO15, GMSW14, GH15, Gop19, GLM+11, PPTT15, VBC+15, WHJ17, ZCZQ19]. HPC12, HWB12, HL14, IC17, IOV+18, JK19, Proof-of-Concept [GKG19]. JKL+16, JXLZ15, Kim11, KO16, LLLS13, Proof-of-Knowledge [LYY+16]. Proofs LDDAM12, LKKL13, LWS10, LXMW12, [BBD19, BGK12, BCGK12, BGB12, BCI+13, LZD+19, LEW19, LY14, LML+13, NCL13, BDSG+13, CZLC12b, DKL+19, IW14, NLYZ12, NML19, OHJ10, Par12b, SSSA18, LNZ+13, Mau12, NTY12, RB17, Sav13b, SPLHCB14, SB17, SGJ+18, SWW+16, WPZM16, AGHP14, KPP16, KKK+16, Li10]. SSS11, SSPL+13, TG17, THA+13, Tso13]. Propagate [GWM16]. Propagation protocol [TKHK14, VS11, WMC17, [SKS+18, WWC+11, YZLC12, CWXW16]. WYZ+17, Wan18b, WCFW18, WDZ19, Properties [CCK12, CCCK16, DQFL12, WDV18, WZM12a, WZM12b, WLS14, FY11, HIJ+19, JS18b, JR13, KU12, Sch12c, WMYR16, WT10a, WTT12, WCCH18, CLCZ10, SAM+19b, WT13]. Property XCL13, XHM14, YC12, YZZ+14, YYK+19, [HIJ+19, HEC+12, PR12, Rja12, YWM19, YMM13, YN19, ZWQ+11, ZTZ16, ZYC+17, Bar19]. Proportions [Ber12]. Propose ZXW+18, ZXWA18, ZG10, ZZC15, ZX11, [BFMT16]. proposed [Bax14, HWB10]. BOB13, CJP12, LFGCGCRP14, Ste15b]. Protect [CTC+15, CKHP19, YMC+17, Protocols BVIB12, CDF+10, dCCSM+12]. Protected [ADH19, AP13, ABHC+16, BMP12, [BDGH15, SG15, AGBR19]. Protecting BSBB19, CCK12, CCCK16, CMRH17, [BCP14a, GSFT16, LLPY19, Mar10b, CCF17, CZCD18, CCD15, CCDD19, RCP+18, Roh19, SCY15, Wat14b, ATKH+17, CCDD20, Con10, CM11, EFGT18, Fra15, CD16a, CXX+19, CDA14, FLYL16b]. GRL12, GM11, GLR10, HLLC11, HL10b, Protection [AIM+19, BCHC19, CDD13, KL08, KOS16, LY16, LWL+17, MV19, MS16, DCA19, EAAAA19, GST12, GPR+19, MT12, Mur16, NYR+14, NSMS14, PS14, HXHP17, JP19, Lop12, NGAuHQ16, RB17, SBS+12, SBS18, Sch12c, SOF12, NDG+17, RR11, SEY14, SJ12, ZWWW17, TM12, Xio12, YRT+16, Aia15, Ano13d, AIA+18b, ATI+10, HLYS14, HPL+19, AKS19, ACC+13, ACM12, BJ10a, BKR19, KKM+13, Ksi12, LZ11, LWYM16, LVRY10, CML+18, CR10, CLCZ10, DGJN14, RS17c, TLL13, YWT+12, ZZY+19]. FTV+10, GBNM11, GLR13, HSH11, HLS18, protection-key [HLYS14]. Protocol Ham12, HDPC13, HZWW17, HST14, [ADSH18, BL12, BC14, BCM+15, BNNH19, HWB10, KJN+16, KSU13, Ksi12, KKK+16, BSSV12, BFK16, BBKL19, CC14, CCM17, LDC13, LLY06, LKKL13, MN10, NR11, DCA19, FLH13, FHLOJRH18, FMTR12, Nos11, Nos14, SD10, WMU14, YSL+10]. Fra16, GI12, HvS12, HC12, HL10a, Prototype [Bar16b]. Prototyping HCPLSB12, HCETPL+12, HKL+12, JTZ+16, [KPC+16]. Provable JHW+19, KMZS19, KMO14, LNZ+13, [BKLS12, CC14, EKB+16, Rog16, YJSL18, LCCJ13, LNXY15, LYY+16, MBC15, MR10, YMSH10, YYW19, ZX11, ZPXX17, FA14a, PSS+13, SBS+12, SGC16, SS15, TWNC18, HRS13, LHH11, SYWX19, WB12, XCL13]. 69

Provably [BCGAPM12, BCM12, BCM13, Che15, CLND19, CNT12, Cou12b, EKOS19, BCGS16, BHJP14, FHH10a, GLL+18, IL15, FBM12, GKS17, HEP+11, HWS+19, LH11b, LDZ+14, LL16b, ODK+17, PSM17, HTC+15, HLH19, IM14, JLT+12, JWNS19, RMZW19, WMS+12, XLQ09, XJWW13, KFOS12, LYX+19, LLSW16, LG10, LPdS10, YC12, YZZ+14, ZG10, ABBD13, FIO15, LSQL18b, LZC14, LCDP15, LLH18, KCS+18, KLW+17, LZD+19, LWK+19, MZHY15, MMP14, MTY11, Mat14, MPRS12, SM10c, SXL16, XWXC14]. Muf16, NTY12, Orm16, PDNH15, RSBGN12, provably-secure [LZD+19]. prove RVS +18, RW12, RBHP15, SGG18, Saa12a, [DGJN14]. Proven [BWS19]. provenance Sch19a, SK12b, Seo18, SWM+10, Sia12, SC12, [CDL18, HK17, JKA+18, ZOSZ17]. Provide SLY+16, SGP+17, SvT10, TMC15, TT12, [Ano15a]. Provided [KS12]. Providence WP17, WZ15, WWHL12, Wil18, WSQ+16, [Sch15a]. provider [DFJ+17]. providers XNKG15, XXZ12, Xio12, XJWW13, YL17, [AKK+17, BK12b, YWK10b]. Providing YKC+11, YFK+12, YMC+17, ZCZQ19, [DLN13, Gol19, HTZR12, KS18a, KS18b, ZY17a, AA14, ATKH+17, AK14a, AVAH18, MLM16]. Proving [Sar14, AGH+17]. BS15, BZD16, BSW12, CFG+17, Dur15, Proximity [IW14, ARL13, Alp18]. HZWW17, Hod19, HL14, HYL+19, HTC17, proximity-based [ARL13]. Proxy LSBN14, LLY15, LFWS15, LH13, LL16a, [ASS15, DHT+19, GSW+16, GJJ15, GJZ17, LLG19, RPSL10, SES+16, SY15b, SLXX16, GZXA19, HGWY11, HZX15, KP12, LK18, VN17, XWK+17, XLC+19, YT11b, YYS+16, LSLW15, LAL+15, LSC12, MLO17, MBC15, YN19, ZZ11, ZCC15]. public NAL17, Pet12, PRSV17, SYL13, WY10, [ZCL+19, ZY17b, FBM12]. Public-Coin WYML16, XJW+16, YMWS11, YCM+13, [CLP13a, Mat14]. Public-Key BGP+17, CLH+16, FSGW11, FSGW12, [BVS+13, BKKV10, GKS17, KFOS12, GH12, HWDL16, HYF18, KKM+14, LLH18, MMP14, MPRS12, NTY12, Orm16, LCT+14, LFWS15, LL16a, LL16b, QMW17, PDNH15, RSBGN12, RW12, SK12b, Seo18, SLZ12, SKB+17, Tia15, WHY+12, Wan18a, SWM+10, Sia12, XNKG15, XJWW13, WXMZ19, WLS14, XWXC14, YZCT17, YKC+11, YFK+12, ZY17a, ABW10, IM14, ZLY10, ZDW+16]. Proxy-invisible LPdS10, LZC14, AVAH18, BZD16, BSW12, [SYL13]. Ps [HDWH12]. Pseudo [NN12, HYL+19, LLG19, RPSL10, SES+16, VN17, XYXYX11, Zaj19, CFY+10, KM10a, MG15, ZCC15, ZY17b]. Publication PLSvdLE10, SH11, SM11, XSWC10, Zim10]. [MMKP16, ZTL15]. Publicly Pseudo-Random [NMP+13, SZQ+17, YNR12a]. Publish [XYXYX11, Zaj19, CFY+10, KM10a, MG15, [BGP+17, DLZ+16b, OFMR16, PRSV17, PLSvdLE10, SH11, SM11, XSWC10, Zim10]. SLI11, TKR14, YSM14]. pseudonym [XHM14]. Pseudonymous Publish/Subscribe [DLZ+16b, OFMR16, [BDFK12]. Pseudoprime [DW12]. PRSV17, TKR14, YSM14]. published Pseudorandom [AS17, BCGH11, BK12a, [MYYR13]. Publisher [Ful10, Mur10]. Kla10, MFG16, CP13, GCH15, HRV10]. Publishing [VSV15, LLL+17b]. Puebla Pseudorandomness [Shp03, Sha10]. [AB10a]. PUF [BDM18, BDL+19, CCKM16, PSMPA [ZLDC15]. PSO [TLL13]. CCM17, DSB16, KPKS12, KLM+12, PSPACE [JJUW10]. PTAS [JLX+19]. MVV12, SRK+17, SRK+18, VDB+16]. Public PUF-Based [CCM17, KPKS12, MVV12, [Alz19, Ano11b, ABW10, BVS+13, BB14, BDM18, BDL+19]. Pufferfish [KM14]. BM18, BKLS12, BKKV10, CT18, CLP13a, PUFKY [MVV12]. PUFs 70

[HRK18, IGR+16, LZZ+19a, USH19]. Pulse [WCL+18]. Quasi [OMPSPL+19, MRRT17]. pulse-response [BGJT14, OWHS12, OTD10, BGJT13]. [MRRT17]. punctured [MG15]. puppet Quasi-Chirp [OWHS12]. Quasi-Cyclic [Lac15]. Purpose [OTD10]. Quasi-Polynomial [GFBF12, Gue16, ABDP15, DGJN14, KM11]. [BGJT14, BGJT13]. Quaternion purposes [ABB+14, KNTU13]. Push [HD19, YWNW15, yWpWyYpN13]. [LBC18, Wu17]. Pushdown [CCD15]. Queries Pushing [FHV16]. Putting [MMKP16]. [GYW+19, HLW12, LHKR10, PBC+17, Puzzle [IBM13a]. Puzzles ZZQ+19, BKV13, CHX13, DFJ+17, GLM+19, [RSBGN12, dCCSM+12, dCCSB+16]. Py HMCK12, PRZB12, TKMZ13, WL19]. [DGlS12]. Py-Family [DGlS12]. pyramid Query [DCA18, GA11, PCDG14, WCL+18, [MHT+13]. XLP+18, AAH+19, AZPC14, BS13a, BKR19, CH11, ED17, HWK+15, JCHS16, JLC18, Q&A [AHN+18, Hof15, Hof16]. Q3 [Ven14]. LXK+14, LZWZ19, LW13a, XMY+17, Qaeda [Mac14, Keb15]. QARMA [LJ18]. YQOL17, ZZC17, ZHT16, ZZL+19]. QARMA-64 [LJ18]. QARMA-64/128 Query-preserving [GA11]. Quest [Fox13]. [LJ18]. QC [JY14, GAB19, HC17, VOG15]. Question [TWNC18, Cha13b]. Quisquater QC-MDPC [HC17]. QIM [LJK17]. QIP [Nac12]. Quorum [Kar12]. [JJUW10]. QoP [Ksi12]. QoP-ML [Ksi12]. QoS [BCG10]. QS [AZPC14, HDWH12]. R [Gre19a, BS12, DB16, LVV11, LJF19, Quadratic [KRDH13, SEY14, YDH+15]. PP10b, WYW14]. R3579X [BDK11]. Quadraticity [MS12b]. Quality Rabbit [FSWF11]. Rabin [Chi13a]. Radar [BSA+19, CSW12, Ksi12, NN12, YCM+13, [Laz15]. Radial SS11, WZLW13, WKH11]. Quantifying [HD19, pNyWyY+14, CG12b]. Radio [CBRZ19, GZSW19]. Quantitative [KAHKB17, CJP12, CJP15, EA12, Kim11, [BL15, BL16, MLBL12, MV16b, HM10]. NLYZ12, RPG12]. radio-frequency Quantization [SSA13]. [CJP12, CJP15]. Radix Quantization-Based [SSA13]. quantizer [ARM15a, GKCK11]. Radix-8 [ARM15a]. [Pau19]. Quantum RAGuard [ZHS+19]. Rail [HF14b]. raised [And19, Ano15d, Ano16d, Ano17d, Ano17e, [LJY16]. Raising [YWW10]. BB14, Ber14, Bro12, BCF+14, CK17, Che17, RAKAPOSHI [IOM12]. RAM [RYF+13]. CCL+13, Feh10, FKS+13, Fol16, JEA+15, Ramanujan [KK10]. Ramifications JL18, Kar12, KP10, KG19, LLK18, LM14, [ALR13]. rampant [Ano13b]. Random LHA+16, MS16, MSU13, Mos18, MKAA17, [Ana14, CBJX19, CDK+10, DSLB18, NNA10, NA10b, NDR+19, QCX18, RK11, EAA+16, FZT14, FSX12a, GSW+16, Gre17, RSM15, RS18, Sas18, Sti11, SD18, TKM12, KS15, LTKP16, LPL15, MH16, NIS12, Unr15, WCL+18, Y+17, ZWS+18, AP18, NNAM10, NN12, SC10, SRK+17, SRK+18, ABB+14, BJ16, BCDN17, BCND19, CML16, TM18, WS12, XYXYX11, XLQ09, XQL11, Dya19, Edw17, FRT13, GJMP15, IM14, YM16, YS12, YKC+11, YFK+12, YLA+13, JSK+16, KKK+16, LLP+18, Lam13, ZYM18, Ara13, CFY+10, CT11b, GPLZ13, LyWSZ10, LCW+16, L¨ud12, QD16, SPD+10, GLM+16, GLW13, HKT11, KM10a, SK14, Svo14, VV19, WMU14, YDH+15, LGKY10, LLY15, LHM13, MRT10, MG15, vDKS11, Sen10, Yan11]. Quantum- PLSvdLE10, QLZ19, RG10, SMDS11, SYL13, Oblivious-Key-Transfer-Based SH11, SM11, Shy15, Sti11, WWYY11, 71

XSWC10, ZOC10, Zaj19, ZPZ+16, Zim10]. WHY+12, Wan18a, WXMZ19, WLS14, Random-Grid [KS15]. Randomization XXX15, YZCT17, ZDW+16, LAL+15]. [DDE+19, Gas13]. Randomized re-enrollment [DEL19]. re-keying [ARP12, CATB19, GDLL18, GT12, HHR11, [ABC+18, GJ19]. re-registration [Par18]. SR12b, BWA13]. Randomness Re-Signature [LK18]. re-signatures [AY14a, Ana14, ABF12, ACM+17, BWLA16, [Tia15]. Reachability [SVG16]. Reactive DB16, HKK19, KMZS19, MSI10, MS16, [JR13]. Read [LLPY19, Sto12]. DTZZ12, FRT13, RY10, TC11]. Range Read/Write [LLPY19]. Reader [JLZ18]. [DCA18, BKR19, HMCK12, JCHS16, Reader/Router [JLZ18]. readers LZWZ19]. range-query [BKR19]. Rank [HDPC13]. readership [Bai12]. Readily [SS10b, FES10]. Ranked [HGOZ19]. Ready [GOPB12, Mos18]. Real [CWL+14, XWSW16, DDY+19, GZS+18, [AEP18, Ano16j, Ano17d, ABL+18, AYS15, LXK+14, NJB19, YQZ+19]. Ranking Bel15, BFK16, BPS16, BNA15, Cer14, CC14, [ZDL12, AT10]. ransom [Ano13b]. GSC17, JWJ+17, LBC18, MK11, PNRC17, [MPA+18, YY17a]. Rapid RHLK18, SK14, Tom16, WLZL12, YE12, [KPC+16]. rare [Sch11]. RASP [AZPC14]. AY14a, Cou12a, Kus13, NSX+18]. RASP-QS [AZPC14]. Rate Real-Time [AEP18, AYS15, GSC17, [LJK17, PPS12b, PCPK14]. Ratio JWJ+17, PNRC17, RHLK18, WLZL12, [FHKP17]. Rational [CK18, HR19, KU14, YE12, CC14, MK11, AY14a, NSX+18]. KOTY17, NS12, TWZ11, ZC13]. Real-valued [BNA15]. Real-World Rationality [GLR10, GLR13]. RBAC [Ano16j, Ano17d, ABL+18, BFK16, BPS16, [VN16]. RC4 Tom16]. realistic [FRT13, GH15]. Realities [GCS+13, Loe15, Ree15, RS14, Sar14]. [Eya17]. Realization RC4-like [RS14]. RCB [ABC+18]. Re [KRM+10, MNM+16, SvT10]. Realizing [ABR12, Bre18, GSW+16, GZXA19, KKA15, [WKB16, ZPWY12]. realm [OYHSB14]. LK18, LSLW15, LSC12, LBR12, MLO17, Reasoning [TSH14]. reboot [And19]. NAL17, Pau19, Pet12, PRSV17, WY10, Rebound [KNR10, Sas12]. recall XJW+16, ABC+18, BGP+17, CFZ+10, [LTC+15a]. recall-based [LTC+15a]. CLH+16, CZ15b, DEL19, FSGW11, Receive [Orm16]. Receiver FSGW12, FXP12, GH12, GJ19, HWDL16, [TFS19, Wan14, Chi12]. recently HYF18, KKM+14, LMJC11, LCT+14, [GSGM16]. Recipes [DGP10]. Recipient LFWS15, LL16a, Par18, SYL13, SLZ12, [ZYZ+19]. reciprocity [ZYGY18]. Reco SKB+17, Tia15, WGJT10, WHY+12, [EHKSS19]. Reco-Pi [EHKSS19]. Wan18a, WXMZ19, WLS14, XXX15, Recoding [Abb12, TMK11]. Recognition YZCT17, ZDW+16, LAL+15]. [AQD12, BCTPL16, BJCHA17, DM19, IA15, Re-authentication LGM+16, MR14b, BAG12, uHAN+18, [LBR12, FXP12, LMJC11]. Re-creating HURU11]. Recommendation [Bre18, Pau19]. Re-Encryption [GSW+16, [BD15, Bar16a, Gir15, KKK+18a, NIS12]. KKA15, LSLW15, MLO17, NAL17, PRSV17, Recommender [CZ19]. Reconciling XJW+16, ABR12, GZXA19, LSC12, Pet12, [SSNS15]. Reconfigurable [ADSH18, HG12, WY10, BGP+17, CFZ+10, CLH+16, CZ15b, HLN+10, LZZ+19a, MLCH10, NdMMW16, FSGW11, FSGW12, GH12, HWDL16, PP10b, PG12, SRK+17, SRK+18, ZLQ15, HYF18, KKM+14, LCT+14, LFWS15, EHKSS19, MD12a]. Reconfiguration LL16a, SYL13, SLZ12, SKB+17, WGJT10, [GFBF12, VMV15]. Reconstructing 72

[Fyo19]. Reconstruction HLLG18, Pud12, WLC12, DMSD18, [CCM+15, KOTY17, HH15, IK15]. Record GLMS18, GMDR19, MNP12]. Related-Key [AP13, RCBK19, RMTA18, CLC+19, Con12, [CWZ19, CMA14, HLLG18, Pud12, WLC12, LH14]. recording [CAM19]. Records DGlS12, GLMS18]. Relational [LYZ+13, Rao17, RCBK19, ZVG16, AIM+19, [HPC10, RP12, WP17, BFG+14, BL11, LT14b, LHL15]. Recoverable [JLS12]. GA11, JK13, PYP10]. Relations [BP11, Recovery [Bro17, DSSDW14, DSSDW17, FHS13, HLR11, WGD18, KGO10, LLM+19]. LYY+18b, LLD19, MPA+18, NRZQ15, Relationship [CZ19]. Release QJC+18, SAA15, SSA13, WZ15, BM15, [KFOS12, RSBGN12, Unr15, WSS12]. CHHW12, CGH17, PX13]. Rectangle released [GSGM16]. Relevance [Sim15a]. [CWZ19, WLC12]. Recurrent Reliability [HSUS11, CZ14]. Reliable [CSH+18, Pud12]. Recursive [AMKA17, ADG16, Bai10, CC14, KMJ18, [LXLY12, WH18]. ReDCrypt [RHLK18]. MGJ19, MKASJ18, WKB16, ACD+15, Redesigning [VFV17a, VFV17b]. CL16, SM19a, ZC12]. Relying [TAKS10]. redistributed [LXCM11]. Reduced Remainder [HF14a]. remapping [PSJ+13]. [BW12, DWWZ12, KNR10, LWZ12, LJF16, Remarks [SSU12]. remediations LJ18, LYD+18, LSG+19, LWPF12, vV16, [ACC+13]. Remote AKY13, AY14b, DMSD18, LFW+16]. [BCE+10, BWS19, CS14, FYMY15, Reduced-Round [LWZ12, LJ18, LYD+18, LZCK14, MHL18, Sar12, SYY+17, VMV15, LSG+19, AY14b, LFW+16]. Reducing WgMdZlZ12, WgMW12, CHS11, HU15, [TSB18]. Reduction [ABR12, FYD+19, HL12, IB11, KKG14, LH10c, LNM+11, LCLW17, LSC+15, YMA17]. Reductions LNKL13, LWK+18, LH13, MCL+19, MM12, [BHKN13, BCG19, DW12]. Redundancy Sar10a, WQZ+13, YSL+10, YN19, PZL+19]. [FGRQ18]. Reference [LLHS12, IM14]. remotely [Wat14b, YHHM18]. Removing refined [KGP+19]. Refinement [BCEM15]. [HKHK13]. renewable [HRK+19]. Refinements [LL11]. reflections Renewal [MMY12]. renewed [GPLZ13]. [Hai17, OF12]. Reflexive [SRRM18]. rental [LY14]. Reordering [Alo12]. refractive [PHN+12]. Refresh [LSC+15]. repackaging [CBJY16]. Repair [SEK+19]. Regaining [WBA17]. Region Repairing [BCM12, BCM13]. Repeatedly [CCFM12, HZW+14, KS15, WK18, FHV16, [TAKS10, ATK11]. repeater [SPD+10]. LWLW11, WW13]. region-duplication replacement [LHM+10]. Replay [LWLW11]. Regions [AQD12, AKK+17]. [SRRM18, ZLQ15]. Replay-Resistant Register [TLCF16, LWK11]. Registers [SRRM18]. replicas [PZL+19]. Report [Gla11, LLGJ16, ZH15]. registration [jCPB+12, MT17, Zor12, GMT+12]. reports [Par18, ISC+16]. Regression [JHW+19]. [RPG12]. Repositories [Ano15a]. Regular [ARM15a, CQX18, Wat12, WR15]. repository [RSM15]. Representation regular-expression [WR15]. regulating [AGW15, BFMT16, GM16b, MMBS19, [DFJ+10]. regulatory [BP10]. MC19, MH16, MHT+13]. regulatory-compliant [BP10]. Rehash Representation-Based [AGW15]. [FREP17]. Reinforcing [WXY+17]. Representatives [Bla16]. reproducible Rejewski [Kap13]. Rekeying [CW12a]. Reproducing [S¨od13]. [DT13, QLL17, CLSW12, DS11]. Repudiation [LLG15, VBC+15]. Rekeying-Aware [QLL17]. Related Repurposing [GY13]. Reputation [AH19, CWZ19, Cil11, CMA14, DGlS12, [BL15, LHM+15, PAS13b, MGP10]. 73

Reputation-Based [PAS13b]. Request Respect [CATB19]. Respiratory [KK12, KK13]. Request-Based-Revealing [RSCX18]. Response [KK12, KK13]. Requirements [OS16]. [GHS14, HLKL15, ZHW+16, MRRT17]. Requires [Raz19]. requiring [KHHH14]. Resprinting [TBCB15]. REST [LNG19]. ReSC [YFT18]. Rescue [TSH17]. REST-Security [LNG19]. restoration Research [BNMH17, BA18, CDFZ16, [WHZ12]. restricted [CLH+16]. result FREP17, Roh19, SDC+17, SPG+19, WP15, [ACK+10, ED17]. Results BEB+18, GLIC10, Hof16, Pal15, Ven14]. [DGlS12, LJF16, Hof16, KGO10]. Researchers Rethinking [Con12, Con17, Edw14, Wal18, Win17]. [Che13, HU15, LSG16, MV16a, WYZ+17]. Reservation [LSY+16]. reset [RY10]. Retrieval [BBB+16a, BTHJ12, CJP12, Resettable [CPS16]. Resettably DS19, HK14b, JMG+16, JKHeY12, Yek10, [COP+14]. Resettably-Sound [COP+14]. ZXZ+11, CJP15, SWW+17]. Retrieving Residue [CS10]. Resilience [Uto13]. returned [War11]. reusable [CATB19, NTY12, GLL+18, HYL+19]. [RS17c]. Reuse [ABF12]. Reveal [Sta13]. Resiliency [YM16]. Resilient Revealed [Ano15d]. Revealing [AV12, BKKV10, FPS12, HD19, HHS18, [BT12, KK12, BKR19, KK13]. reverse JP19, LTZY16, LD13, NYR+14, Pan14, [TQL+14]. reversed [KYH18]. PSD15, XZY+12, YZ12, YNR12b, YCZY12, Reversibility [FSX12b, HWYW14]. ZYT13, ZWTM15, ZZM17, ZYZ+19, ZYY19, Reversible [CLF11, CSS+13, HHS+15, ZY17a, ZYM18, ZYH+19, ABC+18, CAM19, MM17a, MR16, NC12, AMK12, CT11a, CQX18, DLZ16a, GV14a, KPS10, Kom18, HLC16, JK13, KKK+18b, MM14a, NC13, LLG19, MMSD13, SCBL16, SGP+17, PWLL13, PC14, SM19a, TK14, WOLS12]. Wan18a, YSJL14, YKC+12, YLZ+16, Reversibly [MKH+12]. Review ZY17b, ZYM19]. Resistance [Ano15b, Ano16a, Ano17b, AY12a, AY12b, [CGCS12, GZSW19, PRC12, WLZL12, ZJ11, Ayu12, Bai12, Bar12, Cou12b, Dew11, Ful10, DLN13, FIO15, XYML19]. Resistant Gas13, Gre19a, Gre19b, Hom17, Joh10, [BK12a, CDK+10, GV14b, HF14b, SRRM18, Kat13, Keb15, Kob10, Led16, Lop15b, WHZ12, WgMW12, WH17, YPRI17, FK19, Low12, Mei10, Mou15, Mur10, Nag19, GMRT+15, HCC10, PBCC14, VCK+12, PMG+19b, Sch15a, Sha10, Ter11, Xie12a, WTT12, YKGK13]. resisting Xie12b, IAA+19, JAS+11, MM12, TPKT12]. [SXL16, Tam15, ZZL+19]. Resistive Reviewed [Sch15a]. Reviews [SR14]. [DSB16, TLCF16]. Resistivity [MM17b]. Revised [DDS12, Dan12, MV12, BYL10, Resolution [LHW18]. Resonance JY14, LH10a, vDKS11]. Revising [BT12]. [LCR+18]. Resource revision [LT14b]. Revisited [CSH+18, CRS+18, HM19, JMG+16, [CLY14, DKPW12, DKS12, GWWC15, JWNS19, SZMK13, YNR12a, ZSH+19, KFOS12, LL11, Lop15a, PKTK12, Sar12, AMHJ10, FQZF18, KAS15, LLZ+16, Tan12a, BCL14, DGMT19, DDL15, HKT11, MHV15, Wan13, XWZW16, ZPZ+16]. HYWS11, MZ15, TS16a, ZCL+12]. Resource-Constrained Revisiting [CSH+18, CRS+18, YNR12a, LLZ+16]. [GLMS18, RSD19, TLW12, WSA15]. Resource-Constraint [ZSH+19]. Reviving [TLZ+17]. Revocability Resource-efficient [SZMK13, XWZW16]. [WHLH16]. Revocable Resources [Bre18, IM16, Pau19, HRK+19]. [AEHS15, CD16b, LNWZ19, MML16, 74

QZZ18, SE14, SE16, SZS14, SZDL14, [PSOMPL13]. roaming [SCKH10, ZX11]. TCL15, TT12, Unr15, FLL+14, JCL+18, Robbery [SPW+16]. Robert [Gre11]. LDZW19, WLFX17, WTT12]. Revocation Robot [NSP+18, AASSAA18]. Robotic [AEHS15, LLC+15, LW16, Lop15b, RDZ+16, [SPW+16, VOGB18]. Robust [BCGAPM12, XMLC13, YWZ+12, ATK11, LJWY18, BCG12a, CFOR12, DKL+19, GKSB17, WLWG11, ZWY+19]. Revoking [TAKS10]. HURU11, HZC+12, JSZS12, LSL12b, LSR13, Revolutionized [Orm16]. RF [VJH+18]. MR16, MU12, MS16, MC11, pNyWyY+14, RF-Data [VJH+18]. RFID OCDG11, RR11, RMG18, SJ12, SS17b, [CJP15, AATM18, AMKC19, BL12, BSSV12, SC12, SZZT18, TLCF16, TK14, TTL10, BM11, CGCGPDMG12, CCF17, CJP12, WLDB11, WgMdZlZ12, gWpNyY+14, Cho14, DZS+12, FLL+14, Far14, FMTR12, XNG+14, YWNW15, YHSW19, YYO15, GMSW14, GI12, GSN+16, GH15, GAI+18, YY13, ZWZ17b, AP10, AIA+18a, BWR12b, HSH11, HDPC13, HQY+16, HQY+18, CLM+12, CNF+18, EAA+16, GZHD12, HCPLSB12, HCETPL+12, HWZZ19, JLZ18, HZC+14, HZL18, IOV+18, KMG17, KIH19, KNTU13, LNZ+13, LEW19, MO12, Mic16, LNK+18a, LW10, LZZ19b, PKS18, RS17c, MK12a, PPH12, PLSvdLE10, QZL+16a, yWpNyL11, yWpWyYpN13, WYZ+17, QZL+16b, SBS+12, SPLHCB14, SBS18, WHZ+19, YSL+10, ZHH+17]. Robustness SSKL16, TG17, WH17, WCFW18, YFT18]. [HGT15, YKBS10, AEH17]. ROCA RFID-Enabled [Ano17f]. Rochefort [Car11]. Rock [Cri16]. [YFT18, QZL+16a, QZL+16b]. RFID-WSN Rock-solid [Cri16]. Rodney [DDS12]. [JLZ18]. RFID/NFC [Mic16]. RFIDs Rogozin [Kuz11]. rogue [AYSZ14]. Role [KOP12]. RGB [SNM14, ST16]. RI [GB19, PH12b, ZVG16, HPJ+19, ZVH14]. [Sch15a]. Rich [CS12, GYW+19]. Richman Role-Based [ZVG16, ZVH14]. Ron [Xie12a, Xie12b]. Riddle [LHA+12]. Room [Smi11b, Pea11]. Root [Fox13, KM15, KM16]. ride [GBC19]. [ARH14]. ROP [ZHS+19]. Rosen [HR13]. ride-sharing [GBC19]. Right [Bro17, Rosenhain [CDSLY14]. Rotation RCK17, SR12a, BBG+17, LHA+12, Sch11]. [MM17b, SBS18, LWLW11]. Rotational Rightful [RR11]. Rights [KN10, KNR10]. Roulette [Ber17]. Round [LVRY10, SC19a, GLL16]. Rigorous [Ber17, jCPB+12, COP+14, CJZ13, [DK17]. Ring [CZCD18, GHPS12, HKL+12, DWWZ12, GGHR14, KOTY17, KMO14, LYY+16, XY18, YKBS10, YLA+13, ZJ14, LWZ12, LJ17, LJ18, LYD+18, LSG+19, ZGCZ18, DZ14, GCH+19, Hwa11, LYW+10]. Pan14, TYM+17, XZLW15, Yon12, AY14b, Ring-LPN [HKL+12]. Ring-LWE [XY18]. ABM+12, Blo15, DMSD18, JK19, LP11, Rings [YM16]. RISC [ZBPF18]. rise LFW+16, Sun11, TSLL11, TQL+14, TCS14, [Ano14b, Mat19, Yaa19]. Risk XW12]. Round-Reduced [HFS+19, Zha15b, GBC19, NA14, NML19, [DWWZ12, DMSD18]. Rounds PKA15, SK18]. Risk-Aware [HFS+19]. [GST12, Sas12, LYHH14, MNP12]. Router risk-based [GBC19, SK18]. risk-oriented [Bis17, JLZ18, SA15]. Routing [ARWK19, [NML19]. risks [Lan10, SS17a]. RKA Ham12, KZG10, WLY+15, LSG16, LC17]. [SLY+16]. RKA-Secure [SLY+16]. RLCPS Routing-Aware [ARWK19]. RSA [DDS12]. RLWE [GDLL18, ZXJ+14]. [Dun12b, Kia11, Pie10, APPVP15, BBBP13, RLWE-Based [GDLL18]. RNG [CGH17]. Bro17, BNST17, CCL+19, CLSW12, Chm10, RNGs [DSSDW14, DSSDW17]. RNS GM13a, GST13, Her14, Hin10, HLYS14, [BEM16, CATB19, DBT19, GL19]. RNTS IK15, KHHH14, KFL+10, Lim11, LFK19, 75

MV19, MZ15, Moo12, PT19, PY19, SM10a, GM13b, GSN+16, JDV16, MNM+16, SM10b, SLM10, TK19, Win17, XWK+17, WLWG11, WDZL13, WLFX17, YC11, YHK+10, YXA+16, sCR19a]. RSA-1024 KCR11, KS11]. Scalar [Bro17, Win17]. RSEL [FLL+14]. RST [ARM15a, NR15, YTS12, SKH15]. Scale [LD13]. rubber [BSR+14]. Rule [KPW13, [DM15, GU13, JKHeY12, LLSL19, LQD+16, NC12, TW12, McG11, Nor17, YWYZ12]. And19, CG12b, dCCSB+16, DEL19, Rule-Based [TW12]. rules [PTRV18]. DLGT19, FXP12, GSN+16, SR10, ZZKA17, Rumor [FKOV15]. Run [CEL+19, IF16]. ZVH14]. Scaling [PPG19, YM18]. Scan Run-Time [IF16]. runs [Ano13b]. [LWK11, DDFR13, KPS10]. Scan-based RunStream [KPC+16]. Runtime [LWK11]. scanning [Ara13]. Scattering [BJ10a, CLP+13b]. Rupture [KA18]. [KA18]. Scenarios Russian [McG11]. Ryoan [HZX+18]. [DSB15, HURU11, LWW+19]. Schedules [Pud12]. Scheduling s [Sch15a, MM17b, NN12, RMP10, RMTA18, [DK16a, LJP17, MV16b]. Schema [AN12]. SS11, WJ19]. S-Box [RMTA18, RMP10]. Scheme S-Box/Inverse [RMTA18]. S-Boxes [ARM15a, ADM19, AMSPL19, ASS15, Bai10, [MM17b, NN12, WJ19, SS11]. S3BD BHG12, BS14, BKJP12, BDH11, CMLS15, [WS19]. SA [LHM14]. SAC [JY14, MV12]. CLL16, CCW+10, CLHC12, CHHW12, SADT [SM12]. SAE [DLK+16]. SAE/LTE CCZC13, CCC19, CGY+13, CLH13, CSW12, [DLK+16]. SAFE DA10, DS11, DKS12, EAAAA19, FR16, [DSLB18, RQD+15, BL17, Gel13]. FGM10, GZZ+13, GH11b, GJZ17, GLW12, SafeCurves [BL17]. Safeguarding GZH17, HYS11, HIDFGPC15, HMR12, [FGR+17, NML19]. Safely [HM12]. HWS+19, HLC+18, HHP17, H¨ul13, HLH19, SAFER [YCL17]. Safety HP12, HP17, IL15, JSZS12, JLX+19, KU14, [OS16, BMM12, KO16, SAM+19a]. said KP12, KTT12, KK12, KKA15, KSSY12, [Pro15]. Salsa20 [MAS16]. same [Con17]. KLM+12, LSL12b, LHF12, LTH+15, Samia [Ano15b]. SAML [IMB17]. sample LTZY16, LH11c, LSQZ17, LSQL18a, [YWL+17]. Samplers [HKR+18]. sampling LGWY12, LCDP15, LTC+15b, LYY+18b, [Ana14]. San [ACM11, Ano10a, Dun12b, LGPRH14, MWZ12, MVVR12, MRL+18, IEE15, Kia11, Lin14b, Pie10]. Sancus MMN12, MSas12, NXB13, NLLJ12, NLY15, [NVM+17]. Sandbox [HZX+18]. Pet12, PDT12, RVH+16, RSD19, RMG18, Sanitizable [PH12b]. Sanitizers [YM19]. SK12a, SSKL16, SJ12, SGP+12, SD12, Sanjit [Kat13]. Santa [MSH+16, Rab10]. She14, ST16, SWF+19, SP15b, SJWH+17, Sanya [LTW11]. SARFUM [BCE+10]. SSA13, Tan11, TDTD13, TWZ11, WY10, Sarkar [Kat13]. SAT [Che18]. satphone WgMdZlZ12, WgMW12, gWpNyY+14, [DHW+13]. SAv5 [CDWM19]. SAW WLH15, XWSW16, XHC+12, XJWW13, [CFH+13]. sawtooth [Ye14]. SC’11 YM16, Yam12, YZX+12, Ye10, Ye14, [LCK11]. SCA [HF14b, PDJ+19]. YTH17, YL17, Y+17, YHK+10, YMWS11]. SCA-Resistant [HF14b]. SCADFA Scheme [YY17b, ZPM+15, ZZQ+19, ZC13, [PDJ+19]. scalability [YC11]. Scalable ZQQ15, ZWZ17b, ZM18, ZLDD12, ZY17a, [BSCTV17, CCT+14, DT13, FMTR12, FS18, ZGCZ18, AMN18, ARL13, AHS14, APK+18, HIDFGPC15, KGV16, KAK18, LYZ+13, AKK+17, AM19, BC16, BDL+19, BD18, LLKA19, MBR15, PY19, QZL+16a, BDM+19, BOB13, BBB19, BAL10, WHLH17, ATKH+17, BBTC20, DYZ+15, BWR12b, BMM12, BZD16, BBB16b, 76

CCLL11, CLSW12, CNF+18, CH10, CT11a, LZCK14, MLCH10, MR14b, MMS17b, CLHJ13, CW14a, CTHP13, CBJY16, Cho14, MBF18, MKRM10, MKASJ18, Oba11, PB12, DDY+19, DSCS12, EAA+16, EZ15, FLL+14, PDNH15, PH12b, Sch10, Shi11, SKH17, Far14, FA14a, FHZW18, FZZ+12, GZHD12, SSU12, VSR12, WGF16, YNR12a, YNR12b, GJ13, GMRT+15, GJJ18, GPLZ13, Yek10, YWZ+12, AGHP14, AN15, AHL+12, GLM+16, GH16, GAI+18, GBC19, GTSS19, BKR19, CDGC12, CJXX19, CHS11, CCG10, HKA+18, HZWZ18, HBBRNM+16, HL12, CTL13, DDD14, DD13, DZ14, FPBG14, HL11, HCCC11, HLC16, HCC10, Hwa11, FGMP12, FMA+18, HKA19, HWDL16, IB11, JNUH17, JKAU19, JLT+12, JZS+10, HM10, KTUI16, LWW+19, LHYZ12, MM12, JMW+16, KFE19, KI11, KPP16, KDH15, MA17b, NZL+15, QYWX16, SES+16, KK13, KHMB13, KKM+13, KKM+14, Sar10a, Sar11, hSZZ15, SAR18b, WW14, KKG14, KCS+18, Kim16, KKK+18b, KIH19, YT11b, ZCL+12, ZCLL14, ZT14]. Schneier KP18, KLW+16, KLW+17, KDW+17, [Sev16]. Scholarship [SPG+19]. KKD+18, KWH16, KL11, LXLY12, LLZ+16, Scholarship-for-Service [SPG+19]. LSR13, LYC+10, LH10c, LYW+10, LZJX10, School [Hom17]. Science LNM+11, LMJC11, LK12, LLHS12, LNKL13, [Bow11, Gas13, IEE10, IEE11b, Nie02, LDZ+14, LWYM16, LIK+17, LNK+18a]. Ter11, Bia12, PHWM10, Pet11]. scientists scheme [LWK+18, LNK+18b, LWK+19, [Goo12]. Scientometric [Pal15, Pal16]. LFWS15, LH13, LHH11, LWL10a, LWLW11, Scope [Bai12]. Score [GCSAddP11,´ HW19]. LW13b, LZC14, LZZ19b, LDZW19, LL16a, scoring [OSSK16]. scrambler [Pau19]. LL16b, LWY12, MCN+18, MMS17c, MK12a, Scrambling [LLL17a]. scream [DMSD18]. MGB19, MSas13, NR17, Nos14, NMX15, Screen [SPW+16, CTL12, IAA+19]. Script ODK+17, OSNZ19, OPS14, OSANAM19, [Rao10, Bax14]. Scripting [DSB15]. scroll PY19, PZBF18, QMC17, QMW17, RPSL10, [GMOGCCC15]. SDB [HWK+15]. SDDO SGGCR+16, SM11, SYWX19, SCR19b, [PL16]. SDDO-based [PL16]. SDH SMS+16, Tan12b, TY16a, TK14, TD14, [GMS11]. SDIVIP [YNX+16]. SDN TLL13, TLL12, UUN11, WWYZ11, [DHT+19, KCC17, YHSW19]. SDN-Based WWYY11, yWpNyL11, WLH13, WDZL13, [DHT+19, YHSW19]. SDVS [Wan10]. SE WLZ+16, WZC16, WLFX17, Wan18a, [LLLS13]. SE-AKA [LLLS13]. seals WXMZ19, WXSH19, WHZ+19, WDKV19, [MN10]. Seam [LC15]. Seam-Carved WZ11, WKH11, WOLS12, WXK+17, [LC15]. Search [AHN+18, CWL+14, Che15, XHH12, XWZW16, XWXC14, XXX15, DCA18, FRS+16, GTT11, HWZP18, XWK+17, XTZ+19, XXCY19, XMHD13, HCDM12, HLH19, LSQL18b, SOR16, YWJ+19, YC11, YCC16, YHHM18, TMC15, WDCL18, WW12, XWSW16, YSQM19, YWK+10a, YCT15, YXD18, XJWW13, ZXYL16, AHG18, BZD16, YQOL17, YY13, YMSH10, ZYL+10, ZLY10, BTK15, BL11, CLH+16, DDY+19, FH13, ZXJ+14, ZYC+17, ZZY+19, ZWY+19, FSGW12, GZS+18, HKA19, HH16, ZPWY12, ZHH+17, ZY17b, ZFH+18, MRR+18, NJB19, OSSK16, PWS19a, SY15b, ZLY+19, ZC12, ZBR11, DT13, LLZ+12]. WHY+12, WXLY16, WMC17, WS19, Schemes [AAUC18, ACA+16, ABF12, XWY+18, XTZ+19, XLC+19, YXD18, BVS+13, BFM12, BBEPT14, BSJ15, YQOL17, YQZ+19, ZZ11, sCR19a]. CMLRHS13, CZCD18, CLND19, CGL+12, Searchable [BHJP14, CWWL12, CLW16, Chu16, Des10b, EFGT18, FHKP17, FFL12, CGKO11, FJHJ12, HKA19, PBC+17, HSM14, HLLG18, HPO+15, LWL10b, PCY+17, XNKG15, ZZQ+19, CLC+19, 77

CXWT19, DLZ16a, DRD11, HQZH14, HK19, Gup15, HRS13, LDC13, Smi11a, Ano17b]. HTC17, JCHS16, LZC17, LLL+18, MML16, SECRYPT [Ano19a]. Section [BdD19]. RPSL10, WXLY16, WCCH18, YZCT17]. Secure [ADM19, AMKC19, AAL19, Alz19, Searches [Sia12, WR15]. searching ACA+16, ADMM16, ABPP16, ABL+18, [GPN+12]. Seattle [LCK11, KCR11]. AARJ12, Ash14, AMH+16, BVS+13, Seberry [AHS14]. SEC [PA10]. SecLAP BWLA16, BCGH11, BCG12a, BCQ+13, [AMKC19]. SECO [DYZ+15]. Second BWA13, BJL12, BHJP14, BF11, Bru12, [AKY13, ABM+12, Gre19b, LGP19, BDH11, BCEM15, CFOR12, CCM17, SNG+17]. Secondary [RS11]. Secrecy CZF12, CZLC14, Che15, CDWM19, CMA14, [ABD+15, BKST18, BCND19, KZG10, CDLW19, DM18, DL15, DMS+16, DG15, TSH14, Yon12, ABD+19, ATKH+17, Bia12, DYZ+15, DLZ+16b, Edw17, EAB+19, RCW15, TCS14]. Secrecy-preserving FLH13, FYD+19, FMC19, Fri10b, FD11, [TSH14]. Secret [ASN11, ASN12, ADH17, FSX12a, GQH17, zGXW12, GKM16, Ayu12, Bai10, BBB+16a, BFM12, BBEPT14, GGHR14, GFBF12, GT12, GV14b, BP06, BCDN17, BCND19, Bri11, BLU+15, GHKL11, GM14, GZS+18, HvS12, HSM14, CCM+15, CFOR12, CCL+13, DR12, Dew11, HLLG18, Har16, HL10b, HP14, HTZR12, EM12, EA11, FHKP17, FR16, Fok12, HYS11, HMCK12, HLC+18, HLKL15, HYS18, HL10a, Has16, HZX+18, JLS12, KU14, HK14b, HLH19, IL15, Jac16, JKA+18, KS18b, KOTY17, KK12, KK13, KSSY12, JHW+19, KW14, KME+12, KHN+11, KS15, LKBK19, LHF12, LPL15, Lin15, KYEV+18, KD19, K¨up15, KH10, LJS+14, LCCJ13, LTC+15b, LJ16, LLKA19, Men13b, LL15, LH12, LYZ+13, LTH+15, LTZY16, MNS11, NS12, Oba11, PCPK14, QS18, LSLW15, LLSL19, LLGJ16, LSQL18b, LY15, SLL10, SC10, SS10c, SSU12, Sti15, TLW12, LHL15, LWML16, LLML12, LSC12, MLO17, TWZ11, WKB16, WGF16, Wil18, XZY+12, MMP14, MDHM18, Mal13, MVVR12, XJR+17, YFF12, YWZ+12, ZC13, Ald11, MMS17b, MGJ19, MK12a, MKAA17]. AIM+19, ADG16, AKK+17, Ara13, AGBR19, Secure [NBZP17, NDG+17, NR12, NMS14, BJ16, BEB+18, Bud16, Cha13c, CT11b, NSMS14, PB12, PSM17, Per13, PBC+17, CW14a, CLZ+17, DD13, EEAZ13, EZ15, PRN+19, QZL+16b, QZDJ16, QZZ18, RC18, FHH10a, GEAHR11, GJMP15, GLW13, RMP10, RR17, Rea16, RMZW19, RSGG15, HF14a, HH15, Hea15, HBBRNM+16, RS19, SAM+19a, SNJ11, SSKL16, ST19, HCCC11, HLC12, KFE19, KI11, KTUI16, SZS14, SVCV15, SP15b, SKH17, SS15, LXLY12, LH11a, LT13, LyWSZ10, LHYZ12, SRAA17, SAR18b, SSAF11, SVG16, SYW17, LEW19, Mas17, McK10, McK11, McK12]. SYC+17, SMS14, SZDL14, SGH15, SLY+16, secret [MBB11, OO10, Par18, Pea11, Pet11, SR12b, SM18, TB18, TCL15, TWZ11, TG12, QD16, Rus15, SB17, SA12, SAR18b, SM10c, TGC16, VTY18, VMV15, WgMW12, TQL+14, TD14, UUN11, UUN13, WYL13, WKB16, WXLY16, WLY17, WDCL18, WZ11, WS12, WOLS12, Wu17, XW13, WDZ19, WLH15, WBA17, WWHL12, WS19, YC11, YCC16, YSC16, ZCL+12, ZZ15, WMS+12, tWmC12, XWSW16, XLQ09, ZPWY12, LSC+15, Bai12]. secret-key XJWW13, XLP+18, XHZ+19, YNR12a, [BJ16]. Secret-Sharing [BBEPT14]. YNR12b, YTH17, YQZ+19, YHK+10, Secretion [RSCX18]. Secretocracy YKC+11, YAM+15, YY17b, YGD+17, [Ber16c]. Secrets ZXZ+11, ZDL12, ZDHZ18, ZVH14, ZVG16, [BT12, CG14b, DLWW11, FMS12a, Kob10, ZHT16, ZLW+17, ZHZ+19, ZBR11, AHS14, Man13, Bha16, Cop06, Cop10b, GGH+16b, APK+18, ABBD13, ACF16, AKK+17, 78

ACD+15, AYSZ14, BMDT19, BOB13, BSBB19, BA18, BCM+15, BCHL19, BRT12, BHH19, BZD16, BKR19, BSR+14, CCLL11, BPR14a, BPR14b, BLS12, BCGN16, CSD18, CLHJ13, CW14a, CS11, CDL18, BDPS12, Bra15, BDH11, BP10, CFST17, DA18, DEL19, DMM10]. secure CFE16, CBJX19, CHS11, CFXY17, CCD15, [DGL19, DMD18, FHH10a, FLL+14, CCDD19, CCDD20, CPS16, CM11, DDS12, FSGW12, FA14b, FIO15, FLYL16b, FS18, Dan12, DR12, DK16a, DFKC17, Elb09, Gal13, GAI+18, GLL+18, GCH15, HGWY11, FREP17, FMA+18, Fid18, FMA+19, FP19, HWK+15, HLYS14, HTC17, HPY10, IB11, FSX12b, FSX12c, GN16, GZZ+13, GR19a, JZS+10, KPP16, KKA14, KRM+10, KCS+18, GPR+19, GSC17, HC12, Hel17, Her19, KTUI16, KLW+17, KDW+17, KKD+18, HB17, HSUS11, HLW12, HXC+11, HLCL11, LLLS13, LDDAM12, LH11b, LLW16, LSR13, HLT+15, HLN+10, IEE15, IS12, IGR+16, LHM+10, LDZ+14, LWK+18, LZD+19, JN12, JSA17, Jia14a, KBL11, KS18b, LZWZ19, LWK+19, LCT+14, LAL+15, KFOS12, KSD+17, KD12b, LPS12, LST12, LJY16, LHH+18, LL16a, LL16b, LBOX12, LW11a, LK14, LLPY19, LJP17, LW12, MR14c, MHY+18, NR17, NACLR12, NAL17, LLZ+17, LTW11, LSQZ17, LYL+18, ODK+17, OSNZ19, OSANAM19, PABC´ +19, LSQL18b, LP12, LRW17, LZC12a, LWL+17, PSdO+13, PLSvdLE10, PWS19a, PY19, LZZ+19a, LNG19, LDB+15, LMS16, LLH18, PBP19, Rao17, RG10, RYF+13, RITF+11, MMKP16, MTY11, MKN13]. Security RS15, SGGCR+16, SYL13, SWW+16, [MCS+15, MH14, Mau12, MV16a, MGG+19, SSS11, SM10c, SSPL+13, SXL16, SLXX16, MLBL12, MPM+17, MHMSGH16, Nac12, SC19b, Tar10, TLMM13, THA+13, TLL12, NNAM10, NDG+17, NVM+17, Nos11, Nos14, VS11, WLZ+16, WMX+17, WXMZ19, OSH16, Orm16, OS16, Pas13a, PZPS15, WHZ+19, WDKV19, WCCH18, WL19, PGLCX17, PDNH15, PS14, PL16, PDT12, XWXC14, XXX15, XZP+19, XMY+17, PNRC17, RB17, RCP+18, RVS+18, RQD+15, XWK+17, XYML19, YC12, yYqWqZC13, RWZ12, Rog16, RS10, SGG18, SN10, SNJ11, YZZ+14, YZCT17, YQOL17, YY11, YLS12, SBS+12, SBS18, SPD+10, Sar12, Sch13, YJC18, YMSH10, ZLY10, ZCLL14, ZZ15, SD12, Shi11, SC19a, SLM10, STC11, Sti19, ZQD16, ZYC+17, ZG10]. secure SSP19, SAM+18, SMOP15, SCGW+14, [ZZ12, ZX11, ZY17b, ZC12, Zhu13, ZZL+19, Tso13, TV15, VFFHF19, Wal18, WYCF14, ZSW+18b, Ano12, DSLB18, HRK18, WSA15, WZC16, WRP70, WSS12, WHLH17, OKG+12, YSS14, YFK+12]. Secure-TWS WCL+18, WS14, Yan10, YZLC12, YSF+18, [OKG+12]. Secured [LC17, SGG18]. YHSW19, YGS+17, YYK+17, YSS14, SecureLR [JHW+19]. Securely Yon11, YYW19, Zha15b, ZM18, ZXL19, [CC10, KP17, LHL+14, MS16, WXY+17, ZYY19, ZY17a, ZYH+19, ZCZ+19, vTJ11, BC18, der10]. SecureMR [DMD18]. AMN18, AB10a, Abe10, ABGR13, And19, Securing [AASSAA18, BK12b, CMLS15, ABM+12, Ano11a, AM19, AGBR19, ADH17, CST+17, Cla18, NPH+14, PMZ13, SFE10, BYL10, BSS11, BDL+11, BLV17, BM11, SMSK18, SWF+19, SLI11, Ste15b, TKR14, BL11, CO11, CTHP13, CLCZ10, CVG+13]. YMA17, YT12, YWY+19, CR10, Din10, security [DLK+16, DGMT19, DXWD16, GH15, SKS+18, SA15, Tox14, YWZ+18]. DHW+13, Edw14, FHM+12, FA14a, Fei19, Securities [WWL+14]. Security Fis15, GHD19, GM16a, GLM+16, GMMJ11, [ABJ13, AHN+18, ASBdS16, Ano13f, GMS11, GH12, HPJ+19, HWDL16, HWG10, Ano15a, Ano15d, Ano19a, ABF12, AN15, HLR11, HRS13, Hod19, HLV10, IAA+19, ABHC+16, ABB+19b, AYS15, BCE+10, JK19, KNTU13, KSA16, KKK+16, Lan10, 79

Lan13, LDC13, LH10a, LZ11, LXMW12, [HZ11]. Self-Updatable LHH11, LZC14, LSG16, LLG19, MZA+13, [LLPY19, LCL+17a]. SELinux [SFE10]. MZL+19, Men13b, MM14b, MSGCDPSS18, seller [KJN+16]. Semantic MSM+18b, NS10, Nam19, NCL13, NLYZ12, [DDY+19, MHW+19, YZCT17, HLR11, NML19, OK18, OYHSB14, PHWM10, HTC17, JS18a, WS19]. Semantic-aware PMG19a, QYWX16, QLZ19, Ree15, [DDY+19]. semantically [PBP19, SLXX16]. RPSL10, RH10, SA12, Ser12, SVY19, SLZ12, Semantics [CM11, Gli12, KGP12]. Semi SY15b, SYWX19, Sir16, Sta11b, Tan17b, [AAA+19, BDOZ11, KKK+16, SEK+19, TODQ18, Tay19, THA+13, TKG+17, WHZ12, XZLW15, PGLL10]. UUN11, VCK+12, WCFW18, XCL13, Semi-automated [KKK+16]. YLL+18, YY17a, ZAAB17, Zha15a, Semi-Autonomic [SEK+19]. Semi-Fragile vdWEG18, XW12, YKC+12, Bar12]. [AAA+19, WHZ12, PGLL10]. Security-Aware [LJP17, LMS16, GHD19]. Semi-homomorphic [BDOZ11]. security-enhanced [AMN18]. Semi-trusted [XZLW15]. Seminary security-modified [MM14b]. SEDURA [SS10c]. semirings [Dur15]. Sender [LY15]. see [PZ15]. Seed [WZ15]. Sensational [YGFL15]. sense [AS17, LYHH14, Sun11]. seeing [Tox14]. [Kem11]. Sensemaking [HGOZ19]. seen [Goo12, PWS+19b]. Segment Sensing [WOLP15]. Segmentation [CCZC13, Kar12, MJS+19, PWS+19b, [WYW+13, ZZCJ14]. selectable [GLM+11]. uHAN+18, RPG12, XWZW16, Fay16]. Selected [DDS12, Dan12, MV12, BYL10, Sensitive JY14, LH10a, vDKS11, JY14, MV12]. [Kaw15, RQD+15, Tan15a, QCX18]. Selection [KO14,¨ KD12a, KD19, RP12, Sensitivity [YGD+17, LWW+10]. Sensor SEY14, YKA16, DRN16, FXP12]. Selective [ABC+17, BN14, CS14, DS11, KH10, LLC11, [BTHJ12, GDCC16, JSA17, LW12, LSC+15, LLZ+12, NNAM10, NYR+14, OKG+12, LZC12a, LLH18, PWS+19b, LZC14, LW13c]. PX13, PCPK14, RWLL14, SP15b, YM16, Selective-Opening [LLH18]. Self ASO14, APK+18, AIB+16, AIKC18, ADF12, [Cer18, CLL16, CHHW12, CSV15, DM18, BNNH19, BLAN+16, BBB16b, CDGC12, HZ11, LCL+17a, LLPY19, LH12, LHM14, CLSW12, DSCS12, DLN13, HKA+18, PRGBSAC19, RCK17, SAA15, SM12, TAP19, HTC+10, JNUH17, JMW+16, KLC+10, WHZ12, XWXC14, ZLDC15, AGH+17, KO16, KLW+16, KDW+17, LC17, LNK+18b, FXP12, HL14, LT13, LH13, SH11, YN19]. PL16, RR17, SZMK13, SKK10, Wan13, Self-adaptive [LHM14, FXP12, SH11]. WW14, WDV18, WXK+17, XWDN12, Self-authenticating [Cer18]. XMHD13, ZYGT17, ZYL+10]. Sensors Self-Authentication [LH12, LT13]. [DM19, DL12, LIK+17, OMPSPL+19]. Self-Certified Sensory [SGC14]. Seoul [LH10a, LW11a]. [CLL16, XWXC14, HL14, LH13, YN19]. Separable [LLSL19]. Separating self-composition [AGH+17]. [RCBK19]. separation [MJS13]. Sequence Self-Controllable [ZLDC15]. Self-Defense [PFS12, WGZ+12]. Sequences [RCK17]. Self-Identifying [CSV15]. [ADD10, Kla10, NN12, XNP+18, XYXYX11, Self-Recovery [SAA15, CHHW12]. HLC12, VM14]. Sequential Self-restoration [WHZ12]. Self-Sovereign [GLR10, GLR13, HWZZ19, LLY15, TLZ+17, [TAP19]. Self-Synchronized SM19a, WYL13]. serial [MCRB19]. Series [DM18, PRGBSAC19]. Self-Synchronizing [BJL16, EKOS19, Die12]. Serious [AG18]. 80

Serpent [PC16]. serpentine [KKM11]. [AAE+14, Con17, SKP15]. SHA-256 Server [App15, MAK+12]. SHA-3 [AV18, BCO13, Che15, GMSV14, LSQL18b, [ABM+12, jCPB+12, LC17, Mor19a, NIS15]. LNWZ19, LYL15, MV19, YLW13, ATKH+17, SHA1 [Con17, SBK+17]. SHA256 BK19, BBDP16, CSD18, CLHJ13, FA14b, [GWM16]. SHA3 [FLYL16b]. Shadow FHZW18, HDPC13, HL14, ISC+16, [Kap11]. Shadows [YSC+15, SLXX16]. KMTG12, KLW+17, LXMW12, LH13, Shafi [Gol19]. SHAIP [HRK18]. Shakes MHL18, SY15b, hSZZ15, SSAF11, SSS11, [CNR14]. Shamir TLL12, WT10a, XHM14, YN19, YY13]. [BDSG+13, UUN11, WKB16]. Shannon Server-Aided [AMS+10]. Shape [GMSV14, LNWZ19, MV19, LYL15, SSAF11]. [HFW+19, RITF+11, SY14, Pet11]. Shapes Server-Designation [Che15, LSQL18b]. [CJFH14, LMHH14, SY14, SGS14, ZZCJ14]. Server-Side [BCO13]. Servers Share [LTC+15b, GJJ18, ZPWY12]. [HWZP18, DRD11, KKD+18, PABC´ +19, shareable [XWY+18]. Shared SG19a, WLWG11]. Service [BKBK14, [DRD11, LNXY15, NSP+18, OKG+12, CCS14, GGK18, GKG19, Hay13, LDB+15, TYK+12, XJR+17, YJSL18, GEAHR11, LBR12, MJW+18, NRZQ15, RSGG15, LDC13, Par18, PZPS15, SA12, TG12, SPG+19, SSPC12, Sti15, VS16, VFFHF19, YYS+16, YNX+16]. shared-secret [SA12]. AaBT16, AAH+19, HK17, KPP16, LHL+18, Shares [BLU+15, CFOR12, KU14, SA16a, LW13a, MMP19, MLM16, Par12b, SVY19, WY12, AIM+19, LJY16]. Sharing Wu17, YWK10b, ZX11, CWZL13, YCM+13]. [Bai10, BFM12, BBEPT14, CCM+15, Service-Based [LDB+15]. CFOR12, CCL+13, CCT+14, CLW16, DR12, Service-Oriented [RSGG15]. Services EM12, FHKP17, FR16, HYS11, HL10a, [Ano11b, DLZ+16b, JP19, MEFO12, OO12, HRS13, HLT+15, KU14, KOTY17, KSSY12, PSM+18, ZHL15, AZPC14, Bel18b, KS15, LYZ+13, LPL15, Lin15, LCCJ13, CXX+19, CAM19, CSD18, CHX13, DYZ+15, LTC+15b, LLKA19, NS12, Oba11, PSM17, GAI+18, IMB17, IG11, LWYM16, LZD+19, QZZ18, QJC+18, SC10, SSU12, SZZT18, MSL13, NDSA17, NZL+15, ODK+17, PP11, TLW12, TWZ11, WYCF14, WKB16, WDKV19, XXX15, YJC18]. Session WGF16, WHLH17, XNKG15, XZY+12, [BS12, BKJP12, CFST17, SHS12, AN15, YFF12, YWZ+12, ZC13, AKK+17, ADH17, BCFK15, DCAT12, DGMT19, SHBC19]. CD16a, CT11b, CW14a, CLC+19, EZ15, Session-Based [BKJP12]. Set EA11, FGMP12, GPLZ13, GJMP15, [Cor14b, EKP+13, RS17a, YZ12, Con12, GLW13, GLB+18, GBC19, HF14a, GR19b, TMK11]. set-valued [TMK11]. HBBRNM+16, HCCC11, HLC12, HYF18, SETI [Sch16a]. Sets [GL19, SPK17, SF12]. KFE19, KI11, KTUI16, KPB17, LXLY12, Setting [BKLS12, HHP17, MZHY15, Ma17a, LH11a, LT13, LFWS15, LAL+15, LyWSZ10, TYM+17, XXZ12, ZHL15, Kom18, MML16]. LHYZ12, LHL15, LLL+18, LEW19, LL16a, Settings [GA19, GZ12]. Setup Mas17, OO10, OO18, QD16, Rao17, [KZZ17, SOR16, Jia16]. SEV [BWS19]. SAR18b, TD14, UUN11, UUN13, WLWG11, Seventh [CS10]. Several WMC17, WXMZ19, WHZ+19, WDZ19, [HLC+19, Sas12, ZT14]. SGX WLS14, WKH11, WS12, WOLS12, YC11, [MZLS18, TSB18, WBA17]. SHA [AAE+14, YCC16, ZCL+12, ZZ15, ZPWY12, SLL10]. ABM+12, App15, jCPB+12, Con17, LC17, Shell [WZCC18, YSS14, Tay14]. MAK+12, Mor19a, NIS15, SKP15]. SHA-1 Shemanske [Gre19a]. Shenzhen [IEE11a]. 81

Shield [NDG+17, KGV16]. Shift WLH15, WYML16, WHLH16, XLQ09, [AKP12, TAP19, ZH15, KKM11, LWK11]. XGLM14, Y+17, YHK+10, YMWS11, Shift-Type [AKP12]. Shifting YLA+13, ZJ14, ZLH+12, ZSY19, AGHP14, [YWW10, CSS+13]. Shih [Joh10]. Shilling CLSW12, CCG10, Con17, DZ14, DXWD16, [CZ19]. Shopping [AHS13]. Shor DLN13, HYWS11, Hwa11, JZS+10, [JL18, MNM+16]. Short LHM+10, LDZ+14, LWZG10, LL16b, Nos14, [BHG12, CWWL12, FR15, NR12, SKV12, QYWX16, QMW17, QCX18, RSM15, WQZ+16, XGLM14, JSMG18b, LLY15, SLM10, VS11, WSC14, XLWZ16, YWL+17, LJY16, RD17, ZPWY12]. Short-Output YLS12, YKC+12, ZLY10]. signature-based [NR12]. Shorter [H¨ul13, PPB16, TH16]. [DLN13, QMW17]. Signatures Should [Bel15, Eve16]. shown [Ana14]. [Ano15a, ABC+17, AYS15, BBC+13, shows [Goo12]. Shparlinski [Sha10]. BDFK12, BHH+15, But17, DMO+19, Fuc11, Shredder [AMH+16]. Shredding GY13, GdM16, HHS18, HS18, H¨ul13, [AMH+16]. SHS [Ano12]. Shuffle [HMR12]. HRS16, HBG+17, MKF+16, MCF17, shuffler [BVIB12]. Shuffles [CKLM13]. MKAA17, Orm16, PST13, TH16, Ver17, shunned [Ree15]. Sicily [Cra12]. Side WCD19, YT16, ASVE13, AYSZ14, BDL+11, [AMMV18, AN17, Bar16b, BCHC19, BCO13, BPP10, GCH+19, GMS11, HAGTdFR13, Bul18, CFE16, CDK+10, CBL13, CATB19, Her14, LLY15, LJY16, PPB16, SEXY18, DZS+18, DMWS12, DKMR15, EWS14, Tia15, ZQWZ10, Mou15]. Signcryption GZSW19, GWM16, GPT14, KOP12, [CMA14, DZY10, FZT13, FZT14, IL15, LWML16, LFK19, NDC+13, PRC12, SG15, LSL12a, LSQZ17, LSQL18a, Rao17, RSD19, SR12a, Vua10, YL17, ZBPF18, BVIB12, RMZW19, XQL11, YY17b, ZM18, ZYD10, CAM19, DJL+12, GSAV18, MCL+19, ZGCZ18, EZ15, HPY10, HS11, KL11, MFH13, SG19a]. Side-Channel LYW+10, LK12, LZT12, LKAT12, LLH17, [AMMV18, Bar16b, BCHC19, Bul18, CBL13, YMSH10, LHL15]. Signed [KWH16]. CATB19, DZS+18, EWS14, GWM16, signer [Hwa11]. Significant [KTM19]. GPT14, KOP12, LWML16, NDC+13, PRC12, Significantly [CBL10]. Signing SG15, YL17, ZBPF18, DMWS12, GZSW19, [YAM+15, GLL16, JC13]. Sigsaly [Pau19]. LFK19, BVIB12, GSAV18, MFH13]. Sided SIKE [KG19]. Silent [AMH+16]. Silver [HP14]. Sieve [VM14]. sieving [SD17]. [McG16]. Silverman [Mei10]. Silvio SIFT [KLY+12]. Sign [Gol19]. SIMD [SD17]. SIMD-based [ACC+13, LL15, MEFO12, SPM+13]. [SD17]. similarity [ZFH+18]. Sign-On similarity-aware [ZFH+18]. [ACC+13, LL15, MEFO12, SPM+13]. Signal [LYK19, AMKA17, BSS+13]. Simple [GDLL18, Kar12, BLL+19, MS13b, [Ano13e, CZF12, EKOS19, LYY+18b, Ros11, RITF+11]. Signals [Fyo19, LJK17, Sar10b, Sma16, SD18, TDTD13, ZH15, XNRG15, AIA+18a, AIA+18b]. Signature Zim10, CLM+12, Cas15, MMS17c]. Simpler [Ano13c, ABF12, ASS15, AEHS15, BHG12, [TH16]. Simplified [PS12]. Simpson BDH11, CZCD18, CLND19, CGY+13, [Sim10]. Simulating [Eng15]. Simulation EFGT18, FGM10, FR15, GJJ15, GJZ17, [CPS16, KHRG19, LLH18, MS13a]. GMSV14, GHY18, HZX15, HPO+15, Simulation-Based [KHRG19, LLH18]. HHP17, H¨ul13, HP17, JL16, LK18, LTH+15, simulations [Ana14, GQH17]. LDZ16, LYY+16, LGPRH14, MMN12, Simultaneous [YWZ+12]. Singapore NXB13, PH12b, ST16, TTH15, WZXL12, [Abe10]. Single 82

[ABK13, ACC+13, LL15, MEFO12, Sas12, [LFH18]. smartwatches [NM18]. smashed SPM+13, CJXX19, GMMJ11, MCRB19]. [Fag17]. Smith [Ano16i]. Smooth single-factor [GMMJ11]. [LYY+18a, XYXYX11, YC11, ZBR11]. SMS single-generation [CJXX19]. Single-SP [KRM+10, LH11a, PSdO+13, PCK19, [Sas12]. Singular [LSL12b, BWA13]. sins RVS +18]. SMS4 [LYL+18]. SMSCrypto [HLV10]. SIP [KKGK10, ZTZ16]. [PSdO+13]. SMSes [SNG+17]. smuggle SIP-based [ZTZ16]. SIPF [SYC+17]. Site [MSL13]. Snake [BBDP16]. Snakes [PC16]. [DSB15, SS10c]. siteDriverID SNOW [PC16]. Snowden [Tox14]. SNUSE [SGGCR+16]. Situ [GRRZ18]. Situated [DEL19]. SoC [HZS+19, GSC17, ZAAB17]. [KTM+18]. situations [BDM+19]. Size Social [BPSD17, GB19, KTA12, NSA15, [AS17, AEHS15, CJ13, CSW12, EAA12, NRZQ15, PYM+15, Rog16, SKGY14, Kim15, LCLL15, LSQX19, MTY11, WCXZ17, SZZT18, VKK+19, WLY+15, WZCH19, YM19, ZMW16, AHL+12, LCT+14, ZW15, Zha15b, ZHL15, AQRH+18, BDK11, PPTT15, SGM16, SHBC19, ZWY+19]. HYF18, LCM+17, LZC17, MSM+18b, Size-Constrained [EAA12]. SNG+17, SKS+18, Smi15a, WMC17, [FLS+10, KNR10]. Skill [SCMS18]. Skin WXMZ19, YZL+18, vdWEG18]. Society [AQD12]. [CJZ13]. Skipjack-like [ATD17, Sch15a, Sch12b]. Socio [NS12]. [CJZ13]. skyline [BKV13]. Skype [DJ19]. Socio-Rational [NS12]. SoD [VN16]. Soft Slantlet [TK14]. Slicing [MZ17b]. Slide [Her19, Jin10, TLCF16, SS17a]. Soft-Error [IOM12, LC13]. Sliding [TLCF16]. Softw [WZM12a]. Software [BBG+17, Bro17, Win17]. SLISCP [Bar15, Bee17, BCHC19, EWS14, [ARH+18a, ARH+18b]. SLISCP-light FHLOJRH18, GZSW19, KYEV+18, [ARH+18a]. SLMAP [HCETPL+12]. Slow LRVW14, MRL+18, MV16a, Seo18, [Smi11b]. SLV [AV18]. SM2 [ZSH+19]. SAM+18, TLZ+17, YGD+17, ZPM+15, Small AGHP14, ABF+14, CFH+13, DK17, Eve16, [BGJT14, BKLS12, BB10, CJ13, HJ19, GGH+16b, GIJ+12, HLV10, KHF10, Kim15, LCLL15, NR15, WCXZ17, YM16, LBOX12, SF12, YWT+12]. YT16, AAT16, BGJT13, Jou13, MZ15, PT19]. Software-Defined [KYEV+18, SAM+18]. Smart [AN17, ABCL17, BNMH17, BD18, Solan [CGB+10]. solid [Cri16]. Solution BSJ15, DLZ+16b, HXHP17, HCL+14, HK18, [DHT+19, Fra15, GSFT16, HLKL15, Kam13, LFH18, LA10, MFG16, PDT12, VJH+18, NA10b, YFT17, YFT18, Cor14a, MDHM18, WgMdZlZ12, WgMW12, AMN18, BC16, SVGE14, ZAAB17, SAM+19a]. Solutions Bel18b, CHS11, CLHJ13, DZC16, GHD19, [Ano19c, BCHL19, LLGJ16, BLV17, KAS15, GAI+18, Ham19, HRK+19, HCC10, JZU+19, MMP19, OMPSPL+19, TKG+17, WW14]. LH10c, LNM+11, LXMW12, LNKL13, solve [Pec17]. Solved [IBM13a]. Solving LNK+18a, LZD+19, LWK+19, LTC+15a, [Ano17c, BB10, Hod19, Bul10a]. Some MM12, MCN+18, SSSA18, SYWX19, [AD12, Ber12, Dur15, LWL10b, Mid10]. WMYR16, YZZ+14, YSL+10, YY13, someday [And19]. Somewhat ZGL+18b, ZDHZ18, ZZY+19, Cho10, [HTC17, KOS16, MBF18, RJV+18]. Song GLIC10, SD12]. Smart-Card-Based [Cou12b]. Sood [MWZ12]. SOSEMANUK [HCL+14]. SmartEdge [JZU+19]. [PC16]. SOT [PAF18]. SOT-MRAM Smartphone [MDMJ17, uHAN+18, DL15]. [PAF18]. Sound Smartphones [COP+14, Gol19, HCYZ18, LSR13, Sav15]. [Cor14b, GSAV18, MWW+18]. Smartwatch Source [Bis17, FKOV15, MBC15, RWLL14, 83

ABF+14, LZC17, PX13, Pow14]. [Tan12a]. Split [CG14a, XZY+12]. Source-Based [MBC15]. Sourced [Lal14]. Split-State [CG14a, XZY+12]. Splittable Sources [DHB16, BJ16, SSY12]. South [CP13]. Splitting [MV19]. SPN [LCLW17]. [BL10, LW11a]. Sovereign [TAP19]. Soviet Spoken [WBC+10]. Sponge [Bud16]. SP [ARH+18a, BDP11, BDPV12]. [IEE15, CJZ13, Sas12, SEHK12]. SP/SPS Sponge-specific [ARH+18a]. [CJZ13]. SPABox [FGR+17]. Space SPONGENT [BKL+13]. spongy [RS14]. [BWR12a, BKL+13, NYR+14, Raz19, Spoof [SP15a]. spotty [O¸¨ S11]. Spread RMG18, BCGS16, Kum10, MSM+18b, [HGT15, KD12a, PSJ+13, TWZ+12, RYF+13, ZZ15]. Space-Filling [BWR12a]. XNRG15, XNP+18, LWY12, MMSD13]. space-hard [BCGS16]. Spaces spreadsheets [LT13]. Springer [SH15, YJC18]. spacial [DZC16]. spam [Mei10, Mur10]. Springer-Verlag [Mei10]. [SKEG14]. Spanish [Pet11, SGGCR+16]. Springs [IEE11b]. Spritz [RS14]. SPS Sparse [CJZ13]. Spy [AGW15, AAT16, BBC+13, PMG19a]. [AHS13, FKOV15, Bha16, Goo12]. Spying SPARTA [MMS+17a]. SpartanRPC [VWC19]. SQL [BS13a, Suc12]. [CS14]. Spatial [AV12, CZF12, PDMR12, [ARH14]. Squares [KO14].¨ Squashing ZWZ17b, CW14b, NZL+15]. [GH11a]. SRAM [KLM+12]. SSD Spatiotemporal [DIMT12, CXX+19]. [LGLK17, MPA+18]. SSH Speaker [BJCHA17, PPRT12, RSR+19]. [YSS14, Cri16, Lit14, Ran10, der10]. SSL Special [Ano13f, Ano16b, Ano16c, Ano16j, [BJR+14, Dav11, FHM+12, GIJ+12, Ano19a, AB10b, AHWB20, BCHL19, HREJ14, NPH+14, PP11, Tay19]. SSL/TLS BdD19, CWZL13, CSYY18, GO17, LW13a, [BJR+14, Dav11, PP11]. SSL/TLS-based LLK18, MMKP16, PHWM10, XW13, [PP11]. SSO [MLM16]. St YYW19, Zor12]. Specific [DDS12, Dan12, MNS11]. ST-Numbering [BD15, BDFK12, KME+12, ARH+18a]. [MNS11]. stack [JSM+18]. stage [Mas17]. Specification stakeholders [RR16]. STAMP [WPZM16]. [HZS+19, Int19, SK11, CWZL13, SD10]. Standard [Ano12, Ano13c, App13, Specifications [BMP12]. ABC+17, BCM12, BV11, BV14, CT18, [LFW+16, AMKA17, BSS+13]. Spectrum GJJ15, GJZ17, HZX15, LYX+19, LK18, [KD12a, TWZ+12, XNRG15, XNP+18, LDZ16, Loe15, MVVR12, NIS15, OGK+15, KPB17, LWY12, MMSD13]. RSD19, SZS14, TCL15, WWHL12, Yon12, Spectrum-Based [TWZ+12, XNRG15]. ZC13, BCM13, HTC17, Kim11, LZT12, Speech [AGW15, LJK17, SAA15, YMA17]. LL16b, Mas17, TS16a, WZM12a, WZM12b, Speed WWBC14, YC12, ZCL+19, AEH17, [ARM15b, GL12, HZ11, KP17, LTKP16, MKRM10, NdMMW16, SJ19]. MSR+17, BDL+11, KFE19, KL13, SD17]. Standardization [TRD11]. Standards Speeding [RVRSCM12]. Speedup [Che18]. [BCM+15, Che17, DHW+13, NIS13]. start speedy [FG19]. SPEKS [Che15]. spell [Rom11]. starts [Sch16a]. State [Bha16]. Sphere [Sti19]. SPHINCS [BVS+13, BLM17a, BLM17b, But17, CG14a, [BHH+15]. Spies CCL+13, CHS15, Dew11, DP17, FHR14, [Has16, Keb15, Fag17, Mac14]. SPIHT LLK18, MKF+16, OMNER19, Sen17, [SS17b]. Spin [Fyo19]. Spintronic WGD18, XZY+12, YM18, BBDL+17, CK11, [IGR+16]. Splicing [YSC+15]. Spline CGH17, Ham12, Mid10, QD16, Sir16]. 84

Stateful [BVS+13, NTY12, VKPI17, CDLW19, DKL+19, GLG12, HSM14, VSR12, YLL+18]. Stateless HLC+18, JSCM17, K¨up15, LCK11, LMD16, [BHH+15, GM11, MKAA17, NTY12, LWCJ14, LCDP15, PBC+17, QLL17, VDO14, BBDP16, DCAT12]. SKH17, WHLH17, XNKG15, YZDZ19, Stateless/Stateful [NTY12]. statement YJSL18, ZDL12, ZVG16, AY14a, AKK+17, [NIS13]. Static BP10, CFVP16, CFZ+10, CLH+16, [DKMR15, IF16, Lan11, TLMM13]. Station CDF+10, CDL18, ED19, FH13, FNWL18, [LSY+16, Smi11a]. stationary [ZLDD12]. GLB+18, HSM13, LBOX12, SLL+19, Sar10a, Statistical [B¨oh10, Bro11, DBPS12, HZ11, SYY+17, SWW+16, SWW+17, WS13, Hey17, LTKP16, OOR+14, SP13, Sim15a, XWK+17, XYML19, YYS+16, YZCT17, GMT+12, SA19]. Statistical-Attack YJC18, ZYC+17, ZVH14]. store [KV19]. [SP13]. Statistics [gWpNyY+14]. Stored [CMLS15, RSN14]. Stores Statutory [PH12b]. Stealing [BCK17, GYW+19]. stories [RWZ12, VWC19]. Stealthy [BRPB13]. [Smi15b, ZMYB17]. Storing Steering [HR13]. Steganalysis [DLWW11, HK19, LZC17]. storm [ACM12]. [B¨oh10, DA12, Fri12, JHHN12, KD12b, Story [Cer14, Keb15, Ald11, Fag17, Gre17, LJK17, LC15, SGP+12, Tan12a, YLL+12, Hea15, Kus13, Mac14, Mun17, Pea11, Pet11]. YI14, YPRI17, BS11, LHM13, LSQ11a, Strand [SH15]. Strange [Acz11, Gre17]. LSQ11b, Sch12a]. Steganalysis-Resistant Strangeness [Ber12]. Strategic [Sch12c]. [YPRI17]. Steganalytic [Ber18, YPRI17]. Strategies [DSSDW14, DSSDW17, TJZF12, Steganographic YCM+13, AZF+12, DRN16, WWW17]. [DA10, HHS+15, LyWlZZ12, WP15, Strategy [LH12, NRZQ15, FLZ+12]. AGLW16, LLC10, CAC14]. Stratix [SMOP15, SMOP15]. Stream [AAA+19, AGW15, BCG12a, CLF11, FR16, [ABS+12, BMS12, CMLS15, DM18, FMS12b, Fri10a, Fri12, HZW+14, Joh10, DGFH18, DG12, DGlS12, DJG+15, KTM19, LJK17, LLY+12b, MAL10, GKSB17, GCS+13, HZ11, Hey17, IOM12, PDMR12, Pau10, SK12a, SR12b, TJZF12, KE19, KPC+16, Kla10, MD12b, MHC12, WWL+14, WYL18, YWYZ12, YWW10, MS12b, NN12, PNRC17, WH18, WHN+12, ZSA12, AOT13, BS11, BDK11, BHCdFR12, ZH15, Die12, KM10a, LWK11, LW13b, EEAZ13, GKCK11, KKK+18b, LyWSZ10, MRT10, OCDG11, QGGL13, RS14, SM19b]. LRW13, LRW17, LWW+10, Maz13, StreamCiphers [ERRMG15]. Streaming MSM+18b, MS17, PHN+12, PMG19a, [BSA+19, ZSA12, Cri16, XWZ+18, ZC12]. SAM+19b, SI12, ST15, Sun16, WKH11, Streams WOLS12, ZMS14]. StegNet [WYL18]. [PCDG14, PWS+19b, HM10, PYP10]. Stego [YLL+12, SMSK18]. Stego-Image Street [Gli12, KGP12]. Street-Level [YLL+12]. Stellenbosch [BL10]. step [Gli12, KGP12]. Strength [AKY13, YXA+18]. Steps [Ano13e]. [DM15, FHV16, Spa16]. Strengthen [BL12]. Stereotypes [S¨od13]. Stern [ACD18]. Strengths [XNP+18]. Stribog [AY14b]. STES [CMLS15]. Steven strikes [Ran10]. string [FHV16]. Strings [Ano16a, Led16, Sch15a]. Still [SKE+18]. Strong [ADD10, KFOS12, [RAZS15, UK18]. Stochastic [ADR18]. PYM+15, SA19, SAA12b, Yon12, GH15, stolen [Bha16]. Stopping [Sav13a]. GH16, HYWS11, NCL13, OYHSB14, SVY19, StopWatch [LGR14]. Storage WLZ+16, YLL+18, AYSZ14]. StrongBox [BCQ+13, CWL16, CCT+14, CLW16, [DGFH18]. Stronger 85

[Boy16, ZYY19, MvO11, RK11]. Strongly Supervised [DDM17, HHP17, KW14, YS12]. Structural [CTC+15, GSAMCA18, HXHP17]. Supply [LYY+18b, BDK11]. Structure [QZL+16a, QZL+16b, YFT17, YSF+18, [CJZ13, HP12, KD19, LMHH14, LJ15, YFT18]. Support LLG19, MKRM10, WYCF14, WJ19, CD16a, [MSI18, ZZQ+19, CZ14, HHAW19, JAS+11, JKA+18, LXLY12, SM19b, ZLW+12, MMF15, PWW10, PKA15, TTL10, VCK+12, ZPWY12]. Structure-Independent ZMM+10, ZBR11]. Supporting [BHH19, [MKRM10]. Structure-preserving CDLW19, FMTR12, HGOZ19, HCDM12, [LLG19]. Structured [PMZ12]. Structures PH16, SG12, SOR16, Ver17, ABR13, HZL18, [GTT11, HHH+13, LHKR10, LPL15, PB12, JSMG18b, YYS+16, CWZL13]. supports TSB18, DDFR13, MHKS14, PPG19, Shy15, [WR15]. Surfaces [Sch19b, CDSLY14]. WS12, XWZ+18, ZZ15]. STT [VDB+16]. Surprises [Bow11]. Surreptitiously Students [PP10a, SDC+17, SPG+19]. [SFKR15]. Surveillance [BPR14a, BPR14b, Studies [Uto13]. Study GZH17, KLK+19, Lan10, Ano16h, Fei19]. [AIF+19, Ano17c, DDR+16, MZLS18, Survey [AAUC18, ACKB19, ABHC+16, SY15a, SPG+19, STC11, CCG10, EBFK13, ABB+19b, BGN17, BCTPL16, BHJP14, KD18, MHV15, SS17a, VGN14]. Stuxnet BJCHA17, CLB19, DM19, GN16, GMDR19, [BPBF12, Kus13, Zet14]. Style HPC10, KMY18, KSD+17, LGM+16, [GHPS12, GHPS13]. Stylistic [GA19]. MR14b, MSM18a, MSI10, MKK17, NDR+19, stylometry [BAG12]. sub [GPLZ13]. NV10, OFMR16, OMNER19, PGLCX17, sub-passwords [GPLZ13]. Subcommittee PWS19a, SKH17, SSP19, TRD11, TS16b, [Bla16]. Subgroup [CCL+19]. Subject VV18, AAZ+16, ABB+14, ADH17, BM13, [SC19a]. subliminal [LWZG10]. BGG+13, BEB+18, FMA+18, HKA19, submarines [McG11]. subnormal HT13, HAGTdFR13, KJN+16, KAS15, [AKM+15]. Subrecursive [BBD19]. LK10, MMP19, MA17b, Maz13, MHV15, Subscribe [BGP+17, DLZ+16b, OFMR16, NR11, PPA18, TZTC16, TKG+17, VBC+15, PRSV17, SLI11, TKR14, YSM14]. Subset WWW17]. Survival [YCM+13, MMS+17a]. [BS14, RP12, AVAH18, ZZ11]. subspaces Surviving [CFST17]. suspect [der10]. [ZWM14]. Substituted [HD19]. sustainability [KPB18]. SVC Substitution [MU12, WDDW12, ZLDD12, ZLDD14]. [DA10, KTM19, SGFCRM+18, FVK17]. SVD [AM19, FYD+19, LP12, TB18, substitution-transposition [FVK17]. ZWWW17, ZWZ17a, ZWZ17b]. SVM Substring [MRR+18, SOR16]. [TLL13]. swarm [ZSMS18]. Swarms substructure [MRT10]. success [Ano14a]. [VOGB18]. SWIFT [PLCGS11]. Switching Succinct [BCI+13, CKLM13]. Such [CNT12, GHPS12, GHPS13, WB12, [Roh19]. sufficient [TD14]. suitable YWYZ12]. Sybil [AQRH+18, dCCSM+12]. [Jeo13, SKB+17]. Suite Sybil-precaution [AQRH+18]. Sylvester [MTM18, NACLR12]. sum [AVAH18]. [SS10b]. Symbol [CS10]. Symbolic Sumo [BS12]. Sums [SS12b]. sun [Cer15]. [BCEO19, BCEO20, Bul18, CBRZ19, Wat10]. Super [Sch19b, BCND19, MZ17a]. Symmetric super-activation [BCND19]. [BPR14a, BPR14b, BDPS12, CVM14, FPS12, Super-Isolated [Sch19b]. Superpoly GFBF12, JCHS16, KTT12, Kha10, MM17b, [HIJ+19]. Supersingular PR12, PCY+17, TWZ11, WRP70, YKNS12, [FHLOJRH18, Lau17, LNL+19, Y+17]. BGG+13, CGKO11, DLZ16a, FH13, 86

GMRT+15, GMdFPLC17, Gor10, GCVR17, HXC+11, HCL+14, HLN+10, HK18, KS18a, HK19, KAS15, LZC17, SKK10, ZCZ+19]. KLK+19, LYY+18a, LMD16, LQY10, LY16, Symmetric-Key [CVM14, KTT12]. LNZ+13, MT17, MR14b, MJS+19, OS12,´ symmetrical [RS17c]. Symmetry [SGS14]. PGLCX17, PMG+19b, PRSV17, PH16, Symposium [ACM10, ACM11, Ano10a, QZL+16b, RST15a, RST15b, SBS+12, IEE10, IEE11b, IEE13, IEE15, MSH+16, SBS18, SSKL16, SFKR15, Sev16, SKH17, TBL19, TT18, Wat10, Ano11a]. symptom SGC14, SDM+12, STC11, SSP19, TKR14, [YZL+18]. symptom-matching [YZL+18]. YNR12a, AT10, ATI+10, BK19, BGE+18, SYN [DHT+19]. Synchronization BDL+19, CFVP16, CFZ+10, CLZ+17, Cla18, [BL12, VTY18, WXY+17, yWXyZ+18, dCCSM+12, dCCSB+16, CGH11, CVG+13, AATM18, WDG19, XNG+14]. CDA14, DEL19, DZS+12, Eis10, FXP12, Synchronized GMOGCCC15, GHD19, GSN+16, [DM18, PRGBSAC19, ACM12]. GPVCdBRO12, HZWZ18, JSK+16, JHCC14, Synchronizing [HZ11]. SYND [MHC12]. KSA16, LCL+15, LWK+18, MDHM18, Syndicate [HM19]. Syndromes [BBC+13]. MLMSMG12, MGP10, MFH13, NLYZ12, Synergy [KRB12]. Synergy-Based QMC17, SS10a, SR10, SRB+12, SMS+16, [KRB12]. Synopses [RCBK19]. Synthesis WDG19, WS14, YSM14, ZAAB17, ZGL+18b, [SKE+18, TCMLN19, RS17c]. Syst ZVH14, Zhu13, MA17b, MMKP16, Ano11a]. [HYS18, WZM12a]. System Systems-on-Chip [KS18a]. Systolic [ADI11, Alz19, Ano10a, BBCL19, BD18, [MCDB12]. Systolic-Array [MCDB12]. CZLC12a, CZLC14, Cor14b, CRST15, SZK [MX13]. DDE+19, DG15, GOPB12, Har16, HHS+15, HZS+19, IAD10, JN12, JLZ18, JWJ+17, T [SJWH+17]. T-Chain [SJWH+17]. Table Jin10, KMP+11, KZZ17, LYX+19, LFX+18, [CCL+13, AY14a, LDDAM12]. Tables LSY+16, LHW18, Lop12, MMBS19, [PTT16, XHM14]. Tackling [USH19]. Tag MLBL12, NSMS14, PSSK19, QLL17, [NNAM10, PPH12, CJP15, SPLHCB14, RSCX18, SMSK18, SRAA17, SLI11, XZL+19, CJP12]. Tags [MO12, HSH11, HDPC13, YE12, YZX+12, YKK18, ZZM17, ZPW16, HQY+16, KNTU13, LEW19, MK12a, ZLDC15, ZVG16, AHM+18, ARG19, BC18, PLSvdLE10, TG17, WCFW18]. Tailored BGG+13, Bul10a, CH11, CTL12, CZ14, [Kni17]. Taipei [Yan11]. Taiwan [Yan11]. CS11, FLYL16b, FNWL18, GKCK11, GH15, Takes [Ano16d]. Talking [FD11]. Talks HHBS18, HWK+15, HJM+11, HLYS14, [McG16]. Tamed [NXB13]. taming JC13, KGP+19, LLLK10, LLL+17b, LHH+18, [BBDL+17]. tamper [CBJY16, KKK+18b, Lit14, LTC+15a, LLL+18, LZKX19, MS12a, MN10, NC13, WgMW12]. tamper-evident MNNW15, PSOMPL13, SSPL+13, WMX+17, [MN10]. Tamperable [ACM+17]. WDZ19, WGZ+12, XWZW16, XYML19, Tampered [SSA13]. Tampering YZL+18, YWZ+18, ZCZQ19, ZYGT17, [ABSSS19, CG14a, QJC+18, SRAA17, ZMM+10, ZML17, ZZL+18, KKA14, Dew11]. HYL+19, SGP+17]. Tangible [LFH18]. System-Level [BBCL19, JWJ+17]. TAO [Sta13]. Taormina [Cra12]. Tap System-on-Chip [HZS+19]. Systematic [NM18, ADG16]. Tap-based [NM18]. taps [CCG+16, CBL13, PC16, IAA+19]. Systems [GSAV18]. Target [AMSPL19, AN12, AEP18, AB15, Ano19a, [CZ19, APMCR13, HRS16, LSQ15]. BL15, BL16, BS13b, BCTPL16, BB10, CZ19, target-driven [APMCR13, LSQ15]. CWL16, CCF17, CRE+12, DLZ+16b, GI12, Targeted [ABJ13]. Tasks 87

[Abe12, FKS+13, LJP17, CL16]. Taxonomy ZCZQ19, ZCL+19, Ano16i]. Testable [AJA16, GAF+15, KMSM15, HAGTdFR13, [RMP10]. Testbed [BNNH19]. tester MA17b]. Taylor [Joh10]. Tc [XLC+19]. [RPSL10, SY15b]. Testing [BCG19, Cou12b, Tc-PEDCKS [XLC+19]. TCC DB16, SS12a, AY14a, BJR+14, GR19b]. [Cra12, Lin14b, Sah13]. TCP [DHT+19]. Tests [GLG12, MS12b, Sim15a, YM18]. TEA [CWP12]. Teaching [GY13, SCMS18]. Texas [IEE13]. Text Team [LJS+14, Pfl10, Ant14]. Tear [Boy16]. [GA19, GdM16, SMSK18, XZZ18, CR12, Tear-Free [Boy16]. TEASE [ZBR11]. tech HAK19, SI12, SWW+17, ZMYB17]. [Ano15e]. Technical Text-dependent [GdM16]. Textbook [Sir16, TS16b, Wag16, Bon19, JW14, Suc12]. [PP10a]. Texture [TSH17]. textures Technique [NSX+18]. thanks [CBL10]. Theft [HEK18, KBL11, ZLDD14, BBBP13, [Ber12, Ber17, BTPLST15, ZMYB17]. Their CPPT18, GCSAddP11,´ LH11a, Nam19, [CZLC12b, CK18, FVJ19, HR19, JS18b, SM12, ST15, SKS+18, TS16a, ZWS+18]. JSK+17, NR12, ZYY19, CQX18, FLYL16a, Techniques Hof16, IK15, KK10, Mat19, Sti11]. them [Bis17, DA12, GOS12, HPC10, HL10b, KD19, [HLV10, JSK+16, Nor17, Rus15]. LW12, Mor12, PJ12, VV18, AB10b, BM13, Theological [SS10c]. Theorem FGPGP14, Gil10, HT13, KHF10, LH11b, [Lau12, HF14a]. Theorem-based [Lau12]. OO18, SM19a, VN17, WMX+17, Joh10]. Theoretic Technologies [ADH19, CVM14, MAL10, WSS12, [ATD17, GB19, Int19, RC18, SJZG19, CDGC12, GLM+19, SD10, SKEG14]. JAE10, JAS+11, Lan10, MMP19, Ano16a]. theoretical [KL13, ZZ15, Gas13]. Technology [Ano19c, AHWB20, CGB+10, Theoretically [TWZ11, DGL19]. Theories Eya17, Fol16, IEE11a, MZLS18, TBY17, [ABR12]. Theory VFS+19, Wu16, Ham19, IMB17, Pec17]. [ACM10, ACM11, AAUC18, CCKM16, telecare [LWK+18, MA17b]. telephone CDFZ16, CDFS10, Cra12, FGM10, FBM12, [GMMJ11]. telephony [Cla18, SKEG14]. FS15, Gre19b, Hes12, LW11a, Lin14b, Nac12, Telepresence [NSP+18]. teleprinter Per13, PJ12, RZ19, RBHP15, RST15a, [GMT+12]. Television [DTE17]. Tell RST15b, Sah13, SAKM16, Sha10, Shp03, [Cer14, Pec17]. Template Wes16, Yan10, Abe10, AB10b, Bul10b, [NGAuHQ16, SKV12, YYK+17, AJYG18, CFR11, Gil10, LPZJ15, MZA+13, McG11, ATI+10, GCSAddP11,´ SC19b]. Templates YTM+14, Cra12, Lin14b, Sah13, vDKS11]. [DWB12, AHM+18, AGBR19, LH14, QLZ19]. theory-based [LPZJ15]. There temporal [Cer15, NSP+18, McK10, McK11, SM13]. [DZC16, JMW+16, MHT+13, XMHD13]. Thin [Chi16, JLX+19]. Thin-client temporal-credential-based [JLX+19]. things [FQZF18, AAC+16, [JMW+16, XMHD13]. Tenant [TV15]. AKS19, BCHL19, Bel18b, CLF+17, Tensor [FYD+19]. Terabit [LGP19]. CCMB19, FREP17, FMA+19, GMDR19, terahertz [WW13]. Term HKA+18, Ham19, HZL18, JKAU19, [SKV12, vdG17, CFVP16, VBC+15]. KHRG19, LNK+18b, LW19, LGH+17, termination [SRB+12]. TERMinator NLLJ12, NLY15, PLGMCdF18, SB17, [MTM18]. Ternary [ADI11]. Test SXH+19, SS19, SYv+19, VWC19, WCCH18, [CHH+19, HTC+15, JEA+15, LLSW16, XLC+19, YCT15, ZDHZ18, ZSY19]. Third MZHY15, SS10b, WH18, WZCH19, HTC17, [jCPB+12, OSH16, QZL+16b, Sen10, BL10, 88

ED19, K¨up13]. Third-Party Time-area [Nov10]. Time-Delay [OSH16, QZL+16b]. Third-Round [LFX+18]. time-invariant [GMdFPLC17]. [jCPB+12]. Thirteen [AP13]. Thomas Time-Memory [ASBdS16]. Time-Series [Gre19a]. thou [BDK11]. Threat [BJL16, EKOS19]. Time-Space [Raz19]. [CSYY18, ALL+18, Ven14, ZMYB17]. Time-Specific [KME+12]. Time-Spread Threats [AJA16, ERLM16, GSC17, LJS+14, [HGT15]. Timed vdG17, TKG+17]. Three [Jia14b, KFOS12, Tan15a, Unr15, WSS12]. [AMSPL19, CZ15a, HXC+11, LLY+18, Timed-Ephemerizer [Tan15a]. LZC+12b, OSANAM19, PC16, Shi11, Timed-Release [KFOS12, Unr15, WSS12]. YKNS12, AIB+16, CNF+18, HWB10, IC17, Timing [BGN17, FDY+19, GV14b, Hay13, JKL+16, LNK+18a, LNK+18b, LML+13, LGR14, LFK19, VCD16, YDV19, AKM+15, Tso13, TKHK14, XCL13, YC12, YZZ+14]. AGH+17, MCL+19, SRB+12]. Tiny Three-Dimensional [LLY+18, LZC+12b]. [ZOC10]. Titan [PP10b]. Titan-R [PP10b]. Three-Factor TLS [AV18, AP13, BBDL+17, BFCZ12, [AMSPL19, HXC+11, AIB+16, IC17, BJR+14, CFN+14, Dav11]. TLS-based JKL+16, LNK+18a, LNK+18b]. [PP11]. TMDTO [MSS+18]. TNFS [FK19]. three-party [HWB10, LML+13, Tso13, Today [Ber16b, Cla18, Mac12]. Toeplitz TKHK14, XCL13, YC12, YZZ+14]. [Ye10]. Token [TYK+12, ZM16, IMB17, Threshold [CT11b, Cil11, FGM10, GLW13, Jac16, OMPSPL+19]. token-based [Jac16]. HEP+11, HYS11, LWL10b, LYY+16, SSU12, Token-Leakage [ZM16]. tokenisation Sta12, Tan11, WYCF14, WLH15, XLQ09, [Mar10b]. tokenless [Wat14a]. Tokens YFF12, YHK+10, YLA+13, ZCL+12, DZ14, [Muf16, DCAT12, HU15]. Tokyo [Sah13]. FGMP12, HF14a, HH15, JSMG18b, LJY16, Tolerant [HK14b, MKK17, WCD19, ZM16, OO10, QD16, SES+16, Shy15, SGM16, BZD16, JLT+12, WMYR16, XW13]. TD14, ZXJ+14, ZPWY12]. thresholding tolerating [ZWM14]. Tone [Yam12]. To o [PC14]. thrive [Sch12b]. Throughput [DL15, DSSDW14, DSSDW17, Ros11]. To ol [HMKG19, MAK+12]. Thru [ASM12, DKMR15]. Toolbox [SYC+17, SYW17]. Thwart [LJS+14]. [AHS13, TRD11]. Toolkit [BJL12]. Tools Thwarting [LWML16, XTK10]. Ticket [Abe12, BKBK14, GO17, Ste15a, Lan11]. [XHCH14]. Ticket-based [XHCH14]. Top [SS12a, SS10c, Sta13, CHX13]. top- tickets [LMJC11]. tied [Men13b]. Tiered [CHX13]. Top-Fanin [SS12a]. Top-Secret [GGK18]. Ties [PYM+15]. Tight [SS10c]. Topics [SCPSN10a, SCPSN10b, [GDCC16, LPS12, LLH18, ZYH+19]. AB10b, Dun12b, Kia11, Pie10]. Topology Tightly [HLLG18]. Time [HHMK14]. Topology-Preserving [AEP18, ASBdS16, Ano17d, App14, AYS15, [HHMK14]. Tor [LLY+12a]. Toronto BBCL19, BJL16, Che17, EKOS19, FD11, [MV12]. torsion [HR19]. Tossing GSC17, HC17, HGT15, IF16, JWJ+17, [ALR13, DSMM14, Fok12, BB14]. Touch JEA+15, KME+12, LCL+17a, LFX+18, [KTM+18, MWW+18, SPW+16, SHBC19, MWES19, NA10a, Nov10, PNRC17, Raz19, Alp18, CTL12, IAA+19, NSBM17, TZTC16]. RHLK18, Ste15b, WLZL12, YE12, AY14a, touchstroke [Alp18]. TouchWB Ano15d, BM15, CC14, DCAT12, FHH10a, [MWW+18]. Tower [ZAG19]. TPM GPLZ13, GMdFPLC17, HU15, LW10, [GY13, KHN+11]. TQC [vDKS11]. Trace LW13b, LML+13, MK11, NSX+18, Par18, [ABR12, GA19, PS14, AA14, WGJT10]. SPK17, WDG19, XLC+19, Ano16i]. Traceability [HCETPL+12, WYML16, 89

WHLH16, YFT17, Chi13a, YYS+16]. [CCW+10, XTK10, ZHS+19, CRS13, JDV16]. Traceable [LDZW19, QRW+18]. Transport [RBHP15, TW14]. Traceable-then-revocable [LDZW19]. transportation [SMS+16]. transposition traceback [LWY12, PJ18, WYL13]. traces [FVK17]. Trapdoor [MYYR13]. Tracing [BKPW12, CCL+19, CBJX19, CWWL12, [LW16, PPS12b, WXL+17, MFH13, PPR+12]. Mat14, RPSL10, CSZ+11, CW12a]. Track [Dun12b, Kia11, Pie10]. Tracking treatment [YSM14]. Tree [GZH17, MDMJ17, SNCK18]. Trade [BS14, CCC19, HSH11, XWZ+18, BW13, [ASBdS16, BS14, GPR+19, SR10]. BBB16b, CD16a, CFG+17, SCBL16]. Trade-Offs Tree-based [HSH11]. Trees [ASBdS16, BS14, GPR+19, SR10]. Tradeoff [SB18, BTPLST15]. Trends [WDDW12, MV16b]. Trading [TW12]. [Fri12, GCK12, ZMS14, JAE10]. Triangular Traditional [SSP19]. Traffic [AMVZ12,´ RR16]. Tricks [GY13]. Trigger [BSA+19, DRS16, FGRQ18, HS18, [SS19]. trimmed [TTL10]. TRIMS KAHKB17, VV18, ACMP19, AZH11, [MGP10]. Triple [LW13b, MS12a]. FTV+10, PPR+12, Tay19, VS11]. triple-base [MS12a]. Triple-image traffic-feature [FTV+10]. Training [LW13b]. Triplet [JS18b]. triumphant [HM12, GSAMCA18]. Traitor [McG11]. Trivium [MS12b, SR12a]. [LW16, PPS12b, Bha16]. trajectory TRNGs [YKBS10]. Trojan [NDC+13]. [LVRY10]. Transaction Trojans [BRPB13]. True [BGAD12, MMLN15, KVvE18, OYHSB14]. [FRT13, LTKP16, Fag17]. TrueCrypt Transaction-based [BGAD12]. [Ano14c]. TrueErase [DMS+16]. Truly transactional [SPK17]. Transactions [LA10]. Truncated [KWS+12, WW12]. [DG15, Mic16, Muf16, PAS13b, TV15, DK12, Trust [Bar15, BL16, BCK17, DCA19, Gli12, FG19, MLMSMG12]. Transceiver GM14, GSFT16, HHBS18, IGR+16, [NBZP17]. Transcript [Gli12]. Transfer KMSM15, KGP12, PYM+15, PH12b, [AMSPL19, DN12, FMTR12, HL10a, PAS13b, Rau15, SG12, TMGP13, TV15, LCCJ13, WCL+18]. transferable WLY+15, Zha15b, BSBG19, CO11, KGO10, [GZXA19]. Transform [AN12, BCPV11, MLMSMG12, MGP10, Sch12b, YT11a]. KTM19, LSL12b, pNyWyY+14, OWHS12, Trusted [AWSS17, EAA12, FPY15, SS15, SM12, YWNW15, BW13, MO14, NES+14, YCR16, ED19, HTC+10, K¨up13, SPD+10, PC14, ST15, TK14, yWpWyYpN13]. XZLW15, YI17]. Trustworthiness Transformation [RSX18, WXSH19]. trustworthiness-based [CRE+12, FJHJ12, NXB13, TFS19, [WXSH19]. Trustworthy tWmC12, GZHD12, HQZH14, PGLL10]. [PSM+18, KM10b]. Truth [MJS+19]. try transformations [CJXX19, SA14]. [Nor17, YK16]. Try-CybSI [YK16]. Trying Transforming [Eya17]. transition [CK11]. [YK16]. TTP [ATK11]. TTP-free [ATK11]. translation [ABR13, CLY18, WSS+19]. TTPs [KGO10, TAKS10]. Tulip [JB11]. transmission [AK14a, BCDN17, BCND19, Tunnel [VDB+16, ZBR11]. Tunnel-based OSANAM19, PSdO+13, WQZ+13]. [ZBR11]. tunnels [Cri16]. Tunny Transmissions [CBO+18]. Transmitter [Cop10a, GMT+12]. Turing [KPB17]. Transparency [TJZF12]. [Orm16, Bl¨o12, Car10, CS12, Don14, Hai17, Transparency-Orientated [TJZF12]. Hel17, KSU13, LCKBJ12, Pro15]. turns Transparent [Bre18]. Turtle [WZCC18]. Tutorials 90

[Lin17]. Tutte [Hai17]. TV [CCSW11]. [OHJ10, TM12]. un-traceability [Chi13a]. Tweakable [CMLRHS13, LST12, MLCH10, unaided [CAM19]. Unattended [BN14]. MKASJ18, Sar11, Zha12]. tweet [BTW15]. unauthentic [MLMSMG12]. twelve [BCV12]. twice [BM15]. TWINE Unauthorized [CBO+18]. Unbounded [KDH13, LYD+18, TY16b]. TWINE-128 [LW11c, YZ12]. unbreakable [LYD+18]. Twins [Bow11]. TwistIn [Bha16, Pau19]. Uncalibrated [SGP+12]. [LFH18]. Twitter [AIF+19]. Two uncensored [Ald11]. Uncertainty [Ash14, ATC17, Bru12, CTL13, DZ14, ED19, [FHS13, BBGT12]. Unclonable [Ano16f]. GGHR14, GLW12, HL10b, HP14, HWB10, Unconditional [Jia14a]. Unconditionally KMTG12, KOS16, KU12, LLC11, LW19, [CFOR12, LHF12, SNJ11]. Lit14, NSMS14, OTD10, YSL+10, YLW13, Unconditionally-Secure [CFOR12]. ZM16, AN15, BD18, CSD18, CHS11, Con17, Unconstrained [GEAHR11]. uncorrelated DHW+13, FIO15, GMMJ11, HZW19, [MSM+18b]. Uncovering HPC12, HWDL16, HWB12, JLT+12, [FMS12a, WBC+10]. Undeciphered JMW+16, Kem11, Li10, LM14, MDHM18, [Rao10]. Undeniable [BHG12]. McG11, NMX15, OMPSPL+19, QYWX16, Underbelly [Her19]. underfeeding Rus15, SM10b, hSZZ15, WW14, Wat14a, [BBBP13]. underhanded [Cra14]. YT11b, ZZC15, GHKL11]. two-channel Understanding [JLT+12]. two-dimensional [HZW19]. [Elb09, EPAG16, PP10a, Bar12]. Two-Factor [LLC11, ED19, LW19, Lit14, Undetectable [CEL+19]. Undisturbed BD18, GMMJ11, JMW+16, Kem11, [YCL17]. Unexpanded [SA16a]. MDHM18, NMX15, WW14, Wat14a]. Unforgeable [HHP17]. Unidirectional Two-Party [Ash14, HL10b, HP14, KOS16, [LSC12, DKL+16]. Unified NSMS14, ZM16, FIO15, HPC12, HWB12, [HK17, ZSW+12, ABO+17]. Uniform ZZC15, GHKL11]. Two-Round [GGHR14]. [HZS+19, QJC+18]. uniformly [YKKL12]. Two-Server [YLW13, KMTG12, CSD18]. Unilaterally [GRL12]. Unintended two-way [LM14]. Twofish [MD12a]. TWS [Ess17, SS19]. union [BBDL+17, Bud16]. [OKG+12]. Type Unique [SSPC12, SOS15, GSGM16]. Unit [AKP12, CFL13, HWS+19, PFS12, SH15, [PP10b, Sta13, MS13a, MS13b, MS13c]. ACD18, BNST17, GJ19, SYL13, WB12]. unital [WMU14]. units [ABDP15]. Type-based [CFL13, SYL13]. Type-Flaw Universal [SH15]. Types [BCEM15]. Typing [ASM12, BKST18, BJL12, NR12, KS19]. [CCDD19, CCDD20, SCR19b]. Universally [DN12]. Universe [LW16, FNWL18, LFZ+17]. University U.S. [Maf16]. Ubiquitous [Ano17b, CGB+10, Wes16]. unlike [Goo12]. [HFS+19, OS16, Par12b]. UESDE [YZ12]. unlikely [Fag17]. Unlimited [IBM13a]. UHF [HQY+16, PPH12]. UK Unlocking [VS16]. unmanned [XWZW16]. [Che11, PJ12, vDKS11, Ano15e, Kum10]. unpaired [CLY18]. Unprovable [Pas13a]. Ukraine [OGK+15]. Ultra unsafe [Con17]. unsigncryption [EZ15]. [SBS18, AATM18, GW14, TG17, WCFW18]. unspoofable [NR11]. unstructured Ultra-Lightweight [CML16]. Unsupervised [CZ19, HFW+19]. [SBS18, AATM18, TG17, WCFW18]. Until [BWS19]. untold [Mun17, Pea11]. ultralightweight untraceability [KIH19, YHL16]. [ACM12, GMSW14, SB17]. UMTS untraceable [AIKC18, JMW+16]. 91

Untrusted [HZX+18, LQY10, MS16, FLYL16a, FHM+10]. uses [Rus15]. Using ATKH+17, DRD11, MvO11, WS13]. [AA19, ABS+12, ABB+14, Alz19, Ano15a, Updatable [LLPY19, LCL+17a]. Update Ayu12, ARM15b, BBC+13, BCPV11, Bee17, [BCE+10, KE19, LQY10, FS18, WLFX17]. BP06, BFMT16, BKLS12, BJR+14, CST+17, Updated [BWS19]. Updates [VOGB18]. CCC19, CCL+13, DSB16, DR12, DA10, updating [GCSAddP11,´ LJWY18]. Upper DBPS12, DL12, ERLM16, ERRMG15, [AMVZ12].´ URLs [AY14a]. USA EZW18, FHLD19, FMS12a, GWP+19, [Dun12b, IEE13, IEE15, Kia11, Lin14b, GH11a, GMdFPLC17, GM16b, GSC17, MSH+16, Pie10, Rab10, ACM10, ACM11, GAS+16, HEK18, HXHP17, HHS+15, HD19, IEE10, IEE11b, TT18]. Usability HWZZ19, IL15, JSA17, Jin10, JEA+15, [RAZS15, GMMJ11, KNTU13]. Usable KTM19, KBL11, KO14,¨ KHN+11, KG19, [DL15, RS19, TGC16]. Usage Lac15, Lan11, LYZ+13, LLY+18, LLGJ16, [HR19, NSP+18, AKK+17, BHCdFR12]. LCR+18, LBC18, MM17a, MBC15, Use [CSV15, DFKC17, IM16, KOS16, NR12, MRL+18, MS16, NIS12, NGAuHQ16, SD17, S¨od13, YT12, der10, CZ15b, Die12, NNAM10, NN12, NSMS14, PMZ13, PSS+13, EAAAA19, Fai19, Hof16, KK10, LDC13, PAF18, PDMR12, PDT12, PCPK14, RSX18, MBF+13, Mat19, OO10, PPG19, Sti11, RMERM19, RVRSCM12, RHLK18, SR12a, UK18, SG19b]. Used SFE10, SS17b, SS19, SSA13, SRAA17, SC12, [CGCGPDMG12, BM15, MS13b]. useful SR12b, Tan12a, TKR14, VJH+18, WWL+14, [dCCSB+16, Dya19]. Usenet [Bel18a]. User WgMdZlZ12, WHLH17, WY12, WAK+19, [BOP14, BLV17, BKJP12, FLH13, GMDR19, XNP+18, XZZ18, YM18, YWW10, GdM16, GMMJ11, Har16, HWZZ19, JN12, YWNW15, YWM19, YCL17, YSS14, ZH15, Kni17, LLC11, LCL17b, MZHY15, MBC15, ZWWW17, ZWZ17a, ZPW16]. Using MDMJ17, OdH12, PDT12, PWVT12, [ZS12, dRSdlVC12, ACMP19, AASSAA18, RVH +16, SOR16, SZDL14, SPM+13, ATKH+17, AHM+18, APK+18, ASVE13, VJH+18, VFFHF19, WgMdZlZ12, WgMW12, BK19, BLL+19, BOP14, BM13, CSH+18, WAK +19, ZHS+19, ZPW16, AaBT16, CHS11, CR12, CLHJ13, CBJY16, CP13, ATKH+17, APK+18, BT18, CH10, CHS11, Cri16, DA18, Dav11, DTZZ12, DGFH18, CLHJ13, DSCS12, DEL19, GH16, GTSS19, DMD18, uHAN+18, EEAZ13, FES10, HFCR13, HL12, HL14, JS18a, KLN15, GQH17, GR19b, GSAMCA18, GSAV18, KKM+13, KLW+16, KDW+17, LH10c, GSGM16, HAK19, Ham19, Har14, HK14a, LNM+11, LNKL13, LH13, MM12, MWW+18, HK17, HZWW17, HFCR13, HWB12, HL14, MML16, MHL18, NM18, OKG+12, SCFB15, HPY10, HCC10, HS11, JKA+18, JCHS16, SK18, SSNS15, hSZZ15, SPK17, SHBC19, JCL+18, JMW+16, KGP+19, KI11, KY10, VGL14, WLWG11, WDKV19, WT10a, KKG14, KCS+18, KM11, KKK+18b, KSU13, WOLS12, YHL16, YSL+10, YN19, ZWY+19]. KTUI16, KPB17, KD19, KLW+16, LXLY12, User-centric [BLV17]. User-controlled LLP+18, LC17, LH11a, LH10c, LNM+11, [Har16]. User-Friendly [SZDL14, WOLS12]. LXMW12, LH13, LZKX19, LM14, LML+13, User-Generated [LCL17b]. User-Level MM12, MMLN15, MS13a, MMSD13, [BKJP12]. user-participating [CH10]. MM14a, MKH+12, MRRT17, MSR+17, User-related [GMDR19]. User-Tailored MSM+18b, MGB19, NSX+18, NTKG17, [Kni17]. User-Transparent [ZHS+19]. NSBM17, PBCC14, PBP19, PC14, QD16, Users [DPCM16, KKA15, TAKS10, RR17, RS15, RS17c, SCFB15, SKE+18, WPZM16, ATK11, Bel18b, uHAN+18, Sar11, SM19a, ST15, SGFCRM+18, SKS+18, 92

SAR18b, SPK17, SLXX16, SA19]. using [EKOS19, RST15a, RST15b, VSR12, [SC19b, SCBL16, TLCF16, TG17, TK14, WWHL12, YMC+17, BRR+15, Hwa11]. TLL13, UUN11, yWpNyL11, gWpNyY+14, Verifiable [CFE16, CRST15, Fuc11, HYS11, WMX+17, WHJ17, XWK+17, YWJ+19, HLC12, HLC+18, KZZ17, LWW+19, YQH12, YZZ+14, YSL+10, YN19, ZZKA17, LLL+18, NJB19, QD16, RDZ+16, RS17b, ZLW+12, ZYC+17, ZXW+18, ZZL+18]. uth SZQ+17, XWLJ16, YNR12a, YCR16, [CHL19]. utilization [NZM10]. Utilizing GLM+19, LZY+16, LJW+17, MGB19, [BM18]. NMP+13, PHGR16, QS18, XWS17, ZZ15]. verifiably [SEXY18, ZLY10]. Verification V2G [BT18, TODQ18]. Validating [AV18, App15, ABR12, BCEO19, BCEO20, [GIJ+12]. Validation BL15, BL16, CCK12, CCCK16, CM11, [FPY15, KHRG19, vRDHSP17, BJR+14]. EWS14, Ess17, GLLSN12, GdM16, GMSV14, Validations [PDJ+19]. Validity [BCF16]. HZS+19, Lin15, MT17, MV16a, OS12,´ valuable [Ana14]. Value PNRC17, RSR+19, SOF12, TSB18, Tom16, [GYW+19, LSL12b, SZHY19, YWW10, Vet10, ZPW16, AGHP14, ABF+14, ASVE13, BWA13, KV19, Svo14]. valued BK19, BFG+14, BJ10a, BTW15, GPN+12, [BNA15, TMK11]. VANET HFCR13, KKK+16, LEW19, MR14c, [PZBF18, WLZ+16, Wu17]. VANETs NPH+14, SD10, XHM14, YNX+16]. [BMM12, CGCGPDMG12, CST+17, Verified [BFCZ12, YGS+17, HKA+18]. IOV+18, LLG15, MGB19, YMM13]. verifier [DGJN14, HYWS11, WHJ17]. Variability [VDB+16, SHBC19]. Variable verifiers [AYSZ14]. Verify [BCK17, [CHHW12, CMMS17, XNP+18, DTZZ12]. KRH18, SKGY14, KNTU13, SWW+16]. variable-interval [DTZZ12]. Variables Verifying [AD12, BFK16, GZSW19]. [BB10]. Variant Verlag [Mei10]. Version [AAE+14, MVVR12, ZXWA18]. Variants [BCP14a, Faa19, KO14,¨ DXWD16, ZDW+16]. [ASS15, BB10, HLC+19, Hin10]. Variation Versions [LWPF12, PS12]. Versus [DWZ12]. Variations [DSB16, SJZG19]. [DDR+16, NNA10, ABJ13, Svo14]. Very Varied [GZ12]. varieties [LR15]. Varying [BFM12, SBM15, YT16, Jou13, Kum10]. [GKCK11, BCDN17]. Vault [PBC+17, Via [ADR18, BSCTV17, ABC+18, AHG18, KHMB13, LYC+10, SC19b, TSB18]. VBF BHKN13, BCI+13, BCG19, BR14, Bul18, [ACZ16].´ VBTree [WL19]. VDTNs CBRZ19, CDSLY14, CFG+17, CLW16, [PSS+13]. Vector DM19, GT12, GST13, GVW12, Gre19b, [ACZ16,´ FHLD19, HHMK14, JHHN12, HFW+19, JHW+19, KKK+18a, LT13, Kaw15, RS17a, WK18, Zaj19, ZYT13, ZM16, LT14b, LFH18, LH14, LEW19, LLKA19, DWZ12, LLM+19, PWW10, TTL10, ZZ15]. MH14, Mor19b, PV17, PTK14, QZDJ16, vector-form [DWZ12]. Vectorial RS10, SE16, SSAF11, SKEG14, TBCB15, [DQFL12, FY11]. vectorized [DGK18]. WSS+19, tWmC12, YWF18, Yon11, ZOC10, Vectors [XLP+18]. Vegas [IEE10]. vehicle ZCZQ19, Zim10]. Vice [LMS10]. Vichy [WXSH19]. vehicle-to-vehicle [WXSH19]. [Kap11]. Vicious [NN15]. victory [Pea11]. Vehicles [LSY+16]. Vehicular Video [BWR12a, BSA+19, DG17, GKSB17, [HLKL15, ZHW+16, BBB19, KM10b, JSZS12, OS12,´ TWZ+12, WLZL12, YE12, SGGCR+16, WXSH19]. Vein [KLY+12]. YT12, YTF+18, Cri16, LLHS12, LK10, Velskii [BBB16b]. Ventilated [RSCX18]. MK11, OCDG11, PMG19a, XWZW16]. Vera [Ayu12]. Verifiability Video-based [YTF+18]. Videos 93

[AAA+19, GZH17, JSCM17]. Vietnam Waknaghat [CGB+10]. Walker [ABJ13]. View [RS16, TWZ+12, YCM+13, [Xie12a, Xie12b]. Wallets [Chi13b]. Wallis ZGC16, CWZL13]. View-Invariant [RS16]. [Wes16]. Wan [RSD19]. wants [Nor17]. Viewpoint [BMDT19]. Views War [Has16, Mun17, Bud16, Car11, Smi11a]. [VGA15, TG12]. Virtual Warbler [MFG16]. Warm [MCL+19]. [BCKP17, BR14, Cou12a, HB17, LBC18, warriors [Bud16]. wartime RY10, VDO14, CDA14]. Virtualization [McK10, McK11]. was [Goo12, LHA+12]. [CDD13, RC18, QZDJ16]. Watching [NSP+18]. Watermark Virtualization-Based [CDD13, QZDJ16]. [CHHW12, DLMM+18, EMW14, FR15, Virus [WOLP15]. visibility [FG19]. GRRZ18, Jin10, KBL11, LZC+12b, Visible [Cas10, HWYW14, LZC+12b, MCDB12, QJC+18, SJ12, YE12, ZS12, PCK19, WZLW13, Lin14a]. vision HB13, TLL13, WYL13]. [BSW12, LWW+10]. Vista [FG19]. Visual Watermark-Based [GRRZ18]. [BNA15, CSW12, GLW12, HHS+15, KU14, Watermark-Driven [DLMM+18]. KS15, Lal14, LPL15, LWL10b, LGWY12, Watermarking [AAA+19, BCGAPM12, LMHH14, LTC+15b, OTO18, SA16a, SC10, BF12, BCPV11, BDB14, BCG10, BBM15, Shy15, TWNC18, WY12, Yam12, ZXZ+11, CG12b, CHHW12, CCZC13, CHN+18, CT11b, CSTR16, DDD14, DD13, GJJ18, DG17, FM15, Fra15, Fra16, GKSB17, GP17, GLW13, HT11, LWL10a, MSM+18b, HPC10, HEK18, HD19, HGT15, HHMK14, WYK12, WS12, YSC16, YR11]. Visualizing JSZS12, Joh10, JKHeY12, KD12a, LSL12b, [Sav15]. VLSI [KB10]. VMOR [MSI18]. LLY+18, LP12, LD13, MM17a, MR16, Vocal [LCR+18]. Voice [JTZ+16, LCR+18, MU12, NGAuHQ16, NC12, NXH+17, WBC+10, LFGCGCRP14, TJZF12]. pNyWyY+14, OWHS12, RS16, RP12, RR11, Voice-over-IP [TJZF12]. VoIP [BGAD12, RMG18, SAA15, SLGZ12, SS17b, SSA13, Cla18, Maz13, SS10a, VGL14, ZTZ16]. TB18, TWZ+12, TC10, WHZ12, WLZL12, VoIP/IMS [VGL14]. Volatile WYW+13, gWpNyY+14, WXL+17, [AMH+16, JSA17, RM18, SM18, XZL+19, yWXyZ+18, WK18, tWmC12, XNG+14, YNQ15, CS11]. voltage [BBBP13]. XNRG15, XNP+18, YWNW15, YPRI17, VoltKey [LKBK19]. volume [WLDB11]. YKK18, YYO15, ZXZ+11, ZWWW17, voluntary [WGJT10]. Voting ZWZ17a, ZWZ17b, AP10, AIA+18a, [Ber16b, CFE16, CRST15, CEL+19, KV18, AIA+18b, AIM+19, AM19, AMK12, LHF12, LGPRH14, RST15a, RST15b, Sch10, BWR12b, BW13, BWA13, CCLL11, CT11a, KZZ17]. Voynich [Ano16e, Bax14]. CSS+13, GZHD12, GA11, HAK19, HKA+18, VPCLMULQDQ [DGK18]. VPMADD HURU11, HKB14, HWYW14, HPL+19, [KG19]. VQAP [TWNC18]. VR [WSS+19]. JK13, KMG17, KPS10, KJN+16, KM11, vs [Bur11, FKOV15, Mar10b]. LSR13, LXCM11, LLHS12, Lin14a, LWY12, Vulnerabilities MMSD13, MM14a, MO14, MK11, NC13]. [BKJP12, HSUS11, MAS16, PDT12, RY10]. watermarking Vulnerability [MKN13, TM12, VKC15, [PTK14, PWLL13, PWW10, PGLL10, Wal18, Ano17f, DMWS12, MYYR13]. PKS18, PC14, PPR+12, RS17c, SKS+18, Vulnerable [Ano15d]. vVote [CRST15]. Tay14, TK14, TTL10, TPKT12, WLDB11, yWpNyL11, Wan13, yWpWyYpN13, W [Mar10a, Xie12a, Xie12b, H¨ul13]. WZLW13, YWT+12, ZZKA17, ZSMS18]. W-OTS [H¨ul13]. WA [LCK11]. Watermarking-Encryption [SLGZ12]. 94

Watermarks [GL10, YT12]. WAVE GSGM16, Hea15, Kap13, McK10, McK11, [BMM12]. WAVE-enabled [BMM12]. McK12, Moo14, XTK10]. wi [BMDT19]. Wavelet [AGW15, KTM19, LSL12b, MR16, wi-fi [BMDT19]. Wicked [SGH15]. Ara13, AMK12, BW13, LXCM11, MO14, Widespread [HDWH12]. width [Kre13]. ST15, yWpNyL11]. Wavelet-Domain width- [Kre13]. Wiener [Kuz11]. Wigner [MR16]. wavelets [MMSD13]. Way [TC10]. Wild [ASV+18, HREJ14]. [BHT18, CBJX19, CPS16, DSMM14, Mat14, wildcard [HH16]. wildcards [DA18]. WCXZ17, HRV10, Kom18, LP11, LM14, Wilderness [Acz11]. Will RK11, SCBL16]. ways [MSL13]. WBAN [Mos18, Dya19, Fai19, Nor17, Pec17]. win [KS18b, XXCY19]. WBANs [Smi11a]. Window [KIH19, OSP+19]. Weak [TX16, Khl18, Win17, YWYZ12]. windows [BF11, DY13, HDWH12, HLC+19, PYM+15, [BBG+17]. Wine [Che17]. Wineskin Pud12, GJMP15, RH10]. Weakening [Che17]. wins [Ano16i]. wire [SFKR15]. Weaker [Sas12, Wan18b]. [ADG16, ZZCJ14]. wire-tap [ADG16]. Weakness [AMORH13]. weaknesses Wireless [ABC+17, BN14, BOB13, BCG10, [Nos11, Nos14]. weapon [Zet14]. Wear CBO+18, CKHP19, CS14, DPCM16, DS11, [LY15]. Wear-leveling [LY15]. Wearable FLH13, HZC+12, HBCC13, KH10, LLC11, [ASV+18, ATC17, BCTPL16, DM19, LHM+15, LZCK14, LWCJ14, LLZ+12, GWP+19, LCR+18, SSP19, XJR+17, NNAM10, PSM+18, PCPK14, RCW15, GTSS19, LIK+17]. Wearout [DFKC17]. RSD19, RWLL14, SWYP12, SP15b, web [GPN+12, IMB17, KRM+10, KGO10, TCN+17, YM16, ZLDD12, APK+18, MWW+18, YYK+19, ATKH+17, BS12, AIB+16, AIKC18, ADF12, BNNH19, BKJP12, CLB19, CTC+15, CFST17, CD12, BLAN+16, BEB+18, BBB16b, CDGC12, DR11, Fra16, HSC19, HGOZ19, HCM11, CML+18, CLSW12, CL11, DSCS12, HVP+18, NDSA17, QF19, SP15a, SPM+13, HKA+18, HGWY11, HZC+14, HZWW17, ZGC16]. Web-Based [CD12]. web-content HCCC11, HTC+10, HLYS14, JNUH17, [GPN+12]. WebCallerID [HCM11]. JMW+16, KP18, KO16, KLW+16, KDW+17, Website [Boy16]. Websites [RS11]. LC17, LMJC11, LNNH13, LIK+17, Webster [Pea11]. WECSR [DDS12]. Wei LNK+18b, LZZ19b, NDNR13, PL16, PY19, [SBS+12]. Weierstrass [LL11]. Weight QMW17, RR17, SA12, SGJ+18, SZMK13, [SWF+19, O¸¨ S11]. Weighted SM19b, SCKH10, SKK10, TKHK14, Wan13, [YLL+12, YTH17]. Welchman [GW14]. WW14, WMC17, WXK+17, XHCH14, Well [JCM12]. were [McK10, McK11]. XMHD13, YHHS16, ZYGT17, ZYGY18, Western [Han12]. WG ZBR11, ZCLL14, ZLDD14, ZHH+17]. [GLIC10, DJG+15, ERRMG15, ZAG19]. Wireless-Charging-Based [CKHP19]. WG- [ERRMG15]. WG-16 [ZAG19]. wiretap [BCDN17]. wiretapping [Lan10]. Where [CMG+18]. Wherefore [BDK11]. Wiring [HTZR12]. Wise [CG14a, SSA13]. whether [Bar19]. while [Nor17]. Whit WISP [PPH12]. Withholding [BRS17]. [LHA+12]. White within [HSC19, KLN15]. Without [BW16, BCGN16, LYL+18, Mic10b, [ASS15, CCL+13, FZT14, GSW+16, GKS17, SWF+19, DD13, YSC16, ZSW+18a]. LTC+15b, NA10a, XLQ09, YLA+13, White-Box [BW16, BCGN16, LYL+18, ARM15a, AZH11, BT12, BF11, BGV14, Mic10b, SWF+19, ZSW+18a]. Whitfield CCW+10, CJL16, CFG+17, DCA18, [Hof16]. who [Bat10, Bha16, Car11, Fag17, FSX12a, GH11a, GST12, GLM+16, REFERENCES 95

HDPC13, ISC+16, KZZ17, LLY15, LGWY12, [Ter11]. Par18, RG10, SYL13, SLZ12, TAKS10, WWYY11, XQL11, XHM14, YS12, YKC+11, Z [JSM+18]. z13 [ACD+15]. YFK+12, ZY17b, ZYM18]. Witness Zero [AMH+16, BSCTV17, BW12, CLP13a, [CXWT19, GGHW17]. Witness-based COP+14, FMA+19, GJO+13, GOS12, IW14, [CXWT19]. WLAN [KAHKB17]. woman LKBK19, LLM+19, MX13, MBC+18, MT12, [Fag17]. Women [Abb12, Hea15, McK10, OOR+14, Pan14, SJ12, WCL+18, YCL17, McK11, McK12, Mun17]. Word Zet14, AIA+18a, AIA+18b, CJL16, HKA+18, [WW12, SCR19b]. word-independent KPP16, [SCR19b]. Word-Oriented [WW12]. MDHM18, TLL13, WWBC14]. Zero- Words [GdM16, KM10a, SAM+19b]. Work Correlation [BW12, YCL17, WWBC14]. [Gol19, RS11, Shp10, Tay14, BG14, HPJ+19, Zero-Cost [AMH+16]. Zero-Interaction Sch15a]. workbench [CFH+13]. workflows [FMA+19]. Zero-Involvement [LKBK19]. [BPP10]. working [Wat14b]. Workload Zero-Knowledge [CLP13a, GOS12, IW14, [BCO13]. Workshop [MV12, Sen10, Yan11]. MX13, MBC+18, MT12, Pan14, LLM+19, Workshops [DDS12]. World KPP16, MDHM18]. Zero-Watermark [Ano16j, Ano17d, ABL+18, BFK16, BPS16, [SJ12, TLL13]. BLU+15, FKS+13, KM10c, LLK18, MDMJ17, zero-watermarking [AIA+18a, AIA+18b]. Tom16, Con12, GIJ+12, Goo12, LCKBJ12, Zheng [AHS14]. ZIDS [NSMS14]. Pec17, Pet11, Rom11, Sch15c, Zet14, Mun17]. [SDM10]. ZUC [WHN+12]. zur [Hom17]. world-class [Goo12]. Worm Zynq [ZAAB17]. [CWXW16, WWC+11]. Worst [BIKK14]. would [McG11]. Wrapped [KM15, KM16]. Write [LLPY19, YNQ15, ZHZ+19]. References Write-Efficient [YNQ15]. Writing Akyildiz:2014:OTB [DKL+19, LT14b]. wrong [LHA+12, UK18]. WSN [DL12, JLZ18]. WSNs [AA14] Ersan Akyildiz and Muham- [ARWK19, ABB19a, YLSZ19, ZYL+10]. Wu mad Ashraf. An overview [LLLK10]. WW2 [Don14]. Wyner of trace based public key [ADG16]. cryptography over finite fields. Journal of Com- X [Smi11a]. X25519 [TV19]. X9.98 putational and Applied [Ano11b]. X9.98-2010 [Ano11b]. XML Mathematics, 259 (part [BPP10, CH11, GA11, SM19b]. XMSS B)(??):599–621, March [BDH11, HRB13, HBG+17]. XOR 15, 2014. CODEN [App13, LZZ+19a]. XOR-Based [LZZ+19a]. JCAMDI. ISSN 0377-0427 XTEA [CWP12, IS12]. XTS [Mar10c]. (print), 1879-1778 (elec- xviii [Sch15a]. tronic). URL http:// www.sciencedirect.com/ Yamamoto [Car11]. Yan [Cou12b]. Yao science/article/pii/S0377042713005669. [GKS17]. YCbCr [RMG18]. Years Abouaroek:2019:NAU [DR10, BCV12]. Yehuda [Ful10]. Yen [LLLK10]. yoking [HLS18]. Young [S¨od13]. [AA19] Musaeed Abouaroek and Yuan [FMS12a]. YubiKey [Jac16]. Yves Khaleel Ahmad. Node au- REFERENCES 96

thentication using NTRU Concurrency and Compu- algorithm in opportunistic tation: Practice and Ex- network. Scalable Com- perience, 28(9):2567–2585, puting: Practice and Ex- June 25, 2016. CODEN perience, 20(1):83–92, ???? CCPEBO. ISSN 1532-0626 2019. CODEN ???? ISSN (print), 1532-0634 (elec- 1895-1767. URL https: tronic). //www.scpe.org/index. Ambrosin:2016:FAB php/scpe/article/view/ 1481. [AAC+16] Moreno Ambrosin, Ar- Aditya:2019:ISF man Anzanpour, Mauro Conti, Tooska Dargahi, + [AAA 19] B. P. Aditya, U. G. K. Sanaz Rahimi Moosavi, Avaneesh, K. Adithya, Ak- Amir M. Rahmani, and shay Murthy, R. Sandeep, Pasi Liljeberg. On the fea- and B. Kavyashree. In- sibility of attribute-based visible semi-fragile water- encryption on Internet of marking and steganog- Things devices. IEEE Mi- raphy of digital videos cro, 36(6):25–35, Novem- for content authentication ber/December 2016. CO- and data hiding. Inter- DEN IEMIDZ. ISSN national Journal of Im- 0272-1732 (print), 1937- age and Graphics (IJIG), 4143 (electronic). URL 19(3):??, 2019. ISSN https://www.computer. 0219-4678. URL https: org/csdl/mags/mi/2016/ //www.worldscientific. 06/mmi2016060025-abs. com/doi/10.1142/S0219467819500153. html. Applebaum:2017:AC Albertini:2014:MHE [AAB17] Benny Applebaum, Jonathan [AAE+14] Ange Albertini, Jean- Avron, and Chris Brzuska. Philippe Aumasson, Maria Arithmetic cryptography. Eichlseder, Florian Mendel, Journal of the ACM,64 and Martin Schl¨affer. Ma- (2):10:1–10:??, June 2017. licious hashing: Eve’s CODEN JACOAH. ISSN variant of SHA-1. In 0004-5411 (print), 1557- Joux and Youssef [JY14], 735X (electronic). pages 1–19. ISBN 3- Abo-alian:2016:KDB 319-13050-1 (print), 3-319- 13051-X (e-book). ISSN [AaBT16] Alshaimaa Abo-alian, Nagwa L. 0302-9743 (print), 1611- Badr, and M. F. Tolba. 3349 (electronic). LCCN Keystroke dynamics-based QA76.9.A25. URL http:/ user authentication ser- /eprint.iacr.org/2014/ vice for cloud computing. 694; http://link.springer. REFERENCES 97

com/chapter/10.1007/978- mally intrusive secure exe- 3-319-13051-4_1; https: cution environment. ACM //malicioussha1.github. Transactions on Embed- io/. ded Computing Systems,11 (3):60:1–60:??, September Ahmad:2019:PQE 2012. CODEN ???? ISSN [AAH+19] Awais Ahmad, Mudassar 1539-9087 (print), 1558- Ahmad, Muhammad Asif 3465 (electronic). Habib, Shahzad Sarwar, Al-Azzam:2018:SRC Junaid Chaudhry, Muham- mad Ahsan Latif, Saa- [AASSAA18] Saad Al-Azzam, Ahmad dat Hanif Dar, and Muham- Sharieh, Azzam Sleit, and mad Shahid. Parallel Nedaa Al-Azzam. Se- query execution over en- curing robot communica- crypted data in database- tion using packet encryp- as-a-service (DaaS). The tion distribution. Net- Journal of Supercomput- work Security, 2018(2):8– ing, 75(4):2269–2288, April 14, February 2018. CO- 2019. CODEN JOSUED. DEN NTSCF5. ISSN 1353- ISSN 0920-8542 (print), 4858 (print), 1872-9371 1573-0484 (electronic). (electronic). URL http:// www.sciencedirect.com/ Akdogan:2019:SKA science/article/pii/S1353485818300151. [AAL19] Dilara Akdogan, Duygu Karaoglan Akleylek:2016:SPM Altop, and Albert Levi. [AAT16] Sedat Akleylek, Erdem Secure key agreement Alkim, and Zaliha Y¨uce based on ordered bio- Tok. Sparse polyno- metric features. Com- mial multiplication for puter Networks (Amster- lattice-based cryptogra- dam, Netherlands: 1999), phy with small complex- 163(??):Article 106885, ity. The Journal of Su- ???? 2019. CODEN percomputing, 72(2):438– ???? ISSN 1389-1286 450, February 2016. CO- (print), 1872-7069 (elec- DEN JOSUED. ISSN tronic). URL http:// 0920-8542 (print), 1573- www.sciencedirect.com/ 0484 (electronic). URL science/article/pii/S1389128618313975. http://link.springer. Arora:2012:ILM com/article/10.1007/s11227- 015-1570-1. [AARJ12] Divya Arora, Najwa Aaraj, Aghili:2018:ISA Anand Raghunathan, and Niraj K. Jha. INVI- [AATM18] Seyed Farhad Aghili, Maede SIOS: a lightweight, mini- Ashouri-Talouki, and Hamid REFERENCES 98

Mala. DoS, impersonation S. L. M. Barreto, edi- and de-synchronization at- tors. Progress in cryp- tacks against an ultra- tology — Latincrypt 2010: lightweight RFID mutual first international confer- for ence on cryptology and in- IoT. The Journal of Super- formation security in Latin computing, 74(1):509–525, America, Puebla, Mexico, January 2018. CODEN August 8–11, 2010, pro- JOSUED. ISSN 0920-8542 ceedings, volume 6212 of (print), 1573-0484 (elec- Lecture notes in computer tronic). science. Springer-Verlag, Berlin, Germany / Heidel- Acar:2018:SHE berg, Germany / London, [AAUC18] Abbas Acar, Hidayet Aksu, UK / etc., 2010. ISBN A. Selcuk Uluagac, and 3-642-14711-9 (softcover). Mauro Conti. A survey on LCCN ???? homomorphic encryption Atallah:2010:ATC schemes: Theory and im- plementation. ACM Com- [AB10b] Mikhail J. Atallah and Ma- puting Surveys, 51(4):79:1– rina Blanton, editors. Algo- 79:??, September 2018. rithms and theory of com- CODEN CMSVAN. ISSN putation handbook. Special 0360-0300 (print), 1557- topics and techniques, vol- 7341 (electronic). ume 2 of Chapman and Hall/CRC applied algo- Alizadeh:2016:AMC rithms and data struc- tures series. Chapman + [AAZ 16] Mojtaba Alizadeh, Saeid and Hall/CRC, Boca Ra- Abolfazli, Mazdak Zamani, ton, FL, USA, second edi- Sabariah Baharun, and tion, 2010. ISBN 1- Kouichi Sakurai. Authenti- 58488-820-2. ???? pp. cation in mobile cloud com- LCCN QA76.9.A43 A433 puting: a survey. Journal 2010. URL http://www. of Network and Computer crcnetbase.com/isbn/9781584888208. Applications, 61(??):59–80, February 2016. CODEN Anand:2015:ICL JNCAF3. ISSN 1084-8045 [AB15] Kapil Anand and Rajeev (print), 1095-8592 (elec- Barua. Instruction-cache tronic). URL http:// locking for improving em- www.sciencedirect.com/ bedded systems perfor- science/article/pii/S1084804515002258. mance. ACM Transactions Abdalla:2010:PCL on Embedded Computing Systems, 14(3):53:1–53:??, [AB10a] Michel Abdalla and Paulo April 2015. CODEN ???? REFERENCES 99

ISSN 1539-9087 (print), buisschert, M. Dianati, 1558-3465 (electronic). N. Gisin, M. Godfrey, P. Grangier, T. L¨anger, Alwen:2017:TPA N. L¨utkenhaus, C. Monyk, [AB17] Jo¨el Alwen and Jeremiah P. Painchault, M. Peev, Blocki. Towards prac- A. Poppe, T. Pornin, tical attacks on Argon2i J. Rarity, R. Renner, G. Ri- and . In bordy, M. Riguidel, L. Sal- IEEE, editor, Proceedings vail, A. Shields, H. We- 2nd IEEE European Sym- infurter, and A. Zeilinger. posium on Security and Using quantum key distri- Privacy, 26–28 April 2017, bution for cryptographic Paris, France, pages 142– purposes: a survey. The- 157. IEEE Computer So- oretical Computer Science, ciety Press, 1109 Spring 560 (part 1)(??):62–81, De- Street, Suite 300, Silver cember 4, 2014. CODEN Spring, MD 20910, USA, TCSCDI. ISSN 0304-3975 2017. ISBN 1-5090-5761-7. (print), 1879-2294 (elec- LCCN ???? URL https: tronic). URL http:// //ieeexplore.ieee.org/ www.sciencedirect.com/ document/7961977. IEEE science/article/pii/S0304397514006963. Computer Society Or- Athmani:2019:EED der Number E6100. See [BDK16, BCGS16]. [ABB19a] Samir Athmani, Azeddine Bilami, and Djallel Eddine Abbate:2012:RGWa Boubiche. EDAK: An ef- [Abb12] Janet Abbate. Recod- ficient dynamic authenti- ing Gender: Women’s cation and key manage- Changing Participation in ment mechanism for het- Computing. History of erogeneous WSNs. Fu- computing. MIT Press, ture Generation Computer Cambridge, MA, USA, Systems, 92(??):789–799, 2012. ISBN 0-262-01806- March 2019. CODEN FG- 3 (hardcover), 0-262-30546- SEVI. ISSN 0167-739X 1 (e-book), 1-283-95309- (print), 1872-7115 (elec- 9. x + 247 pp. LCCN tronic). URL https:// QA76.9.W65 A33 2012. www.sciencedirect.com/ URL http://mitpress. science/article/pii/S0167739X17315388. mit.edu/9780262018067. Avoine:2019:SDB Alleaume:2014:UQK [ABB+19b] Gildas Avoine, Muhammed Ali [ABB+14] R. All´eaume, C. Bran- Bing¨ol, Ioana Boureanu, ciard, J. Bouda, T. De- Srdjan Capkun, Gerhard REFERENCES 100

Hancke, S¨uleyman Kardas, K. Werner. IBM 4765 Chong Hee Kim, C´edric cryptographic coprocessor. Lauradoux, Benjamin Mar- IBM Journal of Research tin, Jorge Munilla, Alberto and Development, 56(1): Peinado, Kasper Bonne 10:1–10:13, ???? 2012. Rasmussen, Dave Sin- CODEN IBMJAE. ISSN gel´ee, Aslan Tchamkerten, 0018-8646 (print), 2151- Rolando Trujillo-Rasua, 8556 (electronic). and Serge Vaudenay. Secu- rity of distance-bounding: Ateniese:2017:LCS a survey. ACM Computing [ABC+17] Giuseppe Ateniese, Giuseppe Surveys, 51(5):94:1–94:??, Bianchi, Angelo T. Ca- January 2019. CODEN possele, Chiara Petrioli, CMSVAN. ISSN 0360-0300 and Dora Spenza. Low- (print), 1557-7341 (elec- cost standard signatures tronic). URL https:// for energy-harvesting wire- dl.acm.org/ft_gateway. less sensor networks. ACM cfm?id=3264628. Transactions on Embedded Almeida:2013:CCA Computing Systems, 16(3): 64:1–64:??, July 2017. CO- [ABBD13] Jos´e Bacelar Almeida, DEN ???? ISSN 1539-9087 Manuel Barbosa, Gilles (print), 1558-3465 (elec- Barthe, and Fran¸cois tronic). Dupressoir. Certified computer-aided cryptog- Agrawal:2018:RLR raphy: Efficient prov- + ably secure machine code [ABC 18] Megha Agrawal, Tarun Ku- from high-level implemen- mar Bansal, Donghoon tations. In ????, editor, Chang, Amit Kumar Chauhan, ACM Conference on Com- Seokhie Hong, Jinkeon puter and Communications Kang, and Somitra Kumar Security, pages 1217–1230. Sanadhya. RCB: leakage- ACM Press, New York, NY resilient authenticated en- 10036, USA, 2013. ISBN cryption via re-keying. The ???? LCCN ???? URL Journal of Supercomputing, ????. 74(9):4173–4198, Septem- ber 2018. CODEN JO- Arnold:2012:ICC SUED. ISSN 0920-8542 [ABC+12] T. W. Arnold, C. Buscaglia, (print), 1573-0484 (elec- F. Chan, V. Condorelli, tronic). J. Dayka, W. Santiago- Ambrosin:2017:OBB Fernandez, N. Hadzic, M. D. Hocker, M. Jor- [ABCL17] Moreno Ambrosin, Paolo dan, T. E. Morris, and Braca, Mauro Conti, and REFERENCES 101

Riccardo Lazzeretti. ODIN: Thom´e, Luke Valenta, Obfuscation-based privacy- Benjamin VanderSloot, preserving consensus algo- Eric Wustrow, Santiago rithm for decentralized in- Zanella-B´eguelin, and Paul formation fusion in smart Zimmermann. Imper- device networks. ACM fect forward secrecy: how Transactions on Internet Diffie–Hellman fails in Technology (TOIT), 18(1): practice. Communica- 6:1–6:??, December 2017. tions of the Association for CODEN ???? ISSN 1533- Computing Machinery,62 5399 (print), 1557-6051 (1):106–114, January 2019. (electronic). CODEN CACMA2. ISSN 0001-0782 (print), 1557- Adrian:2015:IFS 7317 (electronic). URL https://cacm.acm.org/ [ABD+15] David Adrian, Karthikeyan magazines/2019/1/233523/ Bhargavan, Zakir Du- fulltext. rumeric, Pierrick Gaudry, Matthew Green, J. Alex Agosta:2015:OPP Halderman, Nadia Heninger, [ABDP15] Giovanni Agosta, Alessan- Drew Springall, Emmanuel dro Barenghi, Alessan- Thom´e, Luke Valenta, dro Di Federico, and Ger- Benjamin VanderSloot, ardo Pelosi. OpenCL per- Eric Wustrow, Santiago formance portability for Zanella-B´eguelink, and general-purpose computa- Paul Zimmermann. Im- tion on graphics processor perfect forward secrecy: units: an exploration on How Diffie–Hellman fails in cryptographic primitives. practice. Report, INRIA Concurrency and Compu- Paris-Rocquencourt [and tation: Practice and Expe- others], Rocquencourt, rience, 27(14):3633–3660, France, May 21, 2015. September 25, 2015. CO- 13 pp. URL https:// DEN CCPEBO. ISSN weakdh.org/; https:/ 1532-0626 (print), 1532- /weakdh.org/imperfect- 0634 (electronic). forward-secrecy.pdf. Abe:2010:ACA Adrian:2019:IFS [Abe10] Masayuki Abe, editor. Ad- [ABD+19] David Adrian, Karthikeyan vances in cryptology — Bhargavan, Zakir Du- Asiacrypt 2010: 16th in- rumeric, Pierrick Gaudry, ternational conference on Matthew Green, J. Alex the theory and application Halderman, Nadia Heninger, of cryptology and informa- Drew Springall, Emmanuel tion security, Singapore, REFERENCES 102

December 5–9, 2010. Pro- Manuel Barbosa, Jean- ceedings, volume 6477 of Christophe Filliˆatre, Jorge Sousa Lecture notes in computer Pinto, and B´arbara Vieira. science. Springer-Verlag, CAOVerif: an open- Berlin, Germany / Heidel- source deductive verifica- berg, Germany / London, tion platform for cryp- UK / etc., 2010. ISBN tographic software imple- 3-642-17372-1 (softcover). mentations. Science of LCCN ???? Computer Programming, Abe:2012:TBG 91 (part B)(??):216–233, October 1, 2014. CODEN [Abe12] Masayuki Abe. Tools SCPGD4. ISSN 0167-6423 over bilinear groups for (print), 1872-7964 (elec- modular design of cryp- tronic). URL http:// tographic tasks. Lecture www.sciencedirect.com/ Notes in Computer Sci- science/article/pii/S016764231200189X. ence, 7496:1, 2012. CO- DEN LNCSD9. ISSN Ananth:2013:SFP 0302-9743 (print), 1611- 3349 (electronic). URL [ABGR13] Prabhanjan Ananth, Raghav http://link.springer. Bhaskar, Vipul Goyal, com/accesspage/chapter/ and Vanishree Rao. On 10.1007/978-3-642-33272- the (in)security of Fis- 2_1. chlin’s paradigm. Lecture Notes in Computer Sci- Arriaga:2012:JSS ence, 7785:202–221, 2013. [ABF12] Afonso Arriaga, Manuel CODEN LNCSD9. ISSN Barbosa, and Pooya Farshim. 0302-9743 (print), 1611- On the joint security of 3349 (electronic). URL signature and encryption http://link.springer. schemes under randomness com/chapter/10.1007/978- reuse: Efficiency and secu- 3-642-36594-2_12/. rity amplification. Lecture Avoine:2016:SSP Notes in Computer Sci- ence, 7341:206–223, 2012. [ABHC+16] Gildas Avoine, Antonin CODEN LNCSD9. ISSN Beaujeant, Julio Hernandez- 0302-9743 (print), 1611- Castro, Louis Demay, and 3349 (electronic). URL Philippe Teuwen. A sur- http://link.springer. vey of security and privacy com/chapter/10.1007/978- issues in ePassport pro- 3-642-31284-7_13/. tocols. ACM Computing Almeida:2014:COS Surveys, 48(3):47:1–47:??, February 2016. CODEN [ABF+14] Jos´e Bacelar Almeida, CMSVAN. ISSN 0360-0300 REFERENCES 103

(print), 1557-7341 (elec- Bogdanov, Yehuda Lin- tronic). dell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Aid:2013:DIO Pagter, Nigel P. Smart, and [ABJ13] Matthew M. Aid, William Rebecca N. Wright. From Burr, and Thomas R. keys to databases — real- Johnson, editors. “Disrep- world applications of se- utable if Not Outright Il- cure multi-party computa- legal”: the National Secu- tion. The Computer Jour- rity Agency versus Martin nal, 61(12):1749–1771, De- Luther King, Muhammad cember 1, 2018. CODEN Ali, Art Buchwald, Frank CMPJA6. ISSN 0010-4620 Church, et al.: Newly (print), 1460-2067 (elec- Declassified History Di- tronic). URL http:// vulges Names of Promi- academic.oup.com/comjnl/ nent Americans Targeted article/61/12/1749/5095655. by NSA during Vietnam Andreeva:2012:SAS Era, volume 441 of Na- + tional Security Archive [ABM 12] Elena Andreeva, Andrey Electronic Briefing Book. Bogdanov, Bart Mennink, National Security Archive, Bart Preneel, and Chris- Washington, DC, USA, tian Rechberger. On secu- 2013. LCCN JZ5630. rity arguments of the sec- URL http://www2.gwu. ond round SHA-3 candi- edu/~nsarchiv/NSAEBB/ dates. International Jour- NSAEBB441/. nal of Information Secu- rity, 11(2):103–120, April Acar:2013:SPA 2012. CODEN ???? ISSN 1615-5262 (print), 1615- [ABK13] Tolga Acar, Mira Belenkiy, 5270 (electronic). URL and Alptekin K¨up¸c¨u. Sin- http://link.springer. gle password authentica- com/article/10.1007/s10207- tion. Computer Networks 012-0156-7. (Amsterdam, Netherlands: 1999), 57(13):2597–2614, At:2017:LAU September 9, 2013. CO- [ABO+17] Nuray At, Jean-Luc Beuchat, DEN ???? ISSN 1389-1286 Eiji Okamoto, Ismail San, (print), 1872-7069 (elec- and Teppei Yamazaki. A tronic). URL http:// low-area unified hardware www.sciencedirect.com/ architecture for the AES science/article/pii/S1389128613001667. and the cryptographic hash Archer:2018:KDR function Grøstl. Journal of Parallel and Distributed [ABL+18] David W. Archer, Dan Computing, 106(??):106– REFERENCES 104

120, August 2017. CODEN Bursuc, and Mark Ryan. JPDCER. ISSN 0743-7315 Privacy-supporting cloud (print), 1096-0848 (elec- computing by in-browser tronic). URL http:// key translation. Journal www.sciencedirect.com/ of Computer Security,21 science/article/pii/S0743731517300485. (6):847–880, ???? 2013. CODEN JCSIET. ISSN Archer:2016:MPP 0926-227X (print), 1875- [ABPP16] David W. Archer, Dan 8924 (electronic). Bogdanov, Benny Pinkas, and Pille Pullonen. Ma- Atighehchi:2015:NME turity and performance of programmable secure com- [ABR15] Kevin Atighehchi, Alexis putation. IEEE Security Bonnecaze, and Gabriel & Privacy, 14(5):48–56, Risterucci. New models September/October 2016. for efficient authenticated CODEN ???? ISSN dictionaries. Computers & 1540-7993 (print), 1558- Security, 53(??):203–214, 4046 (electronic). URL September 2015. CODEN https://www.computer. CPSEDU. ISSN 0167-4048 org/csdl/mags/sp/2016/ (print), 1872-6208 (elec- 05/msp2016050048-abs. tronic). URL https:// html. www.sciencedirect.com/ Arapinis:2012:RET science/article/pii/S0167404815000607. [ABR12] Myrto Arapinis, Sergiu Bursuc, and Mark D. AlMashrafi:2012:AIM Ryan. Reduction of equa- tional theories for veri- [ABS+12] Mufeed AlMashrafi, Harry fication of trace equiva- Bartlett, Leonie Simpson, lence: Re-encryption, as- Ed Dawson, and Kenneth sociativity and commuta- Koon-Ho Wong. Anal- tivity. Lecture Notes in ysis of indirect message Computer Science, 7215: injection for MAC gen- 169–188, 2012. CO- eration using stream ci- DEN LNCSD9. ISSN phers. Lecture Notes in 0302-9743 (print), 1611- Computer Science, 7372: 3349 (electronic). URL 138–151, 2012. CO- http://link.springer. DEN LNCSD9. ISSN com/chapter/10.1007/978- 0302-9743 (print), 1611- 3-642-28641-4_10/. 3349 (electronic). URL Arapinis:2013:PSC http://link.springer. com/chapter/10.1007/978- [ABR13] Myrto Arapinis, Sergiu 3-642-31448-3_11/. REFERENCES 105

Aldaya:2019:MTA 4/secure_channel_coding_ schemes. [ABSSS19] Alejandro Cabrera Aldaya, Arias-Cabarcos:2015:BIP Billy Bob Brumley, Alejan- dro J. Cabrera Sarmiento, [ACAT+15] Patricia Arias-Cabarcos, and Santiago S´anchez- Florina Almenarez, Ruben Solano. Memory tamper- Trapero, Daniel Diaz- ing attack on binary GCD Sanchez, and Andres Marin. based inversion algorithms. Blended identity: Perva- International Journal of sive IdM for continuous au- Parallel Programming,47 thentication. IEEE Secu- (4):621–640, August 2019. rity & Privacy, 13(3):32– CODEN IJPPE5. ISSN 39, May/June 2015. CO- 0885-7458 (print), 1573- DEN ???? ISSN 1540-7993 7640 (electronic). (print), 1558-4046 (elec- tronic). URL http:// Applebaum:2010:PKC www.computer.org/csdl/ mags/sp/2015/03/msp2015030032- [ABW10] Benny Applebaum, Boaz abs.html. Barak, and Avi Wigderson. Public-key cryptography Armando:2013:AFB from different assumptions. [ACC+13] Alessandro Armando, Roberto In ACM [ACM10], pages Carbone, Luca Compagna, 171–180. ISBN 1-60558- Jorge Cu´ellar, Giancarlo 817-2. LCCN QA 76.6 Pellegrino, and Alessan- .A152 2010. URL http:// dro Sorniotti. An authen- www.gbv.de/dms/tib-ub- tication flaw in browser- hannover/63314455x.. based single sign-on pro- Alzubi:2016:SCC tocols: Impact and re- mediations. Computers [ACA+16] O. A. Alzubi, T. M. & Security, 33(??):41–58, Chen, J. A. Alzubi, March 2013. CODEN H. Rashaideh, and N. Al- CPSEDU. ISSN 0167-4048 Najdawi. (print), 1872-6208 (elec- coding schemes based on tronic). URL https:// algebraic–geometric codes www.sciencedirect.com/ over Hermitian curves. science/article/pii/S0167404812001356. J.UCS: Journal of Univer- Arnold:2015:NGH sal Computer Science,22 (4):552–??, ???? 2016. CO- [ACD+15] T. W. Arnold, M. Check, DEN ???? ISSN 0948- E. A. Dames, J. Dayka, 695X (print), 0948-6968 S. Dragone, D. Evans, (electronic). URL http:/ W. Santiago Fernandez, /www.jucs.org/jucs_22_ M. D. Hocker, R. Kisley, REFERENCES 106

T. E. Morris, J. Pe- Ardagna:2010:ECP treshock, and K. Werner. The next generation of [ACK+10] Claudio A. Ardagna, Jan highly reliable and se- Camenisch, Markulf Kohlweiss, cure encryption for the Ronald Leenes, Gregory IBM z13. IBM Journal Neven, Bart Priem, Pierangela of Research and Devel- Samarati, Dieter Sommer, opment, 59(4–5):6:1–6:13, and Mario Verdicchio. Ex- July/September 2015. CO- ploiting cryptography for DEN IBMJAE. ISSN 0018- privacy-enhanced access 8646 (print), 2151-8556 control: A result of the (electronic). PRIME Project. Journal of Computer Security,18 Anastasiadis:2018:BTA (1):123–160, ???? 2010. CODEN JCSIET. ISSN [ACD18] M. Anastasiadis, N. Chatzis, 0926-227X (print), 1875- and K. A. Draziotis. 8924 (electronic). Birthday type attacks to the Naccache–Stern knap- Arias-Cabarcos:2019:SAA sack cryptosystem. In- formation Processing Let- [ACKB19] Patricia Arias-Cabarcos, ters, 138(??):35–38, Octo- Christian Krupitzer, and ber 2018. CODEN IF- Christian Becker. A sur- PLAT. ISSN 0020-0190 vey on adaptive authenti- (print), 1872-6119 (elec- cation. ACM Computing tronic). URL http:// Surveys, 52(4):80:1–80:??, www.sciencedirect.com/ September 2019. CODEN science/article/pii/S0020019018301273. CMSVAN. ISSN 0360-0300 (print), 1557-7341 (elec- Amoah:2016:FMA tronic). URL https:// dl.acm.org/ft_gateway. [ACF16] Raphael Amoah, Seyit cfm?id=3336117. Camtepe, and Ernest Foo. ACM:2010:PAI Formal modelling and anal- ysis of DNP3 secure au- [ACM10] ACM, editor. Proceedings thentication. Journal of of the 2010 ACM Interna- Network and Computer tional Symposium on The- Applications, 59(??):345– ory of Computing: June 5– 360, January 2016. CO- 8, 2010, Cambridge, MA, DEN JNCAF3. ISSN 1084- USA. ACM Press, New 8045 (print), 1095-8592 York, NY 10036, USA, (electronic). URL http:// 2010. ISBN 1-60558- www.sciencedirect.com/ 817-2. LCCN QA 76.6 science/article/pii/S1084804515001228. .A152 2010. URL http:// REFERENCES 107

www.gbv.de/dms/tib-ub- Aceto:2019:MME hannover/63314455x.. [ACMP19] Giuseppe Aceto, Domenico ACM:2011:PAI Ciuonzo, Antonio Mon- [ACM11] ACM, editor. Proceedings tieri, and Antonio Pescap`e. of the 2011 ACM Interna- MIMETIC: Mobile en- tional Symposium on The- crypted traffic classifi- ory of Computing: June cation using multimodal 6–8, 2011, San Jose, CA, deep learning. Com- USA. ACM Press, New puter Networks (Amster- York, NY 10036, USA, dam, Netherlands: 1999), 2011. ISBN ???? LCCN 165(??):Article 106944, De- ???? URL http:// cember 24, 2019. CO- www.gbv.de/dms/tib-ub- DEN ???? ISSN 1389-1286 hannover/63314455x.. (print), 1872-7069 (elec- Avoine:2012:PFS tronic). URL http:// www.sciencedirect.com/ [ACM12] Gildas Avoine, Xavier Car- science/article/pii/S1389128619304669. pent, and Benjamin Mar- tin. Privacy-friendly syn- Aczel:2011:SWL chronized ultralightweight authentication protocols in [Acz11] Amir D. Aczel. A Strange the storm. Journal of Net- Wilderness: the Lives of work and Computer Ap- the Great Mathematicians. plications, 35(2):826–843, Sterling, New York, NY, March 2012. CODEN JN- USA, 2011. ISBN 1-4027- CAF3. ISSN 1084-8045 8584-4 (hardback), 1-4027- (print), 1095-8592 (elec- 9085-6 (e-book). xix + tronic). URL http:// 284 pp. LCCN QA21 .A29 www.sciencedirect.com/ 2011. science/article/pii/S1084804511002335Alvarez-Cubero:2016:A. VL Austrin:2017:ICT [ACZ16]´ Jos´e Antonio Alvarez-´ [ACM+17] Per Austrin, Kai-Min Cubero and Pedro J. Zu- Chung, Mohammad Mah- firia. Algorithm 959: VBF: moody, Rafael Pass, and a library of C++ classes for Karn Seth. On the im- vector Boolean functions in possibility of cryptography cryptography. ACM Trans- with tamperable random- actions on Mathematical ness. Algorithmica,79 Software, 42(2):16:1–16:22, (4):1052–1101, December May 2016. CODEN ACM- 2017. CODEN ALGOEJ. SCU. ISSN 0098-3500 ISSN 0178-4617 (print), (print), 1557-7295 (elec- 1432-0541 (electronic). tronic). REFERENCES 108

Aizatulin:2012:VCC Aliberti:2016:RPS

[AD12] Mihhail Aizatulin and [ADG16] Giulio Aliberti, Roberto Di Fran¸cois Dupressoir. Ver- Pietro, and Stefano Guar- ifying cryptographic code ino. Reliable and perfectly in C: Some experience and secret communication over the Csec challenge. Lec- the generalized Ozarow– ture Notes in Computer Wyner’s wire-tap chan- Science, 7140:1–20, 2012. nel. Computer Networks CODEN LNCSD9. ISSN (Amsterdam, Netherlands: 0302-9743 (print), 1611- 1999), 109 (part 1)(??):21– 3349 (electronic). URL 30, November 9, 2016. CO- http://link.springer. DEN ???? ISSN 1389-1286 com/chapter/10.1007/978- (print), 1872-7069 (elec- 3-642-29420-4_1/. tronic). URL http:// www.sciencedirect.com/ Anyanwu:2010:DCS science/article/pii/S1389128616302146.

[ADD10] Matthew N. Anyanwu, Attasena:2017:SSC Lih-Yuan Deng, and Di- pankar Dasgupta. De- [ADH17] Varunya Attasena, J´erˆome sign of cryptographically Darmont, and Nouria strong generator by lin- Harbi. Secret sharing for early generated sequences. cloud data security: a sur- Report ??, The University vey. VLDB Journal: Very of Memphis, Memphis, TN Large Data Bases, 26(5): 38152, USA, January 12, 657–681, October 2017. 2010. URL http://ais. CODEN VLDBFR. ISSN cs.memphis.edu/files/ 1066-8888 (print), 0949- papers/Mathew-security- 877X (electronic). paper.pdf. Abraham:2019:DPL Ayday:2012:DAA [ADH19] Ittai Abraham, Danny [ADF12] Erman Ayday, Farshid Dolev, and Joseph Y. Delgosha, and Faramarz Halpern. Distributed pro- Fekri. Data authenticity tocols for leader election: and availability in multi- a game-theoretic perspec- hop wireless sensor net- tive. ACM Transactions works. ACM Transactions on Economics and Com- on Sensor Networks, 8(2): putation, 7(1):4:1–4:??, 10:1–10:??, March 2012. February 2019. CODEN CODEN ???? ISSN 1550- ???? ISSN 2167-8375 4859 (print), 1550-4867 (print), 2167-8383 (elec- (electronic). tronic). URL https:// REFERENCES 109

dl.acm.org/ft_gateway. Andrychowicz:2016:SMC cfm?id=3303712. [ADMM16] Marcin Andrychowicz, Ste- Adikari:2011:HBT fan Dziembowski, Daniel [ADI11] Jithra Adikari, Vassil S. Malinowski, and Lukasz Dimitrov, and Laurent Mazurek. Secure multi- Imbert. Hybrid binary- party computations on Bit- ternary number system for coin. Communications of elliptic curve cryptosys- the Association for Com- tems. IEEE Transactions puting Machinery, 59(4): on Computers, 60(2):254– 76–84, April 2016. CODEN 265, February 2011. CO- CACMA2. ISSN 0001-0782 DEN ITCOB4. ISSN 0018- (print), 1557-7317 (elec- 9340 (print), 1557-9956 tronic). URL http:// (electronic). cacm.acm.org/magazines/ 2016/4/200175/fulltext. Abdalla:2012:LBH Araldo:2018:CEC [ADM12] Michel Abdalla, Angelo De Caro, and Karina [ADR18] Andrea Araldo, Gyorgy Mochetti. Lattice-based Dan, and Dario Rossi. hierarchical inner prod- Caching encrypted con- uct encryption. Lecture tent via stochastic cache Notes in Computer Sci- partitioning. IEEE/ACM ence, 7533:121–138, 2012. Transactions on Network- CODEN LNCSD9. ISSN ing, 26(1):548–561, Febru- 0302-9743 (print), 1611- ary 2018. CODEN 3349 (electronic). URL IEANEP. ISSN 1063-6692 http://link.springer. (print), 1558-2566 (elec- com/chapter/10.1007/978- tronic). 3-642-33481-8_7/. Anandakumar:2018:RHA Abro:2019:LEE [ADSH18] N. Nalla Anandakumar, [ADM19] Adeel Abro, Zhongliang M. Prem Laxman Das, Deng, and Kamran Ali Somitra K. Sanadhya, and Memon. A lightweight Mohammad S. Hashmi. elliptic-Elgamal-based au- Reconfigurable hardware thentication scheme for se- architecture for authenti- cure device-to-device com- cated key agreement pro- munication. Future In- tocol over binary Edwards ternet, 11(5):108, May curve. ACM Transactions 07, 2019. CODEN ???? on Reconfigurable Tech- ISSN 1999-5903. URL nology and Systems,11 https://www.mdpi.com/ (2):12:1–12:??, November 1999-5903/11/5/108. 2018. CODEN ???? ISSN REFERENCES 110

1936-7406 (print), 1936- ITCOB4. ISSN 0018-9340 7414 (electronic). (print), 1557-9956 (elec- tronic). URL https: Ahmed:2017:IRD //ieeexplore.ieee.org/ [AEH17] Kareem Ahmed and Ibrahim document/8125122/. El-Henawy. Increasing Aumasson:2017:SCP robustness of Data En- cryption Standard by in- [AG18] Jean-Philippe Aumasson tegrating DNA cryptogra- and Matthew D. Green. phy. International Jour- Serious Cryptography: a nal of Computer Ap- Practical Introduction to plications, 39(2):91–105, Modern Encryption.No 2017. ISSN 1206-212X Starch Press, San Fran- (print), 1925-7074 (elec- cisco, CA, USA, 2018. tronic). URL https: ISBN 1-59327-826-8 paper- //www.tandfonline.com/ back. xxii + 282 pp. LCCN doi/full/10.1080/1206212X. QA76.9.A25 A96 2018. 2017.1289690. URL https://nostarch. Attrapadung:2015:RGS com/seriouscrypto. [AEHS15] Nuttapong Attrapadung, Atighehchi:2019:GHC Keita Emura, Goichiro Hanaoka, and Yusuke [AGBR19] Kevin Atighehchi, Loubna Sakai. Revocable group Ghammam, Morgan Bar- signature with constant- bier, and Christophe Rosen- size revocation list. The berger. GREYC-Hashing: Computer Journal,58 Combining biometrics and (10):2698–2715, October secret for enhancing the 2015. CODEN CM- security of protected tem- PJA6. ISSN 0010-4620 plates. Future Genera- (print), 1460-2067 (elec- tion Computer Systems, tronic). URL http:// 101(??):819–830, Decem- comjnl.oxfordjournals. ber 2019. CODEN FG- org/content/58/10/2698. SEVI. ISSN 0167-739X (print), 1872-7115 (elec- Aminifar:2018:OME tronic). URL http:// [AEP18] Amir Aminifar, Petru Eles, www.sciencedirect.com/ and Zebo Peng. Opti- science/article/pii/S0167739X1833125X. mization of message en- Antonopoulos:2017:DIS cryption for real-time ap- plications in embedded sys- [AGH+17] Timos Antonopoulos, Paul tems. IEEE Transactions Gazzillo, Michael Hicks, on Computers, 67(5):748– Eric Koskinen, Tachio Ter- 754, May 2018. CODEN auchi, and Shiyi Wei. De- REFERENCES 111

composition instead of self- maghami, and Z. J. Wang. composition for proving A sparse representation- the absence of timing chan- based wavelet domain nels. ACM SIGPLAN No- speech steganography method. tices, 52(6):362–375, June IEEE/ACM Transactions 2017. CODEN SINODQ. on Audio, Speech, and Lan- ISSN 0362-1340 (print), guage Processing, 23(1): 1523-2867 (print), 1558- 80–91, January 2015. CO- 1160 (electronic). DEN ???? ISSN 2329- 9290. Akinyele:2014:MGA Allender:2019:NIN [AGHP14] Joseph A. Akinyele, Matthew [AH19] Eric Allender and Shuichi Green, Susan Hohenberger, Hirahara. New insights and Matthew Pagano. on the (non-)hardness Machine-generated algo- of circuit minimization rithms, proofs and software and related problems. for the batch verification of ACM Transactions on schemes. Computation Theory,11 Journal of Computer Se- (4):27:1–27:??, Septem- curity, 22(6):867–912, ???? ber 2019. CODEN 2014. CODEN JCSIET. ???? ISSN 1942-3454 ISSN 0926-227X (print), (print), 1942-3462 (elec- 1875-8924 (electronic). tronic). URL https:// Abdullaziz:2016:AAI dl.acm.org/ft_gateway. cfm?id=3349616. [AGLW16] Osamah Ibrahiem Abdul- Ahmadzadeh:2018:HPE laziz, Vik Tor Goh, Huo- Chong Ling, and Kok- [AHG18] Armin Ahmadzadeh, Omid Sheik Wong. AIPISteg: Hajihassani, and Saeid an active IP identifica- Gorgin. A high-performance tion based steganographic and energy-efficient ex- method. Journal of Net- haustive key search ap- work and Computer Ap- proach via GPU on DES- plications, 63(??):150–158, like cryptosystems. The March 2016. CODEN JN- Journal of Supercomput- CAF3. ISSN 1084-8045 ing, 74(1):160–182, Jan- (print), 1095-8592 (elec- uary 2018. CODEN JO- tronic). URL http:// SUED. ISSN 0920-8542 www.sciencedirect.com/ (print), 1573-0484 (elec- science/article/pii/S108480451600059X. tronic). Ahani:2015:SRB Attrapadung:2012:ABE [AGW15] S. Ahani, S. Ghaem- [AHL+12] Nuttapong Attrapadung, REFERENCES 112

Javier Herranz, Fabien (print), 1941-0166 (elec- Laguillaumie, Benoˆıt Lib- tronic). ert, Elie de Panafieu, and Carla R`afols. Attribute- Appelbaum:2013:SSG based encryption schemes [AHS13] J. Appelbaum, J. Horchert, with constant-size cipher- and C. St¨ocker. Shop- texts. Theoretical Com- ping for spy gear: Cata- puter Science, 422(1):15– log advertises NSA tool- 38, March 9, 2012. CODEN box. Der Spiegel, ??(??):??, TCSCDI. ISSN 0304-3975 December 29, 2013. URL (print), 1879-2294 (elec- http://www.spiegel.de/ tronic). URL http:// international/world/catalog- www.sciencedirect.com/ reveals-nsa-has-back- science/article/pii/S0304397511009649. doors-for-numerous-devices- Ali:2018:ECM a-940994.html. Ak:2014:ICS [AHM+18] Zulfiqar Ali, M. Shamim Hossain, Ghulam Muham- [AHS14] Murat Ak, Turgut Hanoy- mad, Ihsan Ullah, Hamid mak, and Ali Aydin Abachi, and Atif Alamri. Sel¸cuk. IND-CCA se- Edge-centric multimodal cure encryption based on authentication system us- a Zheng–Seberry scheme. ing encrypted biometric Journal of Computational templates. Future Gen- and Applied Mathematics, eration Computer Sys- 259 (part B)(??):529–535, tems, 85(??):76–87, Au- March 15, 2014. CODEN gust 2018. CODEN FG- JCAMDI. ISSN 0377-0427 SEVI. ISSN 0167-739X (print), 1879-1778 (elec- (print), 1872-7115 (elec- tronic). URL http:// tronic). URL https:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0377042713003403. science/article/pii/S0167739X17328741. Au:2020:SIC Akhtar:2018:BSI [AHWB20] Man Ho Au, Jinguang [AHN+18] Z. Akhtar, A. Hadid, Han, Qianhong Wu, and M. S. Nixon, M. Tistarelli, Colin Boyd. Special issue J. Dugelay, and S. Mar- on cryptographic currency cel. Biometrics: In search and blockchain technology. of identity and security Future Generation Com- (Q&A). IEEE MultiMe- puter Systems, 107(??): dia, 25(3):22–35, July/ 758–759, June 2020. CO- September 2018. CODEN DEN FGSEVI. ISSN 0167- IEMUE4. ISSN 1070-986x 739X (print), 1872-7115 REFERENCES 113

(electronic). URL http:// Future Generation Com- www.sciencedirect.com/ puter Systems, 82(??):290– science/article/pii/S0167739X19314840. 303, May 2018. CODEN FGSEVI. ISSN 0167-739X Aiash:2015:FAA (print), 1872-7115 (elec- [Aia15] Mahdi Aiash. A formal tronic). URL https:// analysis of authentication www.sciencedirect.com/ protocols for mobile de- science/article/pii/S0167739X17322975. vices in next generation Amin:2016:DAP networks. Concurrency and Computation: Prac- [AIB+16] Ruhul Amin, SK Hafizul Is- tice and Experience,27 lam, G. P. Biswas, Muham- (12):2938–2953, August 25, mad Khurram Khan, Lu Leng, 2015. CODEN CCPEBO. and Neeraj Kumar. De- ISSN 1532-0626 (print), sign of an anonymity- 1532-0634 (electronic). preserving three-factor au- thenticated Ali:2018:CBR protocol for wireless sen- [AIA+18a] Zulfiqar Ali, Muham- sor networks. Computer mad Imran, Mansour Networks (Amsterdam, Alsulaiman, Muhammad Netherlands: 1999), 101 Shoaib, and Sana Ul- (??):42–62, June 4, 2016. lah. Chaos-based ro- CODEN ???? ISSN 1389- bust method of zero- 1286 (print), 1872-7069 watermarking for medical (electronic). URL http:// signals. Future Gener- www.sciencedirect.com/ ation Computer Systems, science/article/pii/S1389128616000207. 88(??):400–412, Novem- Altakrori:2019:AAA ber 2018. CODEN FG- SEVI. ISSN 0167-739X [AIF+19] Malik H. Altakrori, Farkhund (print), 1872-7115 (elec- Iqbal, Benjamin C. M. tronic). URL http:// Fung, Steven H. H. Ding, www.sciencedirect.com/ and Abdallah Tubaishat. science/article/pii/S0167739X18304709. Arabic authorship attribu- Ali:2018:ZWA tion: an extensive study on Twitter posts. ACM [AIA+18b] Zulfiqar Ali, Muhammad Transactions on Asian Imran, Mansour Alsu- and Low-Resource Lan- laiman, Tanveer Zia, and guage Information Process- Muhammad Shoaib. A ing (TALLIP), 18(1):5:1– zero-watermarking algo- 5:??, January 2019. CO- rithm for privacy protec- DEN ???? ISSN 2375-4699 tion in biomedical signals. (print), 2375-4702 (elec- REFERENCES 114

tronic). URL https:// 98(??):331–341, Septem- dl.acm.org/ft_gateway. ber 2019. CODEN FG- cfm?id=3236391. SEVI. ISSN 0167-739X Applebaum:2014:HGA (print), 1872-7115 (elec- tronic). URL http:// [AIK14] Benny Applebaum, Yuval www.sciencedirect.com/ Ishai, and Eyal Kushile- science/article/pii/S0167739X18328802. vitz. How to garble arith- metic circuits. SIAM Jour- Alhanahnah:2016:MTI nal on Computing, 43(2): [AJA16] Mohannad J. Alhanahnah, 905–929, ???? 2014. CO- Arshad Jhumka, and Sa- DEN SMJCAT. ISSN hel Alouneh. A multidi- 0097-5397 (print), 1095- mension taxonomy of in- 7111 (electronic). sider threats in cloud com- Amin:2018:UAP puting. The Computer Journal, 59(11):1612–1622, [AIKC18] Ruhul Amin, S. K. Hafizul November 2016. CODEN Islam, Neeraj Kumar, CMPJA6. ISSN 0010-4620 and Kim-Kwang Raymond (print), 1460-2067 (elec- Choo. An untraceable and tronic). URL http:// anonymous password au- comjnl.oxfordjournals. thentication protocol for org/content/59/11/1612. heterogeneous wireless sen- sor networks. Journal Alam:2018:AFC of Network and Com- puter Applications, 104 [AJYG18] Badiul Alam, Zhe Jin, (??):133–144, February Wun-She Yap, and Bok- 15, 2018. CODEN JN- Min Goi. An alignment- CAF3. ISSN 1084-8045 free cancelable finger- (print), 1095-8592 (elec- print template for bio- tronic). URL http:// cryptosystems. Journal www.sciencedirect.com/ of Network and Computer science/article/pii/S1084804517304058. Applications, 115(??):20– 32, August 1, 2018. CO- Ali:2019:PRD DEN JNCAF3. ISSN 1084- [AIM+19] Zulfiqar Ali, Muham- 8045 (print), 1095-8592 mad Imran, Sally Mc- (electronic). URL http:// Clean, Naveed Khan, and www.sciencedirect.com/ Muhammad Shoaib. Pro- science/article/pii/S1084804518301450. tection of records and data Ashraf:2014:MTG authentication based on secret shares and water- [AK14a] Muhammad Ashraf and marking. Future Gener- Baris B¨ulent Kirlar. Mes- ation Computer Systems, sage transmission for GH- REFERENCES 115

public key cryptosystem. group secret sharing scheme Journal of Computational for secure usage of cloud and Applied Mathematics, storage over different providers 259 (part B)(??):578–585, and regions. The Journal March 15, 2014. CODEN of Supercomputing, 73(10): JCAMDI. ISSN 0377-0427 4275–4301, October 2017. (print), 1879-1778 (elec- CODEN JOSUED. ISSN tronic). URL http:// 0920-8542 (print), 1573- www.sciencedirect.com/ 0484 (electronic). science/article/pii/S0377042713005499. Azarderakhsh:2014:NDP Alabdulatif:2017:PPA

[AK14b] R. Azarderakhsh and K. Kara-[AKKY17] Abdulatif Alabdulatif, He- bina. A new double point shan Kumarage, Ibrahim multiplication algorithm Khalil, and Xun Yi. and its application to bi- Privacy-preserving anomaly nary elliptic curves with detection in cloud with endomorphisms. IEEE lightweight homomorphic Transactions on Comput- encryption. Journal of ers, 63(10):2614–2619, Oc- Computer and System Sci- tober 2014. CODEN IT- ences, 90(??):28–45, De- COB4. ISSN 0018-9340 cember 2017. CODEN JC- (print), 1557-9956 (elec- SSBM. ISSN 0022-0000 tronic). (print), 1090-2724 (elec- tronic). URL http:// Almulla:2013:CKE www.sciencedirect.com/ [AKG13] M. Almulla, A. Kanso, and science/article/pii/S0022000017300284. M. Ghebleh. A concur- rent key exchange protocol Afanasyev:2011:PPN based on commuting ma- trices. Concurrency and [AKM+11] Mikhail Afanasyev, Ta- Computation: Practice and dayoshi Kohno, Justin Ma, Experience, 25(5):743–751, Nick Murphy, Stefan Sav- April 10, 2013. CODEN age, Alex C. Snoeren, CCPEBO. ISSN 1532-0626 and Geoffrey M. Voelker. (print), 1532-0634 (elec- Privacy-preserving net- tronic). work forensics. Commu- Anada:2017:CGS nications of the Associa- tion for Computing Ma- [AKK+17] Hiroaki Anada, Junpei chinery, 54(5):78–87, May Kawamoto, Chenyutao 2011. CODEN CACMA2. Ke, Kirill Morozov, and ISSN 0001-0782 (print), Kouichi Sakurai. Cross- 1557-7317 (electronic). REFERENCES 116

Andrysco:2015:SFP (Amsterdam, Netherlands: 1999), 159(??):23–36, Au- + [AKM 15] Marc Andrysco, David gust 4, 2019. CODEN Kohlbrenner, Keaton Mow- ???? ISSN 1389-1286 ery, Ranjit Jhala, Sorin (print), 1872-7069 (elec- Lerner, and Hovav Shacham. tronic). URL http:// On subnormal floating www.sciencedirect.com/ point and abnormal timing. science/article/pii/S1389128619300465. In IEEE [IEE15], pages 623–639. ISBN 1-4673- AlTawy:2013:SOC 6949-7 (print), 1-4673- [AKY13] Riham AlTawy, Aleksan- 6950-0 (e-book). ISSN dar Kircanski, and Amr 1081-6011 (print), 2375- Youssef. Second order col- 1207 (electronic). LCCN lision for the 42-step re- QA76.9.A25. URL http: duced DHA-256 hash func- //www.gbv.de/dms/tib- tion. Information Pro- ub-hannover/836112652. cessing Letters, 113(19– pdf. 21):764–770, September/ Armknecht:2012:STH October 2013. CODEN IF- PLAT. ISSN 0020-0190 [AKP12] Frederik Armknecht, Ste- (print), 1872-6119 (elec- fan Katzenbeisser, and tronic). URL http:// Andreas Peter. Shift- www.sciencedirect.com/ type homomorphic en- science/article/pii/S0020019013002044. cryption and its applica- tion to fully homomor- Aiash:2015:IAA phic encryption. Lecture Notes in Computer Sci- [AL15] Mahdi Aiash and Jonathan ence, 7374:234–251, 2012. Loo. An integrated au- CODEN LNCSD9. ISSN thentication and authoriza- 0302-9743 (print), 1611- tion approach for the net- 3349 (electronic). URL work of information archi- http://link.springer. tecture. Journal of Net- com/chapter/10.1007/978- work and Computer Ap- 3-642-31410-0_15/. plications, 50(??):73–79, April 2015. CODEN JN- Arfaoui:2019:CAA CAF3. ISSN 1084-8045 [AKS19] Amel Arfaoui, Ali Kribeche, (print), 1095-8592 (elec- and Sidi-Mohammed Senouci. tronic). URL http:// Context-aware anonymous www.sciencedirect.com/ authentication protocols in science/article/pii/S1084804514001349. the Internet of Things ded- Aldrich:2011:GUS icated to e-health applica- tions. Computer Networks [Ald11] Richard J. (Richard James) REFERENCES 117

Aldrich. GCHQ: the un- Alpar:2018:BTA censored story of Britain’s most secret intelligence [Alp18] Orcan Alpar. Biometric agency. HarperPress, Lon- touchstroke authentication don, UK, 2011. ISBN 0- by fuzzy proximity of touch 00-727847-0 (hardcover), 0- locations. Future Gener- 00-731265-2 (paperback), ation Computer Systems, 0-00-731266-0 (paperback). 86(??):71–80, September 666 + 16 pp. LCCN 2018. CODEN FG- JN329.I6 A43 2011; UB251.G7 SEVI. ISSN 0167-739X A54 2010. (print), 1872-7115 (elec- tronic). URL https:// Au:2018:PPP www.sciencedirect.com/ science/article/pii/S0167739X17326055. [ALL+18] Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongx- Asharov:2013:FCF ing Lu, and Jianting [ALR13] Gilad Asharov, Yehuda Ning. Privacy-preserving Lindell, and Tal Rabin. personal data operation on A full characterization of mobile cloud: Chances and functions that imply fair challenges over advanced coin tossing and ramifica- persistent threat. Future tions to fairness. Lecture Generation Computer Sys- Notes in Computer Sci- tems, 79 (part 1)(??):337– ence, 7785:243–262, 2013. 349, 2018. CODEN FG- CODEN LNCSD9. ISSN SEVI. ISSN 0167-739X 0302-9743 (print), 1611- (print), 1872-7115 (elec- 3349 (electronic). URL tronic). URL https:// http://link.springer. www.sciencedirect.com/ com/chapter/10.1007/978- science/article/pii/S0167739X17312864. 3-642-36594-2_14/. Alomair:2012:AEH Alzahrani:2019:SAC [Alo12] Basel Alomair. Authen- [Alz19] Naif Saeed Alzahrani. A ticated encryption: How Secure Anti-Counterfeiting reordering can impact System Using Near Field performance. Lecture Communication, Public Notes in Computer Sci- Key Cryptography, Blockchain, ence, 7341:84–99, 2012. and Bayesian Games. CODEN LNCSD9. ISSN Ph.D., Portland State Uni- 0302-9743 (print), 1611- versity, Portland, OR, 3349 (electronic). URL USA, 2019. 176 pp. URL http://link.springer. http://search.proquest. com/chapter/10.1007/978- com/pqdtglobal/docview/ 3-642-31284-7_6/. 2305527274. REFERENCES 118

Araghi:2019:EHI Arsalan:2012:IRW

[AM19] Tanya Koohpayeh Araghi [AMK12] Muhammad Arsalan, Sana Am- and Azizah Abd Manaf. An breen Malik, and Asiful- enhanced hybrid image wa- lah Khan. Intelligent re- termarking scheme for se- versible watermarking in curity of medical and non- integer wavelet domain medical images based on for medical images. The DWT and 2-D SVD. Future Journal of Systems and Generation Computer Sys- Software, 85(4):883–894, tems, 101(??):1223–1246, April 2012. CODEN JS- December 2019. CODEN SODM. ISSN 0164-1212 FGSEVI. ISSN 0167-739X (print), 1873-1228 (elec- (print), 1872-7115 (elec- tronic). URL http:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0164121211002858. science/article/pii/S0167739X19310842. Ahir:2017:LAR Awad:2016:SSZ [AMKA17] Prashant Ahir, Mehran [AMH+16] Amro Awad, Pratyusa Mozaffari-Kermani, and Manadhata, Stuart Haber, Reza Azarderakhsh. Lightweight Yan Solihin, and William Horne. Silent shredder: architectures for reliable and fault detection Simon Zero-cost shredding for secure non-volatile main and Speck cryptographic memory controllers. ACM algorithms on FPGA. ACM Transactions on Em- SIGPLAN Notices, 51(4): 263–276, April 2016. CO- bedded Computing Systems, DEN SINODQ. ISSN 0362- 16(4):109:1–109:??, August 2017. CODEN ???? ISSN 1340 (print), 1523-2867 (print), 1558-1160 (elec- 1539-9087 (print), 1558- 3465 (electronic). tronic). Arnedo-Moreno:2010:JRA Aghili:2019:SSL [AMHJ10] Joan Arnedo-Moreno and [AMKC19] Seyed Farhad Aghili, Hamid Jordi Herrera-Joancomart´ı. Mala, Pallavi Kaliyar, and JXTA resource access con- Mauro Conti. SecLAP: Se- trol by means of advertise- cure and lightweight RFID ment encryption. Future authentication protocol for Generation Computer Sys- Medical IoT. Future Gen- tems, 26(1):21–28, January eration Computer Systems, 2010. CODEN FGSEVI. 101(??):621–634, Decem- ISSN 0167-739X (print), ber 2019. CODEN FG- 1872-7115 (electronic). SEVI. ISSN 0167-739X REFERENCES 119

(print), 1872-7115 (elec- phy. Report, University of tronic). URL http:// Waterloo, Waterloo, ON, www.sciencedirect.com/ Canada, July 15, 2013. 25 science/article/pii/S0167739X19304777. pp. URL http://crypto. 2013.rump.cr.yp.to/; Abarzua:2018:ASC http://eprint.iacr.org/ [AMMV18] Rodrigo Abarz´ua, Santi 2013/446. Mart´ınez, Valeria Men- Aumasson:2014:HFB doza, and Javier Valera. Avoiding side-channel at- [AMPH14] Jean-Philippe Aumasson, tacks by computing isoge- Willi Meier, Raphael C.- nous and isomorphic el- W. Phan, and Luca Hen- liptic curves. Mathemat- zen. The Hash Func- ics in Computer Science, tion BLAKE. Informa- 12(3):295–307, September tion Security and Cryp- 2018. CODEN ???? ISSN tography. Springer-Verlag, 1661-8270 (print), 1661- Berlin, Germany / Heidel- 8289 (electronic). berg, Germany / London, UK / etc., 2014. ISBN 3- Abbasinezhad-Mood:2018:DHI 662-44756-8 (print), 3-662- 44757-6 (e-book). ISSN [AMN18] Dariush Abbasinezhad- 1619-7100 (print), 2197- Mood and Morteza Nikooghadam. 845X (electronic). xviii Design and hardware im- + 228 + 18 pp. LCCN plementation of a security- QA76.9.H36 A96 2014. enhanced elliptic curve cryptography based lightweight Ahmadian:2010:PDS authentication scheme for [AMS+10] Zahra Ahmadian, Javad smart grid communica- Mohajeri, Mahmoud Salma- tions. Future Generation sizadeh, Risto M. Hakala, Computer Systems, 84(??): and Kaisa Nyberg. A prac- 47–57, July 2018. CODEN tical distinguisher for the FGSEVI. ISSN 0167-739X Shannon cipher. The Jour- (print), 1872-7115 (elec- nal of Systems and Soft- tronic). URL https:// ware, 83(4):543–547, April www.sciencedirect.com/ 2010. CODEN JSSODM. science/article/pii/S0167739X17315376. ISSN 0164-1212. Adj:2013:WDC Aghili:2019:LLT [AMORH13] Gora Adj, Alfred Menezes, [AMSPL19] Seyed Farhad Aghili, Hamid Thomaz Oliveira, and Mala, Mohammad Shoja- Francisco Rodriguez-Henriquez. far, and Pedro Peris-Lopez. Weakness of F36509 for dis- LACO: Lightweight three- crete logarithm cryptogra- factor authentication, ac- REFERENCES 120

cess control and owner- Arshad:2015:SAI ship transfer scheme for e-health systems in IoT. [AN15] Hamed Arshad and Morteza Future Generation Com- Nikooghadam. Security puter Systems, 96(??):410– analysis and improvement 424, July 2019. CODEN of two authentication and FGSEVI. ISSN 0167-739X key agreement schemes for (print), 1872-7115 (elec- session initiation proto- tronic). URL http:// col. The Journal of Su- www.sciencedirect.com/ percomputing, 71(8):3163– science/article/pii/S0167739X18331297. 3180, August 2015. CO- DEN JOSUED. ISSN Alvarez:2012:CAB 0920-8542 (print), 1573- 0484 (electronic). URL [AMVZ12]´ Rafael Alvarez,´ Francisco http://link.springer. Mart´ınez, Jos´e-Francisco com/article/10.1007/s11227- Vicent, and Antonio Zamora. 015-1434-8. Cryptographic applications Aga:2017:ISM of 3 × 3 block upper tri- angular matrices. Lecture [AN17] Shaizeen Aga and Satish Notes in Computer Sci- Narayanasamy. InvisiMem: ence, 7209:97–104, 2012. Smart memory defenses for CODEN LNCSD9. ISSN memory bus side channel. 0302-9743 (print), 1611- ACM SIGARCH Computer 3349 (electronic). URL Architecture News, 45(2): http://link.springer. 94–106, May 2017. CO- com/chapter/10.1007/978- DEN CANED2. ISSN 3-642-28931-6_10/. 0163-5964 (print), 1943- 5851 (electronic). Albrecht:2012:SDL Anawis:2014:ARR [AN12] Alexander Albrecht and [Ana14] Mark Anawis. Applications Felix Naumann. Schema for randomness: Random decryption for large extract- numbers have been shown transform-load systems. to be valuable in sam- Lecture Notes in Com- pling, simulations, model- puter Science, 7532:116– ing, data encryption, gam- 125, 2012. CODEN bling and even musical LNCSD9. ISSN 0302-9743 composition. Scientific (print), 1611-3349 (elec- Computing, 31(11):28–30, tronic). URL http:// November 2014. CODEN link.springer.com/chapter/ SCHRCU. ISSN 1930-5753 10.1007/978-3-642-34002- (print), 1930-6156 (elec- 4_9/. tronic). URL http:// REFERENCES 121

digital.scientificcomputing. puter Systems Science com/scientificcomputing/ and Engineering, 31(5):??, hpc_source_sc14_special_ September 2016. CODEN edition. Special issue CSSEEI. ISSN 0267-6192. for Supercomputing 2014 Anonymous:2010:NDS (SC14), defining the mar- ket: 30 years of high- [Ano10a] Anonymous, editor. 17th performance computing Annual Network and Dis- (1984–2014). tributed System Sympo- Anderson:2013:MNF sium, NDSS ’10, The Dana on Misson Bay, San Diego, [And13] David Anderson. Max California. February 28– Newman: forgotten man March 3, 2010. Internet So- of early British comput- ciety, Reston, VA, USA, ing. Communications of 2010. ISBN 1-891562-29-0, the Association for Com- 1-891562-30-4. LCCN ???? puting Machinery, 56(5): URL http://www.isoc. 29–31, May 2013. CODEN org/isoc/conferences/ CACMA2. ISSN 0001-0782 ndss/10/proceedings.shtml. (print), 1557-7317 (elec- tronic). Anonymous:2010:MML

Anderson:2019:QCN [Ano10b] Anonymous. Mirror, mir- ror .... IEEE Spectrum, [And19] Mark Anderson. Quan- 47(2):11, February 2010. tum cryptography needs CODEN IEESAM. ISSN a reboot: A failed secu- 0018-9235 (print), 1939- rity product could someday 9340 (electronic). power large-scale quan- tum computing — [news]. Anonymous:2011:AIS IEEE Spectrum, 56(10):9– 10, October 2019. CODEN [Ano11a] Anonymous, editor. ACIS IEESAM. ISSN 0018-9235 international symposium (print), 1939-9340 (elec- on cryptography, and net- tronic). work security, data mining Anghelescu:2016:FIP and knowledge discovery, e-commerce and its appli- [Ang16] Petre Anghelescu. FPGA cations, and embedded sys- implementation of pro- tems. IEEE Computer So- grammable cellular au- ciety Press, 1109 Spring tomata encryption algo- Street, Suite 300, Silver rithm for network com- Spring, MD 20910, USA, munications. Interna- 2011. ISBN 0-7695-4332-4. tional Journal of Com- LCCN ???? REFERENCES 122

Anonymous:2011:AXL found in Android. Net- work Security, 2013(7): [Ano11b] Anonymous. ANSI X9.98- 2, July 2013. CODEN 2010: Lattice-Based Poly- NTSCF5. ISSN 1353-4858 nomial Public Key Es- (print), 1872-9371 (elec- tablishment Algorithm for tronic). URL http:// the Financial Services In- www.sciencedirect.com/ dustry. American Na- science/article/pii/S1353485813700771. tional Standards Institute, 1430 Broadway, New York, Anonymous:2013:CRR NY 10018, USA, April [Ano13b] Anonymous. CryptoLocker 2011. US$100. URL runs rampant, but drops http://webstore.ansi. ransom price. Network org/RecordDetail.aspx? Security, 2013(12):2, De- sku=ANSI+X9.98-2010. cember 2013. CODEN Anonymous:2011:MCB NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- [Ano11c] Anonymous. Memorial for tronic). URL http:// codebreakers at Bletchley www.sciencedirect.com/ Park. BBC News, April science/article/pii/S1353485813701302. 27, 2011. URL http: //www.bbc.co.uk/news/ Anonymous:2013:DSS uk-england-beds-bucks- herts-13208090. [Ano13c] Anonymous. Digital Signa- ture Standard (DSS). Fed- Anonymous:2012:SHS eral Information Process- [Ano12] Anonymous. Secure Hash ing Standards Publication Standard (SHS). Fed- FIPS Pub 186-4, National eral Information Process- Institute for Standards and ing Standards Publication Technology, Gaithersburg, FIPS Pub 180-4, National MD 20899-8900, USA, July Institute for Standards and 2013. vii + 121 pp. Technology, Gaithersburg, URL http://nvlpubs. MD 20899-8900, USA, nist.gov/nistpubs/FIPS/ March 2012. v + 30 pp. NIST.FIPS.186-4.pdf. URL http://csrc.nist. Anonymous:2013:NCI gov/publications/fips/ fips180-4/fips-180-4. [Ano13d] Anonymous. NSA has pdf; http://csrc.nist. cracked Internet encryp- gov/publications/PubsFIPS. tion protocols. Net- html#fips180-4. work Security, 2013(9):1–2, Anonymous:2013:CFF September 2013. CODEN NTSCF5. ISSN 1353-4858 [Ano13a] Anonymous. Crypto flaw (print), 1872-9371 (elec- REFERENCES 123

tronic). URL http:// Anonymous:2014:ERE www.sciencedirect.com/ science/article/pii/S1353485813700977[Ano14b]. Anonymous. Encryption on the rise, but not enough. Anonymous:2013:SSD Network Security, 2014(2): 1–2, February 2014. CO- [Ano13e] Anonymous. Simple steps DEN NTSCF5. ISSN 1353- to data encryption. Net- 4858 (print), 1872-9371 work Security, 2013(9):4, (electronic). URL http:// September 2013. CODEN www.sciencedirect.com/ NTSCF5. ISSN 1353-4858 science/article/pii/S1353485814700145. (print), 1872-9371 (elec- Anonymous:2014:TPC tronic). URL http:// www.sciencedirect.com/ [Ano14c] Anonymous. TrueCrypt science/article/pii/S1353485813701004. project cancelled by its de- velopers. Network Security, Anonymous:2013:SIS 2014(6):1–2, June 2014. CODEN NTSCF5. ISSN [Ano13f] Anonymous. Special is- 1353-4858 (print), 1872- sue on “Security and iden- 9371 (electronic). URL tity architecture for the http://www.sciencedirect. future Internet”. Com- com/science/article/pii/ puter Networks (Amster- S1353485814700546. dam, Netherlands: 1999), Anonymous:2015:BSU 57(10):2215–2217, July 5, 2013. CODEN ???? ISSN [Ano15a] Anonymous. Blind signa- 1389-1286 (print), 1872- tures using offline repos- 7069 (electronic). URL itories provide new level http://www.sciencedirect. of security. Scientific com/science/article/pii/ Computing, ??(??):??, May S1389128613001795. 15, 2015. CODEN SCHRCU. ISSN 1930-5753 Anonymous:2014:CSL (print), 1930-6156 (elec- tronic). URL http://www. [Ano14a] Anonymous. CryptoLocker scientificcomputing.com/ success leads to more news/2015/05/blind-signatures- malware. Network Se- using-offline-repositories- curity, 2014(1):20, Jan- provide-new-level-security. uary 2014. CODEN Anonymous:2015:BRDa NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- [Ano15b] Anonymous. Book re- tronic). URL http:// view: Digital Identity Man- www.sciencedirect.com/ agement, Maryline Lau- science/article/pii/S1353485814700121. rent and Samia Bouze- REFERENCES 124

frane. ISTE Press/Elsevier. ernment battles tech firms ISBN 978-1-78548-004-1. over encryption. Net- Network Security, 2015(9): work Security, 2015(11):1– 4, September 2015. CO- 2, November 2015. CO- DEN NTSCF5. ISSN 1353- DEN NTSCF5. ISSN 1353- 4858 (print), 1872-9371 4858 (print), 1872-9371 (electronic). URL http:// (electronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S1353485815300787. science/article/pii/S1353485815300945. Anonymous:2015:CEB Anonymous:2016:BRBa

[Ano15c] Anonymous. Cryptography [Ano16a] Anonymous. Book re- for everyone: Bringing end- view: Bitcoin and Cryp- to-end encryption to the tocurrency Technologies, masses. Scientific Comput- Arvind Narayanan, Joseph ing, ??(??):??, March 17, Bonneau, Edward Fel- 2015. URL http://www. ten, Andrew Miller and scientificcomputing.com/ Steven Goldfeder. Net- news/2015/03/cryptography- work Security, 2016(8):4, everyone-bringing-end- August 2016. CODEN end-encryption-masses. NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- Anonymous:2015:QCS tronic). URL http:// [Ano15d] Anonymous. Quantum www.sciencedirect.com/ cryptography security hole science/article/pii/S1353485816300745. revealed, energy-time en- Anonymous:2016:CPSd tanglement vulnerable to attack. Scientific Com- [Ano16b] Anonymous. Call for puting, ??(??):??, Decem- papers special issue on ber 12, 2015. CODEN postquantum cryptogra- SCHRCU. ISSN 1930-5753 phy. IEEE Security & (print), 1930-6156 (elec- Privacy, 14(4):63, July/ tronic). URL http://www. August 2016. CO- scientificcomputing.com/ DEN ???? ISSN news/2015/12/quantum- 1540-7993 (print), 1558- cryptography-security- 4046 (electronic). URL hole-revealed-energy- https://www.computer. time-entanglement-vulnerable- org/csdl/mags/sp/2016/ attack. See research arti- 04/msp2016040063.pdf. cle [JEA+15]. Anonymous:2016:CPSe Anonymous:2015:UGB [Ano16c] Anonymous. Call for [Ano15e] Anonymous. UK Gov- papers special issue on REFERENCES 125

postquantum cryptogra- scientificcomputing.com/ phy. IEEE Security & news/2016/06/generating- Privacy, 14(5):57, Septem- unclonable-patterns-fight- ber/October 2016. CO- counterfeiting. DEN ???? ISSN 1540-7993 (print), 1558- Anonymous:2016:IICd 4046 (electronic). URL [Ano16g] Anonymous. Introduc- https://www.computer. ing IEEE Collabratec. org/csdl/mags/sp/2016/ IEEE Computer Architec- 05/msp2016050057.pdf. ture Letters, 15(1):66, Jan- Anonymous:2016:EMT uary/June 2016. ISSN 1556-6056 (print), 1556- [Ano16d] Anonymous. The Enigma 6064 (electronic). machine takes a quan- tum leap. R&D Maga- Anonymous:2016:MBE zine, ??(??):??, Septem- [Ano16h] Anonymous. More bat- ber 7, 2016. URL http: tles over encryption & //www.rdmag.com/news/ 2016/09/enigma-machine- surveillance. Network Se- curity, 2016(1):2, Jan- takes-quantum-leap. News story on quantum data uary 2016. CODEN locking research in [LCW+16, NTSCF5. ISSN 1353-4858 LHA+16]. (print), 1872-9371 (elec- tronic). URL http:// Anonymous:2016:FVM www.sciencedirect.com/ science/article/pii/S1353485816300022. [Ano16e] Anonymous. Facsimile of the Voynich Manuscript Anonymous:2016:SWT now available to citizen cryptographers. Web [Ano16i] Anonymous. Smith wins document, November 16, Test of Time award for 2016. URL http:// paper. Penn State hyperallergic.com/335505/ News, January 18, 2016. voynich-manuscript-facsimile- URL http://news.psu. published-yale-university/ edu/story/387916/2016/ . 01/18/academics/smith- wins-test-time-award- Anonymous:2016:GUP paper.

[Ano16f] Anonymous. Gener- Anonymous:2016:SIR ating unclonable pat- terns to fight counterfeit- [Ano16j] Anonymous. Special issue ing. Scientific Comput- on real-world cryptography ing, ??(??):??, June 13, call for papers house ad- 2016. URL http://www. vertisement. IEEE Security REFERENCES 126

& Privacy, 14(1):62, Jan- URL https://cyber.ee/ uary/February 2016. CO- en/news/cybernetica-case- DEN ???? ISSN 1540-7993 study-solving-the-estonian- (print), 1558-4046 (elec- id-card-case/. The story tronic). describes a poor choice of generating large (about Anonymous:2017:BA 1024 bits) primes p and q that led to crackable RSA [Ano17a] Anonymous. BitErrant at- cryptography. The solution tack. Web site, March for Estonia was to switch to 6, 2017. URL http:// elliptic-curve cryptography biterrant.io/. The story that was also supported by describes how SHA-1 colli- the cards. sion attacks could lead to bogus, and malware, file Anonymous:2017:HDQ downloads via BitTorrent: the obvious solution, which [Ano17d] Anonymous. High-dimensional should have been adopted quantum encryption per- long ago, is to use mul- formed in real-world city tiple checksum algorithms, conditions for first time. and require all to match Scientific Computing,?? before concluding that two (??):??, August 24, 2017. files are in fact identical. CODEN SCHRCU. ISSN Anonymous:2017:BRM 1930-5753 (print), 1930- 6156 (electronic). URL [Ano17b] Anonymous. Book review: https://www.scientificcomputing. The Mathematics of Se- com/news/2017/08/high- crets, by Joshua Holden. dimensional-quantum-encryption- Princeton University Press. performed-real-world- ISBN 978-0-691-14175-6. city-conditions-first- Network Security, 2017(3): time. 4, March 2017. CODEN Anonymous:2017:MBH NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- [Ano17e] Anonymous. Mathemati- tronic). URL http:// cian breaks down how to www.sciencedirect.com/ defend against quantum science/article/pii/S1353485817300247. computing attacks. Re- Anonymous:2017:CCS search & Development,?? (??):??, February 2, 2017. [Ano17c] Anonymous. Cybernet- CODEN REDEEA. ISSN ica case study: Solv- 0746-9179. URL http: ing the Estonian ID- //www.rdmag.com/news/ card case. Web news 2017/02/mathematician- story., December 13, 2017. breaks-down-how-defend- REFERENCES 127

against-quantum-computing- CODEN ???? ISSN attacks. 2637-5494. URL http: Anonymous:2017:RV //www.tandfonline.com/ doi/full/10.1080/17498430. [Ano17f] Anonymous. ROCA vul- 2018.1542200. nerability. Wikipedia arti- Anonymous:2019:PBT cle., October 2017. URL https://en.wikipedia. [Ano19c] Anonymous. Preface: org/wiki/ROCA_vulnerability. Blockchain: From technol- The ROCA vulnerability ogy to solutions. IBM affects millions of smart- Journal of Research and cards, and devices using Development, 63(2–3):1–2, TPM (Trusted Platform March/May 2019. CODEN Modules). It allows recov- IBMJAE. ISSN 0018-8646 ery of the private key from (print), 2151-8556 (elec- knowledge of the RSA pub- tronic). lic key, and thus, facili- Anthes:2014:FTI tates malicious cloning of the cards, and decrypting [Ant14] Gary Anthes. French of some encrypted filesys- team invents faster code- tems. breaking algorithm. Com- Anonymous:2019:GES munications of the As- sociation for Computing [Ano19a] Anonymous. Guest ed- Machinery, 57(1):21–23, itorial: Special issue on January 2014. CODEN Information Systems Se- CACMA2. ISSN 0001-0782 curity, Privacy, Secu- (print), 1557-7317 (elec- rity and Cryptography tronic). (ICISSP 2017 and SE- Andriotis:2013:JSD CRYPT 2017). Comput- ers & Security, 86(??):419, [AOT13] Panagiotis Andriotis, George September 2019. CODEN Oikonomou, and Theo Try- CPSEDU. ISSN 0167-4048 fonas. JPEG steganogra- (print), 1872-6208 (elec- phy detection with Ben- tronic). URL https:// ford’s Law. Digital In- www.sciencedirect.com/ vestigation, 9(3–4):246– science/article/pii/S0167404819301233. 257, 2013. ISSN 1742- 2876. URL http:// Anonymous:2019:HCC www.sciencedirect.com/ [Ano19b] Anonymous. The his- science/article/pii/S1742287613000066. tory of cryptography and Agarwal:2010:BRW codes. British Journal for the History of Mathe- [AP10] Parag Agarwal and Balakr- matics, 34(1):71–72, 2019. ishnan Prabhakaran. Blind REFERENCES 128

robust watermarking of trum, 55(7):30–35, July 3D motion data. ACM 2018. CODEN IEESAM. Transactions on Multime- ISSN 0018-9235 (print), dia Computing, Commu- 1939-9340 (electronic). nications, and Applica- Ali:2018:SUA tions, 6(1):2:1–2:??, Febru- ary 2010. CODEN ???? [APK+18] Rifaqat Ali, Arup Ku- ISSN 1551-6857 (print), mar Pal, Saru Kumari, 1551-6865 (electronic). Marimuthu Karuppiah, and Mauro Conti. A Aumasson:2011:CHF secure user authentica- [AP11] Jean-Philippe Aumasson tion and key-agreement and Raphael C.-W. Phan. scheme using wireless sen- On the cryptanalysis of sor networks for agricul- the hash function Fugue: ture monitoring. Fu- Partitioning and inside- ture Generation Computer out distinguishers. Infor- Systems, 84(??):200–215, mation Processing Letters, July 2018. CODEN FG- 111(11):512–515, May 15, SEVI. ISSN 0167-739X 2011. CODEN IFPLAT. (print), 1872-7115 (elec- ISSN 0020-0190 (print), tronic). URL https:// 1872-6119 (electronic). www.sciencedirect.com/ science/article/pii/S0167739X17303862. AlFardan:2013:LTB Alcaide:2013:AAP [AP13] Nadhem AlFardan and [APMCR13] Almudena Alcaide, Esther Kenny Paterson. Lucky Palomar, Jos´e Montero- thirteen: Breaking the TLS Castillo, and Arturo Rib- and DTLS record proto- agorda. Anonymous au- cols. Report ??, Infor- thentication for privacy- mation Security Group, preserving IoT target- Royal Holloway, Univer- driven applications. Com- sity of London, Egham, puters & Security, 37(??): Surrey TW20 0EX, UK, 111–123, September 2013. February 4, 2013. 18 CODEN CPSEDU. ISSN pp. URL http://www. 0167-4048 (print), 1872- isg.rhul.ac.uk/tls/; 6208 (electronic). URL http://www.isg.rhul.ac. https://www.sciencedirect. uk/tls/TLStiming.pdf. com/science/article/pii/ Abellan:2018:FCQ S0167404813000904. Applebaum:2013:GXG [AP18] C. Abellan and V. Pruneri. The future of cybersecurity [App13] Benny Applebaum. Gar- is quantum. IEEE Spec- bling XOR gates “for REFERENCES 129

free” in the standard toring 512-bit RSA mod- model. Lecture Notes in uli for fun (and a profit Computer Science, 7785: of $9,000). Report, In- 162–181, 2013. CO- formation Security Group DEN LNCSD9. ISSN Royal Holloway, Univer- 0302-9743 (print), 1611- sity of London, London, 3349 (electronic). URL UK, March 13, 2015. http://link.springer. 3 pp. URL https:// com/chapter/10.1007/978- martinralbrecht.files. 3-642-36594-2_10/. wordpress.com/2015/03/ freak-scan1.pdf. Applebaum:2014:CCP Al-Qarni:2012:EII [App14] Benny Applebaum. Cryp- tography in Constant Par- [AQD12] Garsah Farhan Al-Qarni allel Time. Informa- and Farzin Deravi. Ex- tion Security and Cryp- plicit integration of iden- tography. Springer-Verlag, tity information from Berlin, Germany / Heidel- skin regions to improve berg, Germany / London, face recognition. Lecture UK / etc., 2014. ISBN 3- Notes in Computer Sci- 642-17366-7, 3-642-17367-5 ence, 7325:30–37, 2012. (e-book). ISSN 1619-7100 CODEN LNCSD9. ISSN (print), 2197-845X (elec- 0302-9743 (print), 1611- tronic). xvi + 193 + 3 3349 (electronic). URL pp. LCCN QA76.9.M35; http://link.springer. TK5102.94 QA76.9.A25. com/chapter/10.1007/978- Appel:2015:VCP 3-642-31298-4_4/. Al-Qurishi:2018:EKA [App15] Andrew W. Appel. Veri- fication of a cryptographic [AQRH+18] Muhammad Al-Qurishi, primitive: SHA-256. ACM Sk Md Mizanur Rahman, Transactions on Program- M. Shamim Hossain, Ah- ming Languages and Sys- mad Almogren, Majed tems, 37(2):7:1–7:??, April Alrubaian, Atif Alamri, 2015. CODEN ATPSDT. Mabrook Al-Rakhami, and ISSN 0164-0925 (print), B. B. Gupta. An effi- 1558-4593 (electronic). cient key agreement pro- Albrecht:2015:FBR tocol for Sybil-precaution in online social networks. [APPVP15] Martin R. Albrecht, Da- Future Generation Com- vide Papini, Kenneth G. puter Systems, 84(??):139– Paterson, and Ricardo 148, July 2018. CODEN Villanueva-Polanco. Fac- FGSEVI. ISSN 0167-739X REFERENCES 130

(print), 1872-7115 (elec- actions on Computers,63 tronic). URL https:// (11):2829–2841, November www.sciencedirect.com/ 2014. CODEN ITCOB4. science/article/pii/S0167739X17306623. ISSN 0018-9340 (print), 1557-9956 (electronic). Arai:2013:MDH Altawy:2018:SLT [Ara13] Kohei Arai. Method for data hiding based [ARH+18a] Riham Altawy, Raghven- on LeGall 5/3 (Cohen– dra Rohit, Morgan He, Ka- Daubechies–Feauveau: CDF likinkar Mandal, Gangqiang 5/3) wavelet with data Yang, and Guang Gong. compression and random SLISCP-light: Towards scanning of secret imagery hardware optimized sponge- data. International Journal specific cryptographic per- of Wavelets, Multiresolu- mutations. ACM Transac- tion and Information Pro- tions on Embedded Com- cessing, 11(4):1360006, 18, puting Systems, 17(4): 2013. CODEN IJWMIP. 81:1–81:??, August 2018. ISSN 0219-6913 (print), CODEN ???? ISSN 1539- 1793-690X (electronic). 9087 (print), 1558-3465 (electronic). Arab:2019:IEM AlTawy:2018:TCM [ARG19] Alireza Arab, Moham- mad Javad Rostami, and [ARH+18b] Riham AlTawy, Raghven- Behnam Ghavami. An dra Rohit, Morgan He, Ka- image encryption method likinkar Mandal, Gangqiang based on chaos system Yang, and Guang Gong. and AES algorithm. The Towards a cryptographic Journal of Supercomput- minimal design: The ing, 75(10):6663–6682, Oc- sLiSCP family of permuta- tober 2019. CODEN JO- tions. IEEE Transactions SUED. ISSN 0920-8542 on Computers, 67(9):1341– (print), 1573-0484 (elec- 1358, ???? 2018. CO- tronic). URL http:// DEN ITCOB4. ISSN 0018- link.springer.com/content/ 9340 (print), 1557-9956 pdf/10.1007/s11227-019- (electronic). URL https: 02878-7.pdf. //ieeexplore.ieee.org/ document/8305605/. Adj:2014:SRC Agudo:2013:PAC [ARH14] G. Adj and F. Rodriguez- Henriquez. Square root [ARL13] Isaac Agudo, Ruben Rios, computation over even ex- and Javier Lopez. A tension fields. IEEE Trans- privacy-aware continuous REFERENCES 131

authentication scheme for Armasu:2019:IFA proximity-based access control. Computers & Se- [Arm19] Lucian Armasu. In- curity, 39 (part B)(??): tel follows AMD’s lead 117–126, November 2013. on full memory encryp- CODEN CPSEDU. ISSN tion. Web site, May 0167-4048 (print), 1872- 27, 2019. URL https:/ 6208 (electronic). URL /www.tomshardware.com/ https://www.sciencedirect. news/intel-mktme-amd- com/science/article/pii/ memory-encryption,39467. S0167404813000874. html. Ambrose:2012:RII Abdulrahman:2015:NRR [ARP12] Jude A. Ambrose, Roshan G. [ARM15a] E. A. H. Abdulrahman and Ragel, and Sri Parameswaran. A. Reyhani-Masoleh. New Randomized instruction in- regular radix-8 scheme for jection to counter power elliptic curve scalar mul- analysis attacks. ACM tiplication without pre- Transactions on Embed- computation. IEEE Trans- ded Computing Systems,11 actions on Computers, (3):69:1–69:??, September 64(2):438–451, February 2012. CODEN ???? ISSN 2015. CODEN ITCOB4. 1539-9087 (print), 1558- ISSN 0018-9340 (print), 3465 (electronic). 1557-9956 (electronic). Alghamdi:2019:RAM Azarderakhsh:2015:PHS [ARWK19] Wael Alghamdi, Mohsen Rezvani, Hui Wu, and [ARM15b] Reza Azarderakhsh and Salil S. Kanhere. Routing- Arash Reyhani-Masoleh. aware and malicious node Parallel and high-speed detection in a concealed computations of elliptic data aggregation for WSNs. curve cryptography us- ACM Transactions on Sen- ing hybrid-double multi- sor Networks, 15(2):18:1– pliers. IEEE Transac- 18:??, April 2019. CO- tions on Parallel and Dis- DEN ???? ISSN 1550-4859 tributed Systems, 26(6): (print), 1550-4867 (elec- 1668–1677, June 2015. CO- tronic). URL https:// DEN ITDSEO. ISSN dl.acm.org/ft_gateway. 1045-9219 (print), 1558- cfm?id=3293537. 2183 (electronic). URL Asharov:2016:LPI http://csdl.computer. org/csdl/trans/td/2015/ [AS16] Gilad Asharov and Gil 06/06814322-abs.html. Segev. Limits on the REFERENCES 132

power of indistinguishabil- ence, 8349:291–316, 2014. ity obfuscation and func- CODEN LNCSD9. ISSN tional encryption. SIAM 0302-9743 (print), 1611- Journal on Computing,45 3349 (electronic). URL (6):2117–2176, ???? 2016. http://link.springer. CODEN SMJCAT. ISSN com/chapter/10.1007/978- 0097-5397 (print), 1095- 3-642-54242-8_13/. 7111 (electronic). Al-Sinani:2012:UCB Artemenko:2017:PGO [ASM12] Haitham S. Al-Sinani and [AS17] Sergei Artemenko and Ro- Chris J. Mitchell. A uni- nen Shaltiel. Pseudo- versal client-based identity random generators with management tool. Lec- optimal length for ture Notes in Computer non-Boolean poly-size cir- Science, 7163:49–74, 2012. cuits. ACM Transactions CODEN LNCSD9. ISSN on Computation Theory, 0302-9743 (print), 1611- 9(2):6:1–6:??, May 2017. 3349 (electronic). URL CODEN ???? ISSN 1942- http://link.springer. 3454 (print), 1942-3462 com/chapter/10.1007/978- (electronic). 3-642-29804-2_4/. Ahmadi:2011:SKC Andrade:2016:LEP [ASN11] Hadi Ahmadi and Rei- [ASBdS16] Ewerton R. Andrade, Mar- haneh Safavi-Naini. Se- cos A. Simplicio, Paulo cret keys from channel S. L. M. Barreto, and noise. Lecture Notes in Paulo C. F. dos Santos. Computer Science, 6632: Lyra2: Efficient password 266–283, 2011. CO- hashing with high secu- DEN LNCSD9. ISSN rity against time-memory 0302-9743 (print), 1611- trade-offs. IEEE Trans- 3349 (electronic). URL actions on Computers,65 http://link.springer. (10):3096–3108, ???? 2016. com/content/pdf/10.1007/ CODEN ITCOB4. ISSN 978-3-642-20465-4_16. 0018-9340 (print), 1557- 9956 (electronic). Ahmadi:2012:SKE Asharov:2014:TCC [ASN12] Hadi Ahmadi and Rei- haneh Safavi-Naini. Se- [Ash14] Gilad Asharov. Towards cret key establishment over characterizing complete noisy channels. Lecture fairness in secure two- Notes in Computer Sci- party computation. Lecture ence, 6888:132–147, 2012. Notes in Computer Sci- CODEN LNCSD9. ISSN REFERENCES 133

0302-9743 (print), 1611- rafa. I can’t be myself: Ef- 3349 (electronic). URL fects of wearable cameras http://link.springer. on the capture of authentic com/chapter/10.1007/978- behavior in the wild. Pro- 3-642-27901-0_11/. ceedings of the ACM on In- teractive, Mobile, Wearable Ali:2014:ALD and Ubiquitous Technolo- [ASO14] Syed Taha Ali, Vijay gies (IMWUT), 2(3):1–40, Sivaraman, and Diethelm September 2018. CODEN Ostry. Authentication ???? ISSN 2474-9567 (elec- of lossy data in body- tronic). URL https:// sensor networks for cloud- dl.acm.org/doi/abs/10. based healthcare monitor- 1145/3264900. ing. Future Generation Alsulaiman:2013:IVB Computer Systems, 35(??): 80–90, June 2014. CO- [ASVE13] Fawaz A. Alsulaiman, DEN FGSEVI. ISSN 0167- Nizar Sakr, Julio J. Vald´es, 739X (print), 1872-7115 and Abdulmotaleb El Sad- (electronic). URL http:// dik. Identity verification www.sciencedirect.com/ based on handwritten sig- science/article/pii/S0167739X13001866. natures with haptic infor- mation using genetic pro- Asaar:2015:IBM gramming. ACM Transac- tions on Multimedia Com- [ASS15] Maryam Rajabzadeh Asaar, puting, Communications, Mahmoud Salmasizadeh, and Applications, 9(2): and Willy Susilo. An 11:1–11:??, May 2013. CO- identity-based multi-proxy DEN ???? ISSN 1551-6857 multi-signature scheme (print), 1551-6865 (elec- without bilinear pairings tronic). and its variants. The Com- puter Journal, 58(4):1021– Altman:2010:AAP 1039, April 2015. CODEN [AT10] Alon Altman and Moshe CMPJA6. ISSN 0010-4620 Tennenholtz. An axiomatic (print), 1460-2067 (elec- approach to personalized tronic). URL http:// ranking systems. Journal comjnl.oxfordjournals. of the ACM, 57(4):26:1– org/content/58/4/1021. 26:35, April 2010. CODEN Alharbi:2018:CME JACOAH. ISSN 0004- 5411. + [ASV 18] Rawan Alharbi, Tammy Azimpourkivi:2017:CBT Stump, Nilofar Vafaie, An- gela Pfammatter, Bonnie [ATC17] Mozhgan Azimpourkivi, Spring, and Nabil Alshu- Umut Topkara, and Bog- REFERENCES 134

dan Carbunar. Camera 0926-227X (print), 1875- based two factor authenti- 8924 (electronic). cation through mobile and wearable devices. Proceed- Au:2011:PPT ings of the ACM on In- [ATK11] M. Ho Au, P. P. Tsang, teractive, Mobile, Wearable and A. Kapadia. PEREA: and Ubiquitous Technolo- Practical TTP-free revoca- gies (IMWUT), 1(3):1–37, tion of repeatedly misbe- September 2017. CODEN having anonymous users. ???? ISSN 2474-9567 (elec- ACM Transactions on In- tronic). URL https:// formation and System Se- dl.acm.org/doi/abs/10. curity, 14(4):29:1–29:??, 1145/3131904. December 2011. CODEN Aste:2017:BTF ATISBQ. ISSN 1094-9224 (print), 1557-7406 (elec- [ATD17] Tomaso Aste, Paolo Tasca, tronic). and Tiziana Di Mat- teo. Blockchain technolo- Al-Tariq:2017:SFP

gies: The foreseeable im- + pact on society and in- [ATKH 17] Abdullah Al-Tariq, Abu dustry. Computer, 50(9): Raihan Mostofa Kamal, 18–28, September 2017. Md. Abdul Hamid, M. Abdullah- CODEN CPTRB4. ISSN Al-Wadud, Mohammad Mehedi 0018-9162 (print), 1558- Hassan, and Sk Md. Miza- 0814 (electronic). URL nur Rahman. A scalable https://www.computer. framework for protecting org/csdl/mags/co/2017/ user identity and access 09/mco2017090018-abs. pattern in untrusted Web html. server using forward se- crecy, public key encryp- Argyropoulos:2010:BTP tion and Bloom filter. Con- [ATI+10] Savvas Argyropoulos, Dim- currency and Computa- itrios Tzovaras, Dimos- tion: Practice and Expe- thenis Ioannidis, Yannis rience, 29(23):??, Decem- Damousis, Michael G. ber 10, 2017. CODEN Strintzis, Martin Braun, CCPEBO. ISSN 1532-0626 and Serge Boverie. Bio- (print), 1532-0634 (elec- metric template protection tronic). in multimodal authentica- Alam:2015:ACF tion systems based on er- ror correcting codes. Jour- [ATS15] Shahid Alam, Issa Traore, nal of Computer Security, and Ibrahim Sogukpinar. 18(1):161–185, ???? 2010. Annotated control flow CODEN JCSIET. ISSN graph for metamorphic REFERENCES 135

malware detection. The menting TLS authentica- Computer Journal,58 tion. ACM Transactions (10):2608–2621, October on Privacy and Security 2015. CODEN CM- (TOPS), 21(1):1:1–1:??, PJA6. ISSN 0010-4620 January 2018. ISSN 2471- (print), 1460-2067 (elec- 2566 (print), 2471-2574 tronic). URL http:// (electronic). URL https: comjnl.oxfordjournals. //dl.acm.org/citation. org/content/58/10/2608. cfm?id=3139294. Aslan:2016:DEM Badawi:2018:ASS

[AUMT16] Ilhan Aslan, Andreas Uhl, [AVAH18] Ahmad Al Badawi, Bharad- Alexander Meschtscher- waj Veeravalli, Khin Mi Mi jakov, and Manfred Tsche- Aung, and Brahim Hamadicharef. ligi. Design and exploration Accelerating subset sum of mid-air authentication and lattice based public- gestures. ACM Transac- key cryptosystems with tions on Interactive Intelli- multi-core CPUs and GPUs. gent Systems (TIIS), 6(3): Journal of Parallel and 23:1–23:??, October 2016. Distributed Computing, CODEN ???? ISSN 2160- 119(??):179–190, Septem- 6455 (print), 2160-6463 ber 2018. CODEN JPD- (electronic). CER. ISSN 0743-7315 (print), 1096-0848 (elec- Abdalla:2012:LRS tronic). URL http:// www.sciencedirect.com/ [AV12] Michel Abdalla and Jill- science/article/pii/S0743731518302831. Jˆenn Vie. Leakage-resilient spatial encryption. Lec- Altaf:2015:LPM ture Notes in Computer Science, 7533:78–99, 2012. [AW15] Muhammad Shoaib Bin CODEN LNCSD9. ISSN Altaf and David A. Wood. 0302-9743 (print), 1611- LogCA: A performance 3349 (electronic). URL model for hardware accel- http://link.springer. erators. IEEE Computer com/chapter/10.1007/978- Architecture Letters, 14(2): 3-642-33481-8_5/. 132–135, July/December 2015. CODEN ???? ISSN Abdou:2018:SLV 1556-6056 (print), 1556- 6064 (electronic). [AV18] Abdelrahman Abdou and P. C. Van Oorschot. Altaf:2017:LHL Server location verifica- tion (SLV) and server [AW17] Muhammad Shoaib Bin location pinning: Aug- Altaf and David A. Wood. REFERENCES 136

LogCA: a high-level per- (print), 1943-5827 (elec- formance model for hard- tronic). ware accelerators. ACM SIGARCH Computer Ar- Ahmad:2014:RTN chitecture News, 45(2): [AY14a] Tahir Ahmad and Usman 375–388, May 2017. CO- Younis. Randomness test- DEN CANED2. ISSN ing of non-cryptographic 0163-5964 (print), 1943- hash functions for real-time 5851 (electronic). hash table based storage and look-up of URLs. Jour- Awad:2017:OLO nal of Network and Com- [AWSS17] Amro Awad, Yipeng Wang, puter Applications, 41(??): Deborah Shands, and Yan 197–205, May 2014. CO- Solihin. ObfusMem: a low- DEN JNCAF3. ISSN 1084- overhead access obfusca- 8045 (print), 1095-8592 tion for trusted memories. (electronic). URL http:// ACM SIGARCH Computer www.sciencedirect.com/ Architecture News, 45(2): science/article/pii/S1084804513002853. 107–119, May 2017. CO- AlTawy:2014:IDR DEN CANED2. ISSN 0163-5964 (print), 1943- [AY14b] Riham AlTawy and Amr M. 5851 (electronic). Youssef. Integral distin- guishers for reduced-round Anzala-Yamajako:2012:RAC Stribog. Information Pro- cessing Letters, 114(8): [AY12a] Alexandre Anzala-Yamajako. 426–431, August 2014. CO- Review of Algorithmic DEN IFPLAT. ISSN 0020- Cryptanalysis, by Antoine 0190 (print), 1872-6119 Joux. ACM SIGACT (electronic). URL http:// News, 43(4):13–16, De- www.sciencedirect.com/ cember 2012. CODEN science/article/pii/S0020019014000428. SIGNDM. ISSN 0163-5700 (print), 1943-5827 (elec- Aysu:2015:FRT tronic). [AYS15] Aydin Aysu, Bilgiday Anzala-Yamajako:2012:RBC Yuce, and Patrick Schau- mont. The future of real- [AY12b] Alexandre Anzala-Yamajako. time security: Latency- Review of Algorithmic optimized lattice-based Cryptanalysis, by Antoine digital signatures. ACM Joux. ACM SIGACT Transactions on Embedded News, 43(4):13–16, De- Computing Systems, 14(3): cember 2012. CODEN 43:1–43:??, May 2015. CO- SIGNDM. ISSN 0163-5700 DEN ???? ISSN 1539-9087 REFERENCES 137

(print), 1558-3465 (elec- July 2012. CODEN tronic). CCPEBO. ISSN 1532-0626 (print), 1532-0634 (elec- Au:2014:SMV tronic). [AYSZ14] Man Ho Au, Guomin Yang, Alshammari:2011:CET Willy Susilo, and Yunmei Zhang. (Strong) multi- [AZH11] Riyad Alshammari and designated verifiers signa- A. Nur Zincir-Heywood. tures secure against rogue Can encrypted traffic be key attack. Concurrency identified without port and Computation: Prac- numbers, IP addresses and tice and Experience, 26(8): payload inspection? Com- 1574–1592, June 10, 2014. puter Networks (Amster- CODEN CCPEBO. ISSN dam, Netherlands: 1999), 1532-0626 (print), 1532- 55(6):1326–1350, April 0634 (electronic). 25, 2011. CODEN Ayub:2012:BRB ???? ISSN 1389-1286 (print), 1872-7069 (elec- [Ayu12] Abu Mohammad Omar tronic). URL http:// Shehab Uddin Ayub. Book www.sciencedirect.com/ review: The Crypto- science/article/pii/S1389128610003695. club: Using Mathematics to Make and Break Secret Alavi:2014:RQE Codes, by Janet Beissinger and Vera Pless. ACM [AZPC14] Zohreh Alavi, Lu Zhou, SIGACT News, 43(1):9– James Powers, and Keke 14, March 2012. CODEN Chen. RASP-QS: efficient SIGNDM. ISSN 0163-5700 and confidential query ser- (print), 1943-5827 (elec- vices in the cloud. Pro- tronic). See [BP06]. ceedings of the VLDB En- dowment, 7(13):1685–1688, Apavatjrut:2012:EEA August 2014. CODEN ???? ISSN 2150-8097. [AZF+12] Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Barcellos:2018:RSP Claire Goursaud, Ka- tia Jaffr`es-Runser, C´edric [BA18] M. Barcellos and D. F. Lauradoux, and Marine Aranha. Research in secu- Minier. Energy efficient rity and privacy in Brazil. authentication strategies IEEE Security & Privacy, for network coding. Con- 16(6):14–21, November/ currency and Computa- December 2018. ISSN tion: Practice and Expe- 1540-7993 (print), 1558- rience, 24(10):1086–1107, 4046 (electronic). REFERENCES 138

Behnia:2013:IEB 2012. CODEN ATISBQ. ISSN 1094-9224 (print), [BAAS13] S. Behnia, A. Akhavan, 1557-7406 (electronic). A. Akhshani, and A. Sam- sudin. Image encryption Bai:2010:RKI based on the Jacobian el- [Bai10] L. Bai. A reliable liptic maps. The Journal (K, N) image secret shar- of Systems and Software, ing scheme with low infor- 86(9):2429–2438, Septem- mation overhead. Inter- ber 2013. CODEN JS- national Journal of Com- SODM. ISSN 0164-1212 puter Applications, 32(1): (print), 1873-1228 (elec- 9–14, 2010. ISSN 1206- tronic). URL http:// 212X (print), 1925-7074 www.sciencedirect.com/ (electronic). URL https: science/article/pii/S0164121213001283. //www.tandfonline.com/ Blaner:2013:IPP doi/full/10.1080/1206212X. 2010.11441955. [BAB+13] B. Blaner, B. Abali, B. M. Bailin:2012:ERG Bass, S. Chari, R. Kalla, S. Kunkel, K. Lauricella, [Bai12] David Bailin. Essay re- R. Leavens, J. J. Reilly, view: The geese that and P. A. Sandon. IBM never cackled. Secret Days: POWER7+ processor on- Codebreaking in Bletch- chip accelerators for cryp- ley Park, by Asa Briggs. tography and active mem- ISBN 978-1-84832-615-6, ory expansion. IBM Jour- Scope: review. Level: gen- nal of Research and De- eral readership. Contem- velopment, 57(6):3:1–3:16, porary Physics, 53(3):256– November–December 2013. 262, 2012. CODEN CT- CODEN IBMJAE. ISSN PHAF. ISSN 0010-7514 0018-8646 (print), 2151- (print), 1366-5812 (elec- 8556 (electronic). tronic). Brennan:2012:ASC Berbecaru:2010:FSM [BAG12] Michael Brennan, Sa- [BAL10] Diana Berbecaru, Luca Al- dia Afroz, and Rachel bertalli, and Antonio Lioy. Greenstadt. Adversarial The ForwardDiffsig scheme stylometry: Circumvent- for multicast authentica- ing authorship recognition tion. IEEE/ACM Trans- to preserve privacy and actions on Networking,18 anonymity. ACM Trans- (6):1855–1868, December actions on Information 2010. CODEN IEANEP. and System Security,15 ISSN 1063-6692 (print), (3):12:1–12:??, November 1558-2566 (electronic). REFERENCES 139

Barbay:2012:BRB for profiled differential side-channel cryptanaly- [Bar12] J´er´emy Barbay. Book re- sis. IEEE Transactions view: Understanding and on Computers, 65(6):1761– Applying Cryptography and 1774, June 2016. CODEN Data Security, by Adam ITCOB4. ISSN 0018-9340 J. Elbirt. ACM SIGACT (print), 1557-9956 (elec- News, 43(1):18–21, March tronic). 2012. CODEN SIGNDM. ISSN 0163-5700 (print), Bard:2019:DWG 1943-5827 (electronic). See [Elb09]. [Bar19] Gregory V. Bard. Deter- mining whether a given Barthe:2015:HAC cryptographic function is a permutation of another [Bar15] Gilles Barthe. High- given cryptographic func- assurance cryptography: tion — a problem in in- Cryptographic software we tellectual property. Theo- can trust. IEEE Security retical Computer Science, & Privacy, 13(5):86–89, 800(??):3–14, December September/October 2015. 31, 2019. CODEN TC- CODEN ???? ISSN SCDI. ISSN 0304-3975 1540-7993 (print), 1558- (print), 1879-2294 (elec- 4046 (electronic). URL tronic). URL http:// http://csdl.computer. www.sciencedirect.com/ org/csdl/mags/sp/2015/ science/article/pii/S0304397519306395. 05/msp2015050086-abs. html. Batey:2010:DMW Barker:2016:RKM [Bat10] Mavis Batey. Dilly: the [Bar16a] Elaine Barker. Recom- man who broke Enigmas. mendation for key man- Biteback, London, UK, agement. Part 1: Gen- 2010. ISBN 1-906447-15-2 eral. xi + 147, National (paperback). 256 (est.) pp. Institute for Standards LCCN ???? US$9.99. and Technology, Gaithers- Bax:2014:PPD burg, MD 20899-8900, USA, January 2016. URL [Bax14] Stephen Bax. A pro- https://nvlpubs.nist. posed partial decoding of gov/nistpubs/SpecialPublications/ the Voynich script. Web NIST.SP.800-57pt1r4.pdf. report, Centre for Re- Bartkewitz:2016:LPL search in English Language Learning and Assessment [Bar16b] Timo Bartkewitz. Leak- (CRELLA), University of age prototype learning Bedfordshire, Luton, Bed- REFERENCES 140

fordshire, UK, LU1 3JU, (print), 1879-2294 (elec- January 2014. 62 pp. URL tronic). URL http:// http://stephenbax.net/ www.sciencedirect.com/ wp-content/uploads/2014/ science/article/pii/S0304397514004241. 01/Voynich-a-provisional- partial-decoding-BAX. Barenghi:2016:FBS . pdf [BBB+16a] Alessandro Barenghi, Guido M. Baylis:2010:CC Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano [Bay10] John Baylis. Codes, not Sanfilippo, and Ruggero ciphers. The Mathemat- Susella. A fault-based se- ical Gazette, 94(531):412– cret key retrieval method 425, November 2010. CO- for ECDSA: Analysis and DEN MAGAAS. ISSN countermeasure. ACM 0025-5572. Journal on Emerging Tech- Bulygin:2010:OSS nologies in Computing Sys- tems (JETC), 13(1):8:1– [BB10] Stanislav Bulygin and 8:??, December 2016. CO- Michael Brickenstein. Ob- DEN ???? ISSN 1550- taining and solving sys- 4832. tems of equations in key variables only for the Boumerzoug:2016:LKM small variants of AES. Mathematics in Com- [BBB16b] Hayette Boumerzoug, Boucif Amar puter Science, 3(2):185– Bensaber, and Ismail 200, April 2010. CO- Biskri. A lightweight key DEN ???? ISSN 1661- management scheme based 8270 (print), 1661-8289 on an Adelson-Velskii and (electronic). URL http:/ Landis tree and elliptic /www.springerlink.com/ curve cryptography for openurl.asp?genre=article& wireless sensor networks. issn=1661-8270&volume= Concurrency and Compu- 3&issue=2&spage=185. tation: Practice and Ex- perience, 28(6):1831–1847, Bennett:2014:QCP April 25, 2016. CODEN CCPEBO. ISSN 1532-0626 [BB14] Charles H. Bennett and (print), 1532-0634 (elec- Gilles Brassard. Quan- tronic). tum cryptography: Pub- lic key distribution and Benyamina:2019:ANE coin tossing. Theoreti- cal Computer Science, 560 [BBB19] Zakarya Benyamina, Khe- (part 1)(??):7–11, Decem- lifa Benahmed, and Fateh ber 4, 2014. CODEN TC- Bounaama. ANEL: a novel SCDI. ISSN 0304-3975 efficient and lightweight REFERENCES 141

authentication scheme for com/chapter/10.1007/978- vehicular ad hoc net- 3-642-38616-9_1/. works. Computer Networks Barak:2014:OEF (Amsterdam, Netherlands: 1999), 164(??):Article 106899,[BBC+14] Boaz Barak, Nir Bitansky, December 9, 2019. CO- Ran Canetti, Yael Tau- DEN ???? ISSN 1389-1286 man Kalai, Omer Paneth, (print), 1872-7069 (elec- and Amit Sahai. Obfusca- tronic). URL http:// tion for evasive functions. www.sciencedirect.com/ Lecture Notes in Computer science/article/pii/S1389128619306012. Science, 8349:26–51, 2014. CODEN LNCSD9. ISSN Barenghi:2013:FIT 0302-9743 (print), 1611- [BBBP13] Alessandro Barenghi, Guido M. 3349 (electronic). URL Bertoni, Luca Breveglieri, http://link.springer. and Gerardo Pelosi. A fault com/chapter/10.1007/978- induction technique based 3-642-54242-8_2/. on voltage underfeeding Barthe:2019:SLN with application to attacks against AES and RSA. The [BBCL19] Gilles Barthe, Gustavo Be- Journal of Systems and tarte, Juan Diego Campo, Software, 86(7):1864–1878, and Carlos Luna. System- July 2013. CODEN JS- level non-interference of SODM. ISSN 0164-1212 constant-time cryptogra- (print), 1873-1228 (elec- phy. Part I: Model. Jour- tronic). URL http:// nal of Automated Reason- www.sciencedirect.com/ ing, 63(1):1–51, June 2019. science/article/pii/S0164121213000320. CODEN JAREEW. ISSN 0168-7433 (print), 1573- Baldi:2013:ULC 0670 (electronic). URL http://link.springer. [BBC+13] Marco Baldi, Marco Bianchi, com/article/10.1007/s10817- Franco Chiaraluce, Joachim 017-9441-5. Rosenthal, and Davide Baillot:2019:ICC Schipani. Using LDGM codes and sparse syn- [BBD19] Patrick Baillot, Gilles dromes to achieve digi- Barthe, and Ugo Dal tal signatures. Lecture Lago. Implicit computa- Notes in Computer Sci- tional complexity of subre- ence, 7932:1–15, 2013. CO- cursive definitions and ap- DEN LNCSD9. ISSN plications to cryptographic 0302-9743 (print), 1611- proofs. Journal of Au- 3349 (electronic). URL tomated Reasoning, 63(4): http://link.springer. 813–855, December 2019. REFERENCES 142

CODEN JAREEW. ISSN Beimel:2014:MLS 0168-7433 (print), 1573- 0670 (electronic). URL [BBEPT14] Amos Beimel, Aner Ben- http://link.springer. Efraim, Carles Padr´o, and com/article/10.1007/s10817- Ilya Tyomkin. Multi-linear 019-09530-2. secret-sharing schemes. Lecture Notes in Com- Beurdouche:2017:MSU puter Science, 8349:394– 418, 2014. CODEN [BBDL+17] Benjamin Beurdouche, Karthikeyan LNCSD9. ISSN 0302-9743 Bhargavan, Antoine Delignat- (print), 1611-3349 (elec- Lavaud, C´edric Fournet, tronic). URL http:// Markulf Kohlweiss, Alfredo link.springer.com/chapter/ Pironti, Pierre-Yves Strub, 10.1007/978-3-642-54242- and Jean Karim Zinzindo- 8_17/. houe. A messy state of the Bernstein:2017:SRD union: taming the compos- ite state machines of TLS. [BBG+17] Daniel J. Bernstein, Joachim Communications of the As- Breitner, Daniel Genkin, sociation for Computing Leon Groot Bruinderink, Machinery, 60(2):99–107, Nadia Heninger, Tanja February 2017. CODEN Lange, Christine van Vre- CACMA2. ISSN 0001-0782 dendaal, and Yuval Yarom. (print), 1557-7317 (elec- Sliding right into disas- tronic). URL http:// ter: Left-to-right slid- cacm.acm.org/magazines/ ing windows leak, June 2017/2/212438/fulltext. 28, 2017. URL http:/ /eprint.iacr.org/2017/ Barenghi:2016:PPE 627.pdf. Boldi:2012:IUG [BBDP16] Alessandro Barenghi, Michele Beretta, Alessandro Di [BBGT12] Paolo Boldi, Francesco Federico, and Gerardo Bonchi, Aristides Gionis, Pelosi. A privacy-preserving and Tamir Tassa. Injecting encrypted OSN with state- uncertainty in graphs for less server interaction: the identity obfuscation. Pro- snake design. Computers ceedings of the VLDB En- & Security, 63(??):67–84, dowment, 5(11):1376–1387, November 2016. CODEN July 2012. CODEN ???? CPSEDU. ISSN 0167-4048 ISSN 2150-8097. (print), 1872-6208 (elec- Bingol:2019:EPP tronic). URL https:// www.sciencedirect.com/ [BBKL19] Muhammed Ali Bing¨ol, science/article/pii/S0167404816301031. Osman Bi¸cer, Mehmet Sabir REFERENCES 143

Kiraz, and Albert Levi. Bernstein:2011:PCI An efficient 2-party pri- vate function evaluation [BC11] Daniel J. Bernstein and protocol based on half Sanjit Chatterjee, edi- gates. The Computer tors. Progress in Cryp- Journal, 62(4):598–613, tology — INDOCRYPT April 2019. CODEN CM- 2011: 12th International PJA6. ISSN 0010-4620 Conference on Cryptology (print), 1460-2067 (elec- in India, Chennai, India, tronic). URL http:// December 11–14. Proceed- academic.oup.com/comjnl/ ings, volume 7107 of Lec- article/62/4/598/5259181. ture Notes in Computer Science. Springer-Verlag, Bollman:2015:PWI Berlin, Germany / Heidel- berg, Germany / London, [BBM15] Dorothy Bollman, Alcib- UK / etc., 2011. CO- iades Bustillo, and Ein- DEN LNCSD9. ISBN 3- stein Morales. Parallel 642-25577-9. ISSN 0302- watermarking of images 9743 (print), 1611-3349 in the frequency domain. (electronic). URL http:/ Scalable Computing: Prac- /www.springerlink.com/ tice and Experience,16 content/978-3-642-25577- (2):205–217, ???? 2015. 9. CODEN ???? ISSN Basin:2014:KYE 1895-1767. URL https: //www.scpe.org/index. [BC14] David Basin and Cas Cre- php/scpe/article/view/ mers. Know your en- 1090. emy: Compromising ad- Behrad:2020:NSA versaries in protocol anal- ysis. ACM Transactions [BBTC20] Shanay Behrad, Emmanuel on Information and Sys- Bertin, St´ephane Tuffin, tem Security, 17(2):7:1– and Noel Crespi. A new 7:??, November 2014. CO- scalable authentication and DEN ATISBQ. ISSN access control mechanism 1094-9224 (print), 1557- for 5g-based IoT. Fu- 7406 (electronic). ture Generation Computer Bao:2016:LPP Systems, 108(??):46–61, July 2020. CODEN FG- [BC16] Haiyong Bao and Le Chen. SEVI. ISSN 0167-739X A lightweight privacy- (print), 1872-7115 (elec- preserving scheme with tronic). URL http:// data integrity for smart www.sciencedirect.com/ grid communications. Con- science/article/pii/S0167739X19310143. currency and Computa- REFERENCES 144

tion: Practice and Ex- Bichsel:2012:DMA perience, 28(4):1094–1110, March 25, 2016. CODEN [BCD+12] Patrik Bichsel, Jan Ca- CCPEBO. ISSN 1532-0626 menisch, Bart De Decker, (print), 1532-0634 (elec- Jorn Lapon, and Vincent tronic). Naessens. Data-minimizing authentication goes mobile. Bocu:2018:HEB Lecture Notes in Computer Science, 7394:55–71, 2012. [BC18] R. Bocu and C. Costache. CODEN LNCSD9. ISSN A homomorphic encryption- 0302-9743 (print), 1611- based system for securely 3349 (electronic). URL managing personal health http://link.springer. metrics data. IBM Jour- com/chapter/10.1007/978- nal of Research and De- 3-642-32805-3_5/. velopment, 62(1):1:1–1:10, ???? 2018. CODEN Boche:2017:CQA IBMJAE. ISSN 0018- 8646 (print), 2151-8556 [BCDN17] Holger Boche, Minglai Cai, (electronic). URL http: Christian Deppe, and Janis //ieeexplore.ieee.org/ N¨otzel. Classical-quantum document/8269765/. arbitrarily varying wiretap channel: Secret message Balagurusamy:2019:CA transmission under jam- ming attacks. Journal of [BCC+19] V. S. K. Balagurusamy, Mathematical Physics,58 C. Cabral, S. Coomaraswamy, (10):102203, October 2017. E. Delamarche, D. N. Dil- CODEN JMAPAQ. ISSN lenberger, G. Dittmann, 0022-2488 (print), 1089- D. Friedman, O. G¨ok¸ce, 7658 (electronic), 1527- N. Hinds, J. Jelitto, 2427. A. Kind, A. D. Ku- mar, F. Libsch, J. W. Badrignans:2010:SSA Ligman, S. Munetoh, C. Narayanaswami, A. Naren-[BCE+10] Benoˆıt Badrignans, David dra, A. Paidimarri, M. A. P. Champagne, Reouven El- Delgado, J. Rayfield, C. Sub- baz, Catherine Gebotys, ramanian, and R. Vaculin. and Lionel Torres. SAR- Crypto anchors. IBM Jour- FUM: Security architec- nal of Research and Devel- ture for remote FPGA up- opment, 63(2–3):4:1–4:12, date and monitoring. ACM March/May 2019. CODEN Transactions on Reconfig- IBMJAE. ISSN 0018-8646 urable Technology and Sys- (print), 2151-8556 (elec- tems, 3(2):8:1–8:??, May tronic). 2010. CODEN ???? ISSN REFERENCES 145

1936-7406 (print), 1936- (print), 1557-945X (elec- 7414 (electronic). tronic). Balfanz:2012:FA Bana:2020:VMC

[BCE+12] Dirk Balfanz, Richard [BCEO20] Gergei Bana, Rohit Chadha, Chow, Ori Eisen, Markus Ajay Kumar Eeralla, and Jakobsson, Steve Kirsch, Mitsuhiro Okada. Verifica- Scott Matsumoto, Jesus tion methods for the com- Molina, and Paul van putationally complete sym- Oorschot. The future of bolic attacker based on in- authentication. IEEE Se- distinguishability. ACM curity & Privacy, 10(1): Transactions on Compu- 22–27, January/February tational Logic, 21(1):2:1– 2012. ISSN 1540-7993 2:44, January 2020. CO- (print), 1558-4046 (elec- DEN ???? ISSN 1529-3785 tronic). (print), 1557-945X (elec- tronic). Bugliesi:2015:ART Buhrman:2014:PBQ [BCEM15] Michele Bugliesi, Ste- fano Calzavara, Fabienne [BCF+14] Harry Buhrman, Nishanth Eigner, and Matteo Maf- Chandran, Serge Fehr, Ran fei. Affine refinement types Gelles, Vipul Goyal, Rafail for secure distributed pro- Ostrovsky, and Christian gramming. ACM Transac- Schaffner. Position-based tions on Programming Lan- : guages and Systems, 37(4): Impossibility and construc- 11:1–11:??, August 2015. tions. SIAM Journal on CODEN ATPSDT. ISSN Computing, 43(1):150–178, 0164-0925 (print), 1558- ???? 2014. CODEN SMJ- 4593 (electronic). CAT. ISSN 0097-5397 (print), 1095-7111 (elec- Bana:2019:VMC tronic). [BCEO19] Gergei Bana, Rohit Chadha, Bahri:2016:CCO Ajay Kumar Eeralla, and Mitsuhiro Okada. Verifica- [BCF16] Leila Bahri, Barbara Carmi- tion methods for the com- nati, and Elena Ferrari. putationally complete sym- COIP-continuous, opera- bolic attacker based on in- ble, impartial, and privacy- distinguishability. ACM aware identity validity es- Transactions on Compu- timation for OSN profiles. tational Logic, 21(1):2:1– ACM Transactions on the 2:??, October 2019. CO- Web (TWEB), 10(4):23:1– DEN ???? ISSN 1529-3785 23:??, December 2016. CO- REFERENCES 146

DEN ???? ISSN 1559-1131 tronic). URL http:// (print), 1559-114X (elec- comjnl.oxfordjournals. tronic). org/content/55/6/653. full.pdf+html. Bugliesi:2015:CPB Borghoff:2012:PLL [BCFK15] Michele Bugliesi, Stefano + Calzavara, Riccardo Fo- [BCG 12b] Julia Borghoff, Anne Can- cardi, and Wilayat Khan. teaut, Tim G¨uneysu, CookiExt: Patching the Elif Bilge Kavun, and browser against session hi- Miroslav Knezevic. PRINCE jacking attacks. Journal — a low-latency block ci- of Computer Security,23 pher for pervasive comput- (4):509–537, ???? 2015. ing applications. Lecture CODEN JCSIET. ISSN Notes in Computer Sci- 0926-227X (print), 1875- ence, 7658:208–225, 2012. 8924 (electronic). CODEN LNCSD9. ISSN 0302-9743 (print), 1611- Benedetto:2010:DQE 3349 (electronic). URL http://link.springer. [BCG10] Francesco Benedetto, Al- com/chapter/10.1007/978- berto Curcio, and Gae- 3-642-34961-4_14/. tano Giunta. Dynamic QoS evaluation of multi- Blais:2019:DTL media contents in wire- [BCG19] Eric Blais, Cl´ement L. less networks by “double- Canonne, and Tom Gur. boomerang” watermark- Distribution testing lower ing. Future Internet,2 bounds via reductions (1):60–73, March 08, 2010. from communication com- CODEN ???? ISSN 1999- plexity. ACM Trans- 5903. URL https://www. actions on Computation mdpi.com/1999-5903/2/ Theory, 11(2):6:1–6:??, 1/60. April 2019. CODEN Bahi:2012:SCS ???? ISSN 1942-3454 (print), 1942-3462 (elec- [BCG12a] Jacques M. Bahi, Jean- tronic). URL https:// Fran¸cois Couchot, and dl.acm.org/ft_gateway. Christophe Guyeux. Steganog- cfm?id=3305270. raphy: a class of se- Baelde:2012:TPR cure and robust algo- rithms. The Computer [BCGAPM12] David Baelde, Pierre Courtieu, Journal, 55(6):653–666, David Gross-Amblard, and June 2012. CODEN CM- Christine Paulin-Mohring. PJA6. ISSN 0010-4620 Towards provably robust (print), 1460-2067 (elec- watermarking. Lecture REFERENCES 147

Notes in Computer Sci- 88–92, September/October ence, 7406:201–216, 2012. 2016. CODEN ???? ISSN CODEN LNCSD9. ISSN 1540-7993 (print), 1558- 0302-9743 (print), 1611- 4046 (electronic). URL 3349 (electronic). URL https://www.computer. http://link.springer. org/csdl/mags/sp/2016/ com/chapter/10.1007/978- 05/msp2016050088-abs. 3-642-32347-8_14/. html. Bahi:2011:ECS Boneh:2016:BHP [BCGH11] Jacques M. Bahi, Rapha¨el [BCGS16] Dan Boneh, Henry Corrigan- Couturier, Christophe Guyeux, Gibbs, and Stuart Schechter. and Pierre-Cyrille H´eam. Balloon hashing: Provably Efficient and cryptograph- space-hard hash functions ically secure generation with data-independent ac- of chaotic pseudoran- cess patterns, January 14, dom numbers on GPU. 2016. URL https:// arxiv.org, ??(??):??, De- pdfs.semanticscholar. cember 22, 2011. URL org/f49f/8e135695937bfe03e467e215177eec79d http://arxiv.org/abs/ pdf. Cryptology ePrint 1112.5239. Archive Report 2016/027 Version: 20160601:225540. Barthe:2012:CACa See [AB17]. [BCGK12] Gilles Barthe, Juan Manuel Belleville:2019:ASP Crespo, Benjamin Gr´egoire, and C´esar Kunz. Computer- [BCHC19] Nicolas Belleville, Damien aided cryptographic proofs. Courouss´e, Karine Hey- Lecture Notes in Computer demann, and Henri-Pierre Science, 7406:11–27, 2012. Charles. Automated CODEN LNCSD9. ISSN software protection for 0302-9743 (print), 1611- the masses against side- 3349 (electronic). URL channel attacks. ACM http://link.springer. Transactions on Architec- com/chapter/10.1007/978- ture and Code Optimiza- 3-642-32347-8_2/. tion, 15(4):47:1–47:??, Jan- uary 2019. CODEN ???? Beunardeau:2016:WBC ISSN 1544-3566 (print), [BCGN16] Marc Beunardeau, Ais- 1544-3973 (electronic). ling Connolly, Remi Ger- Batina:2019:ISI aud, and David Naccache. White-box cryptography: [BCHL19] Lejla Batina, Sherman Security in an insecure S. M. Chow, Gerhard environment. IEEE Se- Hancke, and Zhe Liu. In- curity & Privacy, 14(5): troduction to the special REFERENCES 148

issue on cryptographic en- Bitansky:2017:VGB gineering for Internet of Things: Security foun- [BCKP17] Nir Bitansky, Ran Canetti, dations, lightweight solu- Yael Tauman Kalai, and tions, and attacks. ACM Omer Paneth. On vir- Transactions on Embedded tual grey box obfuscation Computing Systems, 18(3): for general circuits. Algo- 22:1–22:??, June 2019. CO- rithmica, 79(4):1014–1051, DEN ???? ISSN 1539-9087 December 2017. CODEN (print), 1558-3465 (elec- ALGOEJ. ISSN 0178-4617 tronic). URL https:// (print), 1432-0541 (elec- dl.acm.org/ft_gateway. tronic). cfm?id=3322641. Bernstein:2014:CKR Bitansky:2013:SNI [BCL14] Daniel J. Bernstein, Chitchanok [BCI+13] Nir Bitansky, Alessandro Chuengsatiansup, and Tanja Chiesa, Yuval Ishai, Omer Lange. Curve41417: Paneth, and Rafail Os- Karatsuba revisited. Re- trovsky. Succinct non- port, Department of Com- interactive arguments via puter Science, University linear interactive proofs. of Illinois at Chicago, and Lecture Notes in Com- Department of Mathemat- puter Science, 7785:315– ics and Computer Sci- 333, 2013. CODEN ence, Technische Univer- LNCSD9. ISSN 0302-9743 siteit Eindhoven, Chicago, (print), 1611-3349 (elec- IL 60607-7045, USA and tronic). URL http:// P.O. Box 513, 5600 MB link.springer.com/chapter/ Eindhoven, The Nether- 10.1007/978-3-642-36594- lands, July 6, 2014. 19 2_18/. pp. URL http://cr. yp.to/ecdh/curve41417- Brandenburger:2017:DTC 20140706.pdf. [BCK17] Marcus Brandenburger, Basin:2012:PRI Christian Cachin, and Nikola Knezevi´c. Don’t [BCM12] David Basin, Cas Cremers, trust the cloud, verify: In- and Simon Meier. Prov- tegrity and consistency for ably repairing the ISO/ cloud object stores. ACM IEC 9798 standard for en- Transactions on Privacy tity authentication. Lecture and Security (TOPS),20 Notes in Computer Sci- (3):8:1–8:??, August 2017. ence, 7215:129–148, 2012. CODEN ???? ISSN 2471- CODEN LNCSD9. ISSN 2566 (print), 2471-2574 0302-9743 (print), 1611- (electronic). 3349 (electronic). URL REFERENCES 149

http://link.springer. 0022-2488 (print), 1089- com/chapter/10.1007/978- 7658 (electronic), 1527- 3-642-28641-4_8/. 2427. Basin:2013:PRI Bicakci:2013:LSS

[BCM13] David Basin, Cas Cremers, [BCO13] Kemal Bicakci, Bruno and Simon Meier. Prov- Crispo, and Gabriele Oligeri. ably repairing the ISO/ LAKE: a server-side au- IEC 9798 standard for en- thenticated key-establishment tity authentication. Jour- with low computational nal of Computer Security, workload. ACM Trans- 21(6):817–846, ???? 2013. actions on Internet Tech- CODEN JCSIET. ISSN nology (TOIT), 13(2):5:1– 0926-227X (print), 1875- 5:??, December 2013. CO- 8924 (electronic). DEN ???? ISSN 1533-5399 Basin:2015:ISC (print), 1557-6051 (elec- tronic). [BCM+15] David Basin, Cas Cre- mers, Kunihiko Miyazaki, Botta:2014:PCI Sasa Radomirovic, and Dai [BCP14a] Marco Botta, Davide Cav- Watanabe. Improving the agnino, and Victor Pompo- security of cryptographic niu. Protecting the con- protocol standards. IEEE tent integrity of digital im- Security & Privacy,13 agery with fidelity preser- (3):24–31, May/June 2015. vation: An improved ver- CODEN ???? ISSN 1540- sion. ACM Transactions 7993 (print), 1558-4046 on Multimedia Comput- (electronic). URL http:// ing, Communications, and www.computer.org/csdl/ Applications, 10(3):29:1– mags/sp/2015/03/msp2015030024- 29:??, April 2014. CO- . abs.html DEN ???? ISSN 1551-6857 Boche:2019:SMT (print), 1551-6865 (elec- [BCND19] Holger Boche, Minglai Cai, tronic). Janis N¨otzel, and Chris- Boyle:2014:EO tian Deppe. Secret message transmission over quantum [BCP14b] Elette Boyle, Kai-Min channels under adversar- Chung, and Rafael Pass. ial quantum noise: Se- On extractability obfusca- crecy capacity and super- tion. Lecture Notes in activation. Journal of Computer Science, 8349: Mathematical Physics,60 52–73, 2014. CODEN (6):062202, June 2019. CO- LNCSD9. ISSN 0302-9743 DEN JMAPAQ. ISSN (print), 1611-3349 (elec- REFERENCES 150

tronic). URL http:// (3):43:1–43:??, November link.springer.com/chapter/ 2016. CODEN CMSVAN. 10.1007/978-3-642-54242- ISSN 0360-0300 (print), 8_3/. 1557-7341 (electronic). Basso:2011:BWC Biddle:2012:GPL

[BCPV11] Alessandro Basso, Davide [BCV12] Robert Biddle, Sonia Chi- Cavagnino, Victor Pompo- asson, and P. C. Van niu, and Annamaria Ver- Oorschot. Graphical pass- none. Blind watermark- words: Learning from the ing of color images us- first twelve years. ACM ing Karhunen–Lo`eve trans- Computing Surveys, 44(4): form keying. The Com- 19:1–19:??, August 2012. puter Journal, 54(7):1076– CODEN CMSVAN. ISSN 1090, July 2011. CODEN 0360-0300 (print), 1557- CMPJA6. ISSN 0010-4620 7341 (electronic). (print), 1460-2067 (elec- tronic). URL http:// Barker:2015:RKM comjnl.oxfordjournals. [BD15] Elaine Barker and Quynh org/content/54/7/1076. Dang. Recommendation full.pdf+html. for key management. Part Bessani:2013:DDS 3: Application-specific key management guidance. [BCQ+13] Alysson Bessani, Miguel NIST Special Publication Correia, Bruno Quaresma, 800-57 Part 3 Revision Fernando Andr´e, and 1, National Institute for Paulo Sousa. DepSky: Standards and Technol- Dependable and secure ogy, Gaithersburg, MD storage in a cloud-of- 20899-8900, USA, January clouds. ACM Transac- 2015. vii + 94 pp. URL tions on Storage, 9(4):12:1– https://nvlpubs.nist. 12:??, November 2013. CO- gov/nistpubs/specialpublications/ DEN ???? ISSN 1553-3077 nist.sp.800-57pt3r1.pdf. (print), 1553-3093 (elec- tronic). Baruah:2018:TFA Blasco:2016:SWB [BD18] Barnana Baruah and Sub- hasish Dhal. A two-factor [BCTPL16] Jorge Blasco, Thomas M. authentication scheme against Chen, Juan Tapiador, and FDM attack in IFTTT Pedro Peris-Lopez. A sur- based smart home sys- vey of wearable biometric tem. Computers & Se- recognition systems. ACM curity, 77(??):21–35, Au- Computing Surveys,49 gust 2018. CODEN REFERENCES 151

CPSEDU. ISSN 0167-4048 0302-9743 (print), 1611- (print), 1872-6208 (elec- 3349 (electronic). URL tronic). URL https:// http://link.springer. www.sciencedirect.com/ com/chapter/10.1007/978- science/article/pii/S0167404818302402. 3-642-33383-5_7/. Belkacem:2014:DCM Bhasin:2015:EFB

[BDB14] Samia Belkacem, Zohir [BDGH15] Shivam Bhasin, Jean-Luc Dibi, and Ahmed Bouri- Danger, Sylvain Guilley, dane. DCT coefficients and Wei He. Exploiting modelling for image wa- FPGA block memories for termarking. International protected cryptographic Journal of Computer Ap- implementations. ACM plications, 36(4):155–163, Transactions on Reconfig- 2014. ISSN 1206-212X urable Technology and Sys- (print), 1925-7074 (elec- tems, 8(3):16:1–16:??, May tronic). URL https: 2015. CODEN ???? ISSN //www.tandfonline.com/ 1936-7406 (print), 1936- doi/full/10.2316/Journal. 7414 (electronic). 202.2014.4.202-4017. Buchmann:2011:XPF Bruguera:2019:GEI [BDH11] Johannes Buchmann, Eeik [BdD19] J. D. Bruguera and F. de Dinechin. Dahmen, and Andreas Guest Editors introduc- H¨ulsing. XMSS — a prac- tion: Special section tical forward secure sig- on computer arithmetic. nature scheme based on IEEE Transactions on minimal security assump- Computers, 68(7):951–952, tions. Lecture Notes in July 2019. CODEN IT- Computer Science, 7071: COB4. ISSN 0018-9340 117–129, 2011. CO- (print), 1557-9956 (elec- DEN LNCSD9. ISSN tronic). 0302-9743 (print), 1611- 3349 (electronic). URL Bender:2012:DSP https://link.springer. [BDFK12] Jens Bender, Ozg¨¨ ur Dagde- com/chapter/10.1007/978- len, Marc Fischlin, and 3-642-25405-5_8. Dennis K¨ugler. Domain- Backstrom:2011:WAT specific pseudonymous sig- natures for the German [BDK11] Lars Backstrom, Cynthia identity card. Lecture Dwork, and Jon Klein- Notes in Computer Sci- berg. Wherefore art thou ence, 7483:104–119, 2012. R3579X?: anonymized CODEN LNCSD9. ISSN social networks, hidden REFERENCES 152

patterns, and structural http://ed25519.cr.yp. steganography. Communi- to/ed25519-20110926.pdf. cations of the Association for Computing Machinery, Barbareschi:2019:PBM 54(12):133–141, December [BDL+19] Mario Barbareschi, Alessan- 2011. CODEN CACMA2. dra De Benedictis, Erasmo ISSN 0001-0782 (print), La Montagna, Antonino 1557-7317 (electronic). Mazzeo, and Nicola Maz- zocca. A PUF-based mu- Biryukov:2016:ANG tual authentication scheme for cloud-edges IoT sys- [BDK16] Alex Biryukov, Daniel tems. Future Genera- Dinu, and Dmitry Khovra- tion Computer Systems, tovich. Argon2: new gener- 101(??):246–261, Decem- ation of memory-hard func- ber 2019. CODEN FG- tions for password hash- SEVI. ISSN 0167-739X ing and other applications. (print), 1872-7115 (elec- In IEEE, editor, 2016 tronic). URL http:// IEEE European Sympo- www.sciencedirect.com/ sium on Security and Pri- science/article/pii/S0167739X19301293. vacy (EURO S&P 2016). 21–24 March 2016 Saar- Barbareschi:2018:PBH bruecken, Germany, pages 292–302. IEEE Computer [BDM18] Mario Barbareschi, Alessan- Society Press, 1109 Spring dra De Benedictis, and Street, Suite 300, Silver Nicola Mazzocca. A Spring, MD 20910, USA, PUF-based hardware mu- 2016. ISBN 1-5090-1751-8. tual authentication proto- LCCN ???? URL https: col. Journal of Paral- //ieeexplore.ieee.org/ lel and Distributed Com- document/7467361. IEEE puting, 119(??):107–120, Computer Society Or- September 2018. CODEN der Number P5776. See JPDCER. ISSN 0743-7315 [AB17]. (print), 1096-0848 (elec- tronic). URL http:// Bernstein:2011:HSH www.sciencedirect.com/ science/article/pii/S0743731518302582. + [BDL 11] D. Bernstein, N. Duif, Belkhouja:2019:BBA T. Lange, P. Schwabe, and B. Yang. High-speed [BDM+19] Taha Belkhouja, Xiao- high-security signatures. jiang Du, Amr Mohamed, Journal of Cryptographic Abdulla K. Al-Ali, and Engineering, 2(2):77–89, Mohsen Guizani. Biometric- September 2011. URL based authentication scheme REFERENCES 153

for implantable medical de- Bertoni:2011:CSF vices during emergency sit- uations. Future Gener- [BDP11] Guido Bertoni, Joan Dae- ation Computer Systems, men, and Micha¨el Peeters. 98(??):109–119, Septem- Cryptographic sponge func- ber 2019. CODEN FG- tions. Report, STMicro- SEVI. ISSN 0167-739X electronics, Antwerp, Bel- (print), 1872-7115 (elec- gium (??), January 14, tronic). URL http:// 2011. 93 pp. URL http: www.sciencedirect.com/ //sponge.noekeon.org/ science/article/pii/S0167739X18325792. CSF-0.1.pdf. Bertoni:2012:KIO Bossuet:2016:EPA [BDP+12] Guido Bertoni, Joan Dae- [BDMLN16] Lilian Bossuet, Nilan- men, Micha¨el Peeters, jan Datta, Cuauhtemoc Gilles Van Assche, and Mancillas-L´opez, and Mridul Ronny Van Keer. Keccak Nandi. ELmD: A pipeline- implementation overview. able authenticated encryp- Report, STMicroelectron- tion and its hardware im- ics, Antwerp, Belgium plementation. IEEE Trans- (??), May 29, 2012. actions on Computers,65 59 pp. URL http: (11):3318–3331, November //keccak.noekeon.org/ 2016. CODEN ITCOB4. Keccak-implementation- ISSN 0018-9340 (print), 3.2.pdf. 1557-9956 (electronic). Boldyreva:2012:SSE

Bendlin:2011:SHE [BDPS12] Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. [BDOZ11] Rikke Bendlin, Ivan Damga˚ard, Paterson, and Martijn Claudio Orlandi, and Stam. Security of symmet- Sarah Zakarias. Semi- ric encryption in the pres- homomorphic encryption ence of ciphertext fragmen- and multiparty computa- tation. Lecture Notes in tion. Lecture Notes in Computer Science, 7237: Computer Science, 6632: 682–699, 2012. CO- 169–188, 2011. CO- DEN LNCSD9. ISSN DEN LNCSD9. ISSN 0302-9743 (print), 1611- 0302-9743 (print), 1611- 3349 (electronic). URL 3349 (electronic). URL http://link.springer. http://link.springer. com/accesspage/chapter/ com/content/pdf/10.1007/ 10.1007/978-3-642-29011- 978-3-642-20465-4_11. 4_39; http://link.springer. REFERENCES 154

com/chapter/10.1007/978- (print), 1872-6208 (elec- 3-642-29011-4_40/. tronic). URL https:// www.sciencedirect.com/ Bertoni:2012:KSF science/article/pii/S0167404818300841. [BDPV12] Guido Bertoni, Joan Dae- Beebe:2017:MFC men, Micha¨el Peeters, and Gilles Van Assche. The [Bee17] Nelson H. F. Beebe. The Keccak Mathematical-Function Com- family. Web site, October putation Handbook: Pro- 24, 2012. URL http:// gramming Using the MathCW keccak.noekeon.org/. Portable Software Library. Springer-Verlag, Berlin, Bitansky:2013:WFS Germany / Heidelberg, [BDSG+13] Nir Bitansky, Dana Dachman- Germany / London, UK / Soled, Sanjam Garg, Ab- etc., 2017. ISBN 3-319- hishek Jain, Yael Tauman 64109-3 (hardcover), 3-319- Kalai, Adriana L´opez-Alt, 64110-7 (e-book). xxxvi + and Daniel Wichs. Why 1114 pp. LCCN QA75.5- “Fiat–Shamir for proofs” 76.95. URL http://www. lacks a proof. Lecture springer.com/us/book/ Notes in Computer Sci- 9783319641096. ence, 7785:182–201, 2013. Bellovin:2015:WRC CODEN LNCSD9. ISSN 0302-9743 (print), 1611- [Bel15] Steven M. Bellovin. What 3349 (electronic). URL a real cybersecurity bill http://link.springer. should address. IEEE Se- com/chapter/10.1007/978- curity & Privacy, 13(3): 3-642-36594-2_11/. 92, May/June 2015. CO- DEN ???? ISSN 1540-7993 Bottarelli:2018:PCW (print), 1558-4046 (elec- [BEB+18] Mirko Bottarelli, Gregory tronic). URL http:// Epiphaniou, Dhouha Kbaier www.computer.org/csdl/ Ben Ismail, Petros Karadi- mags/sp/2015/03/msp2015030092. mas, and Haider Al- html. Khateeb. Physical char- Bellovin:2016:EEE acteristics of wireless com- munication channels for [Bel16] Steven M. Bellovin. Easy secret key establishment: email encryption. IEEE a survey of the research. Security & Privacy, 14(6): Computers & Security, 96, November/December 78(??):454–476, Septem- 2016. CODEN ???? ISSN ber 2018. CODEN 1540-7993 (print), 1558- CPSEDU. ISSN 0167-4048 4046 (electronic). URL REFERENCES 155

https://www.computer. cryptographic architec- org/csdl/mags/sp/2016/ ture. In Montuschi 06/msp2016060096.html. et al. [MSH+16], pages 16– 23. ISBN 1-5090-1615-5. Bellovin:2018:UAE ISSN 1063-6889. LCCN [Bel18a] Steven M. Bellovin. Usenet, QA76.9.C62 S95 2016. authentication, and engi- URL http://ieeexplore. neering (or: Early de- ieee.org/servlet/opac? sign decisions for Usenet). punumber=7562813. Web article., February 23, Berghel:2012:ITF 2018. URL https:// www.cs.columbia.edu/~ [Ber12] Hal Berghel. Identity theft smb/blog/2018-02/2018- and financial fraud: Some 02-23.html. strangeness in the propor- Beltran:2018:IAA tions. Computer, 45(1):86– 89, January 2012. CODEN [Bel18b] Marta Beltr´an. Identi- CPTRB4. ISSN 0018-9162. fying, authenticating and Bera:2014:QC authorizing smart objects and end users to cloud [Ber14] Subhendu Bera. Quantum services in Internet of cryptography. Linux Jour- Things. Computers & nal, 2014(237):1:1–1:??, Security, 77(??):595–611, January 2014. CODEN LI- August 2018. CODEN JOFX. ISSN 1075-3583 CPSEDU. ISSN 0167-4048 (print), 1938-3827 (elec- (print), 1872-6208 (elec- tronic). tronic). URL https:// www.sciencedirect.com/ Berghel:2016:CKF science/article/pii/S0167404818301366[Ber16a]. Hal Berghel. Coda in Bellovin:2019:LI the key of F2654hD4. Computer, 49(9):104–109, [Bel19] S. M. Bellovin. Layered September 2016. CO- insecurity. IEEE Secu- DEN CPTRB4. ISSN rity & Privacy, 17(3):96– 0018-9162 (print), 1558- 95, May/June 2019. ISSN 0814 (electronic). URL 1540-7993 (print), 1558- https://www.computer. 4046 (electronic). org/csdl/mags/co/2016/ 09/mco2016090104.html. Bajard:2016:MFA Berghel:2016:DJT [BEM16] Jean-Claude Bajard, Julien Eynard, and Nabil Mer- [Ber16b] Hal Berghel. Douglas kiche. Multi-fault at- Jones on today’s voting tack detection for RNS machines. Computer,49 REFERENCES 156

(10):84–89, October 2016. Bouman:2011:SAW CODEN CPTRB4. ISSN 0018-9162 (print), 1558- [BF11] Niek J. Bouman and Serge 0814 (electronic). URL Fehr. Secure authenti- https://www.computer. cation from a , org/csdl/mags/co/2016/ without leaking informa- 10/mco2016100084.html. tion. Lecture Notes in Computer Science, 6632: Berghel:2016:S 246–265, 2011. CO- [Ber16c] Hal Berghel. Secretoc- DEN LNCSD9. ISSN racy. Computer, 49(2):63– 0302-9743 (print), 1611- 67, February 2016. CO- 3349 (electronic). URL DEN CPTRB4. ISSN http://link.springer. 0018-9162 (print), 1558- com/content/pdf/10.1007/ 0814 (electronic). URL 978-3-642-20465-4_15. http://csdl.computer. Bas:2012:BLK org/csdl/mags/co/2016/ 02/mco2016020063.html. [BF12] Patrick Bas and Teddy Furon. Are 128 bits Berghel:2017:ELR Long keys possible in wa- [Ber17] Hal Berghel. Equifax termarking? Lecture and the latest round of Notes in Computer Sci- identity theft roulette. ence, 7394:191, 2012. CO- Computer, 50(12):72–76, DEN LNCSD9. ISSN December 2017. CO- 0302-9743 (print), 1611- DEN CPTRB4. ISSN 3349 (electronic). URL 0018-9162 (print), 1558- http://link.springer. 0814 (electronic). URL com/accesspage/chapter/ https://www.computer. 10.1007/978-3-642-32805- org/csdl/mags/co/2017/ 3_15. 12/mco2017120072.html. Bos:2019:ACI Berretti:2018:IAS [BF19] J. W. Bos and S. J. Fried- [Ber18] Stefano Berretti. Im- berger. Arithmetic con- proved audio steganalytic siderations for isogeny- feature and its applications based cryptography. IEEE in audio forensics. ACM Transactions on Comput- Transactions on Multi- ers, 68(7):979–990, July media Computing, Com- 2019. CODEN ITCOB4. munications, and Appli- ISSN 0018-9340 (print), cations, 14(2):43:1–43:??, 1557-9956 (electronic). May 2018. CODEN ???? Bhargavan:2012:VCI ISSN 1551-6857 (print), 1551-6865 (electronic). [BFCZ12] Karthikeyan Bhargavan, REFERENCES 157

C´edric Fournet, Ricardo (print), 1557-7406 (elec- Corin, and Eugen Zali- tronic). nescu. Verified crypto- graphic implementations Bhargavan:2016:MVP for TLS. ACM Transac- [BFK16] Karthikeyan Bhargavan, tions on Information and Cedric Fournet, and Markulf System Security, 15(1):3:1– Kohlweiss. miTLS: Veri- 3:??, March 2012. CODEN fying protocol implemen- ATISBQ. ISSN 1094-9224 tations against real-world (print), 1557-7406 (elec- attacks. IEEE Security tronic). & Privacy, 14(6):18–25, Barthe:2014:PRV November/December 2016. CODEN ???? ISSN [BFG+14] Gilles Barthe, C´edric Four- 1540-7993 (print), 1558- net, Benjamin Gr´egoire, 4046 (electronic). URL Pierre-Yves Strub, Nikhil https://www.computer. Swamy, and Santiago org/csdl/mags/sp/2016/ Zanella-B´eguelin. Proba- 06/msp2016060018-abs. bilistic relational verifica- html. tion for cryptographic im- Beimel:2012:SSS plementations. ACM SIG- PLAN Notices, 49(1):193– [BFM12] Amos Beimel, Oriol Farr`as, 205, January 2014. CO- and Yuval Mintz. Se- DEN SINODQ. ISSN 0362- cret sharing schemes for 1340 (print), 1523-2867 very dense graphs. Lecture (print), 1558-1160 (elec- Notes in Computer Sci- tronic). POPL ’14 confer- ence, 7417:144–161, 2012. ence proceedings. CODEN LNCSD9. ISSN 0302-9743 (print), 1611- Bobba:2010:ABM 3349 (electronic). URL [BFK+10] Rakesh Bobba, Omid http://link.springer. Fatemieh, Fariba Khan, com/chapter/10.1007/978- Arindam Khan, Carl A. 3-642-32009-5_10/. Gunter, Himanshu Khu- Berger:2016:EGF rana, and Manoj Prab- hakaran. Attribute-based [BFMT16] Thierry P. Berger, Julien messaging: Access control Francq, Marine Minier, and confidentiality. ACM and Ga¨el Thomas. Ex- Transactions on Informa- tended generalized Feis- tion and System Secu- tel networks using matrix rity, 13(4):31:1–31:??, De- representation to propose cember 2010. CODEN a new lightweight block ATISBQ. ISSN 1094-9224 cipher: Lilliput. IEEE REFERENCES 158

Transactions on Comput- CODEN LNCSD9. ISSN ers, 65(7):2074–2089, ???? 0302-9743 (print), 1611- 2016. CODEN ITCOB4. 3349 (electronic). URL ISSN 0018-9340 (print), http://link.springer. 1557-9956 (electronic). com/accesspage/chapter/ 10.1007/978-3-642-33125- Boldyreva:2014:MEW 1_1. [BG14] Alexandra Boldyreva and Balagani:2018:IAC Paul Grubbs. Making encryption work in the [BGE+18] Kiran S. Balagani, Paolo cloud. Network Secu- Gasti, Aaron Elliott, Azriel rity, 2014(10):8–10, Oc- Richardson, and Mike tober 2014. CODEN O’Neal. The impact of ap- NTSCF5. ISSN 1353-4858 plication context on pri- (print), 1872-9371 (elec- vacy and performance of tronic). URL http:// keystroke authentication www.sciencedirect.com/ systems. Journal of Com- science/article/pii/S1353485814701011. puter Security, 26(4):543– 556, ???? 2018. CODEN Battistello:2012:TBA JCSIET. ISSN 0926-227X (print), 1875-8924 (elec- [BGAD12] Patrick Battistello, Joaquin tronic). Garcia-Alfaro, and Cyril Del´etr´e. Transaction- Bossuet:2013:AFS based authentication and key agreement protocol [BGG+13] Lilian Bossuet, Michael for inter-domain VoIP. Grand, Lubos Gaspar, Vik- Journal of Network and tor Fischer, and Guy Gog- Computer Applications,35 niat. Architectures of flex- (5):1579–1597, Septem- ible symmetric key crypto ber 2012. CODEN JN- engines — a survey: From CAF3. ISSN 1084-8045 hardware coprocessor to (print), 1095-8592 (elec- multi-crypto-processor sys- tronic). URL http:// tem on chip. ACM Com- www.sciencedirect.com/ puting Surveys, 45(4):41:1– science/article/pii/S1084804512000653. 41:??, August 2013. CO- DEN CMSVAN. ISSN Barthe:2012:CACb 0360-0300 (print), 1557- [BGB12] Gilles Barthe, Benjamin 7341 (electronic). Gr´egoire, and Santiago Zanella Boudot:2019:BFD B´eguelin. Computer-aided cryptographic proofs. Lec- [BGG+19] Fabrice Boudot, Pierrick ture Notes in Computer Gaudry, Aurore Guille- Science, 7460:1–2, 2012. vic, Nadia Heninger, Em- REFERENCES 159

manuel Thom´e, and Paul and Emmanuel Thom´e. Zimmermann. 795-bit fac- A quasi-polynomial algo- toring and discrete loga- rithm for discrete loga- rithms. Cado-nfs-discuss rithm in finite fields of mailing list., December small characteristic. Re- 2, 2019. URL https: port, Inria, CNRS, Uni- //lists.gforge.inria. versity of Lorraine; Foun- fr/pipermail/cado-nfs- dation UPMC — LIP 6, discuss/2019-December/ CNRS UMR 7606; Crypto- 001139.html. Experts, Lorraine, France; Barak:2010:IPO Paris, France; Paris, France, November 25, [BGI+10] Boaz Barak, Oded Gol- 2013. 16 pp. URL http:/ dreich, Russell Impagli- /eprint.iacr.org/2013/ azzo, Steven Rudich, Amit 400.pdf. Sahai, Salil Vadhan, and Ke Yang. On the Barbulescu:2014:HQP (im)possibility of obfus- cating programs. Re- [BGJT14] Razvan Barbulescu, Pier- port, Weizmann Institute, rick Gaudry, Antoine Joux, Rehovot 7610001, Israel, and Emmanuel Thom´e. A July 29, 2010. 54 pp. heuristic quasi-polynomial URL http://www.wisdom. algorithm for discrete log- weizmann.ac.il/~oded/ arithm in finite fields of PS/obf4.pdf. small characteristic. Lec- ture Notes in Computer Barak:2012:IPO Science, 8441:1–16, 2014.

+ [BGI 12] Boaz Barak, Oded Gol- Barthe:2012:ACA dreich, Russell Impagli- azzo, Steven Rudich, Amit [BGK12] Gilles Barthe, Benjamin Sahai, Salil Vadhan, and Gr´egoire, and C´esar Kunz. Ke Yang. On the Automation in computer- (im)possibility of obfuscat- aided cryptography: Proofs, ing programs. Journal of attacks and designs. Lec- the ACM, 59(2):6:1–6:48, ture Notes in Computer April 2012. CODEN JA- Science, 7679:7–8, 2012. COAH. ISSN 0004-5411 CODEN LNCSD9. ISSN (print), 1557-735X (elec- 0302-9743 (print), 1611- tronic). 3349 (electronic). URL Barbulescu:2013:QPA http://link.springer. com/accesspage/chapter/ [BGJT13] Razvan Barbulescu, Pier- 10.1007/978-3-642-35308- rick Gaudry, Antoine Joux, 6_3. REFERENCES 160

Biswas:2017:STC Barkatullah:2015:GCF

[BGN17] Arnab Kumar Biswas, Di- [BH15] Javed Barkatullah and pak Ghosal, and Shishir Timo Hanke. Gold- Nagaraja. A survey of strike 1: CoinTerra’s timing channels and coun- first-generation cryptocur- termeasures. ACM Com- rency mining processor puting Surveys, 50(1):6:1– for Bitcoin. IEEE Mi- 6:??, April 2017. CODEN cro, 35(2):68–76, March/ CMSVAN. ISSN 0360-0300 April 2015. CODEN (print), 1557-7341 (elec- IEMIDZ. ISSN 0272-1732 tronic). (print), 1937-4143 (elec- tronic). URL http:// Borcea:2017:PEE www.computer.org/csdl/ mags/mi/2015/02/mmi2015020068- [BGP+17] Cristian Borcea, Arnab abs.html. ‘Bobby” Deb Gupta, Yuriy Polyakov, Kurt Rohloff, Bhattacharjee:2016:SWC and Gerard Ryan. PI- CADOR: End-to-end en- [Bha16] Yudhijit Bhattacharjee. crypted publish–subscribe The spy who couldn’t spell: information distribution a dyslexic traitor, an un- with proxy re-encryption. breakable code, and the Future Generation Com- FBI’s hunt for America’s puter Systems, 71(??):177– stolen secrets. New Amer- 191, June 2017. CODEN ican Library, New York, FGSEVI. ISSN 0167-739X NY, USA, 2016. ISBN 1- (print), 1872-7115 (elec- 59240-900-8 (hardcover), 0- tronic). URL http:// 698-40409-2. ???? pp. www.sciencedirect.com/ LCCN JK468.I6 B48 2016. science/article/pii/S0167739X16303983. Blasco:2012:FAS Brakerski:2014:LFH [BHCdFR12] Jorge Blasco, Julio Cesar [BGV14] Zvika Brakerski, Craig Hernandez-Castro, Jos´e Mar´ıa Gentry, and Vinod Vaikun- de Fuentes, and Benjam´ın tanathan. (leveled) fully Ramos. A framework for homomorphic encryption avoiding steganography us- without bootstrapping. age over HTTP. Journal ACM Transactions on of Network and Computer Computation Theory, 6(3): Applications, 35(1):491– 13:1–13:??, July 2014. CO- 501, January 2012. CO- DEN ???? ISSN 1942-3454 DEN JNCAF3. ISSN 1084- (print), 1942-3462 (elec- 8045 (print), 1095-8592 tronic). (electronic). URL http:// REFERENCES 161

www.sciencedirect.com/ multiparty computation. science/article/pii/S1084804511001901. IBM Journal of Research and Development, 63(2–3): Behnia:2012:SEI 3:1–3:8, March/May 2019. [BHG12] Rouzbeh Behnia, Swee- CODEN IBMJAE. ISSN Huay Heng, and Che- 0018-8646 (print), 2151- Sheng Gan. Short and ef- 8556 (electronic). ficient identity-based un- Bosch:2014:SPS deniable signature scheme. Lecture Notes in Com- [BHJP14] Christoph B¨osch, Pieter puter Science, 7449:143– Hartel, Willem Jonker, and 148, 2012. CODEN Andreas Peter. A survey of LNCSD9. ISSN 0302-9743 provably secure searchable (print), 1611-3349 (elec- encryption. ACM Com- tronic). URL http:// puting Surveys, 47(2):18:1– link.springer.com/chapter/ 18:??, November 2014. CO- 10.1007/978-3-642-32287- DEN CMSVAN. ISSN 7_12/. 0360-0300 (print), 1557- 7341 (electronic). Bernstein:2015:SPS Berman:2013:HPR [BHH+15] Daniel J. Bernstein, Daira Hopwood, Andreas H¨ulsing, [BHKN13] Itay Berman, Iftach Hait- Tanja Lange, Ruben Nieder- ner, Ilan Komargodski, hagen, Louiza Papachristodoulou, and Moni Naor. Hard- Michael Schneider, Pe- ness preserving reductions ter Schwabe, and Zooko via cuckoo hashing. Lec- Wilcox-O’Hearn. SPHINCS: ture Notes in Computer Practical stateless hash- Science, 7785:40–59, 2013. based signatures. Lecture CODEN LNCSD9. ISSN Notes in Computer Sci- 0302-9743 (print), 1611- ence, 9056:368–397, 2015. 3349 (electronic). URL CODEN LNCSD9. ISSN http://link.springer. 0302-9743 (print), 1611- com/chapter/10.1007/978- 3349 (electronic). URL 3-642-36594-2_3/. https://link.springer. Berman:2018:CFC com/chapter/10.1007/978- 3-662-46800-5_15. [BHT18] Itay Berman, Iftach Hait- Benhamouda:2019:SPD ner, and Aris Tentes. Coin flipping of any constant [BHH19] F. Benhamouda, S. Halevi, bias implies one-way func- and T. Halevi. Support- tions. Journal of the ACM, ing private data on Hyper- 65(3):14:1–14:??, March ledger Fabric with secure 2018. CODEN JACOAH. REFERENCES 162

ISSN 0004-5411 (print), 84800-272-6 (paperback). x 1557-735X (electronic). + 273 pp. LCCN QA268 .B496 2008eb. Bonneau:2015:PEI Beimel:2014:CCW [BHvOS15] Joseph Bonneau, Cor- [BIKK14] Amos Beimel, Yuval Ishai, mac Herley, Paul C. van Ranjit Kumaresan, and Oorschot, and Frank Sta- Eyal Kushilevitz. On jano. Passwords and the cryptographic com- the evolution of imper- plexity of the worst func- fect authentication. Com- tions. Lecture Notes in munications of the As- Computer Science, 8349: sociation for Computing 317–342, 2014. CO- Machinery, 58(7):78–87, DEN LNCSD9. ISSN July 2015. CODEN 0302-9743 (print), 1611- CACMA2. ISSN 0001-0782 3349 (electronic). URL (print), 1557-7317 (elec- http://link.springer. tronic). URL http:// com/chapter/10.1007/978- cacm.acm.org/magazines/ 3-642-54242-8_14/. 2015/7/188731/fulltext. Biswas:2017:SAT Biagioli:2012:CCS [Bis17] Arnab Kumar Biswas. [Bia12] Mario Biagioli. From ci- Source authentication tech- phers to confidentiality: se- niques for network-on- crecy, openness and pri- chip router configuration ority in science. British packets. ACM Journal Journal for the History on Emerging Technolo- of Science, 45(2):213–233, gies in Computing Systems June 2012. CODEN BJH- (JETC), 13(2):28:1–28:??, SAT. ISSN 0007-0874 March 2017. CODEN ???? (print), 1474-001X (elec- ISSN 1550-4832. tronic). Bauer:2010:RVC Biggs:2008:CII [BJ10a] Andreas Bauer and Jan [Big08] Norman Biggs. Codes: An J¨urjens. Runtime veri- introduction to Informa- fication of cryptographic tion Communication and protocols. Computers Cryptography. Springer & Security, 29(3):315– undergraduate mathemat- 330, May 2010. CODEN ics series. Springer-Verlag, CPSEDU. ISSN 0167-4048 Berlin, Germany / Heidel- (print), 1872-6208 (elec- berg, Germany / London, tronic). URL https:// UK / etc., 2008. ISBN www.sciencedirect.com/ 1-84800-273-4 (e-book), 1- science/article/pii/S0167404809001047. REFERENCES 163

Brumley:2010:CAI Bogdanov:2012:UTC

[BJ10b] B. B. Brumley and K. U. [BJL12] Dan Bogdanov, Roman Jarvinen. Conversion al- Jagom¨agis, and Sven Laur. gorithms and implemen- A universal toolkit for tations for Koblitz curve cryptographically secure cryptography. IEEE privacy-preserving data Transactions on Comput- mining. Lecture Notes in ers, 59(1):81–92, Jan- Computer Science, 7299: uary 2010. CODEN IT- 112–126, 2012. CO- COB4. ISSN 0018-9340 DEN LNCSD9. ISSN (print), 1557-9956 (elec- 0302-9743 (print), 1611- tronic). URL http:/ 3349 (electronic). URL /ieeexplore.ieee.org/ http://link.springer. stamp/stamp.jsp?tp=&arnumber= com/chapter/10.1007/978- 5255226. 3-642-30428-6_9/. Boche:2016:DSK Benhamouda:2016:NFP

[BJ16] H. Boche and G. Janßen. [BJL16] Fabrice Benhamouda, Marc Distillation of secret-key Joye, and BenoˆıT Lib- from a class of com- ert. A new framework pound memoryless quan- for privacy-preserving ag- tum sources. Journal of gregation of time-series Mathematical Physics,57 data. ACM Transactions (8):082201, August 2016. on Information and Sys- CODEN JMAPAQ. ISSN tem Security, 18(3):10:1– 0022-2488 (print), 1089- 10:??, April 2016. CODEN 7658 (electronic), 1527- ATISBQ. ISSN 1094-9224 2427. (print), 1557-7406 (elec- tronic). Bouraoui:2017:HAE Brubaker:2014:UFA [BJCHA17] Hasna Bouraoui, Chadlia Jerad, Anupam Chat- [BJR+14] Chad Brubaker, Suman topadhyay, and Nejib Ben Jana, Baishakhi Ray, Sar- Hadj-Alouane. Hardware fraz Khurshid, and Vi- architectures for embedded taly Shmatikov. Using speaker recognition appli- frankencerts for automated cations: a survey. ACM adversarial testing of cer- Transactions on Embedded tificate validation in SSL/ Computing Systems, 16(3): TLS implementations. In 78:1–78:??, July 2017. CO- ????, editor, IEEE Sympo- DEN ???? ISSN 1539-9087 sium on Security and Pri- (print), 1558-3465 (elec- vacy, page ?? IEEE Com- tronic). puter Society Press, 1109 REFERENCES 164

Spring Street, Suite 300, www.sciencedirect.com/ Silver Spring, MD 20910, science/article/pii/S0167739X19304480. USA, 2014. ISBN ???? LCCN ???? URL ????. Bhuyan:2014:DDD Boldyreva:2012:NPG [BKBK14] Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhat- [BK12a] Alexandra Boldyreva and tacharyya, and J. K. Virendra Kumar. A Kalita. Detecting dis- new pseudorandom genera- tributed denial of ser- tor from collision-resistant vice attacks: Methods, hash functions. Report, tools and future direc- School of Computer Sci- tions. The Computer Jour- ence, Georgia Institute nal, 57(4):537–556, April of Technology, Atlanta, 2014. CODEN CM- GA, USA, February 6, PJA6. ISSN 0010-4620 2012. URL http:// (print), 1460-2067 (elec- eprint.iacr.org/2012/ tronic). URL http:// 056. comjnl.oxfordjournals. Bouti:2012:SCB org/content/57/4/537. full.pdf+html. [BK12b] Adil Bouti and J¨org Keller. Braun:2012:ULA Securing cloud-based com- putations against malicious [BKJP12] Bastian Braun, Stefan providers. Operating Sys- Kucher, Martin Johns, and tems Review, 46(2):38–42, Joachim Posegga. A user- July 2012. CODEN OS- level authentication scheme RED8. ISSN 0163-5980 to mitigate Web session- (print), 1943-586X (elec- based vulnerabilities. Lec- tronic). ture Notes in Computer Science, 7449:17–29, 2012. Babamir:2019:DDB CODEN LNCSD9. ISSN [BK19] Faezeh Sadat Babamir and 0302-9743 (print), 1611- Murvet Kirci. Dynamic 3349 (electronic). URL digest based authentica- http://link.springer. tion for client-server sys- com/chapter/10.1007/978- tems using biometric ver- 3-642-32287-7_2/. ification. Future Gener- Brakerski:2010:OHB ation Computer Systems, 101(??):112–126, Decem- [BKKV10] Z. Brakerski, Y. T. Kalai, ber 2019. CODEN FG- J. Katz, and V. Vaikun- SEVI. ISSN 0167-739X tanathan. Overcoming the (print), 1872-7115 (elec- hole in the bucket: Public- tronic). URL http:// key cryptography resilient REFERENCES 165

to continual memory leak- com/chapter/10.1007/978- age. In IEEE [IEE10], 3-642-29011-4_5/. pages 501–510. ISBN 1- Bogdanov:2018:IEA 4244-8525-8. LCCN ???? URL http://ieeexplore. [BKLS18] Dan Bogdanov, Liina ieee.org/servlet/opac? Kamm, Sven Laur, and punumber=5669376. IEEE Ville Sokk. Implemen- Computer Society Order tation and evaluation of Number P4244. an algorithm for crypto- Bogdanov:2013:SDS graphically private prin- cipal component anal- [BKL+13] Andrey Bogdanov, Miroslav ysis on genomic data. Knezevic, Gregor Leander, IEEE/ACM Transactions Deniz Toz, Kerem Varici, on Computational Biol- and Ingrid Verbauwhede. ogy and Bioinformatics,15 SPONGENT: The design (5):1427–1432, September space of lightweight cryp- 2018. CODEN ITCBCY. tographic hashing. IEEE ISSN 1545-5963 (print), Transactions on Comput- 1557-9964 (electronic). ers, 62(10):2041–2053, Oc- tober 2013. CODEN IT- Bellare:2012:IBL COB4. ISSN 0018-9340 [BKPW12] Mihir Bellare, Eike Kiltz, (print), 1557-9956 (elec- Chris Peikert, and Brent tronic). Waters. Identity-based (lossy) trapdoor functions Bogdanov:2012:KAC and applications. Lecture [BKLS12] Andrey Bogdanov, Lars R. Notes in Computer Sci- Knudsen, Gregor Leander, ence, 7237:228–245, 2012. and Francois-Xavier Stan- CODEN LNCSD9. ISSN daert. Key-alternating ci- 0302-9743 (print), 1611- phers in a provable set- 3349 (electronic). URL ting: Encryption using http://link.springer. a small number of pub- com/accesspage/chapter/ lic permutations. Lec- 10.1007/978-3-642-29011- ture Notes in Computer 4_14; http://link.springer. Science, 7237:45–62, 2012. com/chapter/10.1007/978- CODEN LNCSD9. ISSN 3-642-29011-4_15/. 0302-9743 (print), 1611- Bogdanov:2011:BCF 3349 (electronic). URL http://link.springer. [BKR11] Andrey Bogdanov, Dmitry com/accesspage/chapter/ Khovratovich, and Chris- 10.1007/978-3-642-29011- tian Rechberger. Biclique 4_4; http://link.springer. cryptanalysis of the full REFERENCES 166

AES. Report, Microsoft ing skyline queries over en- Research, Redmon, WA, crypted data. Proceed- USA, 2011. URL http: ings of the VLDB En- //research.microsoft. dowment, 6(12):1338–1341, com/en-us/projects/cryptanalysis/ August 2013. CODEN ???? aes.aspx; http://research. ISSN 2150-8097. microsoft.com/en-us/projects/ Bernstein:2010:PCA cryptanalysis/aesbc.pdf; http://rump2011.cr.yp. [BL10] Daniel J. Bernstein and to/d41bd80f6680cfd2323e53fbb9a62a81. Tanja Lange, editors. pdf. To appear at ASI- Progress in cryptology — ACRYPT 2011. Africacrypt 2010: third in- Bogatov:2019:CEO ternational conference on cryptology in Africa, Stel- [BKR19] Dmytro Bogatov, George lenbosch, South Africa, Kollios, and Leonid Reyzin. May 3–6, 2010. proceed- A comparative evalua- ings, volume 6055 of Lec- tion of order-revealing en- ture notes in computer cryption schemes and se- science. Springer-Verlag, cure range-query proto- Berlin, Germany / Heidel- cols. Proceedings of the berg, Germany / London, VLDB Endowment, 12(8): UK / etc., 2010. ISBN 933–947, April 2019. CO- 3-642-12677-4 (softcover). DEN ???? ISSN 2150- LCCN ???? 8097. Byun:2011:SMC Bibak:2018:AUH [BL11] Jin Wook Byun and [BKST18] Khodakhast Bibak, Bruce M. Dong Hoon Lee. On Kapron, Venkatesh Srini- a security model of con- vasan, and L´aszl´oT´oth. On junctive keyword search an almost-universal hash over encrypted relational function family with appli- database. The Journal cations to authentication of Systems and Software, and secrecy codes. Inter- 84(8):1364–1372, August national Journal of Foun- 2011. CODEN JSSODM. dations of Computer Sci- ISSN 0164-1212. ence (IJFCS), 29(3):357– Bai:2012:SSR ??, April 2018. CODEN IFCSEN. ISSN 0129-0541. [BL12] Yu Bai and Yanlong Liu. A Bothe:2013:EPS synchronization strengthen RFID authentication pro- [BKV13] Suvarna Bothe, Panagio- tocol based on key ar- tis Karras, and Akrivi Vla- ray. Lecture Notes in chou. eSkyline: process- Computer Science, 7530: REFERENCES 167

113–119, 2012. CO- (print), 1460-2067 (elec- DEN LNCSD9. ISSN tronic). URL http:// 0302-9743 (print), 1611- comjnl.oxfordjournals. 3349 (electronic). URL org/content/59/7/1005. http://link.springer. com/chapter/10.1007/978- Bernstein:2017:SCS 3-642-33478-8_15/. [BL17] Daniel J. Bernstein and Bernstein:2014:HEC Tanja Lange. SafeCurves: [BL14] Daniel J. Bernstein and choosing safe curves for Tanja Lange. Hyper-and- elliptic-curve cryptogra- elliptic-curve cryptogra- phy. Web site., January phy. LMS Journal of Com- 22, 2017. URL https:// putation and Mathematics, safecurves.cr.yp.to/. 17(A):181–202, 2014. CO- DEN ???? ISSN 1461- Blanchette:2012:BPC 1570. [Bla12] Jean-Fran¸cois Blanchette. Bidgoly:2015:MQV Burdens of Proof: Cryp- [BL15] Amir Jalaly Bidgoly and tographic Culture and Ev- Behrouz Tork Ladani. idence Law in the Age Modelling and quantitative of Electronic Documents. verification of reputation MIT Press, Cambridge, systems against malicious MA, USA, 2012. ISBN attackers. The Computer 0-262-01751-2 (hardcover). Journal, 58(10):2567–2582, 276 pp. LCCN K2269.5 October 2015. CODEN .B58 2012. CMPJA6. ISSN 0010-4620 Blaze:2016:UHR (print), 1460-2067 (elec- tronic). URL http:// [Bla16] Matt Blaze. US House comjnl.oxfordjournals. of Representatives, Com- org/content/58/10/2567. mittee on Energy and Bidgoly:2016:MQV Commerce, Subcommit- tee on Oversight and [BL16] Amir Jalaly Bidgoly and Investigations, Hearing Behrouz Tork Ladani. on “Deciphering the De- Modeling and quantitative bate over Encryption”. verification of trust sys- Web document, April 19, tems against malicious at- 2016. URL http://docs. tackers. The Computer house.gov/meetings/IF/ Journal, 59(7):1005–1027, IF02/20160419/104812/ July 2016. CODEN CM- HHRG-114-IF02-Wstate- PJA6. ISSN 0010-4620 BlazeM-20160419-U3.pdf. REFERENCES 168

Benzaid:2016:FAW 1540-7993 (print), 1558- 4046 (electronic). URL + [BLAN 16] Chafika Benzaid, Karim https://www.computer. Lounis, Ameer Al-Nemrat, org/csdl/mags/sp/2017/ Nadjib Badache, and 04/msp2017040012.html. Mamoun Alazab. Fast authentication in wireless Buchmann:2017:PCU sensor networks. Fu- ture Generation Computer [BLM17b] Johannes Buchmann, Kristin Systems, 55(??):362–375, Lauter, and Michele Mosca. February 2016. CODEN Postquantum cryptogra- FGSEVI. ISSN 0167-739X phy — state of the art. (print), 1872-7115 (elec- IEEE Security & Privacy, tronic). URL http:// 15(4):12–13, July/August www.sciencedirect.com/ 2017. CODEN ???? ISSN science/article/pii/S0167739X14001393. 1540-7993 (print), 1558- 4046 (electronic). URL Bai:2019:LMD https://www.computer. [BLL+19] Tong Bai, Jinzhao Lin, org/csdl/mags/sp/2017/ Guoquan Li, Huiqian 04/msp2017040012.html. Wang, Peng Ran, Zhangy- Buchmann:2018:PCP ong Li, Dan Li, Yu Pang, Wei Wu, and Gwang- [BLM18] J. Buchmann, K. Lauter, gil Jeon. A lightweight and M. Mosca. Postquan- method of data encryp- tum cryptography, part tion in BANs using elec- 2. IEEE Security & Pri- trocardiogram signal. Fu- vacy, 16(5):12–13, Septem- ture Generation Computer ber/October 2018. ISSN Systems, 92(??):800–811, 1540-7993 (print), 1558- March 2019. CODEN FG- 4046 (electronic). SEVI. ISSN 0167-739X (print), 1872-7115 (elec- Blomer:2012:TKG tronic). URL https:// www.sciencedirect.com/ [Bl¨o12] Johannes Bl¨omer. Turing science/article/pii/S0167739X17310361. und Kryptografie. (Ger- man) [Turing and cryptog- Buchmann:2017:PCS raphy]. Informatik Spek- [BLM17a] Johannes Buchmann, Kristin trum, 35(4):261–270, Au- Lauter, and Michele Mosca. gust 2012. CODEN IN- Postquantum cryptogra- SKDW. ISSN 0170-6012 phy — state of the art. (print), 1432-122X (elec- IEEE Security & Privacy, tronic). URL http:/ 15(4):12–13, July/August /www.springerlink.com/ 2017. CODEN ???? ISSN content/703t016671n87094/ REFERENCES 169

. Special Issue: Alan Tur- Bestavros:2017:PSU ing. [BLV17] Azer Bestavros, Andrei Blondeau:2015:IDA Lapets, and Mayank Varia. [Blo15] C´eline Blondeau. Im- Privacy and security: User- possible differential at- centric distributed solu- tack on 13-round Camellia- tions for privacy-preserving 192. Information Process- analytics. Communica- ing Letters, 115(9):660– tions of the Association 666, September 2015. CO- for Computing Machin- DEN IFPLAT. ISSN 0020- ery, 60(2):37–39, Febru- 0190 (print), 1872-6119 ary 2017. CODEN (electronic). URL http:// CACMA2. ISSN 0001-0782 www.sciencedirect.com/ (print), 1557-7317 (elec- science/article/pii/S0020019015000472. tronic). URL http:// cacm.acm.org/magazines/ Bernstein:2012:SIN 2017/2/212427/fulltext.

[BLS12] Daniel J. Bernstein, Tanja Burmester:2011:LRA Lange, and Peter Schwabe. The security impact of [BM11] Mike Burmester and Jorge a new cryptographic li- Munilla. Lightweight RFID brary. Lecture Notes in authentication with for- Computer Science, 7533: ward and backward secu- 159–176, 2012. CO- rity. ACM Transactions DEN LNCSD9. ISSN on Information and Sys- 0302-9743 (print), 1611- tem Security, 14(1):11:1– 3349 (electronic). URL 11:??, May 2011. CODEN http://link.springer. ATISBQ. ISSN 1094-9224 com/chapter/10.1007/978- (print), 1557-7406 (elec- 3-642-33481-8_9/. tronic). Buchanan:2015:FIW Birajdar:2013:DIF [BLU+15] William J. Buchanan, David Lanc, Elochukwu [BM13] Gajanan K. Birajdar and Ukwandu, Lu Fan, Gordon Vijay H. Mankar. Dig- Russell, and Owen Lo. The ital image forgery detec- future Internet: a world of tion using passive tech- secret shares. Future Inter- niques: A survey. Dig- net, 7(4):445–464, Novem- ital Investigation, 10(3): ber 24, 2015. CODEN 226–245, 2013. ISSN ???? ISSN 1999-5903. 1742-2876. URL http:// URL https://www.mdpi. www.sciencedirect.com/ com/1999-5903/7/4/445. science/article/pii/S1742287613000364. REFERENCES 170

Bard:2015:PRO Simon Shiu. Assurance for federated identity manage- [BM15] Gregory V. Bard and ment. Journal of Com- Theodore McDonnough. puter Security, 18(4):541– Plaintext recovery for one- 572, ???? 2010. CODEN time pads used twice. ACM JCSIET. ISSN 0926-227X Communications in Com- (print), 1875-8924 (elec- puter Algebra, 49(1):17–18, tronic). March 2015. CODEN ???? ISSN 1932-2232 (print), Bartoli:2019:VEW 1932-2240 (electronic). [BMDT19] Alberto Bartoli, Eric Med- Bhattacharya:2018:UPC vet, Andrea De Lorenzo, and Fabiano Tarlao. View- [BM18] Sarani Bhattacharya and point: Enterprise wi-fi: we Debdeep Mukhopadhyay. need devices that are se- Utilizing performance coun- cure by default. Communi- ters for compromising pub- cations of the Association lic key ciphers. ACM for Computing Machinery, Transactions on Privacy 62(5):33–35, May 2019. and Security (TOPS), CODEN CACMA2. ISSN 21(1):5:1–5:??, January 0001-0782 (print), 1557- 2018. ISSN 2471-2566 7317 (electronic). URL (print), 2471-2574 (elec- https://cacm.acm.org/ tronic). URL https://dl. magazines/2019/5/236421/ acm.org/citation.cfm? fulltext. id=3156015. Benamara:2016:ICA Biswas:2012:IBA [BMB16] Oualid Benamara, Fatiha [BMM12] Subir Biswas, Jelena Misi´c, Merazka, and Kamel Betina. and Vojislav Misi´c. An An improvement of a identity-based authentica- cryptanalysis algorithm. tion scheme for safety mes- Information Processing sages in WAVE-enabled Letters, 116(2):192–196, VANETs. International February 2016. CODEN Journal of Parallel, Emer- IFPLAT. ISSN 0020-0190 gent and Distributed Sys- (print), 1872-6119 (elec- tems: IJPEDS, 27(6):541– tronic). URL http:// 562, 2012. CODEN ???? www.sciencedirect.com/ ISSN 1744-5760 (print), science/article/pii/S0020019015001398. 1744-5779 (electronic). Baldwin:2010:AFI Backes:2012:GCP [BMBS10] Adrian Baldwin, Marco Casassa[BMP12] Michael Backes, Matteo Mont, Yolanta Beres, and Maffei, and Kim Pecina. REFERENCES 171

G2C: Cryptographic pro- Buckley:2015:RVV tocols from goal-driven specifications. Lecture [BNA15] N. Buckley, A. K. Na- Notes in Computer Sci- gar, and S. Arumugam. ence, 6993:57–77, 2012. On real-valued visual cryp- CODEN LNCSD9. ISSN tographic basis matrices. 0302-9743 (print), 1611- J.UCS: Journal of Univer- 3349 (electronic). URL sal Computer Science,21 http://link.springer. (12):1536–??, ???? 2015. com/chapter/10.1007/978- CODEN ???? ISSN 0948- 3-642-27375-9_4/. 695X (print), 0948-6968 (electronic). URL http:/ Banik:2012:DFA /www.jucs.org/jucs_21_ 12/on_real_valued_visual. [BMS12] Subhadeep Banik, Sub- hamoy Maitra, and San- Bailis:2017:RPC tanu Sarkar. A differen- [BNMH17] Peter Bailis, Arvind Narayanan, tial fault attack on the Andrew Miller, and Song grain family of stream ci- Han. Research for prac- phers. Lecture Notes in tice: Cryptocurrencies, Computer Science, 7428: blockchains, and smart 122–139, 2012. CO- contracts; hardware for DEN LNCSD9. ISSN deep learning. Com- 0302-9743 (print), 1611- munications of the As- 3349 (electronic). URL sociation for Computing http://link.springer. Machinery, 60(5):48–51, com/chapter/10.1007/978- May 2017. CODEN 3-642-33027-8_8/. CACMA2. ISSN 0001-0782 Babamir:2014:AKP (print), 1557-7317 (elec- tronic). URL http:// [BN14] Faezeh Sadat Babamir and cacm.acm.org/magazines/ Ali Norouzi. Achieving 2017/5/216321/fulltext. key privacy and invisibil- Baskaran:2019:TEL ity for unattended wire- less sensor networks in [BNNH19] Annie Gilda Roselin Arockia healthcare. The Com- Baskaran, Priyadarsi Nanda, puter Journal, 57(4):624– Surya Nepal, and Sean 635, April 2014. CODEN He. Testbed evaluation CMPJA6. ISSN 0010-4620 of lightweight authentica- (print), 1460-2067 (elec- tion protocol (LAUP) for tronic). URL http:// 6LoWPAN wireless sen- comjnl.oxfordjournals. sor networks. Concurrency org/content/57/4/624. and Computation: Prac- full.pdf+html. tice and Experience,31 REFERENCES 172

(23):e4868:1–e4868:??, De- for Hybrid Wireless Mesh cember 10, 2019. CODEN Protocol for IEEE 802.11s. CCPEBO. ISSN 1532-0626 Concurrency and Compu- (print), 1532-0634 (elec- tation: Practice and Ex- tronic). perience, 25(5):686–700, April 10, 2013. CODEN Bunder:2017:GAR CCPEBO. ISSN 1532-0626 [BNST17] Martin Bunder, Abderrah- (print), 1532-0634 (elec- mane Nitaj, Willy Susilo, tronic). and Joseph Tonien. A Bohme:2010:ASS generalized attack on RSA type cryptosystems. The- [B¨oh10] Rainer B¨ohme. Ad- oretical Computer Science, vanced Statistical Steganal- 704(??):74–81, December ysis, volume 0 of Infor- 15, 2017. CODEN TC- mation Security and Cryp- SCDI. ISSN 0304-3975 tography. Springer-Verlag, (print), 1879-2294 (elec- Berlin, Germany / Heidel- tronic). URL http:// berg, Germany / London, www.sciencedirect.com/ UK / etc., 2010. ISBN 3- science/article/pii/S0304397517306643. 642-14312-1, 3-642-14313- Biryukov:2014:DEA X (e-book). ISSN 1619- 7100 (print), 2197-845X [BNY14] Alex Biryukov, Jorge (electronic). xv + 285 pp. Nakahara, Jr., and Hamdi Mu- LCCN QA76.9.A25 B64 rat Yildirim. Differen- 2010; TA1637-1638; Z104 tial entropy analysis of .B68 2010. URL http:/ the IDEA . /www.springerlink.com/ Journal of Computational content/978-3-642-14313- and Applied Mathematics, 7. 259 (part B)(??):561–570, Boneh:2012:PBC March 15, 2014. CODEN JCAMDI. ISSN 0377-0427 [Bon12] Dan Boneh. Pairing- (print), 1879-1778 (elec- based cryptography: Past, tronic). URL http:// , and future. Lec- www.sciencedirect.com/ ture Notes in Computer science/article/pii/S0377042713003981. Science, 7658:1, 2012. CO- Ben-Othman:2013:IHN DEN LNCSD9. ISSN 0302-9743 (print), 1611- [BOB13] Jalel Ben-Othman and 3349 (electronic). URL Yesica I. Saavedra Ben- http://link.springer. itez. IBC-HWMP: a com/accesspage/chapter/ novel secure identity-based 10.1007/978-3-642-34961- cryptography-based scheme 4_1. REFERENCES 173

Boneh:2019:ACK have for identity science? Computer, 44(7):100–102, [Bon19] Dan Boneh. Attack- July 2011. CODEN CP- ing cryptographic key ex- TRB4. ISSN 0018-9162 change with precomputa- (print), 1558-0814 (elec- tion: technical perspec- tronic). tive. Communications of the Association for Com- Boyen:2013:ABF puting Machinery, 62(1): 105, January 2019. CO- [Boy13] Xavier Boyen. Attribute- DEN CACMA2. ISSN based functional encryp- 0001-0782 (print), 1557- tion on lattices. Lecture 7317 (electronic). URL Notes in Computer Sci- https://cacm.acm.org/ ence, 7785:122–142, 2013. magazines/2019/1/233522/ CODEN LNCSD9. ISSN fulltext. 0302-9743 (print), 1611- Bailey:2014:UIA 3349 (electronic). URL http://link.springer. [BOP14] Kyle O. Bailey, James S. com/chapter/10.1007/978- Okolica, and Gilbert L. 3-642-36594-2_8/. Peterson. User identifi- cation and authentication Boyce:2016:BOT using multi-modal behav- ioral biometrics. Comput- [Boy16] Griffin Boyce. Bake in ers & Security, 43(??):77– .onion for tear-free and 89, June 2014. CODEN stronger Website authen- CPSEDU. ISSN 0167-4048 tication. IEEE Security (print), 1872-6208 (elec- & Privacy, 14(2):15–21, tronic). URL https:// March/April 2016. CO- www.sciencedirect.com/ DEN ???? ISSN 1540-7993 science/article/pii/S0167404814000340. (print), 1558-4046 (elec- tronic). Borghoff:2010:CLC Beissinger:2006:CUM [Bor10] Julia Borghoff. Cryptanal- ysis of lightweight ciphers. [BP06] Janet Beissinger and Vera Ph.D. thesis, Department Pless. The Cryptoclub: Us- of Mathematics, Techni- ing Mathematics to Make cal University of Denmark, and Break Secret Codes.A. Lyngby, Denmark, 2010. x K. Peters, Ltd., Wellesley, + 198 pp. MA, USA, 2006. ISBN Bowyer:2011:WSD 1-56881-223-X. xvi + 199 pp. LCCN QA40.5 [Bow11] Kevin W. Bowyer. What .B45 2006. URL http: surprises do identical twins //www.loc.gov/catdir/ REFERENCES 174

toc/ecip067/2006002743. M´ark F´elegyh´azi. The html. cousins of Stuxnet: Duqu, Burns:2010:SCR Flame, and Gauss. Fu- ture Internet, 4(4):971– [BP10] Randal Burns and Zachary 1003, November 06, 2012. Peterson. Security con- CODEN ???? ISSN 1999- structs for regulatory- 5903. URL https://www. compliant storage. Com- mdpi.com/1999-5903/4/ munications of the As- 4/971. sociation for Computing Brooke:2010:DCX Machinery, 53(1):126–130, January 2010. CODEN [BPP10] Phillip J. Brooke, Richard F. CACMA2. ISSN 0001-0782 Paige, and Christopher (print), 1557-7317 (elec- Power. Document-centric tronic). XML workflows with frag- ment digital signatures. Bohli:2011:RAP Software—Practice and [BP11] Jens-Matthias Bohli and Experience, 40(8):655–672, Andreas Pashalidis. Re- July 2010. CODEN lations among privacy no- SPEXBL. ISSN 0038-0644 tions. ACM Transac- (print), 1097-024X (elec- tions on Information and tronic). System Security, 14(1):4:1– Bellare:2014:SSEa 4:??, May 2011. CODEN ATISBQ. ISSN 1094-9224 [BPR14a] Mihir Bellare, Kenneth Pa- (print), 1557-7406 (elec- terson, and Phillip Rog- tronic). away. Security of sym- Budroni:2018:HGB metric encryption against mass surveillance. Cryp- [BP18] Alessandro Budroni and tology ePrint Archive re- Federico Pintore. Hash- port 2014/438, Depart- ing to G2 on BLS pairing- ment of Computer Sci- friendly curves. ACM ence and Engineering, Uni- Communications in Com- versity of California San puter Algebra, 52(3):63–66, Diego, San Diego, CA, September 2018. CODEN USA, 2014. URL http:/ ???? ISSN 1932-2232 /eprint.iacr.org. (print), 1932-2240 (elec- tronic). Bellare:2014:SSEb Bencsath:2012:CSD [BPR14b] Mihir Bellare, Kenneth Pa- terson, and Phillip Rog- [BPBF12] Boldizs´ar Bencs´ath, G´abor away. Security of sym- P´ek, Levente Butty´an, and metric encryption against REFERENCES 175

mass surveillance. In ????, Computer Science, 8349: editor, Advances in Cryp- 1–25, 2014. CODEN tology – CRYPTO 2014, LNCSD9. ISSN 0302-9743 pages 1–19. Springer-Ver- (print), 1611-3349 (elec- lag, Berlin, Germany / Hei- tronic). URL http:// delberg, Germany / Lon- link.springer.com/chapter/ don, UK / etc., 2014. ISBN 10.1007/978-3-642-54242- ???? LCCN ???? URL ?? 8_1/; http://link.springer. ??. com/content/pdf/bfm:978- Boneh:2016:BCR 3-642-54242-8/1.pdf. [BPS16] Dan Boneh, Kenny Pater- Brakerski:2013:WHB son, and Nigel P. Smart. [Bra13] Zvika Brakerski. When ho- Building a community of momorphism becomes a li- real-world cryptographers. ability. Lecture Notes in IEEE Security & Pri- Computer Science, 7785: vacy, 14(6):7–9, Novem- 143–161, 2013. CO- ber/December 2016. CO- DEN LNCSD9. ISSN DEN ???? ISSN 0302-9743 (print), 1611- 1540-7993 (print), 1558- 3349 (electronic). URL 4046 (electronic). URL http://link.springer. https://www.computer. com/chapter/10.1007/978- org/csdl/mags/sp/2016/ 3-642-36594-2_9/. 06/msp2016060007.html. Bradbury:2015:BSB Balsa:2017:TIC [BPSD17] Ero Balsa, Cristina P´erez- [Bra15] D. Bradbury. In blocks Sol`a, and Claudia Diaz. [security Bitcoin]. Engi- Towards inferring commu- neering Technology, 10(2): nication patterns in on- 68–71, March 2015. ISSN line social networks. ACM 1750-9637 (print), 1750- Transactions on Internet 9645 (electronic). Technology (TOIT), 17(3): Brewster:2018:RCF 32:1–32:??, July 2017. CO- DEN ???? ISSN 1533-5399 [Bre18] R. Brewster. Re-creating (print), 1557-6051 (elec- the first flip-flop — a fun- tronic). damental component of computers turns 100 [re- Brakerski:2014:VBB sources hands on]. IEEE [BR14] Zvika Brakerski and Guy N. Spectrum, 55(6):13–14, Rothblum. Virtual black- June 2018. CODEN box obfuscation for all cir- IEESAM. ISSN 0018-9235 cuits via generic graded en- (print), 1939-9340 (elec- coding. Lecture Notes in tronic). REFERENCES 176

Briggs:2011:SDC to digital color image en- cryption. Future Gen- [Bri11] Asa Briggs. Secret days: eration Computer Sys- code-breaking in Bletchley tems, 99(??):489–499, Oc- Park. Frontline Books, tober 2019. CODEN FG- London, UK, 2011. ISBN SEVI. ISSN 0167-739X 1-84832-615-7. xix + 202 (print), 1872-7115 (elec- + 26 pp. LCCN D810.C88 tronic). URL http:// B75 2011. www.sciencedirect.com/ Broemeling:2011:AES science/article/pii/S0167739X19300214. [Bro11] Lyle D. Broemeling. An ac- Becker:2013:SDL count of early statistical in- ference in Arab cryptology. [BRPB13] Georg T. Becker, Francesco The American Statistician, Regazzoni, Christof Paar, 65(4):255–257, November and Wayne P. Burleson. 2011. CODEN ASTAAJ. Stealthy dopant-level hard- ISSN 0003-1305 (print), ware trojans? Report, Uni- 1537-2731 (electronic). versity of Massachusetts (Amherst, USA); TU Delft Brooks:2012:QCE (The Netherlands); ALaRI [Bro12] M. Brooks. Quantum cash (University of Lugano, and the end of counterfeit- Switzerland); Horst G¨ortz ing. IEEE Spectrum, 49(6): Institut for IT-Security, 58–59, June 2012. CODEN Ruhr-Universit¨at Bochum IEESAM. ISSN 0018-9235 (Bochum, Germany), June (print), 1939-9340 (elec- 7, 2013. 18 pp. URL http: tronic). //people.umass.edu/gbecker/ BeckerChes13.pdf. Brook:2017:LSR Benaloh:2015:EEV [Bro17] Chris Brook. libgcrypt ‘sliding right’ attack al- [BRR+15] Josh Benaloh, Ronald L. lows recovery of RSA-1024 Rivest, Peter Y. A. Ryan, keys. Web blog., July Philip B. Stark, Vanessa 5, 2017. URL https:// Teague, and Poorvi L. threatpost.com/libgcrypt- Vora. End-to-end ver- sliding-right-attack- ifiability. arxiv.org,?? allows-recovery-of-rsa- (??):??, April 15, 2015. 1024-keys/126675/. See URL http://arxiv.org/ [BBG+17]. abs/1504.03778. Broumandnia:2019:MCM Bag:2017:BBW [Bro19] Ali Broumandnia. The [BRS17] S. Bag, S. Ruj, and 3D modular chaotic map K. Sakurai. Bitcoin block REFERENCES 177

withholding attack: Anal- Computational Statistics, ysis and mitigation. IEEE 3(5):251–259, May/June Transactions on Informa- 2011. CODEN ???? ISSN tion Forensics and Secu- 1939-0068 (print), 1939- rity, 12(8):1967–1978, Au- 5108 (electronic). gust 2017. ISSN 1556-6013 Bergsma:2012:PAW (print), 1556-6021 (elec- tronic). [BS12] Timothy T. Bergsma and Michael S. Smith. Sumo: Bellare:2012:MIS An authenticating Web [BRT12] Mihir Bellare, Thomas Ris- application with an em- tenpart, and Stefano Tes- bedded R session. The saro. Multi-instance se- R Journal, 4(1):60–63, curity and its application June 2012. CODEN to password-based cryptog- ???? ISSN 2073-4859. raphy. Lecture Notes in URL http://journal. Computer Science, 7417: r-project.org/archive/ 312–329, 2012. CO- 2012-1/RJournal_2012- DEN LNCSD9. ISSN 1_Bergsma+Smith.pdf. 0302-9743 (print), 1611- Bajaj:2013:CSE 3349 (electronic). URL http://link.springer. [BS13a] Sumeet Bajaj and Radu com/chapter/10.1007/978- Sion. CorrectDB: SQL en- 3-642-32009-5_19/. gine with practical query authentication. Proceed- Brumley:2012:SFI ings of the VLDB Endow- ment, 6(7):529–540, May [Bru12] Billy Bob Brumley. Se- 2013. CODEN ???? ISSN cure and fast implementa- 2150-8097. tions of two involution ci- phers. Lecture Notes in Birrell:2013:FIM Computer Science, 7127: [BS13b] Eleanor Birrell and Fred B. 269–282, 2012. CO- Schneider. Federated iden- DEN LNCSD9. ISSN tity management systems: 0302-9743 (print), 1611- A privacy-based character- 3349 (electronic). URL ization. IEEE Security http://link.springer. & Privacy, 11(5):36–48, com/chapter/10.1007/978- September/October 2013. 3-642-27937-9_19/. ISSN 1540-7993 (print), Bachrach:2011:ISS 1558-4046 (electronic). Bhattacherjee:2014:CAT [BS11] Mayra Bachrach and Frank Y. Shih. Image steganography [BS14] Sanjay Bhattacherjee and and steganalysis. WIREs Palash Sarkar. Concrete REFERENCES 178

analysis and trade-offs for Bala:2019:SAG the (complete tree) layered subset difference broadcast [BSBB19] Suman Bala, Gaurav encryption scheme. IEEE Sharma, Himani Bansal, Transactions on Comput- and Tarunpreet Bhatia. On ers, 63(7):1709–1722, July the security of authenti- 2014. CODEN ITCOB4. cated group key agreement ISSN 0018-9340 (print), protocols. Scalable Com- 1557-9956 (electronic). puting: Practice and Ex- perience, 20(1):93–99, ???? Bagheri:2015:NNA 2019. CODEN ???? ISSN 1895-1767. URL https: //www.scpe.org/index. [BS15] Kadijeh Bagheri and Mohammad- php/scpe/article/view/ Reza Sadeghi. A new non- 1440. associative cryptosystem based on NTOW public Bendiab:2019:FNF key cryptosystem and octo- [BSBG19] Keltoum Bendiab, Stavros nions algebra. ACM Com- Shiaeles, Samia Boucherkha, munications in Computer and Bogdan Ghita. FCMDT: Algebra, 49(1):13, March a novel fuzzy cognitive 2015. CODEN ???? ISSN maps dynamic trust model 1932-2232 (print), 1932- for cloud federated iden- 2240 (electronic). tity management. Com- puters & Security, 86(??): Bronzino:2019:ISV 270–290, September 2019. CODEN CPSEDU. ISSN [BSA+19] Francesco Bronzino, Paul 0167-4048 (print), 1872- Schmitt, Sara Ayoubi, 6208 (electronic). URL Guilherme Martins, Re- https://www.sciencedirect. nata Teixeira, and Nick com/science/article/pii/ Feamster. Inferring stream- S0167404818312252. ing video quality from en- Ben-Sasson:2017:SZK crypted traffic: Practi- cal models and deploy- [BSCTV17] Eli Ben-Sasson, Alessandro ment experience. Proceed- Chiesa, Eran Tromer, and ings of the ACM on Mea- Madars Virza. Scalable surement and Analysis of zero knowledge via cycles Computing Systems (PO- of elliptic curves. Algo- MACS), 3(3):56:1–56:25, rithmica, 79(4):1102–1160, December 2019. CODEN December 2017. CODEN ???? ISSN 2476-1249. ALGOEJ. ISSN 0178-4617 URL https://dl.acm. (print), 1432-0541 (elec- org/doi/10.1145/3366704. tronic). REFERENCES 179

Boorghany:2015:CIL Beaulieu:2013:SSF

[BSJ15] Ahmad Boorghany, Siavash Bay[BSSat +13] Ray Beaulieu, Douglas Sarmadi, and Rasool Jalili. Shors, Jason Smith, Ste- On constrained imple- fan Treatman-Clark, Bryan mentation of lattice-based Weeks, and Louis Wingers. cryptographic primitives The Simon and Speck and schemes on smart families of lightweight cards. ACM Transactions block ciphers. Report, on Embedded Computing National Security Agency, Systems, 14(3):42:1–42:??, 9800 Savage Road, Fort April 2015. CODEN ???? Meade, MD 20755, USA, ISSN 1539-9087 (print), June 19, 2013. 45 pp. 1558-3465 (electronic). URL https://eprint. iacr.org/2013/404.pdf; Bojinov:2014:NMC https://www.schneier. com/crypto-gram/archives/ + [BSR 14] Hristo Bojinov, Daniel 2018/0515.html; https: Sanchez, Paul Reber, Dan //www.wikitribune.com/ Boneh, and Patrick Lin- story/2018/04/20/business/ coln. Neuroscience meets exclusive-nsa-encryption- cryptography: crypto plan-for-internet-of- primitives secure against things-rejected-by-international- rubber hose attacks. Com- body/67004/. munications of the As- sociation for Computing Batina:2012:HEB Machinery, 57(5):110–118, [BSSV12] Lejla Batina, Stefaan Seys, May 2014. CODEN Dave Singel´ee, and Ingrid CACMA2. ISSN 0001-0782 Verbauwhede. Hierarchical (print), 1557-7317 (elec- ECC-based RFID authen- tronic). tication protocol. Lecture Basin:2011:AIS Notes in Computer Sci- ence, 7055:183–201, 2012. [BSS11] David Basin, Patrick Schaller, CODEN LNCSD9. ISSN and Michael Schl¨apfer. 0302-9743 (print), 1611- Applied information se- 3349 (electronic). URL curity: a hands-on ap- http://link.springer. proach. Springer-Verlag, com/chapter/10.1007/978- Berlin, Germany / Heidel- 3-642-25286-0_12/. berg, Germany / London, Broustis:2012:GAN UK / etc., 2011. ISBN 3-642-24473-4 (hardcover). [BSV12] Ioannis Broustis, Ganapa- xiv + 202 pp. LCCN thy S. Sundaram, and Har- QA76.9.A25 B37 2011. ish Viswanathan. Group REFERENCES 180

authentication: a new Practice and Experience, paradigm for emerging ap- 30(12), June 25, 2018. CO- plications. Bell Labs Tech- DEN CCPEBO. ISSN nical Journal, 17(3):157– 1532-0626 (print), 1532- 173, December 2012. CO- 0634 (electronic). URL DEN BLTJFD. ISSN 1089- https://onlinelibrary. 7089 (print), 1538-7305 wiley.com/doi/abs/10. (electronic). 1002/cpe.4303. Boneh:2012:FEN Bosch:2012:SDR

[BSW12] Dan Boneh, Amit Sahai, [BTHJ12] Christoph B¨osch, Qiang and Brent Waters. Func- Tang, Pieter Hartel, and tional encryption: a new Willem Jonker. Selec- vision for public-key cryp- tive document retrieval tography. Communica- from encrypted database. tions of the Association Lecture Notes in Com- for Computing Machinery, puter Science, 7483:224– 55(11):56–64, November 241, 2012. CODEN 2012. CODEN CACMA2. LNCSD9. ISSN 0302-9743 ISSN 0001-0782 (print), (print), 1611-3349 (elec- 1557-7317 (electronic). tronic). URL http:// link.springer.com/chapter/ Biskup:2012:RBR 10.1007/978-3-642-33383- [BT12] Joachim Biskup and Cor- 5_14/. nelia Tadros. Revis- Bouabana-Tebibel:2015:PSE ing belief without re- vealing secrets. Lecture [BTK15] Thouraya Bouabana-Tebibel Notes in Computer Sci- and Abdellah Kaci. Par- ence, 7153:51–70, 2012. allel search over encrypted CODEN LNCSD9. ISSN data under attribute based 0302-9743 (print), 1611- encryption on the cloud 3349 (electronic). URL computing. Computers http://link.springer. & Security, 54(??):77–91, com/chapter/10.1007/978- October 2015. CODEN 3-642-28472-4_4/. CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- Braeken:2018:AAA tronic). URL https:// [BT18] A. Braeken and Abdel- www.sciencedirect.com/ lah Touhafi. AAA — au- science/article/pii/S0167404815000577. tonomous anonymous user Blasco:2015:HDT authentication and its ap- plication in V2G. Concur- [BTPLST15] Jorge Blasco, Juan E. rency and Computation: Tapiador, Pedro Peris- REFERENCES 181

Lopez, and Guillermo numbers/book/978-3-642- Suarez-Tangil. Hinder- 11185-3; http://www. ing data theft with en- springerlink.com/content/ crypted data trees. The j5g004. Journal of Systems and Software, 101(??):147–158, Budiansky:2016:CWN March 2015. CODEN JS- SODM. ISSN 0164-1212 [Bud16] Stephen Budiansky. Code (print), 1873-1228 (elec- warriors: NSA’s code- tronic). URL http:// breakers and the secret in- www.sciencedirect.com/ telligence war against the science/article/pii/S0164121214002775. Soviet Union. Alfred A. Knopf, New York, NY, Brocardo:2015:AVM USA, 2016. ISBN 0-385- [BTW15] Marcelo Luiz Brocardo, 35266-2, 0-385-35267-0. xxi + 389 + 16 pp. LCCN Issa Traore, and Isaac UB256.U6 B83 2016. Woungang. Authorship verification of e-mail and Bulygin:2010:AOP tweet messages applied for continuous authentica- [Bul10a] Stanislav Bulygin. Ab- tion. Journal of Com- stract only: Polynomial puter and System Sciences, system solving for decod- 81(8):1429–1440, Decem- ing linear codes and al- ber 2015. CODEN JC- gebraic cryptanalysis para- SSBM. ISSN 0022-0000 metric polynomial system (print), 1090-2724 (elec- discussion: canonical com- tronic). URL http:// prehensive. ACM Commu- www.sciencedirect.com/ nications in Computer Al- science/article/pii/S0022000014001834. gebra, 44(2):72, June 2010. Buchmann:2010:EKG CODEN ???? ISSN 1932-2232 (print), 1932- [Buc10] Johannes Buchmann. Einf¨uhrung 2240 (electronic). in die Kryptographie. (Ger- man) [Introduction to Bulygin:2010:CAC Cryptography]. Springer- Lehrbuch. Springer-Verlag, [Bul10b] Stanislav Bulygin. Com- Berlin, Germany / Hei- puter algebra in coding delberg, Germany / Lon- theory and cryptanaly- don, UK / etc., 2010. sis.S¨udwestdeutscher Ver- ISBN 3-642-11186-6. xxiv lag f¨ur Hochschulschriften, + 280 pp. LCCN Saarbr¨ucken, Germany, ???? URL http://www. 2010. ISBN 3-8381-0948-1. springer.com/mathematics/ ???? pp. LCCN ???? REFERENCES 182

Bultan:2018:SCA IEEE [IEE11b], pages 97– 106. ISBN 1-4577-1843-X. [Bul18] Tevfik Bultan. Side- LCCN ???? channel analysis via sym- bolic execution and model Brakerski:2014:EFH counting. ACM SIG- [BV14] Zvika Brakerski and Vinod SOFT Software Engineer- Vaikuntanathan. Efficient ing Notes, 43(4):55, Oc- fully homomorphic encryp- tober 2018. CODEN tion from (standard) LWE. SFENDP. ISSN 0163-5948 SIAM Journal on Com- (print), 1943-5843 (elec- puting, 43(2):831–871, ???? tronic). 2014. CODEN SMJCAT. Burke:2011:AMD ISSN 0097-5397 (print), 1095-7111 (electronic). [Bur11] Colin Burke. Agnes Meyer Driscoll vs. the Enigma and Bitansky:2018:IOF the Bombe. Report, Uni- versity of Maryland, Bal- [BV18] Nir Bitansky and Vinod timore County, 1000 Hill- Vaikuntanathan. Indis- top Circle Baltimore, MD tinguishability obfuscation 21250, USA, January 7, from functional encryp- 2011. 132 pp. URL https: tion. Journal of the ACM, //userpages.umbc.edu/ 65(6):39:1–39:??, Novem- ~burke/driscoll1-2011. ber 2018. CODEN JA- pdf. COAH. ISSN 0004-5411 (print), 1557-735X (elec- Butin:2017:HBS tronic). URL https:// [But17] Denis Butin. Hash-based dl.acm.org/ft_gateway. signatures: State of play. cfm?id=3234511. IEEE Security & Privacy, Bayrak:2012:AII 15(4):37–43, July/August 2017. CODEN ???? ISSN [BVIB12] Ali Galip Bayrak, Nikola 1540-7993 (print), 1558- Velickovic, Paolo Ienne, 4046 (electronic). URL and Wayne Burleson. An https://www.computer. architecture-independent org/csdl/mags/sp/2017/ instruction shuffler to pro- 04/msp2017040037-abs. tect against side-channel html. attacks. ACM Transac- Brakerski:2011:EFH tions on Architecture and Code Optimization, 8(4): [BV11] Z. Brakerski and V. Vaikun- 20:1–20:??, January 2012. tanathan. Efficient fully CODEN ???? ISSN 1544- homomorphic encryption 3566 (print), 1544-3973 from (standard) LWE. In (electronic). REFERENCES 183

Baek:2013:SPK Bai:2016:ALC

[BVS+13] Joonsang Baek, Quang Hieu [BW16] Kunpeng Bai and Chuankun Vu, Abdulhadi Shoufan, Wu. An AES-like cipher Andrew Jones, and Dun- and its white-box imple- can S. Wong. State- mentation. The Computer ful public-key encryp- Journal, 59(7):1054–1065, tion schemes forward- July 2016. CODEN CM- secure against state ex- PJA6. ISSN 0010-4620 posure. The Computer (print), 1460-2067 (elec- Journal, 56(4):497–507, tronic). URL http:// April 2013. CODEN CM- comjnl.oxfordjournals. PJA6. ISSN 0010-4620 org/content/59/7/1054. (print), 1460-2067 (elec- Bhatnagar:2013:SRI tronic). URL http:// comjnl.oxfordjournals. [BWA13] Gaurav Bhatnagar, Q. M. Jonathan org/content/56/4/497. Wu, and Pradeep K. Atrey. full.pdf+html. Secure randomized image watermarking based on Bogdanov:2012:ZCL singular value decomposi- tion. ACM Transactions [BW12] Andrey Bogdanov and on Multimedia Computing, Meiqin Wang. Zero- Communications, and Ap- correlation linear crypt- plications, 10(1):4:1–4:??, analysis with reduced data December 2013. CODEN complexity. Lecture Notes ???? ISSN 1551-6857 in Computer Science, 7549: (print), 1551-6865 (elec- 29–48, 2012. tronic). Bhatnagar:2013:BIW Baek:2016:EGC [BW13] Gaurav Bhatnagar and [BWLA16] Joonsang Baek, Duncan S. Q. M. Jonathan Wu. Bio- Wong, Jin Li, and Man Ho metrics inspired water- Au. Efficient generic con- marking based on a frac- struction of CCA-secure tional dual tree complex identity-based encryption wavelet transform. Future from randomness extrac- Generation Computer Sys- tion. The Computer Jour- tems, 29(1):182–195, Jan- nal, 59(4):508–521, April uary 2013. CODEN FG- 2016. CODEN CM- SEVI. ISSN 0167-739X PJA6. ISSN 0010-4620 (print), 1872-7115 (elec- (print), 1460-2067 (elec- tronic). URL http:// tronic). URL http:// www.sciencedirect.com/ comjnl.oxfordjournals. science/article/pii/S0167739X1200129X. org/content/59/4/508. REFERENCES 184

Bhatnagar:2012:IVE URL https://arxiv.org/ abs/1908.11680. [BWR12a] Gaurav Bhatnagar, Q. M. Jonathan Bai:2019:HAF Wu, and Balasubramanian Raman. Image and video [BYDC19] Xu Bai, Jiajia Yang, Qiong encryption based on dual Dai, and Zhaolin Chen. A space-filling curves. The hybrid ARM-FPGA clus- Computer Journal, 55(6): ter for cryptographic algo- 667–685, June 2012. CO- rithm acceleration. Con- DEN CMPJA6. ISSN currency and Computa- 0010-4620 (print), 1460- tion: Practice and Ex- 2067 (electronic). URL perience, 31(24):e5257:1– http://comjnl.oxfordjournals. e5257:??, December 25, org/content/55/6/667. 2019. CODEN CCPEBO. full.pdf+html. ISSN 1532-0626 (print), 1532-0634 (electronic). Bhatnagar:2012:NRA Bao:2010:ISC [BWR12b] Gaurav Bhatnagar, Q. M. Jonathan Wu, and Balasubramanian [BYL10] Feng Bao, Moti Yung, Raman. A new robust ad- and Dongdai Lin, edi- justable logo watermark- tors. Information secu- ing scheme. Computers rity and cryptology: 5th in- & Security, 31(1):40–58, ternational conference, IN- February 2012. CODEN 2009, Beijing, CPSEDU. ISSN 0167-4048 China, December 12–15, (print), 1872-6208 (elec- 2009. revised selected pa- tronic). URL https:// pers, volume 6151 of Lec- www.sciencedirect.com/ ture notes in computer science/article/pii/S0167404811001398. science. Springer-Verlag, Berlin, Germany / Heidel- Buhren:2019:IUP berg, Germany / London, UK / etc., 2010. ISBN [BWS19] Robert Buhren, Christian 3-642-16341-6 (softcover). Werling, and Jean-Pierre LCCN ???? Seifert. Insecure until Bo:2016:ETK proven updated: Analyz- ing AMD SEV’s remote at- [BZD16] Yang Bo, Mingwu Zhang, testation. In Proceedings and Jun-Qiang Du. An of the 2019 ACM SIGSAC error-tolerant keyword search Conference on Computer scheme based on public-key and Communications Secu- encryption in secure cloud rity — CCS ’19, pages 1– computing. Concurrency 13. ACM Press, New York, and Computation: Prac- NY 10036, USA, 2019. tice and Experience,28 REFERENCES 185

(4):1083–1093, March 25, Carter:2010:TB 2016. CODEN CCPEBO. ISSN 1532-0626 (print), [Car10] Frank Carter. The Turing 1532-0634 (electronic). Bombe. Rutherford Jour- nal, 3(??):??, ???? 2010. Staff:2014:KYS CODEN ???? ISSN 1177-1380. URL http:// [CAC14] CACM Staff. Know rutherfordjournal.org/ your steganographic en- article030108.html. emy. Communications of the Association for Com- Carlson:2011:JRW puting Machinery, 57(5): [Car11] Elliot Carlson. Joe 8, May 2014. CODEN Rochefort’s war: the CACMA2. ISSN 0001-0782 odyssey of the codebreaker (print), 1557-7317 (elec- who outwitted Yamamoto tronic). at Midway. Naval Institute Caldwell:2013:INP Press, Annapolis, MD, US, 2011. ISBN 1-61251-060- [Cal13] Tracey Caldwell. Identity 4 (hardcover). ???? pp. — the new perimeter. Net- LCCN D774.M5 C28 2011. work Security, 2013(4):14– Casselman:2010:VC 18, April 2013. CODEN NTSCF5. ISSN 1353-4858 [Cas10] Bill Casselman. Visible (print), 1872-9371 (elec- cryptography. Notices of tronic). URL http:// the American Mathemati- www.sciencedirect.com/ cal Society, 57(3):378–379, science/article/pii/S1353485813700515. March 2010. CODEN AMNOAN. ISSN 0002- Chakraborty:2019:TIP 9920 (print), 1088-9477 [CAM19] Nilesh Chakraborty, Vi- (electronic). URL http: jay S. Anand, and Sam- //www.ams.org/notices/ rat Mondal. Towards iden- 201003/. tifying and preventing be- Cass:2015:SE havioral side channel at- tack on recording attack [Cas15] Stephen Cass. A simple resilient unaided authenti- Enigma. IEEE Spectrum, cation services. Comput- 52(1):19–20, January 2015. ers & Security, 84(??):193– CODEN IEESAM. ISSN 205, July 2019. CODEN 0018-9235 (print), 1939- CPSEDU. ISSN 0167-4048 9340 (electronic). (print), 1872-6208 (elec- Courtois:2019:RRR tronic). URL https:// www.sciencedirect.com/ [CATB19] J. Courtois, L. Abbas- science/article/pii/S0167404818302062. Turki, and J. Bajard. REFERENCES 186

Resilience of randomized Cheneau:2010:SIP RNS arithmetic with re- spect to side-channel leaks [CBL10] Tony Cheneau, Aymen of cryptographic compu- Boudguiga, and Mary- tation. IEEE Transac- line Laurent. Signifi- tions on Computers,68 cantly improved perfor- (12):1720–1730, December mances of the crypto- 2019. CODEN ITCOB4. graphically generated ad- ISSN 0018-9340 (print), dresses thanks to ECC 1557-9956 (electronic). and GPGPU. Comput- ers & Security, 29(4):419– Chang:2019:KCS 431, June 2010. CODEN [CBJX19] Jinyong Chang, Genqing CPSEDU. ISSN 0167-4048 Bian, Yanyan Ji, and (print), 1872-6208 (elec- Maozhi Xu. On the KDM– tronic). URL https:// CCA security from par- www.sciencedirect.com/ tial trapdoor one-way fam- science/article/pii/S0167404809001461. ily in the random ora- Cobb:2013:LMS cle model. The Computer Journal, 62(8):1232–1245, [CBL13] William E. Cobb, Rusty O. August 2019. CODEN Baldwin, and Eric D. CMPJA6. ISSN 0010-4620 Laspe. Leakage mapping: (print), 1460-2067 (elec- a systematic methodol- tronic). URL http:// ogy for assessing the side- academic.oup.com/comjnl/ channel information leak- article/62/8/1232/5492772. age of cryptographic imple- mentations. ACM Trans- Cho:2016:MAT actions on Information and [CBJY16] Haehyun Cho, Jiwoong System Security, 16(1):2:1– Bang, Myeongju Ji, and 2:??, June 2013. CODEN Jeong Hyun Yi. Mo- ATISBQ. ISSN 1094-9224 bile application tamper (print), 1557-7406 (elec- detection scheme using tronic). dynamic code injection Chang:2018:DMU against repackaging at- tacks. The Journal of Su- [CBO+18] Doohwang Chang, Gana- percomputing, 72(9):3629– pati Bhat, Umit Ogras, 3645, September 2016. CO- Bertan Bakkaloglu, and DEN JOSUED. ISSN Sule Ozev. Detection 0920-8542 (print), 1573- mechanisms for unautho- 0484 (electronic). URL rized wireless transmis- http://link.springer. sions. ACM Transac- com/article/10.1007/s11227- tions on Design Automa- 016-1763-2. tion of Electronic Sys- REFERENCES 187

tems, 23(6):70:1–70:??, De- Chen:2019:IAS cember 2018. CODEN ATASFO. ISSN 1084-4309 [CCC19] Yi-Cheng Chen, Yueh- (print), 1557-7309 (elec- Peng Chou, and Yung- tronic). Chen Chou. An image authentication scheme us- Chattopadhyay:2019:QIL ing mecha- nisms. Future Internet,11 [CBRZ19] Sudipta Chattopadhyay, (7):149, July 06, 2019. CO- Moritz Beck, Ahmed Rezine, DEN ???? ISSN 1999- and Andreas Zeller. Quan- 5903. URL https://www. tifying the information mdpi.com/1999-5903/11/ leakage in cache attacks via 7/149. symbolic execution. ACM Transactions on Embedded Chadha:2016:AVE Computing Systems, 18(1): [CCCK16] Rohit Chadha, Vincent 7:1–7:??, February 2019. Cheval, Stefan Ciobˆaca, CODEN ???? ISSN and Steve Kremer. Auto- 1539-9087 (print), 1558- mated verification of equiv- 3465 (electronic). URL alence properties of cryp- https://dl.acm.org/ft_ tographic protocols. ACM gateway.cfm?id=3288758. Transactions on Compu- Cachin:2010:EKS tational Logic, 17(4):23:1– 23:??, November 2016. CO- [CC10] Christian Cachin and Jan DEN ???? ISSN 1529-3785 Camenisch. Encrypting (print), 1557-945X (elec- keys securely. IEEE Se- tronic). curity & Privacy, 8(4):66– 69, July/August 2010. CO- Chretien:2015:SPP DEN ???? ISSN 1540-7993 [CCD15] R´emy Chr´etien, V´eronique (print), 1558-4046 (elec- Cortier, and St´ephanie De- tronic). laune. From security pro- tocols to pushdown au- Chang:2014:RRT tomata. ACM Trans- [CC14] Chin-Chen Chang and actions on Computational Ting-Fang Cheng. A reli- Logic, 17(1):3:1–3:??, De- able real-time multicast au- cember 2015. CODEN thentication protocol with ???? ISSN 1529-3785 provable accuracy. Fun- (print), 1557-945X (elec- damenta Informaticae, 131 tronic). (2):167–186, April 2014. Chretien:2019:TMF CODEN FUMAAJ. ISSN 0169-2968 (print), 1875- [CCDD19] R´emy Chr´etien, V´eronique 8681 (electronic). Cortier, Antoine Dallon, REFERENCES 188

and St´ephanie Delaune. Federated identity manage- Typing messages for free in ment in the Marche re- security protocols. ACM gion. Lecture Notes in Transactions on Compu- Computer Science, 7452: tational Logic, 21(1):1:1– 112–124, 2012. CO- 1:??, October 2019. CO- DEN LNCSD9. ISSN DEN ???? ISSN 1529-3785 0302-9743 (print), 1611- (print), 1557-945X (elec- 3349 (electronic). URL tronic). URL https:// http://link.springer. dl.acm.org/ft_gateway. com/chapter/10.1007/978- cfm?id=3343507. 3-642-32701-8_11/. Chretien:2020:TMF Chou:2010:PSO [CCDD20] R´emy Chr´etien, V´eronique [CCG10] Cheng-Fu Chou, William C. Cortier, Antoine Dallon, Cheng, and Leana Gol- and St´ephanie Delaune. ubchik. Performance Typing messages for free in study of online batch- security protocols. ACM based digital signature Transactions on Compu- schemes. Journal of Net- tational Logic, 21(1):1:1– work and Computer Ap- 1:52, January 2020. CO- plications, 33(2):98–114, DEN ???? ISSN 1529-3785 March 2010. CODEN JN- (print), 1557-945X (elec- CAF3. ISSN 1084-8045 tronic). URL https:// (print), 1095-8592 (elec- dl.acm.org/ft_gateway. tronic). URL http:// cfm?id=3343507. www.sciencedirect.com/ Chen:2017:LAA science/article/pii/S1084804509001374.

[CCF17] Min Chen, Shigang Chen, Checkoway:2016:SAJ and Yuguang Fang. Lightweight anonymous authentication [CCG+16] Stephen Checkoway, Shaanan protocols for RFID sys- Cohney, Christina Gar- tems. IEEE/ACM Trans- man, Matthew Green, Na- actions on Networking,25 dia Heninger, Jacob Mask- (3):1475–1488, June 2017. iewicz, Eric Rescorla, Ho- CODEN IEANEP. ISSN vav Shacham, and Ralf- 1063-6692 (print), 1558- Philipp Weinmann. A sys- 2566 (electronic). tematic analysis of the Ju- Carota:2012:FFI niper Dual EC incident. Cryptology ePrint Archive, [CCFM12] Serenella Carota, Flavio Report 2016/376., April Corradini, Damiano Fal- 14, 2016. URL https:/ cioni, and Maria Laura /eprint.iacr.org/2016/ Maggiulli. FedCohesion: 376. REFERENCES 189

Chadha:2012:AVE comjnl.oxfordjournals. org/content/56/10/1167. [CCK12] Rohit Chadha,Stefan ¸ full.pdf+html. Ciobˆac˘a, and Steve Kre- mer. Automated verifica- Cao:2019:AML

tion of equivalence proper- + ties of cryptographic pro- [CCL 19] Nanyuan Cao, Zhenfu tocols. Lecture Notes in Cao, Zhen Liu, Xiaolei Computer Science, 7211: Dong, and Xiaopeng Zhao. 108–127, 2012. CO- All-but-many lossy trap- DEN LNCSD9. ISSN door functions under de- 0302-9743 (print), 1611- cisional RSA subgroup 3349 (electronic). URL assumption and applica- http://link.springer. tion. The Computer Jour- com/chapter/10.1007/978- nal, 62(8):1148–1157, Au- 3-642-28869-2_6/. gust 2019. CODEN CM- PJA6. ISSN 0010-4620 Chatterjee:2016:TAD (print), 1460-2067 (elec- [CCKM16] Urbi Chatterjee, Rajat Subhra tronic). URL http:// Chakraborty, Hitesh Kapoor, academic.oup.com/comjnl/ and Debdeep Mukhopad- article/62/8/1148/5369686. hyay. Theory and appli- Chang:2011:SFW cation of delay constraints in arbiter PUF. ACM [CCLL11] Chin-Chen Chang, Kuo- Transactions on Embed- Nan Chen, Chin-Feng Lee, ded Computing Systems, and Li-Jen Liu. A se- 15(1):10:1–10:??, February cure fragile watermarking 2016. CODEN ???? ISSN scheme based on chaos- 1539-9087 (print), 1558- and-Hamming code. The 3465 (electronic). Journal of Systems and Software, 84(9):1462–1470, Chou:2013:UGS September 2011. CODEN [CCL+13] Yao-Hsin Chou, Shuo-Mao JSSODM. ISSN 0164-1212 Chen, Yu-Ting Lin, Chi- (print), 1873-1228 (elec- Yuan Chen, and Han- tronic). URL http:// Chieh Chao. Using GHZ- www.sciencedirect.com/ state for multiparty quan- science/article/pii/S0164121211000549. tum secret sharing without Cascudo:2015:SSN code table. The Computer Journal, 56(10):1167–1175, [CCM+15] Ignacio Cascudo, Ronald October 2013. CODEN Cramer, Diego Mirandola, CMPJA6. ISSN 0010-4620 Carles Padr´o, and Chaop- (print), 1460-2067 (elec- ing Xing. On secret shar- tronic). URL http:// ing with nonlinear prod- REFERENCES 190

uct reconstruction. SIAM 2014. CODEN CPTRB4. Journal on Discrete Math- ISSN 0018-9162 (print), ematics, 29(2):1114–1131, 1558-0814 (electronic). ???? 2015. CODEN SJD- MEC. ISSN 0895-4801 Chen:2011:EAA (print), 1095-7146 (elec- [CCSW11] Tien-Ho Chen, Yen-Chiu tronic). Chen, Wei-Kuan Shih, and Chatterjee:2017:PBS Hsin-Wen Wei. An effi- cient anonymous authenti- [CCM17] Urbi Chatterjee, Rajat Subhra cation protocol for mobile Chakraborty, and Debdeep pay-TV. Journal of Net- Mukhopadhyay. A PUF- work and Computer Appli- based secure communica- cations, 34(4):1131–1137, tion protocol for IoT. ACM July 2011. CODEN JN- Transactions on Embedded CAF3. ISSN 1084-8045 Computing Systems, 16(3): (print), 1095-8592 (elec- 67:1–67:??, July 2017. CO- tronic). URL http:// DEN ???? ISSN 1539-9087 www.sciencedirect.com/ (print), 1558-3465 (elec- science/article/pii/S1084804510002031. tronic). Chu:2014:KAC Chikouche:2019:PPC [CCT+14] Cheng-Kang Chu, Sher- [CCMB19] Noureddine Chikouche, man S. M. Chow, Wen- Pierre-Louis Cayrel, El Hadji Modou Guey Tzeng, Jianying Mboup, and Brice Odilon Zhou, and Robert H. Deng. Boidje. A privacy- Key-aggregate cryptosys- preserving code-based au- tem for scalable data shar- thentication protocol for ing in cloud storage. IEEE Internet of Things. The Transactions on Parallel Journal of Supercomputing, and Distributed Systems, 75(12):8231–8261, Decem- 25(2):468–477, February ber 2019. CODEN JO- 2014. CODEN ITDSEO. SUED. ISSN 0920-8542 ISSN 1045-9219 (print), (print), 1573-0484 (elec- 1558-2183 (electronic). tronic). Chen:2010:ALD Cho:2014:DGA [CCW+10] Songqing Chen, Shiping [CCS14] Michael Cheng Yi Cho, Chen, Xinyuan Wang, Pokai Chen, and Shi- Zhao Zhang, and Sushil uhpyng Winston Shieh. Jajodia. An application- Dmail: A globally authen- level data transparent au- ticated email service. Com- thentication scheme with- puter, 47(5):88–91, May out communication over- REFERENCES 191

head. IEEE Transactions structure. Future Gener- on Computers, 59(7):943– ation Computer Systems, 954, July 2010. CODEN 62(??):119–127, Septem- ITCOB4. ISSN 0018- ber 2016. CODEN FG- 9340 (print), 1557-9956 SEVI. ISSN 0167-739X (electronic). URL http: (print), 1872-7115 (elec- //ieeexplore.ieee.org/ tronic). URL http:// stamp/stamp.jsp?tp=&arnumber= www.sciencedirect.com/ 5453339. science/article/pii/S0167739X16300036. Chen:2013:WSB Cui:2016:RDA

[CCZC13] Guoming Chen, Qiang [CD16b] Hui Cui and Robert H. Chen, Dong Zhang, and Deng. Revocable and de- Yiqun Chen. A water- centralized attribute-based marking scheme based on encryption. The Computer compressive sensing and Journal, 59(8):1220–1235, Bregman iteration. Inter- August 2016. CODEN national Journal of Com- CMPJA6. ISSN 0010-4620 puter Applications, 35(4): (print), 1460-2067 (elec- 173–180, 2013. ISSN 1206- tronic). URL http:// 212X (print), 1925-7074 comjnl.oxfordjournals. (electronic). URL https: org/content/59/8/1220. //www.tandfonline.com/ doi/full/10.2316/Journal. Criswell:2014:VGP 202.2013.4.202-3844. [CDA14] John Criswell, Nathan Chiasson:2012:MWB Dautenhahn, and Vikram [CD12] Sonia Chiasson and Chris Adve. Virtual Ghost: pro- Deschamps. The MVP tecting applications from Web-based authentica- hostile operating systems. tion framework. Lecture ACM SIGARCH Computer Notes in Computer Sci- Architecture News, 42(1): ence, 7397:16–24, 2012. 81–96, March 2014. CO- CODEN LNCSD9. ISSN DEN CANED2. ISSN 0302-9743 (print), 1611- 0163-5964 (print), 1943- 3349 (electronic). URL 5851 (electronic). http://link.springer. Cheng:2013:DVB com/chapter/10.1007/978- 3-642-32946-3_2/. [CDD13] Yueqiang Cheng, Xuhua Canard:2016:HPP Ding, and Robert H. Deng. DriverGuard: [CD16a] S. Canard and J. Devigne. Virtualization-based fine- Highly privacy-protecting grained protection on I/O data sharing in a tree flows. ACM Transactions REFERENCES 192

on Information and Sys- Lei Zhang. Cloud cryp- tem Security, 16(2):6:1– tography: Theory, prac- 6:??, September 2013. CO- tice and future research di- DEN ATISBQ. ISSN 1094- rections. Future Gener- 9224 (print), 1557-7406 ation Computer Systems, (electronic). 62(??):51–53, September 2016. CODEN FG- Ciriani:2010:CFE SEVI. ISSN 0167-739X (print), 1872-7115 (elec- [CDF+10] Valentina Ciriani, Sabrina tronic). URL http:// De Capitani Di Vimercati, www.sciencedirect.com/ Sara Foresti, Sushil Ja- science/article/pii/S0167739X16300942. jodia, Stefano Paraboschi, and Pierangela Samarati. Cao:2012:ITM Combining fragmentation and encryption to pro- [CDGC12] Zhen Cao, Hui Deng, Zhi tect privacy in data stor- Guan, and Zhong Chen. age. ACM Transactions Information-theoretic mod- on Information and Sys- eling of false data filter- tem Security, 13(3):22:1– ing schemes in wireless 22:??, July 2010. CODEN sensor networks. ACM ATISBQ. ISSN 1094-9224 Transactions on Sensor (print), 1557-7406 (elec- Networks, 8(2):14:1–14:??, tronic). March 2012. CODEN ???? ISSN 1550-4859 (print), Ciriani:2010:TPA 1550-4867 (electronic).

[CDFS10] Valentina Ciriani, Sabrina Chari:2010:DSC De Capitani di Vimer- cati, Sara Foresti, and [CDK+10] Suresh Chari, Vincenzo V. Pierangela Samarati. The- Diluoffo, Paul A. Karger, ory of Privacy and Anonymity, Elaine R. Palmer, Tal chapter 18, pages 1–35. Rabin, Josyula R. Rao, Volume 2 of Atallah and Pankaj Rohatgi, Helmut Blanton [AB10b], second Scherzer, Michael Steiner, edition, 2010. ISBN and David C. Toll. De- 1-58488-820-2. LCCN signing a side channel re- QA76.9.A43 A433 2010. sistant random number URL http://www.crcnetbase. generator. In Gollmann com/doi/abs/10.1201/9781584888215- et al. [GLIC10], pages 49– c18. 64. ISBN 3-642-12509- Choo:2016:CCT 3 (paperback). ISSN 0302-9743 (print), 1611- [CDFZ16] Kim-Kwang Raymond Choo, 3349 (electronic). LCCN Josep Domingo-Ferrer, and TK7895.S62 C36 2010. REFERENCES 193

URL http://www.informatik. Costello:2014:CAS uni-trier.de/~ley/db/ conf/cardis/cardis2010. [CDSLY14] Craig Costello, Alyson html#ChariDKPRRRSST10. Deines-Schartz, Kristin Lauter, and Tonghai Yang. Cui:2018:ABC Constructing abelian sur- faces for cryptography via [CDL18] Hui Cui, Robert H. Deng, Rosenhain invariants. LMS and Yingjiu Li. Attribute- Journal of Computation based cloud storage with and Mathematics, 17(A): secure provenance over en- 157–180, 2014. CODEN crypted data. Future ???? ISSN 1461-1570. Generation Computer Sys- tems, 79 (part 2)(??):461– Cremers:2019:SAG 472, 2018. CODEN FG- [CDWM19] Cas Cremers, Martin SEVI. ISSN 0167-739X Dehnel-Wild, and Kevin (print), 1872-7115 (elec- Milner. Secure authentica- tronic). URL https:// tion in the grid: a formal www.sciencedirect.com/ analysis of DNP3 SAv5. science/article/pii/S0167739X17322835. Journal of Computer Se- Cui:2019:ABS curity, 27(2):203–232, ???? 2019. CODEN JCSIET. [CDLW19] H. Cui, R. H. Deng, Y. Li, ISSN 0926-227X (print), and G. Wu. Attribute- 1875-8924 (electronic). based storage supporting Culnane:2019:KKR secure deduplication of en- crypted data in cloud. [CEL+19] C. Culnane, A. Essex, S. J. IEEE Transactions on Lewis, O. Pereira, and Big Data, 5(3):330–342, V. Teague. Knights and September 2019. ISSN knaves run elections: In- 2332-7790. ternet voting and unde- Coras:2016:AML tectable electoral fraud. IEEE Security & Privacy, [CDPLCA16] Florin Coras, Jordi Domingo- 17(4):62–70, July/August Pascual, Darrel Lewis, and 2019. ISSN 1540-7993 Albert Cabellos-Aparicio. (print), 1558-4046 (elec- An analytical model for tronic). Loc/ID mappings caches. Ceruzzi:2014:HFT IEEE/ACM Transactions on Networking, 24(1):506– [Cer14] P. E. Ceruzzi. Are histori- 516, February 2016. CO- ans failing to tell the real DEN IEANEP. ISSN 1063- story about the history of 6692 (print), 1558-2566 computing? IEEE An- (electronic). nals of the History of Com- REFERENCES 194

puting, 36(3):94–95, July Hilton Los Angeles Univer- 2014. CODEN IAHCEX. sal City, Los Angeles, CA, ISSN 1058-6180 (print), USA). ACM Press, New 1934-1547 (electronic). York, NY 10036, USA, 2016. ISBN 1-4503-4771-1. Cerf:2015:CTN Crampton:2017:CEI [Cer15] Vinton G. Cerf. Cerf’s up: There is nothing new [CFG+17] Jason Crampton, Naomi under the sun. Com- Farley, Gregory Gutin, munications of the As- Mark Jones, and Bertram sociation for Comput- Poettering. Cryptographic ing Machinery, 58(2):7, enforcement of information February 2015. CODEN flow policies without pub- CACMA2. ISSN 0001-0782 lic information via tree par- (print), 1557-7317 (elec- titions. Journal of Com- tronic). URL http:// puter Security, 25(6):511– cacm.acm.org/magazines/ 535, ???? 2017. CODEN 2015/2/182649/fulltext. JCSIET. ISSN 0926-227X Cerf:2018:CSA (print), 1875-8924 (elec- tronic). [Cer18] Vinton G. Cerf. Cerf’s up: Self-authenticating identi- Carter:2013:SSA fiers. Communications of [CFH+13] Kyle Carter, Adam Foltzer, the Association for Com- Joe Hendrix, Brian Huff- puting Machinery, 61(12): man, and Aaron Tomb. 5, December 2018. CO- SAW: the software analysis DEN CACMA2. ISSN workbench. ACM SIGADA 0001-0782 (print), 1557- Ada Letters, 33(3):15–18, 7317 (electronic). URL December 2013. CODEN https://cacm.acm.org/ AALEE5. ISSN 1094-3641 magazines/2018/12/232883/ (print), 1557-9476 (elec- fulltext. tronic). Chang-Fong:2016:CSC Centenaro:2013:TBA [CFE16] N. Chang-Fong and A. Es- sex. The cloudier side [CFL13] Matteo Centenaro, Ric- of cryptographic end-to- cardo Focardi, and Flaminia L. end verifiable voting: A se- Luccio. Type-based analy- curity analysis of Helios. In sis of key management in ACM, editor, Proceedings PKCS#11 cryptographic of the 32nd Annual Con- devices. Journal of Com- ference on Computer Secu- puter Security, 21(6):971– rity Applications (ACSAC 1007, ???? 2013. CODEN 16: 5–9 December 2016, JCSIET. ISSN 0926-227X REFERENCES 195

(print), 1875-8924 (elec- gebra: applications to Ga- tronic). lois theory, algebraic geom- etry, and cryptography, vol- Checkoway:2014:PED ume 11 of Sigma series in pure mathematics. Walter [CFN+14] Stephen Checkoway, Matthew de Gruyter, New York, NY, Fredrikson, Ruben Nieder- USA, 2011. ISBN 3-11- hagen, Matthew Green, 025008-X. ???? pp. LCCN Tanja Lange, Thomas Ris- QA162 .C375 2011. tenpart, Daniel J. Bern- stein, Jake Maskiewicz, Calzavara:2017:SWJ and Hovav Schacham. On the practical exploitability [CFST17] Stefano Calzavara, Ric- of Dual EC in TLS imple- cardo Focardi, Marco mentations. In ????, editor, Squarcina, and Mauro USENIX Security Sympo- Tempesta. Surviving the sium, page ?? USENIX, Web: a journey into Web Berkeley, CA, USA, 2014. session security. ACM ISBN ???? LCCN ???? Computing Surveys,50 URL ????. (1):13:1–13:??, April 2017. CODEN CMSVAN. ISSN Cevallos:2012:USR 0360-0300 (print), 1557- [CFOR12] Alfonso Cevallos, Serge 7341 (electronic). Fehr, Rafail Ostrovsky, and Celesti:2016:ALT Yuval Rabani. Unconditionally- secure robust secret shar- [CFVP16] Antonio Celesti, Maria ing with compact shares. Fazio, Massimo Villari, and Lecture Notes in Com- Antonio Puliafito. Adding puter Science, 7237:195– long-term availability, ob- 208, 2012. CODEN fuscation, and encryption LNCSD9. ISSN 0302-9743 to multi-cloud storage sys- (print), 1611-3349 (elec- tems. Journal of Net- tronic). URL http:// work and Computer Ap- link.springer.com/accesspage/ plications, 59(??):208–218, chapter/10.1007/978-3- January 2016. CODEN 642-29011-4_12; http:/ JNCAF3. ISSN 1084-8045 /link.springer.com/chapter/ (print), 1095-8592 (elec- 10.1007/978-3-642-29011- tronic). URL http:// 4_13/. www.sciencedirect.com/ science/article/pii/S1084804514002288. Carstensen:2011:AAA Choo:2017:EDF [CFR11] Celine Carstensen, Ben- jamin Fine, and Gerhard [CFXY17] Kim-Kwang Raymond Choo, Rosenberger. Abstract al- Yunsi Fei, Yang Xiang, REFERENCES 196

and Yu Yu. Embedded Groß. Efficient attributes device forensics and secu- for anonymous creden- rity. ACM Transactions tials. ACM Transactions on Embedded Computing on Information and Sys- Systems, 16(2):50:1–50:??, tem Security, 15(1):4:1– April 2017. CODEN ???? 4:??, March 2012. CODEN ISSN 1539-9087 (print), ATISBQ. ISSN 1094-9224 1558-3465 (electronic). (print), 1557-7406 (elec- tronic). Chang:2010:PRN Che:2012:WAM [CFY+10] Weiling Chang, Binx- ing Fang, Xiaochun Yun, [CG12b] Xiangjiu Che and Zhan- Shupeng Wang, and Xi- heng Gao. Watermark- angzhan Yu. A pseudo- ing algorithm for 3D random number generator based on multi-scale radial based on LZSS. In 2010 basis functions. Interna- Data Compression Con- tional Journal of Parallel, ference (DCC), page 524. Emergent and Distributed IEEE Computer Society Systems: IJPEDS, 27(2): Press, 1109 Spring Street, 133–141, 2012. CODEN Suite 300, Silver Spring, ???? ISSN 1744-5760 MD 20910, USA, 2010. (print), 1744-5779 (elec- URL http://ieeexplore. tronic). ieee.org/stamp/stamp. jsp?tp=&arnumber=5453503. Cheraghchi:2014:NMC Chen:2010:IFA [CG14a] Mahdi Cheraghchi and Venkatesan Guruswami. [CFZ+10] Lanxiang Chen, Dan Feng, Non-malleable coding against Yu Zhang, Lingfang Zeng, bit-wise and split-state and Zhongying Niu. In- tampering. Lecture Notes tegrating FPGA/ASIC in Computer Science, 8349: into cryptographic stor- 440–464, 2014. CO- age systems to avoid re- DEN LNCSD9. ISSN encryption. International 0302-9743 (print), 1611- Journal of Parallel, Emer- 3349 (electronic). URL gent and Distributed Sys- http://link.springer. tems: IJPEDS, 25(2):105– com/chapter/10.1007/978- 122, 2010. CODEN ???? 3-642-54242-8_19/. ISSN 1744-5760 (print), 1744-5779 (electronic). Corrigan-Gibbs:2014:KS Camenisch:2012:EAA [CG14b] Henry Corrigan-Gibbs. Keeping secrets. Stan- [CG12a] Jan Camenisch and Thomas ford Magazine, ??(??):??, REFERENCES 197

November/December 2014. Janusz Stoklosa. Evalu- URL https://alumni. ation of PP-1 cipher re- stanford.edu/get/page/ sistance against differential magazine/article/?article_ and in id=74801. comparison to a DES-like Chaudhuri:2010:PIC cipher. Fundamenta Infor- maticae, 114(3–4):239–269, [CGB+10] Pranay Chaudhuri, Suku- August 2012. CODEN FU- mar Ghosh, Raj Kumar MAAJ. ISSN 0169-2968 Buyya, Jian-Nong Cao, (print), 1875-8681 (elec- and Oeepak Oahiya, ed- tronic). itors. Proceedings of the 2010 1st International Coull:2011:ACO Conference on Parallel [CGH11] Scott E. Coull, Matthew Distributed and Grid Com- Green, and Susan Hohen- puting (PDGC), Jaypee berger. Access controls for University of Information oblivious and anonymous Technology Waknaghat, systems. ACM Transac- Solan, HP, India, 28–30 tions on Information and October, 2010. IEEE Com- System Security, 14(1): puter Society Press, 1109 10:1–10:??, May 2011. CO- Spring Street, Suite 300, DEN ATISBQ. ISSN 1094- Silver Spring, MD 20910, 9224 (print), 1557-7406 USA, 2010. ISBN 1-4244- (electronic). 7675-5. LCCN ???? Caballero-Gil:2012:LAR Cohney:2017:PSR [CGCGPDMG12] C. Caballero-Gil, P. Caballero-[CGH17] Shaanan Cohney, Matthew D. Gil, A. Peinado-Dom´ınguez, Green, and Nadia Heninger. and J. Molina-Gil. Lightweight Practical state recovery at- authentication for RFID tacks against legacy RNG used in VANETs. Lecture implementations. Report, Notes in Computer Sci- University of Pennsylva- ence, 6928:493–500, 2012. nia and The Johns Hop- CODEN LNCSD9. ISSN kins University, College 0302-9743 (print), 1611- Park, PA and Baltimore, 3349 (electronic). URL MD, October 23, 2017. http://link.springer. 15 pp. URL https:/ com/content/pdf/10.1007/ /duhkattack.com/paper. 978-3-642-27579-1_64. pdf. Chmiel:2012:EPC Curtmola:2011:SSE [CGCS12] Krzysztof Chmiel, Anna [CGKO11] Reza Curtmola, Juan Grocholewska-Czurylo, and Garay, Seny Kamara, and REFERENCES 198

Rafail Ostrovsky. Search- nature scheme. Interna- able symmetric encryp- tional Journal of Com- tion: Improved definitions puter Applications, 35(1): and efficient constructions. 1–5, 2013. CODEN IJ- Journal of Computer Se- CAFW. ISSN 1206-212X curity, 19(5):895–934, ???? (print), 1925-7074 (elec- 2011. CODEN JCSIET. tronic). URL https: ISSN 0926-227X (print), //www.tandfonline.com/ 1875-8924 (electronic). doi/full/10.2316/Journal. 202.2013.1.202-3136. Cheng:2012:PAI Chen:2010:NUP [CGL+12] Pengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, [CH10] Tzung-Her Chen and Jyun- Wenlei Zhu, Zhen Chen, Ci Huang. A novel user- and Jiwei Huang. A participating authentica- performance analysis of tion scheme. The Journal identity-based encryption of Systems and Software, schemes. Lecture Notes in 83(5):861–867, May 2010. Computer Science, 7222: CODEN JSSODM. ISSN 289–303, 2012. CO- 0164-1212. DEN LNCSD9. ISSN Chang:2011:DEQ 0302-9743 (print), 1611- 3349 (electronic). URL [CH11] Tao-Ku Chang and Gwan- http://link.springer. Hwan Hwang. Developing com/chapter/10.1007/978- an efficient query system 3-642-32298-3_19/. for encrypted XML docu- ments. The Journal of Sys- Chandran:2014:PBC tems and Software, 84(8): 1292–1305, August 2011. [CGMO14] Nishanth Chandran, Vipul CODEN JSSODM. ISSN Goyal, Ryan Moriarty, and 0164-1212. Rafail Ostrovsky. Position- based cryptography. SIAM Chan:2013:OCK Journal on Computing,43 [Cha13a] Aldar C.-F. Chan. On (4):1291–1341, ???? 2014. optimal cryptographic key CODEN SMJCAT. ISSN derivation. Theoretical 0097-5397 (print), 1095- Computer Science, 489– 7111 (electronic). 490(??):21–36, June 10, Cheng:2013:NIB 2013. CODEN TC- SCDI. ISSN 0304-3975 [CGY+13] Xiangguo Cheng, Lifeng (print), 1879-2294 (elec- Guo, Jia Yu, Huiran Ma, tronic). URL http:// and Yuexiu Wu. A new www.sciencedirect.com/ identity-based group sig- science/article/pii/S0304397513002843. REFERENCES 199

Chang:2013:MPQ content/978-3-642-25515- 1. [Cha13b] Mei-Chu Chang. On a ma- trix product question in Cheswick:2013:RP cryptography. Linear Al- [Che13] William Cheswick. Re- gebra and its Applications, thinking passwords. Com- 439(7):1742–1748, October munications of the As- 1, 2013. CODEN LAA- sociation for Computing PAW. ISSN 0024-3795 Machinery, 56(2):40–44, (print), 1873-1856 (elec- February 2013. CODEN tronic). URL http:// CACMA2. ISSN 0001-0782 www.sciencedirect.com/ (print), 1557-7317 (elec- science/article/pii/S002437951300339X. tronic). Chappell:2013:PMI Chen:2015:SSS [Cha13c] Brian Chappell. Privilege management — the indus- [Che15] Yu-Chi Chen. SPEKS: try’s best kept secret. Net- Secure server-designation work Security, 2013(10): public key encryption with 12–14, October 2013. CO- keyword search against DEN NTSCF5. ISSN 1353- keyword guessing attacks. 4858 (print), 1872-9371 The Computer Journal,58 (electronic). URL http:// (4):922–933, April 2015. www.sciencedirect.com/ CODEN CMPJA6. ISSN science/article/pii/S1353485813701144. 0010-4620 (print), 1460- 2067 (electronic). URL Chen:2011:CCI http://comjnl.oxfordjournals. org/content/58/4/922. [Che11] Liqun Chen, editor. Cryp- tography and Coding: 13th Chen:2017:CSQ IMA International Confer- ence, IMACC 2011, Ox- [Che17] Lidong Chen. Cryptog- ford, UK, December 12–15. raphy standards in quan- Proceedings, volume 7089 tum time: New wine in of Lecture Notes in Com- an old wineskin? IEEE puter Science. Springer- Security & Privacy, 15(4): Verlag, Berlin, Germany / 51–57, July/August 2017. Heidelberg, Germany / CODEN ???? ISSN London, UK / etc., 2011. 1540-7993 (print), 1558- CODEN LNCSD9. ISBN 4046 (electronic). URL 3-642-25515-9. ISSN 0302- https://www.computer. 9743 (print), 1611-3349 org/csdl/mags/sp/2017/ (electronic). URL http:/ 04/msp2017040051-abs. /www.springerlink.com/ html. REFERENCES 200

Chen:2018:ESA com/chapter/10.1007/978- 3-642-32205-1_13/. [Che18] Yung-Chih Chen. En- hancements to SAT at- Chien:2012:IAM tack: Speedup and break- ing cyclic logic encryption. [Chi12] Hung-Yu Chien. Im- ACM Transactions on De- proved anonymous multi- sign Automation of Elec- receiver identity-based en- tronic Systems, 23(4):52:1– cryption. The Computer 52:??, July 2018. CODEN Journal, 55(4):439–446, ATASFO. ISSN 1084-4309 April 2012. CODEN CM- (print), 1557-7309 (elec- PJA6. ISSN 0010-4620 tronic). (print), 1460-2067 (elec- tronic). URL http:// Cui:2019:CPA comjnl.oxfordjournals.

+ org/content/55/4/439. [CHH 19] Yuzhao Cui, Qiong Huang, full.pdf+html. See Jianye Huang, Hongbo comment on insecurity Li, and Guomin Yang. [Wan14]. Ciphertext-policy attribute- based encrypted data Chien:2013:CRC equality test and classifica- tion. The Computer Jour- [Chi13a] Hung-Yu Chien. Com- nal, 62(8):1166–1177, Au- bining Rabin cryptosystem gust 2019. CODEN CM- and error correction codes PJA6. ISSN 0010-4620 to facilitate anonymous (print), 1460-2067 (elec- authentication with un- tronic). URL http:// traceability for low-end de- academic.oup.com/comjnl/ vices. Computer Networks article/62/8/1166/5480373. (Amsterdam, Netherlands: Chen:2012:SRF 1999), 57(14):2705–2717, October 4, 2013. CODEN [CHHW12] Fan Chen, Hongjie He, ???? ISSN 1389-1286 Yaoran Huo, and Hongxia (print), 1872-7069 (elec- Wang. Self-recovery frag- tronic). URL http:// ile watermarking scheme www.sciencedirect.com/ with variable watermark science/article/pii/S1389128613001898. payload. Lecture Notes in Computer Science, 7128: Chirgwin:2013:ABB 142–155, 2012. CO- DEN LNCSD9. ISSN [Chi13b] R. Chirgwin. Android 0302-9743 (print), 1611- bug batters Bitcoin wal- 3349 (electronic). URL lets. The Register, ??(??): http://link.springer. ??, ???? 2013. URL ????. REFERENCES 201

Chien:2016:GAI Cohen:2018:WCC [CHN+18] Aloni Cohen, Justin Holm- [Chi16] Hung-Yu Chien. A generic gren, Ryo Nishimaki, approach to improving Vinod Vaikuntanathan, Diffie–Hellman key agree- and Daniel Wichs. Water- ment efficiency for thin marking cryptographic ca- clients. The Computer pabilities. SIAM Journal Journal, 59(4):592–601, on Computing, 47(6):2157– April 2016. CODEN CM- 2202, ???? 2018. CODEN PJA6. ISSN 0010-4620 SMJCAT. ISSN 0097-5397 (print), 1460-2067 (elec- (print), 1095-7111 (elec- tronic). URL http:// tronic). comjnl.oxfordjournals. org/content/59/4/592. Choudary:2010:SCD [Cho10] Omar S. Choudary. The Conti:2019:BUB Smart Card detective: a hand-held EMV in- [CHL19] Mauro Conti, Muham- terceptor. M. Phil. mad Hassan, and Chha- dissertation in Advance gan Lal. BlockAuth: Computer Science, Com- BlockChain based dis- puter Laboratory, Dar- tributed producer authen- win College, University tication in ICN. Com- of Cambridge, Cambridge, puter Networks (Amster- UK, June 2010. 57 dam, Netherlands: 1999), pp. URL http://www.cl. 164(??):Article 106888, De- cam.ac.uk/~osc22/docs/ cember 9, 2019. CODEN mphil_acs_osc22.pdf; ???? ISSN 1389-1286 http://www.cl.cam.ac. (print), 1872-7069 (elec- uk/~osc22/scd/; http: tronic). URL http:// //www.lightbluetouchpaper. www.sciencedirect.com/ org/2010/10/19/the-smart- science/article/pii/S1389128619308308. card-detective-a-hand- held-emv-interceptor/. Chmielowiec:2010:FPR Chou:2014:EMA [Chm10] Andrzej Chmielowiec. Fixed [Cho14] Jue-Sam Chou. An effi- points of the RSA encryp- cient mutual authentica- tion algorithm. Theoretical tion RFID scheme based Computer Science, 411(1): on elliptic curve cryptog- 288–292, January 1, 2010. raphy. The Journal of CODEN TCSCDI. ISSN Supercomputing, 70(1):75– 0304-3975 (print), 1879- 94, October 2014. CO- 2294 (electronic). DEN JOSUED. ISSN REFERENCES 202

0920-8542 (print), 1573- scientificcomputing.com/ 0484 (electronic). URL news/2016/03/beginning- http://link.springer. end-encryption-schemes. com/article/10.1007/s11227- 013-1073-x. Chen:2013:ATK Chen:2011:SEI [CHX13] Qian Chen, Haibo Hu, and Jianliang Xu. Au- [CHS11] Tien-Ho Chen, Han-Cheng thenticating top-k queries Hsiang, and Wei-Kuan in location-based services Shih. Security enhance- with confidentiality. Pro- ment on an improvement ceedings of the VLDB on two remote user au- Endowment, 7(1):49–60, thentication schemes using September 2013. CODEN smart cards. Future Gen- ???? ISSN 2150-8097. eration Computer Systems, Cilardo:2011:EPT 27(4):377–380, April 2011. CODEN FGSEVI. ISSN [Cil11] Alessandro Cilardo. Ex- 0167-739X (print), 1872- ploring the potential of 7115 (electronic). threshold logic for cryptography- related operations. IEEE Cooke:2015:FSM Transactions on Comput- [CHS15] Patrick Cooke, Lu Hao, ers, 60(4):452–462, April and Greg Stitt. Finite- 2011. CODEN ITCOB4. state-machine overlay ar- ISSN 0018-9340 (print), chitectures for fast FPGA 1557-9956 (electronic). compilation and applica- Cheng:2013:EHM tion portability. ACM Transactions on Embed- [CJ13] Chi Cheng and Tao Jiang. ded Computing Systems,14 An efficient homomor- (3):54:1–54:??, April 2015. phic MAC with small key CODEN ???? ISSN 1539- size for authentication in 9087 (print), 1558-3465 network coding. IEEE (electronic). Transactions on Comput- ers, 62(10):2096–2100, Oc- Chu:2016:BEE tober 2013. CODEN IT- [Chu16] Jennifer Chu. The begin- COB4. ISSN 0018-9340 ning of the end for en- (print), 1557-9956 (elec- cryption schemes? Scien- tronic). See comments tific Computing, ??(??):??, [LCLL15, Kim15]. March 7, 2016. CODEN Cao:2014:SCI SCHRCU. ISSN 1930-5753 (print), 1930-6156 (elec- [CJFH14] Yan-Pei Cao, Tao Ju, tronic). URL http://www. Zhao Fu, and Shi-Min REFERENCES 203

Hu. Shapes and cryptog- science/article/pii/S0898122112001393. raphy: Interactive image- See cryptanalysis [SPLHCB14]. guided modeling of ex- truded shapes. Compu- Cho:2015:CBF ter Graphics Forum,33[CJP15] Jung-Sik Cho, Young- (7):101–110, October 2014. Sik Jeong, and Sang Oh CODEN CGFODY. ISSN Park. Consideration on the 0167-7055 (print), 1467- brute-force attack cost and 8659 (electronic). retrieval cost: a hash-based radio-frequency identifi- Cheon:2016:ANP cation (RFID) tag mu- tual authentication pro- [CJL16] Jung Hee Cheon, Jinhyuck tocol. Computers and Jeong, and Changmin Lee. Mathematics with Appli- An algorithm for NTRU cations, 69(1):58–65, Jan- problems and cryptanaly- uary 2015. CODEN sis of the GGH multilin- CMAPDK. ISSN 0898- ear map without a low- 1221 (print), 1873-7668 level encoding of zero. LMS (electronic). URL http:// Journal of Computation www.sciencedirect.com/ and Mathematics, 19(A): science/article/pii/S0898122112001393. 255–266, 2016. CODEN ???? ISSN 1461-1570. URL Chang:2019:GTS https://www.cambridge. org/core/product/230ECFEEE6AF4D8027FF3E13998D560C[CJXX19] Jinyong Chang,. Yanyan Ji, Maozhi Xu, and Rui Xue. Cho:2012:CBF General transformations from single-generation to [CJP12] Jung-Sik Cho, Young- multi-generation for ho- Sik Jeong, and Sang Oh momorphic message au- Park. Consideration on the thentication schemes in brute-force attack cost and network coding. Fu- retrieval cost: a hash-based ture Generation Computer radio-frequency identifi- Systems, 91(??):416–425, cation (RFID) Tag Mu- February 2019. CODEN tual Authentication Pro- FGSEVI. ISSN 0167-739X tocol. Computers and (print), 1872-7115 (elec- Mathematics with Appli- tronic). URL https:// cations, 69(1):58–65, Jan- www.sciencedirect.com/ uary 2012. CODEN science/article/pii/S0167739X17330170. CMAPDK. ISSN 0898- Cui:2013:OSL 1221 (print), 1873-7668 (electronic). URL http:// [CJZ13] T. Cui, C. Jin, and www.sciencedirect.com/ G. Zhang. Observations of REFERENCES 204

skipjack-like structure with applications. Interna- SP/SPS round function. tional Journal of Foun- J.UCS: Journal of Univer- dations of Computer Sci- sal Computer Science,19 ence (IJFCS), 29(6):??, (16):2453–??, ???? 2013. September 2018. ISSN CODEN ???? ISSN 0948- 0129-0541. URL https: 695X (print), 0948-6968 //www.worldscientific. (electronic). URL http:/ com/doi/10.1142/S0129054118500193. /www.jucs.org/jucs_19_ Chang:2019:PPN 16/observations_of_skipjack_ like. [CKHP19] Sang-Yoon Chang, Sristi Chandra:2011:AST Lakshmi Sravana Ku- mar, Yih-Chun Hu, and [CK11] Shalini Chandra and Raees Ah- Younghee Park. Power- mad Khan. Availabil- positive networking: Wireless- ity state transition model. charging-based network- ACM SIGSOFT Software ing to protect energy Engineering Notes, 36(3): against battery DoS at- 1–3, May 2011. CODEN tacks. ACM Trans- SFENDP. ISSN 0163-5948 actions on Sensor Net- (print), 1943-5843 (elec- works, 15(3):27:1–27:??, tronic). August 2019. CODEN ???? ISSN 1550-4859 Chailloux:2017:PLQ (print), 1550-4867 (elec- tronic). URL https:// [CK17] Andr´e Chailloux and Ior- dl.acm.org/ft_gateway. danis Kerenidis. Physi- cfm?id=3317686. cal limitations of quantum cryptographic primitives or Chase:2013:SMN optimal bounds for quan- [CKLM13] Melissa Chase, Markulf tum coin flipping and bit Kohlweiss, Anna Lysyan- commitment. SIAM Jour- skaya, and Sarah Meik- nal on Computing, 46(5): lejohn. Succinct mal- 1647–1677, ???? 2017. leable NIZKs and an ap- CODEN SMJCAT. ISSN plication to compact shuf- 0097-5397 (print), 1095- fles. Lecture Notes in 7111 (electronic). Computer Science, 7785: Chung:2018:ERN 100–119, 2013. CO- DEN LNCSD9. ISSN [CK18] Heewon Chung and Myung- 0302-9743 (print), 1611- sun Kim. Encoding 3349 (electronic). URL of rational numbers and http://link.springer. their homomorphic com- com/chapter/10.1007/978- putations for FHE-based 3-642-36594-2_6/. REFERENCES 205

Chuang:2011:LMA Calegari:2019:WPH

[CL11] Ming-Chin Chuang and [CLB19] Patrice Calegari, Marc Jeng-Farn Lee. A lightweight Levrier, and Pawel Bal- mutual authentication mech- czy´nski. Web portals for anism for network mo- high-performance comput- bility in IEEE 802.16e ing: a survey. ACM wireless networks. Com- Transactions on the Web puter Networks (Amster- (TWEB), 13(1):5:1–5:??, dam, Netherlands: 1999), February 2019. CODEN 55(16):3796–3809, Novem- ???? ISSN 1559-1131 ber 10, 2011. CODEN (print), 1559-114X (elec- ???? ISSN 1389-1286 tronic). (print), 1872-7069 (elec- Chen:2019:BBS tronic). URL http:// www.sciencedirect.com/ [CLC+19] Lanxiang Chen, Wai- science/article/pii/S1389128611002052. Kong Lee, Chin-Chen Chang, Kim-Kwang Ray- Colin:2016:CTC mond Choo, and Nan Zhang. Blockchain based [CL16] Alexei Colin and Brandon searchable encryption for Lucia. Chain: tasks and electronic health record channels for reliable inter- sharing. Future Generation mittent programs. ACM Computer Systems, 95(??): SIGPLAN Notices, 51(10): 420–429, June 2019. CO- 514–530, October 2016. DEN FGSEVI. ISSN 0167- CODEN SINODQ. ISSN 739X (print), 1872-7115 0362-1340 (print), 1523- (electronic). URL http:// 2867 (print), 1558-1160 www.sciencedirect.com/ (electronic). science/article/pii/S0167739X18314134.

Claxson:2018:SVE Comon-Lundh:2010:DSP

[Cla18] Nick Claxson. Secur- [CLCZ10] Hubert Comon-Lundh, ing VoIP: encrypting to- V´eronique Cortier, and Eu- day’s digital telephony gen Z˜alinescu. Deciding se- systems. Network Se- curity properties for cryp- curity, 2018(11):11–13, tographic protocols. appli- November 2018. CODEN cation to key cycles. ACM NTSCF5. ISSN 1353-4858 Transactions on Compu- (print), 1872-9371 (elec- tational Logic, 11(2):9:1– tronic). URL http:// 9:??, January 2010. CO- www.sciencedirect.com/ DEN ???? ISSN 1529- science/article/pii/S1353485818301120. 3785. REFERENCES 206

Chang:2011:RSB Wang, and Sufang Zhou. A restricted proxy re- [CLF11] Chin-Chen Chang, Chih- encryption with keyword Yang Lin, and Yi-Hsuan search for fine-grained data Fan. Reversible steganog- access control in cloud stor- raphy for BTC-compressed age. Concurrency and images. Fundamenta Infor- Computation: Practice and maticae, 109(2):121–134, Experience, 28(10):2858– April 2011. CODEN FU- 2876, July 2016. CODEN MAAJ. ISSN 0169-2968 CCPEBO. ISSN 1532-0626 (print), 1875-8681 (elec- (print), 1532-0634 (elec- tronic). tronic). Chen:2017:PGF Chen:2012:NCB [CLF+17] Yajing Chen, Shengshuo Lu, Cheng Fu, David [CLHC12] Yu Chen, Song Luo, Jian- Blaauw, Ronald Dreslin- bin Hu, and Zhong Chen. A ski, Jr., Trevor Mudge, novel commutative blind- and Hun-Seok Kim. A ing identity based encryp- programmable Galois field tion scheme. Lecture processor for the Inter- Notes in Computer Sci- net of Things. ACM ence, 6888:73–89, 2012. SIGARCH Computer Ar- CODEN LNCSD9. ISSN chitecture News, 45(2):55– 0302-9743 (print), 1611- 68, May 2017. CODEN 3349 (electronic). URL CANED2. ISSN 0163-5964 http://link.springer. (print), 1943-5851 (elec- com/chapter/10.1007/978- tronic). 3-642-27901-0_7/. Chong:2013:ASG Chen:2013:TSE

[CLH13] Song-Kong Chong, Cheng- [CLHJ13] Te-Yu Chen, Cheng-Chi Chi Lee, and Min-Shiang Lee, Min-Shiang Hwang, Hwang. An authentica- and Jinn-Ke Jan. To- tion scheme for the global wards secure and effi- mobility network. Parallel cient user authentication Processing Letters, 23(3): scheme using smart card 1350009, September 2013. for multi-server environ- CODEN PPLTEE. ISSN ments. The Journal of Su- 0129-6264 (print), 1793- percomputing, 66(2):1008– 642X (electronic). 1032, November 2013. CO- Chen:2016:RPR DEN JOSUED. ISSN 0920-8542 (print), 1573- [CLH+16] Zhenhua Chen, Shundong 0484 (electronic). URL Li, Qiong Huang, Yilei http://link.springer. REFERENCES 207

com/article/10.1007/s11227- (print), 1460-2067 (elec- 013-0966-z. tronic). URL http:// Chande:2016:NSC academic.oup.com/comjnl/ article/62/8/1132/5369678. [CLL16] Manoj Kumar Chande, Cheng-Chi Lee, and Chun- Canetti:2013:PCC Ta Li. A new self-certified [CLP13a] Ran Canetti, Huijia Lin, convertible authenticated and Omer Paneth. Public- encryption scheme based coin concurrent zero-knowledge on discrete logarithm prob- in the global hash model. lem. Parallel Processing Lecture Notes in Computer Letters, 26(4):1650018, De- Science, 7785:80–99, 2013. cember 2016. CODEN CODEN LNCSD9. ISSN PPLTEE. ISSN 0129-6264 0302-9743 (print), 1611- (print), 1793-642X (elec- 3349 (electronic). URL tronic). http://link.springer. Cao:2012:SRH com/chapter/10.1007/978- 3-642-36594-2_5/. [CLM+12] Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, and Castro:2013:RAM Chengzhe Lai. A sim- + ple and robust handover [CLP 13b] P. C. Castro, J. W. Lig- authentication between man, M. Pistoia, J. Ponzo, HeNB and eNB in LTE net- G. S. Thomas, and U. Top- works. Computer Networks kara. Runtime adaptive (Amsterdam, Netherlands: multi-factor authentication 1999), 56(8):2119–2131, for mobile devices. IBM May 24, 2012. CODEN Journal of Research and ???? ISSN 1389-1286 Development, 57(6):8:1– (print), 1872-7069 (elec- 8:17, November–December tronic). URL http:// 2013. CODEN IBMJAE. www.sciencedirect.com/ ISSN 0018-8646 (print), science/article/pii/S138912861200076X. 2151-8556 (electronic). Chen:2019:IBS Chang:2012:PRS [CLND19] Jiahui Chen, Jie Ling, [CLSW12] Shih-Ying Chang, Yue- Jianting Ning, and Jintai Hsun Lin, Hung-Min Sun, Ding. Identity-based signa- and Mu-En Wu. Practi- ture schemes for multivari- cal RSA signature scheme ate public key cryptosys- based on periodical rekey- tems. The Computer Jour- ing for wireless sensor net- nal, 62(8):1132–1147, Au- works. ACM Transactions gust 2019. CODEN CM- on Sensor Networks, 8(2): PJA6. ISSN 0010-4620 13:1–13:??, March 2012. REFERENCES 208

CODEN ???? ISSN 1550- Cheng:2017:ISK 4859 (print), 1550-4867 + (electronic). [CLZ 17] Longwang Cheng, Wei Li, Li Zhou, Chunsheng Zhu, Cui:2016:KAS Jibo Wei, and Yantao Guo. Increasing secret key ca- [CLW16] Baojiang Cui, Zheli Liu, pacity of OFDM systems: and Lingyu Wang. Key- a geometric program ap- Aggregate Searchable En- proach. Concurrency and cryption (KASE) for group Computation: Practice and data sharing via cloud stor- Experience, 29(16), Au- age. IEEE Transactions gust 25, 2017. CODEN on Computers, 65(8):2374– CCPEBO. ISSN 1532-0626 2385, ???? 2016. CODEN (print), 1532-0634 (elec- ITCOB4. ISSN 0018-9340 tronic). (print), 1557-9956 (elec- tronic). Cremers:2011:OSV [CM11] Cas Cremers and Sjouke Chen:2014:CDP Mauw. Operational Se- [CLY14] Liqun Chen, Hoon Wei mantics and Verification of Lim, and Guomin Yang. Security Protocols. Infor- Cross-domain password- mation Security and Cryp- based authenticated key tography. Springer-Verlag, exchange revisited. ACM Berlin, Germany / Heidel- Transactions on Infor- berg, Germany / London, mation and System Se- UK / etc., 2011. ISBN curity, 16(4):15:1–15:??, 3-540-78635-X (print), 3- April 2014. CODEN 540-78636-8 (e-book), 3- ATISBQ. ISSN 1094-9224 642-43053-8. ISSN 1619- (print), 1557-7406 (elec- 7100 (print), 2197-845X tronic). (electronic). xiii + 172 + 59 pp. LCCN Cao:2018:CUP QA76.9.A25 C74 2012; QA76.9.D35. URL http:/ [CLY18] Kaidi Cao, Jing Liao, and /www.springerlink.com/ Lu Yuan. CariGANs: un- content/978-3-540-78636- paired photo-to-caricature 8. translation. ACM Trans- Cozzens:2013:MEE actions on Graphics,37 (6):244:1–244:??, Novem- [CM13] Margaret B. Cozzens and ber 2018. CODEN AT- Steven J. Miller. The GRDF. ISSN 0730-0301 mathematics of encryption: (print), 1557-7368 (elec- an elementary introduc- tronic). tion, volume 29 of Math- REFERENCES 209

ematical world. Ameri- Coles:2016:NAU can Mathematical Society, Providence, RI, USA, 2013. [CML16] Patrick J. Coles, Eric M. ISBN 0-8218-8321-6 (pa- Metodiev, and Norbert perback). xvii + 332 pp. L¨utkenhaus. Numeri- LCCN QA268 .C697 2013. cal approach for unstruc- tured quantum key dis- Cui:2014:SSA tribution. Nature Com- munications, 7:11712, May [CMA14] Hui Cui, Yi Mu, and 2016. CODEN NCAOBW. Man Ho Au. Signcryp- ISSN 2041-1723 (elec- tion secure against lin- tronic). URL http:// ear related-key attacks. www.nature.com/ncomms/ The Computer Journal, 2016/160520/ncomms11712/ 57(10):1472–1483, Octo- full/ncomms11712.html; ber 2014. CODEN CM- http://www.scientificcomputing. PJA6. ISSN 0010-4620 com/news/2016/05/computing- (print), 1460-2067 (elec- secret-unbreakable-key. tronic). URL http:// comjnl.oxfordjournals. Cao:2018:EEG org/content/57/10/1472. [CML+18] Jin Cao, Maode Ma, Hui Checkoway:2018:WDL Li, Yulong Fu, and Xue- feng Liu. EGHR: Efficient [CMG+18] Stephen Checkoway, Ja- group-based handover au- cob Maskiewicz, Christina thentication protocols for Garman, Joshua Fried, mMTC in 5G wireless net- Shaanan Cohney, Matthew works. Journal of Net- Green, Nadia Heninger, work and Computer Appli- Ralf-Philipp Weinmann, cations, 102(??):1–16, Jan- Eric Rescorla, and Hovav uary 15, 2018. CODEN Shacham. Where did I JNCAF3. ISSN 1084-8045 leave my keys?: lessons (print), 1095-8592 (elec- from the Juniper Dual tronic). URL http:// EC incident. Commu- www.sciencedirect.com/ nications of the Associa- science/article/pii/S1084804517303776. tion for Computing Ma- Chakraborty:2013:EHI chinery, 61(11):148–155, November 2018. CO- [CMLRHS13] Debrup Chakraborty, Cuauhte- DEN CACMA2. ISSN moc Mancillas-Lopez, Fran- 0001-0782 (print), 1557- cisco Rodriguez-Henriquez, 7317 (electronic). URL and Palash Sarkar. Effi- https://cacm.acm.org/ cient hardware implemen- magazines/2018/11/232227/ tations of BRW polyno- fulltext. mials and tweakable enci- REFERENCES 210

phering schemes. IEEE (9):2794–2806, ???? 2016. Transactions on Comput- CODEN ITCOB4. ISSN ers, 62(2):279–294, Febru- 0018-9340 (print), 1557- ary 2013. CODEN IT- 9956 (electronic). COB4. ISSN 0018-9340 Chatterjee:2017:IPB (print), 1557-9956 (elec- tronic). [CMRH17] Sanjit Chatterjee, Al- fred Menezes, and Fran- Chakraborty:2015:SSC cisco Rodr´ıguez-Henr´ıquez. [CMLS15] D. Chakraborty, C. Mancillas- On instantiating pairing- Lopez, and P. Sarkar. based protocols with ellip- STES: A tic curves of embedding de- based low cost scheme for gree one. IEEE Transac- securing stored data. IEEE tions on Computers, 66(6): Transactions on Comput- 1061–1070, June 2017. CO- ers, 64(9):2691–2707, ???? DEN ITCOB4. ISSN 0018- 2015. CODEN ITCOB4. 9340 (print), 1557-9956 ISSN 0018-9340 (print), (electronic). URL http: 1557-9956 (electronic). //ieeexplore.ieee.org/ document/7762073/. Chen:2017:VME Chen:2012:FAA [CMMS17] Jiageng Chen, Rashed [CN12] Yuanmi Chen and Phong Q. Mazumder, Atsuko Miyaji, Nguyen. Faster algorithms and Chunhua Su. Vari- for approximate common able message encryption divisors: Breaking fully- through blockcipher com- homomorphic-encryption pression function. Concur- challenges over the inte- rency and Computation: gers. Lecture Notes in Practice and Experience, Computer Science, 7237: 29(7):??, April 10, 2017. 502–519, 2012. CO- CODEN CCPEBO. ISSN DEN LNCSD9. ISSN 1532-0626 (print), 1532- 0302-9743 (print), 1611- 0634 (electronic). 3349 (electronic). URL Cao:2016:OMA http://link.springer. com/accesspage/chapter/ [CMO+16] Xiaolin Cao, Ciara Moore, 10.1007/978-3-642-29011- M´aire O’Neill, Elizabeth 4_29; http://link.springer. O’Sullivan, and Neil Han- com/chapter/10.1007/978- ley. Optimised multiplica- 3-642-29011-4_30/. tion architectures for accel- Chaudhry:2018:IRB erating fully homomorphic encryption. IEEE Trans- [CNF+18] Shehzad Ashraf Chaudhry, actions on Computers,65 Husnain Naqvi, Moham- REFERENCES 211

mad Sabzinejad Farash, Chin:2011:ACS Taeshik Shon, and Muham- mad Sher. An improved [CO11] Shiu-Kai Chin and Su- and robust biometrics- san Beth Older. Ac- based three factor authen- cess control, security, and tication scheme for multi- trust: a logical approach. server environments. The Chapman and Hall/CRC Journal of Supercomput- cryptography and network ing, 74(8):3504–3520, Au- security. Chapman and gust 2018. CODEN JO- Hall/CRC, Boca Raton, SUED. ISSN 0920-8542 FL, USA, 2011. ISBN 1- (print), 1573-0484 (elec- 58488-862-8. ???? pp. tronic). LCCN QA76.9.A25 C446 2011. CNRS:2014:NAS Conitzer:2010:AP

[CNR14] CNRS. New algorithm [Con10] Vincent Conitzer. Auc- shakes up cryptography. tion Protocols, chapter 16, Scientific Computing,May pages 1–19. Volume 2 15, 2014. URL http:// of Atallah and Blanton www.scientificcomputing. [AB10b], second edition, com/news/2014/05/new- 2010. ISBN 1-58488-820- algorithm-shakes-cryptography. 2. LCCN QA76.9.A43 See [BGJT14]. A433 2010. URL http: Coron:2012:PKC //www.crcnetbase.com/ doi/abs/10.1201/9781584888215- [CNT12] Jean-S´ebastien Coron, David c16. Naccache, and Mehdi Ti- Constantin:2012:RSN bouchi. Public key com- pression and modulus [Con12] Lucian Constantin. Re- switching for fully homo- searchers set new crypt- morphic encryption over analysis world record for the integers. Lecture pairing-based cryptogra- Notes in Computer Sci- phy. Network World, June ence, 7237:446–464, 2012. 19, 2012. ISSN 0887-7661 CODEN LNCSD9. ISSN (print), 1944-7655 (elec- 0302-9743 (print), 1611- tronic). URL http://www. 3349 (electronic). URL networkworld.com/news/ http://link.springer. 2012/061912-researchers- com/accesspage/chapter/ set-new-cryptanalysis- 10.1007/978-3-642-29011- world-260338.html. 4_26; http://link.springer. Constantin:2017:SHF com/chapter/10.1007/978- 3-642-29011-4_27/. [Con17] Lucian Constantin. The REFERENCES 212

SHA1 hash function is now Copeland:2010:CBG completely unsafe: Re- searchers have achieved the [Cop10a] B. Jack Copeland. Colos- first practical SHA-1 colli- sus: Breaking the German sion, generating two PDF ‘Tunny’ code at Bletch- files with the same signa- ley Park. An illustrated ture. ComputerWorld,?? history. Rutherford Jour- (??):??, February 23, 2017. nal, 3(??):??, ???? 2010. CODEN CMPWAB. ISSN CODEN ???? ISSN 0010-4841. URL https:// 1177-1380. URL http:// www.computerworld.com/ rutherfordjournal.org/ article/3173616/the-sha1- article030109.html. hash-function-is-now- Copeland:2010:CSB completely-unsafe.html. [Cop10b] B. Jack Copeland, edi- Connolly:2018:FE tor. Colossus: the secrets of Bletchley Park’s code- [Con18] Aisling Connolly. Freedom breaking computers. Ox- of encryption. IEEE Secu- ford University Press, Wal- rity & Privacy, 16(1):102– ton Street, Oxford OX2 103, January/February 6DP, UK, 2010. ISBN 0- 2018. CODEN ???? ISSN 19-284055-X (hardcover), 1540-7993 (print), 1558- 0-19-957814-1 (paperback). 4046 (electronic). URL xvi + 462 + 16 pp. https://www.computer. LCCN D810.C88 C66 org/csdl/mags/sp/2018/ 2010. URL http://www. 01/msp2018010102.html. colossus-computer.com/ . Copeland:2006:CSB Chung:2014:RRS [Cop06] B. Jack Copeland, edi- tor. Colossus: the secrets [COP+14] Kai-Min Chung, Rafail of Bletchley Park’s code- Ostrovsky, Rafael Pass, breaking computers. Ox- Muthuramakrishnan Venki- ford University Press, Wal- tasubramaniam, and Ivan ton Street, Oxford OX2 Visconti. 4-round resettably- 6DP, UK, 2006. ISBN 0- sound zero knowledge. 19-284055-X (hardcover), Lecture Notes in Com- 0-19-957814-1 (paperback). puter Science, 8349:192– xvi + 462 + 16 pp. 216, 2014. CODEN LCCN D810.C88 C66 LNCSD9. ISSN 0302-9743 2006. URL http://www. (print), 1611-3349 (elec- colossus-computer.com/ tronic). URL http:// . link.springer.com/chapter/ REFERENCES 213

10.1007/978-3-642-54242- Coutinho:2012:RPT 8_9/. [Cou12b] S. C. Coutinho. Re- Cordova:2014:EBS view of Primality Testing and Integer Factorization [Cor14a] Tim Cordova. Encrypted in Public Key Cryptogra- backup solution: Home phy by Song Y. Yan. ACM Paranoia Edition. Linux SIGACT News, 43(2):33– Journal, 2014(237):3:1– 35, June 2012. CODEN 3:??, January 2014. CO- SIGNDM. ISSN 0163-5700 DEN LIJOFX. ISSN 1075- (print), 1943-5827 (elec- 3583 (print), 1938-3827 tronic). (electronic). Claessen:2013:SPN Corthesy:2014:SSD [CP13] Koen Claessen and Micha l H. [Cor14b] S´ebastien Corth´esy. Smart- Pa lka. Splittable pseu- phones set out to decipher dorandom number gener- cryptographic system. Sci- ators using cryptographic entific Computing, August hashing. ACM SIGPLAN 25, 2014. URL http:// Notices, 48(12):47–58, De- www.scientificcomputing. cember 2013. CODEN com/news/2014/08/smartphones- SINODQ. ISSN 0362- set-out-decipher-cryptographic- 1340 (print), 1523-2867 system. The article de- (print), 1558-1160 (elec- scribes use of thousands tronic). Haskell ’14 confer- of mobile phones to at- ence proceedings. tempt a parallel brute- force attack on elliptic- Canard:2018:NTC curve and RSA algorithms, in a research project by Ra- [CPPT18] S. Canard, D. H. Phan, masany Gowthami and Ar- D. Pointcheval, and V. C. jen Lenstra at the LACAL Trinh. A new technique laboratory at EPFL, Lau- for compacting ciphertext sanne, Switzerland. in multi-channel broadcast encryption and attribute- Courtland:2012:VCG based encryption. The- oretical Computer Sci- [Cou12a] Rachel Courtland. Vir- ence, 723(??):51–72, May tual currency gets real. 2, 2018. CODEN TC- IEEE Spectrum, 49(6):52– SCDI. ISSN 0304-3975 53, June 2012. CODEN (print), 1879-2294 (elec- IEESAM. ISSN 0018-9235 tronic). URL http:// (print), 1939-9340 (elec- www.sciencedirect.com/ tronic). science/article/pii/S0304397518301427. REFERENCES 214

Chung:2016:NBB classical cipher text us- ing Markov chain Monte [CPS16] Kai-Min Chung, Rafael Carlo. Statistics and Pass, and Karn Seth. Non- Computing, 22(2):397– black-box simulation from 413, March 2012. CO- one-way functions and ap- DEN STACE3. ISSN plications to resettable se- 0960-3174 (print), 1573- curity. SIAM Journal on 1375 (electronic). URL Computing, 45(2):415–458, http://link.springer. ???? 2016. CODEN SMJ- com/article/10.1007/s11222- CAT. ISSN 0097-5397 011-9232-5. (print), 1095-7111 (elec- tronic). Crampton:2011:PEC Chen:2018:RLF [Cra11] Jason Crampton. Practical and efficient cryptographic [CQX18] Yu Chen, Baodong Qin, enforcement of interval- and Haiyang Xue. Regular based access control poli- lossy functions and their cies. ACM Transactions applications in leakage- on Information and Sys- resilient cryptography. The- tem Security, 14(1):14:1– oretical Computer Sci- 14:??, May 2011. CODEN ence, 739(??):13–38, Au- ATISBQ. ISSN 1094-9224 gust 29, 2018. CODEN (print), 1557-7406 (elec- TCSCDI. ISSN 0304-3975 tronic). (print), 1879-2294 (elec- tronic). URL http:// Cramer:2012:TCT www.sciencedirect.com/ science/article/pii/S0304397518302937[Cra12]. Ronald Cramer, editor. Chevalier:2010:CSC Theory of Cryptography: 9th Theory of Cryptog- [CR10] Yannick Chevalier and raphy Conference, TCC Micha¨el Rusinowitch. Com- 2012, Taormina, Sicily, piling and securing cryp- Italy, March 19–21. Pro- tographic protocols. In- ceedings, volume 7194 of formation Processing Let- Lecture Notes in Computer ters, 110(3):116–122, Jan- Science. Springer-Verlag, uary 1, 2010. CODEN IF- Berlin, Germany / Heidel- PLAT. ISSN 0020-0190 berg, Germany / London, (print), 1872-6119 (elec- UK / etc., 2012. CO- tronic). DEN LNCSD9. ISBN 3- 642-28913-4. ISSN 0302- Chen:2012:DCC 9743 (print), 1611-3349 [CR12] Jian Chen and Jeffrey S. (electronic). URL http:/ Rosenthal. Decrypting /www.springerlink.com/ REFERENCES 215

content/978-3-642-28913- A framework for con- 2. tinuous, transparent mo- bile device authentication. Craver:2014:UCC Computers & Security, [Cra14] Scott Craver. The under- 39 (part B)(??):127–136, handed C contest. Web November 2013. CODEN site, 2014. URL http:// CPSEDU. ISSN 0167-4048 underhanded.xcott.com/ (print), 1872-6208 (elec- . tronic). URL https:// www.sciencedirect.com/ Clear:2012:CPA science/article/pii/S0167404813000886. [CRE+12] Michael Clear, Karl Reid, Chauhan:2018:PCD Desmond Ennis, Arthur

Hughes, and Hitesh Tewari. + Collaboration-preserving [CRS 18] Jagmohan Chauhan, Jathushan Rajasegaran, Suranga Senevi- for operational transfor- ratne, Archan Misra, mation systems. Lecture Aruna Seneviratne, and Notes in Computer Sci- Youngki Lee. Perfor- ence, 7483:204–223, 2012. mance characterization CODEN LNCSD9. ISSN of deep learning models 0302-9743 (print), 1611- for breathing-based au- 3349 (electronic). URL thentication on resource- http://link.springer. constrained devices. Pro- com/chapter/10.1007/978- ceedings of the ACM on In- 3-642-33383-5_13/. teractive, Mobile, Wearable and Ubiquitous Technolo- Crichlow:2016:RSE gies (IMWUT), 2(4):1–24, December 2018. CODEN [Cri16] Ramon Crichlow. Rock- ???? ISSN 2474-9567 (elec- solid encrypted video stream- tronic). URL https:// ing using SSH tunnels dl.acm.org/doi/abs/10. and the BeagleBone Black. 1145/3287036. Linux Journal, 2016(264): 1:1–1:??, April 2016. CO- Culnane:2015:VVV DEN LIJOFX. ISSN 1075- 3583 (print), 1938-3827 [CRST15] Chris Culnane, Peter Y. A. (electronic). URL http:// Ryan, Steve Schneider, and dl.acm.org/ft_gateway. Vanessa Teague. vVote: cfm?id=2933362. a verifiable voting system. Crawford:2013:FCT ACM Transactions on In- formation and System Se- [CRS13] Heather Crawford, Karen curity, 18(1):3:1–3:??, June Renaud, and Tim Storer. 2015. CODEN ATISBQ. REFERENCES 216

ISSN 1094-9224 (print), Remote procedure call au- 1557-7406 (electronic). thorization in wireless sen- sor networks. ACM Trans- Caranay:2010:ESP actions on Information and [CS10] Perlas C. Caranay and Re- System Security, 17(2):5:1– nate Scheidler. An effi- 5:??, November 2014. CO- cient seventh power residue DEN ATISBQ. ISSN symbol algorithm. Inter- 1094-9224 (print), 1557- national Journal of Num- 7406 (electronic). ber Theory (IJNT),6 Chattaraj:2018:NTS (8):1831–1853, December 2010. ISSN 1793-0421 [CSD18] Durbadal Chattaraj, Mon- (print), 1793-7310 (elec- alisa Sarma, and Ashok Ku- tronic). URL https: mar Das. A new two- //www.worldscientific. server authentication and com/doi/10.1142/S1793042110003770. key agreement protocol for Chhabra:2011:NSN accessing secure cloud ser- vices. Computer Networks [CS11] Siddhartha Chhabra and (Amsterdam, Netherlands: Yan Solihin. i-NVMM: a 1999), 131(??):144–164, secure non-volatile main February 11, 2018. CO- memory system with incre- DEN ???? ISSN 1389-1286 mental encryption. ACM (print), 1872-7069 (elec- SIGARCH Computer Ar- tronic). URL https:// chitecture News, 39(3): www.sciencedirect.com/ 177–188, June 2011. CO- science/article/pii/S1389128617304255. DEN CANED2. ISSN 0163-5964 (print), 1943- Chauhan:2018:BBA 5851 (electronic). [CSH+18] Jagmohan Chauhan, Suranga Clark:2012:RLA Seneviratne, Yining Hu, Archan Misra, Aruna [CS12] Liat Clark and Ian Stead- Seneviratne, and Youngki man. The rich legacy of Lee. Breathing-based au- Alan Turing. Wired UK thentication on resource- Web site., June 18, 2012. constrained IoT devices us- URL http://www.wired. ing recurrent neural net- com/wiredscience/2012/ works. Computer, 51(5): 06/alan-turing-legacy/ 60–67, May 2018. CO- . DEN CPTRB4. ISSN Chapin:2014:SRP 0018-9162 (print), 1558- 0814 (electronic). URL [CS14] Peter Chapin and Chris- https://www.computer. tian Skalka. SpartanRPC: org/csdl/mags/co/2018/ REFERENCES 217

05/mco2018050060-abs. Francesco Palmieri. Se- html. curing information ex- Chadwick:2014:AFI change in VANETs by us- ing pairing-based cryptog- [CSL+14] David W. Chadwick, Kristy raphy. International Jour- Siu, Craig Lee, Yann Fouil- nal of Foundations of Com- lat, and Damien Ger- puter Science (IJFCS), monville. Adding fed- 28(6):781–??, September erated identity manage- 2017. CODEN IFCSEN. ment to OpenStack. Jour- ISSN 0129-0541. nal of Grid Computing, Ciegis:2016:ADP 12(1):3–27, March 2014. CODEN ???? ISSN [CSTR16] Raimondas Ciegis, Vadi- 1570-7873 (print), 1572- mas Starikovicius, Natal- 9184 (electronic). URL ija Tumanova, and Minvy- http://link.springer. das Ragulskis. Applica- com/article/10.1007/s10723- tion of distributed paral- 013-9283-2; http:// lel computing for dynamic link.springer.com/content/ visual cryptography. The pdf/10.1007/s10723-013- Journal of Supercomputing, 9283-2.pdf. 72(11):4204–4220, Novem- ber 2016. CODEN JO- Chen:2013:RWM SUED. ISSN 0920-8542 (print), 1573-0484 (elec- + [CSS 13] Xianyi Chen, Xingming tronic). Sun, Huiyu Sun, Zhili Zhou, and Jianjun Zhang. Chong:2015:SID Reversible watermarking [CSV15] Stephen Chong, Christian method based on asymmetric- Skalka, and Jeffrey A. histogram shifting of pre- Vaughan. Self-identifying diction errors. The Journal data for fair use. Jour- of Systems and Software, nal of Data and Informa- 86(10):2620–2626, Octo- tion Quality (JDIQ), 5(3): ber 2013. CODEN JS- 11:1–11:??, February 2015. SODM. ISSN 0164-1212 CODEN ???? ISSN 1936- (print), 1873-1228 (elec- 1955. tronic). URL http:// www.sciencedirect.com/ Chow:2012:EPV science/article/pii/S016412121300126X[CSW12]. Yang-Wai Chow, Willy Chen:2017:SIE Susilo, and Duncan S. Wong. Enhancing the per- [CST+17] Chin-Ling Chen, Jung- ceived visual quality of a pil Shin, Yu-Ting Tsai, size invariant visual cryp- Aniello Castiglione, and tography scheme. Lec- REFERENCES 218

ture Notes in Computer Software, 84(3):428–434, Science, 7618:10–21, 2012. March 2011. CODEN JS- CODEN LNCSD9. ISSN SODM. ISSN 0164-1212. 0302-9743 (print), 1611- Chen:2011:TVS 3349 (electronic). URL http://link.springer. [CT11b] Tzung-Her Chen and Kai- com/chapter/10.1007/978- Hsiang Tsao. Threshold vi- 3-642-34129-8_2/. sual secret sharing by ran- dom grids. The Journal of Chen:2018:SIA Systems and Software,84 [CSYY18] Jiageng Chen, Chunhua (7):1197–1208, July 2011. Su, Kuo-Hui Yeh, and CODEN JSSODM. ISSN Moti Yung. Special is- 0164-1212. sue on advanced persis- Canard:2018:CPK tent threat. Future Gen- eration Computer Sys- [CT18] S´ebastien Canard and tems, 79 (part 1)(??):243– Viet Cuong Trinh. Cer- 246, 2018. CODEN FG- tificateless public key cryp- SEVI. ISSN 0167-739X tography in the standard (print), 1872-7115 (elec- model. Fundamenta Infor- tronic). URL https:// maticae, 161(3):219–248, www.sciencedirect.com/ ???? 2018. CODEN FU- science/article/pii/S0167739X17324913. MAAJ. ISSN 0169-2968 (print), 1875-8681 (elec- Chen:2011:IBT tronic). + [CSZ 11] Xiaofeng Chen, Willy Calzavara:2015:SLA Susilo, Fangguo Zhang, Haibo Tian, and Jin Li. [CTC+15] Stefano Calzavara, Gabriele Identity-based trapdoor Tolomei, Andrea Casini, mercurial commitments Michele Bugliesi, and Sal- and applications. Theoret- vatore Orlando. A super- ical Computer Science, 412 vised learning approach to (39):5498–5512, September protect client authentica- 9, 2011. CODEN TCSCDI. tion on the Web. ACM ISSN 0304-3975 (print), Transactions on the Web 1879-2294 (electronic). (TWEB), 9(3):15:1–15:??, June 2015. CODEN ???? Chen:2011:ARI ISSN 1559-1131 (print), [CT11a] Chien-Chang Chen and 1559-114X (electronic). Yao-Hong Tsai. Adap- Chin:2013:SMB tive reversible image wa- termarking scheme. The [CTHP13] Ji-Jian Chin, Syh-Yuan Journal of Systems and Tan, Swee-Huay Heng, and REFERENCES 219

Raphael C.-W. Phan. On com/article/10.1007/s11227- the security of a modified 013-0962-3. Beth identity-based iden- Crenne:2013:CMS tification scheme. Infor- mation Processing Letters, [CVG+13] J´er´emie Crenne, Romain 113(14–16):580–583, July/ Vaslin, Guy Gogniat, Jean- August 2013. CODEN IF- Philippe Diguet, Russell PLAT. ISSN 0020-0190 Tessier, and Deepak Un- (print), 1872-6119 (elec- nikrishnan. Configurable tronic). URL http:// memory security in em- www.sciencedirect.com/ bedded systems. ACM science/article/pii/S0020019013001324. Transactions on Embedded Computing Systems, 12(3): Chang:2012:GBP 71:1–71:??, March 2013. CODEN ???? ISSN [CTL12] Ting-Yi Chang, Cheng- 1539-9087 (print), 1558- Jung Tsai, and Jyun-Hao 3465 (electronic). Lin. A graphical-based password keystroke dy- Calmon:2014:ITM namic authentication sys- [CVM14] Flavio P. Calmon, Mayank tem for touch screen hand- Varia, and Muriel M´edard. held mobile devices. The On information-theoretic Journal of Systems and metrics for symmetric- Software, 85(5):1157–1165, key encryption and pri- May 2012. CODEN JS- vacy. In ????, editor, Pro- SODM. ISSN 0164-1212 ceedings of the 52nd An- (print), 1873-1228 (elec- nual Allerton Conference tronic). URL http:// on Communication, Con- www.sciencedirect.com/ trol, and Computing, 2014, . science/article/pii/S0164121211003256 page ?? ????, ????, 2014. Chou:2013:TIB URL http://www.mit. edu/~flavio/Documents/ [CTL13] Chih-Ho Chou, Kuo-Yu Calmon_Allerton13.pdf. Tsai, and Chung-Fu Lu. Choi:2012:LTF Two ID-based authenti- cated schemes with key [CW12a] Seung Geol Choi and agreement for mobile en- Hoeteck Wee. Lossy trap- vironments. The Journal door functions from ho- of Supercomputing, 66(2): momorphic reproducible 973–988, November 2013. encryption. Informa- CODEN JOSUED. ISSN tion Processing Letters, 0920-8542 (print), 1573- 112(20):794–798, October 0484 (electronic). URL 31, 2012. CODEN IF- http://link.springer. PLAT. ISSN 0020-0190 REFERENCES 220

(print), 1872-6119 (elec- tronic). URL http:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0304397514004277. science/article/pii/S0020019012002001. Cao:2014:PPM Chung:2012:CBI [CWL+14] Ning Cao, Cong Wang, [CW12b] Yu-Fang Chung and Zhen- Ming Li, Kui Ren, and Yu Wu. Casting ballots Wenjing Lou. Privacy- over Internet connection preserving multi-keyword against bribery and coer- ranked search over en- cion. The Computer Jour- crypted cloud data. IEEE nal, 55(10):1169–1179, Oc- Transactions on Paral- tober 2012. CODEN CM- lel and Distributed Sys- PJA6. ISSN 0010-4620 tems, 25(1):222–233, Jan- (print), 1460-2067 (elec- uary 2014. CODEN ITD- tronic). URL http:// SEO. ISSN 1045-9219 comjnl.oxfordjournals. (print), 1558-2183 (elec- org/content/55/10/1169. tronic). full.pdf+html. Chen:2016:EPN Chen:2014:SBB [CWL16] Yu-Jia Chen, Li-Chun [CW14a] Chien-Chang Chen and Wang, and Chen-Hung Wei-Jie Wu. A secure Liao. Eavesdropping pre- Boolean-based multi-secret vention for network cod- image sharing scheme. The ing encrypted cloud stor- Journal of Systems and age systems. IEEE Trans- Software, 92(??):107–114, actions on Parallel and June 2014. CODEN JS- Distributed Systems, 27(8): SODM. ISSN 0164-1212 2261–2273, August 2016. (print), 1873-1228 (elec- CODEN ITDSEO. ISSN tronic). URL http:// 1045-9219 (print), 1558- www.sciencedirect.com/ 2183 (electronic). URL science/article/pii/S0164121214000181. http://csdl.computer. org/csdl/trans/td/2016/ Chen:2014:DSE 08/07289458-abs.html. [CW14b] Jie Chen and Hoeteck Chen:2012:IDC Wee. Doubly spatial encryption from DBDH. [CWP12] Jiazhe Chen, Meiqin Wang, Theoretical Computer Sci- and Bart Preneel. Im- ence, 543(??):79–89, July possible differential crypt- 10, 2014. CODEN TC- analysis of the lightweight SCDI. ISSN 0304-3975 block ciphers TEA, XTEA (print), 1879-2294 (elec- and HIGHT. Lecture REFERENCES 221

Notes in Computer Sci- gle attack and its appli- ence, 7374:117–137, 2012. cation to GIFT, Khudra, CODEN LNCSD9. ISSN MIBS. The Computer 0302-9743 (print), 1611- Journal, 62(12):1805–1821, 3349 (electronic). URL December 2019. CODEN http://link.springer. CMPJA6. ISSN 0010-4620 com/chapter/10.1007/978- (print), 1460-2067 (elec- 3-642-31410-0_8/. tronic). URL http:// academic.oup.com/comjnl/ Chen:2012:CKS article/62/12/1805/5587703. [CWWL12] Zhenhua Chen, Chuny- ing Wu, Daoshun Wang, Cao:2013:SIPa and Shundong Li. Con- junctive keywords search- [CWZL13] Jian Cao, Jie Wang, able encryption with effi- Haiyan Zhao, and Minglu cient pairing, constant ci- Li. Special issue papers: phertext and short trap- An event view specifica- door. Lecture Notes in tion approach for Support- Computer Science, 7299: ing Service process collab- 176–189, 2012. CO- oration. Concurrency and DEN LNCSD9. ISSN Computation: Practice and 0302-9743 (print), 1611- Experience, 25(13):1943– 3349 (electronic). URL 1966, September 10, 2013. http://link.springer. CODEN CCPEBO. ISSN com/chapter/10.1007/978- 1532-0626 (print), 1532- 3-642-30428-6_15/. 0634 (electronic). Chen:2016:WPM Chen:2019:WBS [CWXW16] Zhide Chen, Meng Wang, Li Xu, and Wei Wu. Worm [CXWT19] Yu-Chi Chen, Xin Xie, propagation model in mo- Peter Shaojui Wang, and bile network. Concurrency Raylin Tso. Witness-based and Computation: Prac- searchable encryption with tice and Experience,28 optimal overhead for cloud- (4):1134–1144, March 25, edge computing. Fu- 2016. CODEN CCPEBO. ture Generation Computer ISSN 1532-0626 (print), Systems, 100(??):715–723, 1532-0634 (electronic). November 2019. CODEN Chen:2019:MBR FGSEVI. ISSN 0167-739X (print), 1872-7115 (elec- [CWZ19] Lele Chen, Gaoli Wang, tronic). URL http:// and GuoYan Zhang. MILP- www.sciencedirect.com/ based related-key rectan- science/article/pii/S0167739X19301086. REFERENCES 222

Cao:2019:PPS Cheng:2015:OMU

[CXX+19] Yang Cao, Yonghui Xiao, [CZ15b] Rong Cheng and Fang- Li Xiong, Liquan Bai, guo Zhang. Obfuscation and Masatoshi Yoshikawa. for multi-use re-encryption PriSTE: protecting spa- and its application in cloud tiotemporal event privacy computing. Concurrency in continuous location- and Computation: Prac- based services. Proceedings tice and Experience, 27(8): of the VLDB Endowment, 2170–2190, June 10, 2015. 12(12):1866–1869, August CODEN CCPEBO. ISSN 2019. CODEN ???? ISSN 1532-0626 (print), 1532- 2150-8097. 0634 (electronic). Chen:2014:MLC Cai:2019:UMD [CZ19] Hongyun Cai and Fuzhi [CZ14] Long Chen and Zhao Zhang. An unsuper- Zhang. MemGuard: a vised method for de- low cost and energy ef- tecting shilling attacks ficient design to support in recommender systems and enhance memory sys- by mining item relation- tem reliability. ACM ship and identifying tar- SIGARCH Computer Ar- get items. The Com- chitecture News, 42(3):49– puter Journal, 62(4):579– 60, June 2014. CODEN 597, April 2019. CODEN CANED2. ISSN 0163-5964 CMPJA6. ISSN 0010-4620 (print), 1943-5851 (elec- (print), 1460-2067 (elec- tronic). tronic). URL http:// Chen:2015:TCP academic.oup.com/comjnl/ article/62/4/579/5255729. [CZ15a] Shangdi Chen and Xiaolian Chen:2018:ERS Zhang. Three construc- tions of perfect authen- [CZCD18] Siyuan Chen, Peng Zeng, tication codes from pro- Kim-Kwang Raymond Choo, jective geometry over fi- and Xiaolei Dong. Efficient nite fields. Applied Math- ring signature and group ematics and Computation, signature schemes based on 253(??):308–317, Febru- q-ary identification proto- ary 15, 2015. CODEN cols. The Computer Jour- AMHCBQ. ISSN 0096- nal, 61(4):545–560, April 3003 (print), 1873-5649 1, 2018. CODEN CM- (electronic). URL http:// PJA6. ISSN 0010-4620 www.sciencedirect.com/ (print), 1460-2067 (elec- science/article/pii/S0096300314017494. tronic). URL http:// REFERENCES 223

academic.oup.com/comjnl/ 0302-9743 (print), 1611- article/61/4/545/4656252. 3349 (electronic). URL http://link.springer. Chen:2012:FSD com/chapter/10.1007/978- [CZF12] Cheng Chen, Zhenfeng 3-642-31284-7_10/. Zhang, and Dengguo Feng. Chen:2014:CSI Fully secure doubly-spatial encryption under simple [CZLC14] Yu Chen, Zongyang Zhang, assumptions. Lecture Notes Dongdai Lin, and Zhenfu in Computer Science, 7496: Cao. CCA-secure IB– 253–263, 2012. CO- KEM from identity-based DEN LNCSD9. ISSN extractable hash proof sys- 0302-9743 (print), 1611- tem. The Computer Jour- 3349 (electronic). URL nal, 57(10):1537–1556, Oc- http://link.springer. tober 2014. CODEN CM- com/chapter/10.1007/978- PJA6. ISSN 0010-4620 3-642-33272-2_16/. (print), 1460-2067 (elec- tronic). URL http:// Chen:2012:AIB comjnl.oxfordjournals. org/content/57/10/1537. [CZLC12a] Yu Chen, Zongyang Zhang, Dongdai Lin, and Zhenfu Dharwadkar:2010:SSG Cao. Anonymous identity- [DA10] Nagaraj V. Dharwadkar based hash proof sys- and B. B. Amberker. tem and its applica- Steganographic scheme for tions. Lecture Notes in gray-level image using pixel Computer Science, 7496: neighborhood and LSB 143–160, 2012. CO- substitution. Interna- DEN LNCSD9. ISSN tional Journal of Image 0302-9743 (print), 1611- and Graphics (IJIG),10 3349 (electronic). URL (4):589–607, October 2010. http://link.springer. CODEN ???? ISSN 0219- com/chapter/10.1007/978- 4678. 3-642-33272-2_10/. Djebbar:2012:ASB Chen:2012:IBE [DA12] Fatiha Djebbar and Begh- [CZLC12b] Yu Chen, Zongyang Zhang, dad Ayad. Audio steganal- Dongdai Lin, and Zhenfu ysis based on lossless data- Cao. Identity-based ex- compression techniques. tractable hash proofs and Lecture Notes in Computer their applications. Lecture Science, 7618:1–9, 2012. Notes in Computer Sci- CODEN LNCSD9. ISSN ence, 7341:153–170, 2012. 0302-9743 (print), 1611- CODEN LNCSD9. ISSN 3349 (electronic). URL REFERENCES 224

http://link.springer. ing cryptography and PKI. com/chapter/10.1007/978- John Wiley and Sons, Inc., 3-642-34129-8_1/. New York, NY, USA, 2011. ISBN 0-470-92041-6 (pa- Darivandpour:2018:ESP perback). ???? pp. LCCN [DA18] Javad Darivandpour and ???? Mikhail J. Atallah. Effi- Demirhan:2016:CRP cient and secure pattern matching with wildcards [DB16] Haydar Demirhan and Ni- using lightweight cryp- han Bitirim. CryptRndTest: tography. Computers & an R package for test- Security, 77(??):666–674, ing the cryptographic ran- August 2018. CODEN domness. The R Jour- CPSEDU. ISSN 0167-4048 nal, 8(1):233–247, August (print), 1872-6208 (elec- 2016. ISSN 2073-4859. tronic). URL https:// URL https://journal. www.sciencedirect.com/ r-project.org/archive/ science/article/pii/S016740481830021X. 2016/RJ-2016-016. Danezis:2012:FCDb Diong:2012:DAU [Dan12] George Danezis, editor. Fi- [DBPS12] Mouhamadou L. Diong, nancial Cryptography and Patrick Bas, Chlo´e Pelle, Data Security: 15th Inter- and Wadih Sawaya. Doc- national Conference, FC ument authentication us- 2011, Gros Islet, St. Lucia, ing 2D codes: Maximizing February 28 — March 4, the decoding performance 2011, Revised Selected Pa- using statistical inference. pers, volume 7035 of Lec- Lecture Notes in Computer ture Notes in Computer Science, 7394:39–54, 2012. Science. Springer-Verlag, CODEN LNCSD9. ISSN Berlin, Germany / Heidel- 0302-9743 (print), 1611- berg, Germany / London, 3349 (electronic). URL UK / etc., 2012. CO- http://link.springer. DEN LNCSD9. ISBN 3- com/chapter/10.1007/978- 642-27575-3. ISSN 0302- 3-642-32805-3_4/. 9743 (print), 1611-3349 (electronic). URL http:/ Djath:2019:HAR /www.springerlink.com/ content/978-3-642-27575- [DBT19] Libey Djath, Karim Bigou, 3. and Arnaud Tisserand. Hi- Davies:2011:IST erarchical approach in RNS base extension for asym- [Dav11] Joshua Dennis Davies. Im- metric cryptography. In plementing SSL/TLS us- Takagi et al. [TBL19], REFERENCES 225

pages 46–53. ISBN 1- (print), 1557-6051 (elec- 72813-366-1. ISSN 1063- tronic). 6889. Dou:2018:OHR Cordeiro:2016:MPG

[DCA18] Yi Dou, Henry C B Chan, [dCCSB+16] Weverton Luis da Costa Cordeiro, and Man Ho Au. Order- Fl´avio Roberto Santos, hiding range query over Marinho Pilla Barcelos, encrypted data without Luciano Paschoal Gas- search pattern leakage. pary, Hanna Kavalionak, The Computer Journal,61 Alessio Guerrieri, and Al- (12):1806–1824, December berto Montresor. Making 1, 2018. CODEN CM- puzzles green and useful PJA6. ISSN 0010-4620 for adaptive identity man- (print), 1460-2067 (elec- agement in large-scale dis- tronic). URL http:// tributed systems. Com- academic.oup.com/comjnl/ puter Networks (Amster- article/61/12/1806/5065094. dam, Netherlands: 1999), Dou:2019:DTE 95(??):97–114, February 11, 2016. CODEN [DCA19] Y. Dou, H. C. B. Chan, and ???? ISSN 1389-1286 M. H. Au. A distributed (print), 1872-7069 (elec- trust evaluation protocol tronic). URL http:// with privacy protection for www.sciencedirect.com/ intercloud. IEEE Trans- science/article/pii/S1389128615004818. actions on Parallel and Distributed Systems, 30(6): Cordeiro:2012:IMB 1208–1221, June 2019. CO- DEN ITDSEO. ISSN [dCCSM+12] Weverton Luis da Costa Cordeiro, 1045-9219 (print), 1558- Fl´avio Roberto Santos, 2183 (electronic). Gustavo Huff Mauch, Mar- Dacosta:2012:OTC inho Pilla Barcelos, and Luciano Paschoal Gas- [DCAT12] Italo Dacosta, Saurabh pary. Identity manage- Chakradeo, Mustaque Ahamad, ment based on adaptive and Patrick Traynor. One- puzzles to protect P2P time cookies: Preventing systems from Sybil at- session hijacking attacks tacks. Computer Networks with stateless authentica- (Amsterdam, Netherlands: tion tokens. ACM Trans- 1999), 56(11):2569–2589, actions on Internet Tech- July 31, 2012. CODEN nology (TOIT), 12(1):1:1– ???? ISSN 1389-1286 1:??, June 2012. CODEN (print), 1872-7069 (elec- ???? ISSN 1533-5399 tronic). URL http:// REFERENCES 226

www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S1389128612001417. science/article/pii/S0164121214000995. Ding:2018:NPH Didier:2019:RAP

[DCM18] Kaimeng Ding, Shiping [DDE+19] Laurent-Stephane Didier, Chen, and Fan Meng. A Fangan-Yssouf Dosso, Na- novel perceptual hash al- dia El Mrabet, Jeremy gorithm for multispectral Marrez, and Pascal V´eron. image authentication. Al- Randomization of arith- gorithms (Basel), 11(1), metic over polynomial January 2018. CODEN modular number system. ALGOCH. ISSN 1999- In Takagi et al. [TBL19], 4893 (electronic). URL pages 199–206. ISBN 1- https://www.mdpi.com/ 72813-366-1. ISSN 1063- 1999-4893/11/1/6. 6889. DePrisco:2013:CVC DaRolt:2013:NDS

[DD13] Roberto De Prisco and Al- [DDFR13] Jean Da Rolt, Giorgio Di fredo De Santis. Color vi- Natale, Marie-Lise Flottes, sual cryptography schemes and Bruno Rouzeyre. A for black and white secret novel differential scan at- images. Theoretical Com- tack on advanced DFT puter Science, 510(??):62– structures. ACM Transac- 86, October 28, 2013. CO- tions on Design Automa- DEN TCSCDI. ISSN 0304- tion of Electronic Systems, 3975 (print), 1879-2294 18(4):58:1–58:??, October (electronic). URL http:// 2013. CODEN ATASFO. www.sciencedirect.com/ ISSN 1084-4309 (print), science/article/pii/S0304397513006750. 1557-7309 (electronic). DArco:2014:MIC Dreier:2015:BFP

[DDD14] P. D’Arco, R. De Prisco, [DDL15] Jannik Dreier, Jean-Guillaume and A. De Santis. Measure- Dumas, and Pascal Lafour- independent characteri- cade. Brandt’s fully private zation of contrast opti- auction protocol revisited. mal visual cryptography Journal of Computer Se- schemes. The Journal curity, 23(5):587–610, ???? of Systems and Software, 2015. CODEN JCSIET. 95(??):89–99, September ISSN 0926-227X (print), 2014. CODEN JS- 1875-8924 (electronic). SODM. ISSN 0164-1212 Datta:2017:SFH (print), 1873-1228 (elec- tronic). URL http:// [DDM17] Pratish Datta, Ratna REFERENCES 227

Dutta, and Sourav Mukhopad- 642-29888-5. ISSN 0302- hyay. Strongly full-hiding 9743 (print), 1611-3349 inner product encryption. (electronic). URL http:/ Theoretical Computer Sci- /www.springerlink.com/ ence, 667(??):16–50, March content/978-3-642-29888- 8, 2017. CODEN TC- 2. SCDI. ISSN 0304-3975 Dai:2019:SAM (print), 1879-2294 (elec- tronic). URL http:// [DDY+19] Hua Dai, Xuelong Dai, www.sciencedirect.com/ Xun Yi, Geng Yang, and science/article/pii/S0304397516307526. Haiping Huang. Semantic- aware multi-keyword ranked Castro:2016:FVB search scheme over en- [DDR+16] Stephan De Castro, Jean- crypted cloud data. Jour- Max Dutertre, Bruno nal of Network and Com- Rouzeyre, Giorgio Di puter Applications, 147 Natale, and Marie-Lise (??):??, December 1, 2019. Flottes. Frontside versus CODEN JNCAF3. ISSN backside laser injection: a 1084-8045 (print), 1095- comparative study. ACM 8592 (electronic). URL Journal on Emerging Tech- http://www.sciencedirect. nologies in Computing Sys- com/science/article/pii/ tems (JETC), 13(1):7:1– S1084804519303029. 7:??, December 2016. CO- DeOliveiraNunes:2019:SSC DEN ???? ISSN 1550- 4832. [DEL19] Ivan De Oliveira Nunes, Karim Eldefrawy, and Danezis:2012:FCDa Tancr`ede Lepoint. SNUSE: [DDS12] George Danezis, Sven Diet- a secure computation ap- rich, and Kazue Sako, ed- proach for large-scale user itors. Financial Cryptog- re-enrollment in biomet- raphy and Data Security: ric authentication systems. FC 2011 Workshops, RL- Future Generation Com- CPS and WECSR 2011, puter Systems, 98(??):259– Rodney Bay, St. Lucia, 273, September 2019. CO- February 28 — March 4, DEN FGSEVI. ISSN 0167- 2011, Revised Selected Pa- 739X (print), 1872-7115 pers, volume 7126 of Lec- (electronic). URL http:// ture Notes in Computer www.sciencedirect.com/ Science. Springer-Verlag, science/article/pii/S0167739X1833098X. Berlin, Germany / Heidel- derhans:2010:USC berg, Germany / London, UK / etc., 2012. CO- [der10] der.hans. Use SSH to cross DEN LNCSD9. ISBN 3- a suspect host securely. REFERENCES 228

Linux Journal, 2010(191): Durmuth:2011:DEN 3:1–3:??, March 2010. CO- DEN LIJOFX. ISSN 1075- [DF11] Markus D¨urmuth and 3583 (print), 1938-3827 David Mandell Freeman. (electronic). Deniable encryption with negligible detection proba- Desmedt:2010:CF bility: An interactive con- [Des10a] Yvo Desmedt. Crypto- struction. Lecture Notes graphic Foundations, chap- in Computer Science, 6632: ter 9, pages 1–15. Vol- 610–626, 2011. CO- ume 2 of Atallah and Blan- DEN LNCSD9. ISSN ton [AB10b], second edi- 0302-9743 (print), 1611- tion, 2010. ISBN 1-58488- 3349 (electronic). URL 820-2. LCCN QA76.9.A43 http://link.springer. A433 2010. URL http: com/content/pdf/10.1007/ //www.crcnetbase.com/ 978-3-642-20465-4_33. doi/abs/10.1201/9781584888215- DuPont:2016:ECC c9. Desmedt:2010:ES [DF16] Quinn DuPont and Bradley Fidler. Edge cryptogra- [Des10b] Yvo Desmedt. Encryp- phy and the codevelopment tion Schemes, chapter 10, of computer networks and pages 1–30. Volume 2 cybersecurity. IEEE An- of Atallah and Blanton nals of the History of Com- [AB10b], second edition, puting, 38(4):55–73, ???? 2010. ISBN 1-58488-820- 2016. CODEN IAHCEX. 2. LCCN QA76.9.A43 ISSN 1058-6180 (print), A433 2010. URL http: 1934-1547 (electronic). //www.crcnetbase.com/ doi/abs/10.1201/9781584888215-DeCapitaniDiVimercati:2010:EPR c10. + Dew:2011:BRB [DFJ 10] Sabrina De Capitani Di Vimercati, Sara Foresti, [Dew11] Nicholas Dew. Book re- Sushil Jajodia, Stefano view: The Information Paraboschi, and Pierangela Master: Jean-Baptiste Col- Samarati. Encryption poli- bert’s Secret State Intelli- cies for regulating access gence System. Isis, 102(4): to outsourced data. ACM 765, December 2011. CO- Transactions on Database DEN ISISA4. ISSN 0021- Systems, 35(2):12:1–12:??, 1753 (print), 1545-6994 April 2010. CODEN (electronic). URL http:/ ATDSD3. ISSN 0362-5915 /www.jstor.org/stable/ (print), 1557-4644 (elec- 10.1086/664857. tronic). REFERENCES 229

DeCapitanidiVimercati:2017:AMM Djuric:2015:FSF

[DFJ+17] Sabrina De Capitani di [DG15] Zoran Djuric and Dragan Vimercati, Sara Foresti, Gasevic. FEIPS: a secure Sushil Jajodia, Giovanni fair-exchange payment sys- Livraga, Stefano Para- tem for Internet transac- boschi, and Pierangela tions. The Computer Jour- Samarati. An autho- nal, 58(10):2537–2556, Oc- rization model for multi tober 2015. CODEN CM- provider queries. Pro- PJA6. ISSN 0010-4620 ceedings of the VLDB En- (print), 1460-2067 (elec- dowment, 11(3):256–268, tronic). URL http:// November 2017. CODEN comjnl.oxfordjournals. ???? ISSN 2150-8097. org/content/58/10/2537. Deng:2017:LLH Dutta:2017:EFC

[DFKC17] Zhaoxia Deng, Ariel Feld- [DG17] Tanima Dutta and Hari Prab- man, Stuart A. Kurtz, and hat Gupta. An efficient Frederic T. Chong. Lemon- framework for compressed ade from lemons: Har- domain watermarking in nessing device wearout to P frames of high-efficiency create limited-use secu- video coding (HEVC)- rity architectures. ACM encoded video. ACM SIGARCH Computer Ar- Transactions on Multime- chitecture News, 45(2): dia Computing, Communi- 361–374, May 2017. CO- cations, and Applications, DEN CANED2. ISSN 13(1):12:1–12:??, January 0163-5964 (print), 1943- 2017. CODEN ???? ISSN 5851 (electronic). 1551-6857 (print), 1551- 6865 (electronic). Ding:2012:CLS Dickens:2018:SCI [DG12] Lin Ding and Jie Guan. Cryptanalysis of Loiss [DGFH18] Bernard Dickens III, Haryadi S. stream cipher. The Gunawi, Ariel J. Feld- Computer Journal,55 man, and Henry Hoffmann. (10):1192–1201, October StrongBox: Confidential- 2012. CODEN CM- ity, integrity, and perfor- PJA6. ISSN 0010-4620 mance using stream ciphers (print), 1460-2067 (elec- for full drive encryption. tronic). URL http:// ACM SIGPLAN Notices, comjnl.oxfordjournals. 53(2):708–721, February org/content/55/10/1192. 2018. CODEN SINODQ. full.pdf+html. ISSN 0362-1340 (print), REFERENCES 230

1523-2867 (print), 1558- (electronic). URL http:// 1160 (electronic). www.sciencedirect.com/ science/article/pii/S0304397519303883. Dupressoir:2014:GGP [DGJN14] Fran¸cois Dupressoir, An- Ding:2012:NRR drew D. Gordon, Jan J¨urjens, and David A. Nau- [DGlS12] L. Ding, J. Guan, and mann. Guiding a general- W. l. Sun. New results purpose C verifier to prove of related-key attacks on cryptographic protocols. all Py-family of stream ci- Journal of Computer Se- phers. J.UCS: Journal of curity, 22(5):823–866, ???? Universal Computer Sci- 2014. CODEN JCSIET. ence, 18(12):1741–??, ???? ISSN 0926-227X (print), 2012. CODEN ???? ISSN 1875-8924 (electronic). 0948-6968. URL http:/ /www.jucs.org/jucs_18_ Drucker:2018:FMB 12/new_results_of_related.

[DGK18] Nir Drucker, Shay Gueron, Demay:2019:PSS and Vlad Krasnov. Fast multiplication of binary [DGMT19] Gr´egory Demay, Peter polynomials with the forth- Gaˇzi, Ueli Maurer, and coming vectorized VP- Bj¨orn Tackmann. Per- CLMULQDQ instruction. session security: Password- In Tenca and Takagi based cryptography revis- [TT18], pages 115–119. ited. Journal of Com- ISBN 1-5386-2612-8 (USB), puter Security, 27(1):75– 1-5386-2665-9. ISSN 2576- 111, ???? 2019. CODEN 2265. LCCN QA76.9.C62. JCSIET. ISSN 0926-227X IEEE catalog number (print), 1875-8924 (elec- CFP18121-USB. tronic). Dolev:2019:AAC Drimer:2010:DBP [DGL19] Shlomi Dolev, Niv Gilboa, and Ximing Li. Accumu- [DGP10] Saar Drimer, Tim G¨uneysu, lating automata and cas- and Christof Paar. DSPs, caded equations automata BRAMs, and a pinch of for communicationless in- logic: Extended recipes for formation theoretically se- AES on FPGAs. ACM cure multi-party computa- Transactions on Reconfig- tion. Theoretical Computer urable Technology and Sys- Science, 795(??):81–99, tems, 3(1):3:1–3:??, Jan- November 26, 2019. CO- uary 2010. CODEN ???? DEN TCSCDI. ISSN 0304- ISSN 1936-7406 (print), 3975 (print), 1879-2294 1936-7414 (electronic). REFERENCES 231

Dubeuf:2016:EPA academic.oup.com/comjnl/ article/62/4/518/5183521. [DHB16] Jeremy Dubeuf, David Hely, and Vincent Beroulle. Driessen:2013:ESA ECDSA passive attacks, [DHW+13] Benedikt Driessen, Ralf leakage sources, and com- Hund, Carsten Willems, mon design mistakes. ACM Christof Paar, and Thorsten Transactions on Design Holz. An experimen- Automation of Electronic tal security analysis of Systems, 21(2):31:1–31:??, two satphone standards. January 2016. CODEN ACM Transactions on In- ATASFO. ISSN 1084-4309 formation and System Se- (print), 1557-7309 (elec- curity, 16(3):10:1–10:??, tronic). November 2013. CODEN Dodis:2010:CAC ATISBQ. ISSN 1094-9224 (print), 1557-7406 (elec- [DHLAW10] Y. Dodis, K. Haralam- tronic). biev, A. Lopez-Alt, and Diem:2012:UES D. Wichs. Cryptography against continuous memory [Die12] Claus Diem. On the use of attacks. In IEEE [IEE10], expansion series for stream pages 511–520. ISBN 1- ciphers. LMS Journal of 4244-8525-8. LCCN ???? Computation and Mathe- URL http://ieeexplore. matics, 15:326–340, 2012. ieee.org/servlet/opac? CODEN ???? ISSN 1461- punumber=5669376. IEEE 1570. Computer Society Order Drosou:2012:SAH Number P4244. Dang:2019:SBS [DIMT12] Anastasios Drosou, Di- mosthenis Ioannidis, Kon- [DHT+19] Van Tuyen Dang, Truong Thu stantinos Moustakas, and Huong, Nguyen Huu Thanh, Dimitrios Tzovaras. Spa- Pham Ngoc Nam, Nguyen Ngoc tiotemporal analysis of hu- Thanh, and Alan Mar- man activities for biomet- shall. SDN-based SYN ric authentication. Com- proxy — a solution to en- puter Vision and Image hance performance of at- Understanding: CVIU, 116 tack mitigation under TCP (3):411–421, March 2012. SYN flood. The Com- CODEN CVIUF4. ISSN puter Journal, 62(4):518– 1077-3142 (print), 1090- 534, April 2019. CODEN 235X (electronic). URL CMPJA6. ISSN 0010-4620 http://www.sciencedirect. (print), 1460-2067 (elec- com/science/article/pii/ tronic). URL http:// S1077314211002098. REFERENCES 232

Dinoor:2010:PIM Domnitser:2012:NMC

[DJL+12] Leonid Domnitser, Aamer [Din10] Shlomi Dinoor. Privileged Jaleel, Jason Loew, Nael identity management: se- Abu-Ghazaleh, and Dmitry curing the enterprise. Net- Ponomarev. Non-monopolizable work Security, 2010(12):4– caches: Low-complexity 6, December 2010. CO- mitigation of cache side DEN NTSCF5. ISSN 1353- channel attacks. ACM 4858 (print), 1872-9371 Transactions on Architec- (electronic). URL http:// ture and Code Optimiza- www.sciencedirect.com/ tion, 8(4):35:1–35:??, Jan- science/article/pii/S1353485810701446. uary 2012. CODEN ???? ISSN 1544-3566 (print), Dong:2019:FOI 1544-3973 (electronic).

[DJ19] Shi Dong and Raj Jain. Delfs:2002:ICP Flow online identification [DK02] Hans Delfs and Helmut method for the encrypted Knebl. Introduction to Skype. Journal of Net- Cryptography: Principles work and Computer Ap- and Applications. Infor- plications, 132(??):75–85, mation Security and Cryp- April 15, 2019. CODEN tography. Springer-Verlag, JNCAF3. ISSN 1084-8045 Berlin, Germany / Heidel- (print), 1095-8592 (elec- berg, Germany / London, tronic). URL http:// UK / etc., 2002. ISBN www.sciencedirect.com/ 3-642-87126-7 (e-book), science/article/pii/S1084804519300074. 3-642-87128-3. ISSN 1619-7100 (print), 2197- Ding:2015:CWF 845X (electronic). xiv + 310 pp. LCCN [DJG+15] Lin Ding, Chenhui Jin, QA76.9.A25. URL http:/ Jie Guan, Shaowu Zhang, /www.springerlink.com/ Ting Cui, Dong Han, and content/978-3-642-87126- Wei Zhao. Cryptanalysis 9. of WG family of stream ci- Delfs:2007:ICP phers. The Computer Jour- nal, 58(10):2677–2685, Oc- [DK07] Hans Delfs and Helmut tober 2015. CODEN CM- Knebl. Introduction to PJA6. ISSN 0010-4620 Cryptography: Principles (print), 1460-2067 (elec- and Applications, vol- tronic). URL http:// ume 1 of Information comjnl.oxfordjournals. Security and Cryptogra- org/content/58/10/2677. phy. Springer-Verlag, REFERENCES 233

Berlin, Germany / Heidel- 10.1007/978-3-662-47974- berg, Germany / London, 2. UK / etc., second edition, Delimitrou:2016:SID 2007. ISBN 3-540-49243- 7 (hardcover), 3-540-49244- [DK16a] Christina Delimitrou and 5. ISSN 1619-7100 (print), Christos Kozyrakis. Se- 2197-845X (electronic). curity implications of data xvi + 367 pp. LCCN mining in cloud schedul- QA76.9A25 D44 2007; ing. IEEE Computer Ar- QA76.9.D35. URL http:/ chitecture Letters, 15(2): /www.springerlink.com/ 109–112, July/December content/gm2886. 2016. CODEN ???? ISSN 1556-6056 (print), 1556- Dolev:2012:ATC 6064 (electronic). [DK12] Shlomi Dolev and Marina Dorre:2016:ELO Kopeetsky. Anonymous transactions in computer [DK16b] Felix D¨orre and Vladimir networks. ACM Transac- Klebanov. Entropy loss tions on Autonomous and and output predictabil- Adaptive Systems (TAAS), ity in the Libgcrypt 7(2):26:1–26:??, July 2012. PRNG. Report CVE- CODEN ???? ISSN 2016-6313, Karlsruhe Insti- 1556-4665 (print), 1556- tute of Technology, Karl- 4703 (electronic). sruhe, Germany, August 18, 2016. 2 pp. URL http: Delfs:2015:ICP //formal.iti.kit.edu/~ klebanov/pubs/libgcrypt- [DK15] Hans Delfs and Helmut cve-2016-6313.pdf. Knebl. Introduction to Cryptography: Principles Doychev:2017:RAS and Applications. Infor- mation Security and Cryp- [DK17] Goran Doychev and Boris tography. Springer-Verlag, K¨opf. Rigorous analy- Berlin, Germany / Heidel- sis of software countermea- berg, Germany / London, sures against cache attacks. UK / etc., third edition, ACM SIGPLAN Notices, 2015. ISBN 3-662-47973- 52(6):406–421, June 2017. 7 (paper), 3-662-47974-5 CODEN SINODQ. ISSN (e-book). ISSN 1619-7100 0362-1340 (print), 1523- (print), 2197-845X (elec- 2867 (print), 1558-1160 tronic). xx + 508 + 5 (electronic). pp. LCCN QA76.9.A25; Durumeric:2014:MH QA76.9.D35. URL http:/ /link.springer.com/book/ [DKA+14] Zakir Durumeric, James REFERENCES 234

Kasten, David Adrian, Doychev:2015:CTS J. Alex Halderman, Michael Bailey, Frank Li, Nicholas [DKMR15] Goran Doychev, Boris Weaver, Johanna Amann, K¨opf, Laurent Mauborgne, Jethro Beekman, Mathias and Jan Reineke. CacheAu- Payer, et al. The matter of dit: a tool for the static Heartbleed. In ????, editor, analysis of cache side chan- ACM Internet Measure- nels. ACM Transactions ment Conference, page ?? on Information and Sys- ACM Press, New York, NY tem Security, 18(1):4:1– 10036, USA, 2014. ISBN 4:??, June 2015. CODEN ???? LCCN ???? URL ATISBQ. ISSN 1094-9224 ????. (print), 1557-7406 (elec- tronic). Dolev:2016:MCG Dodis:2012:MAR [DKL+16] Shlomi Dolev, Ephraim [DKPW12] Yevgeniy Dodis, Eike Kiltz, Korach, Ximing Li, Yin Li, Krzysztof Pietrzak, and and Galit Uzan. Magnify- Daniel Wichs. Mes- ing computing gaps: Es- sage authentication, revis- tablishing encrypted com- ited. Lecture Notes in munication over unidirec- Computer Science, 7237: tional channels. The- 355–374, 2012. CO- oretical Computer Sci- DEN LNCSD9. ISSN ence, 636(??):17–26, July 0302-9743 (print), 1611- 11, 2016. CODEN TC- 3349 (electronic). URL SCDI. ISSN 0304-3975 (print), 1879-2294 (elec- http://link.springer. com/accesspage/chapter/ tronic). URL http:// 10.1007/978-3-642-29011- www.sciencedirect.com/ 4_21; http://link.springer. science/article/pii/S0304397516300718. com/chapter/10.1007/978- Dobre:2019:PWR 3-642-29011-4_22/. Dunkelman:2012:MCE [DKL+19] D. Dobre, G. O. Karame, W. Li, M. Majuntke, [DKS12] Orr Dunkelman, Nathan N. Suri, and M. Vukoli . Keller, and Adi Shamir. Proofs of writing for ro- Minimalism in cryptogra- bust storage. IEEE Trans- phy: The Even–Mansour actions on Parallel and scheme revisited. Lecture Distributed Systems,30 Notes in Computer Sci- (11):2547–2566, November ence, 7237:336–354, 2012. 2019. CODEN ITDSEO. CODEN LNCSD9. ISSN ISSN 1045-9219 (print), 0302-9743 (print), 1611- 1558-2183 (electronic). 3349 (electronic). URL REFERENCES 235

http://link.springer. Deng:2019:DMS com/accesspage/chapter/ 10.1007/978-3-642-29011- [DLGT19] Cheng Deng, Zhao Li, 4_20; http://link.springer. Xinbo Gao, and Dacheng com/chapter/10.1007/978- Tao. Deep multi-scale dis- 3-642-29011-4_21/. criminative networks for double JPEG compres- Dong:2012:UAS sion forensics. ACM [DL12] Qi Dong and Donggang Transactions on Intelligent Liu. Using auxiliary sen- Systems and Technology sors for pairwise key estab- (TIST), 10(2):20:1–20:??, lishment in WSN. ACM February 2019. CODEN Transactions on Embed- ???? ISSN 2157-6904 ded Computing Systems,11 (print), 2157-6912 (elec- (3):59:1–59:??, September tronic). URL https:// 2012. CODEN ???? ISSN dl.acm.org/ft_gateway. 1539-9087 (print), 1558- cfm?id=3301274. 3465 (electronic). Degefa:2016:PSE

DeLuca:2015:SUS [DLK+16] Fikadu B. Degefa, Donghoon [DL15] Alexander De Luca and Lee, Jiye Kim, Younsung Janne Lindqvist. Is se- Choi, and Dongho Won. cure and usable Smart- Performance and security phone authentication ask- enhanced authentication ing too much? Computer, and key agreement pro- 48(5):64–68, May 2015. tocol for SAE/LTE net- CODEN CPTRB4. ISSN work. Computer Networks 0018-9162 (print), 1558- (Amsterdam, Netherlands: 0814 (electronic). URL 1999), 94(??):145–163, http://csdl.computer. January 15, 2016. CO- org/csdl/mags/co/2015/ DEN ???? ISSN 1389-1286 05/mco2015050064-abs. (print), 1872-7069 (elec- html. tronic). URL http:// www.sciencedirect.com/ Dinur:2017:IGA science/article/pii/S1389128615004211. [DL17] Itai Dinur and Ga¨etan Djaziri-Larbi:2018:WDA Leurent. Improved generic attacks against hash-based [DLMM+18] Sonia Djaziri-Larbi, Ga¨el MACs and HAIFA. Algo- Mah´e, Imen Mezghani, rithmica, 79(4):1161–1195, Monia Turki, and M´eriem December 2017. CODEN Ja¨ıdane. Watermark- ALGOEJ. ISSN 0178-4617 driven acoustic echo can- (print), 1432-0541 (elec- cellation. IEEE/ACM tronic). Transactions on Audio, REFERENCES 236

Speech, and Language Dai:2016:MLR Processing, 26(2):367–378, ???? 2018. CODEN [DLZ16a] Shuguang Dai, Huige ???? ISSN 2329- Li, and Fangguo Zhang. 9290. URL http:/ Memory leakage-resilient /ieeexplore.ieee.org/ searchable symmetric en- document/8122007/. cryption. Future Gener- ation Computer Systems, Dong:2013:PRS 62(??):76–84, September 2016. CODEN FG- [DLN13] Qi Dong, Donggang Liu, SEVI. ISSN 0167-739X and Peng Ning. Pro- (print), 1872-7115 (elec- viding DoS resistance for tronic). URL http:// signature-based broadcast www.sciencedirect.com/ authentication in sensor science/article/pii/S0167739X15003404. networks. ACM Transac- tions on Embedded Com- Duan:2016:SDC

puting Systems, 12(3): + 73:1–73:??, March 2013. [DLZ 16b] Li Duan, Dongxi Liu, CODEN ???? ISSN 1539- Yang Zhang, Shiping Chen, 9087 (print), 1558-3465 Ren Ping Liu, Bo Cheng, (electronic). and Junliang Chen. Secure data-centric access con- DiPietro:2016:CLD trol for smart grid services based on publish/subscribe [DLV16] Roberto Di Pietro, Flavio systems. ACM Transac- Lombardi, and Antonio tions on Internet Technol- Villani. CUDA leaks: a ogy (TOIT), 16(4):23:1– detailed hack for CUDA 23:??, December 2016. CO- and a (partial) fix. ACM DEN ???? ISSN 1533-5399 Transactions on Embed- (print), 1557-6051 (elec- ded Computing Systems, tronic). 15(1):15:1–15:??, February 2016. CODEN ???? ISSN DeCarneDeCarnavalet:2015:LSE 1539-9087 (print), 1558- [DM15] Xavier De Carn´e De Car- 3465 (electronic). navalet and Mohammad Dodis:2011:SSC Mannan. A large-scale evaluation of high-impact [DLWW11] Y. Dodis, A. Lewko, password strength meters. B. Waters, and D. Wichs. ACM Transactions on In- Storing secrets on contin- formation and System Se- ually leaky devices. In curity, 18(1):1:1–1:??, June IEEE [IEE11b], pages 688– 2015. CODEN ATISBQ. 697. ISBN 1-4577-1843-X. ISSN 1094-9224 (print), LCCN ???? 1557-7406 (electronic). REFERENCES 237

Daneshgar:2018:SSS Mancini, and Alessandro Mei. Hierarchies of keys in [DM18] Amir Daneshgar and Fahimeh secure multicast communi- Mohebbipoor. A secure cations. Journal of Com- self-synchronized stream puter Security, 18(5):839– cipher. The Computer 860, ???? 2010. CODEN Journal, 61(8):1180–1201, JCSIET. ISSN 0926-227X August 1, 2018. CODEN (print), 1875-8924 (elec- CMPJA6. ISSN 0010-4620 tronic). (print), 1460-2067 (elec- tronic). URL http:// Drozdz:2019:SCC

academic.oup.com/comjnl/ + article/61/8/1180/5005423[DMO. 19] Stanislaw Drozdz, Lu- dovico Minati, Pawel DeMarsico:2019:SGR O´swiecimka, Marek Stanuszek, and Marcin Watorek. Sig- [DM19] Maria De Marsico and natures of the crypto- Alessio Mecca. A sur- currency market decou- vey on gait recognition via pling from the Forex. Fu- wearable sensors. ACM ture Internet, 11(7):154, Computing Surveys,52 July 10, 2019. CODEN (4):86:1–86:??, Septem- ???? ISSN 1999-5903. URL ber 2019. CODEN https://www.mdpi.com/ CMSVAN. ISSN 0360-0300 1999-5903/11/7/154. (print), 1557-7341 (elec- tronic). URL https:// Diesburg:2016:TLA dl.acm.org/ft_gateway. + cfm?id=3340293. [DMS 16] Sarah Diesburg, Christo- pher Meyers, Mark Stanovich, Dong:2018:SSM An-I Andy Wang, and Ge- [DMD18] Yao Dong, Ana Milanova, off Kuenning. TrueErase: and Julian Dolby. Se- Leveraging an auxiliary cureMR: secure mapre- data path for per-file se- duce using homomorphic cure deletion. ACM Trans- encryption and program actions on Storage, 12(4): partitioning. ACM SIG- 18:1–18:??, August 2016. PLAN Notices, 53(1):389– CODEN ???? ISSN 1553- 390, January 2018. CO- 3077 (print), 1553-3093 DEN SINODQ. ISSN 0362- (electronic). 1340 (print), 1523-2867 Dwivedi:2018:DLR (print), 1558-1160 (elec- tronic). [DMSD18] Ashutosh Dhar Dwivedi, DiPietro:2010:HKS Pawel Morawiecki, Ra- jani Singh, and Shalini [DMM10] Roberto Di Pietro, Luigi V. Dhar. Differential-linear REFERENCES 238

and related key crypt- posable oblivious transfer analysis of round-reduced from lossy encryption and scream. Information Pro- the McEliece assumptions. cessing Letters, 136(??):5– Lecture Notes in Computer 8, August 2018. CODEN Science, 7412:80–99, 2012. IFPLAT. ISSN 0020-0190 CODEN LNCSD9. ISSN (print), 1872-6119 (elec- 0302-9743 (print), 1611- tronic). URL http:// 3349 (electronic). URL www.sciencedirect.com/ http://link.springer. science/article/pii/S0020019018300656. com/chapter/10.1007/978- 3-642-32284-6_5/. Dimitrakakis:2015:ELA Donovan:2014:ATM [DMV15] Christos Dimitrakakis, Aika- terini Mitrokotsa, and [Don14] Peter W. Donovan. Alan Serge Vaudenay. Expected Turing, Marshall Hall, and loss analysis for authenti- the alignment of WW2 cation in constrained chan- Japanese Naval intercepts. nels. Journal of Com- Notices of the Ameri- puter Security, 23(3):309– can Mathematical Soci- 329, ???? 2015. CODEN ety, 61(3):258–264, March JCSIET. ISSN 0926-227X 2014. CODEN AM- (print), 1875-8924 (elec- NOAN. ISSN 0002-9920 tronic). (print), 1088-9477 (elec- tronic). URL http:/ Demme:2012:SCV /www.ams.org/notices/ . [DMWS12] John Demme, Robert Mar- 201403/rnoti-p258.pdf tin, Adam Waksman, and Doroz:2015:AFH Simha Sethumadhavan. Side-channel vulnerability [DOS15] Y. Doroz, E. Ozturk, and factor: a metric for mea- B. Sunar. Accelerating suring information leakage. fully homomorphic encryp- ACM SIGARCH Computer tion in hardware. IEEE Architecture News, 40(3): Transactions on Comput- 106–117, June 2012. CO- ers, 64(6):1509–1521, ???? DEN CANED2. ISSN 2015. CODEN ITCOB4. 0163-5964 (print), 1943- ISSN 0018-9340 (print), 5851 (electronic). ISCA ’12 1557-9956 (electronic). conference proceedings. Duncan:2012:CAI David:2012:UCO [DP12] Christian A. Duncan and [DN12] Bernardo Machado David Vir V. Phoha. On the com- and Anderson C. A. Nasci- plexity of aggregating in- mento. Universally com- formation for authentica- REFERENCES 239

tion and profiling. Lec- 0004-5411 (print), 1557- ture Notes in Computer 735X (electronic). Science, 7122:58–71, 2012. CODEN LNCSD9. ISSN Dong:2012:NCV 0302-9743 (print), 1611- [DQFL12] Deshuai Dong, Longjiang 3349 (electronic). URL Qu, Shaojing Fu, and Chao http://link.springer. Li. New constructions com/chapter/10.1007/978- of vectorial Boolean func- 3-642-28879-1_5/. tions with good crypto- Ding:2017:CSM graphic properties. Inter- national Journal of Foun- [DP17] Jintai Ding and Albrecht dations of Computer Sci- Petzoldt. Current state of ence (IJFCS), 23(3):749– multivariate cryptography. ??, April 2012. CODEN IEEE Security & Privacy, IFCSEN. ISSN 0129-0541 15(4):28–36, July/August (print), 1793-6373 (elec- 2017. CODEN ???? ISSN tronic). 1540-7993 (print), 1558- 4046 (electronic). URL Daemen:2010:FYA https://www.computer. [DR10] Joan Daemen and Vin- org/csdl/mags/sp/2017/ cent Rijmen. The first 10 04/msp2017040028-abs. years of advanced encryp- html. tion. IEEE Security & Pri- Das:2016:CWM vacy, 8(6):72–74, Novem- [DPCM16] Aveek K. Das, Parth H. ber/December 2010. CO- Pathak, Chen-Nee Chuah, DEN ???? ISSN 1540-7993 and Prasant Mohapatra. (print), 1558-4046 (elec- Characterization of wire- tronic). less multidevice users. Duong:2011:CWC ACM Transactions on In- ternet Technology (TOIT), [DR11] Thai Duong and J. Rizzo. 16(4):29:1–29:??, Decem- Cryptography in the Web: ber 2016. CODEN ???? The case of cryptographic ISSN 1533-5399 (print), design flaws in ASP.NET. 1557-6051 (electronic). Unknown, May 2011. Dziembowski:2018:NMC Dautrich:2012:SLU [DPW18] Stefan Dziembowski, Krzysztof[DR12] Jonathan L. Dautrich and Pietrzak, and Daniel Wichs. Chinya V. Ravishankar. Non-malleable codes. Jour- Security limitations of us- nal of the ACM, 65(4): ing secret sharing for data 20:1–20:??, August 2018. outsourcing. Lecture Notes CODEN JACOAH. ISSN in Computer Science, 7371: REFERENCES 240

145–160, 2012. CO- (print), 1872-6208 (elec- DEN LNCSD9. ISSN tronic). URL https:// 0302-9743 (print), 1611- www.sciencedirect.com/ 3349 (electronic). URL science/article/pii/S016740481630102X. http://link.springer. com/chapter/10.1007/978- Dixon:2016:NTO 3-642-31540-4_12/. [DRS16] Lucas Dixon, Thomas Draziotis:2016:EDL Ristenpart, and Thomas Shrimpton. Network traf- [Dra16] Konstantinos A. Draziotis. fic obfuscation and au- (EC)DSA lattice attacks tomated Internet censor- based on Coppersmith’s ship. IEEE Security method. Information Pro- & Privacy, 14(6):43–53, cessing Letters, 116(8): November/December 2016. 541–545, August 2016. CO- CODEN ???? ISSN DEN IFPLAT. ISSN 0020- 1540-7993 (print), 1558- 0190 (print), 1872-6119 4046 (electronic). URL (electronic). URL http:// https://www.computer. www.sciencedirect.com/ org/csdl/mags/sp/2016/ science/article/pii/S0020019016300436. 06/msp2016060043-abs. html. Dong:2011:SSE delRey:2012:EDI [DRD11] Changyu Dong, Giovanni Russello, and Naranker [dRSdlVC12] A. Mart´ın del Rey, G. Rodr´ıguez Dulay. Shared and search- S´anchez, and A. de la able encrypted data for un- Villa Cuenca. Encrypt- trusted servers. Journal ing digital images using of Computer Security,19 cellular automata. Lec- (3):367–397, ???? 2011. ture Notes in Computer CODEN JCSIET. ISSN Science, 7209:78–88, 2012. 0926-227X (print), 1875- CODEN LNCSD9. ISSN 8924 (electronic). 0302-9743 (print), 1611- 3349 (electronic). URL Dasgupta:2016:TDA http://link.springer. [DRN16] Dipankar Dasgupta, Arunava com/chapter/10.1007/978- Roy, and Abhijit Nag. To- 3-642-28931-6_8/. ward the design of adap- Dini:2011:LLA tive selection strategies for multi-factor authen- [DS11] Gianluca Dini and Ida M. tication. Computers & Savino. LARK: a lightweight Security, 63(??):85–116, authenticated ReKeying November 2016. CODEN scheme for clustered wire- CPSEDU. ISSN 0167-4048 less sensor networks. ACM REFERENCES 241

Transactions on Embed- DEN ???? ISSN 1550- ded Computing Systems,10 4832. (4):41:1–41:??, November Das:2012:DPB 2011. CODEN ???? ISSN 1539-9087 (print), 1558- [DSCS12] Ashok Kumar Das, Pranay 3465 (electronic). Sharma, Santanu Chatter- jee, and Jamuna Kanta Dixit:2019:FBD Sing. A dynamic password- based user authentica- [DS19] Umesh D. Dixit and M. S. tion scheme for hierarchi- Shirdhonkar. Fingerprint- cal wireless sensor net- based document image works. Journal of Net- retrieval. International work and Computer Appli- Journal of Image and cations, 35(5):1646–1656, Graphics (IJIG), 19(2): September 2012. CODEN ??, 2019. ISSN 0219- JNCAF3. ISSN 1084-8045 4678. URL https:/ (print), 1095-8592 (elec- /www.worldscientific. tronic). URL http:// com/doi/10.1142/S0219467819500086. www.sciencedirect.com/ Das:2015:DCS science/article/pii/S1084804512000926.

[DSB15] Debasish Das, Utpal Sharma, Deng:2018:SFE and D. K. Bhattacharyya. [DSLB18] Lih-Yuan Deng, Jyh- Detection of cross-site Jen Horng Shiau, Henry scripting attack under mul- Horng-Shing Lu, and Dale tiple scenarios. The Com- Bowman. Secure and Fast puter Journal, 58(4):808– Encryption (SAFE) with 822, April 2015. CODEN classical random number CMPJA6. ISSN 0010-4620 generators. ACM Trans- (print), 1460-2067 (elec- actions on Mathematical tronic). URL http:// Software, 44(4):45:1–45:17, comjnl.oxfordjournals. August 2018. CODEN org/content/58/4/808. ACMSCU. ISSN 0098- Das:2016:MPU 3500 (print), 1557-7295 (electronic). URL https: [DSB16] Jayita Das, Kevin Scott, //dl.acm.org/citation. and Sanjukta Bhanja. cfm?id=3212673. MRAM PUF: Using geo- Dachman-Soled:2014:COF metric and resistive varia- tions in MRAM cells. ACM [DSMM14] Dana Dachman-Soled, Mo- Journal on Emerging Tech- hammad Mahmoody, and nologies in Computing Sys- Tal Malkin. Can optimally- tems (JETC), 13(1):2:1– fair coin tossing be based 2:??, December 2016. CO- on one-way functions? REFERENCES 242

Lecture Notes in Com- (print), 1432-0541 (elec- puter Science, 8349:217– tronic). 239, 2014. CODEN LNCSD9. ISSN 0302-9743 Dini:2013:HHS (print), 1611-3349 (elec- [DT13] Gianluca Dini and Marco tronic). URL http:// Tiloca. HISS: a HIghly link.springer.com/chapter/ Scalable Scheme for group 10.1007/978-3-642-54242- rekeying. The Computer 8_10/. Journal, 56(4):508–525, Dodis:2014:HEY April 2013. CODEN CM- PJA6. ISSN 0010-4620 [DSSDW14] Yevgeniy Dodis, Adi Shamir, (print), 1460-2067 (elec- Noah Stephens-Davidowitz, tronic). URL http:// and Daniel Wichs. How comjnl.oxfordjournals. to eat your entropy and org/content/56/4/508. have it too — optimal re- full.pdf+html. covery strategies for com- promised RNGs. Report, Drosatos:2017:PET Dept. of Computer Sci- ence, New York University; [DTE17] George Drosatos, Aim- Dept. of Computer Science ilia Tasidou, and Pav- and Applied Mathemat- los S. Efraimidis. Privacy- ics, Weizmann Institute; enhanced television audi- Dept. of Computer Sci- ence measurements. ACM ence, Northeastern Univer- Transactions on Internet sity, New York, NY, USA; Technology (TOIT), 17(1): Tel Aviv, Israel; Boston, 10:1–10:??, March 2017. MA, USA, March 3, 2014. CODEN ???? ISSN 1533- 27 pp. URL http:/ 5399 (print), 1557-6051 /eprint.iacr.org/2014/ (electronic). 167; https://www.schneier. Deng:2012:VIA com/fortuna.html. Dodis:2017:HEY [DTZZ12] Aidong Deng, Jianeng Tang, Li Zhao, and [DSSDW17] Yevgeniy Dodis, Adi Shamir, Cairong Zou. The variable- Noah Stephens-Davidowitz, interval arithmetic cod- and Daniel Wichs. How ing using asymptotic de- to eat your entropy and terministic randomness for have it too: Optimal re- data compression and en- covery strategies for com- cryption. Journal of Sta- promised RNGs. Algorith- tistical Computation and mica, 79(4):1196–1232, De- Simulation, 82(10):1545– cember 2017. CODEN AL- 1555, 2012. CODEN JSC- GOEJ. ISSN 0178-4617 SAJ. ISSN 0094-9655 REFERENCES 243

(print), 1026-7778 (elec- semirings in public key tronic), 1563-5163. cryptography. ACM Com- munications in Computer Dunkelman:2012:MEK Algebra, 49(1):19, March [Dun12a] Orr Dunkelman. From 2015. CODEN ???? ISSN multiple encryption to 1932-2232 (print), 1932- knapsacks — efficient dis- 2240 (electronic). section of composite prob- David:2012:PRE lems. Lecture Notes in Computer Science, 7668: [DW12] C. David and J. Wu. Pseu- 16, 2012. CODEN doprime reductions of el- LNCSD9. ISSN 0302-9743 liptic curves. Canadian (print), 1611-3349 (elec- Journal of Mathematics tronic). URL http:// = Journal canadien de link.springer.com/accesspage/ math´ematiques, 64(1):81– chapter/10.1007/978-3- 101, February 2012. CO- 642-34931-7_2. DEN CJMAAB. ISSN Dunkelman:2012:TCC 0008-414X (print), 1496- 4279 (electronic). [Dun12b] Orr Dunkelman, editor. Topics in Cryptology — Dorn:2012:ECE CT-RSA 2012: The Cryp- tographers’ Track at the [DWB12] Michael Dorn, Peter Wack- RSA Conference 2012, ersreuther, and Christian San Francisco, CA, USA, B¨ohm. Efficient compar- February 27 — March 2, ison of encrypted biomet- 2012. Proceedings, volume ric templates. Lecture 7178 of Lecture Notes in Notes in Computer Sci- Computer Science. Spring- ence, 7449:129–142, 2012. er-Verlag, Berlin, Ger- CODEN LNCSD9. ISSN many / Heidelberg, Ger- 0302-9743 (print), 1611- many / London, UK / 3349 (electronic). URL etc., 2012. CODEN http://link.springer. LNCSD9. ISBN 3-642- com/chapter/10.1007/978- 27953-8. ISSN 0302-9743 3-642-32287-7_11/. (print), 1611-3349 (elec- Dong:2012:KKD tronic). URL http:/ /www.springerlink.com/ [DWWZ12] Le Dong, Wenling Wu, content/978-3-642-27953- Shuang Wu, and Jian 9. Zou. Known-key distin- guisher on round-reduced Durcheva:2015:SAI 3D block cipher. Lec- [Dur15] Mariana Durcheva. Some ture Notes in Computer applications of idempotent Science, 7115:55–69, 2012. REFERENCES 244

CODEN LNCSD9. ISSN Cryptography in cloud 0302-9743 (print), 1611- computing. Future Genera- 3349 (electronic). URL tion Computer Systems,30 http://link.springer. (??):90, January 2014. CO- com/chapter/10.1007/978- DEN FGSEVI. ISSN 0167- 3-642-27890-7_5/. 739X (print), 1872-7115 (electronic). URL http:// Dong:2012:NDI www.sciencedirect.com/ [DWZ12] Huanhe Dong, Xiangrong science/article/pii/S0167739X13002197. Wang, and Wencai Zhao. Deng:2016:NCS A new 4-dimensional im- plicit vector-form loop al- [DXWD16] Jiang Deng, Chunxiang gebra with arbitrary con- Xu, Huai Wu, and Liju stants and the correspond- Dong. A new certifi- ing computing formula of cateless signature with en- constant γ in the Variation hanced security and ag- identity. Applied Math- gregation version. Con- ematics and Computa- currency and Computa- tion, 218(22):10998–11008, tion: Practice and Ex- July 15, 2012. CODEN perience, 28(4):1124–1133, AMHCBQ. ISSN 0096- March 25, 2016. CODEN 3003 (print), 1873-5649 CCPEBO. ISSN 1532-0626 (electronic). URL http:// (print), 1532-0634 (elec- www.sciencedirect.com/ tronic). science/article/pii/S0096300312004602. Dodis:2013:OWE Dai:2018:OPC [DY13] Yevgeniy Dodis and Yu Yu. [DWZ18] Wei Dai, William Whyte, Overcoming weak expec- and Zhenfei Zhang. Opti- tations. Lecture Notes in mizing polynomial convo- Computer Science, 7785: lution for NTRUEncrypt. 1–22, 2013. CODEN IEEE Transactions on LNCSD9. ISSN 0302-9743 Computers, 67(11):1572– (print), 1611-3349 (elec- 1583, ???? 2018. CO- tronic). URL http:// DEN ITCOB4. ISSN 0018- link.springer.com/chapter/ 9340 (print), 1557-9956 10.1007/978-3-642-36594- (electronic). URL https: 2_1/; http://link.springer. //ieeexplore.ieee.org/ com/content/pdf/bfm:978- document/8303667/. 3-642-36594-2/1.pdf. Deng:2014:CCC Dyakonov:2019:WWU

[DXA14] Robert H. Deng, Yang Xi- [Dya19] M. Dyakonov. When ang, and Man Ho Au. will useful quantum com- REFERENCES 245

puters be constructed? and Zhenfu Cao. Efficient Not in the foreseeable fu- privacy-preserving tempo- ture, this physicist argues. ral and spacial data aggre- Here’s why: The case gation for smart grid com- against: Quantum com- munications. Concurrency puting. IEEE Spectrum, and Computation: Prac- 56(3):24–29, March 2019. tice and Experience,28 CODEN IEESAM. ISSN (4):1145–1160, March 25, 0018-9235 (print), 1939- 2016. CODEN CCPEBO. 9340 (electronic). ISSN 1532-0626 (print), 1532-0634 (electronic). Dong:2015:SSS Doss:2012:MDA [DYZ+15] Xin Dong, Jiadi Yu, Yan- min Zhu, Yingying Chen, [DZS+12] Robin Doss, Wanlei Zhou, Yuan Luo, and Minglu Saravanan Sundaresan, Li. SECO: Secure and Shui Yu, and Longxiang scalable data collabora- Gao. A minimum dis- tion services in cloud com- closure approach to au- puting. Computers & thentication and privacy Security, 50(??):91–105, in RFID systems. Com- May 2015. CODEN puter Networks (Amster- CPSEDU. ISSN 0167-4048 dam, Netherlands: 1999), (print), 1872-6208 (elec- 56(15):3401–3416, Octo- tronic). URL https:// ber 15, 2012. CODEN www.sciencedirect.com/ ???? ISSN 1389-1286 science/article/pii/S0167404815000048. (print), 1872-7069 (elec- tronic). URL http:// Deng:2014:TNI www.sciencedirect.com/ [DZ14] Lunzhi Deng and Jiwen science/article/pii/S1389128612002447. Zeng. Two new identity- Delledonne:2018:CDA based threshold ring sig- nature schemes. The- [DZS+18] Lorenzo Delledonne, Vit- oretical Computer Sci- torio Zaccaria, Ruggero ence, 535(??):38–45, May Susella, Guido Bertoni, 22, 2014. CODEN TC- and Filippo Melzani. CASCA: SCDI. ISSN 0304-3975 a design automation ap- (print), 1879-2294 (elec- proach for designing hard- tronic). URL http:// ware countermeasures against www.sciencedirect.com/ side-channel attacks. ACM science/article/pii/S0304397514002692. Transactions on Design Dong:2016:EPP Automation of Electronic Systems, 23(6):69:1–69:??, [DZC16] Xiaolei Dong, Jun Zhou, December 2018. CODEN REFERENCES 246

ATASFO. ISSN 1084-4309 Practice and Experience, (print), 1557-7309 (elec- 24(17):2069–2080, Decem- tronic). ber 10, 2012. CODEN CCPEBO. ISSN 1532-0626 Dent:2010:PS (print), 1532-0634 (elec- [DZY10] Alexander W. Dent, Yu- tronic). liang Zheng, and Moti Ekberg:2012:AEP Yung, editors. Practi- cal Signcryption. Infor- [EAA12] Jan-Erik Ekberg, Alexan- mation Security and Cryp- dra Afanasyeva, and N. Asokan. tography. Springer-Verlag, Authenticated encryption Berlin, Germany / Heidel- primitives for size-constrained berg, Germany / London, trusted computing. Lec- UK / etc., 2010. ISBN 1- ture Notes in Computer 282-98107-2, 3-540-89411- Science, 7344:1–18, 2012. X (e-book), 3-540-89409- CODEN LNCSD9. ISSN 8 (e-book). ISSN 1619- 0302-9743 (print), 1611- 7100 (print), 2197-845X 3349 (electronic). URL (electronic). xviii + 274 http://link.springer. pp. LCCN QA76.9.A25 com/chapter/10.1007/978- P735 2010. URL http:/ 3-642-30921-2_1/. /www.springerlink.com/ content/978-3-540-89411- Ehdaie:2016:HCR 7. [EAA+16] Mohammad Ehdaie, Nikos Eslami:2011:SIS Alexiou, Mahmoud Ah- madian, Mohammad Reza [EA11] Z. Eslami and J. Zare- Aref, and Panos Papadim- pour Ahmadabadi. Se- itratos. 2D hash chain ro- cret image sharing with bust random key distribu- authentication-chaining and tion scheme. Information dynamic embedding. The Processing Letters, 116(5): Journal of Systems and 367–372, May 2016. CO- Software, 84(5):803–809, DEN IFPLAT. ISSN 0020- May 2011. CODEN JS- 0190 (print), 1872-6119 SODM. ISSN 0164-1212. (electronic). URL http:// Erguler:2012:PAI www.sciencedirect.com/ [EA12] Imran Erguler and Emin science/article/pii/S0020019015002239. Anarim. Practical attacks Elrabaa:2019:PPP and improvements to an efficient radio frequency [EAAAA19] Muhammad E. S. Elrabaa, identification authentica- Mohamed A. Al-Asli, and tion protocol. Concur- Marwan H. Abu-Amara. rency and Computation: A protection and pay- REFERENCES 247

per-use licensing scheme www.sciencedirect.com/ for on-cloud FPGA cir- science/article/pii/S1389128617303596. cuit IPs. ACM Trans- actions on Reconfigurable Egele:2013:ESC Technology and Systems, [EBFK13] Manuel Egele, David Brum- 12(3):13:1–13:??, Septem- ley, Yanick Fratantonio, ber 2019. CODEN and Christopher Kruegel. ???? ISSN 1936-7406 An empirical study of cryp- (print), 1936-7414 (elec- tographic misuse in An- tronic). URL https:// droid applications. In ????, dl.acm.org/ft_gateway. editor, ACM Conference . cfm?id=3329861 on Computer and Commu- Erbagci:2019:SHE nications Security, pages 73–84. ACM Press, New [EAB+19] Burak Erbagci, Nail Etkin Can York, NY 10036, USA, Akkaya, Mudit Bhar- 2013. ISBN ???? LCCN gava, Rachel Dondero, ???? URL ????. and Ken Mai. Secure hardware-entangled field Esiner:2017:QRI programmable gate arrays. Journal of Parallel and [ED17] Ertem Esiner and Anwita- Distributed Computing, man Datta. On query 131(??):81–96, September result integrity over en- 2019. CODEN JPD- crypted data. Informa- CER. ISSN 0743-7315 tion Processing Letters, 122 (print), 1096-0848 (elec- (??):34–39, June 2017. CO- tronic). URL http:// DEN IFPLAT. ISSN 0020- www.sciencedirect.com/ 0190 (print), 1872-6119 science/article/pii/S0743731519302618. (electronic). URL http:// www.sciencedirect.com/ Ermis:2017:KAP science/article/pii/S0020019017300327. [EBAC17] ¸ Orhan Ermis, Serif Bahti- Esiner:2019:TFA yar, Emin Anarim, and M. UfukCaglayan. ¸ A [ED19] Ertem Esiner and An- key agreement protocol witaman Datta. Two- with partial backward factor authentication for confidentiality. Com- trusted third party free puter Networks (Amster- dispersed storage. Future dam, Netherlands: 1999), Generation Computer Sys- 129 (part 1)(??):159–177, tems, 90(??):291–306, Jan- December 24, 2017. CO- uary 2019. CODEN FG- DEN ???? ISSN 1389-1286 SEVI. ISSN 0167-739X (print), 1872-7069 (elec- (print), 1872-7115 (elec- tronic). URL http:// tronic). URL http:// REFERENCES 248

www.sciencedirect.com/ (print), 1873-1228 (elec- science/article/pii/S0167739X17322859. tronic). URL http:// www.sciencedirect.com/ Edwards:2014:NRP science/article/pii/S0164121212003317. [Edw14] Chris Edwards. News: Re- Espitau:2018:LAF searchers probe security through obscurity. Com- [EFGT18] Thomas Espitau, Pierre- munications of the As- Alain Fouque, Benoˆıt sociation for Computing G´erard, and Mehdi Ti- Machinery, 57(8):11–13, bouchi. Loop-abort faults August 2014. CODEN on lattice-based signature CACMA2. ISSN 0001-0782 schemes and key exchange (print), 1557-7317 (elec- protocols. IEEE Trans- tronic). actions on Computers,67 (11):1535–1549, Novem- Edwards:2017:NSQ ber 2018. CODEN IT- [Edw17] Chris Edwards. News: COB4. ISSN 0018-9340 Secure quantum commu- (print), 1557-9956 (elec- nications. Communica- tronic). URL https: tions of the Association //ieeexplore.ieee.org/ for Computing Machin- document/8354897/. ery, 60(2):15–17, Febru- Eisenbarth:2012:CIP ary 2017. CODEN CACMA2. ISSN 0001-0782 [EGG+12] Thomas Eisenbarth, Zheng (print), 1557-7317 (elec- Gong, Tim G¨uneysu, Ste- tronic). URL http:// fan Heyse, and Sebasti- cacm.acm.org/magazines/ aan Indesteege. Com- 2017/2/212424/fulltext. pact implementation and performance evaluation of El-Emam:2013:NSA block ciphers in ATtiny de- [EEAZ13] Nameer N. El-Emam and vices. Lecture Notes in Rasheed Abdul Shaheed Computer Science, 7374: Al-Zubidy. New steganog- 172–187, 2012. CO- raphy algorithm to con- DEN LNCSD9. ISSN ceal a large amount of 0302-9743 (print), 1611- secret message using hy- 3349 (electronic). URL brid adaptive neural net- http://link.springer. works with modified adap- com/chapter/10.1007/978- tive genetic algorithm. The 3-642-31410-0_11/. Journal of Systems and El-Hadedy:2019:RPR Software, 86(6):1465–1481, June 2013. CODEN JS- [EHKSS19] Mohamed El-Hadedy, Amit SODM. ISSN 0164-1212 Kulkarni, Dirk Stroobandt, REFERENCES 249

and Kevin Skadron. Reco- with public verifiabil- Pi: a reconfigurable cryp- ity from simple assump- toprocessor for π-cipher. tions and its implemen- Journal of Parallel and tations. The Computer Distributed Computing, Journal, 62(4):614–630, 133(??):420–431, Novem- April 2019. CODEN CM- ber 2019. CODEN JPD- PJA6. ISSN 0010-4620 CER. ISSN 0743-7315 (print), 1460-2067 (elec- (print), 1096-0848 (elec- tronic). URL http:// tronic). URL http:// academic.oup.com/comjnl/ www.sciencedirect.com/ article/62/4/614/5263983. science/article/pii/S0743731517301636. Engels:2013:NLL Eisenbarth:2010:CCE [EKP+13] Susanne Engels, Elif Bilge [Eis10] Thomas Eisenbarth. Cryp- Kavun, Christof Paar, tography and cryptanal- Tolga Yalcin, and Hristina ysis for embedded sys- Mihajloska. A non-linear/ tems, volume 11 of IT- linear instruction set exten- Security. Europ¨aischer sion for lightweight ciphers. Universit¨atsverlag, Berlin, In IEEE [IEE13], pages 67– Germany, 2010. ISBN 3- 75. ISBN 0-7695-4957-8. 89966-344-6. xiv + 193 pp. ISSN 1063-6889. LCCN LCCN ???? QA76.9.C62 S95 2013. Esiner:2016:FFB Elbirt:2009:UAC [EKB+16] Ertem Esiner, Adilet Kach- keev, Samuel Braunfeld, [Elb09] Adam J. Elbirt. Un- Alptekin K¨up¸c¨u, and derstanding and Applying Oznur¨ Ozkasap.¨ FlexD- Cryptography and Data Se- PDP: Flexlist-based opti- curity. CRC Press, 2000 mized dynamic provable N.W. Corporate Blvd., data possession. ACM Boca Raton, FL 33431- Transactions on Storage, 9868, USA, 2009. ISBN 1- 12(4):23:1–23:??, August 4200-6160-7. xxvii + 637 2016. CODEN ???? ISSN pp. LCCN QA76.9.A25 1553-3077 (print), 1553- E43 2009. URL http: 3093 (electronic). //www.loc.gov/catdir/ toc/ecip0821/2008028154. Emura:2019:PPA html. [EKOS19] Keita Emura, Hayato ElBansarkhani:2012:ELB Kimura, Toshihiro Ohi- gashi, and Tatsuya Suzuki. [EM12] Rachid El Bansarkhani Privacy-preserving aggre- and Mohammed Meziani. gation of time-series data An efficient lattice-based REFERENCES 250

secret sharing construc- on Architecture and Code tion. Lecture Notes in Optimization, 13(1):10:1– Computer Science, 7322: 10:??, April 2016. CO- 160–168, 2012. CO- DEN ???? ISSN 1544-3566 DEN LNCSD9. ISSN (print), 1544-3973 (elec- 0302-9743 (print), 1611- tronic). 3349 (electronic). URL http://link.springer. Eberz:2016:LLE com/chapter/10.1007/978- [ERLM16] Simon Eberz, Kasper B. 3-642-30955-7_14/. Rasmussen, Vincent Lenders, Embar:2014:PWO and Ivan Martinovic. Looks like Eve: Exposing insider [EMW14] Maya Embar, Louis F. threats using eye move- McHugh IV, and William R. ment biometrics. ACM Wesselman. Printer water- Transactions on Privacy mark obfuscation. In Pro- and Security (TOPS),19 ceedings of the 3rd Annual (1):1:1–1:??, August 2016. Conference on Research CODEN ???? ISSN 2471- in Information Technol- 2566 (print), 2471-2574 ogy, RIIT ’14, pages 15–20. (electronic). ACM Press, New York, NY 10036, USA, 2014. ISBN 1- El-Razouk:2015:NHI 4503-2711-7. [ERRMG15] H. El-Razouk, A. Reyhani- English:2015:SME Masoleh, and Guang Gong. [Eng15] Rosanne English. Simulat- New hardware implemen- ing and modelling the effec- tations of WG and WG- tiveness of graphical pass- StreamCiphers using poly- word intersection attacks. nomial basis. IEEE Trans- Concurrency and Compu- actions on Computers,64 tation: Practice and Expe- (7):2020–2035, July 2015. rience, 27(12):3089–3107, CODEN ITCOB4. ISSN August 25, 2015. CODEN 0018-9340 (print), 1557- CCPEBO. ISSN 1532-0626 9956 (electronic). (print), 1532-0634 (elec- Estebanez:2014:PMC tronic). Evtyushkin:2016:UMC [ESRI14] C´esar Est´ebanez, Yago Saez, Gustavo Recio, and [EPAG16] Dmitry Evtyushkin, Dmitry Pedro Isasi. Performance Ponomarev, and Nael Abu- of the most common non- Ghazaleh. Understanding cryptographic hash func- and mitigating covert chan- tions. Software—Practice nels through branch predic- and Experience, 44(6):681– tors. ACM Transactions 698, June 2014. CODEN REFERENCES 251

SPEXBL. ISSN 0038-0644 https://www.computer. (print), 1097-024X (elec- org/csdl/mags/sp/2017/ tronic). 03/msp2017030030-abs. html. Engels:2012:HLA Everett:2012:EC [ESS12] Daniel Engels, Markku- Juhani O. Saarinen, and [Eve12] Bernard Everett. The en- Peter Schweitzer. The cryption conundrum. Net- Hummingbird-2 lightweight work Security, 2012(4):15– authenticated encryption 18, April 2012. CODEN algorithm. Lecture Notes NTSCF5. ISSN 1353-4858 in Computer Science, 7055: (print), 1872-9371 (elec- 19–31, 2012. CODEN tronic). URL http:// LNCSD9. ISSN 0302-9743 www.sciencedirect.com/ (print), 1611-3349 (elec- science/article/pii/S1353485812700272. tronic). URL http:// link.springer.com/chapter/ Everett:2016:SES 10.1007/978-3-642-25286- 0_2/. [Eve16] Cath Everett. Should encryption software be Ebadi:2015:DPN banned? Network Se- [ESS15] Hamid Ebadi, David Sands, curity, 2016(8):14–17, Au- and Gerardo Schneider. gust 2016. CODEN Differential privacy: Now NTSCF5. ISSN 1353-4858 it’s getting personal. ACM (print), 1872-9371 (elec- SIGPLAN Notices, 50(1): tronic). URL http:// 69–81, January 2015. CO- www.sciencedirect.com/ DEN SINODQ. ISSN 0362- science/article/pii/S1353485816300782. 1340 (print), 1523-2867 Eibach:2010:OGB (print), 1558-1160 (elec- tronic). [EVP10] Tobias Eibach, Gunnar Essex:2017:DDU V¨olkel, and Enrico Pilz. Optimising Gr¨obner bases [Ess17] Aleksander Essex. Detect- on Bivium. Mathematics ing the detectable: Un- in Computer Science, 3(2): intended consequences of 159–172, April 2010. CO- cryptographic election ver- DEN ???? ISSN 1661- ification. IEEE Secu- 8270 (print), 1661-8289 rity & Privacy, 15(3): (electronic). URL http:/ 30–38, May/June 2017. /www.springerlink.com/ CODEN ???? ISSN openurl.asp?genre=article& 1540-7993 (print), 1558- issn=1661-8270&volume= 4046 (electronic). URL 3&issue=2&spage=159. REFERENCES 252

Eldib:2014:FVS www.sciencedirect.com/ science/article/pii/S0020019014001537. [EWS14] Hassan Eldib, Chao Wang, and Patrick Schaumont. Emmart:2018:FME Formal verification of [EZW18] Niall Emmart, Fangyu software countermeasures Zhengt, and Charles Weems. against side-channel at- Faster modular exponenti- tacks. ACM Transac- ation using double preci- tions on Software En- sion floating point arith- gineering and Methodol- metic on the GPU. In ogy, 24(2):11:1–11:??, De- Tenca and Takagi [TT18], cember 2014. CODEN pages 130–137. ISBN ATSMER. ISSN 1049- 1-5386-2612-8 (USB), 1- 331X (print), 1557-7392 5386-2665-9. ISSN 2576- (electronic). 2265. LCCN QA76.9.C62. Eyal:2017:BTT IEEE catalog number CFP18121-USB. [Eya17] Ittay Eyal. Blockchain Farash:2014:ECC technology: Transform- ing libertarian cryptocur- [FA14a] Mohammad Sabzinejad rency dreams to finance Farash and Mahmoud Ah- and banking realities. madian Attari. An efficient Computer, 50(9):38–49, client–client password-based September 2017. CO- authentication scheme with DEN CPTRB4. ISSN provable security. The 0018-9162 (print), 1558- Journal of Supercomputing, 0814 (electronic). URL 70(2):1002–1022, Novem- https://www.computer. ber 2014. CODEN JO- org/csdl/mags/co/2017/ SUED. ISSN 0920-8542 09/mco2017090038-abs. (print), 1573-0484 (elec- html. tronic). URL http:// Enos:2015:IBS link.springer.com/article/ 10.1007/s11227-014-1273- [EZ15] Graham Enos and Yu- z. liang Zheng. An ID- Farash:2014:SEI based signcryption scheme with compartmented secret [FA14b] Mohammad Sabzinejad sharing for unsigncryp- Farash and Mahmoud Ah- tion. Information Process- madian Attari. A secure ing Letters, 115(2):128– and efficient identity-based 133, February 2015. CO- authenticated key ex- DEN IFPLAT. ISSN 0020- change protocol for mobile 0190 (print), 1872-6119 client-server networks. The (electronic). URL http:// Journal of Supercomputing, REFERENCES 253

69(1):395–411, July 2014. New York, New York, 2017. CODEN JOSUED. ISSN ISBN 0-06-243048-3 (hard- 0920-8542 (print), 1573- cover). xvi + 444 pp. 0484 (electronic). URL LCCN Z103.4.U6. http://link.springer. Fairley:2019:EWC com/article/10.1007/s11227- 014-1170-5. [Fai19] P. Fairley. Ethereum will Fahd:2018:CPA cut back its absurd en- ergy use. IEEE Spectrum, [FAA+18] Shah Fahd, Mehreen Afzal, 56(1):29–32, January 2019. Haider Abbas, Waseem CODEN IEESAM. ISSN Iqbal, and Salman Wa- 0018-9235 (print), 1939- heed. Correlation power 9340 (electronic). analysis of modes of en- Farash:2014:CIE cryption in AES and its countermeasures. Fu- [Far14] Mohammad Sabzinejad ture Generation Computer Farash. Cryptanalysis and Systems, 83(??):496–509, improvement of an effi- June 2018. CODEN FG- cient mutual authentica- SEVI. ISSN 0167-739X tion RFID scheme based (print), 1872-7115 (elec- on elliptic curve cryptogra- tronic). URL https:// phy. The Journal of Su- www.sciencedirect.com/ percomputing, 70(2):987– science/article/pii/S0167739X17311822. 1001, November 2014. CO- Faal:2019:MVE DEN JOSUED. ISSN 0920-8542 (print), 1573- [Faa19] Hossein Teimoori Faal. A 0484 (electronic). URL multiset version of even- http://link.springer. odd permutations iden- com/article/10.1007/s11227- tity. International Jour- 014-1272-0. nal of Foundations of Com- Fay:2016:ICM puter Science (IJFCS),30 (5):683–691, August 2019. [Fay16] Robin Fay. Introduc- ISSN 0129-0541. URL ing the counter mode of https://www.worldscientific. operation to Compressed com/doi/10.1142/S0129054119500163. Sensing based encryp- Fagone:2017:WWS tion. Information Process- ing Letters, 116(4):279– [Fag17] Jason Fagone. The woman 283, April 2016. CODEN who smashed codes: a true IFPLAT. ISSN 0020-0190 story of love, spies, and (print), 1872-6119 (elec- the unlikely heroine who tronic). URL http:// outwitted America’s ene- www.sciencedirect.com/ mies. Dey Street Books, science/article/pii/S0020019015001945. REFERENCES 254

Fischlin:2012:PKC password client. IEEE Se- curity & Privacy, 9(2):27– [FBM12] Marc Fischlin, Johannes 34, March/April 2011. CO- Buchmann, and Mark DEN ???? ISSN 1540-7993 Manulis, editors. Public (print), 1558-4046 (elec- Key Cryptography — PKC tronic). 2012: 15th International Conference on Practice Fang:2019:PPO and Theory in Public Key + Cryptography, Darmstadt, [FDY 19] Hongyu Fang, Sai Santosh Germany, May 21–23. Dayapule, Fan Yao, Miloˇs Proceedings, volume 7293 Doroslovaˇcki, and Guru of Lecture Notes in Com- Venkataramani. PrO- puter Science. Springer- DACT: Prefetch-obfuscator Verlag, Berlin, Germany / to defend against cache Heidelberg, Germany / timing channels. Interna- London, UK / etc., 2012. tional Journal of Parallel CODEN LNCSD9. ISBN Programming, 47(4):571– 3-642-30056-1. ISSN 0302- 594, August 2019. CODEN 9743 (print), 1611-3349 IJPPE5. ISSN 0885-7458 (electronic). URL http:/ (print), 1573-7640 (elec- /www.springerlink.com/ tronic). content/978-3-642-30056- Fehr:2010:QC 1. Ferretti:2014:DCI [Feh10] Serge Fehr. Quantum cryptography. Founda- [FCM14] Luca Ferretti, Michele tions of Physics, 40(5): Colajanni, and Mirco 494–531, May 2010. CO- Marchetti. Distributed, DEN FNDPA4. ISSN concurrent, and indepen- 0015-9018 (print), 1572- dent access to encrypted 9516 (electronic). URL cloud databases. IEEE http://link.springer. Transactions on Parallel com/article/10.1007/s10701- and Distributed Systems, 010-9408-4. 25(2):437–446, February Feigenbaum:2019:PSE 2014. CODEN ITDSEO. ISSN 1045-9219 (print), [Fei19] Joan Feigenbaum. Pri- 1558-2183 (electronic). vacy and security: En- Fuglerud:2011:SIA cryption and surveillance. Communications of the [FD11] Kristin Fuglerud and Øys- Association for Comput- tein Dale. Secure and in- ing Machinery, 62(5):27– clusive authentication with 29, May 2019. CO- a talking mobile one-time- DEN CACMA2. ISSN REFERENCES 255

0001-0782 (print), 1557- Fan:2019:OVG 7317 (electronic). URL https://cacm.acm.org/ [FG19] Hua Fan and Wojciech Go- magazines/2019/5/236419/ lab. Ocean Vista: gossip- fulltext. based visibility control for speedy geo-distributed Felten:2013:LBA transactions. Proceed- ings of the VLDB Endow- [Fel13] Edward Felten. The ment, 12(11):1471–1484, Linux backdoor attempt July 2019. CODEN ???? of 2003. Web site., ISSN 2150-8097. 2013. URL https:// freedom-to-tinker.com/ Feng:2010:CTS blog/felten/the-linux- backdoor-attempt-of-2003/[FGM10] Tao Feng, Yongguo Gao, . and Jianfeng Ma. Change- able threshold signature Faugere:2010:CLR scheme based on lattice theory. In IEEE, ed- [FES10] Jean-Charles Faug`ere, Mo- itor, Proceedings of the hab Safey El Din, and 2010 International Confer- Pierre-Jean Spaenlehauer. ence on E-Business and Computing loci of rank de- E-Government (ICEE), fects of linear matrices us- Guangzhou, China, 7–9 ing Gr¨obner bases and ap- May 2010. IEEE Computer plications to cryptology. In Society Press, 1109 Spring Watt [Wat10], pages 257– Street, Suite 300, Silver 264. ISBN 1-4503-0150-9. Spring, MD 20910, USA, LCCN QA76.95 .I59 2010. 2010. ISBN 0-7695-3997-1. Fleischmann:2012:MFA LCCN ???? URL http: //ieeexplore.ieee.org/ [FFL12] Ewan Fleischmann, Chris- servlet/opac?punumber= tian Forler, and Stefan 5589107. Lucks. McOE: a fam- Farras:2012:LTM ily of almost foolproof on- line authenticated encryp- [FGMP12] Oriol Farr`as, Ignacio Gra- tion schemes. Lecture cia, Sebasti`a Mart´ın, and Notes in Computer Sci- Carles Padr´o. Linear ence, 7549:196–215, 2012. threshold multisecret shar- CODEN LNCSD9. ISSN ing schemes. Informa- 0302-9743 (print), 1611- tion Processing Letters, 112 3349 (electronic). URL (17–18):667–673, Septem- http://link.springer. ber 30, 2012. CODEN IF- com/chapter/10.1007/978- PLAT. ISSN 0020-0190 3-642-34047-5_12/. (print), 1872-6119 (elec- REFERENCES 256

tronic). URL http:// CODEN IEANEP. ISSN www.sciencedirect.com/ 1063-6692 (print), 1558- science/article/pii/S0020019012001378. 2566 (electronic). Faugere:2014:MCA Fan:2013:CPP

[FGPGP14] Jean-Charles Faug`ere, Domingo[FH13] Chun-I Fan and Shi-Yuan G´omez-P´erez, Jaime Gutier- Huang. Controllable pri- rez, and Ludovic Perret. vacy preserving search Mathematical and com- based on symmetric pred- puter algebra techniques icate encryption in cloud in cryptology. Journal of storage. Future Gener- Symbolic Computation,64 ation Computer Systems, (??):1–2, August 2014. CO- 29(7):1716–1724, Septem- DEN JSYCEH. ISSN 0747- ber 2013. CODEN FG- 7171 (print), 1095-855X SEVI. ISSN 0167-739X (electronic). URL http:// (print), 1872-7115 (elec- www.sciencedirect.com/ tronic). URL http:// science/article/pii/S0747717113001673. www.sciencedirect.com/ science/article/pii/S0167739X1200101X. Fan:2017:SSP Fan:2010:PSN [FGR+17] Jingyuan Fan, Chaowen Guan, Kui Ren, Yong [FHH10a] Chun-I Fan, Pei-Hsiu Ho, Cui, and Chunming Qiao. and Ruei-Hau Hsu. Prov- SPABox: Safeguarding pri- ably secure nested one- vacy during deep packet time secret mechanisms inspection at a Middle- for fast mutual authenti- Box. IEEE/ACM Trans- cation and key exchange actions on Networking,25 in mobile communications. (6):3753–3766, December IEEE/ACM Transactions 2017. CODEN IEANEP. on Networking, 18(3):996– ISSN 1063-6692 (print), 1009, June 2010. CODEN 1558-2566 (electronic). IEANEP. ISSN 1063-6692 (print), 1558-2566 (elec- Fan:2018:MBP tronic). [FGRQ18] Jingyuan Fan, Chaowen Fan:2010:AMI Guan, Kui Ren, and Chun- ming Qiao. Middlebox- [FHH10b] Chun-I Fan, Ling-Ying based packet-level redun- Huang, and Pei-Hsiu Ho. dancy elimination over Anonymous multireceiver encrypted network traf- identity-based encryption. fic. IEEE/ACM Transac- IEEE Transactions on tions on Networking, 26(4): Computers, 59(9):1239– 1742–1753, August 2018. 1249, September 2010. CO- REFERENCES 257

DEN ITCOB4. ISSN 0018- Hellman key exchange pro- 9340 (print), 1557-9956 tocol. IEEE Transac- (electronic). URL http: tions on Computers,67 //ieeexplore.ieee.org/ (11):1622–1636, Novem- stamp/stamp.jsp?tp=&arnumber= ber 2018. CODEN IT- 5396332. COB4. ISSN 0018-9340 Farras:2017:IRN (print), 1557-9956 (elec- tronic). URL https: [FHKP17] Oriol Farr`as, Torben Brandt //ieeexplore.ieee.org/ Hansen, Tarik Kaced, and document/8100879/. Carles Padr´o. On the infor- mation ratio of non-perfect Forne:2010:PAA secret sharing schemes. [FHM+10] Jordi Forn´e, Francisca Algorithmica, 79(4):987– Hinarejos, Andr´es Mar´ın, 1013, December 2017. CO- Florina Almen´arez, Javier DEN ALGOEJ. ISSN Lopez, Jose A. Montene- 0178-4617 (print), 1432- gro, Marc Lacoste, and 0541 (electronic). Daniel D´ıaz. Pervasive Faz-Hernandez:2019:HPI authentication and autho- rization infrastructures for [FHLD19] Armando Faz-Hern´andez, mobile users. Comput- Julio L´opez, and Ri- ers & Security, 29(4):501– cardo Dahab. High- 514, June 2010. CODEN performance implementa- CPSEDU. ISSN 0167-4048 tion of elliptic curve cryp- (print), 1872-6208 (elec- tography using vector in- tronic). URL https:// structions. ACM Trans- www.sciencedirect.com/ actions on Mathematical science/article/pii/S0167404809000911. Software, 45(3):25:1–25:??, July 2019. CODEN ACM- Fahl:2012:WEM SCU. ISSN 0098-3500 (print), 1557-7295 (elec- [FHM+12] Sascha Fahl, Marian Har- tronic). URL https://dl. bach, Thomas Muders, acm.org/citation.cfm? Lars Baumg¨artner, Bernd id=3309759. Freisleben, and Matthew Faz-Hernandez:2018:FSI Smith. Why Eve and Mallory love Android: An [FHLOJRH18] Armando Faz-Hern´andez, analysis of Android SSL Julio L´opez, Eduardo (in)security. In ????, ed- Ochoa-Jim´enez, and Fran- itor, ACM Conference on cisco Rodr´ıguez-Henr´ıquez. Computer and Communi- A faster software imple- cations Security, pages 50– mentation of the super- 61. ACM Press, New York, singular isogeny Diffie– NY 10036, USA, 2012. REFERENCES 258

ISBN ???? LCCN ???? Feng:2018:ABB URL ????. [FHZW18] Qi Feng, Debiao He, Fan:2014:ASA Sherali Zeadally, and [FHR14] Chun-I Fan, Vincent Shi- Huaqun Wang. Anony- Ming Huang, and He-Ming mous biometrics-based au- Ruan. Arbitrary-state thentication scheme with attribute-based encryption key distribution for mobile with dynamic member- multi-server environment. ship. IEEE Transactions Future Generation Com- on Computers, 63(8):1951– puter Systems, 84(??):239– 1961, August 2014. CO- 251, July 2018. CODEN DEN ITCOB4. ISSN 0018- FGSEVI. ISSN 0167-739X 9340 (print), 1557-9956 (print), 1872-7115 (elec- (electronic). tronic). URL https:// www.sciencedirect.com/ Fawzi:2013:LDN science/article/pii/S0167739X17309020. [FHS13] Omar Fawzi, Patrick Hay- Fidler:2018:CCN den, and Pranab Sen. From low-distortion norm em- [Fid18] Bradley Fidler. Cryptog- beddings to explicit uncer- raphy, capitalism, and na- tainty relations and effi- tional security. IEEE An- cient information locking. nals of the History of Com- Journal of the ACM,60 puting, 40(4):80–84, Octo- (6):44:1–44:??, November ber/December 2018. CO- 2013. CODEN JACOAH. DEN IAHCEX. ISSN 1058- ISSN 0004-5411 (print), 6180 (print), 1934-1547 1557-735X (electronic). (electronic). URL https: //ieeexplore.ieee.org/ Florencio:2016:PSD document/8620680/. [FHV16] Dinei Florˆencio, Cormac Farash:2015:PSE Herley, and Paul C. Van Oorschot. Pushing on [FIO15] Mohammad Sabzinejad string: the ‘don’t care’ re- Farash, Sk Hafizul Is- gion of password strength. lam, and Mohammad S. Communications of the As- Obaidat. A provably se- sociation for Computing cure and efficient two- Machinery, 59(11):66–74, party password-based ex- November 2016. CODEN plicit authenticated key ex- CACMA2. ISSN 0001-0782 change protocol resistance (print), 1557-7317 (elec- to password guessing at- tronic). URL http:// tacks. Concurrency and cacm.acm.org/magazines/ Computation: Practice and 2016/11/209115/fulltext. Experience, 27(17):4897– REFERENCES 259

4913, December 10, 2015. www.sciencedirect.com/ CODEN CCPEBO. ISSN science/article/pii/S0304397519306462. 1532-0626 (print), 1532- 0634 (electronic). Fanti:2015:SVS

Fisher:2015:CS [FKOV15] Giulia Fanti, Peter Kairouz, Sewoong Oh, and Pramod [Fis15] Charles Fisher. Cipher se- Viswanath. Spy vs. spy: curity. Linux Journal, 2015 Rumor source obfuscation. (257):2:1–2:??, Septem- ACM SIGMETRICS Per- ber 2015. CODEN LI- formance Evaluation Re- JOFX. ISSN 1075-3583 view, 43(1):271–284, June (print), 1938-3827 (elec- 2015. CODEN ???? ISSN tronic). URL http:// 0163-5999 (print), 1557- dl.acm.org/ft_gateway. 9484 (electronic). cfm?id=2846057. Fehr:2013:FCC Fei:2012:GTK [FKS+13] Serge Fehr, Jonathan [FJHJ12] Han Fei, Qin Jing, Zhao Katz, Fang Song, Hong- Huawei, and Hu Jiankun. Sheng Zhou, and Vas- A general transformation silis Zikas. Feasibility from KP-ABE to search- and completeness of cryp- able encryption. Lecture tographic tasks in the Notes in Computer Sci- quantum world. Lecture ence, 7672:165–178, 2012. Notes in Computer Sci- CODEN LNCSD9. ISSN ence, 7785:281–296, 2013. 0302-9743 (print), 1611- CODEN LNCSD9. ISSN 3349 (electronic). URL 0302-9743 (print), 1611- http://link.springer. 3349 (electronic). URL com/chapter/10.1007/978- http://link.springer. 3-642-35362-8_14/. com/chapter/10.1007/978- 3-642-36594-2_16/. Fotiadis:2019:TRF Fan:2013:CEM [FK19] Georgios Fotiadis and Elisavet Konstantinou. [FLH13] Chun-I Fan, Yi-Hui Lin, TNFS resistant families and Ruei-Hau Hsu. Com- of pairing-friendly ellip- plete EAP method: User tic curves. Theoretical efficient and forward se- Computer Science, 800 cure authentication proto- (??):73–89, December 31, col for IEEE 802.11 wire- 2019. CODEN TC- less LANs. IEEE Trans- SCDI. ISSN 0304-3975 actions on Parallel and (print), 1879-2294 (elec- Distributed Systems, 24(4): tronic). URL http:// 672–680, April 2013. CO- REFERENCES 260

DEN ITDSEO. ISSN 1045- http://link.springer. 9219. com/chapter/10.1007/978- Fan:2014:RRS 3-642-30598-6_6/. [FLL+14] Kai Fan, Jie Li, Hui Li, Xi- Fei:2016:PPA aohui Liang, Xuemin (Sher- [FLYL16a] Xiongwei Fei, Kenli Li, man) Shen, and Yin- Wangdong Yang, and Ke- tang Yang. RSEL: re- qin Li. Practical par- vocable secure efficient allel AES algorithms on lightweight RFID authen- cloud for massive users and tication scheme. Concur- their performance evalu- rency and Computation: ation. Concurrency and Practice and Experience, Computation: Practice and 26(5):1084–1096, April 10, Experience, 28(16):4246– 2014. CODEN CCPEBO. 4263, November 2016. CO- ISSN 1532-0626 (print), DEN CCPEBO. ISSN 1532-0634 (electronic). 1532-0626 (print), 1532- Ferguson:2010:SHF 0634 (electronic). [FLS+10] Niels Ferguson, Stefan Fei:2016:SEF Lucks, Bruce Schneier, Doug Whiting, Mihir Bel- [FLYL16b] Xiongwei Fei, Kenli Li, lare, Tadayoshi Kohno, Jon Wangdong Yang, and Ke- Callas, and Jesse Walker. qin Li. A secure and effi- The Skein hash function cient file protecting system family. Report, (various), based on SHA3 and paral- October 1, 2010. ii + vi lel AES. Parallel Comput- + 92 pp. URL http:// ing, 52(??):106–132, Febru- en.wikipedia.org/wiki/ ary 2016. CODEN PA- Skein_(hash_function) COEJ. ISSN 0167-8191 ; http://www.skein- (print), 1872-7336 (elec- hash.info/sites/default/ tronic). URL http:// files/skein1.3.pdf. www.sciencedirect.com/ science/article/pii/S0167819116000028. Forler:2012:DAC Feng:2012:CAO [FLW12] Christian Forler, Stefan Lucks, and Jakob Wenzel. [FLZ+12] Hui Feng, Hefei Ling, Designing the API for a Fuhao Zou, Weiqi Yan, and cryptographic library. Lec- Zhengding Lu. A collusion ture Notes in Computer attack optimization strat- Science, 7308:75–88, 2012. egy for digital fingerprint- CODEN LNCSD9. ISSN ing. ACM Transactions 0302-9743 (print), 1611- on Multimedia Comput- 3349 (electronic). URL ing, Communications, and REFERENCES 261

Applications, 8(2S):36:1– Internet of Things. Pro- 36:??, September 2012. ceedings of the ACM on CODEN ???? ISSN 1551- Interactive, Mobile, Wear- 6857 (print), 1551-6865 able and Ubiquitous Tech- (electronic). nologies (IMWUT), 3(1): 1–38, March 2019. CODEN Fallahpour:2015:AWB ???? ISSN 2474-9567 (elec- [FM15] M. Fallahpour and D. Megias. tronic). URL https:// Audio watermarking based dl.acm.org/doi/abs/10. on Fibonacci numbers. 1145/3314397. IEEE/ACM Transactions Farwa:2018:FAI on Audio, Speech, and Lan- guage Processing, 23(8): [FMB+18] Shabieh Farwa, Nazeer 1273–1282, August 2015. Muhammad, Nargis Bibi, CODEN ???? ISSN 2329- Sajjad A. Haider, Syed R. 9290. Naqvi, and Sheraz Anjum. Ferrag:2018:SCN Fresnelet approach for im- age encryption in the al- [FMA+18] Mohamed Amine Ferrag, gebraic frame. Applied Leandros Maglaras, Anto- Mathematics and Com- nios Argyriou, Dimitrios putation, 334(??):343–355, Kosmanos, and Helge Jan- October 1, 2018. CODEN icke. Security for 4G AMHCBQ. ISSN 0096- and 5G cellular networks: 3003 (print), 1873-5649 a survey of existing au- (electronic). URL http:// thentication and privacy- www.sciencedirect.com/ preserving schemes. Jour- science/article/pii/S0096300318302868. nal of Network and Com- See retraction notice [?]. puter Applications, 101 (??):55–82, January 1, Ferretti:2019:FBS 2018. CODEN JN- [FMC19] Luca Ferretti, Mirco Marchetti, CAF3. ISSN 1084-8045 and Michele Colajanni. (print), 1095-8592 (elec- Fog-based secure communi- tronic). URL http:// cations for low-power IoT www.sciencedirect.com/ devices. ACM Transac- . science/article/pii/S1084804517303521 tions on Internet Technol- Fomichev:2019:PZI ogy (TOIT), 19(2):27:1– 27:??, April 2019. CO- [FMA+19] Mikhail Fomichev, Max DEN ???? ISSN 1533-5399 Maass, Lars Almon, Ale- (print), 1557-6051 (elec- jandro Molina, and Matthias tronic). URL https:// Hollick. Perils of zero- dl.acm.org/ft_gateway. interaction security in the cfm?id=3284554. REFERENCES 262

Faust:2014:CNM 14/multilevel_steganography_ improving_hidden. [FMNV14] Sebastian Faust, Pratyay Mukherjee, Jesper Buus Fernandez-Mir:2012:SRA Nielsen, and Daniele Ven- [FMTR12] Albert Fern`andez-Mir and turi. Continuous non- Rolando Trujillo-Rasua. malleable codes. Lecture A scalable RFID au- Notes in Computer Sci- thentication protocol sup- ence, 8349:465–488, 2014. porting ownership trans- CODEN LNCSD9. ISSN fer and controlled delega- 0302-9743 (print), 1611- tion. Lecture Notes in 3349 (electronic). URL Computer Science, 7055: http://link.springer. 147–162, 2012. CO- com/chapter/10.1007/978- DEN LNCSD9. ISSN 3-642-54242-8_20/. 0302-9743 (print), 1611- Feng:2012:USD 3349 (electronic). URL http://link.springer. [FMS12a] XiaoXiao Feng, Koichi com/chapter/10.1007/978- Matsumoto, and Shigeo 3-642-25286-0_10/. Sugimoto. Uncovering the Ferreira:2015:LPA secrets of Daoism Fus using digital Dao-Fa Hui-Yuan. [FNP+15] Anselmo Ferreira, Luiz C. Lecture Notes in Computer Navarro, Giuliano Pin- Science, 7634:1–10, 2012. heiro, Jefersson A. dos San- CODEN LNCSD9. ISSN tos, and Anderson Rocha. 0302-9743 (print), 1611- Laser printer attribution: 3349 (electronic). URL Exploring new features and http://link.springer. beyond. Forensic Sci- com/chapter/10.1007/978- ence International, 247 3-642-34752-8_1/. (0):105–125, 2015. ISSN 0379-0738. URL http:// Fraczek:2012:MSI www.sciencedirect.com/ [FMS12b] W. Fraczek, W. Mazur- science/article/pii/S0379073814005064. czyk, and K. Szczypiorski. See also [?]. Multilevel steganography: Fu:2018:LUA Improving hidden com- munication in networks. [FNWL18] Xingbing Fu, Xuyun Nie, J.UCS: Journal of Univer- Ting Wu, and Fagen sal Computer Science,18 Li. Large universe at- (14):1967–??, ???? 2012. tribute based access control CODEN ???? ISSN with efficient decryption in 0948-6968. URL http:/ cloud storage system. The /www.jucs.org/jucs_18_ Journal of Systems and REFERENCES 263

Software, 135(??):157–164, College Publishers, New January 2018. CODEN JS- York, NY, USA, 2013. SODM. ISSN 0164-1212 ISBN 0-06-222883-8. xx (print), 1873-1228 (elec- + 363 pp. LCCN P1038 tronic). URL http:// .F69 2013. URL http:// www.sciencedirect.com/ en.wikipedia.org/wiki/ science/article/pii/S0164121217302510. Linear_B_script. Fokkink:2012:TCG Fotiou:2019:NBS

[Fok12] Robbert Fokkink. Tossing [FP19] Nikos Fotiou and George C. coins to guess a secret num- Polyzos. Name-based secu- ber. American Mathemat- rity for information-centric ical Monthly, 119(4):337– networking architectures. 339, April 2012. CODEN Future Internet, 11(11): AMMYAE. ISSN 0002- 232, November 01, 2019. 9890 (print), 1930-0972 CODEN ???? ISSN 1999- (electronic). URL http:/ 5903. URL https://www. /www.jstor.org/stable/ mdpi.com/1999-5903/11/ pdfplus/10.4169/amer. 11/232. math.monthly.119.04.337. Faigl:2014:PEC pdf. Folger:2016:TQH [FPBG14] Zolt´an Faigl, Jani Pel- likka, L´aszl´o Bokor, and [Fol16] Tim Folger. Technology: Andrei Gurtov. Perfor- The quantum hack. Scien- mance evaluation of cur- tific American, 314(2):48– rent and emerging au- 55, February 2016. CO- thentication schemes for DEN SCAMAC. ISSN future 3GPP network 0036-8733 (print), 1946- architectures. Com- 7087 (electronic). URL puter Networks (Amster- http://www.nature.com/ dam, Netherlands: 1999), scientificamerican/journal/ 60(??):60–74, February v314/n2/full/scientificamerican0216- 26, 2014. CODEN 48.html; http://www. ???? ISSN 1389-1286 nature.com/scientificamerican/ (print), 1872-7069 (elec- journal/v314/n2/pdf/scientificamerican0216-tronic). URL http:// 48.pdf. www.sciencedirect.com/ science/article/pii/S1389128613004180. Fox:2013:RLQ Faust:2012:PLR [Fox13] Margalit Fox. The Rid- dle of the Labyrinth: the [FPS12] Sebastian Faust, Krzysztof Quest to Crack an An- Pietrzak, and Joachim cient Code. HarperCollins Schipper. Practical leakage- REFERENCES 264

resilient symmetric cryp- Rossi. Embedding an tography. Lecture Notes identity-based short sig- in Computer Science, 7428: nature as a digital wa- 213–232, 2012. CO- termark. Future Inter- DEN LNCSD9. ISSN net, 7(4):393–404, Octo- 0302-9743 (print), 1611- ber 23, 2015. CODEN 3349 (electronic). URL ???? ISSN 1999-5903. http://link.springer. URL https://www.mdpi. com/chapter/10.1007/978- com/1999-5903/7/4/393. 3-642-33027-8_13/. Fathimal:2016:SSS Fu:2015:TVG [FR16] P. Mohamed Fathimal and [FPY15] Dong Lai Fu, Xin Guang P. Arockia Jansi Rani. K Peng, and Yu Li Yang. out of N secret sharing Trusted validation for ge- scheme for multiple color olocation of cloud data. images with steganography The Computer Journal, and authentication. In- 58(10):2595–2607, Octo- ternational Journal of Im- ber 2015. CODEN CM- age and Graphics (IJIG), PJA6. ISSN 0010-4620 16(2):1650010, April 2016. (print), 1460-2067 (elec- CODEN ???? ISSN 0219- tronic). URL http:// 4678. comjnl.oxfordjournals. Frattolillo:2015:WPP org/content/58/10/2595. [Fra15] Franco Frattolillo. Water- Feng:2018:ALA marking protocols: Prob- [FQZF18] Wei Feng, Yu Qin, Shi- lems, challenges and a pos- jun Zhao, and Dengguo sible solution. The Com- Feng. AAoT: Lightweight puter Journal, 58(4):944– attestation and authentica- 960, April 2015. CODEN tion of low-resource things CMPJA6. ISSN 0010-4620 in IoT and CPS. Com- (print), 1460-2067 (elec- puter Networks (Amster- tronic). URL http:// dam, Netherlands: 1999), comjnl.oxfordjournals. 134(??):167–182, April 7, org/content/58/4/944. 2018. CODEN ???? ISSN Frattolillo:2016:BFM 1389-1286 (print), 1872- 7069 (electronic). URL [Fra16] Franco Frattolillo. A http://www.sciencedirect. buyer-friendly and medi- com/science/article/pii/ ated watermarking proto- S1389128618300471. col for Web context. ACM Fiore:2015:EIB Transactions on the Web (TWEB), 10(2):9:1–9:??, [FR15] Ugo Fiore and Francesco May 2016. CODEN ???? REFERENCES 265

ISSN 1559-1131 (print), Frikken:2010:SMC 1559-114X (electronic). [Fri10b] Keith B. Frikken. Se- Frey:2010:ABC cure Multiparty Computa- [Fre10] Gerhard Frey. The arith- tion, chapter 14, pages 1– metic behind cryptogra- 16. Volume 2 of Atallah phy. Notices of the Amer- and Blanton [AB10b], sec- ican Mathematical Soci- ond edition, 2010. ISBN ety, 57(3):366–374, March 1-58488-820-2. LCCN 2010. CODEN AM- QA76.9.A43 A433 2010. NOAN. ISSN 0002-9920 URL http://www.crcnetbase. (print), 1088-9477 (elec- com/doi/abs/10.1201/9781584888215- tronic). URL http:/ c14. /www.ams.org/notices/ Fridrich:2012:MTS 201003/. [Fri12] Jessica Fridrich. Modern Fernandes:2017:ITS trends in steganography [FREP17] Earlence Fernandes, Amir and steganalysis. Lecture Rahmati, Kevin Eykholt, Notes in Computer Sci- and Atul Prakash. Inter- ence, 7128:1, 2012. CO- net of Things security re- DEN LNCSD9. ISSN search: A rehash of old 0302-9743 (print), 1611- ideas or new intellectual 3349 (electronic). URL challenges? IEEE Se- http://link.springer. curity & Privacy, 15(4): com/accesspage/chapter/ 79–84, July/August 2017. 10.1007/978-3-642-32205- CODEN ???? ISSN 1_1. 1540-7993 (print), 1558- Fritsch:2013:CPE 4046 (electronic). URL https://www.computer. [Fri13] Lothar Fritsch. The clean org/csdl/mags/sp/2017/ privacy ecosystem of the 04/msp2017040079-abs. future Internet. Future html. Internet, 5(1):34–45, Jan- uary 14, 2013. CODEN Fridrich:2010:SDM ???? ISSN 1999-5903. [Fri10a] Jessica Fridrich. Steganog- URL https://www.mdpi. raphy in digital media: com/1999-5903/5/1/34. principles, algorithms, and Fu:2016:EPS applications. Cambridge University Press, Cam- [FRS+16] Zhangjie Fu, Kui Ren, bridge, UK, 2010. ISBN Jiangang Shu, Xingming 0-521-19019-3 (hardcover). Sun, and Fengxiao Huang. xxii + 437 + 4 pp. LCCN Enabling personalized search QA76.9.A25 F75 2010. over encrypted outsourced REFERENCES 266

data with efficiency im- SEVI. ISSN 0167-739X provement. IEEE Trans- (print), 1872-7115 (elec- actions on Parallel and tronic). URL https:// Distributed Systems,27 www.sciencedirect.com/ (9):2546–2559, September science/article/pii/S0167739X17312426. 2016. CODEN ITD- SEO. ISSN 1045-9219 Fang:2011:ICP (print), 1558-2183 (elec- [FSGW11] Liming Fang, Willy Susilo, tronic). URL https:// Chunpeng Ge, and Jian- www.computer.org/csdl/ dong Wang. Interac- trans/td/2016/09/07349214- tive conditional proxy re- abs.html. encryption with fine grain Frauchiger:2013:TRR policy. The Journal of Systems and Software,84 [FRT13] Daniela Frauchiger, Re- (12):2293–2302, Decem- nato Renner, and Matthias ber 2011. CODEN JS- Troyer. True randomness SODM. ISSN 0164-1212 from realistic quantum de- (print), 1873-1228 (elec- vices. arXiv.org, ??(??): tronic). URL http:// ??, November 13, 2013. www.sciencedirect.com/ URL http://arxiv.org/ science/article/pii/S0164121211001579. abs/1311.4547. Forbes:2015:CTC Fang:2012:CCS [FS15] Michael A. Forbes and [FSGW12] Liming Fang, Willy Susilo, Amir Shpilka. Complexity Chunpeng Ge, and Jian- theory column 88: Chal- dong Wang. Chosen- lenges in polynomial fac- ciphertext secure anony- torization. ACM SIGACT mous conditional proxy News, 46(4):32–49, De- re-encryption with key- cember 2015. CODEN word search. Theoret- SIGNDM. ISSN 0163-5700 ical Computer Science, (print), 1943-5827 (elec- 462(1):39–58, November tronic). 30, 2012. CODEN TC- SCDI. ISSN 0304-3975 Fugkeaw:2018:SSA (print), 1879-2294 (elec- [FS18] Somchart Fugkeaw and tronic). URL http:// Hiroyuki Sato. Scalable www.sciencedirect.com/ and secure access con- science/article/pii/S0304397512007906. trol policy update for out- Ferguson:2010:CED sourced big data. Future Generation Computer Sys- [FSK10] Niels Ferguson, Bruce tems, 79 (part 1)(??):364– Schneier, and Tadayoshi 373, 2018. CODEN FG- Kohno. Cryptography En- REFERENCES 267

gineering: Design Prin- identification with re- ciples and Practical Ap- versibility. Lecture Notes plications. John Wiley in Computer Science, 7618: and Sons, Inc., New York, 202–213, 2012. CO- NY, USA, 2010. ISBN 0- DEN LNCSD9. ISSN 470-47424-6 (paperback). 0302-9743 (print), 1611- xxix + 353 pp. LCCN 3349 (electronic). URL QA76.9.A25 F466 2010. http://link.springer. com/chapter/10.1007/978- Feng:2011:GDA 3-642-34129-8_18/. [FSWF11] Xiutao Feng, Zhenqing Shi, Fujioka:2012:SEP Chuankun Wu, and Deng- guo Feng. On guess and [FSX12c] Atsushi Fujioka, Taiichi determine analysis of Rab- Saito, and Keita Xagawa. bit. International Jour- Security enhancements by nal of Foundations of Com- OR-proof in identity-based puter Science (IJFCS),22 identification. Lecture (6):1283–1296, September Notes in Computer Sci- 2011. CODEN IFCSEN. ence, 7341:135–152, 2012. ISSN 0129-0541 (print), CODEN LNCSD9. ISSN 1793-6373 (electronic). 0302-9743 (print), 1611- 3349 (electronic). URL Fujioka:2012:SHI http://link.springer. com/chapter/10.1007/978- [FSX12a] Atsushi Fujioka, Taiichi 3-642-31284-7_9/. Saito, and Keita Xa- gawa. Secure hierarchi- Fadlullah:2010:DCA cal identity-based identifi- [FTV+10] Zubair M. Fadlullah, Tarik cation without random or- Taleb, Athanasios V. Vasi- acles. Lecture Notes in lakos, Mohsen Guizani, Computer Science, 7483: and Nei Kato. DTRAB: 258–273, 2012. CO- combating against at- DEN LNCSD9. ISSN tacks on encrypted proto- 0302-9743 (print), 1611- cols through traffic-feature 3349 (electronic). URL analysis. IEEE/ACM http://link.springer. Transactions on Network- com/chapter/10.1007/978- ing, 18(4):1234–1247, Au- 3-642-33383-5_16/. gust 2010. CODEN Fujioka:2012:SEI IEANEP. ISSN 1063-6692 (print), 1558-2566 (elec- [FSX12b] Atsushi Fujioka, Taiichi tronic). Saito, and Keita Xa- Fuchsbauer:2011:CSV gawa. Security enhance- ment of identity-based [Fuc11] Georg Fuchsbauer. Com- REFERENCES 268

muting signatures and ver- Franken:2019:ECP ifiable encryption. Lecture Notes in Computer Sci- [FVJ19] G. Franken, T. Van ence, 6632:224–245, 2011. Goethem, and W. Joosen. CODEN LNCSD9. ISSN Exposing cookie policy 0302-9743 (print), 1611- flaws through an extensive 3349 (electronic). URL evaluation of browsers and http://link.springer. their extensions. IEEE Se- com/content/pdf/10.1007/ curity & Privacy, 17(4): 978-3-642-20465-4_14. 25–34, July/August 2019. ISSN 1540-7993 (print), Fulton:2010:BRB 1558-4046 (electronic). Fathi-Vajargah:2017:IMC [Ful10] Ben Fulton. Book review: Introduction to Modern [FVK17] Behrouz Fathi-Vajargah Cryptography, by Jonathan and Mohadeseh Kanafchian. Katz and Yehuda Lindell, Improved Markov chain Publisher: Chapman & Monte Carlo method for Hall-CRC 2008 1-58488- cryptanalysis substitution- 551-3. ACM SIGACT transposition cipher. Monte News, 41(4):44–47, De- Carlo Methods and Ap- cember 2010. CODEN plications, 23(2):147–??, SIGNDM. ISSN 0163-5700 June 2017. CODEN MC- (print), 1943-5827 (elec- MAC6. ISSN 0929-9629 tronic). See [KL08]. (print), 1569-3961 (elec- tronic). URL https:// www.degruyter.com/view/ Fanti:2018:DLC j/mcma.2017.23.issue- 2/mcma-2017-0108/mcma- [FVB+18] Giulia Fanti, Shaileshh Bo- 2017-0108.xml. jja Venkatakrishnan, Surya Fiore:2017:PGP Bakshi, Bradley Denby, Shruti Bhargava, An- [FVS17] Dario Fiore, Mar´ıa Is- drew Miller, and Pramod abel Gonz´alez Vasco, and Viswanath. Dandelion++: Claudio Soriente. Par- Lightweight cryptocur- titioned group password- rency networking with for- based authenticated key mal anonymity guarantees. exchange. The Computer ACM SIGMETRICS Per- Journal, 60(12):1912–1922, formance Evaluation Re- December 1, 2017. CO- view, 46(1):5–7, June 2018. DEN CMPJA6. ISSN CODEN ???? ISSN 0163- 0010-4620 (print), 1460- 5999 (print), 1557-9484 2067 (electronic). URL (electronic). https://academic.oup. REFERENCES 269

com/comjnl/article/60/ Systems, 16(2):54:1–54:??, 12/1912/4210211. April 2017. CODEN ???? ISSN 1539-9087 (print), Feng:2013:ECE 1558-3465 (electronic). [FWS13] Jun Feng, Xueming Wang, Feng:2011:VBF and Hong Sun. Effi- ciently computable endo- [FY11] Keqin Feng and Jing Yang. morphism for genus 3 hy- Vectorial Boolean func- perelliptic curve cryptosys- tions with good crypto- tems. Information Process- graphic properties. Inter- ing Letters, 113(12):405– national Journal of Foun- 408, June 30, 2013. CO- dations of Computer Sci- DEN IFPLAT. ISSN 0020- ence (IJFCS), 22(6):1271– 0190 (print), 1872-6119 1282, September 2011. CO- (electronic). URL http:// DEN IFCSEN. ISSN 0129- www.sciencedirect.com/ 0541 (print), 1793-6373 science/article/pii/S0020019013000914. (electronic).

Fanyang:2012:SAK Feng:2019:SHO

[FXP12] Fanyang, Naixue Xiong, [FYD+19] J. Feng, L. T. Yang, and Jong Hyuk Park. G. Dai, W. Wang, and A self-adaptive K selec- D. Zou. A secure high- tion mechanism for re- order Lanczos-based or- authentication load bal- thogonal tensor SVD for ancing in large-scale sys- big data reduction in cloud tems. The Journal of Su- environment. IEEE Trans- percomputing, 61(1):166– actions on Big Data, 5(3): 188, July 2012. CODEN 355–367, September 2019. JOSUED. ISSN 0920- ISSN 2332-7790. 8542 (print), 1573-0484 (electronic). URL http:/ Fan:2015:IRD /www.springerlink.com/ [FYMY15] Xinyu Fan, Guomin Yang, openurl.asp?genre=article& Yi Mu, and Yong Yu. On issn=0920-8542&volume= indistinguishability in re- 61&issue=1&spage=166. mote data integrity check- Fu:2017:DFA ing. The Computer Jour- nal, 58(4):823–830, April [FXP+17] Shan Fu, Guoai Xu, Juan 2015. CODEN CM- Pan, Zongyue Wang, and PJA6. ISSN 0010-4620 An Wang. Differential fault (print), 1460-2067 (elec- attack on ITUbee block ci- tronic). URL http:// pher. ACM Transactions comjnl.oxfordjournals. on Embedded Computing org/content/58/4/823. REFERENCES 270

Fyodorov:2019:SGM and Jingyu Feng. An efficient handover au- [Fyo19] Yan V. Fyodorov. A thentication scheme with spin glass model for recon- privacy preservation for structing nonlinearly en- IEEE 802.16m network. crypted signals corrupted Computers & Security, by noise. Journal of Statis- 31(6):741–749, Septem- tical Physics, 175(5):789– ber 2012. CODEN 818, June 2019. CO- CPSEDU. ISSN 0167-4048 DEN JSTPSB. ISSN (print), 1872-6208 (elec- 0022-4715 (print), 1572- tronic). URL https:// 9613 (electronic). URL www.sciencedirect.com/ http://link.springer. science/article/pii/S0167404812001009. com/content/pdf/10.1007/ s10955-018-02217-9.pdf. GomezPardo:2013:ICM Fan:2013:KIS [G´13] Jos´e Luis G´omez Pardo. Introduction to Cryptogra- [FZT13] J. Fan, Y. Zheng, and phy with Maple. Springer- X. Tang. Key-insulated Verlag, Berlin, Germany / signcryption. J.UCS: Jour- Heidelberg, Germany / nal of Universal Computer London, UK / etc., 2013. Science, 19(10):1351–??, ISBN 3-642-32165-8, 3- ???? 2013. CODEN 642-32166-6. xxx + 705 ???? ISSN 0948-695X pp. LCCN QA76.9.A25 (print), 0948-6968 (elec- G66 2013. URL http:/ tronic). URL http:/ /www.springerlink.com/ /www.jucs.org/jucs_19_ content/978-3-642-32166- 10/key_insulated_signcryption. 5. Fan:2014:NCI Gross-Amblard:2011:QPW [FZT14] Jia Fan, Yuliang Zheng, [GA11] David Gross-Amblard. Query- and Xiaohu Tang. A new preserving watermarking of construction of identity- relational databases and based signcryption without XML documents. ACM random oracles. Interna- Transactions on Database tional Journal of Founda- Systems, 36(1):3:1–3:??, tions of Computer Science March 2011. CODEN (IJFCS), 25(1):1–??, Jan- ATDSD3. ISSN 0362-5915 uary 2014. CODEN IFC- (print), 1557-4644 (elec- SEN. ISSN 0129-0541. tronic). Fu:2012:EHA Grondahl:2019:TAA [FZZ+12] Anmin Fu, Yuqing Zhang, [GA19] Tommi Gr¨ondahl and Zhenchao Zhu, Qi Jing, N. Asokan. Text analysis in REFERENCES 271

adversarial settings: Does lam, Neeraj Kumar, and deception leave a stylis- Vinod Kumar Bhalla. tic trace? ACM Com- Lightweight and privacy- puting Surveys, 52(3):45:1– preserving RFID authen- 45:??, July 2019. CODEN tication scheme for dis- CMSVAN. ISSN 0360-0300 tributed IoT infrastruc- (print), 1557-7341 (elec- ture with secure local- tronic). URL https:// ization services for smart dl.acm.org/ft_gateway. city environment. Fu- cfm?id=3310331. ture Generation Computer Guimaraes:2019:OIQ Systems, 83(??):629–637, June 2018. CODEN FG- [GAB19] Antonio Guimar˜aes, Diego F. SEVI. ISSN 0167-739X Aranha, and Edson Borin. (print), 1872-7115 (elec- Optimized implementa- tronic). URL https:// tion of QC–MDPC code- www.sciencedirect.com/ based cryptography. Con- science/article/pii/S0167739X17313043. currency and Computa- tion: Practice and Ex- Galindo:2013:NIC perience, 31(18):e5089:1– e5089:??, September 25, [Gal13] David Galindo. A note 2019. CODEN CCPEBO. on an IND-CCA2 secure ISSN 1532-0626 (print), Paillier-based cryptosys- 1532-0634 (electronic). tem. Information Pro- cessing Letters, 113(22– Gregio:2015:TTM 24):913–914, November/ [GAF+15] Andr´e Ricardo Abed Gr´egio, December 2013. CODEN Vitor Monte Afonso, Dario IFPLAT. ISSN 0020-0190 Sim˜oes Fernandes Filho, (print), 1872-6119 (elec- Paulo L´ıcio de Geus, and tronic). URL http:// Mario Jino. Toward a tax- www.sciencedirect.com/ onomy of malware behav- science/article/pii/S0020019013002457. iors. The Computer Jour- Gasarch:2013:RBC nal, 58(10):2758–2777, Oc- tober 2015. CODEN CM- [Gas13] William Gasarch. Review PJA6. ISSN 0010-4620 of Theoretical Computer (print), 1460-2067 (elec- Science: Introduction to tronic). URL http:// Automata, Computability, comjnl.oxfordjournals. Complexity, Algorithmics, org/content/58/10/2758. Randomization, Communi- Gope:2018:LPP cation, and Cryptography by Juraj Hromkovic. ACM [GAI+18] Prosanta Gope, Ruhul SIGACT News, 44(3):7–8, Amin, S. K. Hafizul Is- September 2013. CODEN REFERENCES 272

SIGNDM. ISSN 0163-5700 139, June 2019. CODEN (print), 1943-5827 (elec- CPSEDU. ISSN 0167-4048 tronic). (print), 1872-6208 (elec- tronic). URL https:// Gutierrez:2016:IDO www.sciencedirect.com/ [GAS+16] Christopher N. Gutierrez, science/article/pii/S0167404818310113. Mohammed H. Almeshekah, Gorantla:2011:MKC Eugene H. Spafford, Mikhail J. Atallah, and Jeff Av- [GBNM11] M. C. Gorantla, Colin ery. Inhibiting and detect- Boyd, Juan Manuel Gonz´alez ing offline password crack- Nieto, and Mark Manulis. ing using ErsatzPasswords. Modeling key compromise ACM Transactions on Pri- impersonation attacks on vacy and Security (TOPS), group key exchange proto- 19(3):9:1–9:??, December cols. ACM Transactions 2016. CODEN ???? ISSN on Information and System 2471-2566 (print), 2471- Security, 14(4):28:1–28:??, 2574 (electronic). December 2011. CODEN ATISBQ. ISSN 1094-9224 Ghoshal:2019:RSC (print), 1557-7406 (elec- [GB19] Sucheta Ghoshal and Amy tronic). Bruckman. The role of Guyeux:2015:ECS social computing technolo- gies in grassroots move- [GCH15] Christophe Guyeux, Rapha¨el ment building. ACM Couturier, and Pierre- Transactions on Computer- Cyrille H´eam. Efficient Human Interaction, 26(3): and cryptographically se- 18:1–18:??, June 2019. CO- cure generation of chaotic DEN ATCIF4. ISSN pseudorandom numbers on 1073-0516 (print), 1557- GPU. The Journal of 7325 (electronic). URL Supercomputing, 71(10): https://dl.acm.org/ft_ 3877–3903, October 2015. gateway.cfm?id=3318140. CODEN JOSUED. ISSN 0920-8542 (print), 1573- Gupta:2019:DRB 0484 (electronic). URL [GBC19] Sandeep Gupta, Attaullah http://link.springer. Buriro, and Bruno Crispo. com/article/10.1007/s11227- DriverAuth: a risk-based 015-1479-8. multi-modal biometric- Gao:2019:LBD based driver authentication scheme for ride-sharing [GCH+19] Wen Gao, Liqun Chen, platforms. Computers Yupu Hu, Christopher & Security, 83(??):122– J. P. Newton, Baocang REFERENCES 273

Wang, and Jiangshan Avila,´ A. de Santos Chen. Lattice-based deni- Sierra, and G. Bailador able ring signatures. In- del Pozo. Score optimiza- ternational Journal of In- tion and template updat- formation Security,18 ing in a biometric tech- (3):355–370, June 2019. nique for authentication CODEN ???? ISSN in mobiles based on ges- 1615-5262 (print), 1615- tures. The Journal of 5270 (electronic). URL Systems and Software,84 http://link.springer. (11):2013–2021, Novem- com/article/10.1007/s10207- ber 2011. CODEN JS- 018-0417-1; http:// SODM. ISSN 0164-1212 link.springer.com/content/ (print), 1873-1228 (elec- pdf/10.1007/s10207-018- tronic). URL http:// 0417-1.pdf. www.sciencedirect.com/ science/article/pii/S0164121211001427. Gupta:2012:CDF [GCK12] Swati Gupta, Seongho Granado-Criado:2017:HCH Cho, and C.-C. Jay Kuo. Current developments and [GCVR17] Jos´e M. Granado-Criado future trends in audio au- and Miguel A. Vega- thentication. IEEE Mul- Rodr´ıguez. Hardware tiMedia, 19(1):50–59, Jan- coprocessors for high- uary/March 2012. CODEN performance symmetric IEMUE4. ISSN 1070-986X cryptography. The Jour- (print), 1941-0166 (elec- nal of Supercomputing,73 tronic). (6):2456–2482, June 2017. CODEN JOSUED. ISSN Gupta:2013:HPH 0920-8542 (print), 1573- 0484 (electronic). [GCS+13] Sourav Sen Gupta, A. Chat- topadhyay, K. Sinha, Gong:2016:ATI S. Maitra, and B. P. Sinha. High-performance hard- [GDCC16] Junqing Gong, Xiaolei ware implementation for Dong, Zhenfu Cao, and RC4 stream cipher. IEEE Jie Chen. Almost-tight Transactions on Comput- identity based encryption ers, 62(4):730–743, April against selective opening 2013. CODEN ITCOB4. attack. The Computer ISSN 0018-9340 (print), Journal, 59(11):1669–1688, 1557-9956 (electronic). November 2016. CODEN Guerra-Casanova:2011:SOT CMPJA6. ISSN 0010-4620 (print), 1460-2067 (elec- [GCSAddP11]´ J. Guerra-Casanova, C. S´anchez- tronic). URL http:// REFERENCES 274

comjnl.oxfordjournals. curity, 30(6–7):427–445, org/content/59/11/1669. September/October 2011. CODEN CPSEDU. ISSN Gao:2018:PRR 0167-4048 (print), 1872- [GDLL18] Xinwei Gao, Jintai Ding, 6208 (electronic). URL Lin Li, and Jiqiang Liu. https://www.sciencedirect. Practical randomized RLWE- com/science/article/pii/ based key exchange against S0167404811000502. signal leakage attack. IEEE Geller:2013:MIS Transactions on Com- puters, 67(11):1584–1593, [Gel13] Tom Geller. Making the November 2018. CODEN Internet safe for gadgets. ITCOB4. ISSN 0018-9340 Communications of the As- (print), 1557-9956 (elec- sociation for Computing tronic). URL https: Machinery, 56(10):18–20, //ieeexplore.ieee.org/ October 2013. CODEN document/8300634/. CACMA2. ISSN 0001-0782 (print), 1557-7317 (elec- Guerin:2016:TDU tronic).

[GdM16] Nilson Donizete Guerin, Gentry:2010:CAF Jr., Flavio de Barros Vi- dal, and Bruno Macchi- [Gen10] Craig Gentry. Computing avello. Text-dependent arbitrary functions of en- user verification of hand- crypted data. Communi- written words and signa- cations of the Association tures on mobile devices. for Computing Machinery, The Computer Journal, 53(3):97–105, March 2010. 59(9):1415–1425, Septem- CODEN CACMA2. ISSN ber 2016. CODEN CM- 0001-0782 (print), 1557- PJA6. ISSN 0010-4620 7317 (electronic). (print), 1460-2067 (elec- tronic). URL http:// Gentry:2013:EMH comjnl.oxfordjournals. [Gen13] Craig Gentry. Encrypted org/content/59/9/1415. messages from the heights Giot:2011:UKD of cryptomania. Lecture Notes in Computer Sci- [GEAHR11] Romain Giot, Mohamad ence, 7785:120–121, 2013. El-Abed, Baptiste Hemery, CODEN LNCSD9. ISSN and Christophe Rosen- 0302-9743 (print), 1611- berger. Unconstrained 3349 (electronic). URL keystroke dynamics au- http://link.springer. thentication with shared com/accesspage/chapter/ secret. Computers & Se- 10.1007/978-3-642-36594- REFERENCES 275

2_7?coverImageUrl=/static/ Security & Privacy, 9(3): 0.8699/sites/link/images/ 70–72, May/June 2011. abstract_cover_placeholder. CODEN ???? ISSN 1540- png. 7993 (print), 1558-4046 (electronic). Gaspar:2012:SEF Garg:2016:CIO [GFBF12] Lubos Gaspar, Viktor Fis- cher, Lilian Bossuet, and [GGH+16a] Sanjam Garg, Craig Gen- Robert Fouquet. Secure try, Shai Halevi, Mari- extension of FPGA gen- ana Raykova, Amit Sa- eral purpose processors for hai, and Brent Waters. symmetric key cryptogra- Candidate indistinguisha- phy with partial reconfig- bility obfuscation and func- uration capabilities. ACM tional encryption for all Transactions on Reconfig- circuits. SIAM Journal urable Technology and Sys- on Computing, 45(3):882– tems, 5(3):16:1–16:??, Oc- 929, ???? 2016. CODEN tober 2012. CODEN ???? SMJCAT. ISSN 0097-5397 ISSN 1936-7406 (print), (print), 1095-7111 (elec- 1936-7414 (electronic). tronic).

Gong:2010:PCI Garg:2016:HSS

[GG10] Guang Gong and Kis- [GGH+16b] Sanjam Garg, Craig Gen- han Chand Gupta, edi- try, Shai Halevi, Mari- tors. Progress in cryp- ana Raykova, Amit Sa- tology — Indocrypt 2010: hai, and Brent Waters. 11th international confer- Hiding secrets in software: ence on cryptology in In- a cryptographic approach dia, Hyderabad, India, De- to program obfuscation. cember 12–15, 2010. Pro- Communications of the ceedings, volume 6498 of Association for Comput- Lecture notes in computer ing Machinery, 59(5):113– science. Springer-Verlag, 120, May 2016. CODEN Berlin, Germany / Heidel- CACMA2. ISSN 0001-0782 berg, Germany / London, (print), 1557-7317 (elec- UK / etc., 2010. ISBN tronic). URL http:// 3-642-17400-0 (softcover). cacm.acm.org/magazines/ LCCN ???? 2016/5/201597/fulltext. Grigg:2011:CCN Garg:2014:TRS

[GG11] Ian Grigg and Peter Gut- [GGHR14] Sanjam Garg, Craig Gen- mann. The curse of crypto- try, Shai Halevi, and Mari- graphic numerology. IEEE ana Raykova. Two-round REFERENCES 276

secure MPC from indis- circuits. In IEEE [IEE11b], tinguishability obfuscation. pages 107–109. ISBN 1- Lecture Notes in Computer 4577-1843-X. LCCN ???? Science, 8349:74–94, 2014. CODEN LNCSD9. ISSN Gentry:2011:IGF 0302-9743 (print), 1611- 3349 (electronic). URL [GH11b] Craig Gentry and Shai http://link.springer. Halevi. Implementing Gen- com/chapter/10.1007/978- try’s fully-homomorphic 3-642-54242-8_4/. encryption scheme. Lecture Notes in Computer Sci- Garg:2017:IDI ence, 6632:129–148, 2011. CODEN LNCSD9. ISSN [GGHW17] Sanjam Garg, Craig Gen- 0302-9743 (print), 1611- try, Shai Halevi, and 3349 (electronic). URL Daniel Wichs. On the implausibility of differing- http://link.springer. inputs obfuscation and ex- com/content/pdf/10.1007/ . tractable witness encryp- 978-3-642-20465-4_9 tion with auxiliary input. Guo:2012:EBP Algorithmica, 79(4):1353– 1373, December 2017. CO- [GH12] Lifeng Guo and Lei Hu. Ef- DEN ALGOEJ. ISSN 0178-4617 (print), 1432- ficient bidirectional proxy 0541 (electronic). re-encryption with di- rect chosen-ciphertext se- Gunleifsen:2018:TCP curity. Computers and Mathematics with Applica- [GGK18] H˚akon Gunleifsen, Vasileios tions, 63(1):151–157, Jan- Gkioulos, and Thomas uary 2012. CODEN Kemmerich. A tiered con- CMAPDK. ISSN 0898- trol plane model for ser- 1221 (print), 1873-7668 vice function chaining iso- (electronic). URL http:// lation. Future Internet,10 www.sciencedirect.com/ (6):46, June 04, 2018. CO- science/article/pii/S0898122111009680. DEN ???? ISSN 1999- 5903. URL https://www. Gentry:2013:EIF mdpi.com/1999-5903/10/ 6/46. [GH13] Craig B. Gentry and Shai Gentry:2011:FHE Halevi. Efficient imple- mentation of fully homo- [GH11a] C. Gentry and S. Halevi. morphic encryption. US Fully homomorphic en- Patent 8,565,435., October cryption without squashing 22, 2013. Filed 9 August using depth-3 arithmetic 2011. REFERENCES 277

Gope:2015:RLA February 2019. CODEN FGSEVI. ISSN 0167-739X [GH15] Prosanta Gope and Tzonelih (print), 1872-7115 (elec- Hwang. A realistic tronic). URL https:// lightweight authentica- www.sciencedirect.com/ tion protocol preserv- science/article/pii/S0167739X18303431. ing strong anonymity for securing RFID system. Gordon:2011:CFS Computers & Security, 55(??):271–280, Novem- [GHKL11] S. Dov Gordon, Carmit ber 2015. CODEN Hazay, Jonathan Katz, and CPSEDU. ISSN 0167-4048 Yehuda Lindell. Com- (print), 1872-6208 (elec- plete fairness in secure tronic). URL https:// Two-Party computation. www.sciencedirect.com/ Journal of the ACM,58 science/article/pii/S0167404815000681. (6):24:1–24:??, December 2011. CODEN JACOAH. Gope:2016:EMA ISSN 0004-5411 (print), 1557-735X (electronic). [GH16] Prosanta Gope and Tzonelih Hwang. An efficient mu- Gentry:2012:RSB tual authentication and key agreement scheme preserv- [GHPS12] Craig Gentry, Shai Halevi, ing strong anonymity of Chris Peikert, and Nigel P. the mobile user in global Smart. Ring switching mobility networks. Jour- in BGV-style homomor- nal of Network and Com- phic encryption. Lecture puter Applications, 62(??): Notes in Computer Sci- 1–8, February 2016. CO- ence, 7485:19–37, 2012. DEN JNCAF3. ISSN 1084- CODEN LNCSD9. ISSN 8045 (print), 1095-8592 0302-9743 (print), 1611- (electronic). URL http:// 3349 (electronic). URL www.sciencedirect.com/ http://link.springer. science/article/pii/S1084804515002969. com/chapter/10.1007/978- 3-642-32928-9_2/. Genge:2019:ESA Gentry:2013:FSB [GHD19] B´ela Genge, Piroska Haller, and Adrian-Vasile Duka. [GHPS13] Craig Gentry, Shai Halevi, Engineering security-aware Chris Peikert, and Nigel P. control applications for Smart. Field switching data authentication in in BGV-style homomor- smart industrial cyber- phic encryption. Journal physical systems. Fu- of Computer Security,21 ture Generation Computer (5):663–684, ???? 2013. Systems, 91(??):206–222, CODEN JCSIET. ISSN REFERENCES 278

0926-227X (print), 1875- 2018. CODEN CM- 8924 (electronic). PJA6. ISSN 0010-4620 (print), 1460-2067 (elec- Gentry:2012:FHE tronic). URL http:// [GHS12] Craig Gentry, Shai Halevi, academic.oup.com/comjnl/ and Nigel P. Smart. article/61/12/1897/5158246. Fully homomorphic en- Godor:2012:HBM cryption with polylog over- head. Lecture Notes in [GI12] Gy˝oz˝oG´odor and S´andor Computer Science, 7237: Imre. Hash-based mutual 465–482, 2012. CO- authentication protocol for DEN LNCSD9. ISSN low-cost RFID systems. 0302-9743 (print), 1611- Lecture Notes in Computer 3349 (electronic). URL Science, 7479:76–87, 2012. http://link.springer. CODEN LNCSD9. ISSN com/accesspage/chapter/ 0302-9743 (print), 1611- 10.1007/978-3-642-29011- 3349 (electronic). URL 4_27; http://link.springer. http://link.springer. com/chapter/10.1007/978- com/chapter/10.1007/978- 3-642-29011-4_28/. 3-642-32808-4_8/. Georgiev:2012:MDC Gilad:2014:PHI [GIJ+12] Martin Georgiev, Sub- [GHS14] Yossi Gilad, Amir Herzberg, odh Iyengar, Suman Jana, and Haya Shulman. Off- Rishita Anubhai, Dan path hacking: The illu- Boneh, and Vitaly Shmatikov. sion of challenge–response The most dangerous code authentication. IEEE Se- in the world: Validating curity & Privacy, 12(5): SSL certificates in non- 68–77, September/October browser software. In ????, 2014. CODEN ???? ISSN editor, ACM Conference 1540-7993 (print), 1558- on Computer and Commu- 4046 (electronic). URL nications Security, page ?? http://www.computer.org/ ACM Press, New York, NY csdl/mags/sp/2014/05/ 10036, USA, 2012. ISBN msp2014050068-abs.html. ???? LCCN ???? URL Guo:2018:AFH ????. Gilbert:2010:ACE [GHY18] Qingwen Guo, Qiong Huang, and Guomin Yang. [Gil10] Henri Gilbert, editor. Ad- Authorized function homo- vances in cryptology — Eu- morphic signature. The rocrypt 2010: 29th an- Computer Journal, 61(12): nual international confer- 1897–1908, December 1, ence on the theory and ap- REFERENCES 279

plications of cryptographic countermeasure. Informa- techniques, Monaco, May tion Processing Letters, 146 30–June 3, 2010. Proceed- (??):30–34, June 2019. CO- ings, volume 6110 of Lec- DEN IFPLAT. ISSN 0020- ture notes in computer 0190 (print), 1872-6119 science. Springer-Verlag, (electronic). URL http:// Berlin, Germany / Heidel- www.sciencedirect.com/ berg, Germany / London, science/article/pii/S0020019019300420. UK / etc., 2010. ISBN 3-642-13189-1 (softcover). Gu:2015:EIB LCCN ???? [GJJ15] Ke Gu, Weijia Jia, and Giry:2015:BCK Chunlin Jiang. Efficient identity-based proxy sig- [Gir15] Damien Giry. Bluekrypt nature in the standard cryptographic key length model. The Computer recommendation. Web site, Journal, 58(4):792–807, February 26, 2015. URL April 2015. CODEN CM- http://www.keylength. PJA6. ISSN 0010-4620 com/. (print), 1460-2067 (elec- tronic). URL http:// Gao:2013:LCA comjnl.oxfordjournals. [GJ13] Guangyong Gao and Guop- org/content/58/4/792. ing Jiang. A lossless Geetha:2018:OVC copyright authentication scheme based on Bessel– [GJJ18] P. Geetha, V. S. Jayanthi, Fourier moment and ex- and A. N. Jayanthi. Op- treme learning machine timal visual cryptographic in curvature-feature do- scheme with multiple share main. The Journal creation for multimedia ap- of Systems and Soft- plications. Computers & ware, 86(1):222–232, Jan- Security, 78(??):301–320, uary 2013. CODEN JS- September 2018. CODEN SODM. ISSN 0164-1212 CPSEDU. ISSN 0167-4048 (print), 1873-1228 (elec- (print), 1872-6208 (elec- tronic). URL http:// tronic). URL https:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0164121212002270. science/article/pii/S0167404818308241. Guo:2019:NBT Gravier:2015:WOD

[GJ19] Qian Guo and Thomas Jo- [GJMP15] Sylvain Gravier, J´erˆome hansson. A new birthday- Javelle, Mehdi Mhalla, and type algorithm for attack- Simon Perdrix. On weak ing the fresh re-keying odd domination and graph- REFERENCES 280

based quantum secret shar- adaptive image steganogra- ing. Theoretical Computer phy. Information Process- Science, 598(??):129–137, ing Letters, 111(16):792– September 20, 2015. CO- 797, August 30, 2011. CO- DEN TCSCDI. ISSN 0304- DEN IFPLAT. ISSN 0020- 3975 (print), 1879-2294 0190 (print), 1872-6119 (electronic). URL http:// (electronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0304397515004806. science/article/pii/S0020019011001414. Goyal:2013:CZK Gunleifsen:2019:PCD

[GJO+13] Vipul Goyal, Abhishek [GKG19] H˚akon Gunleifsen, Thomas Jain, Rafail Ostrovsky, Kemmerich, and Vasileios Silas Richelson, and Ivan Gkioulos. A proof-of- Visconti. Concurrent zero concept demonstration of knowledge in the bounded isolated and encrypted ser- player model. Lecture vice function chains. Fu- Notes in Computer Sci- ture Internet, 11(9):183, ence, 7785:60–79, 2013. August 24, 2019. CO- CODEN LNCSD9. ISSN DEN ???? ISSN 1999- 0302-9743 (print), 1611- 5903. URL https://www. 3349 (electronic). URL mdpi.com/1999-5903/11/ http://link.springer. 9/183. com/chapter/10.1007/978- Garay:2016:MPA 3-642-36594-2_4/. Gu:2017:IBM [GKM16] Juan A. Garay, Vladimir Kolesnikov, and Rae Mclel- [GJZ17] Ke Gu, Weijia Jia, and lan. MAC precomputation Jianming Zhang. Identity- with applications to secure based multi-proxy signa- memory. ACM Transac- ture scheme in the stan- tions on Privacy and Se- dard model. Fundamenta curity (TOPS), 19(2):6:1– Informaticae, 150(2):179– 6:??, September 2016. CO- 210, ???? 2017. CODEN DEN ???? ISSN 2471-2566 FUMAAJ. ISSN 0169-2968 (print), 2471-2574 (elec- (print), 1875-8681 (elec- tronic). tronic). Grigoriev:2017:YMP Geetha:2011:VRN [GKS17] Dima Grigoriev, Laszlo B. [GKCK11] S. Geetha, V. Kabilan, Kish, and Vladimir Shpil- S. P. Chockalingam, and rain. Yao’s millionaires’ N. Kamaraj. Varying radix problem and public-key en- numeral system based cryption without computa- REFERENCES 281

tional assumptions. Inter- 0302-9743 (print), 1611- national Journal of Foun- 3349 (electronic). URL dations of Computer Sci- http://link.springer. ence (IJFCS), 28(4):379– com/chapter/10.1007/978- ??, June 2017. CODEN 3-642-33481-8_16/. IFCSEN. ISSN 0129-0541. Gu:2019:GRM Gaj:2017:DCR [GL19] Z. Gu and S. Li. A [GKSB17] Sibaji Gaj, Aditya Kanetkar, generalized RNS Mclaugh- Arijit Sur, and Pra- lin modular multiplication bin Kumar Bora. Drift- with non-coprime moduli compensated robust wa- sets. IEEE Transactions on termarking algorithm for Computers, 68(11):1689– H.265/HEVC video stream. 1696, November 2019. CO- ACM Transactions on DEN ITCOB4. ISSN 0018- Multimedia Computing, 9340 (print), 1557-9956 Communications, and Ap- (electronic). plications, 13(1):11:1–11:??, January 2017. CODEN Glassey:2011:MIM ???? ISSN 1551-6857 [Gla11] Olivier Glassey. Meta- (print), 1551-6865 (elec- data for identity manage- tronic). ment of population regis- Guo:2010:HMW ters. Future Internet, 3(2): 130–143, April 18, 2011. [GL10] Jing-Ming Guo and Yun- CODEN ???? ISSN 1999- Fu Liu. Hiding multitone 5903. URL https://www. watermarks in halftone im- mdpi.com/1999-5903/3/ ages. IEEE MultiMedia,17 2/130. (1):65, January 2010. CO- DEN IEMUE4. ISSN 1070- Guo:2018:KAA 986X (print), 1941-0166 [GLB+18] Cheng Guo, Ningqi Luo, (electronic). Md Zakirul Alam Bhuiyan, Gouvea:2012:HSI Yingmo Jie, Yuanfang Chen, Bin Feng, and [GL12] Conrado P. L. Gouvˆea Muhammad Alam. Key- and Julio L´opez. High aggregate authentication speed implementation of cryptosystem for data shar- authenticated encryption ing in dynamic cloud for the MSP430X micro- storage. Future Gen- controller. Lecture Notes eration Computer Sys- in Computer Science, 7533: tems, 84(??):190–199, July 288–304, 2012. CO- 2018. CODEN FG- DEN LNCSD9. ISSN SEVI. ISSN 0167-739X REFERENCES 282

(print), 1872-7115 (elec- CARDIS 2010, Passau, tronic). URL https:// Germany, April 14–16, www.sciencedirect.com/ 2010: proceedings, vol- science/article/pii/S0167739X17307926. ume 6035 of Lecture Notes in Computer Sci- Gorawski:2012:EAS ence. Springer, Berlin, Ger- [GLG12] Marcin Gorawski, Michal many, 2010. ISBN 3-642- Lorek, and Michal Gorawski. 12509-3 (paperback). ISSN Encrypted adaptive stor- 0302-9743 (print), 1611- age model — analysis and 3349 (electronic). LCCN performance tests. Lecture TK7895.S62 C36 2010. Notes in Computer Sci- Ge:2016:DSR ence, 7449:118–128, 2012. CODEN LNCSD9. ISSN [GLL16] Yongyong Ge, Yannan Li, 0302-9743 (print), 1611- and Zhusong Liu. Del- 3349 (electronic). URL egation of signing rights http://link.springer. for emerging 5G networks. com/chapter/10.1007/978- Concurrency and Compu- 3-642-32287-7_10/. tation: Practice and Ex- perience, 28(4):1193–1203, Gligor:2012:SLT March 25, 2016. CODEN CCPEBO. ISSN 1532-0626 [Gli12] Virgil Gligor. Street- (print), 1532-0634 (elec- level trust semantics for tronic). attribute authentication (transcript of discussion). Guo:2018:PSC Lecture Notes in Com- puter Science, 7622:116– [GLL+18] Yuyan Guo, Jiguo Li, Yang 125, 2012. CODEN Lu, Yichen Zhang, and Fu- LNCSD9. ISSN 0302-9743 tai Zhang. Provably se- (print), 1611-3349 (elec- cure certificate-based en- tronic). URL http:// cryption with leakage re- link.springer.com/chapter/ silience. Theoretical Com- 10.1007/978-3-642-35694- puter Science, 711(??):1– 0_13/. 10, February 8, 2018. CO- DEN TCSCDI. ISSN 0304- Gollmann:2010:SCR 3975 (print), 1879-2294 [GLIC10] Dieter Gollmann, Jean- (electronic). URL http:// Louis Lanet, and Julien www.sciencedirect.com/ Iguchi-Cartigny, editors. science/article/pii/S030439751730748X. Smart card research and Gagne:2012:AVB advanced application: 9th IFIP WG 8.8/11.2 In- [GLLSN12] Martin Gagn´e, Pascal ternational Conference, Lafourcade, Yassine Lakhnech, REFERENCES 283

and Reihaneh Safavi- 3975 (print), 1879-2294 Naini. Automated ver- (electronic). URL http:// ification of block cipher www.sciencedirect.com/ modes of operation, an science/article/pii/S0304397515008725. improved method. Lec- ture Notes in Computer Gupta:2019:OIT Science, 6888:23–31, 2012. [GLM+19] Peeyush Gupta, Yin Li, CODEN LNCSD9. ISSN Sharad Mehrotra, Nisha 0302-9743 (print), 1611- Panwar, Shantanu Sharma, 3349 (electronic). URL and Sumaya Almanee. http://link.springer. Obscure: information- com/chapter/10.1007/978- theoretic oblivious and ver- 3-642-27901-0_3/. ifiable aggregation queries. Guo:2011:EDA Proceedings of the VLDB Endowment, 12(9):1030– [GLM+11] Hua Guo, Zhoujun Li, 1043, May 2019. CODEN Yi Mu, Fan Zhang, Chuankun ???? ISSN 2150-8097. Wu, and Jikai Teng. An Gerault:2018:RAR efficient dynamic authen- ticated key exchange pro- [GLMS18] David G´erault, Pascal tocol with selectable iden- Lafourcade, Marine Minier, tities. Computers and and Christine Solnon. Mathematics with Appli- Revisiting AES related- cations, 61(9):2518–2527, key differential attacks May 2011. CODEN with constraint program- CMAPDK. ISSN 0898- ming. Information Process- 1221 (print), 1873-7668 ing Letters, 139(??):18–23, (electronic). URL http:// November 2018. CODEN www.sciencedirect.com/ IFPLAT. ISSN 0020-0190 science/article/pii/S0898122111001404. (print), 1872-6119 (elec- tronic). URL http:// Gong:2016:HES www.sciencedirect.com/ [GLM+16] Linming Gong, Shundong science/article/pii/S002001901830139X. Li, Qing Mao, Daoshun Gradwohl:2010:SRC Wang, and Jiawei Dou. A homomorphic encryp- [GLR10] R. Gradwohl, N. Livne, tion scheme with adaptive and A. Rosen. Sequen- chosen ciphertext security tial rationality in cryp- but without random oracle. tographic protocols. In Theoretical Computer Sci- IEEE [IEE10], pages 623– ence, 609 (part 1)(??):253– 632. ISBN 1-4244-8525-8. 261, January 4, 2016. CO- LCCN ???? URL http: DEN TCSCDI. ISSN 0304- //ieeexplore.ieee.org/ REFERENCES 284

servlet/opac?punumber= www.sciencedirect.com/ 5669376. IEEE Com- science/article/pii/S0164121213000745. puter Society Order Num- ber P4244. Goyal:2011:SCP Gradwohl:2013:SRC [GM11] V. Goyal and H. K. Maji. Stateless crypto- [GLR13] Ronen Gradwohl, Noam graphic protocols. In Livne, and Alon Rosen. IEEE [IEE11b], pages 678– Sequential rationality in 687. ISBN 1-4577-1843-X. cryptographic protocols. LCCN ???? ACM Transactions on Economics and Computa- Garmany:2013:PPR tion, 1(1):2:1–2:??, Jan- uary 2013. CODEN ???? [GM13a] Behrad Garmany and Tilo ISSN 2167-8375 (print), M¨uller. PRIME: Pri- 2167-8383 (electronic). vate RSA infrastructure for memory-less encryp- Guo:2012:ETD tion. In Proceedings of the 29th Annual Computer Se- [GLW12] Teng Guo, Feng Liu, and curity Applications Confer- ChuanKun Wu. On the ence, ACSAC ’13, pages equivalence of two defi- 149–158. ACM Press, New nitions of visual cryptog- York, NY 10036, USA, raphy scheme. Lecture 2013. ISBN 1-4503-2015-5. Notes in Computer Sci- ence, 7232:217–227, 2012. Goglin:2013:KGS CODEN LNCSD9. ISSN 0302-9743 (print), 1611- [GM13b] Brice Goglin and St´ephanie 3349 (electronic). URL Moreaud. KNEM: a http://link.springer. generic and scalable kernel- com/chapter/10.1007/978- assisted intra-node MPI 3-642-29101-2_15/. communication framework. Journal of Parallel and Guo:2013:TVS Distributed Computing, [GLW13] Teng Guo, Feng Liu, and 73(2):176–188, February ChuanKun Wu. Thresh- 2013. CODEN JPD- old visual secret sharing CER. ISSN 0743-7315 by random grids with im- (print), 1096-0848 (elec- proved contrast. The Jour- tronic). URL http:// nal of Systems and Soft- www.sciencedirect.com/ ware, 86(8):2094–2109, Au- science/article/pii/S0743731512002316. gust 2013. CODEN JS- Gotzfried:2014:MAT SODM. ISSN 0164-1212 (print), 1873-1228 (elec- [GM14] Johannes G¨otzfried and tronic). URL http:// Tilo M¨uller. Mutual REFERENCES 285

authentication and trust de Fuentes, P. Peris-Lopez, bootstrapping towards se- and C. Camara. Encryp- cure disk encryption. ACM tion by Heart (EbH) — us- Transactions on Informa- ing ECG for time-invariant tion and System Security, symmetric key generation. 17(2):6:1–6:??, November Future Generation Com- 2014. CODEN ATISBQ. puter Systems, 77(??):136– ISSN 1094-9224 (print), 148, December 2017. CO- 1557-7406 (electronic). DEN FGSEVI. ISSN 0167- 739X (print), 1872-7115 Gofman:2016:MBE (electronic). URL http:// [GM16a] Mikhail I. Gofman and www.sciencedirect.com/ Sinjini Mitra. Multi- science/article/pii/S0167739X16307798. modal biometrics for en- Gonzalez-Manzano:2019:LUR hanced mobile device se- curity. Communications of [GMDR19] Lorena Gonzalez-Manzano, the Association for Com- Jose M. De Fuentes, and puting Machinery, 59(4): Arturo Ribagorda. Lever- 58–65, April 2016. CODEN aging user-related Inter- CACMA2. ISSN 0001-0782 net of Things for con- (print), 1557-7317 (elec- tinuous authentication: a tronic). URL http:// survey. ACM Comput- cacm.acm.org/magazines/ ing Surveys, 52(3):53:1– 2016/4/200169/fulltext. 53:??, July 2019. CODEN CMSVAN. ISSN 0360-0300 Gueron:2016:HIA (print), 1557-7341 (elec- tronic). URL https:// [GM16b] Shay Gueron and Sanu dl.acm.org/ft_gateway. Mathew. Hardware im- cfm?id=3314023. plementation of AES us- ing area-optimal polyno- Gunson:2011:UPS mials for composite-field 4 2 [GMMJ11] Nancie Gunson, Diarmid representation GF(2 ) of Marshall, Hazel Morton, GF(28). In Montuschi et al. + and Mervyn Jack. User [MSH 16], pages 112– perceptions of security and 117. ISBN 1-5090-1615-5. usability of single-factor ISSN 1063-6889. LCCN and two-factor authenti- QA76.9.C62 S95 2016. cation in automated tele- URL http://ieeexplore. phone banking. Comput- ieee.org/servlet/opac? ers & Security, 30(4):208– punumber=7562813. 220, June 2011. CODEN Gonzalez-Manzano:2017:EHE CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- [GMdFPLC17] L. Gonz´alez-Manzano, Jos´e M. tronic). URL https:// REFERENCES 286

www.sciencedirect.com/ Communications in Com- science/article/pii/S0167404810001148. puter Algebra, 49(1):19, March 2015. CODEN ???? Giambruno:2015:GGB ISSN 1932-2232 (print), 1932-2240 (electronic). [GMNS15] Laura Giambruno, Sabrina Mantaci, Jean N´eraud, and Guo:2011:ISS Carla Selmi. A gener- alization of Girod’s bidi- [GMS11] Fuchun Guo, Yi Mu, and rectional decoding method Willy Susilo. Improving se- to codes with a finite de- curity of q-SDH based digi- ciphering delay. Inter- tal signatures. The Journal national Journal of Foun- of Systems and Software, dations of Computer Sci- 84(10):1783–1790, Octo- ence (IJFCS), 26(6):733– ber 2011. CODEN JS- ??, September 2015. CO- SODM. ISSN 0164-1212 DEN IFCSEN. ISSN 0129- (print), 1873-1228 (elec- 0541. tronic). URL http:// www.sciencedirect.com/ Garcia-Martinez:2015:HEB science/article/pii/S0164121211001233. [GMOGCCC15] M. Garc´ıa-Mart´ınez, L. J. Guo:2014:SAS Onta˜n´on-Garc´ıa, E. Campos- Cant´on, and S. Celikovsk´y. [GMSV14] Fuchun Guo, Yi Mu, Hyperchaotic encryption Willy Susilo, and Vijay based on multi-scroll piece- Varadharajan. Server- wise linear systems. Ap- aided signature verifica- plied Mathematics and tion for lightweight de- Computation, 270(??):413– vices. The Computer Jour- 424, November 1, 2015. nal, 57(4):481–493, April CODEN AMHCBQ. ISSN 2014. CODEN CM- 0096-3003 (print), 1873- PJA6. ISSN 0010-4620 5649 (electronic). URL (print), 1460-2067 (elec- http://www.sciencedirect. tronic). URL http:// com/science/article/pii/ comjnl.oxfordjournals. S0096300315010929. org/content/57/4/481. full.pdf+html. Garcia-Morchon:2015:HCR Gao:2014:URA [GMRT+15] Oscar Garc´ıa-Morch´on, Ronald Rietman, Ludo [GMSW14] Lijun Gao, Maode Ma, Tolhuizen, Domingo G´omez, Yantai Shu, and Yuhua and Jaime Guti´errez. HIMMO: Wei. An ultralightweight a collusion-resistant identity- RFID authentication pro- based scheme for symmet- tocol with CRC and per- ric key generation. ACM mutation. Journal of Net- REFERENCES 287

work and Computer Ap- Nagaraja. On the secu- plications, 41(??):37–46, rity of machine learning in May 2014. CODEN JN- malware C&C detection: a CAF3. ISSN 1084-8045 survey. ACM Computing (print), 1095-8592 (elec- Surveys, 49(3):59:1–59:??, tronic). URL http:// December 2016. CODEN www.sciencedirect.com/ CMSVAN. ISSN 0360-0300 science/article/pii/S1084804513002269. (print), 1557-7341 (elec- tronic). Good:2012:BTC Gong:2012:KNF [GMT+12] Irving John Good, Don- ald Michie, G. (Geoffrey) [GNL12] Zheng Gong, Svetla Nikova, Timms, James A. Reeds, and Yee Wei Law. KLEIN: Whitfield Diffie, and Ju- a new family of lightweight dith Veronica Field, edi- block ciphers. Lecture tors. Breaking teleprinter Notes in Computer Sci- ciphers at Bletchley Park: ence, 7055:1–18, 2012. CO- general report on Tunny DEN LNCSD9. ISSN with emphasis on statisti- 0302-9743 (print), 1611- cal methods (1945). John 3349 (electronic). URL Wiley and Sons, Inc., http://link.springer. New York, NY, USA, com/chapter/10.1007/978- 2012. ISBN 0-470-46589- 3-642-25286-0_1/. 1 (hardcover). cxi + 673 pp. LCCN D810.C88 G66 Garay:2017:SIA 2015. [GO17] Juan A. Garay and Rafail Groza:2017:LCL Ostrovsky. Special is- [GMVV17] Bogdan Groza, Stefan sue: Algorithmic tools Murvay, Anthony Van Her- in cryptography. Algo- rewege, and Ingrid Ver- rithmica, 79(4):985–986, bauwhede. LiBrA–CAN: December 2017. CO- Lightweight broadcast au- DEN ALGOEJ. ISSN thentication for controller 0178-4617 (print), 1432- area networks. ACM 0541 (electronic). URL Transactions on Embedded http://link.springer. Computing Systems, 16(3): com/content/pdf/10.1007/ 90:1–90:??, July 2017. CO- s00453-017-0368-3.pdf. DEN ???? ISSN 1539-9087 Goldreich:2019:PSF (print), 1558-3465 (elec- tronic). [Gol19] Oded Goldreich, editor. Providing Sound Founda- Gardiner:2016:SML tions for Cryptography: On [GN16] Joseph Gardiner and Shishir the Work of Shafi Gold- REFERENCES 288

wasser and Silvio Micali. Europe ready for a pan- ACM Press, New York, European identity manage- NY 10036, USA, October ment system? IEEE Se- 2019. ISBN 1-4503-7266-X curity & Privacy, 10(4): (hardcover), 1-4503-7266- 44–49, July/August 2012. X (paperback), 1-4503- ISSN 1540-7993 (print), 7267-8 (e-pub). ISSN 2374- 1558-4046 (electronic). 6777. xxxv + 800 pp. LCCN TK5102.94 .P767 Gorski:2010:CDS 2019. [Gor10] Michael Gorski. Crypt- Goodin:2012:CBS analysis and design of sym- metric primitives. Ph.D. [Goo12] Dan Goodin. Crypto thesis (??), Bauhausuniver- breakthrough shows Flame sit¨at, Weimar, Germany, was designed by world- 2010. vi + 146 pp. class scientists: The spy malware achieved an at- Groth:2012:NTN tack unlike any cryptog- [GOS12] Jens Groth, Rafail Ostro- raphers have seen be- vsky, and Amit Sahai. New fore. Web document., June techniques for noninterac- 7, 2012. URL http:// tive zero-knowledge. Jour- arstechnica.com/security/ nal of the ACM, 59(3): 2012/06/flame-crypto- 11:1–11:??, June 2012. CO- breakthrough/. DEN JACOAH. ISSN Gope:2019:LLA 0004-5411 (print), 1557- 735X (electronic). [Gop19] Prosanta Gope. LAAP: Glowacz:2017:IDW Lightweight anonymous authentication protocol for [GP17] Andrzej Glowacz and D2D-aided fog computing Marcin Pietro´n. Imple- paradigm. Computers & mentation of digital wa- Security, 86(??):223–237, termarking algorithms in September 2019. CODEN parallel hardware accelera- CPSEDU. ISSN 0167-4048 tors. International Journal (print), 1872-6208 (elec- of Parallel Programming, tronic). URL https:// 45(5):1108–1127, October www.sciencedirect.com/ 2017. CODEN IJPPE5. science/article/pii/S016740481831160X. ISSN 0885-7458 (print), 1573-7640 (electronic). Garcia:2012:ERP Gong:2013:NOT [GOPB12] Sergio Sanchez Garcia, Ana Gomez Oliva, and [GPLZ13] Longyan Gong, Jingxin Emilia Perez-Belleboni. Is Pan, Beibei Liu, and REFERENCES 289

Shengmei Zhao. A novel cacm.acm.org/magazines/ one-time password mutual 2016/6/202646/fulltext. authentication scheme on Gottel:2019:SPE sharing renewed finite ran- dom sub-passwords. Jour- [GPR+19] Christian G¨ottel, Rafael nal of Computer and Sys- Pires, Isabelly Rocha, tem Sciences, 79(1):122– S´ebastien Vaucher, Pascal 130, February 2013. CO- Felber, Marcelo Pasin, and DEN JCSSBM. ISSN 0022- Valerio Schiavoni. Security, 0000 (print), 1090-2724 performance and energy (electronic). URL http:// trade-offs of hardware- www.sciencedirect.com/ assisted memory protection science/article/pii/S0022000012001249. mechanisms. arXiv.org,?? (??):1–11, June 26, 2019. Goodrich:2012:EVW URL https://arxiv.org/ [GPN+12] Michael T. Goodrich, pdf/1903.04203.pdf. Charalampos Papaman- Grossschadl:2012:EJI thou, Duy Nguyen, Roberto Tamassia, Cristina Videira [GPT12] Johann Großsch¨adl, Dan Lopes, Olga Ohrimenko, Page, and Stefan Tillich. and Nikos Triandopou- Efficient Java implemen- los. Efficient verification tation of elliptic curve of web-content searching cryptography for J2ME- through authenticated web enabled mobile devices. crawlers. Proceedings of the Lecture Notes in Com- VLDB Endowment, 5(10): puter Science, 7322:189– 920–931, June 2012. CO- 207, 2012. CODEN DEN ???? ISSN 2150- LNCSD9. ISSN 0302-9743 8097. (print), 1611-3349 (elec- tronic). URL Genkin:2016:PKE http:// link.springer.com/chapter/ [GPP+16] Daniel Genkin, Lev Pach- 10.1007/978-3-642-30955- manov, Itamar Pipman, 7_17/. Adi Shamir, and Eran Genkin:2014:GYH Tromer. Physical key ex- traction attacks on PCs. [GPT14] Daniel Genkin, Itamar Pip- Communications of the man, and Eran Tromer. Association for Comput- Get your hands off my lap- ing Machinery, 59(6):70– top: Physical side-channel 79, June 2016. CODEN key-extraction attacks on CACMA2. ISSN 0001-0782 PCs. Report, Technion and (print), 1557-7317 (elec- Tel Aviv University, Tel tronic). URL http:// Aviv, Israel, July 31, 2014. REFERENCES 290

25 pp. URL http://www. 24–??, ???? 2019. CO- cs.tau.ac.il/~tromer/ DEN ???? ISSN 1927-7032 handsoff/. (print), 1927-7040 (elec- tronic). URL http://www. Gonzalez-Pardo:2012:CID ccsenet.org/journal/index. [GPVCdBRO12] Antonio Gonz´alez-Pardo, php/ijsp/article/view/ Pablo Varona, David Ca- 0/39033. macho, and Francisco Ghosal:2019:NPP de Borja Rodriguez Ortiz. Communication by iden- [GR19b] Purnata Ghosal and B. V. Raghaven- tity discrimination in bio- dra Rao. A note on inspired multi-agent sys- parameterized polynomial tems. Concurrency and identity testing using hit- Computation: Practice and ting set generators. Infor- Experience, 24(6):589–603, mation Processing Letters, ???? 2012. CODEN 151(??):Article 105839, CCPEBO. ISSN 1532-0626 November 2019. CODEN (print), 1532-0634 (elec- IFPLAT. ISSN 0020-0190 tronic). (print), 1872-6119 (elec- tronic). URL http:// Gai:2017:SCI www.sciencedirect.com/ [GQH17] Keke Gai, Meikang Qiu, science/article/pii/S002001901930122X. and Houcine Hassan. Se- Greengard:2011:MRM cure cyber incident analyt- ics framework using Monte [Gre11] Samuel Greengard. In Carlo simulations for finan- memoriam: Robert Mor- cial cybersecurity insur- ris, 1932–2011. Communi- ance in cloud computing. cations of the Association Concurrency and Compu- for Computing Machinery, tation: Practice and Expe- 54(9):17, September 2011. rience, 29(7):??, April 10, CODEN CACMA2. ISSN 2017. CODEN CCPEBO. 0001-0782 (print), 1557- ISSN 1532-0626 (print), 7317 (electronic). 1532-0634 (electronic). Green:2017:SSE Ghatak:2019:IBS [Gre17] Matthew Green. The [GR19a] Debolina Ghatak and Bi- strange story of “ex- mal K. Roy. An im- tended random”. Web proved bound for secu- news story, December 19, rity in an identity disclo- 2017. URL https://blog. sure problem. Interna- cryptographyengineering. tional Journal of Statis- com/2017/12/19/the-strange- tics and Probability, 8(3): story-of-extended-random/ REFERENCES 291

. Discussion of suspected Gibson-Robinson:2012:AAL NSA-supported back door in the 2007 NIST standard [GRL12] Thomas Gibson-Robinson for the Dual Elliptic-Curve and Gavin Lowe. Analysing default random number applications layered on generator, and the associ- unilaterally authenticat- ated RSA cryptographic li- ing protocols. Lecture brary BSAFE. There is ev- Notes in Computer Sci- idence that the back door ence, 7140:164–181, 2012. exists in some older Canon CODEN LNCSD9. ISSN laser printers. 0302-9743 (print), 1611- 3349 (electronic). URL Green:2019:RMC http://link.springer. com/chapter/10.1007/978- [Gre19a] Frederic Green. Review of 3-642-29420-4_11/. Modern Cryptography and Elliptic Curves, A Begin- Guo:2018:WBS ner’s Guide by Thomas R. [GRRZ18] Jinyi Guo, Wei Ren, Shemanske. ACM SIGACT Yi Ren, and Tianqing Zhu. News, 50(2):12–14, June A watermark-based in-situ 2019. CODEN SIGNDM. access control model for ISSN 0163-5700 (print), image big data. Future 1943-5827 (electronic). Internet, 10(8):69, July 29, 2018. CODEN ???? Green:2019:RNT ISSN 1999-5903. URL [Gre19b] Frederic Green. Review https://www.mdpi.com/ . of Number Theory: an In- 1999-5903/10/8/69 troduction via the Density Gonzalez-Serrano:2018:SML of Primes, second edition. ACM SIGACT News,50 [GSAMCA18] Francisco-Javier Gonz´alez- (1):9–13, March 2019. CO- Serrano, Adri´an Amor- DEN SIGNDM. ISSN Mart´ın, and Jorge Casamay´on- 0163-5700 (print), 1943- Ant´on. Supervised ma- 5827 (electronic). chine learning using en- crypted training data. In- Grimes:2015:CCT ternational Journal of In- formation Security, 17(4): [Gri15] William Grimes. Crack- 365–377, August 2018. ing codes through the cen- CODEN ???? ISSN turies. New York Times,?? 1615-5262 (print), 1615- (??):??, February 4, 2015. 5270 (electronic). URL CODEN NYTIAO. ISSN http://link.springer. 0362-4331 (print), 1542- com/article/10.1007/s10207- 667X, 1553-8095. 017-0381-1. REFERENCES 292

Gupta:2018:SCA Gutman:2016:EAF [GSAV18] Haritabh Gupta, Shamik [GSGM16] R. Gutman, C. J. Sam- Sural, Vijayalakshmi Atluri, martino, T. C. Green, and and Jaideep Vaidya. A B. T. Montague. Er- side-channel attack on ror adjustments for file smartphones: Decipher- linking methods using en- ing key taps using built- crypted unique client iden- in microphones. Journal tifier (eUCI) with appli- of Computer Security,26 cation to recently released (2):255–281, ???? 2018. prisoners who are HIV+. CODEN JCSIET. ISSN Statistics in Medicine,35 0926-227X (print), 1875- (1):115–129, January 15, 8924 (electronic). 2016. CODEN SMEDDA. ISSN 0277-6715 (print), Guha:2017:RTS 1097-0258 (electronic). [GSC17] Krishnendu Guha, De- Gong:2016:FSC basri Saha, and Amlan Chakrabarti. Real-time [GSN+16] Wei Gong, Ivan Stoj- SoC security against pas- menovic, Amiya Nayak, sive threats using crypsis Kebin Liu, and Haoxi- behavior of geckos. ACM ang Liu. Fast and scal- Journal on Emerging Tech- able counterfeits estima- nologies in Computing Sys- tion for large-scale RFID tems (JETC), 13(3):41:1– systems. IEEE/ACM 41:??, May 2017. CO- Transactions on Network- DEN ???? ISSN 1550-4832 ing, 24(2):1052–1064, April (print), 1550-4840 (elec- 2016. CODEN IEANEP. tronic). ISSN 1063-6692 (print), 1558-2566 (electronic). Guin:2016:FCS Gierlichs:2012:ICD [GSFT16] Ujjwal Guin, Qihang Shi, Domenic Forte, and Mark M. [GST12] Benedikt Gierlichs, J¨orn- Tehranipoor. FORTIS: a Marc Schmidt, and Michael comprehensive solution for Tunstall. Infective compu- establishing forward trust tation and dummy rounds: for protecting IPs and ICs. Fault protection for block ACM Transactions on De- ciphers without check- sign Automation of Elec- before-output. Lecture tronic Systems, 21(4):63:1– Notes in Computer Sci- 63:??, September 2016. ence, 7533:305–321, 2012. CODEN ATASFO. ISSN CODEN LNCSD9. ISSN 1084-4309 (print), 1557- 0302-9743 (print), 1611- 7309 (electronic). 3349 (electronic). URL REFERENCES 293

http://link.springer. via randomized cascading. com/chapter/10.1007/978- Lecture Notes in Computer 3-642-33481-8_17/. Science, 7237:63–80, 2012. CODEN LNCSD9. ISSN Genkin:2013:RKE 0302-9743 (print), 1611- [GST13] Daniel Genkin, Adi Shamir, 3349 (electronic). URL and Eran Tromer. RSA http://link.springer. key extraction via low- com/chapter/10.1007/978- bandwidth acoustic crypt- 3-642-29011-4_6/. analysis. Technical and Gallin:2019:GFP web report, Technion and Tel Aviv Univer- [GT19] G. Gallin and A. Tis- sity and Weizmann In- serand. Generation of stitute of Science, Haifa finely-pipelined GF(P P) and Tel Aviv, Israel, De- multipliers for flexible cember 18, 2013. URL curve based cryptography http://www.cs.tau.ac. on FPGAs. IEEE Trans- il/~tromer/acoustic/; actions on Computers,68 http://www.tau.ac.il/ (11):1612–1622, November ~tromer/papers/acoustic- 2019. CODEN ITCOB4. 20131218.pdf. ISSN 0018-9340 (print), 1557-9956 (electronic). Ge:2016:KPA Gupta:2019:LAU [GSW+16] Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu [GTSS19] Ankur Gupta, Meenakshi Huang, Liming Fang, and Tripathi, Tabish Jamil Yongjun Ren. A key-policy Shaikh, and Aakar Sharma. attribute-based proxy re- A lightweight anonymous encryption without ran- user authentication and dom oracles. The Com- key establishment scheme puter Journal, 59(7):970– for wearable devices. Com- 982, July 2016. CODEN puter Networks (Amster- CMPJA6. ISSN 0010-4620 dam, Netherlands: 1999), (print), 1460-2067 (elec- 149(??):29–42, February tronic). URL http:// 11, 2019. CODEN comjnl.oxfordjournals. ???? ISSN 1389-1286 org/content/59/7/970. (print), 1872-7069 (elec- tronic). URL http:// Gazi:2012:EOS www.sciencedirect.com/ [GT12] Peter Gaˇzi and Stefano science/article/pii/S1389128618304389. Tessaro. Efficient and op- Goodrich:2011:EAD timally secure key-length extension for block ciphers [GTT11] Michael T. Goodrich, REFERENCES 294

Roberto Tamassia, and Gupta:2015:GEM Nikos Triandopoulos. Ef- ficient authenticated data [Gup15] Vinay Gupta. Guest eof: structures for graph con- a machine for keeping se- nectivity and geometric crets? Linux Jour- search problems. Algo- nal, 2015(254):7:1–7:??, rithmica, 60(3):505–552, June 2015. CODEN LI- July 2011. CODEN AL- JOFX. ISSN 1075-3583 GOEJ. ISSN 0178-4617 (print), 1938-3827 (elec- (print), 1432-0541 (elec- tronic). URL http:// tronic). URL http:/ dl.acm.org/ft_gateway. /www.springerlink.com/ cfm?id=2807685. openurl.asp?genre=article& Galindo:2014:LCL issn=0178-4617&volume= 60&issue=3&spage=505. [GV14a] David Galindo and Srinivas Vivek. Limits of a conjec- Grosse:2013:AS ture on a leakage-resilient cryptosystem. Information [GU13] Eric Grosse and Mayank Processing Letters, 114(4): Upadhyay. Authentica- 192–196, April 2014. CO- tion at scale. IEEE Se- DEN IFPLAT. ISSN 0020- curity & Privacy, 11(1): 0190 (print), 1872-6119 15–22, January/February (electronic). URL http:// 2013. ISSN 1540-7993 www.sciencedirect.com/ (print), 1558-4046 (elec- science/article/pii/S0020019013002949. tronic). URL http:/ /www.computer.org/cms/ Ghosh:2014:BBB Computer.org/ComputingNow/[GV14b] Santosh Ghosh and Ingrid pdfs/AuthenticationAtScale. Verbauwhede. BLAKE- pdf. 512-based 128-bit CCA2 Gueron:2016:MEG secure resis- tant McEliece cryptopro- [Gue16] Shay Gueron. Memory cessor. IEEE Transactions encryption for general- on Computers, 63(5):1124– purpose processors. IEEE 1133, May 2014. CODEN Security & Privacy, 14(6): ITCOB4. ISSN 0018-9340 54–62, November/December (print), 1557-9956 (elec- 2016. CODEN ???? ISSN tronic). 1540-7993 (print), 1558- Gorbunov:2012:FEB 4046 (electronic). URL https://www.computer. [GVW12] Sergey Gorbunov, Vinod org/csdl/mags/sp/2016/ Vaikuntanathan, and Hoeteck 06/msp2016060054-abs. Wee. Functional encryp- html. tion with bounded collu- REFERENCES 295

sions via multi-party com- SHA256. ACM Transac- putation. Lecture Notes tions on Embedded Com- in Computer Science, 7417: puting Systems, 15(1):4:1– 162–179, 2012. CO- 4:??, February 2016. CO- DEN LNCSD9. ISSN DEN ???? ISSN 1539-9087 0302-9743 (print), 1611- (print), 1558-3465 (elec- 3349 (electronic). URL tronic). http://link.springer. com/chapter/10.1007/978- Gao:2019:EUE 3-642-32009-5_11/. [GWP+19] Yang Gao, Wei Wang, Gorbunov:2015:ABE Vir V. Phoha, Wei Sun, and Zhanpeng Jin. EarE- [GVW15] Sergey Gorbunov, Vinod cho: Using ear canal Vaikuntanathan, and Hoeteck echo for wearable au- Wee. Attribute-based thentication. Proceedings encryption for circuits. of the ACM on Inter- Journal of the ACM,62 active, Mobile, Wearable (6):45:1–45:??, December and Ubiquitous Technolo- 2015. CODEN JACOAH. gies (IMWUT), 3(3):1–24, ISSN 0004-5411 (print), September 2019. CODEN 1557-735X (electronic). ???? ISSN 2474-9567 (elec- Greenberg:2014:GWB tronic). URL https:// dl.acm.org/doi/abs/10. [GW14] Joel Greenberg and Rosa- 1145/3351239. mond Welchman. Gor- don Welchman: Bletch- Wang:2014:RAW ley Park’s architect of ul- [gWpNyY+14] Xian gyang Wang, Pan tra intelligence. Frontline pan Niu, Hong ying Yang, Books, Barnsley, UK, 2014. Yan Zhang, and Tian xiao ISBN 1-84832-752-8 (hard- Ma. A robust audio wa- cover), 1-4738-3463-5 (e- termarking scheme using book). xvi + 286 + 16 pp. higher-order statistics in LCCN TK5102.94 .G744 empirical mode decomposi- 2014xeb. URL http:// tion domain. Fundamenta lib.myilibrary.com?id= Informaticae, 130(4):467– 943722. 490, October 2014. CO- Gebotys:2016:PCP DEN FUMAAJ. ISSN [GWM16] Catherine H. Gebotys, 0169-2968 (print), 1875- Brian A. White, and 8681 (electronic). Edgar Mateos. Preav- Gao:2015:GCC eraging and carry propa- gate approaches to side- [GWWC15] Wei Gao, Guilin Wang, channel analysis of HMAC- Xueli Wang, and Kefei REFERENCES 296

Chen. Generic construc- and varied groups. Lecture tion of certificate-based en- Notes in Computer Sci- cryption from certificate- ence, 7496:276–287, 2012. less encryption revisited. CODEN LNCSD9. ISSN The Computer Journal, 0302-9743 (print), 1611- 58(10):2747–2757, Octo- 3349 (electronic). URL ber 2015. CODEN CM- http://link.springer. PJA6. ISSN 0010-4620 com/chapter/10.1007/978- (print), 1460-2067 (elec- 3-642-33272-2_18/. tronic). URL http:// comjnl.oxfordjournals. Guo:2017:EMD org/content/58/10/2747. Goh:2013:TOT [GZH17] Jianting Guo, Peijia Zheng, and Jiwu Huang. An [GY13] Weihan Goh and Chai Kiat efficient motion detec- Yeo. Teaching an old tion and tracking scheme TPM new tricks: Repur- for encrypted surveillance posing for identity-based videos. ACM Transactions signatures. IEEE Se- on Multimedia Comput- curity & Privacy, 11(5): ing, Communications, and 28–35, September/October Applications, 13(4):61:1– 2013. ISSN 1540-7993 61:??, October 2017. CO- (print), 1558-4046 (elec- DEN ???? ISSN 1551-6857 tronic). (print), 1551-6865 (elec- tronic). Guo:2019:EER

[GYW+19] Y. Guo, X. Yuan, X. Wang, Gao:2012:RHC C. Wang, B. Li, and X. Jia. Enabling encrypted rich [GZHD12] Xifeng Gao, Caiming queries in distributed key– Zhang, Yan Huang, and value stores. IEEE Trans- Zhigang Deng. A ro- actions on Parallel and bust high-capacity affine- Distributed Systems, 30(6): transformation-invariant 1283–1297, June 2019. CO- scheme for watermark- DEN ITDSEO. ISSN ing 3D geometric mod- 1045-9219 (print), 1558- els. ACM Transactions 2183 (electronic). on Multimedia Comput- Guo:2012:AKE ing, Communications, and Applications, 8(2S):34:1– [GZ12] Yanfei Guo and Zhen- 34:??, September 2012. feng Zhang. Authenticated CODEN ???? ISSN 1551- key exchange with enti- 6857 (print), 1551-6865 ties from different settings (electronic). REFERENCES 297

Guo:2018:SMK (print), 1460-2067 (elec- tronic). URL http:// [GZS+18] Ziqing Guo, Hua Zhang, academic.oup.com/comjnl/ Caijun Sun, Qiaoyan Wen, article/62/4/490/5146175. and Wenmin Li. Se- Ge:2013:SAP cure multi-keyword ranked search over encrypted [GZZ+13] Aijun Ge, Jiang Zhang, cloud data for multi- Rui Zhang, Chuangui Ma, ple data owners. The and Zhenfeng Zhang. Secu- Journal of Systems and rity analysis of a privacy- Software, 137(??):380–395, preserving decentralized March 2018. CODEN JS- key-policy attribute-based SODM. ISSN 0164-1212 encryption scheme. IEEE (print), 1873-1228 (elec- Transactions on Parallel tronic). URL http:// and Distributed Systems, www.sciencedirect.com/ 24(11):2319–2321, Novem- science/article/pii/S0164121217303011. ber 2013. CODEN ITD- SEO. ISSN 1045-9219 Gao:2019:VQS (print), 1558-2183 (elec- [GZSW19] Pengfei Gao, Jun Zhang, tronic). Fu Song, and Chao Wang. Hernandez-Ardieta:2013:TSA Verifying and quantifying side-channel resistance of [HAGTdFR13] Jorge L. Hernandez-Ardieta, masked software imple- Ana I. Gonzalez-Tablas, mentations. ACM Trans- Jose M. de Fuentes, and actions on Software En- Benjamin Ramos. A gineering and Method- taxonomy and survey of ology, 28(3):16:1–16:??, attacks on digital sig- August 2019. CO- natures. Computers & DEN ATSMER. ISSN Security, 34(??):67–112, 1049-331X (print), 1557- May 2013. CODEN 7392 (electronic). URL CPSEDU. ISSN 0167-4048 https://dl.acm.org/ft_ (print), 1872-6208 (elec- gateway.cfm?id=3330392. tronic). URL https:// www.sciencedirect.com/ Guo:2019:NTP science/article/pii/S0167404812001794. [GZXA19] Hui Guo, Zhenfeng Zhang, Haigh:2017:HRC Jing Xu, and Ningyu An. Non-transferable proxy re- [Hai17] Thomas Haigh. Histori- encryption. The Com- cal reflections: Colossal ge- puter Journal, 62(4):490– nius: Tutte, Flowers, and 506, April 2019. CODEN a bad imitation of Turing. CMPJA6. ISSN 0010-4620 Communications of the As- REFERENCES 298

sociation for Computing (print), 2161-7643 (elec- Machinery, 60(1):29–35, tronic). URL http:// January 2017. CODEN www.scirp.org/Journal/ CACMA2. ISSN 0001-0782 PaperInformation.aspx? (print), 1557-7317 (elec- PaperID=73743. tronic). URL http:// cacm.acm.org/magazines/ Hamidi:2019:ADS 2017/1/211102/fulltext. [Ham19] Hodjat Hamidi. An ap- Hajiali:2019:PPA proach to develop the smart health using Inter- [HAK19] Mahdi Hajiali, Maryam net of Things and au- Amirmazlaghani, and Hos- thentication based on bio- sain Kordestani. Prevent- metric technology. Fu- ing phishing attacks us- ture Generation Computer ing text and image wa- Systems, 91(??):434–449, termarking. Concurrency February 2019. CODEN and Computation: Practice FGSEVI. ISSN 0167-739X and Experience, 31(13): (print), 1872-7115 (elec- e5083:1–e5083:??, July 10, tronic). URL https:// 2019. CODEN CCPEBO. www.sciencedirect.com/ ISSN 1532-0626 (print), science/article/pii/S0167739X18313517. 1532-0634 (electronic). Hanyok:2012:EHH Hamamreh:2012:RPA [Han12] Robert J. Hanyok. Eaves- [Ham12] Rushdi Hamamreh. Rout- dropping on Hell: historical ing path authentication in guide to Western commu- link-state routing proto- nications intelligence and cols. Network Security, the Holocaust, 1939–1945. 2012(5):14–20, May 2012. Dover Publications, Inc., CODEN NTSCF5. ISSN New York, NY, USA, sec- 1353-4858 (print), 1872- ond edition, 2012. ISBN 9371 (electronic). URL 0-486-48127-1. xxi + 196 http://www.sciencedirect. pp. LCCN D810.C88 com/science/article/pii/ H36 2012. URL http:// S1353485812700375. catdir.loc.gov/catdir/ enhancements/fy1108/2011011467- Hamlin:2017:NMC d.html; http://www. [Ham17] Nathan Hamlin. Num- loc.gov/catdir/enhancements/ ber in mathematical cryp- fy1318/2011011467-t.html. tography. Open Jour- Harn:2013:GA nal of Discrete Mathemat- ics, 7(1):13–31, January [Har13] Lein Harn. Group au- 2017. ISSN 2161-7635 thentication. IEEE Trans- REFERENCES 299

actions on Computers,62 (hardcover), 0-06-225928-8 (9):1893–1898, September (paperback), 0-06-244156- 2013. CODEN ITCOB4. 6. xxvii + 610 + 32 pp. ISSN 0018-9340 (print), LCCN D810.S7 H365 2017. 1557-9956 (electronic). Hayes:2013:NSA

Harrington:2014:GEF [Hay13] Adrian Hayes. Network [Har14] Surya Michael Harrington. service authentication tim- Google Earth forensics: ing attacks. IEEE Security using Google Earth geo- & Privacy, 11(2):80–82, location in digital foren- March/April 2013. ISSN sic investigations. Elsevier, 1540-7993 (print), 1558- Amsterdam, The Nether- 4046 (electronic). lands, 2014. ISBN 0-12- Houmansadr:2013:BCN 800216-6. vii + 113 pp. LCCN ???? [HB13] Amir Houmansadr and Hardesty:2015:BAC Nikita Borisov. BotMosaic: Collaborative network wa- [Har15] Larry Hardesty. A basis termark for the detection for all cryptography. R&D of IRC-based botnets. The Magazine, ??(??):??, Octo- Journal of Systems and ber 28, 2015. URL http: Software, 86(3):707–715, //www.rdmag.com/news/ March 2013. CODEN JS- 2015/10/basis-all-cryptography. SODM. ISSN 0164-1212 (print), 1873-1228 (elec- Hardesty:2016:SUC tronic). URL http:// [Har16] Larry Hardesty. Se- www.sciencedirect.com/ cure, user-controlled cryp- science/article/pii/S0164121212003068. tographic system devel- Hurlburt:2014:BBC oped. Scientific Comput- ing, ??(??):??, March 22, [HB14] G. F. Hurlburt and I. Bo- 2016. URL http://www. janova. Bitcoin: Benefit or scientificcomputing.com/ curse? IT Professional,16 news/2016/03/secure-user- (3):10–15, May 2014. CO- controlled-cryptographic- DEN IPMAFM. ISSN system-developed. 1520-9202 (print), 1941- 045x (electronic). Hastings:2016:SWS Hetzelt:2017:SAE [Has16] Max Hastings. The Se- cret War: Spies, Ciphers, [HB17] Felicitas Hetzelt and Robert and Guerrillas 1939–1945. Buhren. Security anal- Harper, New York, NY, ysis of encrypted virtual 2016. ISBN 0-06-225927-X machines. ACM SIG- REFERENCES 300

PLAN Notices, 52(7):129– Sammy Chan, and Chun 142, July 2017. CODEN Chen. Handauth: Ef- SINODQ. ISSN 0362-1340 ficient handover authen- (print), 1523-2867 (print), tication with conditional 1558-1160 (electronic). privacy for wireless net- works. IEEE Transactions Hernandez-Becerril:2016:GIS on Computers, 62(3):616– [HBBRNM+16] Rogelio Adrian Hernandez- 622, March 2013. CODEN Becerril, Ariana Guadalupe ITCOB4. ISSN 0018-9340 Bucio-Ramirez, Mariko (print), 1557-9956 (elec- Nakano-Miyatake, Hec- tronic). tor Perez-Meana, and Hulsing:2017:XEH Marco Pedro Ramirez- Tachiquin. A GPU imple- [HBG+17] A. H¨ulsing, D. Butin, mentation of secret shar- S. Gazdag, J. Rijneveld, ing scheme based on cellu- and A. Mohaisen. XMSS: lar automata. The Jour- Extended hash-based sig- nal of Supercomputing,72 natures. Web document, (4):1291–1311, April 2016. July 24, 2017. URL http:/ CODEN JOSUED. ISSN /datatracker.ietf.org/ 0920-8542 (print), 1573- doc/draft-irtf-cfrg-xmss- 0484 (electronic). URL hash-based-signature. http://link.springer. com/article/10.1007/s11227- Hao:2012:SAM 016-1646-6. [HC12] Feng Hao and Dylan Han:2019:ABI Clarke. Security anal- [HBC+19] Jinguang Han, Maox- ysis of a multi-factor uan Bei, Liqun Chen, authenticated key ex- Yang Xiang, Jie Cao, change protocol. Lec- Fuchun Guo, and Weizhi ture Notes in Computer Meng. Attribute-based Science, 7341:1–11, 2012. information flow control. CODEN LNCSD9. ISSN The Computer Journal, 0302-9743 (print), 1611- 62(8):1214–1231, August 3349 (electronic). URL 2019. CODEN CM- http://link.springer. PJA6. ISSN 0010-4620 com/chapter/10.1007/978- (print), 1460-2067 (elec- 3-642-31284-7_1/. tronic). URL http:// Hu:2017:ATE academic.oup.com/comjnl/ article/62/8/1214/5488733[HC17]. Jingwei Hu and Ray C. C. Cheung. Area- He:2013:HEH time efficient computa- [HBCC13] Daojing He, Jiajun Bu, tion of Niederreiter en- REFERENCES 301

cryption on QC-MDPC Sharad Mehrotra. Index- codes for embedded hard- ing encrypted documents ware. IEEE Transactions for supporting efficient key- on Computers, 66(8):1313– word search. Lecture 1325, ???? 2017. CO- Notes in Computer Sci- DEN ITCOB4. ISSN 0018- ence, 7482:93–110, 2012. 9340 (print), 1557-9956 CODEN LNCSD9. ISSN (electronic). URL http: 0302-9743 (print), 1611- //ieeexplore.ieee.org/ 3349 (electronic). URL document/7862221/. http://link.springer. com/chapter/10.1007/978- Hwang:2010:RIB 3-642-32873-2_7/. [HCC10] Min-Shiang Hwang, Song- Hernandez-Castro:2012:MTA Kong Chong, and Te-Yu Chen. DoS-resistant ID- [HCETPL+12] Julio Cesar Hernandez- based password authenti- Castro, Juan Manuel cation scheme using smart Estevez-Tapiador, Pedro cards. The Journal of Peris-Lopez, John A. Systems and Software,83 Clark, and El-Ghazali (1):163–172, January 2010. Talbi. Metaheuristic CODEN JSSODM. ISSN traceability attack against 0164-1212. SLMAP, an RFID lightweight Hsu:2011:NLM authentication protocol. International Journal of [HCCC11] Ching-Fang Hsu, Guo- Foundations of Computer Hua Cui, Qi Cheng, and Science (IJFCS), 23(2): Jing Chen. A novel lin- 543–553, February 2012. ear multi-secret sharing CODEN IFCSEN. ISSN scheme for group commu- 0129-0541 (print), 1793- nication in wireless mesh 6373 (electronic). networks. Journal of Net- work and Computer Ap- Huang:2014:FOS plications, 34(2):464–468, [HCL+14] Xinyi Huang, Xiaofeng March 2011. CODEN JN- Chen, Jin Li, Yang Xiang, CAF3. ISSN 1084-8045 and Li Xu. Further ob- (print), 1095-8592 (elec- servations on smart-card- tronic). URL http:// based password-authenticated www.sciencedirect.com/ key agreement in dis- science/article/pii/S108480451000055X. tributed systems. IEEE Hore:2012:IED Transactions on Paral- lel and Distributed Sys- [HCDM12] Bijit Hore, Ee-Chien Chang, tems, 25(7):1767–1775, Mamadou H. Diallo, and July 2014. CODEN ITD- REFERENCES 302

SEO. ISSN 1045-9219 1–25, March 2018. CODEN (print), 1558-2183 (elec- ???? ISSN 2474-9567 (elec- tronic). tronic). URL https:// dl.acm.org/doi/abs/10. Hsu:2011:WLC 1145/3191744. [HCM11] Francis Hsu, Hao Chen, Hosny:2019:RCI and Sridhar Machiraju. WebCallerID: Leveraging [HD19] Khalid M. Hosny and Mo- cellular networks for Web hamed M. Darwish. Re- authentication. Journal of silient color image wa- Computer Security, 19(5): termarking using accu- 869–893, ???? 2011. CO- rate quaternion radial sub- DEN JCSIET. ISSN 0926- stituted Chebyshev mo- 227X (print), 1875-8924 ments. ACM Transac- (electronic). tions on Multimedia Com- puting, Communications, Hernandez-Castro:2012:AFH and Applications, 15(2): 46:1–46:??, June 2019. CO- [HCPLSB12] Julio Cesar Hernandez- DEN ???? ISSN 1551-6857 Castro, Pedro Peris-Lopez, (print), 1551-6865 (elec- Masoumeh Safkhani, and tronic). URL https:// Nasour Bagheri. Another dl.acm.org/ft_gateway. fallen hash-based RFID au- cfm?id=3325193. thentication protocol. Lec- ture Notes in Computer Han:2013:RMA Science, 7322:29–37, 2012. [HDPC13] Song Han, Tharam Dillon, CODEN LNCSD9. ISSN Vidy Potdar, and Eliza- 0302-9743 (print), 1611- beth Chang. RFID mu- 3349 (electronic). URL tual authentication proto- http://link.springer. cols for tags and read- com/chapter/10.1007/978- ers with and without a 3-642-30955-7_4/. server. International Jour- Huang:2018:BLD nal of Computer Systems Science and Engineering, [HCYZ18] Chenyu Huang, Huangxun 28(2):??, ???? 2013. CO- Chen, Lin Yang, and Qian DEN CSSEEI. ISSN 0267- Zhang. BreathLive: Live- 6192. ness detection for heart Heninger:2012:MYP sound authentication with deep breathing. Proceed- [HDWH12] Nadia Heninger, Zakir ings of the ACM on In- Durumeric, Eric Wus- teractive, Mobile, Wear- trow, and J. Alex Hal- able and Ubiquitous Tech- derman. Mining your nologies (IMWUT), 2(1): Ps and Qs: Detection REFERENCES 303

of widespread weak keys com/chapter/10.1007/978- in network devices. In 3-642-35416-8_13/. ????, editor, Proceedings Hamad:2018:DWU of the 21st USENIX Se- curity Symposium, Au- [HEK18] Safwat Hamad, Ahmed El- gust 2012, pages 205–220. hadad, and Amal Khalifa. USENIX, Berkeley, CA, DNA watermarking using USA, 2012. ISBN ???? codon postfix technique. LCCN ???? URL https:/ IEEE/ACM Transactions /factorable.net/paper. on Computational Biol- html; https://factorable. ogy and Bioinformatics,15 net/weakkeys12.conference. (5):1605–1610, September pdf; https://factorable. 2018. CODEN ITCBCY. net/weakkeys12.extended. ISSN 1545-5963 (print), pdf. 1557-9964 (electronic).

Heath:2015:HNS Hellman:2017:TLC

[Hea15] Nick Heath. Hacking the [Hel17] Martin E. Hellman. Tur- Nazis: The secret story ing Lecture: Cybersecu- of the women who broke rity, nuclear security, Alan Hitler’s codes. TechRe- Turing, and illogical logic. public, ??(??):??, March Communications of the 26, 2015. URL http:/ Association for Comput- /www.techrepublic.com/ ing Machinery, 60(12):52– article/the-women-who- 59, December 2017. CO- helped-crack-nazi-codes- DEN CACMA2. ISSN at-bletchley-park/. 0001-0782 (print), 1557- 7317 (electronic). URL Hwang:2012:ABA https://cacm.acm.org/ magazines/2017/12/223042- [HEC+12] Jung Yeon Hwang, Sung- cybersecurity-nuclear- wook Eom, Ku-Young security-alan-turing- Chang, Pil Joong Lee, and and-illogical-logic. DaeHun Nyang. Anonymity- Hanka:2011:DPK based authenticated key agreement with full bind- [HEP+11] Oliver Hanka, Michael ing property. Lecture Eichhorn, Martin Pfannen- Notes in Computer Sci- stein, J¨org Ebersp¨acher, ence, 7690:177–191, 2012. and Eckehard Steinbach. CODEN LNCSD9. ISSN A distributed public key 0302-9743 (print), 1611- infrastructure based on 3349 (electronic). URL threshold cryptography for http://link.springer. the HiiMap next genera- REFERENCES 304

tion Internet architecture. CODEN LNCSD9. ISSN Future Internet, 3(1):14– 0302-9743 (print), 1611- 30, February 01, 2011. CO- 3349 (electronic). URL DEN ???? ISSN 1999- http://link.springer. 5903. URL https://www. com/chapter/10.1007/978- mdpi.com/1999-5903/3/ 3-642-31662-3_1/. 1/14. Heys:2017:SCF Hermelin:2010:MLC [Hey17] Howard M. Heys. Sta- [Her10] Miia Hermelin. Multidi- tistical cipher feedback mensional linear cryptanal- of stream ciphers. The ysis. Ph.D. thesis, Aalto- Computer Journal,60 yliopiston teknillinen ko- (12):1839–1851, Decem- rkeakoulu, Espoo, Finland, ber 1, 2017. CO- 2010. 97 pp. DEN CMPJA6. ISSN 0010-4620 (print), 1460- Herranz:2014:ABS 2067 (electronic). URL https://academic.oup. [Her14] Javier Herranz. Attribute- com/comjnl/article/60/ based signatures from 12/1839/3959607. RSA. Theoretical Com- puter Science, 527(??):73– Harn:2014:MTS 82, March 27, 2014. CO- [HF14a] Lein Harn and Miao Fuyou. DEN TCSCDI. ISSN 0304- Multilevel threshold se- 3975 (print), 1879-2294 cret sharing based on the (electronic). URL http:// Chinese Remainder Theo- www.sciencedirect.com/ rem. Information Process- science/article/pii/S0304397514000772. ing Letters, 114(9):504– Herardian:2019:SUC 509, September 2014. CO- DEN IFPLAT. ISSN 0020- [Her19] R. Herardian. The soft 0190 (print), 1872-6119 underbelly of cloud secu- (electronic). URL http:// rity. IEEE Security & Pri- www.sciencedirect.com/ vacy, 17(3):90–93, May/ science/article/pii/S0020019014000659. June 2019. ISSN 1540-7993 (print), 1558-4046 (elec- Hoang:2014:IMD tronic). [HF14b] Anh-Tuan Hoang and Hess:2012:GJC Takeshi Fujino. Intra- masking dual-rail memory [Hes12] Florian Hess. Generalised on LUT implementation Jacobians in cryptography for SCA-resistant AES on and coding theory. Lec- FPGA. ACM Transactions ture Notes in Computer on Reconfigurable Tech- Science, 7369:1–15, 2012. nology and Systems, 7(2): REFERENCES 305

10:1–10:??, June 2014. CO- Huang:2016:EDP DEN ???? ISSN 1936-7406 (print), 1936-7414 (elec- [HFT16] Shi-Yuan Huang, Chun-I tronic). Fan, and Yi-Fan Tseng. Enabled/disabled predi- cate encryption in clouds. Hocking:2013:COU Future Generation Com- puter Systems, 62(??):148– [HFCR13] C. G. Hocking, S. M. Fur- 160, September 2016. CO- nell, N. L. Clarke, and DEN FGSEVI. ISSN 0167- P. L. Reynolds. Co- 739X (print), 1872-7115 operative user identity ver- (electronic). URL http:// ification using an authen- www.sciencedirect.com/ tication aura. Comput- science/article/pii/S0167739X15003921. ers & Security, 39 (part B)(??):486–502, Novem- Hanocka:2019:APS ber 2013. CODEN [HFW+19] Rana Hanocka, Noa Fish, CPSEDU. ISSN 0167-4048 Zhenhua Wang, Raja (print), 1872-6208 (elec- Giryes, Shachar Fleish- tronic). URL https:// man, and Daniel Cohen- www.sciencedirect.com/ Or. ALIGNet: Partial- science/article/pii/S0167404813001417. shape agnostic alignment via unsupervised learn- Hintze:2019:CUR ing. ACM Transactions on Graphics, 38(1):1:1–1:??, [HFS+19] Daniel Hintze, Matthias February 2019. CODEN F¨uller, Sebastian Scholz, ATGRDF. ISSN 0730-0301 Rainhard D. Findling, (print), 1557-7368 (elec- Muhammad Muaaz, Philipp tronic). URL https:// Kapfer, Eckhard Koch, and dl.acm.org/ft_gateway. Ren´e Mayrhofer. COR- cfm?id=3267347. MORANT: Ubiquitous Heyse:2012:TOC risk-aware multi-modal biometric authentication [HG12] Stefan Heyse and Tim across mobile devices. Pro- G¨uneysu. Towards one ceedings of the ACM on In- cycle per bit asymmet- teractive, Mobile, Wearable ric encryption: Code-based and Ubiquitous Technolo- cryptography on reconfig- gies (IMWUT), 3(3):1–23, urable hardware. Lecture September 2019. CODEN Notes in Computer Sci- ???? ISSN 2474-9567 (elec- ence, 7428:340–355, 2012. tronic). URL https:// CODEN LNCSD9. ISSN dl.acm.org/doi/abs/10. 0302-9743 (print), 1611- 1145/3351243. 3349 (electronic). URL REFERENCES 306

http://link.springer. March 2011. CODEN JN- com/chapter/10.1007/978- CAF3. ISSN 1084-8045 3-642-33027-8_20/. (print), 1095-8592 (elec- tronic). URL http:// Hibschman:2019:ISS www.sciencedirect.com/ [HGOZ19] Joshua Hibschman, Darren science/article/pii/S1084804510000974. Gergle, Eleanor O’Rourke, Harn:2015:DTS and Haoqi Zhang. Iso- pleth: Supporting sense- [HH15] Lein Harn and Ching-Fang making of professional Web Hsu. Dynamic thresh- applications to create read- old secret reconstruction ily available learning expe- and its application to riences. ACM Transactions the threshold cryptogra- on Computer-Human In- phy. Information Process- teraction, 26(3):16:1–16:??, ing Letters, 115(11):851– June 2019. CODEN AT- 857, November 2015. CO- CIF4. ISSN 1073-0516 DEN IFPLAT. ISSN 0020- (print), 1557-7325 (elec- 0190 (print), 1872-6119 tronic). URL https:// (electronic). URL http:// dl.acm.org/ft_gateway. www.sciencedirect.com/ cfm?id=3310274. science/article/pii/S0020019015001106. Hua:2015:TSE Hu:2016:EWS [HGT15] Guang Hua, J. Goh, and V. L. L. Thing. Time- [HH16] Changhui Hu and Lidong spread echo-based audio Han. Efficient wildcard watermarking with op- search over encrypted data. timized imperceptibility International Journal of and robustness. IEEE/ Information Security,15 ACM Transactions on Au- (5):539–547, October 2016. dio, Speech, and Language CODEN ???? ISSN Processing, 23(2):227–239, 1615-5262 (print), 1615- February 2015. CODEN 5270 (electronic). URL ???? ISSN 2329-9290. http://link.springer. com/article/10.1007/s10207- Han:2011:PEB 015-0302-0. [HGWY11] Yiliang Han, Xiaolin Gui, Huber:2019:FCL Xuguang Wu, and Xi- aoyuan Yang. Proxy en- [HHAW19] Manuel Huber, Julian cryption based secure mul- Horsch, Junaid Ali, and ticast in wireless mesh net- Sascha Wessel. Freeze and works. Journal of Net- crypt: Linux kernel sup- work and Computer Ap- port for main memory en- plications, 34(2):469–477, cryption. Computers & REFERENCES 307

Security, 86(??):420–436, preserving watermarking of September 2019. CODEN vector graphics. Interna- CPSEDU. ISSN 0167-4048 tional Journal of Compu- (print), 1872-6208 (elec- tational Geometry and Ap- tronic). URL https:// plications (IJCGA), 24(1): www.sciencedirect.com/ 61–??, March 2014. CO- science/article/pii/S0167404818310435. DEN IJCAEV. ISSN 0218- 1959. Hammi:2018:BTD Huang:2017:BBC [HHBS18] Mohamed Tahar Hammi, Badis Hammi, Patrick Bel- [HHP17] Jianye Huang, Qiong lot, and Ahmed Serhrouchni. Huang, and Chunhua Pan. Bubbles of trust: a A black-box construction decentralized blockchain- of strongly unforgeable based authentication sys- signature scheme in the tem for IoT. Computers & leakage setting. Interna- Security, 78(??):126–142, tional Journal of Foun- September 2018. CODEN dations of Computer Sci- CPSEDU. ISSN 0167-4048 ence (IJFCS), 28(6):761– (print), 1872-6208 (elec- ??, September 2017. CO- DEN IFCSEN. ISSN 0129- tronic). URL https:// 0541. www.sciencedirect.com/ science/article/pii/S0167404818300890. Haitner:2011:PRI Hayashi:2013:AEI [HHR11] Iftach Haitner, Danny Harnik, and Omer Rein- [HHH+13] Y.-I. Hayashi, Y. Hayashi, gold. On the power of N. Homma, T. Mizuki, and the randomized iterate. T. Aoki. Analysis of elec- SIAM Journal on Com- tromagnetic information puting, 40(6):1486–1528, leakage from cryptographic ???? 2011. CODEN SMJ- devices with different phys- CAT. ISSN 0097-5397 ical structures. IEEE (print), 1095-7111 (elec- Transactions on Electro- tronic). URL http:// magnetic Compatibility,?? epubs.siam.org/sicomp/ (??):1–10, 2013. CODEN resource/1/smjcat/v40/ IEMCAE. ISSN 0018-9375 i6/p1486_s1. (print), 1558-187X (elec- tronic). Hong:2015:RSM + Huber:2014:TPW [HHS 15] Wien Hong, Gwoboa Horng, Chih-Wei Shiu, Tung-Shou [HHMK14] Stefan Huber, Martin Chen, and Yu-Chi Chen. Held, Peter Meerwald, and Reversible steganographic Roland Kwitt. Topology- method using complexity REFERENCES 308

control and human visual division property based system. The Computer cube attacks exploiting al- Journal, 58(10):2583–2594, gebraic properties of Su- October 2015. CODEN perpoly. IEEE Transac- CMPJA6. ISSN 0010-4620 tions on Computers,68 (print), 1460-2067 (elec- (10):1470–1486, October tronic). URL http:// 2019. CODEN ITCOB4. comjnl.oxfordjournals. ISSN 0018-9340 (print), org/content/58/10/2583. 1557-9956 (electronic). Huang:2018:LRD Hinek:2010:CRV

[HHS18] Jianye Huang, Qiong [Hin10] M. Jason Hinek. Crypt- Huang, and Willy Susilo. analysis of RSA and its Leakage-resilient dual-form variants. Chapman and signatures. The Computer Hall/CRC cryptography Journal, 61(8):1216–1227, and network security. CRC August 1, 2018. CODEN Press, 2000 N.W. Cor- CMPJA6. ISSN 0010-4620 porate Blvd., Boca Ra- (print), 1460-2067 (elec- ton, FL 33431-9868, USA, tronic). URL http:// 2010. ISBN 1-4200-7518- academic.oup.com/comjnl/ 7 (hardcover). xviii + 268 article/61/8/1216/5035762. pp. LCCN TK5102.94 .H56 2010. Hinarejos:2015:MES Harb:2019:FIE [HIDFGPC15] M. Francisca Hinarejos, [HJ19] Salah Harb and Moath Andreu Pere Isern-Dey`a, Jarrah. FPGA imple- Josep-Llu´ıs Ferrer-Gomila, mentation of the ECC and Magdalena Payeras- over GF(2m) for small Capell`a. MC-2D: an ef- embedded applications. ficient and scalable multi- ACM Transactions on Em- coupon scheme. The Com- bedded Computing Sys- puter Journal, 58(4):758– tems, 18(2):17:1–17:??, 778, April 2015. CODEN April 2019. CODEN CMPJA6. ISSN 0010-4620 ???? ISSN 1539-9087 (print), 1460-2067 (elec- (print), 1558-3465 (elec- tronic). URL http:// tronic). URL https:// comjnl.oxfordjournals. dl.acm.org/ft_gateway. org/content/58/4/758. cfm?id=3310354. Hao:2019:IDP Hinkelmann:2011:CPA [HIJ+19] Y. Hao, T. Isobe, L. Jiao, [HJM+11] Markus Hinkelmann, An- C. Li, W. Meier, Y. Todo, dreas Jakoby, Nina Moe- and Q. Wang. Improved bius, Tiark Rompf, and REFERENCES 309

Peer Stechert. A crypto- ers & Security, 67(??):211– graphically t-private auc- 231, June 2017. CODEN tion system. Concurrency CPSEDU. ISSN 0167-4048 and Computation: Prac- (print), 1872-6208 (elec- tice and Experience,23 tronic). URL https:// (12):1399–1413, August 25, www.sciencedirect.com/ 2011. CODEN CCPEBO. science/article/pii/S0167404817300408. ISSN 1532-0626 (print), 1532-0634 (electronic). Hussain:2018:PPP Hasan:2014:TFL [HK18] Siam Umar Hussain and Farinaz Koushanfar. P3: [HK14a] O. Hasan and S. A. Privacy preserving posi- Khayam. Towards for- tioning for smart automo- mal linear cryptanalysis us- tive systems. ACM Trans- ing HOL4. J.UCS: Jour- actions on Design Au- nal of Universal Com- tomation of Electronic Sys- puter Science, 20(2):193– tems, 23(6):79:1–79:??, De- ??, ???? 2014. CO- cember 2018. CODEN DEN ???? ISSN 0948- ATASFO. ISSN 1084-4309 695X (print), 0948-6968 (print), 1557-7309 (elec- (electronic). URL http:/ tronic). /www.jucs.org/jucs_20_ 2/towards_formal_linear_ Hiemenz:2019:DSS cryptanalysis. [HK19] Benedikt Hiemenz and Hur:2014:SDR Michel Kr¨amer. Dynamic searchable symmetric en- [HK14b] Junbeom Hur and Kyung- cryption for storing geospa- tae Kang. Secure data tial data in the cloud. retrieval for decentralized International Journal of disruption-tolerant mili- Information Security,18 tary networks. IEEE/ACM (3):333–354, June 2019. Transactions on Network- CODEN ???? ISSN ing, 22(1):16–26, February 1615-5262 (print), 1615- 2014. CODEN IEANEP. 5270 (electronic). URL ISSN 1063-6692 (print), http://link.springer. 1558-2566 (electronic). com/article/10.1007/s10207- 018-0414-4. Hasan:2017:UAF Hameed:2018:TFV [HK17] Ragib Hasan and Rasib Khan. Unified authentica- [HKA+18] Khizar Hameed, Abid tion factors and fuzzy ser- Khan, Mansoor Ahmed, vice access using interac- Alavalapati Goutham Reddy, tion provenance. Comput- and M. Mazhar Rathore. REFERENCES 310

Towards a formally verified Hur:2013:REC zero watermarking scheme for data integrity in the [HKHK13] Junbeom Hur, Dongyoung Internet of Things based- Koo, Seong Oun Hwang, wireless sensor networks. and Kyungtae Kang. Re- Future Generation Com- moving escrow from ci- puter Systems, 82(??):274– phertext policy attribute- 289, May 2018. CODEN based encryption. Comput- FGSEVI. ISSN 0167-739X ers and Mathematics with (print), 1872-7115 (elec- Applications, 65(9):1310– tronic). URL https:// 1317, May 2013. CODEN www.sciencedirect.com/ CMAPDK. ISSN 0898- science/article/pii/S0167739X17322756. 1221 (print), 1873-7668 (electronic). URL http:// Handa:2019:SES www.sciencedirect.com/ science/article/pii/S0898122112001198.

[HKA19] Rohit Handa, C. Rama Hanzlik:2019:CPC Krishna, and Naveen Ag- garwal. Searchable en- [HKK19] Lucjan Hanzlik, Kamil cryption: a survey on Kluczniak, and Miroslaw privacy-preserving search Kutylowski. CTRL-PACE: schemes on encrypted out- Controlled randomness for sourced data. Concurrency e-passport password au- and Computation: Practice thentication. Fundamenta and Experience, 31(17): Informaticae, 169(4):295– e5201:1–e5201:??, Septem- 330, ???? 2019. CODEN ber 10, 2019. CODEN FUMAAJ. ISSN 0169-2968 CCPEBO. ISSN 1532-0626 (print), 1875-8681 (elec- (print), 1532-0634 (elec- tronic). tronic). Heyse:2012:LEA

Houmansadr:2014:NBW [HKL+12] Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof [HKB14] Amir Houmansadr, Ne- Paar, and Krzysztof Pietrzak. gar Kiyavash, and Nikita Lapin: An efficient au- Borisov. Non-blind water- thentication protocol based marking of network flows. on ring-LPN. Lecture IEEE/ACM Transactions Notes in Computer Sci- on Networking, 22(4): ence, 7549:346–365, 2012. 1232–1244, August 2014. CODEN LNCSD9. ISSN CODEN IEANEP. ISSN 0302-9743 (print), 1611- 1063-6692 (print), 1558- 3349 (electronic). URL 2566 (electronic). http://link.springer. REFERENCES 311

com/chapter/10.1007/978- ???? URL http:// 3-642-34047-5_20/. www.gbv.de/dms/tib-ub- hannover/63314455x.. Heil:2014:APH Harn:2010:AGK [HKL+14] Timothy Heil, Anil Kr- ishna, Nicholas Lindberg, [HL10a] L. Harn and Changlu Lin. Farnaz Toussi, and Steven Authenticated group key Vanderwiel. Architecture transfer protocol based and performance of the on secret sharing. IEEE hardware accelerators in Transactions on Comput- IBM’s PowerEN processor. ers, 59(6):842–846, June ACM Transactions on Par- 2010. CODEN IT- allel Computing (TOPC), COB4. ISSN 0018-9340 1(1):5:1–5:??, September (print), 1557-9956 (elec- 2014. CODEN ???? ISSN tronic). URL http:/ 2329-4949 (print), 2329- /ieeexplore.ieee.org/ 4957 (electronic). stamp/stamp.jsp?tp=&arnumber= 5416683. Howe:2018:PDG Hazay:2010:EST + [HKR 18] James Howe, Ayesha Khalid, [HL10b] Carmit Hazay and Yehuda Ciara Rafferty, Francesco Lindell. Efficient Se- Regazzoni, and M´aire cure Two-Party Protocols: O’Neill. On practical dis- Techniques and Construc- crete Gaussian samplers tions. Information Security for lattice-based cryptog- and Cryptography. Spring- raphy. IEEE Transactions er-Verlag, Berlin, Ger- on Computers, 67(3):322– many / Heidelberg, Ger- 334, ???? 2018. CO- many / London, UK / DEN ITCOB4. ISSN 0018- etc., 2010. ISBN 3-642- 9340 (print), 1557-9956 14302-4 (hardcover), 3-642- (electronic). URL http: 14303-2 (e-book). ISSN //ieeexplore.ieee.org/ 1619-7100 (print), 2197- document/7792671/. 845X (electronic). xiii + Holenstein:2011:ERO 263 + 1 pp. LCCN Z103 .H39 2010. URL http:/ [HKT11] Thomas Holenstein, Robin /www.springerlink.com/ K¨unzler, and Stefano Tes- content/978-3-642-14303- saro. The equivalence 8. of the random oracle Hsu:2011:NIB model and the ideal ci- pher model, revisited. In [HL11] Chien-Lung Hsu and Han- ACM [ACM11], pages 89– Yu Lin. New identity-based 98. ISBN ???? LCCN key-insulated convertible REFERENCES 312

multi-authenticated en- Online and automatic iden- cryption scheme. Journal tification of encryption net- of Network and Computer work behaviors in big data Applications, 34(5):1724– environment. Concurrency 1731, September 2011. CO- and Computation: Practice DEN JNCAF3. ISSN 1084- and Experience, 31(12): 8045 (print), 1095-8592 e4849:1–e4849:??, June 25, (electronic). URL http:// 2019. CODEN CCPEBO. www.sciencedirect.com/ ISSN 1532-0626 (print), science/article/pii/S1084804511001172. 1532-0634 (electronic). Hsieh:2012:EHF Hmood:2015:ACA

[HL12] Wen-Bin Hsieh and Jenq- [HLAZ15] Haider Salim Hmood, Zhi- Shiou Leu. Exploiting tang Li, Hasan Khalaf Ab- hash functions to intensify dulwahid, and Yang Zhang. the remote user authenti- Adaptive caching approach cation scheme. Computers to prevent DNS cache poi- & Security, 31(6):791–798, soning attack. The Com- September 2012. CODEN puter Journal, 58(4):973– CPSEDU. ISSN 0167-4048 985, April 2015. CODEN (print), 1872-6208 (elec- CMPJA6. ISSN 0010-4620 tronic). URL https:// (print), 1460-2067 (elec- www.sciencedirect.com/ tronic). URL http:// science/article/pii/S0167404812000910. comjnl.oxfordjournals. Hsieh:2014:AMU org/content/58/4/973. [HL14] Wen-Bin Hsieh and Jenq- Hu:2012:VMS Shiou Leu. An anony- [HLC12] Chunqiang Hu, Xiaofeng mous mobile user authenti- Liao, and Xiuzhen Cheng. cation protocol using self- Verifiable multi-secret shar- certified public keys based ing based on LFSR se- on multi-server architec- quences. Theoretical Com- tures. The Journal of Su- puter Science, 445(1):52– percomputing, 70(1):133– 62, August 3, 2012. CO- 148, October 2014. CO- DEN TCSCDI. ISSN 0304- DEN JOSUED. ISSN 3975 (print), 1879-2294 0920-8542 (print), 1573- (electronic). URL http:// 0484 (electronic). URL www.sciencedirect.com/ http://link.springer. science/article/pii/S0304397512004276. com/article/10.1007/s11227- 014-1135-8. Hu:2016:PBR Hejun:2019:OAI [HLC16] Yu-Chen Hu, Chun-Chi [HL19] Zhu Hejun and Zhu Liehuang. Lo, and Wu-Lin Chen. REFERENCES 313

Probability-based reversible cation by involving Diffie– image authentication scheme Hellman PKDS. J.UCS: for image demosaicking. Journal of Universal Com- Future Generation Com- puter Science, 17(6):891– puter Systems, 62(??):92– ??, ???? 2011. CO- 103, September 2016. CO- DEN ???? ISSN 0948- DEN FGSEVI. ISSN 0167- 695X (print), 0948-6968 739X (print), 1872-7115 (electronic). URL http:/ (electronic). URL http:// /www.jucs.org/jucs_17_ www.sciencedirect.com/ 6/improving_security_ science/article/pii/S0167739X1630070X. levels_of. Hu:2018:SVA Hwang:2019:ELS

[HLC+18] C. Hu, W. Li, X. Cheng, [HLH19] Min-Shiang Hwang, Cheng- J. Yu, S. Wang, and Chi Lee, and Shih-Ting R. Bie. A secure and verifi- Hsu. An ElGamal-like se- able access control scheme cure channel free public key for big data storage in encryption with keyword clouds. IEEE Transac- search scheme. Interna- tions on Big Data, 4(3): tional Journal of Founda- 341–355, September 2018. tions of Computer Science ISSN 2332-7790. (IJFCS), 30(2):??, Febru- ary 2019. ISSN 0129-0541. Hu:2019:AAA Huang:2015:MSE [HLC+19] Yupu Hu, Zhizhu Lian, Jiangshan Chen, Bao- [HLKL15] Chanying Huang, Hwaseong cang Wang, and Shanshan Lee, Hyoseung Kim, and Zhang. Algebraic attacks Dong Hoon Lee. mvSERS: against several weak vari- a secure emergency re- ants of GVW 13 ABE. sponse solution for mobile International Journal of healthcare in vehicular en- Foundations of Computer vironments. The Computer Science (IJFCS), 30(4): Journal, 58(10):2461–2475, 607–618, June 2019. ISSN October 2015. CODEN 0129-0541. URL https: CMPJA6. ISSN 0010-4620 //www.worldscientific. (print), 1460-2067 (elec- com/doi/10.1142/S012905411940015X. tronic). URL http:// comjnl.oxfordjournals. Huang:2011:ISL org/content/58/10/2461. [HLCL11] Y.-L. Huang, F.-Y. Leu, Harn:2011:FDM C.-H. Chiu, and I.-L. Lin. Improving security levels [HLLC11] Lein Harn, Chia-Yin Lee, of IEEE802.16e authenti- Changlu Lin, and Chin- REFERENCES 314

Chen Chang. Fully de- 1936-7406 (print), 1936- niable message authenti- 7414 (electronic). cation protocols preserv- ing confidentiality. The Herranz:2011:RBS Computer Journal,54[HLR11] Javier Herranz, Fabien (10):1688–1699, October Laguillaumie, and Carla 2011. CODEN CM- R`afols. Relations be- PJA6. ISSN 0010-4620 tween semantic security (print), 1460-2067 (elec- and anonymity in identity- tronic). URL http:// based encryption. Infor- comjnl.oxfordjournals. mation Processing Letters, org/content/54/10/1688. 111(10):453–460, April 30, full.pdf+html. 2011. CODEN IFPLAT. ISSN 0020-0190 (print), Han:2018:TSE 1872-6119 (electronic).

[HLLG18] Shuai Han, Shengli Liu, Ham:2018:IYP Lin Lyu, and Dawu Gu. Tightly secure encryption [HLS18] HyoungMin Ham, JongHyup schemes against related- Lee, and JooSeok Song. key attacks. The Com- Improved yoking proof puter Journal, 61(12): protocols for preserving 1825–1844, December 1, anonymity. Interna- 2018. CODEN CM- tional Journal of Infor- PJA6. ISSN 0010-4620 mation Security, 17(4): (print), 1460-2067 (elec- 379–393, August 2018. tronic). URL http:// CODEN ???? ISSN academic.oup.com/comjnl/ 1615-5262 (print), 1615- article/61/12/1825/5067538. 5270 (electronic). URL http://link.springer. Huffmire:2010:SPR com/article/10.1007/s10207- 017-0383-z. + [HLN 10] Ted Huffmire, Timothy Huang:2015:CEA Levin, Thuy Nguyen, Cyn- thia Irvine, Brett Brother- [HLT+15] Xinyi Huang, J. K. Liu, ton, Gang Wang, Timothy Shaohua Tang, Yang Xi- Sherwood, and Ryan Kast- ang, Kaitai Liang, Li Xu, ner. Security primitives for and Jianying Zhou. Cost- reconfigurable hardware- effective authentic and based systems. ACM anonymous data shar- Transactions on Reconfig- ing with forward secu- urable Technology and Sys- rity. IEEE Transactions tems, 3(2):10:1–10:??, May on Computers, 64(4):971– 2010. CODEN ???? ISSN 983, April 2015. CODEN REFERENCES 315

ITCOB4. ISSN 0018-9340 Data Connection Core in a (print), 1557-9956 (elec- 4G environment. The Jour- tronic). nal of Supercomputing,67 (3):635–652, March 2014. Howard:2010:DSS CODEN JOSUED. ISSN [HLV10] Michael Howard, David 0920-8542 (print), 1573- LeBlanc, and John Viega. 0484 (electronic). URL 24 deadly sins of soft- http://link.springer. ware security: program- com/article/10.1007/s11227- ming flaws and how to 013-0958-z. fix them. McGraw-Hill, Hefeeda:2010:ASM New York, NY, USA, [HM10] Mohamed Hefeeda and 2010. ISBN 0-07-162675- Kianoosh Mokhtarian. Au- 1. xxxvii + 393 pp. LCCN thentication schemes for QA76.9.A25 H6977 2010. multimedia streams: Quan- Hohenberger:2012:DDQ titative analysis and com- parison. ACM Transac- [HLW12] Susan Hohenberger, Alli- tions on Multimedia Com- son Lewko, and Brent Wa- puting, Communications, ters. Detecting danger- and Applications, 6(1):6:1– ous queries: a new ap- 6:??, February 2010. CO- proach for chosen cipher- DEN ???? ISSN 1551-6857 text security. Lecture (print), 1551-6865 (elec- Notes in Computer Sci- tronic). ence, 7237:663–681, 2012. CODEN LNCSD9. ISSN Herzberg:2012:TJA 0302-9743 (print), 1611- [HM12] Amir Herzberg and Ro- 3349 (electronic). URL nen Margulies. Train- http://link.springer. ing Johnny to authenticate com/accesspage/chapter/ (safely). IEEE Security & 10.1007/978-3-642-29011- Privacy, 10(1):37–45, Jan- 4_38; http://link.springer. uary/February 2012. ISSN com/chapter/10.1007/978- 1540-7993 (print), 1558- 3-642-29011-4_39/. 4046 (electronic). Huang:2014:SWC Hwang:2019:BBR [HLYS14] Yi-Li Huang, Fang-Yie [HM19] S. O. Hwang and A. Mehmood. Leu, Ilsun You, and Yao- Blockchain-based resource Kuo Sun. A secure wire- syndicate. Computer,52 less communication system (5):58–66, May 2019. CO- integrating RSA, Diffie– DEN CPTRB4. ISSN Hellman PKDS, intelligent 0018-9162 (print), 1558- protection-key chains and a 0814 (electronic). REFERENCES 316

Hore:2012:SMR Hirt:2014:BA

[HMCK12] Bijit Hore, Sharad Mehro- [HMR14] Martin Hirt, Ueli Maurer, tra, Mustafa Canim, and and Pavel Raykov. Broad- Murat Kantarcioglu. Se- cast amplification. Lecture cure multidimensional range Notes in Computer Sci- queries over outsourced ence, 8349:419–439, 2014. data. VLDB Journal: Very CODEN LNCSD9. ISSN Large Data Bases, 21(3): 0302-9743 (print), 1611- 333–358, June 2012. CO- 3349 (electronic). URL DEN VLDBFR. ISSN http://link.springer. 1066-8888 (print), 0949- com/chapter/10.1007/978- 877X (electronic). 3-642-54242-8_18/. Harnik:2010:CIC Hajihassani:2019:FAI [HN10] Danny Harnik and Moni [HMKG19] O. Hajihassani, S. K. Mon- Naor. On the compress- NP fared, S. H. Khasteh, and ibility of instances S. Gorgin. Fast AES and cryptographic appli- implementation: A high- cations. SIAM Journal throughput bitsliced ap- on Computing, 39(5):1667– proach. IEEE Transac- 1713, ???? 2010. CODEN tions on Parallel and Dis- SMJCAT. ISSN 0097-5397 tributed Systems, 30(10): (print), 1095-7111 (elec- 2211–2222, October 2019. tronic). CODEN ITDSEO. ISSN Hodgson:2019:SSC 1045-9219 (print), 1558- 2183 (electronic). [Hod19] Roderick Hodgson. Solv- ing the security challenges Hoang:2012:ESB of IoT with public key cryptography. Network [HMR12] Viet Tung Hoang, Ben Security, 2019(1):17–19, Morris, and Phillip Ro- January 2019. CODEN gaway. An encipher- NTSCF5. ISSN 1353-4858 ing scheme based on a (print), 1872-9371 (elec- card shuffle. Lecture tronic). URL http:// Notes in Computer Sci- www.sciencedirect.com/ ence, 7417:1–13, 2012. CO- science/article/pii/S135348581930011X. DEN LNCSD9. ISSN Hoffmann:2015:LBQb 0302-9743 (print), 1611- 3349 (electronic). URL [Hof15] Leah Hoffmann. Last http://link.springer. byte: Q&A: A pas- com/chapter/10.1007/978- sion for pairings. Com- 3-642-32009-5_1/. munications of the As- REFERENCES 317

sociation for Computing 0163-5700 (print), 1943- Machinery, 58(9):128–ff, 5827 (electronic). September 2015. CODEN CACMA2. ISSN 0001-0782 Horsman:2019:CPE (print), 1557-7317 (elec- tronic). URL http:// [Hor19] G. Horsman. A call for cacm.acm.org/magazines/ the prohibition of encryp- 2015/9/191171/fulltext. tion: Panacea or problem? Hoffmann:2016:LBQb IEEE Security & Privacy, 17(2):59–66, March/April [Hof16] Leah Hoffmann. Last byte: 2019. ISSN 1540-7993 Q&A: Finding new di- (print), 1558-4046 (elec- rections in cryptography: tronic). Whitfield Diffie and Martin Hellman on their meeting, Hyla:2012:CBE their research, and the re- sults that billions use every [HP12] Tomasz Hyla and Jerzy day. Communications of Peja´s. Certificate-based en- the Association for Com- cryption scheme with gen- puting Machinery, 59(6): eral access structure. Lec- 112–ff, June 2016. CODEN ture Notes in Computer CACMA2. ISSN 0001-0782 Science, 7564:41–55, 2012. (print), 1557-7317 (elec- CODEN LNCSD9. ISSN tronic). URL http:// 0302-9743 (print), 1611- cacm.acm.org/magazines/ 3349 (electronic). URL 2016/6/202666/fulltext. http://link.springer. Hollings:2012:CCE com/chapter/10.1007/978- 3-642-33260-9_3/. [Hol12] Christopher Hollings. I, Claudius and the cipher ex- Hazay:2014:OSA traordinary. The Math- ematical Gazette, 96(537): [HP14] Carmit Hazay and Arpita 466–470, November 2012. Patra. One-sided adap- CODEN MAGAAS. ISSN tively secure two-party 0025-5572. computation. Lecture Homer:2017:RCS Notes in Computer Sci- ence, 8349:368–393, 2014. [Hom17] Steve Homer. Review of CODEN LNCSD9. ISSN Crypto School by Joachim 0302-9743 (print), 1611- von zur Gathen. ACM 3349 (electronic). URL SIGACT News, 48(3):10– http://link.springer. 13, September 2017. CO- com/chapter/10.1007/978- DEN SIGNDM. ISSN 3-642-54242-8_16/. REFERENCES 318

Hyla:2017:HLS He:2012:ECT [HP17] Tomasz Hyla and Jerzy [HPC12] Debiao He, Sahadeo Pad- Peja´s. A Hess-like sig- hye, and Jianhua Chen. nature scheme based on An efficient certificate- implicit and explicit cer- less two-party authenti- tificates. The Computer cated key agreement pro- Journal, 60(4):457–475, tocol. Computers and March 23, 2017. CO- Mathematics with Appli- DEN CMPJA6. ISSN cations, 64(6):1914–1926, 0010-4620 (print), 1460- September 2012. CODEN 2067 (electronic). URL CMAPDK. ISSN 0898- https://academic.oup. 1221 (print), 1873-7668 com/comjnl/article/60/ (electronic). URL http:// 4/457/2608054. www.sciencedirect.com/ science/article/pii/S0898122112002490. Haigh:2018:CP Hadlington:2019:ERW [HP18] Thomas Haigh and Mark Priestley. Colossus and [HPJ+19] Lee Hadlington, Masa programmability. IEEE Popovac, Helge Janicke, Annals of the History Iryna Yevseyeva, and of Computing, 40(4):5–27, Kevin Jones. Exploring October/December 2018. the role of work identity CODEN IAHCEX. ISSN and work locus of con- 1058-6180 (print), 1934- trol in information secu- 1547 (electronic). URL rity awareness. Comput- https://ieeexplore.ieee. ers & Security, 81(??):41– org/document/8509146/. 48, March 2019. CODEN CPSEDU. ISSN 0167-4048 Halder:2010:WTR (print), 1872-6208 (elec- [HPC10] R. Halder, S. Pal, and tronic). URL https:// A. Cortesi. Watermarking www.sciencedirect.com/ techniques for relational science/article/pii/S0167404818308897. databases: Survey, clas- Hurrah:2019:DWF sification and comparison. J.UCS: Journal of Univer- [HPL+19] Nasir N. Hurrah, Shabir A. sal Computer Science,16 Parah, Nazir A. Loan, (21):3164–??, ???? 2010. Javaid A. Sheikh, Moham- CODEN ???? ISSN 0948- mad Elhoseny, and Khan 695X (print), 0948-6968 Muhammad. Dual water- (electronic). URL http:/ marking framework for pri- /www.jucs.org/jucs_16_ vacy protection and con- 21/watermarking_techniques_ tent authentication of mul- for_relational. timedia. Future Generation REFERENCES 319

Computer Systems, 94(??): based signcryption. Com- 654–673, May 2019. CO- puters and Mathematics DEN FGSEVI. ISSN 0167- with Applications, 60(2): 739X (print), 1872-7115 362–375, July 2010. CO- (electronic). URL http:// DEN CMAPDK. ISSN www.sciencedirect.com/ 0898-1221 (print), 1873- science/article/pii/S0167739X18317096. 7668 (electronic). URL http://www.sciencedirect. Howe:2015:PLB com/science/article/pii/ . [HPO+15] James Howe, Thomas S0898122110000167 P¨oppelmann, M´aire O’Neill, Han:2016:GGA Elizabeth O’Sullivan, and Tim G¨uneysu. Practical [HQY+16] Jinsong Han, Chen Qian, lattice-based digital sig- Panlong Yang, Dan Ma, nature schemes. ACM Zhiping Jiang, Wei Xi, and Transactions on Embed- Jizhong Zhao. GenePrint: ded Computing Systems,14 generic and accurate physical- (3):41:1–41:??, April 2015. layer identification for CODEN ???? ISSN 1539- UHF RFID tags. IEEE/ 9087 (print), 1558-3465 ACM Transactions on Net- (electronic). working, 24(2):846–858, April 2016. CODEN Hoffstein:2008:IMC IEANEP. ISSN 1063-6692 (print), 1558-2566 (elec- [HPS08] Jeffrey Hoffstein, Jill Cather- tronic). ine Pipher, and Joseph H. Silverman. An Introduction Han:2018:BEI to Mathematical Cryptog- raphy, volume 666 of Un- [HQY+18] Jinsong Han, Chen Qian, dergraduate texts in math- Yuqin Yang, Ge Wang, ematics. Springer-Verlag, Han Ding, Xin Li, and Berlin, Germany / Heidel- Kui Ren. Butterfly: berg, Germany / London, Environment-independent UK / etc., 2008. ISBN physical-layer authentica- 0-387-77993-0 (hardcover). tion for passive RFID. Pro- xv + 523 pp. LCCN QA268 ceedings of the ACM on In- .H64 2008. teractive, Mobile, Wearable Hur:2010:CCS and Ubiquitous Technolo- gies (IMWUT), 2(4):1–21, [HPY10] Junbeom Hur, Chanil December 2018. CODEN Park, and Hyunsoo Yoon. ???? ISSN 2474-9567 (elec- Chosen ciphertext secure tronic). URL https:// authenticated group com- dl.acm.org/doi/abs/10. munication using identity- 1145/3287044. REFERENCES 320

Han:2014:GTK and their usage in cryp- tography. ACM Trans- [HQZH14] Fei Han, Jing Qin, Huawei actions on Mathematical Zhao, and Jiankun Hu. Software, 45(4):39:1–39:17, A general transformation December 2019. CODEN from KP-ABE to search- ACMSCU. ISSN 0098- able encryption. Future 3500 (print), 1557-7295 Generation Computer Sys- (electronic). URL https: tems, 30(??):107–115, Jan- //dl.acm.org/citation. uary 2014. CODEN FG- cfm?id=3361680. SEVI. ISSN 0167-739X Hulsing:2013:OPX (print), 1872-7115 (elec- tronic). URL http:// [HRB13] Andreas H¨ulsing, Lea www.sciencedirect.com/ Rausch, and Johannes science/article/pii/S0167739X13001921. Buchman. Optimal param- eters for XMSSMT. Lecture He:2013:GME Notes in Computer Sci- [HR13] Q. Y. He and M. D. ence, 8128:194–208, 2013. Reid. Genuine multi- CODEN LNCSD9. ISSN partite Einstein–Podolsky– 0302-9743 (print), 1611- Rosen steering. Physical 3349 (electronic). URL Review Letters, 111(25): https://link.springer. 250403, December 2013. com/chapter/10.1007/978- CODEN PRLTAO. ISSN 3-642-40588-4_14. 0031-9007 (print), 1079- Huang:2014:AFS 7114 (electronic), 1092- 0145. URL http:/ [HREJ14] Lin-Shung Huang, Alex /link.aps.org/doi/10. Rice, Erling Ellingsen, and 1103/PhysRevLett.111. Collin Jackson. Analyzing 250403; http://www. forged SSL certificates in scientificcomputing.com/ the wild. In ????, editor, news/2014/03/einsteins- IEEE Symposium on Secu- entanglement-produces- rity and Privacy, page ?? quantum-encryption; IEEE Computer Society http://www.swinburne. Press, 1109 Spring Street, edu.au/engineering/caous/ Suite 300, Silver Spring, news_and_events/mulitipartite% MD 20910, USA, 2014. 20EPR%20steering%20paper. ISBN ???? LCCN ???? htm. URL ????. Hisil:2019:KLF Hussain:2018:SSH [HR19] Huseyin Hisil and Joost [HRK18] Siam Umar Hussain, M. Sadegh Renes. On Kummer lines Riazi, and Farinaz Koushan- with full rational 2-torsion far. SHAIP: Secure Ham- REFERENCES 321

ming Distance for Authen- Hulsing:2016:MMT tication of Intrinsic PUFs. ACM Transactions on De- [HRS16] Andreas H¨ulsing, Joost Ri- sign Automation of Elec- jneveld, and Fang Song. tronic Systems, 23(6):75:1– Mitigating multi-target at- 75:??, December 2018. CO- tacks in hash-based signa- DEN ATASFO. ISSN 1084- tures. Lecture Notes in 4309 (print), 1557-7309 Computer Science, 9614: (electronic). 387–416, 2016. CO- DEN LNCSD9. ISSN Hassan:2019:DPR 0302-9743 (print), 1611- 3349 (electronic). URL [HRK+19] Muneeb Ul Hassan, Mubashir Hu- https://link.springer. sain Rehmani, Ramamo- com/chapter/10.1007/978- hanarao Kotagiri, Jiekui 3-662-49384-7_15. Zhang, and Jinjun Chen. Haitner:2010:EIC Differential privacy for re- newable energy resources [HRV10] Iftach Haitner, Omer Rein- based smart metering. gold, and Salil Vadhan. Journal of Parallel and Efficiency improvements Distributed Computing, in constructing pseudo- 131(??):69–80, September random generators from 2019. CODEN JPD- one-way functions. In CER. ISSN 0743-7315 ACM [ACM10], pages 437– (print), 1096-0848 (elec- 446. ISBN 1-60558-817- tronic). URL http:// 2. LCCN QA 76.6 .A152 www.sciencedirect.com/ 2010. URL http:// science/article/pii/S0743731518309201. www.gbv.de/dms/tib-ub- hannover/63314455x.. Herranz:2013:SMS Hwang:2011:CDA [HRS13] Javier Herranz, Alexan- [HS11] Shin-Jia Hwang and Yun- dre Ruiz, and Germ´an Hao Sung. Confiden- S´aez. Sharing many se- tial deniable authentica- crets with computational tion using promised sign- provable security. Infor- cryption. The Journal mation Processing Letters, of Systems and Software, 113(14–16):572–579, July/ 84(10):1652–1659, Octo- August 2013. CODEN IF- ber 2011. CODEN JS- PLAT. ISSN 0020-0190 SODM. ISSN 0164-1212 (print), 1872-6119 (elec- (print), 1873-1228 (elec- tronic). URL http:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0020019013001373. science/article/pii/S0164121211000999. REFERENCES 322

Hubballi:2018:NTC Tree-based HB protocols for privacy-preserving au- [HS18] Neminath Hubballi and thentication of RFID tags. Mayank Swarnkar. Bit- Journal of Computer Se- Coding: Network traf- curity, 19(2):343–363, ???? fic classification through 2011. CODEN JCSIET. encoded bit level signa- ISSN 0926-227X (print), tures. IEEE/ACM Trans- 1875-8924 (electronic). actions on Networking, 26(5):2334–2346, October Han:2013:IBD 2018. CODEN IEANEP. [HSM13] Jinguang Han, Willy Susilo, ISSN 1063-6692 (print), and Yi Mu. Identity-based 1558-2566 (electronic). data storage in cloud com- Homma:2014:TFD puting. Future Generation Computer Systems, 29(3): [HSA14] N. Homma, K. Saito, 673–681, March 2013. CO- and T. Aoki. Toward DEN FGSEVI. ISSN 0167- formal design of practi- 739X (print), 1872-7115 cal cryptographic hardware (electronic). URL http:// based on Galois field arith- www.sciencedirect.com/ metic. IEEE Transac- science/article/pii/S0167739X12001719. tions on Computers,63 (10):2604–2613, October Han:2014:IBS 2014. CODEN ITCOB4. [HSM14] Jinguang Han, Willy Susilo, ISSN 0018-9340 (print), and Yu Mu. Identity-based 1557-9956 (electronic). secure distributed data Hall:2019:BIA storage schemes. IEEE Transactions on Comput- [HSC19] Calum C. Hall, Lynsay A. ers, 63(4):941–953, April Shepherd, and Natalie 2014. CODEN ITCOB4. Coull. BlackWatch: In- ISSN 0018-9340. creasing attack awareness Han:2012:PPD within Web applications. Future Internet, 11(2):44, [HSMY12] Jinguang Han, Willy Susilo, February 15, 2019. CO- Yi Mu, and Jun Yan. DEN ???? ISSN 1999- Privacy-preserving decen- 5903. URL https://www. tralized key-policy attribute- mdpi.com/1999-5903/11/ based encryption. IEEE 2/44. Transactions on Parallel Halevi:2011:TBH and Distributed Systems, 23(11):2150–2162, Novem- [HSH11] Tzipora Halevi, Nitesh ber 2012. CODEN ITD- Saxena, and Shai Halevi. SEO. ISSN 1045-9219 REFERENCES 323

(print), 1558-2183 (elec- ber 2015. CODEN JO- tronic). SUED. ISSN 0920-8542 (print), 1573-0484 (elec- Heather:2014:CPE tronic). URL http:// [HST14] James Heather, Steve link.springer.com/article/ Schneider, and Vanessa 10.1007/s11227-015-1496- Teague. Cryptographic 7. protocols with everyday Hamdy:2011:HPB objects. Formal Aspects of Computing, 26(1):37– [HT11] Omar Hamdy and Issa 62, January 2014. CO- Traor´e. Homogeneous DEN FACME5. ISSN physio-behavioral visual 0934-5043 (print), 1433- and mouse-based biomet- 299X (electronic). URL ric. ACM Transactions on http://link.springer. Computer-Human Interac- com/article/10.1007/s00165- tion, 18(3):12:1–12:??, July 013-0274-7. 2011. CODEN ATCIF4. Ho:2011:EIB ISSN 1073-0516.

[HSUS11] Chen-Han Ho, Garret Henson:2013:MES Staus, Aaron Ulmer, and Karthikeyan Sankaralingam. [HT13] Michael Henson and Stephen Exploring the interaction Taylor. Memory encryp- between device lifetime re- tion: a survey of existing liability and security vul- techniques. ACM Com- nerabilities. IEEE Com- puting Surveys, 46(4):53:1– puter Architecture Let- 53:??, March 2013. CO- ters, 10(2):37–40, July/ DEN CMSVAN. ISSN December 2011. CODEN 0360-0300 (print), 1557- ???? ISSN 1556-6056 7341 (electronic). (print), 1556-6064 (elec- tronic). Hu:2010:TTW Shi:2015:CTS [HTC+10] Wen Hu, Hailun Tan, Pe- [hSZZ15] Run hua Shi, Hong Zhong, ter Corke, Wen Chan Shih, and Shun Zhang. Com- and Sanjay Jha. Toward ments on two schemes of trusted wireless sensor net- identity-based user authen- works. ACM Transactions tication and key agree- on Sensor Networks, 7(1): ment for mobile client- 5:1–5:??, August 2010. CO- server networks. The Jour- DEN ???? ISSN 1550-4859 nal of Supercomputing,71 (print), 1550-4867 (elec- (11):4015–4018, Novem- tronic). REFERENCES 324

Huang:2015:PAP Notes in Computer Sci- ence, 7059:99–108, 2012. [HTC+15] Kaibin Huang, Raylin Tso, CODEN LNCSD9. ISSN Yu-Chi Chen, Sk Md Miza- 0302-9743 (print), 1611- nur Rahman, Ahmad Al- 3349 (electronic). URL mogren, and Atif Alamri. http://link.springer. PKE-AET: Public key com/chapter/10.1007/978- encryption with autho- 3-642-27997-3_9/. rized equality test. The Hald:2015:RRA Computer Journal,58 (10):2686–2697, October [HU15] David Hald and Alex 2015. CODEN CM- Udakis. Rethinking remote PJA6. ISSN 0010-4620 authentication: time to (print), 1460-2067 (elec- kiss tokens goodbye? Net- tronic). URL http:// work Security, 2015(6):15– comjnl.oxfordjournals. 17, June 2015. CODEN org/content/58/10/2686. NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- Huang:2017:SSS tronic). URL http:// www.sciencedirect.com/ [HTC17] Kaibin Huang, Raylin Tso, science/article/pii/S1353485815300507. and Yu-Chi Chen. Some- what semantic secure pub- Hulsing:2013:WOS lic key encryption with [H¨ul13] Andreas H¨ulsing. W- filtered-equality-test in the OTS+ — shorter signa- standard model and its ex- tures for hash-based sig- tension to searchable en- nature scheme. Lecture cryption. Journal of Com- Notes in Computer Sci- puter and System Sciences, ence, 7918:173–188, 2013. 89(??):400–409, Novem- CODEN LNCSD9. ISSN ber 2017. CODEN JC- 0302-9743 (print), 1611- SSBM. ISSN 0022-0000 3349 (electronic). URL (print), 1090-2724 (elec- https://link.springer. tronic). URL http:// com/chapter/10.1007/978- www.sciencedirect.com/ 3-642-38553-7_10. science/article/pii/S0022000017300831. Hurlburt:2016:MBO Herbert:2012:SMP [Hur16] G. Hurlburt. Might the [HTZR12] Matthias Herbert, Tobias blockchain outlive Bitcoin? Thieme, Jan Zibuschka, IT Professional, 18(2):12– and Heiko Roßnagel. Se- 16, March 2016. CODEN cure mashup-providing IPMAFM. ISSN 1520-9202 platforms — implementing (print), 1941-045x (elec- encrypted wiring. Lecture tronic). REFERENCES 325

Hammerle-Uhl:2011:RWI Han:2012:MIA

[HURU11] Jutta H¨ammerle-Uhl, Karl [HvS12] Fengling Han and Ron van Raab, and Andreas Uhl. Schyndel. M-identity and Robust watermarking in its authentication proto- iris recognition: appli- col for secure mobile com- cation scenarios and im- merce applications. Lec- pact on recognition per- ture Notes in Computer formance. ACM SIGAPP Science, 7672:1–10, 2012. Applied Computing Re- CODEN LNCSD9. ISSN view, 11(3):6–18, Au- 0302-9743 (print), 1611- gust 2011. CODEN 3349 (electronic). URL ???? ISSN 1559-6915 http://link.springer. (print), 1931-0161 (elec- com/chapter/10.1007/978- tronic). URL https:// 3-642-35362-8_1/. dl.acm.org/doi/abs/10. 1145/2034594.2034595. Hammad:2019:PSF Harvey:2017:FPM [HW19] Mohamed Hammad and Kuanquan Wang. Paral- [HVL17] David Harvey, Joris Van lel score fusion of ECG Der Hoeven, and Gr´egoire and fingerprint for hu- Lecerf. Faster polyno- man authentication based mial multiplication over fi- on convolution neural net- nite fields. Journal of work. Computers & the ACM, 63(6):52:1–52:??, Security, 81(??):107–122, February 2017. CODEN March 2019. CODEN JACOAH. ISSN 0004-5411 CPSEDU. ISSN 0167-4048 (print), 1557-735X (elec- (print), 1872-6208 (elec- tronic). tronic). URL https:// www.sciencedirect.com/ Hunger:2018:DDC science/article/pii/S0167404818308411.

[HVP+18] Casen Hunger, Lluis Vi- Hwang:2011:NIB lanova, Charalampos Pa- pamanthou, Yoav Etsion, [Hwa11] Jung Yeon Hwang. A and Mohit Tiwari. DATS note on an identity-based — data containers for Web ring signature scheme with applications. ACM SIG- signer verifiability. The- PLAN Notices, 53(2):722– oretical Computer Science, 736, February 2018. CO- 412(8–10):796–804, March DEN SINODQ. ISSN 0362- 4, 2011. CODEN TC- 1340 (print), 1523-2867 SCDI. ISSN 0304-3975 (print), 1558-1160 (elec- (print), 1879-2294 (elec- tronic). tronic). REFERENCES 326

Holbl:2010:TPI 1, 2016. CODEN TC- SCDI. ISSN 0304-3975 [HWB10] Marko H¨olbl, Tatjana (print), 1879-2294 (elec- Welzer, and Bostjan Bru- tronic). URL http:// men. Two proposed www.sciencedirect.com/ identity-based three-party science/article/pii/S0304397516304443. authenticated key agree- ment protocols from pair- Heng:2010:CNS ings. Computers & [HWG10] Swee-Huay Heng, Re- Security, 29(2):244–252, becca N. Wright, and Bok- March 2010. CODEN Min Goi, editors. Cryptol- CPSEDU. ISSN 0167-4048 ogy and network security: (print), 1872-6208 (elec- 9th international confer- tronic). URL https:// ence, CANS 2010, Kuala www.sciencedirect.com/ Lumpur, Malaysia, De- science/article/pii/S016740480900090X. cember 12–14, 2010. Pro- ceedings, volume 6467 of Holbl:2012:ITP Lecture notes in computer [HWB12] Marko H¨olbl, Tatjana science. Springer-Verlag, Welzer, and Bostjan Bru- Berlin, Germany / Heidel- men. An improved two- berg, Germany / London, party identity-based au- UK / etc., 2010. ISBN thenticated key agree- 3-642-17618-6 (softcover). ment protocol using pair- LCCN ???? ings. Journal of Com- He:2015:SSQ

puter and System Sci- + ences, 78(1):142–150, Jan- [HWK 15] Zhian He, Wai Kit Wong, uary 2012. CODEN JC- Ben Kao, David Wai Lok SSBM. ISSN 0022-0000 Cheung, Rongbin Li, Siu Ming (print), 1090-2724 (elec- Yiu, and Eric Lo. SDB: a secure query processing tronic). URL http:// www.sciencedirect.com/ system with data interop- erability. Proceedings of the science/article/pii/S0022000011000031. VLDB Endowment, 8(12): He:2016:STI 1876–1879, August 2015. CODEN VLDBFR. ISSN [HWDL16] Kai He, Jian Weng, 2150-8097. Robert H. Deng, and Hong:2019:MCP Joseph K. Liu. On the security of two identity- [HWS+19] Haibo Hong, Licheng based conditional proxy re- Wang, Jun Shao, Jianhua encryption schemes. The- Yan, Haseeb Ahmad, Guiyi oretical Computer Science, Wei, Mande Xie, and Yix- 652(??):18–27, November ian Yang. A miniature REFERENCES 327

CCA public key encryp- Huang:2019:AIA tion scheme based on non- abelian factorization prob- [HWZZ19] Anna Huang, Dong Wang, lem in finite groups of Lie Run Zhao, and Qian type. The Computer Jour- Zhang. Au-Id: Automatic nal, 62(12):1840–1848, De- user identification and au- cember 2019. CODEN CM- thentication through the PJA6. ISSN 0010-4620 motions captured from se- (print), 1460-2067 (elec- quential human activities tronic). URL http:// using RFID. Proceed- academic.oup.com/comjnl/ ings of the ACM on In- article/62/12/1840/5627776. teractive, Mobile, Wear- able and Ubiquitous Tech- Hsu:2014:VWR nologies (IMWUT), 3(2): 1–26, June 2019. CODEN [HWYW14] Fu-Hau Hsu, Min-Hao Wu, ???? ISSN 2474-9567 (elec- Cheng-Hsing Yang, and tronic). URL https:// Shiuh-Jeng Wang. Visi- dl.acm.org/doi/abs/10. ble watermarking with re- 1145/3328919. versibility of multimedia Huang:2011:GFT images for ownership dec- larations. The Journal [HXC+11] Xinyi Huang, Yang Xi- of Supercomputing, 70(1): ang, Ashley Chonka, Jiany- 247–268, October 2014. ing Zhou, and Robert H. CODEN JOSUED. ISSN Deng. A generic framework 0920-8542 (print), 1573- for three-factor authentica- 0484 (electronic). URL tion: Preserving security http://link.springer. and privacy in distributed com/article/10.1007/s11227- systems. IEEE Trans- 014-1258-y. actions on Parallel and Distributed Systems, 22(8): He:2018:MBF 1390–1397, August 2011. CODEN ITDSEO. ISSN [HWZP18] Jingsha He, Jianan Wu, 1045-9219 (print), 1558- Nafei Zhu, and Muham- 2183 (electronic). mad Salman Pathan. MinHash- He:2017:APP based fuzzy keyword search of encrypted data across [HXHP17] Jingsha He, Qi Xiao, multiple cloud servers. Fu- Peng He, and Muham- ture Internet, 10(5):38, mad Salman Pathan. An May 01, 2018. CODEN adaptive privacy protection ???? ISSN 1999-5903. method for smart home URL https://www.mdpi. environments using super- com/1999-5903/10/5/38. vised learning. Future REFERENCES 328

Internet, 9(1):7, March scheme. International 05, 2017. CODEN ???? Journal of Computer Ap- ISSN 1999-5903. URL plications, 33(4):330–334, https://www.mdpi.com/ 2011. ISSN 1206-212X 1999-5903/9/1/7. (print), 1925-7074 (elec- Huang:2018:PIB tronic). URL https: //www.tandfonline.com/ [HYF18] Qinlong Huang, Yixian doi/full/10.2316/Journal. Yang, and Jingyi Fu. PRE- 202.2011.4.202-3074. CISE: Identity-based pri- Huang:2018:CT vate data sharing with con- ditional proxy re-encryption [HYS18] Qinlong Huang, Yixian in online social networks. Yang, and Mansuo Shen. Future Generation Com- Corrigendum to “Secure puter Systems, 86(??): and efficient data collab- 1523–1533, September 2018. oration with hierarchical CODEN FGSEVI. ISSN attribute-based encryption 0167-739X (print), 1872- in cloud computing” [Fu- 7115 (electronic). URL ture Gener. Comput. Syst. https://www.sciencedirect. 72 (2017) 239–249]. Future com/science/article/pii/ Generation Computer Sys- S0167739X17310257. tems, 86(??):1534, Septem- Hu:2019:CAC ber 2018. CODEN FG- SEVI. ISSN 0167-739X [HYL+19] Chengyu Hu, Rupeng (print), 1872-7115 (elec- Yang, Pengtao Liu, Tong tronic). URL https:// Li, and Fanyu Kong. www.sciencedirect.com/ A countermeasure against science/article/pii/S0167739X18312238. cryptographic key leakage See [?]. in cloud: public-key en- cryption with continuous Huang:2011:IBS leakage and tampering re- [HYWS11] Qiong Huang, Guomin silience. The Journal of Su- Yang, Duncan S. Wong, percomputing, 75(6):3099– and Willy Susilo. Identity- 3122, June 2019. CODEN based strong designated JOSUED. ISSN 0920-8542 verifier signature revisited. (print), 1573-0484 (elec- The Journal of Systems tronic). and Software, 84(1):120– Hao:2011:NTV 129, January 2011. CO- DEN JSSODM. ISSN [HYS11] Rong Hao, Jia Yu, and 0164-1212. Zhiling Song. A note Heys:2011:PSC on a threshold verifi- able multi-secret sharing [HZ11] Howard M. Heys and Liang REFERENCES 329

Zhang. Pipelined statis- 1532-0626 (print), 1532- tical cipher feedback: a 0634 (electronic). new mode for high-speed self-synchronizing stream Han:2018:ERA encryption. IEEE Trans- [HZL18] Qi Han, Yinghui Zhang, actions on Computers,60 and Hui Li. Efficient and (11):1581–1595, Novem- robust attribute-based en- ber 2011. CODEN IT- cryption supporting ac- COB4. ISSN 0018-9340 cess policy hiding in In- (print), 1557-9956 (elec- ternet of Things. Fu- tronic). URL http:/ ture Generation Computer /ieeexplore.ieee.org/ Systems, 83(??):269–277, stamp/stamp.jsp?tp=&arnumber= June 2018. CODEN FG- 5499465. SEVI. ISSN 0167-739X Han:2012:ERI (print), 1872-7115 (elec- tronic). URL https:// [HZC+12] Qi Han, Yinghui Zhang, www.sciencedirect.com/ Xiaofeng Chen, Hui Li, and science/article/pii/S0167739X1731868X. Jiaxiang Quan. Efficient Huang:2019:ILA and robust identity-based handoff authentication in [HZS+19] Bo-Yuan Huang, Hongce wireless networks. Lecture Zhang, Pramod Subra- Notes in Computer Sci- manyan, Yakir Vizel, Aarti ence, 7645:180–191, 2012. Gupta, and Sharad Ma- CODEN LNCSD9. ISSN lik. Instruction-level ab- 0302-9743 (print), 1611- straction (ILA): a uniform 3349 (electronic). URL specification for system- http://link.springer. on-chip (SoC) verification. com/chapter/10.1007/978- ACM Transactions on De- 3-642-34601-9_14/. sign Automation of Elec- tronic Systems, 24(1):10:1– Han:2014:ERI 10:??, January 2019. CO- [HZC+14] Qi Han, Yinghui Zhang, DEN ATASFO. ISSN 1084- Xiaofeng Chen, Hui Li, 4309 (print), 1557-7309 and Jiaxiang Quan. Effi- (electronic). cient and robust identity- Huang:2005:EMP based handoff authentica- tion for EAP-based wire- [HZSL05] Liusheng Huang, Hong less networks. Concurrency Zhong, Hong Shen, and and Computation: Prac- Yonglong Luo. An effi- tice and Experience, 26(8): cient multiple-precision di- 1561–1573, June 10, 2014. vision algorithm. In Hong CODEN CCPEBO. ISSN Shen and Koji Nakano, REFERENCES 330

editors, Sixth Interna- Wang. A novel two- tional Conference on Par- dimensional ECG feature allel and Distributed Com- extraction and classifica- puting, Applications and tion algorithm based on Technologies, 2005. PD- convolution neural net- CAT 2005: 5–8 Decem- work for human authen- ber 2005, Dalian, China, tication. Future Gener- pages 971–974. IEEE Com- ation Computer Systems, puter Society Press, 1109 101(??):180–196, Decem- Spring Street, Suite 300, ber 2019. CODEN FG- Silver Spring, MD 20910, SEVI. ISSN 0167-739X USA, 2005. ISBN 0-7695- (print), 1872-7115 (elec- 2405-2. LCCN QA76.58 tronic). URL http:// .I5752 2005. The au- www.sciencedirect.com/ thors present an integer- science/article/pii/S0167739X18329923. division algorithm that runs three to five times He:2017:AHA faster than Knuth’s 1981 [HZWW17] Debiao He, Sherali Zeadally, original. However, there is Libing Wu, and Huaqun an error in the renormaliza- Wang. Analysis of han- tion algorithm that is cor- dover authentication pro- rected in [MN14], while re- tocols for mobile wireless taining the speedup. networks using identity- Han:2014:ATS based public key cryptog- raphy. Computer Networks [HZW+14] Tao Han, Weiming Zhang, (Amsterdam, Netherlands: Chao Wang, Nenghai Yu, 1999), 128(??):154–163, and Yuefei Zhu. Adap- December 9, 2017. CO- tive 1 steganography DEN ???? ISSN 1389-1286 in extended noisy re- (print), 1872-7069 (elec- gion. The Computer Jour- tronic). URL http:// nal, 57(4):557–566, April www.sciencedirect.com/ 2014. CODEN CM- science/article/pii/S1389128616304285. PJA6. ISSN 0010-4620 (print), 1460-2067 (elec- He:2018:LAB tronic). URL http:// [HZWZ18] Qian He, Ning Zhang, comjnl.oxfordjournals. Yongzhuang Wei, and Yan org/content/57/4/557. Zhang. Lightweight at- full.pdf+html. tribute based encryption Hammad:2019:NTD scheme for mobile cloud as- sisted cyber-physical sys- [HZW19] Mohamed Hammad, Shanzhuo tems. Computer Networks Zhang, and Kuanquan (Amsterdam, Netherlands: REFERENCES 331

1999), 140(??):163–173, morphology for enhancing July 20, 2018. CODEN human recognition capabil- ???? ISSN 1389-1286 ity. The Computer Jour- (print), 1872-7069 (elec- nal, 58(10):2622–2635, Oc- tronic). URL http:// tober 2015. CODEN CM- www.sciencedirect.com/ PJA6. ISSN 0010-4620 science/article/pii/S1389128618300458. (print), 1460-2067 (elec- tronic). URL http:// He:2015:IEI comjnl.oxfordjournals. [HZX15] Debiao He, Mingwu Zhang, org/content/58/10/2622. and Baowen Xu. In- Ibrahim:2019:RAM security of an efficient identity-based proxy sig- [IAA+19] Tahir Musa Ibrahim, Shafi’i Muham- nature in the standard mad Abdulhamid, Ala Ab- model. The Computer dusalam Alarood, Haruna Journal, 58(10):2507–2508, Chiroma, Mohammed Ali October 2015. CODEN Al-garadi, Nadim Rana, CMPJA6. ISSN 0010-4620 Amina Nuhu Muhammad, (print), 1460-2067 (elec- Adamu Abubakar, Khalid tronic). URL http:// Haruna, and Lubna A. comjnl.oxfordjournals. Gabralla. Recent ad- org/content/58/10/2507. vances in mobile touch screen security authentica- Hunt:2018:RDS tion methods: a systematic [HZX+18] Tyler Hunt, Zhiting Zhu, literature review. Comput- Yuanzhong Xu, Simon Pe- ers & Security, 85(??):1– ter, and Emmett Witchel. 24, August 2019. CODEN Ryoan: a distributed sand- CPSEDU. ISSN 0167-4048 box for untrusted computa- (print), 1872-6208 (elec- tion on secret data. ACM tronic). URL https:// Transactions on Computer www.sciencedirect.com/ Systems, 35(4):13:1–13:??, science/article/pii/S0167404818305030. December 2018. CODEN Ismail:2010:EAE ACSYEC. ISSN 0734-2071 (print), 1557-7333 (elec- [IAD10] I. A. Ismail, M. Amin, tronic). URL https:// and H. Diab. An effi- dl.acm.org/ft_gateway. cient adaptive ergodic ma- cfm?id=3231594. trix and chaotic system for Islam:2015:MBA image encryption. Inter- national Journal of Com- [IA15] Md Saiful Islam and Naif puter Applications, 32(3): Alajlan. Model-based 381–388, 2010. ISSN 1206- alignment of heartbeat 212X (print), 1925-7074 REFERENCES 332

(electronic). URL https: Irshad:2017:CPP //www.tandfonline.com/ doi/full/10.2316/Journal.[IC17] Azeem Irshad and She- 202.2010.3.202-2330. hzad Ashraf Chaudhry. Comments on “A privacy Islam:2011:MES preserving three-factor au- [IB11] Sk. Hafizul Islam and G. P. thentication protocol for e- Biswas. A more efficient health clouds”. The Jour- and secure ID-based re- nal of Supercomputing,73 mote mutual authentica- (4):1504–1508, April 2017. tion with key agreement CODEN JOSUED. ISSN scheme for mobile devices 0920-8542 (print), 1573- on elliptic curve cryp- 0484 (electronic). See tosystem. The Journal [JKL+16]. of Systems and Software, IEEE:2010:PIA 84(11):1892–1898, Novem- ber 2011. CODEN JS- [IEE10] IEEE, editor. Proceedings: SODM. ISSN 0164-1212 2010 IEEE 51st Annual (print), 1873-1228 (elec- Symposium on Founda- tronic). URL http:// tions of Computer Science: www.sciencedirect.com/ 23–26 October 2010, Las science/article/pii/S0164121211001646. Vegas, Nevada, USA. IEEE IBM:2013:DMP Computer Society Press, 1109 Spring Street, Suite [IBM13a] IBM. Daunting mathemat- 300, Silver Spring, MD ical puzzle solved, enables 20910, USA, 2010. ISBN unlimited analysis of en- 1-4244-8525-8. LCCN ???? crypted data. Scientific URL http://ieeexplore. Computing, December 24, ieee.org/servlet/opac? 2013. URL http://www. punumber=5669376. IEEE scientificcomputing.com/ Computer Society Order news/2013/12/daunting- Number P4244. mathematical-puzzle-solved- IEEE:2011:ICI enables-unlimited-analysis- encrypted-data. See [IEE11a] IEEE, editor. Interna- patent [GH13]. tional Conference on Intel- ligent Computation Tech- IBM:2013:IPC nology and Automation [IBM13b] IBM. IBM PCIe Crypto- (ICICTA), 2011: 28–29 graphic Coprocessor. Web March 2011, Shenzhen, document, 2013. URL Guangdong, China; pro- http://www-03.ibm.com/ ceedings. IEEE Computer security/cryptocards/ Society Press, 1109 Spring pciecc/overview.shtml. Street, Suite 300, Silver REFERENCES 333

Spring, MD 20910, USA, Silver Spring, MD 20910, 2011. ISBN 0-7695-4353-7, USA, 2015. ISBN 1-4673- 1-61284-289-5. LCCN ???? 6949-7 (print), 1-4673- URL http://ieeexplore. 6950-0 (e-book). ISSN ieee.org/servlet/opac? 1081-6011 (print), 2375- punumber=5750113. 1207 (electronic). LCCN QA76.9.A25. URL http: IEEE:2011:PIA //www.gbv.de/dms/tib- [IEE11b] IEEE, editor. Proceedings: ub-hannover/836112652. . 2011 IEEE 52nd Annual pdf IEEE Symposium on Foun- Imanimehr:2016:HPR dations of Computer Sci- ence: 22–25 October 2011, [IF16] Fatemeh Imanimehr and Palm Springs, California, Mehran S. Fallah. How USA. IEEE Computer So- powerful are run-time mon- ciety Press, 1109 Spring itors with static informa- Street, Suite 300, Silver tion? The Computer Spring, MD 20910, USA, Journal, 59(11):1623–1636, 2011. ISBN 1-4577-1843-X. November 2016. CODEN LCCN ???? CMPJA6. ISSN 0010-4620 (print), 1460-2067 (elec- IEEE:2013:PIS tronic). URL http:// [IEE13] IEEE, editor. Proceed- comjnl.oxfordjournals. ings of the 21st IEEE org/content/59/11/1623. Symposium on Computer Islam:2011:MDA Arithmetic, Austin, Texas, USA, 8–10 April 2013. [IG11] Salekul Islam and Jean- IEEE Computer Soci- Charles Gr´egoire. Multi- ety Press, 1109 Spring domain authentication for Street, Suite 300, Silver IMS services. Com- Spring, MD 20910, USA, puter Networks (Amster- 2013. ISBN 0-7695-4957- dam, Netherlands: 1999), 8. ISSN 1063-6889. LCCN 55(12):2689–2704, August QA76.9.C62 S95 2013. 25, 2011. CODEN ???? ISSN 1389-1286 IEEE:2015:ISS (print), 1872-7069 (elec- [IEE15] IEEE, editor. 2015 IEEE tronic). URL http:// Symposium on Security www.sciencedirect.com/ and Privacy (SP 2015) San science/article/pii/S1389128611001423. Jose, California, USA, 18– Iyengar:2016:SPS 20 May 2015. IEEE Com- puter Society Press, 1109 [IGR+16] Anirudh Iyengar, Swaroop Spring Street, Suite 300, Ghosh, Kenneth Ramclam, REFERENCES 334

Jae-Won Jang, and Cheng- key cryptography based Wei Lin. Spintronic PUFs on bounded quantum ref- for security, trust, and au- erence frames. Theoreti- thentication. ACM Jour- cal Computer Science, 560 nal on Emerging Technolo- (part 1)(??):33–45, Decem- gies in Computing Sys- ber 4, 2014. CODEN TC- tems (JETC), 13(1):4:1– SCDI. ISSN 0304-3975 4:??, December 2016. CO- (print), 1879-2294 (elec- DEN ???? ISSN 1550- tronic). URL http:// 4832. www.sciencedirect.com/ Imai:2015:IRR science/article/pii/S030439751400694X. [IK15] Shigeyoshi Imai and Kaoru Ingram:2016:AMB Kurosawa. Improved [IM16] C. Ingram and M. Morisse. reconstruction of RSA Almost an MNC: Bitcoin private-keys from their entrepreneurs’ use of col- fraction. Information Pro- lective resources and de- cessing Letters, 115(6– coupling to build legit- 8):630–632, June/August imacy. In 2016 49th 2015. CODEN IF- Hawaii International Con- PLAT. ISSN 0020-0190 ference on System Sciences (print), 1872-6119 (elec- (HICSS), pages 4083–4092. tronic). URL http:// IEEE Computer Society www.sciencedirect.com/ Press, 1109 Spring Street, science/article/pii/S0020019015000368. Suite 300, Silver Spring, Islam:2015:LFP MD 20910, USA, January 2016. ISSN 1530-1605. [IL15] Sk Hafizul Islam and Fa- I:2017:ETB gen Li. Leakage-free and provably secure certificate- [IMB17] Indu I., Rubesh Anand P. less signcryption scheme M., and Vidhyacharan using bilinear pairings. Bhaskar. Encrypted to- The Computer Journal, ken based authentication 58(10):2636–2648, Octo- with adapted SAML tech- ber 2015. CODEN CM- nology for cloud web ser- PJA6. ISSN 0010-4620 vices. Journal of Net- (print), 1460-2067 (elec- work and Computer Ap- tronic). URL http:// plications, 99(??):131–145, comjnl.oxfordjournals. December 1, 2017. CO- org/content/58/10/2636. DEN JNCAF3. ISSN 1084- 8045 (print), 1095-8592 Ioannou:2014:PKC (electronic). URL http:// [IM14] Lawrence M. Ioannou and www.sciencedirect.com/ Michele Mosca. Public- science/article/pii/S1084804517303156. REFERENCES 335

Intel:2019:IAM Systems, 84(??):216–227, July 2018. CODEN FG- [Int19] Intel. Intel Architec- SEVI. ISSN 0167-739X ture Memory Encryp- (print), 1872-7115 (elec- tion Technologies Specifi- tronic). URL https:// cation. Intel Corporation, www.sciencedirect.com/ ????, 336907-002us (revi- science/article/pii/S0167739X17308439. sion 1.2) edition, April 2019. URL https: Isobe:2012:SAL //software.intel.com/ sites/default/files/managed/[IS12] Takanori Isobe and Ky- a5/16/Multi-Key-Total- oji Shibutani. Security Memory-Encryption-Spec. analysis of the lightweight pdf. block ciphers XTEA, LED Isobe:2012:SCL and Piccolo. Lecture Notes in Computer Sci- [IOM12] Takanori Isobe, Toshihiro ence, 7372:71–86, 2012. Ohigashi, and Masakatu CODEN LNCSD9. ISSN Morii. Slide crypt- 0302-9743 (print), 1611- analysis of lightweight 3349 (electronic). URL stream cipher RAKA- http://link.springer. POSHI. Lecture Notes in com/chapter/10.1007/978- Computer Science, 7631: 3-642-31448-3_6/. 138–155, 2012. CO- DEN LNCSD9. ISSN Irshad:2016:EAM 0302-9743 (print), 1611- 3349 (electronic). URL [ISC+16] Azeem Irshad, Muham- http://link.springer. mad Sher, Shehzad Ashraf com/chapter/10.1007/978- Chaudhary, Husnain Naqvi, 3-642-34117-5_9/. and Mohammad Sabzine- Islam:2018:REP jad Farash. An efficient and anonymous multi-server [IOV+18] SK Hafizul Islam, Moham- authenticated key agree- mad S. Obaidat, Pandi ment based on chaotic map Vijayakumar, Enas Ab- without engaging Registra- dulhay, Fagen Li, and tion Centre. The Jour- M. Krishna Chaitanya nal of Supercomputing,72 Reddy. A robust and effi- (4):1623–1644, April 2016. cient password-based con- CODEN JOSUED. ISSN ditional privacy preserv- 0920-8542 (print), 1573- ing authentication and 0484 (electronic). URL group-key agreement pro- http://link.springer. tocol for VANETs. Fu- com/article/10.1007/s11227- ture Generation Computer 016-1688-9. REFERENCES 336

Ishai:2014:PCP Jie:2011:RGA

+ [IW14] Yuval Ishai and Mor Weiss. [JAS 11] Wei Jie, Junaid Arshad, Probabilistically checkable Richard Sinnott, Paul Tow- proofs of proximity with nend, and Zhou Lei. A zero-knowledge. Lecture review of grid authenti- Notes in Computer Sci- cation and authorization ence, 8349:121–145, 2014. technologies and support CODEN LNCSD9. ISSN for federated access con- 0302-9743 (print), 1611- trol. ACM Computing 3349 (electronic). URL Surveys, 43(2):12:1–12:26, http://link.springer. January 2011. CODEN com/chapter/10.1007/978- CMSVAN. ISSN 0360-0300 3-642-54242-8_6/. (print), 1557-7341 (elec- tronic). Jacobs:2016:STB Prins:2011:DCA [Jac16] Todd A. Jacobs. Se- [JB11] JR Prins and Business Unit cure token-based authen- Cybercrime. Diginotar cer- tication with YubiKey 4. tificate authority breach Linux Journal, 2016(265): “Operation Black Tulip”. 1:1–1:??, May 2016. CO- Unknown, November 2011. DEN LIJOFX. ISSN 1075- Fox-IT. 3583 (print), 1938-3827 (electronic). URL http:// Jain:2013:MSD dl.acm.org/ft_gateway. [JC13] Ajay Jain and Kusha cfm?id=2953927. Chopra. Malware signing Jie:2010:AAI detection system. ACM SIGSOFT Software Engi- [JAE10] Wei Jie, Junaid Arshad, neering Notes, 38(5):1–8, and Pascal Ekin. Authen- September 2013. CODEN tication and authorization SFENDP. ISSN 0163-5948 infrastructure for Grids — (print), 1943-5843 (elec- issues, technologies, trends tronic). and experiences. The Jour- Jho:2016:SSE nal of Supercomputing,52 (1):82–96, April 2010. CO- [JCHS16] Nam-Su Jho, Ku-Young DEN JOSUED. ISSN 0920- Chang, Dowon Hong, and 8542 (print), 1573-0484 Changho Seo. Symmetric (electronic). URL http:/ searchable encryption with /www.springerlink.com/ efficient range query using openurl.asp?genre=article& multi-layered linked chains. issn=0920-8542&volume= The Journal of Supercom- 52&issue=1&spage=82. puting, 72(11):4233–4246, REFERENCES 337

November 2016. CODEN Standards and Technology, JOSUED. ISSN 0920-8542 Gaithersburg, MD 20899- (print), 1573-0484 (elec- 8900, USA, 2012. tronic). Joldzic:2016:TSA Jia:2018:ERH [JDV16] Ognjen Joldzic, Zoran [JCL+18] Hongyong Jia, Yue Chen, Djuric, and Pavle Vuletic. Julong Lan, Kaixiang A transparent and scalable Huang, and Jun Wang. Ef- anomaly-based DoS detec- ficient revocable hierarchi- tion method. Computer cal identity-based encryp- Networks (Amsterdam, tion using cryptographic Netherlands: 1999), 104 accumulators. Interna- (??):27–42, July 20, 2016. tional Journal of Infor- CODEN ???? ISSN 1389- mation Security, 17(4): 1286 (print), 1872-7069 477–490, August 2018. (electronic). URL http:// CODEN ???? ISSN www.sciencedirect.com/ 1615-5262 (print), 1615- science/article/pii/S1389128616301347. 5270 (electronic). URL Jogenfors:2015:HBT http://link.springer. com/article/10.1007/s10207-[JEA+15] Jonathan Jogenfors, Ashraf Mo- 017-0387-8. hamed Elhassan, Johan Jakobsson:2012:AWD Ahrens, Mohamed Bouren- nane, and Jan-Ake˚ Lars- [JCM12] Markus Jakobsson, Richard son. Hacking the Bell Chow, and Jesus Molina. test using classical light in Authentication — are we energy–time entanglement- doing well enough? IEEE based quantum key dis- Security & Privacy, 10(1): tribution. Science Ad- 19–21, January/February vances, 1(11):e1500793, 2012. ISSN 1540-7993 December 18, 2015. CO- (print), 1558-4046 (elec- DEN SACDAF. ISSN tronic). 2375-2548. URL http: //advances.sciencemag. Chang:2012:TRR org/content/1/11/e1500793. + [jCPB 12] S. j. Chang, R. Perlner, Jeong:2013:CBC W. E. Burr, M. S. Turan, J. M. Kelsey, S. Paul, and [Jeo13] Kitae Jeong. Cryptanaly- L. E. Bassham. Third- sis of block cipher Piccolo round report of the SHA- suitable for cloud comput- 3 cryptographic hash al- ing. The Journal of Su- gorithm competition. Re- percomputing, 66(2):829– port, National Institute for 840, November 2013. CO- REFERENCES 338

DEN JOSUED. ISSN Lecture Notes in Computer 0920-8542 (print), 1573- Science, 7197:91–98, 2012. 0484 (electronic). URL CODEN LNCSD9. ISSN http://link.springer. 0302-9743 (print), 1611- com/article/10.1007/s11227- 3349 (electronic). URL 013-0902-2. http://link.springer. Jaeger:2018:FAP com/chapter/10.1007/978- 3-642-28490-8_10/. [JGP+18] David Jaeger, Hendrik Graupner, Chris Pelchen, Jiang:2019:SSL Feng Cheng, and Christoph [JHW+19] Yichen Jiang, Jenny Hamer, Meinel. Fast automated Chenghong Wang, Xiao- processing and evaluation qian Jiang, Miran Kim, of identity leaks. Interna- Yongsoo Song, Yuhou tional Journal of Parallel Xia, Noman Mohammed, Programming, 46(2):441– Md Nazmus Sadat, and 470, April 2018. CODEN Shuang Wang. SecureLR: IJPPE5. ISSN 0885-7458 Secure logistic regres- (print), 1573-7640 (elec- sion model via a hybrid tronic). . Jo:2014:ODE IEEE/ACM Transactions on Computational Biology [JHCC14] Heeseung Jo, Seung-Tae and Bioinformatics, 16(1): Hong, Jae-Woo Chang, and 113–123, January 2019. Dong Hoon Choi. Of- CODEN ITCBCY. ISSN floading data encryption 1545-5963 (print), 1557- to GPU in database sys- 9964 (electronic). tems. The Journal of Su- percomputing, 69(1):375– Jiang:2014:UIS 394, July 2014. CO- [Jia14a] Shaoquan Jiang. On un- DEN JOSUED. ISSN conditional µ-security of 0920-8542 (print), 1573- private key encryption. 0484 (electronic). URL The Computer Journal, http://link.springer. 57(10):1570–1579, Octo- com/article/10.1007/s11227- ber 2014. CODEN CM- 014-1159-0. PJA6. ISSN 0010-4620 Jing:2012:MVB (print), 1460-2067 (elec- [JHHN12] Huiyun Jing, Xin He, tronic). URL http:// Qi Han, and Xiamu Niu. comjnl.oxfordjournals. Motion vector based in- org/content/57/10/1570. formation hiding algorithm Jiang:2014:TEA for H.264/AVC against mo- tion vector steganalysis. [Jia14b] Shaoquan Jiang. Timed REFERENCES 339

encryption with applica- puter Applications, 32(3): tion to deniable key ex- 341–346, 2010. ISSN 1206- change. Theoretical Com- 212X (print), 1925-7074 puter Science, 560 (part (electronic). URL https: 2)(??):172–189, December //www.tandfonline.com/ 4, 2014. CODEN TC- doi/full/10.2316/Journal. SCDI. ISSN 0304-3975 202.2010.3.202-2846. (print), 1879-2294 (elec- Jain:2010:QP tronic). URL http:// www.sciencedirect.com/ [JJUW10] Rahul Jain, Zhengfeng Ji, science/article/pii/S030439751400098X. Sarvagya Upadhyay, and John Watrous. QIP = Jiang:2016:MAC PSPACE. Communica- [Jia16] Shaoquan Jiang. On mes- tions of the Association sage authentication with for Computing Machinery, a correlated setup. In- 53(12):102–109, December formation Processing Let- 2010. CODEN CACMA2. ters, 116(4):289–293, April ISSN 0001-0782 (print), 2016. CODEN IF- 1557-7317 (electronic). PLAT. ISSN 0020-0190 Jawad:2013:GAD (print), 1872-6119 (elec- tronic). URL http:// [JK13] Khurram Jawad and Asi- www.sciencedirect.com/ fullah Khan. Genetic algo- science/article/pii/S0020019015001908. rithm and difference expan- sion based reversible wa- Jiang:2017:BMA termarking for relational [Jia17] Shaoquan Jiang. Bounds databases. The Journal for of Systems and Software, with distortion. The Com- 86(11):2742–2753, Novem- puter Journal, 60(4):497– ber 2013. CODEN JS- 506, March 23, 2017. CO- SODM. ISSN 0164-1212 DEN CMPJA6. ISSN (print), 1873-1228 (elec- 0010-4620 (print), 1460- tronic). URL http:// 2067 (electronic). URL www.sciencedirect.com/ https://academic.oup. science/article/pii/S0164121213001428. com/comjnl/article/60/ Jannati:2019:SOR 4/497/2608061. Jin:2010:ADW [JK19] Hoda Jannati and Ramtin Khosravi. On the security [Jin10] C. Jin. Adaptive digital of one-round meeting loca- watermark system using tion determination proto- soft computation. Inter- col. Information Process- national Journal of Com- ing Letters, 146(??):35–38, REFERENCES 340

June 2019. CODEN IF- trieval based image wa- PLAT. ISSN 0020-0190 termarking for large-scale (print), 1872-6119 (elec- image databases. Lecture tronic). URL http:// Notes in Computer Sci- www.sciencedirect.com/ ence, 7128:126–141, 2012. science/article/pii/S0020019019300274. CODEN LNCSD9. ISSN 0302-9743 (print), 1611- Jamil:2018:SPU 3349 (electronic). URL [JKA+18] Fuzel Jamil, Abid Khan, http://link.springer. Adeel Anjum, Mansoor com/chapter/10.1007/978- Ahmed, Farhana Jabeen, 3-642-32205-1_12/. and Nadeem Javaid. Se- Jiang:2016:PPT

cure provenance using an + authenticated data struc- [JKL 16] Qi Jiang, Muhammad Khur- ture approach. Comput- ram Khan, Xiang Lu, Jian- ers & Security, 73(??):34– feng Ma, and Debiao He. 56, March 2018. CODEN A privacy preserving three- CPSEDU. ISSN 0167-4048 factor authentication pro- (print), 1872-6208 (elec- tocol for e-Health clouds. tronic). URL https:// The Journal of Supercom- www.sciencedirect.com/ puting, 72(10):3826–3849, science/article/pii/S0167404817302122. October 2016. CODEN JOSUED. ISSN 0920-8542 Jan:2019:PBM (print), 1573-0484 (elec- tronic). See comments [JKAU19] Mian Ahmad Jan, Fa- [IC17]. zlullah Khan, Muhammad Alam, and Muhammad Us- Jovanovic:2012:FAL man. A payload-based mu- [JKP12] Philipp Jovanovic, Mar- tual authentication scheme tin Kreuzer, and Ilia Po- for Internet of Things. Fu- lian. A fault attack on the ture Generation Computer LED Block cipher. Lecture Systems, 92(??):1028–1039, Notes in Computer Sci- March 2019. CODEN FG- ence, 7275:120–134, 2012. SEVI. ISSN 0167-739X CODEN LNCSD9. ISSN (print), 1872-7115 (elec- 0302-9743 (print), 1611- tronic). URL https:// 3349 (electronic). URL www.sciencedirect.com/ http://link.springer. science/article/pii/S0167739X17303898. com/chapter/10.1007/978- Jun:2012:IIR 3-642-29912-4_10/. Josefsson:2016:ECD [JKHeY12] Jong Yun Jun, Kunho Kim, Jae-Pil Heo, and Sung eui [JL16] Simon Josefsson and Ilari Yoon. IRIW: Image re- Liusvaara. Edwards-curve REFERENCES 341

Digital Signature Algo- Notes in Computer Sci- rithm (EdDSA). Inter- ence, 7259:235–247, 2012. net Draft report draft-irtf- CODEN LNCSD9. ISSN cfrg-eddsa-05, SJD AB, 0302-9743 (print), 1611- Stockholm 113 47, Swe- 3349 (electronic). URL den, March 21, 2016. URL http://link.springer. https://tools.ietf.org/ com/chapter/10.1007/978- html/draft-irtf-cfrg- 3-642-31912-9_16/. eddsa-05. Jajodia:2012:RET Jordan:2018:QCS [JLS12] Sushil Jajodia, Witold [JL18] S. P. Jordan and Y. Liu. Litwin, and Thomas Schwarz. Quantum cryptanalysis: Recoverable encryption Shor, Grover, and beyond. through noised secret over IEEE Security & Privacy, a large cloud. Lecture 16(5):14–21, September/ Notes in Computer Sci- October 2018. ISSN 1540- ence, 7450:13–24, 2012. 7993 (print), 1558-4046 CODEN LNCSD9. ISSN (electronic). 0302-9743 (print), 1611- 3349 (electronic). URL Jiang:2018:AHP http://link.springer. com/chapter/10.1007/978- [JLC18] Rong Jiang, Rongxing Lu, 3-642-32344-7_2/. and Kim-Kwang Raymond Choo. Achieving high Jia:2012:PKD performance and privacy- [JLT+12] Zhongtian Jia, Xiaodong preserving query over en- Lin, Seng-Hua Tan, Lixi- crypted multidimensional ang Li, and Yixian Yang. big metering data. Future Public key distribution Generation Computer Sys- scheme for delay toler- tems, 78 (part 1)(??):392– ant networks based on 401, January 2018. CO- two-channel cryptogra- DEN FGSEVI. ISSN 0167- phy. Journal of Net- 739X (print), 1872-7115 work and Computer Ap- (electronic). URL http:// plications, 35(3):905–913, www.sciencedirect.com/ May 2012. CODEN JN- science/article/pii/S0167739X16301157. CAF3. ISSN 1084-8045 Jeong:2012:IKP (print), 1095-8592 (elec- tronic). URL http:// [JLH12] Kyung Chul Jeong, Dong Hoon www.sciencedirect.com/ Lee, and Daewan Han. An science/article/pii/S1084804511000634. improved known plaintext Jiang:2019:PPP attack on PKZIP encryp- tion algorithm. Lecture [JLX+19] Wenbo Jiang, Hongwei REFERENCES 342

Li, Guowen Xu, Mi Wen, Jiang:2016:UTC Guishan Dong, and Xi- aodong Lin. PTAS: [JMW+16] Qi Jiang, Jianfeng Ma, Privacy-preserving thin- Fushan Wei, Youliang client authentication scheme Tian, Jian Shen, and in blockchain-based PKI. Yuanyuan Yang. An un- Future Generation Com- traceable temporal-credential- puter Systems, 96(??):185– based two-factor authenti- 195, July 2019. CODEN cation scheme using ECC FGSEVI. ISSN 0167-739X for wireless sensor net- (print), 1872-7115 (elec- works. Journal of Net- tronic). URL http:// work and Computer Appli- www.sciencedirect.com/ cations, 76(??):37–48, De- science/article/pii/S0167739X18315097. cember 2016. CODEN JN- CAF3. ISSN 1084-8045 Ji:2018:DIR (print), 1095-8592 (elec- tronic). URL http:// [JLZ18] Wusheng Ji, Li Li, and www.sciencedirect.com/ Weiwei Zhou. Design and science/article/pii/S1084804516302302. implementation of a RFID reader/router in RFID- Jain:2012:BAS WSN hybrid system. Fu- ture Internet, 10(11):106, [JN12] Anil K. Jain and Karthik November 03, 2018. CO- Nandakumar. Biometric DEN ???? ISSN 1999- authentication: System se- curity and user privacy. 5903. URL https://www. Computer, 45(11):87–92, mdpi.com/1999-5903/10/ November 2012. CODEN 11/106. CPTRB4. ISSN 0018-9162. Jiang:2016:OOC Jan:2017:PPB

[JMG+16] Peng Jiang, Yi Mu, Fuchun [JNUH17] Mian Jan, Priyadarsi Guo, Xiaofen Wang, and Nanda, Muhammad Us- Qiaoyan Wen. Online/ man, and Xiangjian He. offline ciphertext retrieval PAWN: a payload-based on resource constrained mutual authentication scheme devices. The Computer for wireless sensor net- Journal, 59(7):955–969, works. Concurrency and July 2016. CODEN CM- Computation: Practice PJA6. ISSN 0010-4620 and Experience, 29(17), (print), 1460-2067 (elec- September 10, 2017. CO- tronic). URL http:// DEN CCPEBO. ISSN comjnl.oxfordjournals. 1532-0626 (print), 1532- org/content/59/7/955. 0634 (electronic). REFERENCES 343

Johnson:2010:BRF February 20, 2013. 23 pp. URL http://eprint. [Joh10] Neil F. Johnson. Book iacr.org/2013/095. review: Frank Y. Shih, Digital Watermarking and Jin:2019:RPP Steganography: Fundamen- tals and Techniques.CRC/ [JP19] Hongyu Jin and Panos Taylor & Francis (2008). Papadimitratos. Re- ISBN-13 978-1-4200-4757- silient privacy protection 8. £46.99. 180 pp. Hard- for location-based services cover. The Computer through decentralization. Journal, 53(5):616–617, ACM Transactions on Pri- June 2010. CODEN CM- vacy and Security (TOPS), PJA6. ISSN 0010-4620 22(4):21:1–21:??, Decem- (print), 1460-2067 (elec- ber 2019. ISSN 2471- tronic). URL http:// 2566 (print), 2471-2574 comjnl.oxfordjournals. (electronic). URL https: org/cgi/reprint/53/5/ //dl.acm.org/citation. 616. cfm?id=3319401. Johnson:2015:NGA Jeffs:2013:CCP [Joh15] Kevin Wade Johnson. The [JR13] R. Amzi Jeffs and Mike neglected giant: Agnes Rosulek. Characterizing Meyer Driscoll, volume 10 the cryptographic prop- of Center for Crypto- erties of reactive 2-party logic History special se- functionalities. Lecture ries. National Security Notes in Computer Sci- Agency, Center for Crypto- ence, 7785:263–280, 2013. logic History, Fort George CODEN LNCSD9. ISSN G. Meade, MD, USA, 2015. 0302-9743 (print), 1611- 66 pp. LCCN ???? 3349 (electronic). URL http://link.springer. Joux:2013:NIC com/chapter/10.1007/978- [Jou13] Antoine Joux. A new 3-642-36594-2_15/. index calculus algorithm Juels:2014:HEE with complexity L(1/4+ o(1)) in very small charac- [JR14] Ari Juels and Thomas Ris- teristic. Report 2013/095, tenpart. Honey encryption: CryptoExperts and Uni- Encryption beyond the versit´e de Versailles Saint- brute-force barrier. IEEE Quentin-en-Yvelines, Lab- Security & Privacy, 12(4): oratoire PRISM, 45 avenue 59–62, July/August 2014. des Etats-Unis, F-78035 CODEN ???? ISSN 1540- Versailles Cedex, France, 7993 (print), 1558-4046 REFERENCES 344

(electronic). URL http:// July 2017. CODEN IT- www.computer.org/csdl/ COB4. ISSN 0018-9340 mags/sp/2014/04/msp2014040059- (print), 1557-9956 (elec- abs.html. tronic). URL https:// Jain:2018:MDN www.computer.org/csdl/ trans/tc/2017/07/07792116- [JS18a] Ajay Jain and Sachin Soni. abs.html. Multi-directional naviga- Jevdjic:2017:ASC tion method for optimized consumption of user gen- [JSCM17] Djordje Jevdjic, Karin erated content through se- Strauss, Luis Ceze, and mantic mapping of fea- Henrique S. Malvar. Ap- tures derived from the user proximate storage of com- generated content. ACM pressed and encrypted SIGSOFT Software Engi- videos. Operating Sys- neering Notes, 43(4):52, tems Review, 51(2):361– October 2018. CODEN 373, June 2017. CODEN SFENDP. ISSN 0163-5948 OSRED8. ISSN 0163-5980 (print), 1943-5843 (elec- (print), 1943-586X (elec- tronic). tronic).

Jaiyeola:2018:IPN Jain:2016:APQ [JS18b] Temitope Gbolahan Jaiye- [JSK+16] Nitin Jain, Birgit Stiller, ola and Florentin Smaran- Imran Khan, Dominique dache. Inverse proper- Elser, Christoph Mar- ties in neutrosophic triplet quardt, and Gerd Leuchs. loop and their applica- Attacks on practical quan- tion to cryptography. Al- tum key distribution sys- gorithms (Basel), 11(3), tems (and how to pre- March 2018. CODEN vent them). Contempo- ALGOCH. ISSN 1999- rary Physics, 57(3):366– 4893 (electronic). URL ??, 2016. CODEN CT- https://www.mdpi.com/ PHAF. ISSN 0010-7514 1999-4893/11/3/32. (print), 1366-5812 (elec- Jalili:2017:EAS tronic).

[JSA17] Majid Jalili and Hamid Judmayer:2017:BCI Sarbazi-Azad. Endurance- aware security enhance- [JSK+17] Aljosha Judmayer, Nicholas ment in non-volatile memo- Stifter, Katharina Kromb- ries using compression and holz, Edgar Weippl, Elisa selective encryption. IEEE Bertino, and Ravi Sandhu. Transactions on Com- Blocks and chains: Intro- puters, 66(7):1132–1144, duction to Bitcoin, cryp- REFERENCES 345

tocurrencies, and their con- 2018. CODEN FG- sensus mechanisms. Syn- SEVI. ISSN 0167-739X thesis Lectures on In- (print), 1872-7115 (elec- formation Security, Pri- tronic). URL http:// vacy, and Trust, 9(1):1– www.sciencedirect.com/ 123, June 2017. ISBN 1- science/article/pii/S0167739X17301322. 62705-713-7. ISSN 1945- 9742 (print), 1945-9750 Jiang:2018:FCP (electronic). URL http: [JSMG18b] Yinhao Jiang, Willy Susilo, //ieeexplore.ieee.org/ Yi Mu, and Fuchun Guo. xpl/articleDetails.jsp? Flexible ciphertext-policy arnumber=7987472. attribute-based encryp- Jordan:2018:EPE tion supporting AND- gate and threshold with [JSM+18] M. Jordan, N. Sardino, short ciphertexts. Inter- M. McGrath, C. Zoellin, national Journal of In- T. E. Morris, C. Car- formation Security, 17(4): ranza Lewis, G. Vance, 463–475, August 2018. B. Naylor, J. Pickel, M. S. CODEN ???? ISSN Almeida, D. Wierbowski, 1615-5262 (print), 1615- C. Meyer, R. Buendgen, 5270 (electronic). URL M. Zagorski, H. Schoone, http://link.springer. and K. Voss. Enabling per- com/article/10.1007/s10207- vasive encryption through 017-0376-y. IBM Z stack innovations. IBM Journal of Research Jiang:2012:DCA and Development, 62(2–3): 2:1–2:11, ???? 2018. CO- [JSZS12] Xinghao Jiang, Tanfeng DEN IBMJAE. ISSN 0018- Sun, Yue Zhou, and Yun Q. 8646 (print), 2151-8556 Shi. A drift compensa- (electronic). URL https: tion algorithm for H.264/ //ieeexplore.ieee.org/ AVC video robust water- document/8270590/. marking scheme. Lecture Notes in Computer Sci- Jiang:2018:CPA ence, 7128:30–41, 2012. [JSMG18a] Yinhao Jiang, Willy Susilo, CODEN LNCSD9. ISSN Yi Mu, and Fuchun 0302-9743 (print), 1611- Guo. Ciphertext-policy 3349 (electronic). URL attribute-based encryp- http://link.springer. tion against key-delegation com/chapter/10.1007/978- abuse in fog computing. 3-642-32205-1_5/. Future Generation Com- Joye:2012:FAC puter Systems, 78 (part 2)(??):720–729, January [JT12a] Marc Joye and Michael REFERENCES 346

Tunstall, editors. Fault 12(4):54:1–54:??, August Analysis in Cryptogra- 2016. CODEN ???? ISSN phy. Information Security 1551-6857 (print), 1551- and Cryptography. Spring- 6865 (electronic). er-Verlag, Berlin, Ger- many / Heidelberg, Ger- Juels:2014:INC many / London, UK / etc., [JW14] Ari Juels and Bonnie 2012. ISBN 3-642-29655- Wong. The interplay of 6, 3-642-29656-4 (e-book). neuroscience and cryptog- ISSN 1619-7100 (print), raphy: technical perspec- 2197-845X (electronic). xvi tive. Communications of + 354 + 98 pp. LCCN the Association for Com- QA76.9.A25 F38 2012; puting Machinery, 57(5): QA76.9.D35. URL http:/ 109, May 2014. CODEN /www.springerlink.com/ CACMA2. ISSN 0001-0782 content/978-3-642-29656- (print), 1557-7317 (elec- 7. tronic). Tong:2012:NBD Jiang:2017:SLD [jT12b] Xiao jun Tong. The novel bilateral — Diffu- [JWJ+17] Wei Jiang, Liang Wen, sion image encryption al- Ke Jiang, Xia Zhang, gorithm with dynamical Xiong Pan, and Keran compound chaos. The Zhou. System-level design Journal of Systems and to detect fault injection at- Software, 85(4):850–858, tacks on embedded real- April 2012. CODEN JS- time applications. ACM SODM. ISSN 0164-1212 Journal on Emerging Tech- (print), 1873-1228 (elec- nologies in Computing Sys- tronic). URL http:// tems (JETC), 13(2):22:1– www.sciencedirect.com/ 22:??, March 2017. CO- science/article/pii/S0164121211002834. DEN ???? ISSN 1550- 4832. Jiang:2016:CVI Jiao:2019:AMC [JTZ+16] Yijing Jiang, Shanyu Tang, Liping Zhang, Muzhou [JWNS19] Y. Jiao, P. Wang, D. Niy- Xiong, and Yau Jim Yip. ato, and K. Suankaew- Covert voice over Internet manee. Auction mecha- protocol communications nisms in cloud/fog com- with packet loss based on puting resource allocation fractal interpolation. ACM for public blockchain net- Transactions on Multime- works. IEEE Transactions dia Computing, Communi- on Parallel and Distributed cations, and Applications, Systems, 30(9):1975–1989, REFERENCES 347

September 2019. CODEN Jiang:2010:EDI ITDSEO. ISSN 1045-9219 (print), 1558-2183 (elec- [JZS+10] Yixin Jiang, Haojin Zhu, tronic). Minghui Shi, Xuemin (Sher- man) Shen, and Chuang Jin:2015:NCD Lin. An efficient dynamic- identity based signature [JXLZ15] Chunhua Jin, Chunxiang scheme for secure net- Xu, Fagen Li, and Xiao- work coding. Com- jun Zhang. A novel certifi- puter Networks (Amster- cateless deniable authenti- dam, Netherlands: 1999), cation protocol. Interna- 54(1):28–40, January 15, tional Journal of Computer 2010. CODEN ???? ISSN Applications, 37(3-4):181– 1389-1286. 192, 2015. ISSN 1206- Jan:2019:SEE 212X (print), 1925-7074 (electronic). URL https: [JZU+19] Mian Ahmad Jan, Wenjing //www.tandfonline.com/ Zhang, Muhammad Us- doi/full/10.1080/1206212X. man, Zhiyuan Tan, Fazlul- 2016.1188564. lah Khan, and Entao Luo. SmartEdge: an end-to- Joux:2014:SAC end encryption framework for an edge-enabled smart [JY14] Antoine Joux and Amr city application. Journal Youssef, editors. Se- of Network and Computer lected areas in cryptogra- Applications, 137(??):1–10, phy — SAC 2014: 21st July 1, 2019. CODEN JN- International Conference, CAF3. ISSN 1084-8045 Montr´eal, QC, Canada, (print), 1095-8592 (elec- August 14–15, 2014: re- tronic). URL http:// vised selected papers, vol- www.sciencedirect.com/ ume 8781 of Lecture science/article/pii/S1084804519300827. notes in computer science: LNCS sublibrary. SL 4, Khazaei:2017:COA Security and cryptology. Springer-Verlag, Berlin, [KA17] Shahram Khazaei and Germany / Heidelberg, Siavash Ahmadi. Ciphertext- Germany / London, UK / only attack on d × d Hill in etc., 2014. ISBN 3-319- O(d13d). Information Pro- 13050-1 (print), 3-319- cessing Letters, 118(??):25– 13051-X (e-book). ISSN 29, February 2017. CO- 0302-9743 (print), 1611- DEN IFPLAT. ISSN 0020- 3349 (electronic). LCCN 0190 (print), 1872-6119 QA76.9.A25. (electronic). URL http:// REFERENCES 348

www.sciencedirect.com/ //ieeexplore.ieee.org/ science/article/pii/S0020019016301338. document/8315051/. Kurkcu:2018:CBE Kamp:2013:MES [Kam13] Poul-Henning Kamp. More [KA18] Om¨¨ ur Kıvan¸cK¨urk¸c¨u and encryption is not the solu- Ersin Aslan. A comparison tion. ACM Queue: Tomor- between edge neighbor rup- row’s Computing Today,11 ture degree and edge scat- (7):10, July 2013. CODEN tering number in graphs. AQCUAE. ISSN 1542-7730 International Journal of (print), 1542-7749 (elec- Foundations of Computer tronic). Science (IJFCS), 29(7):??, November 2018. ISSN Kamp:2016:MEM 0129-0541. URL https: [Kam16] Poul-Henning Kamp. More //www.worldscientific. encryption means less pri- com/doi/10.1142/S0129054118500247. vacy. Communications of Kornycky:2017:RFT the Association for Com- puting Machinery, 59(4): [KAHKB17] Joe Kornycky, Omar Abdul- 40–42, April 2016. CODEN Hameed, Ahmet Kondoz, CACMA2. ISSN 0001-0782 and Brian C. Barber. Ra- (print), 1557-7317 (elec- dio frequency traffic clas- tronic). URL http:// sification over WLAN. cacm.acm.org/magazines/ IEEE/ACM Transactions 2016/4/200167/fulltext. on Networking, 25(1):56– 68, February 2017. CO- Kapera:2011:SPD DEN IEANEP. ISSN 1063- [Kap11] Zdzis law Jan Kapera. In 6692 (print), 1558-2566 the Shadow of Pont du (electronic). Gard: the Polish Enigma Koziel:2018:HPS in Vichy France (June 1940 to November 1942), [KAK18] Brian Koziel, Reza Azarder- volume 7 of The Enigma akhsh, and Mehran Mozaf- Bulletin. The Enigma fari Kermani. A high- Press, Krak´ow, Poland, performance and scalable 2011. ISBN 83-86110-72- hardware architecture for 4. ISSN 0867-8693. 111 + isogeny-based cryptogra- 1 + 16 pp. LCCN ???? phy. IEEE Transactions on Kapera:2013:MRM Computers, 67(11):1594– 1609, ???? 2018. CO- [Kap13] Zdzis law Jan Kapera. Mar- DEN ITCOB4. ISSN 0018- ian Rejewski: the man who 9340 (print), 1557-9956 defeated “Enigma”, vol- (electronic). URL https: ume 8 of The Enigma REFERENCES 349

bulletin. The Enigma 0163-5700 (print), 1943- Press, Krak´ow, Poland, 5827 (electronic). 2013. ISBN 83-86110-72-4. 111 pp. LCCN ???? Kawamoto:2015:LSH Karafyllidis:2012:QGC [Kaw15] Junpei Kawamoto. A lo- cality sensitive hashing fil- [Kar12] Ioannis G. Karafyllidis. ter for encrypted vector Quantum gate circuit databases. Fundamenta model of signal integration Informaticae, 137(2):291– in bacterial quorum sens- 304, April 2015. CODEN ing. IEEE/ACM Transac- FUMAAJ. ISSN 0169-2968 tions on Computational Bi- (print), 1875-8681 (elec- ology and Bioinformatics, tronic). 9(2):571–579, March 2012. CODEN ITCBCY. ISSN Karthigaikumar:2010:PPV 1545-5963 (print), 1557- [KB10] P. Karthigaikumar and 9964 (electronic). K. Baskaran. Partially Kong:2015:CSM pipelined VLSI implemen- tation of Blowfish en- [KAS15] Jia Hao Kong, Li-Minn cryption/decryption algo- Ang, and Kah Phooi Seng. rithm. International Jour- A comprehensive survey of nal of Image and Graph- modern symmetric cryp- ics (IJIG), 10(3):327–341, tographic solutions for re- July 2010. CODEN ???? source constrained environ- ISSN 0219-4678. ments. Journal of Net- Kallel:2011:SMM work and Computer Ap- plications, 49(??):15–50, [KBL11] Mohamed Kallel, Mohamed- March 2015. CODEN JN- Salim Bouhlel, and Jean- CAF3. ISSN 1084-8045 Christophe Lapayre. Se- (print), 1095-8592 (elec- curity of the medical me- tronic). URL http:// dia using a hybrid and www.sciencedirect.com/ multiple watermark tech- science/article/pii/S1084804514002136. nique. International Jour- Katz:2013:RIB nal of Image and Graph- ics (IJIG), 11(1):103–115, [Kat13] Jon Katz. Review of January 2011. CODEN Identity-based encryption ???? ISSN 0219-4678. by Sanjit Chattarjee and Kleinrouweler:2017:SAP Palash Sarkar. ACM SIGACT News, 44(4):29– [KCC17] Jan Willem Kleinrouweler, 31, December 2013. CO- Sergio Cabrero, and Pablo DEN SIGNDM. ISSN Cesar. An SDN ar- REFERENCES 350

chitecture for privacy- lection of embedding lo- friendly network-assisted cations for spread spec- DASH. ACM Transactions trum watermarking of com- on Multimedia Comput- pressed audio. Lecture ing, Communications, and Notes in Computer Sci- Applications, 13(3s):44:1– ence, 7128:97–110, 2012. 44:??, August 2017. CO- CODEN LNCSD9. ISSN DEN ???? ISSN 1551-6857 0302-9743 (print), 1611- (print), 1551-6865 (elec- 3349 (electronic). URL tronic). http://link.springer. com/chapter/10.1007/978- Kim:2011:SSE 3-642-32205-1_10/. [KCR11] Changhoon Kim, Matthew Kraetzer:2012:PCS Caesar, and Jennifer Rex- [KD12b] Christian Kraetzer and ford. SEATTLE: a Scalable Jana Dittmann. Plau- Ethernet Architecture for sibility considerations on Large Enterprises. ACM steganalysis as a security Transactions on Computer mechanism — discussions Systems, 29(1):1:1–1:35, on the example of au- February 2011. CODEN dio steganalysis. Lecture ACSYEC. ISSN 0734-2071. Notes in Computer Sci- Khan:2018:APS ence, 7228:80–101, 2012.

+ CODEN LNCSD9. ISSN [KCS 18] Imran Khan, Shehzad Ashraf 0302-9743 (print), 1611- Chaudhry, Muhammad 3349 (electronic). URL Sher, Javed I. Khan, http://link.springer. and Muhammad Khur- com/chapter/10.1007/978- ram Khan. An anony- 3-642-31971-6_5/. mous and provably se- cure biometric-based au- Kieffer:2018:IBC thentication scheme using [KD18] Jean Kieffer and Luca De chaotic maps for accessing Feo. Isogeny-based cryp- medical drop box data. The tography in Julia/Nemo: a Journal of Supercomput- case study. ACM Commu- ing, 74(8):3685–3703, Au- nications in Computer Al- gust 2018. CODEN JO- gebra, 52(4):130–132, De- SUED. ISSN 0920-8542 cember 2018. CODEN (print), 1573-0484 (elec- ???? ISSN 1932-2232 tronic). (print), 1932-2240 (elec- Koz:2012:ASE tronic). Kumar:2019:SSH [KD12a] Alper Koz and Claude Delpha. Adaptive se- [KD19] Chanchal Kumar and Mo- REFERENCES 351

hammad Najmud Doja. A Kumari:2017:DSU secure structure for hiding + information in a cryptosys- [KDW 17] Saru Kumari, Ashok Ku- tem based on machine- mar Das, Mohammad learning techniques and Wazid, Xiong Li, Fan content-based optimization Wu, Kim-Kwang Ray- using portfolio selection mond Choo, and Muham- data. Scalable Comput- mad Khurram Khan. On ing: Practice and Experi- the design of a secure ence, 20(1):161–180, ???? user authentication and 2019. CODEN ???? ISSN key agreement scheme for 1895-1767. URL https: wireless sensor networks. //www.scpe.org/index. Concurrency and Compu- php/scpe/article/view/ tation: Practice and Expe- 1488. rience, 29(23):??, Decem- ber 10, 2017. CODEN Karakoc:2013:BCL CCPEBO. ISSN 1532-0626 [KDH13] F. Karako¸c, H. Demirci, (print), 1532-0634 (elec- and A. E. Harmanci. Bi- tronic). clique cryptanalysis of Kara:2019:ALS LBlock and TWINE. Infor- mation Processing Letters, [KE19] Orhun Kara and Muhammed F. 113(12):423–429, June 30, Esgin. On analysis of 2013. CODEN IF- lightweight stream ciphers PLAT. ISSN 0020-0190 with keyed update. IEEE (print), 1872-6119 (elec- Transactions on Comput- tronic). URL http:// ers, 68(1):99–110, ???? www.sciencedirect.com/ 2019. CODEN IT- science/article/pii/S0020019013000884. COB4. ISSN 0018-9340 (print), 1557-9956 (elec- Karakoc:2015:AKA tronic). URL https: [KDH15] F. Karako¸c, H. Demirci, //ieeexplore.ieee.org/ and A. E. Harmanci. AKF: document/8400392/. a key alternating Feistel Keblusek:2015:BRK scheme for lightweight ci- pher designs. Informa- [Keb15] Marika Keblusek. Book tion Processing Letters, review: Kristie Macrakis, 115(2):359–367, Febru- Prisoners, Lovers, and ary 2015. CODEN IF- Spies: The Story of Invis- PLAT. ISSN 0020-0190 ible Ink from Herodotus to (print), 1872-6119 (elec- Al-Qaeda. Isis, 106(3):692– tronic). URL http:// 693, September 2015. CO- www.sciencedirect.com/ DEN ISISA4. ISSN 0021- science/article/pii/S0020019014002257. 1753 (print), 1545-6994 REFERENCES 352

(electronic). URL http:/ EPFL IC LACAL [and /www.jstor.org/stable/ others], Station 14, CH- 10.1086/683195. 1015 Lausanne, Switzer- land [and others], February Kemshall:2011:WMT 18, 2010. URL https:/ [Kem11] Andy Kemshall. Why mo- /eprint.iacr.org/2010/ bile two-factor authentica- 006.pdf. tion makes sense. Net- Kikuchi:2012:SSN work Security, 2011(4):9– 12, April 2011. CODEN [KFOS12] Ryo Kikuchi, Atsushi Fu- NTSCF5. ISSN 1353-4858 jioka, Yoshiaki Okamoto, (print), 1872-9371 (elec- and Taiichi Saito. Strong tronic). URL http:// security notions for timed- www.sciencedirect.com/ release public-key encryp- science/article/pii/S1353485811700381. tion revisited. Lecture Notes in Computer Sci- Kabirirad:2019:HSG ence, 7259:88–108, 2012. CODEN LNCSD9. ISSN [KFE19] Saeideh Kabirirad, Mah- 0302-9743 (print), 1611- mood Fazlali, and Ziba Es- 3349 (electronic). URL lami. High-speed GPU im- http://link.springer. plementation of a secret com/chapter/10.1007/978- sharing scheme based on 3-642-31912-9_7/. cellular automata. The Journal of Supercomputing, Kostic:2019:UNV 75(11):7314–7336, Novem- [KG19] Dusan Kostic and Shay ber 2019. CODEN JO- Gueron. Using the new SUED. ISSN 0920-8542 VPMADD instructions for (print), 1573-0484 (elec- the new post quantum tronic). key encapsulation mecha- Kleinjung:2010:FBR nism SIKE. In Takagi et al. [TBL19], pages 215– [KFL+10] Thorsten Kleinjung, Kazu- 218. ISBN 1-72813-366-1. maro Jens Franke, Ar- ISSN 1063-6889. jen K. Lenstra, Emmanuel Kramer:2010:FDC Thom´e, Joppe W. Bos, Pierrick Gaudry, Alexan- [KGO10] Simon Kramer, Rajeev der Kruppa, Peter L. Gor´e, and Eiji Okamoto. Montgomery, Dag Arne Formal definitions and Osvik, Herman te Riele, complexity results for trust Andrey Timofeev, and relations and trust domains Paul Zimmermann. Fac- fit for TTPs, the web torization of a 768-bit RSA of trust, PKIs, and ID- modulus. Report 1.4, based cryptography. ACM REFERENCES 353

SIGACT News, 41(1):75– data-classifiers. IEEE 98, March 2010. CODEN Transactions on Comput- SIGNDM. ISSN 0163-5700 ers, 65(9):2848–2858, ???? (print), 1943-5827 (elec- 2016. CODEN ITCOB4. tronic). ISSN 0018-9340 (print), 1557-9956 (electronic). Kim:2012:SLT Kwon:2010:SEB [KGP12] Tiffany Hyun-Jin Kim, Virgil Gligor, and Adrian [KH10] Taekyoung Kwon and Jin Perrig. Street-level trust Hong. Secure and effi- semantics for attribute cient broadcast authentica- authentication. Lecture tion in wireless sensor net- Notes in Computer Sci- works. IEEE Transactions ence, 7622:96–115, 2012. on Computers, 59(8):1120– CODEN LNCSD9. ISSN 1133, August 2010. CO- 0302-9743 (print), 1611- DEN ITCOB4. ISSN 0018- 3349 (electronic). URL 9340 (print), 1557-9956 http://link.springer. (electronic). URL http: com/chapter/10.1007/978- //ieeexplore.ieee.org/ 3-642-35694-0_12/. stamp/stamp.jsp?tp=&arnumber= 5313804. K:2019:IAM Koo:2018:PPD [KGP+19] Deepa K., Radhamani G., Vinod P., Mohammad Sho- [KH18] Dongyoung Koo and Jun- jafar, Neeraj Kumar, and beom Hur. Privacy- Mauro Conti. Identifi- preserving deduplication cation of Android mal- of encrypted data with ware using refined sys- dynamic ownership man- tem calls. Concurrency agement in fog comput- and Computation: Prac- ing. Future Generation tice and Experience,31 Computer Systems,78 (20):e5311:1–e5311:??, Oc- (part 2)(??):739–752, Jan- tober 25, 2019. CODEN uary 2018. CODEN FG- CCPEBO. ISSN 1532-0626 SEVI. ISSN 0167-739X (print), 1532-0634 (elec- (print), 1872-7115 (elec- tronic). tronic). URL http:// www.sciencedirect.com/ Khedr:2016:SSH science/article/pii/S0167739X17301309. [KGV16] Alhassan Khedr, Glenn Khazaei:2010:NBS Gulak, and Vinod Vaikun- tanathan. SHIELD: Scal- [Kha10] Shahram Khazaei. Neutrality- able homomorphic imple- Based Symmetric Crypt- mentation of encrypted analysis.Th`ese, Ecole´ REFERENCES 354

polytechnique f´ed´erale de tober 1, 2018. CODEN Lausanne (EPFL), Lau- AMHCBQ. ISSN 0096- sanne, Switzerland, 2010. 3003 (print), 1873-5649 138 pp. (electronic). URL http:// www.sciencedirect.com/ Kastner:2010:AOT science/article/pii/S0096300318302935. [KHF10] Ryan Kastner, Anup Hosan- Khalil-Hani:2013:BEB gadi, and Farzan Fallah. Arithmetic optimization [KHMB13] Mohamed Khalil-Hani, techniques for hardware Muhammad N. Marsono, and software design. Cam- and Rabia Bakhteri. Bio- bridge University Press, metric encryption based on Cambridge, UK, 2010. a fuzzy vault scheme with a ISBN 0-521-88099-8. vii + fast chaff generation algo- 187 pp. LCCN QA76.9.C62 rithm. Future Generation K37 2010; QA76.9.C62 Computer Systems, 29(3): KAS 2010. URL http:/ 800–810, March 2013. CO- /assets.cambridge.org/ DEN FGSEVI. ISSN 0167- 97805218/80992/cover/ 739X (print), 1872-7115 9780521880992.jpg. (electronic). URL http:// www.sciencedirect.com/ Kim:2014:MBM science/article/pii/S0167739X12000350. [KHHH14] Heeseok Kim, Dong-Guk Kinkelin:2011:UTS Han, Seokhie Hong, and Jaecheol Ha. Message [KHN+11] Holger Kinkelin, Ralph blinding method requir- Holz, Heiko Niedermayer, ing no multiplicative in- Simon Mittelberger, and version for RSA. ACM Georg Carle. On using Transactions on Embed- TPM for secure identities ded Computing Systems, in future home networks. 13(4):80:1–80:??, February Future Internet, 3(1):1–13, 2014. CODEN ???? ISSN January 07, 2011. CODEN 1539-9087 (print), 1558- ???? ISSN 1999-5903. 3465 (electronic). URL https://www.mdpi. com/1999-5903/3/1/1. Khleborodov:2018:FEC Kim:2016:EPE [Khl18] Denis Khleborodov. Fast elliptic curve point mul- [KHPP16] Intae Kim, Seong Oun tiplication based on win- Hwang, Jong Hwan Park, dow Non-Adjacent Form and Chanil Park. An method. Applied Math- efficient predicate encryp- ematics and Computa- tion with constant pair- tion, 334(??):41–59, Oc- ing computations and min- REFERENCES 355

imum costs. IEEE Trans- Lecture notes in computer actions on Computers,65 science. Springer-Verlag, (10):2947–2958, ???? 2016. Berlin, Germany / Heidel- CODEN ITCOB4. ISSN berg, Germany / London, 0018-9340 (print), 1557- UK / etc., 2011. ISBN 3- 9956 (electronic). 642-19073-1. LCCN ????

Kolsch:2019:SBP Kompara:2019:REM

[KHRG19] Johannes K¨olsch, Christo- [KIH19] Marko Kompara, SK Hafizul pher Heinz, Axel Ratzke, Islam, and Marko H¨olbl. and Christoph Grimm. A robust and efficient mu- Simulation-based perfor- tual authentication and key mance validation of homo- agreement scheme with un- morphic encryption algo- traceability for WBANs. rithms in the Internet of Computer Networks (Ams- Things. Future Internet,11 terdam, Netherlands: 1999), (10):218, October 22, 2019. 148(??):196–213, January CODEN ???? ISSN 1999- 15, 2019. CODEN 5903. URL https://www. ???? ISSN 1389-1286 mdpi.com/1999-5903/11/ (print), 1872-7069 (elec- 10/218. tronic). URL http:// www.sciencedirect.com/ Kai:2011:CIS science/article/pii/S1389128618303955. [KI11] Hiroshi Kai and Shigenobu Kim:2011:LBA Inoue. Cheater identifica- tion on a secret sharing [Kim11] Hyun Sung Kim. Location- scheme using GCD. ACM based authentication pro- Communications in Com- tocol for first cognitive puter Algebra, 45(2):119– radio networking stan- 120, June 2011. CODEN dard. Journal of Net- ???? ISSN 1932-2232 work and Computer Appli- (print), 1932-2240 (elec- cations, 34(4):1160–1167, tronic). July 2011. CODEN JN- CAF3. ISSN 1084-8045 Kiayias:2011:TCC (print), 1095-8592 (elec- tronic). URL [Kia11] Aggelos Kiayias, editor. http:// Topics in cryptology — www.sciencedirect.com/ CT-RSA 2011: the cryp- science/article/pii/S1084804510002286. tographers’ track at the Kim:2015:CEH RSA conference 2011, San Francisco, CA, USA, [Kim15] Y. Kim. Comments on February 14–18, 2011. pro- “An Efficient Homomor- ceedings, volume 6558 of phic MAC with Small Key REFERENCES 356

Size for Authentication in Ramanujan’s class invari- Network Coding. IEEE ants and their use in Transactions on Comput- elliptic curve cryptogra- ers, 64(12):3619–3620, ???? phy. Computers and 2015. CODEN ITCOB4. Mathematics with Appli- ISSN 0018-9340 (print), cations, 59(8):2901–2917, 1557-9956 (electronic). See April 2010. CODEN [CJ13]. CMAPDK. ISSN 0898- 1221 (print), 1873-7668 Kim:2016:MAS (electronic). URL http:// [Kim16] Soon Seok Kim. Mutual www.sciencedirect.com/ authentication scheme be- science/article/pii/S0898122110001173. tween biosensor device and Kawai:2012:SHS data manager in healthcare environment. The Jour- [KK12] Yutaka Kawai and Noboru nal of Supercomputing,72 Kunihiro. Secret hand- (1):177–184, January 2016. shake scheme with request- CODEN JOSUED. ISSN based-revealing. Lecture 0920-8542 (print), 1573- Notes in Computer Sci- 0484 (electronic). URL ence, 7163:1–16, 2012. CO- http://link.springer. DEN LNCSD9. ISSN com/article/10.1007/s11227- 0302-9743 (print), 1611- 015-1536-3. 3349 (electronic). URL Khan:2016:BSW http://link.springer. com/chapter/10.1007/978- [KJN+16] Abid Khan, Farhana Jabeen, 3-642-29804-2_1/. Farah Naz, Sabah Suhail, Mansoor Ahmed, and Sar- Kawai:2013:SHS fraz Nawaz. Buyer seller watermarking protocols is- [KK13] Yutaka Kawai and Noboru sues and challenges — a Kunihiro. Secret hand- survey. Journal of Net- shake scheme with request- work and Computer Ap- based-revealing. Comput- plications, 75(??):317–334, ers and Mathematics with November 2016. CODEN Applications, 65(5):786– JNCAF3. ISSN 1084-8045 798, March 2013. CODEN (print), 1095-8592 (elec- CMAPDK. ISSN 0898- tronic). URL http:// 1221 (print), 1873-7668 www.sciencedirect.com/ (electronic). URL http:// science/article/pii/S1084804516301941. www.sciencedirect.com/ science/article/pii/S0898122112004919. Konstantinou:2010:RCI Khalil:2014:CIM [KK10] Elisavet Konstantinou and Aristides Kontogeorgis. [KKA14] Issa Khalil, Abdallah REFERENCES 357

Khreishah, and Muham- ISSN 0920-8542 (print), mad Azeem. Consolidated 1573-0484 (electronic). Identity Management Sys- tem for secure mobile cloud Khan:2014:MEK computing. Computer [KKG14] Muhammad Khurram Khan, Networks (Amsterdam, Saru Kumari, and Mridul K. Netherlands: 1999),65 Gupta. More efficient (??):99–110, June 2, 2014. key-hash based finger- CODEN ???? ISSN 1389- print remote authentica- 1286 (print), 1872-7069 tion scheme using mobile (electronic). URL http:// device. Computing, 96(9): www.sciencedirect.com/ 793–816, September 2014. . science/article/pii/S1389128614001194 CODEN CMPTA2. ISSN Khan:2015:CMB 0010-485X (print), 1436- 5057 (electronic). URL [KKA15] Abdul Nasir Khan, M. L. Mat http://link.springer. Kiah, and Mazhar Ali. com/article/10.1007/s00607- A cloud-manager-based re- 013-0308-2. encryption scheme for mo- Karopoulos:2010:FIP bile users in cloud envi- ronment: a hybrid ap- [KKGK10] Giorgos Karopoulos, Geor- proach. Journal of Grid gios Kambourakis, Ste- Computing, 13(4):651–675, fanos Gritzalis, and Elisavet December 2015. CO- Konstantinou. A frame- DEN ???? ISSN work for identity privacy 1570-7873 (print), 1572- in SIP. Journal of Net- 9184 (electronic). URL work and Computer Appli- http://link.springer. cations, 33(1):16–28, Jan- com/article/10.1007/s10723- uary 2010. CODEN JN- 015-9352-9. CAF3. ISSN 1084-8045 (print), 1095-8592 (elec- Kumari:2018:SAS tronic). URL http:// [KKD+18] Saru Kumari, Marimuthu www.sciencedirect.com/ science/article/pii/S1084804509001052. Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Kim:2016:DBM and Neeraj Kumar. A se- cure authentication scheme [KKJ+16] Yonggon Kim, Ohmin based on elliptic curve Kwon, Jinsoo Jang, Seong- cryptography for IoT and wook Jin, Hyeongboo cloud servers. The Jour- Baek, Brent Byunghoon nal of Supercomputing,74 Kang, and Hyunsoo Yoon. (12):6428–6453, December On-demand bootstrapping 2018. CODEN JOSUED. mechanism for isolated REFERENCES 358

cryptographic operations acm.org/citation.cfm? on commodity accelera- id=3212509. tors. Computers & Secu- Kim:2018:ARD rity, 62(??):33–48, Septem- ber 2016. CODEN [KKK+18b] Sung Ryoung Kim, Jeong Nyeo CPSEDU. ISSN 0167-4048 Kim, Sung Tae Kim, Sun- (print), 1872-6208 (elec- woo Shin, and Jeong Hyun tronic). URL https:// Yi. Anti-reversible dy- www.sciencedirect.com/ namic tamper detection science/article/pii/S0167404816300712. scheme using distributed image steganography for Kubota:2016:SAV IoT applications. The [KKK+16] Takahiro Kubota, Yoshi- Journal of Supercomputing, hiko Kakutani, Go Kato, 74(9):4261–4280, Septem- Yasuhito Kawano, and ber 2018. CODEN JO- Hideki Sakurada. Semi- SUED. ISSN 0920-8542 automated verification of (print), 1573-0484 (elec- security proofs of quantum tronic). cryptographic protocols. Koblitz:2011:ECC Journal of Symbolic Com- putation, 73(??):192–220, [KKM11] Ann Hibner Koblitz, Neal March/April 2016. CO- Koblitz, and Alfred Menezes. DEN JSYCEH. ISSN 0747- Elliptic curve cryptog- 7171 (print), 1095-855X raphy: the serpentine (electronic). URL http:// course of a paradigm www.sciencedirect.com/ shift. Journal of Num- science/article/pii/S0747717115000462. ber Theory, 131(5):781– 814, May 2011. CODEN Kim:2018:EPP JNUTA9. ISSN 0022-314X [KKK+18a] Jinsu Kim, Dongyoung (print), 1096-1658 (elec- Koo, Yuna Kim, Hyun- tronic). URL http:// soo Yoon, Junbum Shin, www.sciencedirect.com/ . and Sungwook Kim. Ef- science/article/pii/S0022314X09000481 ficient privacy-preserving Khan:2013:EDC matrix factorization for recommendation via fully [KKM+13] Abdul Nasir Khan, M. L. Mat homomorphic encryption. Kiah, Sajjad A. Madani, ACM Transactions on Pri- Atta ur Rehman Khan, vacy and Security (TOPS), and Mazhar Ali. En- 21(4):17:1–17:??, October hanced dynamic creden- 2018. ISSN 2471-2566 tial generation scheme for (print), 2471-2574 (elec- protection of user identity tronic). URL https://dl. in mobile-cloud comput- REFERENCES 359

ing. The Journal of Su- loc.gov/catdir/toc/ecip0716/ percomputing, 66(3):1687– 2007017861.html. 1706, December 2013. CO- Kushwah:2011:EIB DEN JOSUED. ISSN 0920-8542 (print), 1573- [KL11] Prashant Kushwah and 0484 (electronic). URL Sunder Lal. An efficient http://link.springer. identity based generalized com/article/10.1007/s11227- signcryption scheme. The- 013-0967-y. oretical Computer Science, Khan:2014:IPR 412(45):6382–6389, Octo- ber 21, 2011. CODEN + [KKM 14] Abdul Nasir Khan, M. L. Mat TCSCDI. ISSN 0304-3975 Kiah, Sajjad A. Madani, (print), 1879-2294 (elec- Mazhar Ali, Atta ur Rehman Khan, tronic). URL http:// and Shahaboddin Shamshir- www.sciencedirect.com/ band. Incremental proxy science/article/pii/S0304397511006700. re-encryption scheme for mobile cloud computing Khakpour:2013:ITA environment. The Journal of Supercomputing, 68(2): [KL13] Amir R. Khakpour and 624–651, May 2014. CO- Alex X. Liu. An information- DEN JOSUED. ISSN theoretical approach to 0920-8542 (print), 1573- high-speed flow nature 0484 (electronic). URL identification. IEEE/ http://link.springer. ACM Transactions on Net- com/article/10.1007/s11227- working, 21(4):1076–1089, 013-1055-z. August 2013. CODEN Katz:2008:IMC IEANEP. ISSN 1063-6692 (print), 1558-2566 (elec- [KL08] Jonathan Katz and Yehuda tronic). Lindell. Introduction to modern cryptography: Katz:2015:IMC Principles and Protocols. Chapman and Hall/CRC [KL15] Jonathan Katz and Yehuda cryptography and network Lindell. Introduction security. Chapman and to modern cryptography. Hall/CRC, Boca Raton, Chapman and hall/CRC FL, USA, 2008. ISBN 1- cryptography and network 58488-551-3. xviii + 534 security series. Taylor and pp. LCCN QA76.9.A25 Francis, Boca Raton, FL, K36 2008. URL http: USA, second edition, 2015. //www.loc.gov/catdir/ ISBN 1-4665-7026-1 (hard- enhancements/fy0807/2007017861- cover). 583 pp. LCCN d.html; http://www. QA76.9.A25 K36 2014. REFERENCES 360

Klapper:2010:PSS ???? ISSN 1539-9087 (print), 1558-3465 (elec- [Kla10] Andrew Klapper. Pseu- tronic). URL https:// dorandom Sequences and dl.acm.org/ft_gateway. Stream Ciphers, chap- cfm?id=3358195. ter 17, pages 1–23. Vol- ume 2 of Atallah and Blan- Koeberl:2012:EPD ton [AB10b], second edi- [KLM+12] Patrick Koeberl, Jiangtao tion, 2010. ISBN 1-58488- Li, Roel Maes, Anand Ra- 820-2. LCCN QA76.9.A43 jan, Claire Vishik, and A433 2010. URL http: Marcin W´ojcik. Evaluation //www.crcnetbase.com/ of a PUF device authenti- doi/abs/10.1201/9781584888215- cation scheme on a discrete c17. 0.13um SRAM. Lecture Ko:2010:MME Notes in Computer Sci- ence, 7222:271–288, 2012. + [KLC 10] Jeonggil Ko, Jong Hyun CODEN LNCSD9. ISSN Lim, Yin Chen, Rv˜azvan 0302-9743 (print), 1611- Musvaloiu-E, Andreas Terzis, 3349 (electronic). URL Gerald M. Masson, Tia http://link.springer. Gao, Walt Destler, Leo com/chapter/10.1007/978- Selavo, and Richard P. 3-642-32298-3_18/. Dutton. MEDiSN: Med- ical emergency detection Kent:2015:AGA in sensor networks. ACM Transactions on Embedded [KLN15] Alexander D. Kent, Lo- Computing Systems, 10(1): rie M. Liebrock, and 11:1–11:??, August 2010. Joshua C. Neil. Authen- CODEN ???? ISSN 1539- tication graphs: Analyz- 9087. ing user behavior within an enterprise network. Kim:2019:AAI Computers & Security, 48(??):150–166, Febru- [KLK+19] Jihye Kim, Jiwon Lee, ary 2015. CODEN Hankyung Ko, Donghwan CPSEDU. ISSN 0167-4048 Oh, Semin Han, Gwonho (print), 1872-6208 (elec- Jeong, and Hyunok Oh. tronic). URL https:// AuthCropper: Authenti- www.sciencedirect.com/ cated image cropper for science/article/pii/S0167404814001321. privacy preserving surveil- lance systems. ACM Kumari:2016:UFM Transactions on Embed- ded Computing Systems, [KLW+16] Saru Kumari, Xiong Li, 18(5s):62:1–62:??, Octo- Fan Wu, Ashok Ku- ber 2019. CODEN mar Das, Hamed Arshad, REFERENCES 361

and Muhammad Khurram CODEN LNCSD9. ISSN Khan. A user friendly mu- 0302-9743 (print), 1611- tual authentication and key 3349 (electronic). URL agreement scheme for wire- http://link.springer. less sensor networks us- com/chapter/10.1007/978- ing chaotic maps. Future 3-642-33191-6_3/. Generation Computer Sys- Keller:2010:DAS tems, 63(??):56–75, Octo- ber 2016. CODEN FG- [KM10a] Nathan Keller and Stephen D. SEVI. ISSN 0167-739X Miller. Distinguishing at- (print), 1872-7115 (elec- tacks on stream ciphers tronic). URL http:// based on arrays of pseudo- www.sciencedirect.com/ random words. Informa- science/article/pii/S0167739X16300930. tion Processing Letters, 110 (4):129–132, January 16, Kumari:2017:DPS 2010. CODEN IFPLAT. ISSN 0020-0190 (print), [KLW+17] Saru Kumari, Xiong Li, 1872-6119 (electronic). Fan Wu, Ashok Kumar Das, Kim-Kwang Ray- Khomejani:2010:PCT mond Choo, and Jian Shen. Design of a prov- [KM10b] S. Khomejani and A. Movaghar. ably secure biometrics- Privacy consideration for based multi-cloud-server trustworthy vehicular ad authentication scheme. Fu- hoc networks. In IEEE, ture Generation Computer editor, Proceedings of the Systems, 68(??):320–330, 2010 International Confer- March 2017. CODEN FG- ence On Electronics and SEVI. ISSN 0167-739X Information Engineering (print), 1872-7115 (elec- (ICEIE), 1–3, August, tronic). URL http:// 2010, Kyoto, Japan, pages www.sciencedirect.com/ 437–?? IEEE Computer science/article/pii/S0167739X16303776. Society Press, 1109 Spring Street, Suite 300, Silver Kim:2012:INS Spring, MD 20910, USA, 2010. ISBN 1-4244-7679-8. [KLY+12] Hwi-Gang Kim, Eun Jung LCCN ???? Lee, Gang-Joon Yoon, Koblitz:2010:BNW Sung-Dae Yang, Eui Chul Lee, and Sang Min Yoon. [KM10c] Neal Koblitz and Alfred Illumination normalization Menezes. The brave new for SIFT based finger vein world of bodacious as- authentication. Lecture sumptions in cryptogra- Notes in Computer Sci- phy. Notices of the Amer- ence, 7432:21–30, 2012. ican Mathematical Soci- REFERENCES 362

ety, 57(3):357–365, March Koblitz:2016:RWE 2010. CODEN AM- NOAN. ISSN 0002-9920 [KM16] Neal Koblitz and Alfred (print), 1088-9477 (elec- Menezes. A riddle wrapped tronic). URL http:/ in an enigma. IEEE Secu- /www.ams.org/notices/ rity & Privacy, 14(6):34– 201003/. 42, November/December 2016. CODEN ???? ISSN Kiani:2011:MPD 1540-7993 (print), 1558- 4046 (electronic). URL [KM11] Soheila Kiani and Mohsen Ebrahimi https://www.computer. Moghaddam. A multi- org/csdl/mags/sp/2016/ purpose digital image wa- 06/msp2016060034-abs. termarking using fractal html. block coding. The Journal of Systems and Software, Kasamatsu:2012:TSE

84(9):1550–1562, Septem- + ber 2011. CODEN JS- [KME 12] Kohei Kasamatsu, Takahiro SODM. ISSN 0164-1212 Matsuda, Keita Emura, (print), 1873-1228 (elec- Nuttapong Attrapadung, and Goichiro Hanaoka. tronic). URL http:// Time-specific encryption www.sciencedirect.com/ from forward-secure en- science/article/pii/S0164121211000707. cryption. Lecture Notes in Kifer:2014:PFM Computer Science, 7485: 184–204, 2012. CO- [KM14] Daniel Kifer and Ashwin DEN LNCSD9. ISSN Machanavajjhala. Puffer- 0302-9743 (print), 1611- fish: a framework for 3349 (electronic). URL mathematical privacy defi- http://link.springer. nitions. ACM Transactions com/chapter/10.1007/978- on Database Systems,39 3-642-32928-9_11/. (1):3:1–3:??, January 2014. CODEN ATDSD3. ISSN Kandi:2017:ELC 0362-5915 (print), 1557- [KMG17] Haribabu Kandi, Deepak 4644 (electronic). Mishra, and Subrahmanyam Koblitz:2015:RWE R. K. Sai Gorthi. Explor- ing the learning capabili- [KM15] Neal Koblitz and Alfred J. ties of convolutional neural Menezes. A riddle wrapped networks for robust image in an enigma. Report, ????, watermarking. Comput- ????, November 1, 2015. ers & Security, 65(??):247– 1–20 pp. URL https:/ 268, March 2017. CODEN /eprint.iacr.org/2015/ CPSEDU. ISSN 0167-4048 1018.pdf. (print), 1872-6208 (elec- REFERENCES 363

tronic). URL https:// uary/February 2011. ISSN www.sciencedirect.com/ 1540-7993 (print), 1558- science/article/pii/S0167404816301699. 4046 (electronic). Kline:2018:CAR Kanwal:2015:TTM

[KMJ18] Donald Kline, Jr., Rami [KMSM15] Ayesha Kanwal, Rahat Melhem, and Alex K. Masood, Muhammad Awais Jones. Counter advance Shibli, and Rafia Mum- for reliable encryption in taz. Taxonomy for trust phase change memory. models in cloud comput- IEEE Computer Architec- ing. The Computer Jour- ture Letters, 17(2):209– nal, 58(4):601–626, April 212, July/December 2018. 2015. CODEN CM- CODEN ???? ISSN 1556- PJA6. ISSN 0010-4620 6056 (print), 1556-6064 (print), 1460-2067 (elec- (electronic). tronic). URL http:// comjnl.oxfordjournals. Kiyoshima:2014:CRB org/content/58/4/601. [KMO14] Susumu Kiyoshima, Yoshi- Katz:2012:TSP fumi Manabe, and Tat- suaki Okamoto. Constant- [KMTG12] Jonathan Katz, Philip round black-box construc- MacKenzie, Gelareh Ta- tion of composable multi- ban, and Virgil Gligor. party computation pro- Two-server password-only tocol. Lecture Notes in authenticated key ex- Computer Science, 8349: change. Journal of 343–367, 2014. CO- Computer and System DEN LNCSD9. ISSN Sciences, 78(2):651–669, 0302-9743 (print), 1611- March 2012. CODEN JC- 3349 (electronic). URL SSBM. ISSN 0022-0000 http://link.springer. (print), 1090-2724 (elec- com/chapter/10.1007/978- tronic). URL http:// 3-642-54242-8_15/. www.sciencedirect.com/ science/article/pii/S0022000011001048. Karger:2011:LLB Kavun:2018:SAE [KMP+11] Paul Karger, Suzanne McIntosh, Elaine Palmer, [KMY18] Elif Bilge Kavun, Hristina David Toll, and Samuel Mihajloska, and Tolga Weber. Lessons learned: Yal¸cin. A survey on Building the Caernarvon authenticated encryption– high-assurance operating ASIC designer’s perspec- system. IEEE Security & tive. ACM Computing Privacy, 9(1):22–30, Jan- Surveys, 50(6):88:1–88:??, REFERENCES 364

January 2018. CODEN 04/msp2017040062-abs. CMSVAN. ISSN 0360-0300 html. (print), 1557-7341 (elec- Khovratovich:2010:RRA tronic). [KNR10] Dmitry Khovratovich, Ivica Kang:2019:NBK Nikoli´c, and Christian Rechberger. Rotational re- [KMZS19] Burong Kang, Xinyu Meng, bound attacks on reduced Lei Zhang, and Yinxia Skein. Report, University Sun. Nonce-based key of Luxembourg, Luxem- agreement protocol against bourg, October 20, 2010. bad randomness. Inter- 20 pp. URL http:/ national Journal of Foun- /eprint.iacr.org/2010/ dations of Computer Sci- 538. ence (IJFCS), 30(4):619– 633, June 2019. ISSN Kobsa:2013:CJV 0129-0541. URL https: //www.worldscientific. [KNTU13] Alfred Kobsa, Rishab com/doi/10.1142/S0129054119400161. Nithyanand, Gene Tsudik, and Ersin Uzun. Can Khovratovich:2010:RCA Jannie verify? Usability of display-equipped RFID [KN10] Dmitry Khovratovich and tags for security purposes. Ivica Nikoli´c. Rota- Journal of Computer Se- tional cryptanalysis of curity, 21(3):347–370, ???? ARX. Report, University 2013. CODEN JCSIET. of Luxembourg, Luxem- ISSN 0926-227X (print), bourg, January 2010. 24 1875-8924 (electronic). pp. URL http://www. skein-hash.info/sites/ Kheiri:2014:CCV default/files/axr.pdf. [KO14]¨ Ahmed Kheiri and En- Knijnenburg:2017:PCE der Ozcan.¨ Construct- ing constrained-version of [Kni17] Bart P. Knijnenburg. Pri- magic squares using selec- vacy? I can’t even! tion hyper-heuristics. The Making a case for user- Computer Journal, 57(3): tailored privacy. IEEE Se- 469–479, March 2014. CO- curity & Privacy, 15(4): DEN CMPJA6. ISSN 62–67, July/August 2017. 0010-4620 (print), 1460- CODEN ???? ISSN 2067 (electronic). URL 1540-7993 (print), 1558- http://comjnl.oxfordjournals. 4046 (electronic). URL org/content/57/3/469. https://www.computer. full.pdf+html. See cor- org/csdl/mags/sp/2017/ rection [?]. REFERENCES 365

Kumari:2016:APW Side-channel analysis of cryptographic RFIDs with [KO16] Shipra Kumari and Hari analog demodulation. Lec- Om. Authentication pro- ture Notes in Computer tocol for wireless sensor Science, 7055:61–77, 2012. networks applications like CODEN LNCSD9. ISSN safety monitoring in coal 0302-9743 (print), 1611- mines. Computer Networks 3349 (electronic). URL (Amsterdam, Netherlands: http://link.springer. 1999), 104(??):137–154, com/chapter/10.1007/978- July 20, 2016. CODEN 3-642-25286-0_5/. ???? ISSN 1389-1286 (print), 1872-7069 (elec- Khamsemanan:2016:BBU tronic). URL http:// www.sciencedirect.com/ [KOS16] Nirattaya Khamsemanan, science/article/pii/S1389128616301384. Rafail Ostrovsky, and Koblitz:2010:BRB William E. Skeith. On the black-box use of somewhat [Kob10] Neal Koblitz. Book re- homomorphic encryption view: Decrypted Secrets: in noninteractive two-party Methods and Maxims of protocols. SIAM Journal Cryptology. Fourth Edi- on Discrete Mathematics, tion. SIAM Review,52 30(1):266–295, ???? 2016. (4):777–779, ???? 2010. CODEN SJDMEC. ISSN CODEN SIREAD. ISSN 0895-4801 (print), 1095- 0036-1445 (print), 1095- 7146 (electronic). 7200 (electronic). Komargodski:2018:LRO Kawachi:2017:GCR [Kom18] Ilan Komargodski. Leakage [KOTY17] Akinori Kawachi, Yoshio resilient one-way functions: Okamoto, Keisuke Tanaka, the auxiliary-input setting. and Kenji Yasunaga. Gen- Theoretical Computer Sci- eral constructions of ratio- ence, 746(??):6–18, Octo- nal secret sharing with ex- ber 25, 2018. CODEN pected constant-round re- TCSCDI. ISSN 0304-3975 construction. The Com- (print), 1879-2294 (elec- puter Journal, 60(5):711– tronic). URL http:// 728, April 1, 2017. CO- www.sciencedirect.com/ DEN CMPJA6. ISSN science/article/pii/S0304397518304304. 0010-4620 (print), 1460- 2067 (electronic). URL Kasper:2012:SCA https://academic.oup. [KOP12] Timo Kasper, David Os- com/comjnl/article/60/ wald, and Christof Paar. 5/711/2715224. REFERENCES 366

Kollmitzer:2010:AQC Koya:2018:AHM [KP18] Aneesh M. Koya and [KP10] Christian Kollmitzer and Deepthi P. P. Anony- M. (Mario) Pivk, editors. mous hybrid mutual au- Applied Quantum Cryp- thentication and key agree- tography, volume 797 of ment scheme for wireless Lecture notes in physics. body area network. Com- Springer-Verlag, Berlin, puter Networks (Amster- Germany / Heidelberg, dam, Netherlands: 1999), Germany / London, UK / 140(??):138–151, July 20, etc., 2010. ISBN 3-642- 2018. CODEN ???? ISSN 04829-3 (hardcover), 3-642- 1389-1286 (print), 1872- 04831-5 (e-book). xii + 214 7069 (electronic). URL pp. LCCN TK5102.94 .A68 2010. http://www.sciencedirect. com/science/article/pii/ Kang:2012:AKM S1389128618302044. Kumar:2017:TAU [KP12] Hyun-Sun Kang and Chang- Seop Park. An authen- [KPB17] Vireshwar Kumar, Jung- tication and key man- Min (Jerry) Park, and agement scheme for the Kaigui Bian. Transmit- proxy mobile IPv6. Lecture ter authentication using hi- Notes in Computer Sci- erarchical modulation in ence, 7690:144–160, 2012. dynamic spectrum shar- CODEN LNCSD9. ISSN ing. Journal of Network 0302-9743 (print), 1611- and Computer Applica- 3349 (electronic). URL tions, 91(??):52–60, Au- http://link.springer. gust 1, 2017. CODEN JN- com/chapter/10.1007/978- CAF3. ISSN 1084-8045 3-642-35416-8_11/. (print), 1095-8592 (elec- tronic). URL http:// Kolman:2017:SCG www.sciencedirect.com/ science/article/pii/S1084804517301935. [KP17] Eyal Kolman and Benny Kobusinska:2018:BDF Pinkas. Securely comput- ing a ground speed model. [KPB18] Anna Kobusi´nska, Kamil ACM Transactions on In- Pawluczuk, and Jerzy telligent Systems and Tech- Brzezi´nski. Big data finger- nology (TIST), 8(4):54:1– printing information ana- 54:??, July 2017. CODEN lytics for sustainability. Fu- ???? ISSN 2157-6904 ture Generation Computer (print), 2157-6912 (elec- Systems, 86(??):1321–1337, tronic). September 2018. CODEN REFERENCES 367

FGSEVI. ISSN 0167-739X and Ahmad-Reza Sadeghi. (print), 1872-7115 (elec- Converse PUF-based au- tronic). URL https:// thentication. Lecture Notes www.sciencedirect.com/ in Computer Science, 7344: science/article/pii/S0167739X17329965. 142–158, 2012. CO- DEN LNCSD9. ISSN Kiltz:2011:EAH 0302-9743 (print), 1611- [KPC+11] Eike Kiltz, Krzysztof 3349 (electronic). URL Pietrzak, David Cash, Ab- http://link.springer. hishek Jain, and Daniele com/chapter/10.1007/978- Venturi. Efficient authen- 3-642-30921-2_9/. tication from hard learn- Kang:2016:DSA ing problems. Lecture Notes in Computer Sci- [KPP16] Jungho Kang, Geunil Park, ence, 6632:7–26, 2011. CO- and Jong Hyuk Park. De- DEN LNCSD9. ISSN sign of secure authen- 0302-9743 (print), 1611- tication scheme between 3349 (electronic). URL devices based on zero- http://link.springer. knowledge proofs in home com/content/pdf/10.1007/ automation service envi- 978-3-642-20465-4_3. ronments. The Jour- nal of Supercomputing,72 Khalid:2016:RHL (11):4319–4336, November 2016. CODEN JOSUED. [KPC+16] Ayesha Khalid, Goutam ISSN 0920-8542 (print), Paul, Anupam Chat- 1573-0484 (electronic). topadhyay, Faezeh Abe- diostad, Syed Imad Ud Keskinarkaus:2010:IWD Din, Muhammad Has- san, Baishik Biswas, and [KPS10] A. Keskinarkaus, A. Pramila, Prasanna Ravi. Run- and T. Sepp¨anen. Im- Stream: a high-level rapid age watermarking with a prototyping framework for directed periodic pattern stream ciphers. ACM to embed multibit mes- Transactions on Embedded sages resilient to print- Computing Systems, 15(3): scan and compound at- 61:1–61:??, July 2016. CO- tacks. The Journal of Sys- DEN ???? ISSN 1539-9087 tems and Software, 83(10): (print), 1558-3465 (elec- 1715–1725, October 2010. tronic). CODEN JSSODM. ISSN 0164-1212. Kocabas:2012:CPB Krenn:2013:CCR [KPKS12] Unal¨ Kocaba¸s, Andreas Pe- [KPW13] Stephan Krenn, Krzysztof ter, Stefan Katzenbeisser, Pietrzak, and Akshay Wa- REFERENCES 368

dia. A counterexample to Roth, and Horst Bischof. the chain rule for condi- Synergy-based learning of tional HILL entropy. Lec- facial identity. Lecture ture Notes in Computer Notes in Computer Sci- Science, 7785:23–39, 2013. ence, 7476:195–204, 2012. CODEN LNCSD9. ISSN CODEN LNCSD9. ISSN 0302-9743 (print), 1611- 0302-9743 (print), 1611- 3349 (electronic). URL 3349 (electronic). URL http://link.springer. http://link.springer. com/chapter/10.1007/978- com/chapter/10.1007/978- 3-642-36594-2_2/. 3-642-32717-9_20/. Knudsen:2011:BCC Kannan:2013:NQF [KR11] Lars R. Knudsen and Matthew J. B. Robshaw. [KRDH13] S. R. Kannan, S. Ramthi- The Block Cipher Compan- lagam, R. Devi, and ion. Information Security Yueh-Min Huang. Novel and Cryptography. Spring- quadratic fuzzy c-means al- er-Verlag, Berlin, Ger- gorithms for effective data many / Heidelberg, Ger- clustering problems. The many / London, UK / Computer Journal, 56(3): etc., 2011. ISBN 3-642- 393–406, March 2013. CO- 17341-1, 3-642-17342-X (e- DEN CMPJA6. ISSN book). ISSN 1619-7100 0010-4620 (print), 1460- (print), 2197-845X (elec- 2067 (electronic). URL tronic). xiv + 267 pp. http://comjnl.oxfordjournals. LCCN QA76.9.A25 K58 org/content/56/3/393. 2011; QA76.9.D35. full.pdf+html. Krantz:2012:EAM Krenn:2013:AWI [Kra12] Steven G. (Steven George) Krantz. Elements of ad- [Kre13] Daniel Krenn. Analysis of vanced mathematics. Chap- the width-w non-adjacent man and Hall/CRC, Boca form in conjunction with Raton, FL, USA, third edi- hyperelliptic curve cryp- tion, 2012. ISBN 1-4398- tography and with lattices. 9834-0 (hardcover). xvi + Theoretical Computer Sci- 351 pp. LCCN QA37.3 ence, 491(??):47–70, June .K73 2012. URL http: 17, 2013. CODEN TC- //marc.crcnetbase.com/ SCDI. ISSN 0304-3975 isbn/9781439898345. (print), 1879-2294 (elec- tronic). URL Kostinger:2012:SBL http:// www.sciencedirect.com/ [KRB12] Martin K¨ostinger, Peter M. science/article/pii/S0304397513002685. REFERENCES 369

K:2018:AAF Kolesnikov:2012:LPP

[KRH18] Keerthi K., Chester Re- [KS12] Vladimir Kolesnikov and beiro, and Aritra Hazra. Abdullatif Shikfa. On An algorithmic approach to the limits of privacy pro- formally verify an ECC li- vided by order-preserving brary. ACM Transactions encryption. Bell Labs Tech- on Design Automation of nical Journal, 17(3):135– Electronic Systems, 23(5): 146, December 2012. CO- 63:1–63:??, October 2018. DEN BLTJFD. ISSN CODEN ATASFO. ISSN 1089-7089 (print), 1538- 1084-4309 (print), 1557- 7305 (electronic). 7309 (electronic). Kumar:2015:RGB

Khan:2010:RCB [KS15] Sachin Kumar and Ra- jendra Kumar Sharma. [KRM+10] Zeeshan Shafi Khan, Khalid Random-grid based region Rashid, Fahad Bin Muhaya, incrementing visual se- Qutbuddin, and Aneel cret sharing. Fundamenta Rahim. Realization of call- Informaticae, 137(3):369– back authentication (CBA) 386, July 2015. CODEN for secure web to cel- FUMAAJ. ISSN 0169-2968 lular phone SMS com- (print), 1875-8681 (elec- munication. Comput- tronic). ers and Mathematics with Kalayappan:2018:PAH Applications, 60(2):198– 208, July 2010. CODEN [KS18a] Rajshekar Kalayappan and CMAPDK. ISSN 0898- Smruti R. Sarangi. Pro- 1221 (print), 1873-7668 viding accountability in (electronic). URL http:// heterogeneous systems-on- www.sciencedirect.com/ chip. ACM Transactions science/article/pii/S0898122110000118. on Embedded Computing Systems, 17(5):83:1–83:??, King:2011:BBB November 2018. CODEN ???? ISSN 1539-9087 [KS11] Valerie King and Jared (print), 1558-3465 (elec- Saia. Breaking the tronic). URL https:// O(n2) bit barrier: Scalable dl.acm.org/ft_gateway. Byzantine agreement with cfm?id=3241048. an adaptive adversary. Karthiga:2018:PSA Journal of the ACM,58 (4):18:1–18:24, July 2011. [KS18b] I Karthiga and Sharmila CODEN JACOAH. ISSN Sankar. Providing se- 0004-5411. cret authentication in clus- REFERENCES 370

tered security architecture mad Shiraz, Laleh Boroumand, for cloud-based WBAN. Abdullah Gani, and Muham- The Computer Journal, mad Khurram Khan. To- 61(2):223–232, February wards port-knocking au- 1, 2018. CODEN CM- thentication methods for PJA6. ISSN 0010-4620 mobile cloud computing. (print), 1460-2067 (elec- Journal of Network and tronic). URL http:// Computer Applications, academic.oup.com/comjnl/ 97(??):66–78, November article/61/2/223/3861967. 1, 2017. CODEN JN- CAF3. ISSN 1084-8045 Korac:2019:FMU (print), 1095-8592 (elec- [KS19] Dragan Kora´c and Dejan tronic). URL http:// Simi´c. Fishbone model www.sciencedirect.com/ and universal authentica- science/article/pii/S1084804517302813. tion framework for eval- Kiljan:2017:SAC uation of multifactor au- thentication in mobile en- [KSD+17] Sven Kiljan, Koen Simoens, vironment. Computers & Danny De Cock, Marko Security, 85(??):313–332, Van Eekelen, and Harald August 2019. CODEN Vranken. A survey of au- CPSEDU. ISSN 0167-4048 thentication and communi- (print), 1872-6208 (elec- cations security in online tronic). URL https:// banking. ACM Computing www.sciencedirect.com/ Surveys, 49(4):61:1–61:??, science/article/pii/S0167404818307375. February 2017. CODEN Kocabas:2016:ESM CMSVAN. ISSN 0360-0300 (print), 1557-7341 (elec- [KSA16] Ovunc Kocabas, Tolga tronic). Soyata, and Mehmet K. Aktas. Emerging secu- Kwon:2018:CEI rity mechanisms for medi- [KSH18a] Jihoon Kwon, Seog Chung cal cyber physical systems. Seo, and Seokhie Hong. IEEE/ACM Transactions Correction to: An efficient on Computational Biology implementation of pairing- and Bioinformatics, 13(3): based cryptography on 401–416, May 2016. CO- MSP430 processor. The DEN ITCBCY. ISSN 1545- Journal of Supercomput- 5963 (print), 1557-9964 ing, 74(5):2254, May 2018. (electronic). CODEN JOSUED. ISSN Khan:2017:TPK 0920-8542 (print), 1573- 0484 (electronic). URL [KSB+17] Suleman Khan, Muham- http://link.springer. REFERENCES 371

com/content/pdf/10.1007/ http://link.springer. s11227-018-2320-y.pdf. com/chapter/10.1007/978- See [KSH18b]. 3-642-28490-8_14/. Kwon:2018:EIP Klingler:2013:UPT

[KSH18b] Jihoon Kwon, Seog Chung [KSU13] Lee Klingler, Rainer Stein- Seo, and Seokhie Hong. wandt, and Dominique Un- An efficient implementa- ruh. On using proba- tion of pairing-based cryp- bilistic Turing machines tography on MSP430 pro- to model participants in cessor. The Journal of Su- cryptographic protocols. percomputing, 74(3):1394– Theoretical Computer Sci- 1417, March 2018. CODEN ence, 501(??):49–51, Au- JOSUED. ISSN 0920-8542 gust 27, 2013. CODEN (print), 1573-0484 (elec- TCSCDI. ISSN 0304-3975 tronic). (print), 1879-2294 (elec- tronic). URL http:// Ksiezopolski:2012:QMQ www.sciencedirect.com/ [Ksi12] Bogdan Ksiezopolski. QoP- science/article/pii/S0304397513003666. ML: Quality of protec- Kim:2012:SAH tion modelling language for cryptographic pro- [KTA12] Hyoungshick Kim, John tocols. Computers & Tang, and Ross Ander- Security, 31(4):569–596, son. Social authentication: June 2012. CODEN Harder than it looks. Lec- CPSEDU. ISSN 0167-4048 ture Notes in Computer (print), 1872-6208 (elec- Science, 7397:1–15, 2012. tronic). URL https:// CODEN LNCSD9. ISSN www.sciencedirect.com/ 0302-9743 (print), 1611- science/article/pii/S0167404812000107. 3349 (electronic). URL http://link.springer. Kim:2012:SSS com/chapter/10.1007/978- [KSSY12] Cheonshik Kim, Dongkyoo 3-642-32946-3_1/. Shin, Dongil Shin, and Khamis:2018:CCT Ching-Nung Yang. A (2, 2) secret sharing scheme [KTM+18] Mohamed Khamis, Lud- based on Hamming code wig Trotter, Ville M¨akel¨a, and AMBTC. Lecture Emanuel von Zezschwitz, Notes in Computer Sci- Jens Le, Andreas Bulling, ence, 7197:129–139, 2012. and Florian Alt. CueAuth: CODEN LNCSD9. ISSN Comparing touch, mid-air 0302-9743 (print), 1611- gestures, and gaze for cue- 3349 (electronic). URL based authentication on REFERENCES 372

situated displays. Proceed- Kobayashi:2016:ASC ings of the ACM on In- teractive, Mobile, Wearable [KTUI16] Kei Kobayashi, Yosuke and Ubiquitous Technolo- Totani, Keisuke Utsu, and gies (IMWUT), 2(4):1–22, Hiroshi Ishii. Achieving se- December 2018. CODEN cure communication over ???? ISSN 2474-9567 (elec- MANET using secret shar- tronic). URL https:// ing schemes. The Journal dl.acm.org/doi/abs/10. of Supercomputing, 72(3): 1145/3287052. 1215–1225, March 2016. CODEN JOSUED. ISSN Kalita:2019:NSM 0920-8542 (print), 1573- 0484 (electronic). URL [KTM19] Manashee Kalita, Them- http://link.springer. richon Tuithung, and com/article/10.1007/s11227- Swanirbhar Majumder. A 016-1657-3. new steganography method using integer wavelet trans- Klisowski:2012:CCP form and least significant [KU12] Michal Klisowski and Vasyl bit substitution. The Ustimenko. On the com- Computer Journal,62 parison of cryptographi- (11):1639–1655, Novem- cal properties of two dif- ber 2019. CODEN CM- ferent families of graphs PJA6. ISSN 0010-4620 with large cycle indica- (print), 1460-2067 (elec- tor. Mathematics in Com- tronic). URL http:// puter Science, 6(2):181– academic.oup.com/comjnl/ 198, June 2012. CO- article/62/11/1639/5369945. DEN ???? ISSN 1661- Kawachi:2012:SKE 8270 (print), 1661-8289 (electronic). URL http:/ [KTT12] Akinori Kawachi, Hiroto- /www.springerlink.com/ shi Takebe, and Keisuke openurl.asp?genre=article& Tanaka. Symmetric- issn=1661-8270&volume= key encryption scheme 6&issue=2&spage=181. with multi-ciphertext non- Kai:2014:FSD malleability. Lecture Notes in Computer Science, 7631: [KU14] Hiroshi Kai and Keita 123–137, 2012. CO- Ueda. Fake shares detec- DEN LNCSD9. ISSN tion on a visual secret shar- 0302-9743 (print), 1611- ing scheme by rational in- 3349 (electronic). URL terpolation. ACM Com- http://link.springer. munications in Computer com/chapter/10.1007/978- Algebra, 48(3/4):124–126, 3-642-34117-5_8/. September 2014. CODEN REFERENCES 373

???? ISSN 1932-2232 Kuznetsov:2011:APP (print), 1932-2240 (elec- tronic). [Kuz11] A. Kuznetsov. Ana- Kumagai:2010:UGS lytic proof of Pecherskii– Rogozin identity and Wiener– [Kum10] J. Kumagai. UK gets a Hopf factorization. The- space agency of its very ory of Probability and its own. IEEE Spectrum,47 Applications, 55(3):432– (2):11, February 2010. CO- 443, ???? 2011. CO- DEN IEESAM. ISSN DEN TPRBAU. ISSN 0018-9235 (print), 1939- 0040-585X (print), 1095- 9340 (electronic). 7219 (electronic). URL http://epubs.siam.org/ Kupcu:2013:DTT tvp/resource/1/tprbau/ [K¨up13] Alptekin K¨up¸c¨u. Distribut- v55/i3/p432_s1. ing trusted third parties. ACM SIGACT News,44 Kshetri:2018:BEV (2):92–112, June 2013. CO- DEN SIGNDM. ISSN [KV18] N. Kshetri and J. Voas. 0163-5700 (print), 1943- Blockchain-enabled e-voting. 5827 (electronic). IEEE Software, 35(4):95– 99, July/August 2018. CO- Kupcu:2015:OAS DEN IESOEG. ISSN 0740- [K¨up15] Alptekin K¨up¸c¨u. Offi- 7459 (print), 1937-4194 cial arbitration with se- (electronic). cure cloud storage appli- cation. The Computer Kim:2019:IED Journal, 58(4):831–852, April 2015. CODEN CM- [KV19] Jungwon Kim and Jef- PJA6. ISSN 0010-4620 frey S. Vetter. Implement- (print), 1460-2067 (elec- ing efficient data compres- tronic). URL http:// sion and encryption in a comjnl.oxfordjournals. persistent key–value store org/content/58/4/831. for HPC. The International Kushner:2013:RSS Journal of High Perfor- mance Computing Appli- [Kus13] David Kushner. The cations, 33(6):1098–1112, real story of Stuxnet. November 1, 2019. CO- IEEE Spectrum, 50(3):48– DEN IHPCFL. ISSN 1094- 53, March 2013. CODEN 3420 (print), 1741-2846 IEESAM. ISSN 0018-9235 (electronic). URL https:/ (print), 1939-9340 (elec- /journals.sagepub.com/ tronic). doi/full/10.1177/1094342019847264. REFERENCES 374

Kiljan:2018:ETA Koyama:2012:NTD

+ [KVvE18] Sven Kiljan, Harald Vranken, [KWS 12] Takuma Koyama, Lei and Marko van Eeke- Wang, Yu Sasaki, Kazuo len. Evaluation of transac- Sakiyama, and Kazuo tion authentication meth- Ohta. New truncated dif- ods for online banking. Fu- ferential cryptanalysis on ture Generation Computer 3D block cipher. Lecture Systems, 80(??):430–447, Notes in Computer Sci- March 2018. CODEN FG- ence, 7232:109–125, 2012. SEVI. ISSN 0167-739X CODEN LNCSD9. ISSN (print), 1872-7115 (elec- 0302-9743 (print), 1611- tronic). URL http:// 3349 (electronic). URL www.sciencedirect.com/ http://link.springer. science/article/pii/S0167739X16301352. com/chapter/10.1007/978- 3-642-29101-2_8/. Karpovsky:2014:DSS Kamal:2010:EIN

[KW14] M. Karpovsky and Zhen [KY10] A. A. Kamal and A. M. Wang. Design of strongly Youssef. Enhanced imple- secure communication and mentation of the NTRU- computation channels by Encrypt algorithm using nonlinear error detecting graphics cards. In Chaud- + codes. IEEE Transac- huri et al. [CGB 10], pages tions on Computers,63 168–174. ISBN 1-4244- (11):2716–2728, November 7675-5. LCCN ???? 2014. CODEN ITCOB4. Kreutz:2018:KPS ISSN 0018-9340 (print), + 1557-9956 (electronic). [KYEV 18] D. Kreutz, J. Yu, P. Esteves- Ver´ıssimo, C. Magalh˜aes, Kuo:2016:SDD and F. M. V. Ramos. The KISS principle in software- [KWH16] Wen-Chung Kuo, Chun- defined networking: A Cheng Wang, and Hong- framework for secure com- Ching Hou. Signed digit munications. IEEE Se- data hiding scheme. Infor- curity & Privacy, 16(5): mation Processing Letters, 60–70, September/October 116(2):183–191, Febru- 2018. ISSN 1540-7993 ary 2016. CODEN IF- (print), 1558-4046 (elec- PLAT. ISSN 0020-0190 tronic). (print), 1872-6119 (elec- Kuo:2018:DRA tronic). URL http:// www.sciencedirect.com/ [KYH18] Tsung-Min Kuo, Sung- science/article/pii/S0020019015001404. Ming Yen, and Meng- REFERENCES 375

Che Han. Dynamic re- Ali. Making smart cards versed accumulator. In- truly portable. IEEE Se- ternational Journal of In- curity & Privacy, 8(2):28– formation Security,17 34, March/April 2010. CO- (2):183–191, April 2018. DEN ???? ISSN 1540-7993 CODEN ???? ISSN (print), 1558-4046 (elec- 1615-5262 (print), 1615- tronic). 5270 (electronic). URL http://link.springer. Lathey:2015:IEE com/article/10.1007/s10207-[LA15] Ankita Lathey and Pradeep K. . 017-0360-6 Atrey. Image enhancement Kate:2010:PBO in encrypted domain over cloud. ACM Transactions [KZG10] Aniket Kate, Greg M. Za- on Multimedia Comput- verucha, and Ian Goldberg. ing, Communications, and Pairing-based onion rout- Applications, 11(3):38:1– ing with improved forward 38:??, January 2015. CO- secrecy. ACM Transactions DEN ???? ISSN 1551-6857 on Information and System (print), 1551-6865 (elec- Security, 13(4):29:1–29:??, tronic). December 2010. CODEN ATISBQ. ISSN 1094-9224 Lackey:2015:UHP (print), 1557-7406 (elec- tronic). [Lac15] Scott Lackey. Using hiera with puppet. Linux Jour- Kiayias:2017:EEV nal, 2015(251):1:1–1:??, [KZZ17] Aggelos Kiayias, Thomas March 2015. CODEN LI- Zacharias, and Bingsheng JOFX. ISSN 1075-3583 Zhang. An efficient E2E (print), 1938-3827 (elec- verifiable E-voting sys- tronic). URL http:// tem without setup as- dl.acm.org/ft_gateway. sumptions. IEEE Se- cfm?id=2754912. curity & Privacy, 15(3): Lallie:2014:PCM 14–23, May/June 2017. CODEN ???? ISSN [Lal14] Harjinder Singh Lallie. The 1540-7993 (print), 1558- problems and challenges of 4046 (electronic). URL managing crowd sourced https://www.computer. audio-visual evidence. Fu- org/csdl/mags/sp/2017/ ture Internet, 6(2):190– 03/msp2017030014-abs. 202, April 01, 2014. CO- html. DEN ???? ISSN 1999- Lu:2010:MSC 5903. URL https://www. mdpi.com/1999-5903/6/ [LA10] H. Karen Lu and Asad M. 2/190. REFERENCES 376

Liang:2015:SEC to detect and correct non- compliant cryptography. + [LAL 15] Kaitai Liang, Man Ho ACM SIGSOFT Software Au, Joseph K. Liu, Willy Engineering Notes, 36(6): Susilo, Duncan S. Wong, 1–7, November 2011. CO- Guomin Yang, Yong Yu, DEN SFENDP. ISSN 0163- and Anjia Yang. A secure 5948 (print), 1943-5843 and efficient Ciphertext- (electronic). Policy Attribute-Based Proxy Re-Encryption for Langley:2013:EDC cloud data sharing. Fu- [Lan13] Adam Langley. En- ture Generation Computer hancing digital certifi- Systems, 52(??):95–108, cate security. Web site., November 2015. CODEN 2013. URL http:// FGSEVI. ISSN 0167-739X googleonlinesecurity. (print), 1872-7115 (elec- blogspot.com/2013/01/ tronic). URL http:// enhancing-digital-certificate- www.sciencedirect.com/ security.html. science/article/pii/S0167739X14002507. Landau:2017:LCI Lamonica:2013:LDQ [Lan17] Susan Landau. Listening [Lam13] M. Lamonica. Long- in: Cybersecurity in an in- distance quantum cryptog- secure age. Yale Univer- raphy [news]. IEEE Spec- sity Press, New Haven, CT, trum, 50(8):12–13, August USA, 2017. ISBN 0-300- 2013. CODEN IEESAM. 22744-2 (hardcover). xiv + ISSN 0018-9235 (print), 221 pp. LCCN K3264.C65 1939-9340 (electronic). L38 2017? Landau:2010:SSR Lopez-Alt:2017:MFH [Lan10] Susan Eva Landau. Surveil- [LATV17] Adriana L´opez-Alt, Eran lance or security?: The Tromer, and Vinod Vaikun- risks posed by new wire- tanathan. Multikey fully tapping technologies. MIT homomorphic encryption Press, Cambridge, MA, and applications. SIAM USA, 2010. ISBN 0-262- Journal on Computing,46 01530-7 (hardcover),0-262- (6):1827–1892, ???? 2017. 29558-X (e-book). xvi + CODEN SMJCAT. ISSN 383 pp. LCCN TK5102.85 0097-5397 (print), 1095- .L36 2010. 7111 (electronic). Langsworth:2011:USA Launchbury:2012:TBC [Lan11] Anthony Langsworth. Us- [Lau12] John Launchbury. Theorem- ing static analysis tools based circuit derivation REFERENCES 377

in Cryptol. ACM SIG- Loreti:2018:PAB PLAN Notices, 47(3):185– 186, March 2012. CODEN [LBC18] Pierpaolo Loreti, Lorenzo SINODQ. ISSN 0362-1340 Bracciale, and Alberto (print), 1523-2867 (print), Caponi. Push attack: 1558-1160 (electronic). Binding virtual and real identities using mobile Lauter:2017:POL push notifications. Future Internet, 10(2):13, Jan- [Lau17] Kristin Lauter. Postquan- uary 31, 2018. CODEN tum opportunities: Lat- ???? ISSN 1999-5903. tices, homomorphic en- URL https://www.mdpi. cryption, and supersingu- com/1999-5903/10/2/13. lar isogeny graphs. IEEE Luo:2012:ESI Security & Privacy, 15(4): 22–27, July/August 2017. [LBOX12] Jianqiang Luo, Kevin D. CODEN ???? ISSN Bowers, Alina Oprea, and 1540-7993 (print), 1558- Lihao Xu. Efficient soft- 4046 (electronic). URL ware implementations of n https://www.computer. large finite fields GF(2 ) org/csdl/mags/sp/2017/ for secure storage applica- 04/msp2017040022-abs. tions. ACM Transactions html. on Storage, 8(1):2:1–2:??, February 2012. CODEN Lazarus:2015:RE ???? ISSN 1553-3077 (print), 1553-3093 (elec- [Laz15] M. Lazarus. Radar every- tronic). where. IEEE Spectrum,52 Lupu:2012:IBK (2):52–59, February 2015. CODEN IEESAM. ISSN [LBR12] Radu Lupu, Eugen Bor- 0018-9235 (print), 1939- coci, and Tinku Rasheed. 9340 (electronic). Identity-based key deriva- tion method for low de- Liu:2013:PAE lay inter-domain han- dover re-authentication [LB13] Bin Liu and Bevan M. service. Lecture Notes in Baas. Parallel AES encryp- Computer Science, 7161: tion engines for many-core 162–175, 2012. CO- processor arrays. IEEE DEN LNCSD9. ISSN Transactions on Comput- 0302-9743 (print), 1611- ers, 62(3):536–547, March 3349 (electronic). URL 2013. CODEN ITCOB4. http://link.springer. ISSN 0018-9340 (print), com/chapter/10.1007/978- 1557-9956 (electronic). 3-642-29615-4_12/. REFERENCES 378

Lu:2013:CSA (print), 1872-7115 (elec- tronic). URL http:// [LC13] Linzhen Lu and Shaozhen www.sciencedirect.com/ Chen. A compress slide science/article/pii/S0167739X1730986X. attack on the full GOST block cipher. Informa- Liu:2013:IAG tion Processing Letters, [LCCJ13] Yining Liu, Chi Cheng, 113(17):634–639, August Jianyu Cao, and Tao Jiang. 30, 2013. CODEN IF- An improved authenticated PLAT. ISSN 0020-0190 group key transfer proto- (print), 1872-6119 (elec- col based on secret shar- tronic). URL http:// ing. IEEE Transactions on www.sciencedirect.com/ Computers, 62(11):2335– science/article/pii/S0020019013001543. 2336, November 2013. CO- Liu:2015:IAC DEN ITCOB4. ISSN 0018- 9340 (print), 1557-9956 [LC15] Qingzhong Liu and Zhongxue (electronic). Chen. Improved ap- Liu:2015:IEP proaches with calibrated neighboring joint density [LCDP15] H. Liu, L. Chen, Z. Davar, to steganalysis and seam- and M. R. Pour. Insecu- carved forgery detection rity of an efficient privacy- in JPEG images. ACM preserving public audit- Transactions on Intelli- ing scheme for cloud data gent Systems and Tech- storage. J.UCS: Jour- nology (TIST), 5(4):63:1– nal of Universal Com- 63:??, January 2015. CO- puter Science, 21(3):473– DEN ???? ISSN 2157-6904 ??, ???? 2015. CO- (print), 2157-6912 (elec- DEN ???? ISSN 0948- tronic). 695X (print), 0948-6968 (electronic). URL http:/ Laxmi:2017:GGS /www.jucs.org/jucs_21_ [LC17] B. Prathusha Laxmi and 3/insecurity_of_an_efficient. A. Chilambuchelvan. GSR: Lathrop:2011:SPI Geographic Secured Rout- ing using SHA-3 algorithm [LCK11] Scott Lathrop, Jim Costa, for node and message au- and William Kramer, ed- thentication in wireless itors. SC’11: Proceed- sensor networks. Fu- ings of 2011 International ture Generation Computer Conference for High Per- Systems, 76(??):98–105, formance Computing, Net- November 2017. CODEN working, Storage and Anal- FGSEVI. ISSN 0167-739X ysis, Seattle, WA, Novem- REFERENCES 379

ber 12–18 2011.ACM Choi, Dong Hoon Lee, Press and IEEE Computer Jong Hwan Park, and Society Press, New York, Moti Yung. Self-updatable NY 10036, USA and 1109 encryption: Time con- Spring Street, Suite 300, strained access control Silver Spring, MD 20910, with hidden attributes and USA, 2011. ISBN 1-4503- better efficiency. The- 0771-X. LCCN ???? oretical Computer Sci- Lavington:2012:ATH ence, 667(??):51–92, March 8, 2017. CODEN TC- [LCKBJ12] S. H. (Simon Hugh) Lav- SCDI. ISSN 0304-3975 ington, Martin Campbell- (print), 1879-2294 (elec- Kelly, Christopher P. Bur- tronic). URL http:// ton, and Roger Johnson, www.sciencedirect.com/ editors. Alan Turing and science/article/pii/S0304397516307551. his contemporaries: build- ing the world’s first com- Liu:2017:GAU puters. British Computer Society, London, UK, 2012. [LCL17b] Can Liu, Gradeigh D. ISBN 1-906124-90-6 (pa- Clark, and Janne Lindqvist. perback), 1-78017-105-6 Guessing attacks on user- (PDF e-book), 1-78017- generated gesture pass- 106-4 (ePub e-book), 1- words. Proceedings of 78017-107-2 (Kindle e- the ACM on Interac- book). xiv + 111 pp. tive, Mobile, Wearable LCCN QA76.17 .A423 and Ubiquitous Technolo- 2012. UK£11.69. gies (IMWUT), 1(1):3:1– 3:24, March 2017. CO- Li:2015:NAC DEN ???? ISSN 2474- [LCL+15] Jin Li, Xiaofeng Chen, 9567. URL http://dl. Jingwei Li, Chunfu Jia, acm.org/citation.cfm? Jianfeng Ma, and Wenjing id=3053331. Lou. New access con- Li:2015:CEH trol systems based on out- sourced attribute-based en- [LCLL15] Chen Li, Le Chen, Rongx- cryption. Journal of Com- ing Lu, and Hui Li. Com- puter Security, 23(6):659– ment on “An Efficient 683, ???? 2015. CODEN Homomorphic MAC with JCSIET. ISSN 0926-227X Small for Authen- (print), 1875-8924 (elec- tication in Network Cod- tronic). ing”. IEEE Transactions Lee:2017:SUE on Computers, 64(3):882– 883, March 2015. CODEN [LCL+17a] Kwangsu Lee, Seung Geol ITCOB4. ISSN 0018-9340 REFERENCES 380

(print), 1557-9956 (elec- 1–23, March 2018. CODEN tronic). See [CJ13]. ???? ISSN 2474-9567 (elec- tronic). URL https:// Li:2017:RNF dl.acm.org/doi/abs/10. [LCLW17] Yang Li, Mengting Chen, 1145/3191751. Zhe Liu, and Jian Wang. Liang:2014:CCS Reduction in the number of fault injections for blind [LCT+14] Kaitai Liang, Cheng-Kang fault attack on SPN block Chu, Xiao Tan, Dun- ciphers. ACM Transactions can S. Wong, Chun- on Embedded Computing ming Tang, and Jianying Systems, 16(2):55:1–55:??, Zhou. Chosen-ciphertext April 2017. CODEN ???? secure multi-hop identity- ISSN 1539-9087 (print), based conditional proxy re- 1558-3465 (electronic). encryption with constant- size ciphertexts. The- Li:2017:CCF oretical Computer Sci- [LCM+17] Jenny S. Li, Li-Chiou ence, 539(??):87–105, June Chen, John V. Monaco, 19, 2014. CODEN TC- Pranjal Singh, and Charles C. SCDI. ISSN 0304-3975 Tappert. A comparison (print), 1879-2294 (elec- of classifiers and features tronic). URL http:// for authorship authenti- www.sciencedirect.com/ cation of social network- science/article/pii/S0304397514003326. ing messages. Concurrency Liu:2016:EQD and Computation: Practice and Experience, 29(14), [LCW+16] Yang Liu, Zhu Cao, Cheng July 25, 2017. CODEN Wu, Daiji Fukuda, Lix- CCPEBO. ISSN 1532-0626 ing You, Jiaqiang Zhong, (print), 1532-0634 (elec- Takayuki Numata, Si- tronic). jing Chen, Weijun Zhang, Liu:2018:VRU Sheng-Cai Shi, Chao-Yang Lu, Zhen Wang, Xiongfeng [LCR+18] Rui Liu, Cory Cornelius, Ma, Jingyun Fan, Qiang Reza Rawassizadeh, Ronald Zhang, and Jian-Wei Pan. Peterson, and David Kotz. Experimental quantum Vocal resonance: Using in- data locking. Physical Re- ternal body voice for wear- view A (Atomic, Molecu- able authentication. Pro- lar, and Optical Physics), ceedings of the ACM on 94(2):020301, August 2016. Interactive, Mobile, Wear- CODEN PLRAAN. ISSN able and Ubiquitous Tech- 1050-2947 (print), 1094- nologies (IMWUT), 2(1): 1622, 1538-4446, 1538- REFERENCES 381

4519. URL http:/ tion for service-based busi- /link.aps.org/doi/10. ness ecosystems. The Com- 1103/PhysRevA.94.020301. puter Journal, 58(4):709– 723, April 2015. CODEN Liu:2016:NOP CMPJA6. ISSN 0010-4620 (print), 1460-2067 (elec- [LCY+16] Zheli Liu, Xiaofeng Chen, tronic). URL Jun Yang, Chunfu Jia, http:// and Ilsun You. New comjnl.oxfordjournals. . order preserving encryp- org/content/58/4/709 tion model for outsourced Lasc:2013:DDA databases in cloud environ- ments. Journal of Net- [LDC13] Ioana Lasc, Reiner Do- work and Computer Ap- jen, and Tom Coffey. On plications, 59(??):198–207, the detection of desynchro- January 2016. CODEN nisation attacks against JNCAF3. ISSN 1084-8045 security protocols that (print), 1095-8592 (elec- use dynamic shared se- tronic). URL http:// crets. Computers & www.sciencedirect.com/ Security, 32(??):115–129, science/article/pii/S1084804514001350. February 2013. CODEN CPSEDU. ISSN 0167-4048 Louchene:2013:WMR (print), 1872-6208 (elec- tronic). URL https:// [LD13] Ahmed Louchene and Am- www.sciencedirect.com/ mar Dahmani. Water- science/article/pii/S0167404812001678. marking method resilient to RST and compression Launchbury:2012:ELT based on DWT, LPM and phase correlation. Inter- [LDDAM12] John Launchbury, Iavor S. national Journal of Com- Diatchki, Thomas DuBuis- puter Applications, 35(1): son, and Andy Adams- 36–43, 2013. ISSN 1206- Moran. Efficient lookup- 212X (print), 1925-7074 table protocol in secure (electronic). URL https: multiparty computation. //www.tandfonline.com/ ACM SIGPLAN Notices, doi/full/10.2316/Journal. 47(9):189–200, September 202.2013.1.202-3503. 2012. CODEN SINODQ. ISSN 0362-1340 (print), Lotz:2015:SCS 1523-2867 (print), 1558- [LDB+15] Volkmar Lotz, Francesco 1160 (electronic). Di Cerbo, Michele Bezzi, Li:2014:PSC Samuel Paul Kaluvuri, An- tonino Sabetta, and Slim [LDZ+14] Jiguo Li, Haiting Du, Trabelsi. Security certifica- Yichen Zhang, Tao Li, and REFERENCES 382

Yuexin Zhang. Provably se- view of: The Mathemat- cure certificate-based key- ics of Encryption: An insulated signature scheme. Elementary Introduction Concurrency and Compu- by Margaret Cozzens and tation: Practice and Ex- Steven J. Miller. ACM perience, 26(8):1546–1560, SIGACT News, 47(3):19– June 10, 2014. CODEN 21, September 2016. CO- CCPEBO. ISSN 1532-0626 DEN SIGNDM. ISSN (print), 1532-0634 (elec- 0163-5700 (print), 1943- tronic). 5827 (electronic). Li:2016:CBK Lewand:2010:PC

[LDZ16] Jiguo Li, Haiting Du, and [Lew10] Robert Edward Lewand. Yichen Zhang. Certificate- The perfect cipher. The based key-insulated sig- Mathematical Gazette,94 nature in the standard (531):401–411, November model. The Computer 2010. CODEN MAGAAS. Journal, 59(7):1028–1039, ISSN 0025-5572. July 2016. CODEN CM- Liu:2019:DVP PJA6. ISSN 0010-4620 [LEW19] Y. Liu, M. F. Ezerman, (print), 1460-2067 (elec- and H. Wang. Double tronic). URL http:// verification protocol via comjnl.oxfordjournals. secret sharing for low- org/content/59/7/1028. cost RFID tags. Future Liu:2019:TTR Generation Computer Sys- tems, 90(??):118–128, Jan- [LDZW19] Zhenhua Liu, Shuhong uary 2019. CODEN FG- Duan, Peilin Zhou, and SEVI. ISSN 0167-739X Baocang Wang. Traceable- (print), 1872-7115 (elec- then-revocable ciphertext- tronic). URL http:// policy attribute-based en- www.sciencedirect.com/ cryption scheme. Fu- science/article/pii/S0167739X17323518. ture Generation Computer Systems, 93(??):903–913, Lago-Fernandez:2014:NAA April 2019. CODEN FG- [LFGCGCRP14] J. Lago-Fern´andez, F. Gil- SEVI. ISSN 0167-739X Casti˜neira, F. J. Gonz´alez- (print), 1872-7115 (elec- Casta˜no, and A. Rom´an- tronic). URL https:// Portabales. A new ap- www.sciencedirect.com/ proach to authenticating science/article/pii/S0167739X17320964. and encrypting Voice over Ledin:2016:RME Internet Protocol commu- nications. Software—Prac- [Led16] George Ledin, Jr. Re- tice and Experience, 44(5): REFERENCES 383

593–619, May 2014. CO- 259–266, March 2016. CO- DEN SPEXBL. ISSN 0038- DEN IFPLAT. ISSN 0020- 0644 (print), 1097-024X 0190 (print), 1872-6119 (electronic). (electronic). URL http:// www.sciencedirect.com/ Leung:2018:TTA science/article/pii/S0020019015001891. [LFH18] Ho-Man Colman Leung, Liang:2015:CPA Chi-Wing Fu, and Pheng- Ann Heng. TwistIn: [LFWS15] Kaitai Liang, Liming Fang, Tangible authentication of Duncan S. Wong, and smart devices via mo- Willy Susilo. A ciphertext- tion co-analysis with a policy attribute-based proxy smartwatch. Proceedings re-encryption scheme for of the ACM on Inter- data sharing in public active, Mobile, Wearable clouds. Concurrency and and Ubiquitous Technolo- Computation: Practice and gies (IMWUT), 2(2):1– Experience, 27(8):2004– 24, July 2018. CODEN 2027, June 10, 2015. CO- ???? ISSN 2474-9567 (elec- DEN CCPEBO. ISSN tronic). URL https:// 1532-0626 (print), 1532- dl.acm.org/doi/abs/10. 0634 (electronic). 1145/3214275. Li:2018:CIC Luo:2019:SCT [LFX+18] M. Li, H. Fan, Y. Xi- [LFK19] Chao Luo, Yunsi Fei, and ang, Y. Li, and Y. Zhang. David Kaeli. Side-channel Cryptanalysis and im- timing attack of RSA on a provement of a chaotic im- GPU. ACM Transactions age encryption by first- on Architecture and Code order time-delay system. Optimization, 16(3):32:1– IEEE MultiMedia, 25(3): 32:??, August 2019. CO- 92–101, July/September DEN ???? ISSN 1544-3566 2018. CODEN IEMUE4. (print), 1544-3973 (elec- ISSN 1070-986x (print), tronic). URL https:// 1941-0166 (electronic). dl.acm.org/ft_gateway. cfm?id=3341729. Li:2017:PCL Liu:2016:LCR [LFZ+17] Cong Li, Yuejian Fang, [LFW+16] Yu Liu, Kai Fu, Wei Wang, Xing Zhang, Cancan Jin, Ling Sun, and Meiqin Qingni Shen, and Zhonghai Wang. Linear crypt- Wu. A practical construc- analysis of reduced-round tion for large universe hi- SPECK. Information Pro- erarchical attribute-based cessing Letters, 116(3): encryption. Concurrency REFERENCES 384

and Computation: Prac- IEEE Transactions on tice and Experience,29 Computers, 66(5):773–785, (17), September 10, 2017. May 2017. CODEN IT- CODEN CCPEBO. ISSN COB4. ISSN 0018-9340 1532-0626 (print), 1532- (print), 1557-9956 (elec- 0634 (electronic). tronic). Lekkas:2010:PMT Lan:2010:RNG

[LG10] Dimitrios Lekkas and Dim- [LGKY10] Jingjing Lan, Wang Ling itris Gritzalis. e-Passports Goh, Zhi Hui Kong, and as a means towards a Glob- Kiat Seng Yeo. A random ally Interoperable Public number generator for low Key Infrastructure. Jour- power cryptographic appli- nal of Computer Security, cation. In 2010 Interna- 18(3):379–396, ???? 2010. tional SoC Design Confer- CODEN JCSIET. ISSN ence (ISOCC), pages 328– 0926-227X (print), 1875- 331. IEEE Computer So- 8924 (electronic). ciety Press, 1109 Spring Street, Suite 300, Sil- Lancrenon:2012:IPI ver Spring, MD 20910, USA, 2010. URL http: [LG12] Jean Lancrenon and Roland //ieeexplore.ieee.org/ Gillard. Isolating par- stamp/stamp.jsp?tp=&arnumber= tial information of indistin- 5682906. guishable encryptions. Lec- ture Notes in Computer Li:2012:FDM Science, 7163:34–48, 2012. [LGL+12] Wei Li, Dawu Gu, Zhiqiang CODEN LNCSD9. ISSN Liu, Ya Liu, and Xi- 0302-9743 (print), 1611- aohu Huang. Fault de- 3349 (electronic). URL tection of the MacGuf- http://link.springer. fin Cipher against differen- com/chapter/10.1007/978- tial fault attack. Lecture 3-642-29804-2_3/. Notes in Computer Sci- Liu:2017:ECC ence, 7222:102–112, 2012. CODEN LNCSD9. ISSN [LGH+17] Z. Liu, J. Großsch¨adl, 0302-9743 (print), 1611- Z. Hu, K. J¨arvinen, 3349 (electronic). URL H. Wang, and I. Ver- http://link.springer. bauwhede. Elliptic curve com/chapter/10.1007/978- cryptography with effi- 3-642-32298-3_7/. ciently computable endo- Lee:2017:FFE morphisms and its hard- ware implementations for [LGLK17] Junghee Lee, Kalidas the Internet of Things. Ganesh, Hyuk-Jun Lee, REFERENCES 385

and Youngjae Kim. FESSD: Phan. Terabit encryp- A fast encrypted SSD tion in a second: Perfor- employing on-chip access- mance evaluation of block control memory. IEEE ciphers in GPU with Ke- Computer Architecture Let- pler, Maxwell, and Pascal ters, 16(2):115–118, July/ architectures. Concurrency December 2017. CODEN and Computation: Practice ???? ISSN 1556-6056 and Experience, 31(11): (print), 1556-6064 (elec- e5048:1–e5048:??, June 10, tronic). 2019. CODEN CCPEBO. ISSN 1532-0626 (print), Liu:2012:LFA 1532-0634 (electronic). [LGLL12] Zhiqiang Liu, Dawu Gu, Lopez-Garcia:2014:PBB Ya Liu, and Wei Li. Linear fault analysis of [LGPRH14] Lourdes L´opez-Garc´ıa, Luis block ciphers. Lecture J. Dominguez Perez, and Notes in Computer Sci- Francisco Rodr´ıguez-Henr´ıquez. ence, 7341:241–256, 2012. A pairing-based blind sig- CODEN LNCSD9. ISSN nature e-voting scheme. 0302-9743 (print), 1611- The Computer Journal, 3349 (electronic). URL 57(10):1460–1471, Octo- http://link.springer. ber 2014. CODEN CM- com/chapter/10.1007/978- PJA6. ISSN 0010-4620 3-642-31284-7_15/. (print), 1460-2067 (elec- tronic). URL http:// Labati:2016:BRA comjnl.oxfordjournals. [LGM+16] Ruggero Donida Labati, org/content/57/10/1460. Angelo Genovese, Enrique Li:2014:SCA Mu˜noz, Vincenzo Piuri, Fabio Scotti, and Gian- [LGR14] Peng Li, Debin Gao, and luca Sforza. Biometric Michael K. Reiter. Stop- recognition in automated Watch: a cloud architec- border control: a sur- ture for timing channel vey. ACM Computing mitigation. ACM Transac- Surveys, 49(2):24:1–24:??, tions on Information and September 2016. CODEN System Security, 17(2):8:1– CMSVAN. ISSN 0360-0300 8:??, November 2014. CO- (print), 1557-7341 (elec- DEN ATISBQ. ISSN tronic). 1094-9224 (print), 1557- 7406 (electronic). Lee:2019:TES Liu:2012:FVC [LGP19] Wai-Kong Lee, Bok-Min Goi, and Raphael C.-W. [LGWY12] Feng Liu, Teng Guo, REFERENCES 386

ChuanKun Wu, and Ching- Li:2010:EBB Nung Yang. Flexible vi- sual cryptography scheme [LH10c] Chun-Ta Li and Min- without distortion. Lecture Shiang Hwang. An effi- Notes in Computer Sci- cient biometrics-based re- ence, 7128:211–227, 2012. mote user authentication CODEN LNCSD9. ISSN scheme using smart cards. 0302-9743 (print), 1611- Journal of Network and 3349 (electronic). URL Computer Applications,33 http://link.springer. (1):1–5, January 2010. CO- com/chapter/10.1007/978- DEN JNCAF3. ISSN 1084- 3-642-32205-1_18/. 8045 (print), 1095-8592 (electronic). URL http:// Lee:2010:ISC www.sciencedirect.com/ [LH10a] Donghoon Lee and Seokhie science/article/pii/S1084804509001192. Hong, editors. Informa- Lee:2011:IMS tion, security and cryptol- ogy – ICISC 2009: 12th [LH11a] Jung-San Lee and Ming- international conference, Huang Hsieh. An in- Seoul, Korea, December 2– teractive mobile SMS 4, 2009, revised selected confirmation method us- papers, volume 5984 of ing secret sharing tech- Lecture notes in computer nique. Computers & science. Springer-Verlag, Security, 30(8):830–839, Berlin, Germany / Heidel- November 2011. CODEN berg, Germany / London, CPSEDU. ISSN 0167-4048 UK / etc., 2010. ISBN (print), 1872-6208 (elec- 3-642-14422-5 (softcover). tronic). URL https:// LCCN ???? www.sciencedirect.com/ science/article/pii/S0167404811000836. Lee:2010:CGC Lee:2011:PSE [LH10b] Moon Sung Lee and Sang Geun Hahn. Crypt- [LH11b] Tian-Fu Lee and Tzonelih analysis of the GGH cryp- Hwang. Provably se- tosystem. Mathematics in cure and efficient authen- Computer Science, 3(2): tication techniques for 201–208, April 2010. CO- the global mobility net- DEN ???? ISSN 1661- work. The Journal of 8270 (print), 1661-8289 Systems and Software, (electronic). URL http:/ 84(10):1717–1725, Octo- /www.springerlink.com/ ber 2011. CODEN JS- openurl.asp?genre=article& SODM. ISSN 0164-1212 issn=1661-8270&volume= (print), 1873-1228 (elec- 3&issue=2&spage=201. tronic). URL http:// REFERENCES 387

www.sciencedirect.com/ (electronic). URL http:// science/article/pii/S0164121211001099. www.sciencedirect.com/ science/article/pii/S0167739X12000829. Lin:2011:NIB Li:2014:ARM [LH11c] Han-Yu Lin and Chien- Lung Hsu. A novel [LH14] Cai Li and Jiankun Hu. At- identity-based key-insulated tacks via record multiplic- convertible authenticated ity on cancelable biomet- encryption scheme. Inter- rics templates. Concur- national Journal of Foun- rency and Computation: dations of Computer Sci- Practice and Experience, ence (IJFCS), 22(3):739– 26(8):1593–1605, June 10, 756, April 2011. CODEN 2014. CODEN CCPEBO. IFCSEN. ISSN 0129-0541 ISSN 1532-0626 (print), (print), 1793-6373 (elec- 1532-0634 (electronic). tronic). Lenstra:2012:RWW Lertvorratham:2012:ISM [LHA+12] Arjen K. Lenstra, James P. [LH12] Supachote Lertvorratham Hughes, Maxime Augier, and Pipat Hiranvanichakorn. Joppe W. Bos, Thorsten Integrating secure multi- Kleinjung, and Christophe path mobile ad hoc net- Wachter. Ron was wrong, work with self-authentication Whit is right. Re- strategy. International port, EPFL IC LACAL, Journal of Computer Ap- Lausanne, Switzerland, plications, 34(3):174–184, February 14, 2012. 16 2012. ISSN 1206-212X pp. URL http://eprint. (print), 1925-7074 (elec- iacr.org/2012/064. tronic). URL https: //www.tandfonline.com/ Lum:2016:QEM doi/full/10.2316/Journal. + 202.2012.3.202-3245. [LHA 16] Daniel J. Lum, John C. Howell, M. S. Allman, Liao:2013:NMS Thomas Gerrits, Varun B. [LH13] Yi-Pin Liao and Chih-Ming Verma, Sae Woo Nam, Hsiao. A novel multi-server Cosmo Lupo, and Seth remote user authentication Lloyd. Quantum enigma scheme using self-certified machine: Experimentally public keys for mobile demonstrating quantum clients. Future Generation data locking. Physical Re- Computer Systems, 29(3): view A (Atomic, Molecu- 886–900, March 2013. CO- lar, and Optical Physics), DEN FGSEVI. ISSN 0167- 94(2):022315, August 2016. 739X (print), 1872-7115 CODEN PLRAAN. ISSN REFERENCES 388

1050-2947 (print), 1094- mutual authentication with 1622, 1538-4446, 1538- fine-grained access con- 4519. URL http:/ trol system for industry /link.aps.org/doi/10. 4.0. Journal of Network 1103/PhysRevA.94.022315. and Computer Applica- tions, 116(??):42–52, Au- Li:2012:BVS gust 15, 2018. CODEN [LHF12] Long-Hai Li, Cheng-Qiang JNCAF3. ISSN 1084-8045 Huang, and Shao-Feng Fu. (print), 1095-8592 (elec- Boardroom voting scheme tronic). URL http:// with unconditionally se- www.sciencedirect.com/ cret ballots based on DC- science/article/pii/S1084804518301619. Net. Lecture Notes in Li:2010:AIS Computer Science, 7645: 220–232, 2012. CO- [LHKR10] Feifei Li, Marios Hadjieleft- DEN LNCSD9. ISSN heriou, George Kollios, and 0302-9743 (print), 1611- Leonid Reyzin. Authenti- 3349 (electronic). URL cated index structures for http://link.springer. aggregation queries. ACM com/chapter/10.1007/978- Transactions on Informa- 3-642-34601-9_17/. tion and System Secu- rity, 13(4):32:1–32:??, De- Lin:2011:ICA cember 2010. CODEN [LHH11] Han-Yu Lin, Chien-Lung ATISBQ. ISSN 1094-9224 Hsu, and Shih-Kun Huang. (print), 1557-7406 (elec- Improved convertible au- tronic). thenticated encryption scheme Li:2014:SOA with provable security. In- formation Processing Let- [LHL+14] Jin Li, Xinyi Huang, Jing- ters, 111(13):661–666, July wei Li, Xiaofeng Chen, and 1, 2011. CODEN IF- Yang Xiang. Securely out- PLAT. ISSN 0020-0190 sourcing attribute-based (print), 1872-6119 (elec- encryption with checkabil- tronic). URL http:// ity. IEEE Transactions www.sciencedirect.com/ on Parallel and Distributed science/article/pii/S0020019011000846. Systems, 25(8):2201–2210, August 2014. CODEN Lin:2018:BBB ITDSEO. ISSN 1045-9219 [LHH+18] Chao Lin, Debiao He, (print), 1558-2183 (elec- Xinyi Huang, Kim-Kwang Ray- tronic). mond Choo, and Athana- Liu:2015:SSP sios V. Vasilakos. BSeIn: a blockchain-based secure [LHL15] Jianghua Liu, Xinyi Huang, REFERENCES 389

and Joseph K. Liu. Secure Lerch-Hostalot:2013:LMS sharing of Personal Health Records in cloud com- [LHM13] Daniel Lerch-Hostalot and puting: Ciphertext-Policy David Meg´ıas. LSB match- Attribute-Based Signcryp- ing steganalysis based on tion. Future Genera- patterns of pixel differ- tion Computer Systems, ences and random em- 52(??):67–76, November bedding. Computers & 2015. CODEN FG- Security, 32(??):192–206, SEVI. ISSN 0167-739X February 2013. CODEN (print), 1872-7115 (elec- CPSEDU. ISSN 0167-4048 tronic). URL http:// (print), 1872-6208 (elec- www.sciencedirect.com/ tronic). URL https:// science/article/pii/S0167739X14002076. www.sciencedirect.com/ science/article/pii/S0167404812001745. Li:2018:OPP Lian:2014:SSA [LHL+18] Tong Li, Zhengan Huang, Ping Li, Zheli Liu, and [LHM14] Yanling Lian, Xinyi Huang, Chunfu Jia. Outsourced and Yi Mu. SA3: Self- privacy-preserving classi- adaptive anonymous au- fication service over en- thentication for dynamic crypted data. Journal authentication policies. Fu- of Network and Computer ture Generation Computer Applications, 106(??):100– Systems, 30(??):133–139, 110, March 15, 2018. CO- January 2014. CODEN DEN JNCAF3. ISSN 1084- FGSEVI. ISSN 0167-739X 8045 (print), 1095-8592 (print), 1872-7115 (elec- (electronic). URL http:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S1084804517304356. science/article/pii/S0167739X13001210.

Li:2010:CCB Lin:2015:CND

[LHM+10] Jiguo Li, Xinyi Huang, [LHM+15] Hui Lin, Jia Hu, Jianfeng Yi Mu, Willy Susilo, and Ma, Li Xu, and Li Yang. Qianhong Wu. Construc- CRM: a new dynamic tions of certificate-based cross-layer reputation com- signature secure against putation model in wire- key replacement attacks. less networks. The Com- Journal of Computer Se- puter Journal, 58(4):656– curity, 18(3):421–449, ???? 667, April 2015. CODEN 2010. CODEN JCSIET. CMPJA6. ISSN 0010-4620 ISSN 0926-227X (print), (print), 1460-2067 (elec- 1875-8924 (electronic). tronic). URL http:// REFERENCES 390

comjnl.oxfordjournals. Ibrahim, Saru Kumari, org/content/58/4/656. Arun Kumar Sangaiah, Vidushi Gupta, and Kim- Liu:2018:HMS Kwang Raymond Choo. [LHW18] Jianqiang Liu, Shuai Huo, Anonymous mutual au- and Yi Wang. A hierarchi- thentication and key agree- cal mapping system for flat ment scheme for wear- identifier to locator resolu- able sensors in wireless tion based on active degree. body area networks. Com- Future Internet, 10(8):75, puter Networks (Amster- August 08, 2018. CODEN dam, Netherlands: 1999), ???? ISSN 1999-5903. 129 (part 2)(??):429–443, URL https://www.mdpi. December 24, 2017. CO- com/1999-5903/10/8/75. DEN ???? ISSN 1389-1286 (print), 1872-7069 (elec- Liu:2012:ESS tronic). URL http:// [LHYZ12] Yan-Xiao Liu, Lein Harn, www.sciencedirect.com/ . Ching-Nung Yang, and science/article/pii/S1389128617301044 Yu-Qing Zhang. Effi- Lim:2011:NAN cient (n, t, n) secret shar- ing schemes. The Jour- [Lim11] Chae Hoon Lim. A note nal of Systems and Soft- on the average number of ware, 85(6):1325–1332, RSA fixed points. The- June 2012. CODEN JS- oretical Computer Science, SODM. ISSN 0164-1212 412(35):4729–4737, August (print), 1873-1228 (elec- 12, 2011. CODEN TC- tronic). URL http:// SCDI. ISSN 0304-3975 www.sciencedirect.com/ (print), 1879-2294 (elec- science/article/pii/S0164121212000234. tronic).

Li:2010:PAP Lin:2014:IVW

[Li10] Mengdong Li. Preimage [Lin14a] Pei-Yu Lin. Impercepti- awareness proofs of two ble visible watermarking compression functions. In based on postcamera his- Yang [Yan10], pages 660– togram operation. The 664. ISBN 1-4244-6942- Journal of Systems and 2. LCCN QA76.9.A25. Software, 95(??):194–208, URL http://ieeexplore. September 2014. CODEN ieee.org/servlet/opac? JSSODM. ISSN 0164-1212 punumber=5680738. (print), 1873-1228 (elec- Li:2017:AMA tronic). URL http:// www.sciencedirect.com/ [LIK+17] Xiong Li, Maged Hamada science/article/pii/S0164121214001071. REFERENCES 391

Lindell:2014:TCT Berlin, Germany / Heidel- berg, Germany / London, [Lin14b] Yehuda Lindell, editor. UK / etc., 2017. ISBN 3- Theory of cryptography: 319-57047-1, 3-319-57048- 11th Theory of Cryptog- X (e-book). ISSN 1619- raphy Conference, TCC 7100 (print), 2197-845X 2014, San Diego, CA, (electronic). xv + 450 USA, February 24–26, pp. LCCN QA76.9.A25 2014 proceedings, volume T84 2017. URL http:/ 8349 of Lecture Notes in /www.springerlink.com/ Computer Science. Spring- content/978-3-319-57048- er-Verlag, Berlin, Ger- 8. many / Heidelberg, Ger- many / London, UK / Litton:2014:TFA etc., 2014. ISBN 3-642- [Lit14] James Litton. Two-factor 54241-7 (paperback), 3- authentication system for 642-54242-5 (ebk.). ISSN Apache and SSH. Linux 0302-9743 (print), 1611- Journal, 2014(239):4:1– 3349 (electronic). LCCN 4:??, March 2014. CODEN QA76.9.A25 T473 2014. LIJOFX. ISSN 1075-3583 URL http://www.springerlink. (print), 1938-3827 (elec- com/content/978-3-642- tronic). 54242-8. Lin:2015:DVS Liu:2015:LBD [Lin15] Pei-Yu Lin. Double verifi- [LJ15] Huacui Liu and Chen- cation secret sharing mech- hui Jin. Lower bounds anism based on adaptive of differential and linear pixel pair matching. ACM active S-boxes for 3D- Transactions on Multime- like structure. The Com- dia Computing, Communi- puter Journal, 58(4):904– cations, and Applications, 921, April 2015. CODEN 11(3):36:1–36:??, January CMPJA6. ISSN 0010-4620 2015. CODEN ???? ISSN (print), 1460-2067 (elec- 1551-6857 (print), 1551- tronic). URL http:// 6865 (electronic). comjnl.oxfordjournals. org/content/58/4/904. Lindell:2017:TFC Liu:2016:LCP [Lin17] Yehuda Lindell, editor. Tu- torials on the Foundations [LJ16] Guo-Qiang Liu and Chen- of Cryptography: Dedicated Hui Jin. Linear crypt- to Oded Goldreich. Infor- analysis of PRESENT-like mation Security and Cryp- ciphers with secret per- tography. Springer-Verlag, mutation. The Com- REFERENCES 392

puter Journal, 59(4):549– Li:2016:IRI 558, April 2016. CODEN CMPJA6. ISSN 0010-4620 [LJF16] Xinran Li, Chen-Hui Jin, (print), 1460-2067 (elec- and Fang-Wei Fu. Im- tronic). URL http:// proved results of impossi- comjnl.oxfordjournals. ble differential cryptanaly- org/content/59/4/549. sis on reduced FOX. The Computer Journal, 59(4): Li:2017:MMA 541–548, April 2016. CO- [LJ17] Rongjia Li and Chenhui DEN CMPJA6. ISSN Jin. Meet-in-the-middle at- 0010-4620 (print), 1460- tack on 11-round 3D block 2067 (electronic). URL cipher. International Jour- http://comjnl.oxfordjournals. nal of Foundations of Com- org/content/59/4/541. puter Science (IJFCS),28 Li:2019:IID (1), January 2017. CODEN IFCSEN. ISSN 0129-0541. [LJF19] Rongjia Li, Chenhui Jin, and Ruya Fan. Im- Li:2018:MMA proved integral distinguish- [LJ18] Rongjia Li and Chen- ers on compression func- hui Jin. Meet-in-the- tion of GOST R hash middle attacks on reduced- function. The Computer round QARMA-64/128. Journal, 62(4):535–544, The Computer Journal, April 2019. CODEN CM- 61(8):1158–1165, August PJA6. ISSN 0010-4620 1, 2018. CODEN CM- (print), 1460-2067 (elec- PJA6. ISSN 0010-4620 tronic). URL http:// (print), 1460-2067 (elec- academic.oup.com/comjnl/ tronic). URL http:// article/62/4/535/5224765. academic.oup.com/comjnl/ Li:2017:SQS article/61/8/1158/4993053. Liu:2019:ICA [LJK17] Songbin Li, Yizhen Jia, and C.-C. Jay Kuo. Ste- [LJ19] Hanqiu Liu and Chenhui ganalysis of QIM steganog- Jin. An improvement of raphy in low-bit-rate speech the CS attack to DSC ci- signals. IEEE/ACM pher. The Computer Jour- Transactions on Audio, nal, 62(8):1158–1165, Au- Speech, and Language Pro- gust 2019. CODEN CM- cessing, 25(5):1011–1022, PJA6. ISSN 0010-4620 ???? 2017. CODEN (print), 1460-2067 (elec- ???? ISSN 2329- tronic). URL http:// 9290. URL http:/ academic.oup.com/comjnl/ /ieeexplore.ieee.org/ article/62/8/1158/5476715. document/7867798/. REFERENCES 393

Li:2012:OEA Liu:2017:OOA

+ [LJLC12] Jingwei Li, Chunfu Jia, [LJW 17] Zechao Liu, Zoe L. Jiang, Jin Li, and Xiaofeng Chen. Xuan Wang, Xinyi Huang, Outsourcing encryption of S. M. Yiu, and Kunihiko attribute-based encryption Sadakane. Offline/online with MapReduce. Lecture attribute-based encryption Notes in Computer Sci- with verifiable outsourced ence, 7618:191–201, 2012. decryption. Concurrency CODEN LNCSD9. ISSN and Computation: Practice 0302-9743 (print), 1611- and Experience, 29(7):??, 3349 (electronic). URL April 10, 2017. CODEN http://link.springer. CCPEBO. ISSN 1532-0626 com/chapter/10.1007/978- (print), 1532-0634 (elec- 3-642-34129-8_17/. tronic). Liu:2018:PAB Lesi:2017:SAS [LJWY18] Zechao Liu, Zoe L. Jiang, [LJP17] Vuk Lesi, Ilija Jovanov, Xuan Wang, and S. M. Yiu. and Miroslav Pajic. Security- Practical attribute-based aware scheduling of embed- encryption: Outsourcing ded control tasks. ACM decryption, attribute re- Transactions on Embed- vocation and policy up- ded Computing Systems,16 dating. Journal of Net- (5s):188:1–188:??, October work and Computer Appli- 2017. CODEN ???? ISSN cations, 108(??):112–123, 1539-9087 (print), 1558- April 15, 2018. CODEN 3465 (electronic). JNCAF3. ISSN 1084-8045 (print), 1095-8592 (elec- Laszka:2014:STC tronic). URL http:// www.sciencedirect.com/ [LJS+14] Aron Laszka, Benjamin science/article/pii/S1084804518300304. Johnson, Pascal Sch¨ottle, Libert:2016:BRD Jens Grossklags, and Rainer B¨ohme. Secure team [LJY16] Benoˆıt Libert, Marc Joye, composition to thwart in- and Moti Yung. Born and sider threats and cyber- raised distributively: Fully espionage. ACM Transac- distributed non-interactive tions on Internet Technol- adaptively-secure thresh- ogy (TOIT), 14(2–3):19:1– old signatures with short 19:??, October 2014. CO- shares. Theoretical Com- DEN ???? ISSN 1533-5399 puter Science, 645(??):1– (print), 1557-6051 (elec- 24, September 13, 2016. tronic). CODEN TCSCDI. ISSN REFERENCES 394

0304-3975 (print), 1879- tronic). URL http:// 2294 (electronic). URL www.sciencedirect.com/ http://www.sciencedirect. science/article/pii/S0020019014000325. com/science/article/pii/ S0304397516001626. Lee:2018:NIC Liu:2010:SVE [LK18] Eunsung Lee and Sang Woo Kim. Non-interactive con- [LK10] Fuwen Liu and Hart- ditional proxy re-signature mut Koenig. A sur- in the standard model. vey of video encryption The Computer Journal,61 algorithms. Computers (12):1772–1782, December & Security, 29(1):3–15, 1, 2018. CODEN CM- February 2010. CODEN PJA6. ISSN 0010-4620 CPSEDU. ISSN 0167-4048 (print), 1460-2067 (elec- (print), 1872-6208 (elec- tronic). URL http:// tronic). URL https:// academic.oup.com/comjnl/ www.sciencedirect.com/ article/61/12/1772/4965847. science/article/pii/S0167404809000698. Li:2012:IBO Li:2012:BIB [LKAT12] Fagen Li, Muhammad Khur- [LK12] Fagen Li and Muham- ram Khan, Khaled Al- mad Khurram Khan. A ghathbar, and Tsuyoshi biometric identity-based Takagi. Identity-based on- signcryption scheme. Fu- line/offline signcryption for ture Generation Computer low power devices. Journal Systems, 28(1):306–310, of Network and Computer January 2012. CODEN Applications, 35(1):340– FGSEVI. ISSN 0167-739X 347, January 2012. CO- (print), 1872-7115 (elec- DEN JNCAF3. ISSN 1084- tronic). URL http:// 8045 (print), 1095-8592 www.sciencedirect.com/ (electronic). URL http:// science/article/pii/S0167739X10002141. www.sciencedirect.com/ science/article/pii/S108480451100155X. Lee:2014:SPB Lee:2019:VCS [LK14] Jooyoung Lee and Dae- sung Kwon. Security of [LKBK19] Kyuin Lee, Neil Klin- permutation-based com- gensmith, Suman Baner- pression function lp231. jee, and Younghyun Kim. Information Processing VoltKey: Continuous se- Letters, 114(7):372–381, cret key generation based July 2014. CODEN IF- on power line noise for PLAT. ISSN 0020-0190 zero-involvement pairing (print), 1872-6119 (elec- and authentication. Pro- REFERENCES 395

ceedings of the ACM on In- Ming Lai. Toward a se- teractive, Mobile, Wearable cure single sign-on mech- and Ubiquitous Technolo- anism for distributed com- gies (IMWUT), 3(3):1–26, puter networks. The Com- September 2019. CODEN puter Journal, 58(4):934– ???? ISSN 2474-9567 (elec- 943, April 2015. CODEN tronic). URL https:// CMPJA6. ISSN 0010-4620 dl.acm.org/doi/abs/10. (print), 1460-2067 (elec- 1145/3351251. tronic). URL http:// Leva:2013:ABN comjnl.oxfordjournals. org/content/58/4/934. [LKKL13] Tapio Lev¨a, Miika Komu, Ari Ker¨anen, and Sakari Lu:2016:PFC Luukkainen. Adoption bar- [LL16a] Yang Lu and Jiguo Li. riers of network layer pro- A pairing-free certificate- tocols: the case of host based proxy re-encryption identity protocol. Com- scheme for secure data puter Networks (Amster- sharing in public clouds. dam, Netherlands: 1999), Future Generation Com- 57(10):2218–2232, July 5, puter Systems, 62(??):140– 2013. CODEN ???? ISSN 147, September 2016. CO- 1389-1286 (print), 1872- DEN FGSEVI. ISSN 0167- 7069 (electronic). URL 739X (print), 1872-7115 http://www.sciencedirect. (electronic). URL http:// com/science/article/pii/ www.sciencedirect.com/ S1389128613000480. science/article/pii/S0167739X1500360X. Le:2011:RMA Lu:2016:PSC [LL11] Duc-Phong Le and Chao- Liang Liu. Refinements [LL16b] Yang Lu and Jiguo Li. of Miller’s algorithm over Provably secure certificate- Weierstrass curves revis- less proxy signature scheme ited. The Computer Jour- in the standard model. nal, 54(10):1582–1591, Oc- Theoretical Computer Sci- tober 2011. CODEN CM- ence, 639(??):42–59, Au- PJA6. ISSN 0010-4620 gust 1, 2016. CODEN (print), 1460-2067 (elec- TCSCDI. ISSN 0304-3975 tronic). URL http:// (print), 1879-2294 (elec- comjnl.oxfordjournals. tronic). URL http:// org/content/54/10/1582. www.sciencedirect.com/ full.pdf+html. science/article/pii/S0304397516301554. Lee:2015:TSS Lee:2010:PMB [LL15] Cheng-Chi Lee and Yan- [LLC10] Hui-Lung Lee, Chia-Feng REFERENCES 396

Lee, and Ling-Hwei Chen. (print), 1557-9956 (elec- A perfect maze based tronic). URL https: steganographic method. //ieeexplore.ieee.org/ The Journal of Systems document/8453825/. and Software, 83(12):2528– Li:2015:ANA 2535, December 2010. CO- DEN JSSODM. ISSN [LLG15] Jie Li, Huang Lu, and 0164-1212. Mohsen Guizani. ACPN: Lee:2011:TAT A novel authentication framework with condi- [LLC11] Cheng-Chi Lee, Chun-Ta tional privacy-preservation Li, and Shun-Der Chen. and non-repudiation for Two attacks on a two- VANETs. IEEE Trans- factor user authentication actions on Parallel and in wireless sensor networks. Distributed Systems,26 Parallel Processing Letters, (4):938–948, April 2015. 21(1):21–26, March 2011. CODEN ITDSEO. ISSN CODEN PPLTEE. ISSN 1045-9219 (print), 1558- 0129-6264. 2183 (electronic). URL Li:2015:IBE http://csdl.computer. org/csdl/trans/td/2015/ [LLC+15] Jin Li, Jingwei Li, Xi- 04/06748095-abs.html. aofeng Chen, Chunfu Jia, and Wenjing Lou. Identity- Lyu:2019:SPP based encryption with out- sourced revocation in cloud [LLG19] Lin Lyu, Shengli Liu, and computing. IEEE Trans- Dawu Gu. Structure- actions on Computers,64 preserving public-key en- (2):??, February 2015. CO- cryption with leakage- DEN ITCOB4. ISSN resilient CCA security. 0018-9340 (print), 1557- Theoretical Computer Sci- 9956 (electronic). ence, 795(??):57–80, Novem- ber 26, 2019. CODEN Liu:2019:EEA TCSCDI. ISSN 0304-3975 [LLD19] Peng Liu, Shunbin Li, (print), 1879-2294 (elec- and Qingyuan Ding. An tronic). URL http:// energy-efficient accelerator www.sciencedirect.com/ based on hybrid CPU– science/article/pii/S030439751930386X. FPGA devices for pass- Lin:2016:SCU word recovery. IEEE Transactions on Comput- [LLGJ16] Jingqiang Lin, Bo Luo, ers, 68(2):170–181, Febru- Le Guan, and Jiwu Jing. ary 2019. CODEN IT- Secure computing using COB4. ISSN 0018-9340 registers and caches: The REFERENCES 397

problem, challenges, and Transactions on Multime- solutions. IEEE Secu- dia Computing, Communi- rity & Privacy, 14(6):63– cations, and Applications, 70, November/December 8(2S):33:1–33:??, Septem- 2016. CODEN ???? ISSN ber 2012. CODEN ???? 1540-7993 (print), 1558- ISSN 1551-6857 (print), 4046 (electronic). URL 1551-6865 (electronic). https://www.computer. Liu:2018:GEI org/csdl/mags/sp/2016/ 06/msp2016060063-abs. [LLK18] Zhe Liu, Patrick Longa, html. andCetin ¸ Kaya Ko¸c. Guest Li:2017:ESD Editors’ introduction to the special issue on cryp- [LLH17] Fagen Li, Bo Liu, and Jiao- tographic engineering in a jiao Hong. An efficient post-quantum world: State signcryption for data ac- of the art advances. IEEE cess control in cloud com- Transactions on Com- puting. Computing, 99(5): puters, 67(11):1532–1534, 465–479, May 2017. CO- ???? 2018. CODEN IT- DEN CMPTA2. ISSN COB4. ISSN 0018-9340 0010-485X (print), 1436- (print), 1557-9956 (elec- 5057 (electronic). tronic). URL https: Lyu:2018:PKE //ieeexplore.ieee.org/ document/8485531/. [LLH18] Lin Lyu, Shengli Liu, Liu:2019:SBC and Shuai Han. Public- key encryption with tight [LLKA19] Jian Liu, Wenting Li, simulation-based selective- Ghassan O. Karame, and opening security. The N. Asokan. Scalable Computer Journal,61 Byzantine consensus via (2):288–318, February 1, hardware-assisted secret 2018. CODEN CM- sharing. IEEE Transac- PJA6. ISSN 0010-4620 tions on Computers, 68(1): (print), 1460-2067 (elec- 139–151, ???? 2019. CO- tronic). URL http:// DEN ITCOB4. ISSN 0018- academic.oup.com/comjnl/ 9340 (print), 1557-9956 article/61/2/288/4259796. (electronic). URL https: Li:2012:RIB //ieeexplore.ieee.org/ document/8419336/. [LLHS12] Jian Li, Hongmei Liu, Li:2017:CIS Jiwu Huang, and Yun Q. Shi. Reference index- [LLL17a] Chengqing Li, Dongdong based H.264 video water- Lin, and Jinhu Lu. Crypt- marking scheme. ACM analyzing an image-scrambling REFERENCES 398

encryption algorithm of Li:2018:CIE pixel bits. IEEE Multi- Media, 24(3):64–71, July/ [LLLH18] C. Li, D. Lin, J. L¨u, September 2017. CO- and F. Hao. Cryptana- DEN IEMUE4. ISSN lyzing an image encryption 1070-986X (print), 1941- algorithm based on auto- 0166 (electronic). URL blocking and electrocardio- https://www.computer. graphy. IEEE MultiMe- org/csdl/mags/mu/2017/ dia, 25(4):46–56, October/ 03/mmu2017030064-abs. December 2018. CODEN html. IEMUE4. ISSN 1070-986x (print), 1941-0166 (elec- Li:2017:CCD tronic).

+ [LLL 17b] Tong Li, Zheli Liu, Jin Li:2010:DCY Li, Chunfu Jia, and Kuan- Ching Li. CDPS: A [LLLK10] Chengqing Li, Shujun Li, cryptographic data pub- Kwok-Tung Lo, and Kyan- lishing system. Jour- doghere Kyamakya. A nal of Computer and Sys- differential cryptanalysis of tem Sciences, 89(??):80– Yen–Chen–Wu multimedia 91, November 2017. CO- cryptography system. The DEN JCSSBM. ISSN 0022- Journal of Systems and 0000 (print), 1090-2724 Software, 83(8):1443–1452, (electronic). URL http:// August 2010. CODEN JS- www.sciencedirect.com/ SODM. ISSN 0164-1212. science/article/pii/S0022000016301313. Lai:2013:SAS Liu:2018:VSE [LLLS13] Chengzhe Lai, Hui Li, [LLL+18] Zheli Liu, Tong Li, Ping Rongxing Lu, and Xuemin (Sher- Li, Chunfu Jia, and Jin man) Shen. SE-AKA: a se- Li. Verifiable search- cure and efficient group au- able encryption with ag- thentication and key agree- gregate keys for data shar- ment protocol for LTE net- ing system. Future Genera- works. Computer Networks tion Computer Systems,78 (Amsterdam, Netherlands: (part 2)(??):778–788, Jan- 1999), 57(17):3492–3510, uary 2018. CODEN FG- December 9, 2013. CO- SEVI. ISSN 0167-739X DEN ???? ISSN 1389-1286 (print), 1872-7115 (elec- (print), 1872-7069 (elec- tronic). URL http:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0167739X17302340. science/article/pii/S1389128613002570. REFERENCES 399

Libert:2019:ZKA 0190 (print), 1872-6119 (electronic). URL http:// + [LLM 19] Benoˆıt Libert, San Ling, www.sciencedirect.com/ Fabrice Mouhartem, Khoa science/article/pii/S0020019018300267. Nguyen, and Huaxiong Wang. Zero-knowledge ar- Lee:2019:CSS guments for matrix-vector relations and lattice-based [LLPY19] Kwangsu Lee, Dong Hoon group encryption. Theo- Lee, Jong Hwan Park, and retical Computer Science, Moti Yung. CCA security 759(??):72–97, February for self-updatable encryp- 8, 2019. CODEN TC- tion: Protecting cloud data SCDI. ISSN 0304-3975 when clients read/write (print), 1879-2294 (elec- ciphertexts. The Com- tronic). URL http:// puter Journal, 62(4):545– www.sciencedirect.com/ 562, April 2019. CODEN science/article/pii/S0304397519300167. CMPJA6. ISSN 0010-4620 (print), 1460-2067 (elec- Lu:2012:IEC tronic). URL http:// academic.oup.com/comjnl/ [LLML12] Xianhui Lu, Bao Li, Qix- article/62/4/545/5239643. iang Mei, and Yamin Liu. Improved efficiency of cho- Liao:2019:ESO sen ciphertext secure en- cryption from factoring. [LLSL19] W. Liao, C. Luo, S. Sali- Lecture Notes in Computer nas, and P. Li. Effi- Science, 7232:34–45, 2012. cient secure outsourcing of CODEN LNCSD9. ISSN large-scale convex separa- 0302-9743 (print), 1611- ble programming for big 3349 (electronic). URL data. IEEE Transactions http://link.springer. on Big Data, 5(3):368–378, com/chapter/10.1007/978- September 2019. ISSN 3-642-29101-2_3/. 2332-7790. Lai:2018:EQK Lee:2016:CAM [LLP+18] Hong Lai, Mingxing Luo, [LLSW16] Hyung Tae Lee, San Ling, Josef Pieprzyk, Zhiguo Qu, Jae Hong Seo, and Huax- and Mehmet A. Orgun. Ef- iong Wang. CCA2 attack ficient quantum key dis- and modification of Huang tribution using Fibonacci- et al.’s public key encryp- number coding with a bi- tion with authorized equal- ased basis choice. Informa- ity test. The Computer tion Processing Letters, 134 Journal, 59(11):1689–1694, (??):24–30, June 2018. CO- November 2016. CODEN DEN IFPLAT. ISSN 0020- CMPJA6. ISSN 0010-4620 REFERENCES 400

(print), 1460-2067 (elec- (print), 1558-2566 (elec- tronic). URL http:// tronic). comjnl.oxfordjournals. org/content/59/11/1689. Luo:2012:FSI + Lee:2016:AGA [LLY 12b] Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo [LLW16] Hyung Tae Lee, San Ling, Lian, and Daoshun Wang. and Huaxiong Wang. Anal- On F5 steganography in ysis of Gong et al.’s CCA2- images. The Computer secure homomorphic en- Journal, 55(4):447–456, cryption. Theoretical Com- April 2012. CODEN CM- puter Science, 640(??):104– PJA6. ISSN 0010-4620 114, August 9, 2016. CO- (print), 1460-2067 (elec- DEN TCSCDI. ISSN 0304- tronic). URL http:// 3975 (print), 1879-2294 comjnl.oxfordjournals. (electronic). URL http:// org/content/55/4/447. www.sciencedirect.com/ full.pdf+html. science/article/pii/S030439751630250X. Lee:2015:SAS Lee:2006:DCK [LLY15] Kwangsu Lee, Dong Hoon [LLY06] Patrick P. C. Lee, John Lee, and Moti Yung. Se- C. S. Lui, and David K. Y. quential aggregate signa- Yau. Distributed collabo- tures with short public rative key agreement and keys without random ora- authentication protocols cles. Theoretical Computer for dynamic peer groups. Science, 579(??):100–125, IEEE/ACM Transactions May 10, 2015. CODEN on Networking, 14(2):263– TCSCDI. ISSN 0304-3975 276, April 2006. CODEN (print), 1879-2294 (elec- IEANEP. ISSN 1063-6692 tronic). URL http:// (print), 1558-2566 (elec- www.sciencedirect.com/ tronic). science/article/pii/S0304397515001164. Ling:2012:NCC Li:2018:WMH

[LLY+12a] Zhen Ling, Junzhou Luo, [LLY+18] L. Li, H. Li, W. Yuan, Wei Yu, Xinwen Fu, Dong J. Lu, X. Feng, and Xuan, and Weijia Jia. A C. Chang. A water- new cell-counting-based at- marking mechanism with tack against Tor. IEEE/ high capacity for three- ACM Transactions on Net- dimensional mesh objects working, 20(4):1245–1261, using integer planning. August 2012. CODEN IEEE MultiMedia, 25(3): IEANEP. ISSN 1063-6692 49–64, July/September REFERENCES 401

2018. CODEN IEMUE4. Liang He, Kui Ren, Qi Li, ISSN 1070-986x (print), Patrick P. C. Lee, Peng 1941-0166 (electronic). Zhang, Purui Su, Liang He, and Kui Ren. Capability- Lu:2012:BBE based security enforcement [LLZ+12] Rongxing Lu, Xiaodong in named data network- Lin, Haojin Zhu, Xiaohui ing. IEEE/ACM Transac- Liang, and Xuemin (Sher- tions on Networking, 25(5): man) Shen. BECAN: a 2719–2730, October 2017. Bandwidth-Efficient Co- CODEN IEANEP. ISSN operative Authentication 1063-6692 (print), 1558- Scheme for filtering in- 2566 (electronic). jected false data in wire- less sensor networks. IEEE Lucamarini:2014:QKD Transactions on Parallel and Distributed Systems, [LM14] Marco Lucamarini and Ste- 23(1):32–43, January 2012. fano Mancini. Quantum CODEN ITDSEO. ISSN key distribution using a 1045-9219 (print), 1558- two-way quantum channel. 2183 (electronic). Theoretical Computer Sci- ence, 560 (part 1)(??):46– Lai:2016:GGB 61, December 4, 2014. CO- [LLZ+16] Chengzhe Lai, Rongxing DEN TCSCDI. ISSN 0304- Lu, Dong Zheng, Hui 3975 (print), 1879-2294 Li, and Xuemin (Sher- (electronic). URL http:// man) Shen. GLARM: www.sciencedirect.com/ Group-based lightweight science/article/pii/S0304397514006951. authentication scheme for resource-constrained ma- Lambert-Mogiliansky:2012:EII chine to machine com- munications. Computer [LMB12] Ariane Lambert-Mogiliansky Networks (Amsterdam, and Jerome R. Busemeyer. Netherlands: 1999),99 Emergence and instabil- (??):66–81, April 22, 2016. ity of individual iden- CODEN ???? ISSN 1389- tity. Lecture Notes in 1286 (print), 1872-7069 Computer Science, 7620: (electronic). URL http:// 102–113, 2012. CO- www.sciencedirect.com/ DEN LNCSD9. ISSN science/article/pii/S1389128616300238. 0302-9743 (print), 1611- Li:2017:CBS 3349 (electronic). URL http://link.springer. [LLZ+17] Qi Li, Patrick P. C. Lee, com/chapter/10.1007/978- Peng Zhang, Purui Su, 3-642-35659-9_10/. REFERENCES 402

Le:2016:ADS Liu:2014:SCS

[LMD16] Anh Le, Athina Markopoulou,[LMHH14] Bin Liu, Ralph R. Martin, and Alexandros G. Di- Ji-Wu Huang, and Shi-Min makis. Auditing for dis- Hu. Shapes and cryptog- tributed storage systems. raphy: Structure aware vi- IEEE/ACM Transactions sual cryptography. Com- on Networking, 24(4): puter Graphics Forum,33 2182–2195, August 2016. (7):141–150, October 2014. CODEN IEANEP. ISSN CODEN CGFODY. ISSN 1063-6692 (print), 1558- 0167-7055 (print), 1467- 2566 (electronic). 8659 (electronic). Li:2011:NRA Lai:2018:IBB [LMJC11] Guangsong Li, Jianfeng + [LMG 18] Jianchang Lai, Yi Mu, Ma, Qi Jiang, and Xi Chen. Fuchun Guo, Peng Jiang, A novel re-authentication and Sha Ma. Identity- scheme based on tickets based broadcast encryp- in wireless local area net- tion for inner products. works. Journal of Paral- The Computer Journal, lel and Distributed Com- 61(8):1240–1251, August puting, 71(7):906–914, July 1, 2018. CODEN CM- 2011. CODEN JPD- PJA6. ISSN 0010-4620 CER. ISSN 0743-7315 (print), 1460-2067 (elec- (print), 1096-0848 (elec- tronic). URL http:// tronic). URL http:// academic.oup.com/comjnl/ www.sciencedirect.com/ article/61/8/1240/5035766. science/article/pii/S0743731511000554. Lai:2017:FPP Lv:2013:NTP [LMGC17] Jianchang Lai, Yi Mu, [LML+13] Chao Lv, Maode Ma, Fuchun Guo, and Rong- Hui Li, Jianfeng Ma, and mao Chen. Fully privacy- Yaoyu Zhang. An novel preserving ID-based broad- three-party authenticated cast encryption with au- key exchange protocol us- thorization. The Computer ing one-time key. Journal Journal, 60(12):1809–1821, of Network and Computer December 1, 2017. CO- Applications, 36(1):498– DEN CMPJA6. ISSN 503, January 2013. CO- 0010-4620 (print), 1460- DEN JNCAF3. ISSN 1084- 2067 (electronic). URL 8045 (print), 1095-8592 https://academic.oup. (electronic). URL http:// com/comjnl/article/60/ www.sciencedirect.com/ 12/1809/3861972. science/article/pii/S1084804512000999. REFERENCES 403

Lubacz:2010:VI Global Mobility Networks in smart city. Future [LMS10] J. Lubacz, W. Mazur- Generation Computer Sys- czyk, and K. Szczypi- tems, 83(??):607–618, June orski. Vice over IP. 2018. CODEN FG- IEEE Spectrum, 47(2):42– SEVI. ISSN 0167-739X 47, February 2010. CO- (print), 1872-7115 (elec- DEN IEESAM. ISSN 0018- tronic). URL https:// 9235 (print), 1939-9340 www.sciencedirect.com/ (electronic). science/article/pii/S0167739X1730585X. Lukasiewycz:2016:SAO Li:2018:TFA [LMS16] Martin Lukasiewycz, Philipp + Mundhenk, and Sebastian [LNK 18b] Xiong Li, Jianwei Niu, Steinhorst. Security-aware Saru Kumari, Fan Wu, obfuscated priority assign- Arun Kumar Sangaiah, ment for automotive CAN and Kim-Kwang Raymond platforms. ACM Transac- Choo. A three-factor tions on Design Automa- anonymous authentication tion of Electronic Systems, scheme for wireless sen- 21(2):32:1–32:??, January sor networks in Inter- 2016. CODEN ATASFO. net of Things environ- ISSN 1084-4309 (print), ments. Journal of Net- 1557-7309 (electronic). work and Computer Appli- cations, 103(??):194–204, LoIacono:2019:NGR February 1, 2018. CODEN JNCAF3. ISSN 1084-8045 [LNG19] Luigi Lo Iacono, Hoai Viet (print), 1095-8592 (elec- Nguyen, and Peter Leo tronic). URL http:// Gorski. On the need for www.sciencedirect.com/ a general REST-security science/article/pii/S1084804517302254. framework. Future In- ternet, 11(3):56, Febru- Li:2013:ESC ary 27, 2019. CODEN ???? ISSN 1999-5903. [LNKL13] Xiong Li, Jianwei Niu, URL https://www.mdpi. Muhammad Khurram Khan, com/1999-5903/11/3/56. and Junguo Liao. An en- Li:2018:RBB hanced smart card based remote user password au- [LNK+18a] Xiong Li, Jianwei Niu, thentication scheme. Jour- Saru Kumari, Fan Wu, nal of Network and Com- and Kim-Kwang Raymond puter Applications,36 Choo. A robust biomet- (5):1365–1371, Septem- rics based three-factor au- ber 2013. CODEN JN- thentication scheme for CAF3. ISSN 1084-8045 REFERENCES 404

(print), 1095-8592 (elec- Security, 37(??):124–142, tronic). URL http:// September 2013. CODEN www.sciencedirect.com/ CPSEDU. ISSN 0167-4048 science/article/pii/S1084804513000726. (print), 1872-6208 (elec- tronic). URL https:// Liu:2019:OMM www.sciencedirect.com/ [LNL+19] W. Liu, J. Ni, Z. Liu, science/article/pii/S0167404813000916. C. Liu, and M. O. Neill. Ling:2019:SAR Optimized modular mul- tiplication for supersingu- [LNWZ19] San Ling, Khoa Nguyen, lar isogeny Diffie–Hellman. Huaxiong Wang, and IEEE Transactions on Juanyang Zhang. Server- Computers, 68(8):1249– aided revocable predicate 1255, August 2019. CO- encryption: Formalization DEN ITCOB4. ISSN 0018- and lattice-based instantia- 9340 (print), 1557-9956 tion. The Computer Jour- (electronic). nal, 62(12):1849–1862, De- cember 2019. CODEN CM- Li:2011:CIB PJA6. ISSN 0010-4620 (print), 1460-2067 (elec- [LNM+11] Xiong Li, Jian-Wei Niu, tronic). URL http:// Jian Ma, Wen-Dong Wang, academic.oup.com/comjnl/ and Cheng-Lian Liu. Crypt- article/62/12/1849/5628022. analysis and improvement of a biometrics-based re- Liu:2015:SAB mote user authentica- [LNXY15] Hong Liu, Huansheng tion scheme using smart Ning, Qingxu Xiong, and cards. Journal of Net- Laurence T. Yang. Shared work and Computer Appli- authority based privacy- cations, 34(1):73–79, Jan- preserving authentication uary 2011. CODEN JN- protocol in cloud comput- CAF3. ISSN 1084-8045 ing. IEEE Transactions (print), 1095-8592 (elec- on Parallel and Distributed tronic). URL http:// Systems, 26(1):241–251, www.sciencedirect.com/ January 2015. CODEN science/article/pii/S1084804510001657. ITDSEO. ISSN 1045-9219 Li:2013:EAF (print), 1558-2183 (elec- tronic). URL http:// [LNNH13] Celia Li, Uyen Trang www.computer.org/csdl/ Nguyen, Hoang Lan Nguyen, trans/td/2015/01/06748054- and Nurul Huda. Efficient abs.html. authentication for fast han- Liu:2013:GPB dover in wireless mesh networks. Computers & [LNZ+13] Hong Liu, Huansheng REFERENCES 405

Ning, Yan Zhang, Dao- ited. The Computer Jour- jing He, Qingxu Xiong, nal, 58(4):782–791, April and Laurence T. Yang. 2015. CODEN CM- Grouping-proofs-based au- PJA6. ISSN 0010-4620 thentication protocol for (print), 1460-2067 (elec- distributed RFID systems. tronic). URL http:// IEEE Transactions on comjnl.oxfordjournals. Parallel and Distributed org/content/58/4/782. Systems, 24(7):1321–1330, July 2013. CODEN ITD- Lopriore:2015:PMD SEO. ISSN 1045-9219. [Lop15b] Lanfranco Lopriore. Pass- Loeb:2015:MGM word management: Distri- bution, review and revoca- [Loe15] Larry Loeb. Microsoft, tion. The Computer Jour- Google, Mozilla aban- nal, 58(10):2557–2566, Oc- don RC4 cryptographic tober 2015. CODEN CM- standard. Information PJA6. ISSN 0010-4620 Week, ??(??):??, Septem- (print), 1460-2067 (elec- ber 2, 2015. CODEN tronic). URL http:// INFWE4. ISSN 8750- comjnl.oxfordjournals. 6874. URL http:/ org/content/58/10/2557. /www.informationweek. com/software/enterprise- Low:2012:BRB applications/microsoft- google-mozilla-abandon- [Low12] Robert J. Low. Book rc4-cryptographic-standard/ review: Codes: an In- a/d-id/1322032. troduction to Information Communication and Cryp- Lopriore:2012:EPP tography, by Norman L. [Lop12] Lanfranco Lopriore. En- Biggs. ACM SIGACT crypted pointers in protec- News, 43(1):27–29, March tion system design. The 2012. CODEN SIGNDM. Computer Journal, 55(4): ISSN 0163-5700 (print), 497–507, April 2012. CO- 1943-5827 (electronic). See DEN CMPJA6. ISSN [Big08]. 0010-4620 (print), 1460- Lin:2011:CRN 2067 (electronic). URL http://comjnl.oxfordjournals.[LP11] Huijia Lin and Rafael org/content/55/4/497. Pass. Constant-round non- full.pdf+html. malleable commitments Lopriore:2015:PCR from any one-way func- tion. In ACM [ACM11], [Lop15a] Lanfranco Lopriore. Pass- pages 705–714. ISBN ???? word capabilities revis- LCCN ???? URL http:// REFERENCES 406

www.gbv.de/dms/tib-ub- comjnl.oxfordjournals. hannover/63314455x.. org/content/58/10/2426. Ling:2012:SHS Liu:2017:HPI

[LP12] Huo-Chong Ling and Raphael[LPO+17] Zhe Liu, Thomas P¨oppelmann, C.-W. Phan. On the secu- Tobias Oder, Hwajeong rity of a hybrid SVD–DCT Seo, Sujoy Sinha Roy, watermarking method based Tim G¨uneysu, Johann on LPSNR. Lecture Notes Großsch¨adl, Howon Kim, in Computer Science, 7087: and Ingrid Verbauwhede. 257–266, 2012. CO- High-performance ideal DEN LNCSD9. ISSN lattice-based cryptography 0302-9743 (print), 1611- on 8-bit AVR microcon- 3349 (electronic). URL trollers. ACM Transac- http://link.springer. tions on Embedded Com- com/content/pdf/10.1007/ puting Systems, 16(4): 978-3-642-25367-6_23. 117:1–117:??, August 2017. CODEN ???? ISSN 1539- Lima:2010:PKE 9087 (print), 1558-3465 [LPdS10] J. B. Lima, D. Panario, (electronic). and R. M. Campello Lampe:2012:ATS de Souza. Public-key en- cryption based on Cheby- [LPS12] Rodolphe Lampe, Jacques shev polynomials over Patarin, and Yannick GF(q). Information Pro- Seurin. An asymptoti- cessing Letters, 111(2):51– cally tight security anal- 56, December 31, 2010. ysis of the iterated even- CODEN IFPLAT. ISSN Mansour cipher. Lecture 0020-0190 (print), 1872- Notes in Computer Sci- 6119 (electronic). ence, 7658:278–295, 2012. CODEN LNCSD9. ISSN Lian:2015:GRG 0302-9743 (print), 1611- [LPL15] Chunfeng Lian, Liaojun 3349 (electronic). URL Pang, and Jimin Liang. http://link.springer. Generalized random grid- com/chapter/10.1007/978- based visual secret shar- 3-642-34961-4_18/. ing for general access struc- Liu:2015:GTB tures. The Computer Jour- nal, 58(10):2426–2442, Oc- [LPZJ15] Shaohui Liu, Anand Paul, tober 2015. CODEN CM- Guochao Zhang, and Gwang- PJA6. ISSN 0010-4620 gil Jeon. A game (print), 1460-2067 (elec- theory-based block im- tronic). URL http:// age compression method REFERENCES 407

in encryption domain. Miller’s algorithm and ap- The Journal of Supercom- plications to pairing com- puting, 71(9):3353–3372, putations on abelian vari- September 2015. CO- eties. Journal of Symbolic DEN JOSUED. ISSN Computation, 67(??):68– 0920-8542 (print), 1573- 92, March/April 2015. CO- 0484 (electronic). URL DEN JSYCEH. ISSN 0747- http://link.springer. 7171 (print), 1095-855X com/article/10.1007/s11227- (electronic). URL http:// 015-1413-0. www.sciencedirect.com/ Liu:2016:PPO science/article/pii/S0747717114000510. Lukowiak:2014:CEB [LQD+16] Ximeng Liu, Baodong Qin, Robert H. Deng, Rongx- [LRVW14] Marcin Lukowiak, Stanis- ing Lu, and Jianfeng Ma. law Radziszowski, James A privacy-preserving out- Vallino, and Christopher sourced functional compu- Wood. Cybersecurity ed- tation framework across ucation: Bridging the gap large-scale multiple en- between hardware and soft- crypted domains. IEEE ware domains. ACM Transactions on Comput- Transactions on Comput- ers, 65(12):3567–3579, ???? ing Education, 14(1):2:1– 2016. CODEN ITCOB4. 2:??, March 2014. CODEN ISSN 0018-9340 (print), ???? ISSN 1946-6226. 1557-9956 (electronic). Liskiewicz:2013:GBS Libert:2010:KES [LRW13] Maciej Li´skiewicz, R¨udiger [LQY10] Benoˆıt Libert, Jean-Jacques Reischuk, and Ulrich W¨olfel. Quisquater, and Moti Grey-box steganography. Yung. Key evolution sys- Theoretical Computer Sci- tems in untrusted up- ence, 505(??):27–41, Septem- date environments. ACM ber 23, 2013. CODEN Transactions on Informa- TCSCDI. ISSN 0304-3975 tion and System Secu- (print), 1879-2294 (elec- rity, 13(4):37:1–37:??, De- tronic). URL http:// cember 2010. CODEN www.sciencedirect.com/ ATISBQ. ISSN 1094-9224 science/article/pii/S030439751200309X. (print), 1557-7406 (elec- tronic). Liskiewicz:2017:SLS

Lubicz:2015:GMA [LRW17] Maciej Li´skiewicz, R¨udiger Reischuk, and Ulrich W¨olfel. [LR15] David Lubicz and Damien Security levels in steganog- Robert. A generalisation of raphy — insecurity does REFERENCES 408

not imply detectability. CRET: a selective error Theoretical Computer Sci- correction framework for ence, 692(??):25–45, Septem- refresh energy reduction in ber 5, 2017. CODEN TC- DRAMs. ACM Transac- SCDI. ISSN 0304-3975 tions on Architecture and (print), 1879-2294 (elec- Code Optimization, 12(2): tronic). URL http:// 19:1–19:??, July 2015. CO- www.sciencedirect.com/ DEN ???? ISSN 1544-3566 science/article/pii/S0304397517305194. (print), 1544-3973 (elec- tronic). :2014:PBD [LSBN14] Julia I. Lane, Victoria Lychev:2016:RSI Stodden, Stefan Bender, and Helen Nissenbaum, [LSG16] Robert Lychev, Michael editors. Privacy, big Schapira, and Sharon data, and the public good: Goldberg. Rethinking se- frameworks for engage- curity for Internet routing. ment. Cambridge Univer- Communications of the As- sity Press, Cambridge, UK, sociation for Computing 2014. ISBN 1-107-06735-9 Machinery, 59(10):48–57, (hardcover), 1-107-63768-6 October 2016. CODEN (paperback). xix + 322 pp. CACMA2. ISSN 0001-0782 LCCN JC596 .P747 2015. (print), 1557-7317 (elec- Luo:2012:FSU tronic). URL http:// cacm.acm.org/magazines/ [LSC12] Song Luo, Qingni Shen, 2016/10/207763/fulltext. and Zhong Chen. Fully se- cure unidirectional identity- Liu:2019:IMM based proxy re-encryption. Lecture Notes in Com- [LSG+19] Ya Liu, Yifan Shi, Dawu puter Science, 7259:109– Gu, Zhiqiang Zeng, Fengyu 126, 2012. CODEN Zhao, Wei Li, Zhiqiang LNCSD9. ISSN 0302-9743 Liu, and Yang Bao. Im- (print), 1611-3349 (elec- proved meet-in-the-middle tronic). URL http:// attacks on reduced-round link.springer.com/chapter/ Kiasu-BC and Joltik-BC. 10.1007/978-3-642-31912- The Computer Journal, 9_8/. 62(12):1761–1776, Decem- Lin:2015:SSE ber 2019. CODEN CM- PJA6. ISSN 0010-4620 [LSC+15] Chung-Hsiang Lin, De-Yu (print), 1460-2067 (elec- Shen, Yi-Jung Chen, Chia- tronic). URL http:// Lin Yang, and Cheng- academic.oup.com/comjnl/ Yuan Michael Wang. SE- article/62/12/1761/5525447. REFERENCES 409

Lee:2012:IBS (print), 1460-2067 (elec- tronic). URL http:// [LSL12a] Woomyo Lee, Jae Woo comjnl.oxfordjournals. Seo, and Pil Joong Lee. org/content/58/10/2778. Identity-based signcryp- tion from identity-based Liu:2011:DBA cryptography. Lecture [LSQ11a] Qingzhong Liu, Andrew H. Notes in Computer Sci- Sung, and Mengyu Qiao. ence, 7115:70–83, 2012. Derivative-based audio ste- CODEN LNCSD9. ISSN ganalysis. ACM Transac- 0302-9743 (print), 1611- tions on Multimedia Com- 3349 (electronic). URL puting, Communications, http://link.springer. and Applications, 7(3): com/chapter/10.1007/978- 18:1–18:??, August 2011. 3-642-27890-7_6/. CODEN ???? ISSN 1551- Lei:2012:RAW 6857 (print), 1551-6865 (electronic). [LSL12b] Baiying Lei, Ing Yann Soon, and Zhen Li. A Liu:2011:NJD robust audio watermark- ing scheme based on lifting [LSQ11b] Qingzhong Liu, Andrew H. wavelet transform and sin- Sung, and Mengyu Qiao. gular value decomposition. Neighboring joint density- Lecture Notes in Computer based JPEG steganalysis. Science, 7128:86–96, 2012. ACM Transactions on In- CODEN LNCSD9. ISSN telligent Systems and Tech- 0302-9743 (print), 1611- nology (TIST), 2(2):16:1– 3349 (electronic). URL 16:??, February 2011. CO- http://link.springer. DEN ???? ISSN 2157-6904 com/chapter/10.1007/978- (print), 2157-6912 (elec- 3-642-32205-1_9/. tronic). Liang:2015:EFC Lin:2015:IAA [LSLW15] Kaitai Liang, Willy Susilo, [LSQ15] Xi-Jun Lin, Lin Sun, and Joseph K. Liu, and Dun- Haipeng Qu. Insecurity of can S. Wong. Effi- an anonymous authentica- cient and fully CCA se- tion for privacy-preserving cure conditional proxy re- IoT target-driven appli- encryption from hierarchi- cations. Computers & cal identity-based encryp- Security, 48(??):142–149, tion. The Computer Jour- February 2015. CODEN nal, 58(10):2778–2792, Oc- CPSEDU. ISSN 0167-4048 tober 2015. CODEN CM- (print), 1872-6208 (elec- PJA6. ISSN 0010-4620 tronic). URL https:// REFERENCES 410

www.sciencedirect.com/ (print), 1460-2067 (elec- science/article/pii/S0167404814001229. tronic). URL http:// academic.oup.com/comjnl/ Lin:2018:CPF article/62/8/1087/5253748. [LSQL18a] Xi-Jun Lin, Lin Sun, Lin:2017:ESF Haipeng Qu, and Dongx- iao Liu. Cryptanalysis of [LSQZ17] Xi-Jun Lin, Lin Sun, a pairing-free certificate- Haipeng Qu, and Xi- less signcryption scheme. aoshuai Zhang. Editorial: The Computer Journal, On the security of the first 61(4):539–544, April 1, leakage-free certificateless 2018. CODEN CM- signcryption scheme. The PJA6. ISSN 0010-4620 Computer Journal, 60(4): (print), 1460-2067 (elec- 491–496, March 23, 2017. tronic). URL http:// CODEN CMPJA6. ISSN academic.oup.com/comjnl/ 0010-4620 (print), 1460- article/61/4/539/4608880. 2067 (electronic). URL Lin:2018:SSS https://academic.oup. com/comjnl/article/60/ [LSQL18b] Xi-Jun Lin, Lin Sun, 4/491/2608059. Haipeng Qu, and Dongx- iao Liu. On the security Lei:2013:RSW of secure server-designation [LSR13] Baiying Lei, Insu Song, public key encryption with and Shah Atiqur Rah- keyword search. The man. Robust and se- Computer Journal, 61(12): cure watermarking scheme 1791–1793, December 1, for breath sound. The 2018. CODEN CM- Journal of Systems and PJA6. ISSN 0010-4620 Software, 86(6):1638–1649, (print), 1460-2067 (elec- June 2013. CODEN JS- tronic). URL http:// SODM. ISSN 0164-1212 academic.oup.com/comjnl/ (print), 1873-1228 (elec- article/61/12/1791/5055854. tronic). URL http:// Lin:2019:CCA www.sciencedirect.com/ [LSQX19] Xi-Jun Lin, Lin Sun, science/article/pii/S0164121213000332. Haipeng Qu, and He-Qun Landecker:2012:TBB Xian. Cryptanalysis of a compact anonymous HIBE [LST12] Will Landecker, Thomas with constant size private Shrimpton, and R. Seth keys. The Computer Jour- Terashima. Tweakable nal, 62(8):1087–1091, Au- blockciphers with beyond gust 2019. CODEN CM- birthday-bound security. PJA6. ISSN 0010-4620 Lecture Notes in Computer REFERENCES 411

Science, 7417:14–30, 2012. Le:2014:IMX CODEN LNCSD9. ISSN 0302-9743 (print), 1611- [LT14a] Duc-Phong Le and Chik How 3349 (electronic). URL Tan. Improved Miller’s http://link.springer. algorithm for comput- com/chapter/10.1007/978- ing pairings on Edwards 3-642-32009-5_2/. curves. IEEE Transac- tions on Computers,63 Liu:2016:EPP (10):2626–2632, October 2014. CODEN ITCOB4. ISSN 0018-9340 (print), + [LSY 16] Joseph K. Liu, Willy 1557-9956 (electronic). Susilo, Tsz Hon Yuen, Man Ho Au, Junbin Fang, Lee:2014:NDH Zoe L. Jiang, and Jiany- [LT14b] Ya-Lin Lee and Wen- ing Zhou. Efficient privacy- Hsiang Tsai. A new data preserving charging station hiding method via revi- reservation system for elec- sion history records on tric vehicles. The Com- collaborative writing plat- puter Journal, 59(7):1040– forms. ACM Transactions 1053, July 2016. CODEN on Multimedia Comput- CMPJA6. ISSN 0010-4620 ing, Communications, and (print), 1460-2067 (elec- Applications, 10(2):20:1– tronic). URL http:// 20:??, February 2014. CO- comjnl.oxfordjournals. DEN ???? ISSN 1551-6857 org/content/59/7/1040. (print), 1551-6865 (elec- tronic). Lee:2013:CCM Liu:2015:IMB [LT13] Che-Wei Lee and Wen- [LTC+15a] Chao-Liang Liu, Cheng- Hsiang Tsai. A covert Jung Tsai, Ting-Yi Chang, communication method Wang-Jui Tsai, and Po- via spreadsheets by se- Kai Zhong. Implementing cret sharing with a self- multiple biometric features authentication capabil- for a recall-based graph- ity. The Journal of ical keystroke dynamics Systems and Software, authentication system on 86(2):324–334, February a smart phone. Journal 2013. CODEN JS- of Network and Computer SODM. ISSN 0164-1212 Applications, 53(??):128– (print), 1873-1228 (elec- 139, July 2015. CODEN tronic). URL http:// JNCAF3. ISSN 1084-8045 www.sciencedirect.com/ (print), 1095-8592 (elec- science/article/pii/S0164121212002464. tronic). URL http:// REFERENCES 412

www.sciencedirect.com/ nal on Emerging Technolo- science/article/pii/S1084804515000612. gies in Computing Sys- tems (JETC), 13(1):9:1– Liu:2015:MSG 9:??, December 2016. CO- [LTC+15b] Chao-Liang Liu, Wang- DEN ???? ISSN 1550- Jui Tsai, Ting-Yi Chang, 4832. Chun-Cheng Peng, and Lysyanskaya:2010:AEC Peng-Shiang Wong. Mean- ingful share generation for [LTT10] Anna Lysyanskaya, Roberto (2, 2)-multiple visual secret Tamassia, and Nikos Trian- sharing scheme without dopoulos. Authenticated pixel expansion. The Com- error-correcting codes with puter Journal, 58(7):1598– applications to multicast 1606, July 2015. CODEN authentication. ACM CMPJA6. ISSN 0010-4620 Transactions on Informa- (print), 1460-2067 (elec- tion and System Security, tronic). URL http:// 13(2):17:1–17:??, February comjnl.oxfordjournals. 2010. CODEN ATISBQ. org/content/58/7/1598. ISSN 1094-9224 (print), Li:2015:FSC 1557-7406 (electronic).

+ [LTH 15] Jiguo Li, Huiyun Teng, Lin:2011:CNS Xinyi Huang, Yichen Zhang, and Jianying Zhou. [LTW11] Dongdai Lin, Gene Tsudik, A forward-secure certificate- and Xiaoyun Wang, ed- based signature scheme. itors. Cryptology and The Computer Journal,58 Network Security: 10th (4):853–866, April 2015. International Conference, CODEN CMPJA6. ISSN CANS 2011, Sanya, China, 0010-4620 (print), 1460- December 10–12. Proceed- 2067 (electronic). URL ings, volume 7092 of Lec- http://comjnl.oxfordjournals. ture Notes in Computer org/content/58/4/853. Science. Springer-Verlag, Lao:2016:BFD Berlin, Germany / Heidel- berg, Germany / London, [LTKP16] Yingjie Lao, Qianying UK / etc., 2011. CO- Tang, Chris H. Kim, DEN LNCSD9. ISBN 3- and Keshab K. Parhi. 642-25512-4. ISSN 0302- Beat frequency detector- 9743 (print), 1611-3349 based high-speed true ran- (electronic). URL http:/ dom number generators: /www.springerlink.com/ Statistical modeling and content/978-3-642-25512- analysis. ACM Jour- 0. REFERENCES 413

Li:2016:LRC protection of trajectory datasets with nearest- [LTZY16] Jiguo Li, Meilin Teng, neighbor preservation. VLDB Yichen Zhang, and Qihong Journal: Very Large Data Yu. A leakage-resilient Bases, 19(4):531–556, Au- CCA-secure identity-based gust 2010. CODEN encryption scheme. The VLDBFR. ISSN 1066-8888 Computer Journal, 59(7): (print), 0949-877X (elec- 1066–1075, July 2016. CO- tronic). DEN CMPJA6. ISSN 0010-4620 (print), 1460- Lafitte:2011:CBF 2067 (electronic). URL [LVV11] Fr´ed´eric Lafitte, Dirk Van http://comjnl.oxfordjournals. Heule, and Julien Van org/content/59/7/1066. hamme. Cryptographic Ludge:2012:NLD Boolean functions with R. The R Journal, 3(1):44– [L¨ud12] Kathy L¨udge, editor. Non- 47, June 2011. CODEN linear laser dynamics: ???? ISSN 2073-4859. from quantum dots to cryp- URL http://journal. tography. References in r-project.org/archive/ nonlinear dynamics and 2011-1/RJournal_2011- complexity. Wiley-VCH, 1_Lafitte~et~al.pdf. Weinheim, 2012. ISBN 3-527-41100-3 (hardcover), Liu:2010:CIE 3-527-63984-5 (ePDF), 3- 527-63982-9 (oBook), 3- [LW10] Hongjun Liu and Xingyuan 527-63983-7 (ePub), 3-527- Wang. Color image en- 63985-3 (Mobi). xx + cryption based on one- 387 pp. LCCN QC688 time keys and robust .N66 2012; QC689.55.S45 chaotic maps. Comput- N665 2012. URL http: ers and Mathematics with //www.loc.gov/catdir/ Applications, 59(10):3320– enhancements/fy1403/2012360633- 3327, May 2010. CODEN b.html; http://www. CMAPDK. ISSN 0898- loc.gov/catdir/enhancements/ 1221 (print), 1873-7668 fy1403/2012360633-d.html; (electronic). URL http:// http://www.loc.gov/catdir/ www.sciencedirect.com/ enhancements/fy1403/2012360633- science/article/pii/S0898122110001938. t.html. Lee:2011:ACA Lucchese:2010:RPT [LW11a] Dong Hoon Lee and Xi- [LVRY10] Claudio Lucchese, Michail aoyun Wang, editors. Ad- Vlachos, Deepak Rajan, vances in Cryptology — and Philip S. Yu. Rights ASIACRYPT 2011: 17th REFERENCES 414

International Conference http://link.springer. on the Theory and Applica- com/content/pdf/10.1007/ tion of Cryptology and In- 978-3-642-20465-4_30. formation Security, Seoul, Lewko:2012:NPM South Korea, December 4–8. Proceedings, volume [LW12] Allison Lewko and Brent 7073 of Lecture Notes in Waters. New proof meth- Computer Science. Spring- ods for attribute-based en- er-Verlag, Berlin, Ger- cryption: Achieving full many / Heidelberg, Ger- security through selec- many / London, UK / tive techniques. Lecture etc., 2011. CODEN Notes in Computer Sci- LNCSD9. ISBN 3-642- ence, 7417:180–198, 2012. 25384-9. ISSN 0302-9743 CODEN LNCSD9. ISSN (print), 1611-3349 (elec- 0302-9743 (print), 1611- tronic). URL http:/ 3349 (electronic). URL /www.springerlink.com/ http://link.springer. content/978-3-642-25384- com/chapter/10.1007/978- 3. 3-642-32009-5_12/. Lewko:2011:DAB Liu:2013:SIP [LW11b] Allison Lewko and Brent Waters. Decentralizing [LW13a] Dongxi Liu and Shenlu attribute-based encryp- Wang. Special issue pa- tion. Lecture Notes in pers: Nonlinear order pre- Computer Science, 6632: serving index for encrypted 568–588, 2011. CO- database query in service DEN LNCSD9. ISSN cloud environments. Con- 0302-9743 (print), 1611- currency and Computa- 3349 (electronic). URL tion: Practice and Expe- http://link.springer. rience, 25(13):1967–1984, com/content/pdf/10.1007/ September 10, 2013. CO- 978-3-642-20465-4_31. DEN CCPEBO. ISSN 1532-0626 (print), 1532- Lewko:2011:UHA 0634 (electronic).

[LW11c] Allison Lewko and Brent Liu:2013:TIE Waters. Unbounded HIBE and attribute-based en- [LW13b] Hongjun Liu and Xingyuan cryption. Lecture Notes in Wang. Triple-image en- Computer Science, 6632: cryption scheme based on 547–567, 2011. CO- one-time key stream gen- DEN LNCSD9. ISSN erated by chaos and plain 0302-9743 (print), 1611- images. The Journal of 3349 (electronic). URL Systems and Software,86 REFERENCES 415

(3):826–834, March 2013. 101(??):694–708, Decem- CODEN JSSODM. ISSN ber 2019. CODEN FG- 0164-1212 (print), 1873- SEVI. ISSN 0167-739X 1228 (electronic). URL (print), 1872-7115 (elec- http://www.sciencedirect. tronic). URL http:// com/science/article/pii/ www.sciencedirect.com/ S0164121212003196. science/article/pii/S0167739X19307642. Lui:2013:CBS Liu:2014:DAF [LW13c] Oi-Yan Lui and Kwok- [LWCJ14] Hongbo Liu, Hui Wang, Wo Wong. Chaos-based Yingying Chen, and Day- selective encryption for ong Jia. Defending against H.264/AVC. The Journal frequency-based attacks of Systems and Software, on distributed data stor- 86(12):3183–3192, Decem- age in wireless networks. ber 2013. CODEN JS- ACM Transactions on Sen- SODM. ISSN 0164-1212 sor Networks, 10(3):49:1– (print), 1873-1228 (elec- 49:??, April 2014. CO- tronic). URL http:// DEN ???? ISSN 1550-4859 www.sciencedirect.com/ (print), 1550-4867 (elec- science/article/pii/S0164121213001994. tronic). Liu:2016:PAB Liu:2017:EEC [LW16] Zhen Liu and Duncan S. Wong. Practical attribute- [LWHS17] Zhe Liu, Jian Weng, Zhi based encryption: Traitor Hu, and Hwajeong Seo. Ef- tracing, revocation and ficient elliptic curve cryp- large universe. The Com- tography for embedded de- puter Journal, 59(7):983– vices. ACM Transactions 1004, July 2016. CODEN on Embedded Computing CMPJA6. ISSN 0010-4620 Systems, 16(2):53:1–53:??, (print), 1460-2067 (elec- April 2017. CODEN ???? tronic). URL http:// ISSN 1539-9087 (print), comjnl.oxfordjournals. 1558-3465 (electronic). org/content/59/7/983. Liu:2011:SBA Li:2019:TFA [LWK11] Yu Liu, Kaijie Wu, and [LW19] Wenting Li and Ping Ramesh Karri. Scan-based Wang. Two-factor au- attacks on linear feedback thentication in industrial shift register based stream Internet-of-Things: At- ciphers. ACM Transactions tacks, evaluation and new on Design Automation of construction. Future Gen- Electronic Systems, 16(2): eration Computer Systems, 20:1–20:??, March 2011. REFERENCES 416

CODEN ATASFO. ISSN Enes Pasalic. The higher- 1084-4309 (print), 1557- order meet-in-the-middle 7309 (electronic). attack and its application to the Camellia block ci- Li:2018:SCM pher. Lecture Notes in [LWK+18] Xiong Li, Fan Wu, Muham- Computer Science, 7668: mad Khurram Khan, Lili 244–264, 2012. CO- Xu, Jian Shen, and Minho DEN LNCSD9. ISSN Jo. A secure chaotic 0302-9743 (print), 1611- map-based remote au- 3349 (electronic). URL thentication scheme for http://link.springer. telecare medicine infor- com/chapter/10.1007/978- mation systems. Fu- 3-642-34931-7_15/. ture Generation Computer Systems, 84(??):149–159, Lu:2014:HOM July 2018. CODEN FG- SEVI. ISSN 0167-739X [LWKP14] Jiqiang Lu, Yongzhuang (print), 1872-7115 (elec- Wei, Jongsung Kim, and tronic). URL https:// Enes Pasalic. The higher- www.sciencedirect.com/ order meet-in-the-middle science/article/pii/S0167739X1730688X. attack and its application to the Camellia block ci- Li:2019:PSA pher. Theoretical Com- [LWK+19] Xiong Li, Fan Wu, Saru puter Science, 527(??):102– Kumari, Lili Xu, Arun Ku- 122, March 27, 2014. CO- mar Sangaiah, and Kim- DEN TCSCDI. ISSN 0304- Kwang Raymond Choo. A 3975 (print), 1879-2294 provably secure and anony- (electronic). URL http:// mous message authenti- www.sciencedirect.com/ cation scheme for smart science/article/pii/S0304397514000802. grids. Journal of Parallel and Distributed Comput- Liu:2010:NDC ing, 132(??):242–249, Oc- tober 2019. CODEN JPD- [LWL10a] Feng Liu, ChuanKun Wu, CER. ISSN 0743-7315 and XiJun Lin. A new (print), 1096-0848 (elec- definition of the contrast tronic). URL http:// of visual cryptography www.sciencedirect.com/ scheme. Information Pro- science/article/pii/S0743731517303064. cessing Letters, 110(7): Lu:2012:HOM 241–246, March 1, 2010. CODEN IFPLAT. ISSN [LWKP12] Jiqiang Lu, Yongzhuang 0020-0190 (print), 1872- Wei, Jongsung Kim, and 6119 (electronic). REFERENCES 417

Liu:2010:SET Applications, 34(5):1557– 1565, September 2011. CO- [LWL10b] Feng Liu, ChuanKun Wu, DEN JNCAF3. ISSN 1084- and XiJun Lin. Some ex- 8045 (print), 1095-8592 tensions on threshold vi- (electronic). URL http:// sual cryptography schemes. www.sciencedirect.com/ The Computer Journal, science/article/pii/S1084804510001621. 53(1):107–119, January 2010. CODEN CM- Liu:2016:NSC PJA6. ISSN 0010-4620 [LWML16] Fangfei Liu, Hao Wu, Ken- (print), 1460-2067 (elec- neth Mai, and Ruby B. tronic). URL http:// Lee. Newcache: Secure comjnl.oxfordjournals. cache architecture thwart- org/cgi/content/abstract/ ing cache side-channel at- 53/1/107; http://comjnl. tacks. IEEE Micro, oxfordjournals.org/cgi/ 36(5):8–16, September/ reprint/53/1/107. October 2016. CO- Liu:2017:SRG DEN IEMIDZ. ISSN 0272-1732 (print), 1937- [LWL+17] Jing Liu, Yunyun Wu, 4143 (electronic). URL Xuezheng Liu, Yunchun https://www.computer. Zhang, Gang Xue, Wei org/csdl/mags/mi/2016/ Zhou, and Shaowen Yao. 05/mmi2016050008-abs. On the (in)security of re- html. cent group key distribu- Lu:2012:MMA tion protocols. The Com- puter Journal, 60(4):507– [LWPF12] Jiqiang Lu, Yongzhuang 526, March 23, 2017. CO- Wei, Enes Pasalic, and DEN CMPJA6. ISSN Pierre-Alain Fouque. Meet- 0010-4620 (print), 1460- in-the-middle attack on 2067 (electronic). URL reduced versions of the https://academic.oup. Camellia block cipher. com/comjnl/article/60/ Lecture Notes in Com- 4/507/2608062. puter Science, 7631:197– Liu:2011:PIA 215, 2012. CODEN LNCSD9. ISSN 0302-9743 [LWLW11] Guangjie Liu, Junwen (print), 1611-3349 (elec- Wang, Shiguo Lian, and tronic). URL http:// Zhiquan Wang. A pas- link.springer.com/chapter/ sive image authentica- 10.1007/978-3-642-34117- tion scheme for detecting 5_13/. region-duplication forgery Li:2010:GCP with rotation. Journal of Network and Computer [LWS10] Hui Li, Chuan-Kun Wu, REFERENCES 418

and Jun Sun. A gen- Wang, and Ming Yang. eral compiler for password- An interval centroid based authenticated group key spread spectrum water- exchange protocol. In- marking scheme for multi- formation Processing Let- flow traceback. Journal ters, 110(4):160–167, Jan- of Network and Computer uary 16, 2010. CODEN Applications, 35(1):60–71, IFPLAT. ISSN 0020-0190 January 2012. CODEN (print), 1872-6119 (elec- JNCAF3. ISSN 1084-8045 tronic). (print), 1095-8592 (elec- tronic). URL http:// Lou:2010:NAS www.sciencedirect.com/ . [LWW+10] Der-Chyuan Lou, Nan-I science/article/pii/S1084804511000579 Wu, Chung-Ming Wang, Li:2016:DDA Zong-Han Lin, and Chwei- Shyong Tsai. A novel adap- [LWYM16] Xinghua Li, Ermeng Wang, tive steganography based Weidong Yang, and Jian- on local complexity and hu- feng Ma. DALP: a demand- man vision sensitivity. The aware location privacy pro- Journal of Systems and tection scheme in continu- Software, 83(7):1236–1248, ous location-based services. July 2010. CODEN JS- Concurrency and Compu- SODM. ISSN 0164-1212. tation: Practice and Ex- Li:2019:VCM perience, 28(4):1219–1236, March 25, 2016. CODEN [LWW+19] Jing Li, Licheng Wang, Li- CCPEBO. ISSN 1532-0626 hua Wang, Xianmin Wang, (print), 1532-0634 (elec- Zhengan Huang, and Jin tronic). Li. Verifiable Chebyshev maps-based chaotic en- Li:2012:IIA cryption schemes with out- [LWZ12] Yanjun Li, Wenling Wu, sourcing computations in and Lei Zhang. Im- the cloud/fog scenarios. proved integral attacks Concurrency and Compu- on reduced-round CLE- tation: Practice and Ex- FIA block cipher. Lec- perience, 31(22):e4523:1– ture Notes in Computer e4523:??, November 25, Science, 7115:28–39, 2012. 2019. CODEN CCPEBO. CODEN LNCSD9. ISSN ISSN 1532-0626 (print), 0302-9743 (print), 1611- 1532-0634 (electronic). 3349 (electronic). URL Luo:2012:ICB http://link.springer. com/chapter/10.1007/978- [LWY12] Junzhou Luo, Xiaogang 3-642-27890-7_3/. REFERENCES 419

Lin:2010:DSM Li:2014:EMK [LXK+14] Ruixuan Li, Zhiyong Xu, [LWZG10] Dai-Rui Lin, Chih-I Wang, Wanshang Kang, Kin Choong Zhi-Kai Zhang, and D. J. Yow, and Cheng-Zhong Guan. A digital signa- Xu. Efficient multi- ture with multiple sub- keyword ranked query over liminal channels and its encrypted data in cloud applications. Comput- computing. Future Gen- ers and Mathematics with eration Computer Sys- Applications, 60(2):276– tems, 30(??):179–190, Jan- 284, July 2010. CODEN uary 2014. CODEN FG- CMAPDK. ISSN 0898- 1221 (print), 1873-7668 SEVI. ISSN 0167-739X (print), 1872-7115 (elec- (electronic). URL http:// tronic). URL http:// www.sciencedirect.com/ science/article/pii/S089812211000012X. www.sciencedirect.com/ science/article/pii/S0167739X1300143X. Li:2011:NIW Lai:2012:RHB

[LXCM11] Li Li, He-Huan Xu, Chin- [LXLY12] Hong Lai, Jinghua Xiao, Chen Chang, and Ying- Lixiang Li, and Yixian Ying Ma. A novel im- Yang. Recursive hiding age watermarking in redis- of biometrics-based secret tributed invariant wavelet sharing scheme using ad- domain. The Journal versary structure. Informa- of Systems and Software, tion Processing Letters, 112 84(6):923–929, June 2011. (17–18):683–687, Septem- CODEN JSSODM. ISSN ber 30, 2012. CODEN IF- 0164-1212. PLAT. ISSN 0020-0190 (print), 1872-6119 (elec- Li:2014:IBD tronic). URL http:// www.sciencedirect.com/ [LXJ14] Fagen Li, Pan Xiong, and science/article/pii/S0020019012001573. Chunhua Jin. Identity- Li:2012:ESD based deniable authenti- cation for ad hoc net- [LXMW12] Xiong Li, Yongping Xiong, works. Computing, 96(9): Jian Ma, and Wendong 843–853, September 2014. Wang. An efficient and CODEN CMPTA2. ISSN security dynamic iden- 0010-485X (print), 1436- tity based authentication 5057 (electronic). URL protocol for multi-server http://link.springer. architecture using smart com/article/10.1007/s00607- cards. Journal of Net- 013-0321-5. work and Computer Ap- REFERENCES 420

plications, 35(2):763–769, tributed Systems, 27(1):92– March 2012. CODEN JN- 105, January 2016. CO- CAF3. ISSN 1084-8045 DEN ITDSEO. ISSN 1045- (print), 1095-8592 (elec- 9219 (print), 1558-2183 tronic). URL http:// (electronic). URL http:// www.sciencedirect.com/ www.computer.org/csdl/ science/article/pii/S1084804511002244. trans/td/2016/01/07004049- abs.html. Luo:2014:ARP Li:2010:AFF [LY14] Jia Ning Luo and Ming Hour [LYC+10] Peng Li, Xin Yang, Kai Yang. An anonymous e- Cao, Xunqiang Tao, Ruifang rental protocol based on Wang, and Jie Tian. An ID-based cryptography and alignment-free fingerprint NFC. The Journal of cryptosystem based on Supercomputing, 70(1):31– fuzzy vault scheme. Jour- 53, October 2014. CO- nal of Network and Com- DEN JOSUED. ISSN puter Applications, 33(3): 0920-8542 (print), 1573- 207–220, May 2010. CO- 0484 (electronic). URL DEN JNCAF3. ISSN 1084- http://link.springer. 8045 (print), 1095-8592 com/article/10.1007/s11227- (electronic). URL http:// 013-1051-3. www.sciencedirect.com/ Liu:2015:SDS science/article/pii/S1084804509001398. [LY15] Chen Liu and Chengmo Liu:2018:IMM Yang. Secure and durable [LYD+18] Ya Liu, Anren Yang, (SEDURA): an integrated Bo Dai, Wei Li, Zhiqiang encryption and wear-leveling Liu, Dawu Gu, and framework for PCM-based Zhiqiang Zeng. Improved main memory. ACM SIG- meet-in-the middle attacks PLAN Notices, 50(5):12:1– on reduced-round TWINE- 12:??, May 2015. CODEN 128. The Computer Jour- SINODQ. ISSN 0362-1340 nal, 61(8):1252–1258, Au- (print), 1523-2867 (print), gust 1, 2018. CODEN 1558-1160 (electronic). CMPJA6. ISSN 0010-4620 Lim:2016:AKE (print), 1460-2067 (elec- tronic). URL http:// [LY16] Hoon Wei Lim and Guomin academic.oup.com/comjnl/ Yang. Authenticated key article/61/8/1252/5040794. exchange protocols for Lu:2014:DAN parallel network file sys- tems. IEEE Transac- [LYHH14] Jiqiang Lu, Wun-She Yap, tions on Parallel and Dis- Matt Henricksen, and REFERENCES 421

Swee-Huay Heng. Differen- uation and improvement of tial attack on nine rounds a white-box SMS4 imple- of the SEED block ci- mentation based on affine pher. Information Process- equivalence algorithm. The ing Letters, 114(3):116– Computer Journal, 61(12): 123, March 2014. CODEN 1783–1790, December 1, IFPLAT. ISSN 0020-0190 2018. CODEN CM- (print), 1872-6119 (elec- PJA6. ISSN 0010-4620 tronic). URL http:// (print), 1460-2067 (elec- www.sciencedirect.com/ tronic). URL http:// science/article/pii/S002001901300272X. academic.oup.com/comjnl/ article/61/12/1783/5055352. Le:2019:ADF Li:2010:ESS [LYK19] D. Le, S. L. Yeo, and K. Khoo. Algebraic differ- [LYW+10] Chung Ki Li, Guomin ential fault analysis on SI- Yang, Duncan S. Wong, Xi- MON block cipher. IEEE aotie Deng, and Sherman Transactions on Com- S. M. Chow. An efficient puters, 68(11):1561–1572, signcryption scheme with November 2019. CODEN key privacy and its exten- ITCOB4. ISSN 0018-9340 sion to ring signcryption. (print), 1557-9956 (elec- Journal of Computer Se- tronic). curity, 18(3):451–473, ???? 2010. CODEN JCSIET. Liu:2015:SAA ISSN 0926-227X (print), [LYL15] Zhusong Liu, Hongyang 1875-8924 (electronic). Yan, and Zhike Li. Server- Liao:2012:NSM aided anonymous attribute- based authentication in [LyWlZZ12] Xin Liao, Qiao yan Wen, cloud computing. Fu- Ze li Zhao, and Jie Zhang. ture Generation Com- A novel steganographic puter Systems, 52(??):61– method with four-pixel 66, November 2015. CO- differencing and modu- DEN FGSEVI. ISSN 0167- lus function. Fundamenta 739X (print), 1872-7115 Informaticae, 118(3):281– (electronic). URL http:// 289, August 2012. CODEN www.sciencedirect.com/ FUMAAJ. ISSN 0169-2968 science/article/pii/S0167739X14002544. (print), 1875-8681 (elec- tronic). Lin:2018:SEI Liao:2010:MPC [LYL+18] Tingting Lin, Hailun Yan, Xuejia Lai, Yixin Zhong, [LyWSZ10] Xin Liao, Qiao yan Wen, and Yin Jia. Security eval- Ying Sun, and Jie Zhang. REFERENCES 422

Multi-party covert commu- Lai:2018:NSH nication with steganogra- + phy and quantum secret [LYY 18a] Qiqi Lai, Bo Yang, Yong sharing. The Journal Yu, Yuan Chen, and Jian of Systems and Software, Bai. Novel smooth hash 83(10):1801–1804, October proof systems based on lat- 2010. CODEN JSSODM. tices. The Computer Jour- ISSN 0164-1212. nal, 61(4):561–574, April 1, 2018. CODEN CM- Lai:2019:NIB PJA6. ISSN 0010-4620

+ (print), 1460-2067 (elec- [LYX 19] Qiqi Lai, Bo Yang, Zhe tronic). URL http:// Xia, Yannan Li, Yuan academic.oup.com/comjnl/ Chen, and Zhenlong Li. article/61/4/561/4725104. Novel identity-based hash proof system with com- Liu:2018:SKR pact master public key [LYY+18b] Jinhui Liu, Yong Yu, from lattices in the stan- Bo Yang, Jianwei Jia, Shi- dard model. Interna- jia Wang, and Houzhen tional Journal of Foun- Wang. Structural key re- dations of Computer Sci- covery of simple matrix ence (IJFCS), 30(4):589– encryption scheme family. 606, June 2019. ISSN The Computer Journal,61 0129-0541. URL https: (12):1880–1896, December //www.worldscientific. 1, 2018. CODEN CM- com/doi/10.1142/S0129054119400148. PJA6. ISSN 0010-4620 Liu:2016:FIT (print), 1460-2067 (elec- tronic). URL http:// [LYY+16] Joseph K. Liu, Sze Ling academic.oup.com/comjnl/ Yeo, Wun-She Yap, Sher- article/61/12/1880/5110544. man S. M. Chow, Dun- Li:2013:SSS can S. Wong, and Willy Susilo. Faulty instanti- [LYZ+13] Ming Li, Shucheng Yu, Yao ations of threshold ring Zheng, Kui Ren, and Wen- signature from threshold jing Lou. Scalable and se- proof-of-knowledge proto- cure sharing of personal col. The Computer Jour- health records in cloud nal, 59(7):945–954, July computing using attribute- 2016. CODEN CM- based encryption. IEEE PJA6. ISSN 0010-4620 Transactions on Paral- (print), 1460-2067 (elec- lel and Distributed Sys- tronic). URL http:// tems, 24(1):131–143, Jan- comjnl.oxfordjournals. uary 2013. CODEN ITD- org/content/59/7/945. SEO. ISSN 1045-9219. REFERENCES 423

Leng:2011:DKB 3349 (electronic). URL http://link.springer. [LZ11] Lu Leng and Jiashu Zhang. com/chapter/10.1007/978- Dual-key-binding cance- 3-642-31439-1_13/. lable palmprint cryptosys- tem for palmprint protec- Liu:2014:PKE tion and information se- [LZC14] Shengli Liu, Fangguo curity. Journal of Net- Zhang, and Kefei Chen. work and Computer Appli- Public-key encryption scheme cations, 34(6):1979–1989, with selective opening November 2011. CODEN chosen-ciphertext security JNCAF3. ISSN 1084-8045 based on the Decisional (print), 1095-8592 (elec- Diffie–Hellman assump- tronic). URL http:// tion. Concurrency and www.sciencedirect.com/ Computation: Practice and science/article/pii/S1084804511001287. Experience, 26(8):1506– Liu:2012:SOCa 1519, June 10, 2014. CO- DEN CCPEBO. ISSN [LZC12a] Shengli Liu, Fangguo 1532-0626 (print), 1532- Zhang, and Kefei Chen. Se- 0634 (electronic). lective opening chosen ci- phertext security directly Liu:2017:ESS from the DDH assump- tion. Lecture Notes in [LZC17] Chang Liu, Liehuang Zhu, Computer Science, 7645: and Jinjun Chen. Efficient 100–112, 2012. CO- searchable symmetric en- DEN LNCSD9. ISSN cryption for storing multi- 0302-9743 (print), 1611- ple source dynamic social 3349 (electronic). URL data on cloud. Journal http://link.springer. of Network and Computer com/chapter/10.1007/978- Applications, 86(??):3–14, 3-642-34601-9_8/. May 15, 2017. CODEN JNCAF3. ISSN 1084-8045 Luo:2012:LVT (print), 1095-8592 (elec- [LZC+12b] Yong Luo, Yan Zhao, Lei tronic). URL http:// Cheng, Jianxin Wang, and www.sciencedirect.com/ Xuchong Liu. Lossless visi- science/article/pii/S108480451630217X. ble three-dimensional wa- Liu:2014:CRA termark of digital eleva- tion model data. Lecture [LZCK14] Jingwei Liu, Zonghua Notes in Computer Sci- Zhang, Xiaofeng Chen, and ence, 7220:138–147, 2012. Kyung Sup Kwak. Certifi- CODEN LNCSD9. ISSN cateless remote anonymous 0302-9743 (print), 1611- authentication schemes for REFERENCES 424

wireless body area net- Zhang, Abdurahman Kadir, works. IEEE Transac- and Yanqiu Xu. Image tions on Parallel and Dis- encryption using complex tributed Systems, 25(2): hyper chaotic system by 332–342, February 2014. injecting impulse into pa- CODEN ITDSEO. ISSN rameters. Applied Mathe- 1045-9219 (print), 1558- matics and Computation, 2183 (electronic). 360(??):83–93, Novem- ber 1, 2019. CODEN Li:2019:APA AMHCBQ. ISSN 0096- [LZD+19] JiLiang Li, WeiGuo Zhang, 3003 (print), 1873-5649 Vivek Dabra, Kim-Kwang Ray- (electronic). URL https:/ mond Choo, Saru Kumari, /www.sciencedirect.com/ and Dieter Hogrefe. AEP- science/article/pii/S0096300319303807. PPA: an anonymous, effi- Li:2012:ESS cient and provably-secure privacy-preserving authen- [LZT12] Fagen Li, Mingwu Zhang, tication protocol for mo- and Tsuyoshi Takagi. Ef- bile services in smart ficient signcryption in the cities. Journal of Net- standard model. Concur- work and Computer Ap- rency and Computation: plications, 134(??):52–61, Practice and Experience, May 15, 2019. CODEN 24(17):1977–1989, Decem- JNCAF3. ISSN 1084-8045 ber 10, 2012. CODEN (print), 1095-8592 (elec- CCPEBO. ISSN 1532-0626 tronic). URL http:// (print), 1532-0634 (elec- www.sciencedirect.com/ tronic). science/article/pii/S1084804519300475. Li:2019:ESM Li:2010:PES [LZWZ19] Xingxin Li, Youwen Zhu, [LZJX10] C. H. Li, X. F. Zhang, Jian Wang, and Ji Zhang. H. Jin, and W. Xiang. Efficient and secure multi- E-passport EAC scheme dimensional geometric range based on Identity-Based query over encrypted data Cryptography. Information in cloud. Journal of Processing Letters, 111(1): Parallel and Distributed 26–30, December 15, 2010. Computing, 131(??):44–54, CODEN IFPLAT. ISSN September 2019. CODEN 0020-0190 (print), 1872- JPDCER. ISSN 0743-7315 6119 (electronic). (print), 1096-0848 (elec- Liu:2019:IEU tronic). URL http:// www.sciencedirect.com/ [LZKX19] Hongjun Liu, Yingqian science/article/pii/S0743731518306294. REFERENCES 425

Li:2016:BMA ???? ISSN 1389-1286 (print), 1872-7069 (elec- + [LZY 16] Fuxiang Li, Fucai Zhou, tronic). URL http:// Heqing Yuan, Zifeng Xu, www.sciencedirect.com/ and Qiang Wang. Bilinear- science/article/pii/S1389128618309885. map accumulator-based verifiable intersection op- Ma:2017:AEJ erations on encrypted data [Ma17a] Sha Ma. Authorized equi- in cloud. Concurrency and join for multiple data con- Computation: Practice and tributors in the PKC-based Experience, 28(11):3238– setting. The Computer 3253, August 10, 2016. Journal, 60(12):1822–1838, CODEN CCPEBO. ISSN December 1, 2017. CO- 1532-0626 (print), 1532- DEN CMPJA6. ISSN 0634 (electronic). 0010-4620 (print), 1460- Liu:2019:XBL 2067 (electronic). URL https://academic.oup. + [LZZ 19a] Weiqiang Liu, Lei Zhang, com/comjnl/article/60/ Zhengran Zhang, Chongyan 12/1822/3861973. Gu, Chenghua Wang, Maire O’neill, and Fab- Masdari:2017:STA rizio Lombardi. XOR- [MA17b] Mohammad Masdari and based low-cost reconfig- Safiyyeh Ahmadzadeh. A urable PUFs for IoT se- survey and taxonomy of curity. ACM Transactions the authentication schemes on Embedded Computing in Telecare Medicine Infor- Systems, 18(3):25:1–25:??, mation Systems. Journal June 2019. CODEN of Network and Computer ???? ISSN 1539-9087 Applications, 87(??):1–19, (print), 1558-3465 (elec- June 1, 2017. CODEN tronic). URL https:// JNCAF3. ISSN 1084-8045 dl.acm.org/ft_gateway. (print), 1095-8592 (elec- cfm?id=3274666. tronic). URL http:// Liu:2019:RAS www.sciencedirect.com/ [LZZ19b] Xin Liu, Ruisheng Zhang, science/article/pii/S1084804517300978. and Mingqi Zhao. A ro- MacCormick:2012:NAC bust authentication scheme with dynamic password for [Mac12] John MacCormick. Nine wireless body area net- algorithms that changed the works. Computer Networks future: the ingenious ideas (Amsterdam, Netherlands: that drive today’s comput- 1999), 161(??):220–234, ers. Princeton University October 9, 2019. CODEN Press, Princeton, NJ, USA, REFERENCES 426

2012. ISBN 0-691-14714-0 HMAC. ACM Trans- (hardcover), 0-691-15819- actions on Reconfigurable 3 (paperback). x + 2 Technology and Systems,5 + 219 pp. LCCN QA76 (1):2:1–2:??, March 2012. .M21453 2012. URL http: CODEN ???? ISSN 1936- //press.princeton.edu/ 7406 (print), 1936-7414 chapters/s9528.pdf; (electronic). http://www.jstor.org/ stable/10.2307/j.ctt7t71s. Moskowitz:2010:ITE With a foreword by Christo- [MAL10] I. S. Moskowitz, F. Ahmed, pher M. Bishop. and P. A. Lafferty. Infor- Macrakis:2014:PLS mation theoretic effects of JPEG compression on im- [Mac14] Kristie Macrakis. Prison- age steganography. Inter- ers, lovers, and spies: the national Journal of Com- story of invisible ink from puter Applications, 32(3): Herodotus to al-Qaeda. 318–327, 2010. ISSN 1206- Yale University Press, New 212X (print), 1925-7074 Haven, CT, USA, 2014. (electronic). URL https: ISBN 0-300-17925-1 (hard- //www.tandfonline.com/ cover). xiv + 377 pp. doi/full/10.2316/Journal. LCCN Z104.5 .M33 2014. 202.2010.3.202-2736. Maffeo:2016:UNC Malkin:2013:SCB [Maf16] Steven E. Maffeo. U.S. [Mal13] Tal Malkin. Secure compu- Navy codebreakers, lin- tation for big data. Lec- guists, and intelligence of- ture Notes in Computer ficers against Japan, 1910– Science, 7785:355, 2013. 1941: a biographical dictio- CODEN LNCSD9. ISSN nary. Rowan and Little- 0302-9743 (print), 1611- field, Lanham, MD, USA, 3349 (electronic). URL 2016. ISBN 1-4422-5563- http://link.springer. 3, 1-4422-5564-1 (e-book). com/accesspage/chapter/ LCCN D810.S7 M2535 10.1007/978-3-642-36594- 2015eb. 2_20?coverImageUrl=/static/ Michail:2012:EHT 0.8699/sites/link/images/ [MAK+12] Harris E. Michail, George S. abstract_cover_placeholder. Athanasiou, Vasilis Kele- png. fouras, George Theodor- Mangard:2013:KSL idis, and Costas E. Goutis. On the exploitation of [Man13] Stefan Mangard. Keeping a high-throughput SHA- secrets on low-cost chips. 256 FPGA design for IEEE Security & Privacy, REFERENCES 427

11(4):75–77, 2013. ISSN actions on Design Au- 1540-7993 (print), 1558- tomation of Electronic Sys- 4046 (electronic). tems, 22(1):11:1–11:??, De- cember 2016. CODEN Martin:2010:FWL ATASFO. ISSN 1084-4309 [Mar10a] Douglas Martin. Frank (print), 1557-7309 (elec- W. Lewis, master of the tronic). cryptic crossword, dies at Mashhadi:2017:NMS 98. New York Times,?? (??):??, December 3, 2010. [Mas17] Samaneh Mashhadi. New CODEN NYTIAO. ISSN multi-stage secret sharing 0362-4331 (print), 1542- in the standard model. 667X, 1553-8095. Information Processing Letters, 127(??):43–48, Martin:2010:PCC November 2017. CODEN [Mar10b] Luther Martin. Protect- IFPLAT. ISSN 0020-0190 ing credit card information: (print), 1872-6119 (elec- encryption vs tokenisation. tronic). URL http:// Network Security, 2010(6): www.sciencedirect.com/ 17–19, June 2010. CODEN science/article/pii/S0020019017301242. NTSCF5. ISSN 1353-4858 Matsuda:2014:IBP (print), 1872-9371 (elec- tronic). URL http:// [Mat14] Takahiro Matsuda. On www.sciencedirect.com/ the impossibility of bas- science/article/pii/S1353485810700842. ing public-coin one-way Martin:2010:XMA permutations on trapdoor permutations. Lecture [Mar10c] Luther Martin. XTS: a Notes in Computer Sci- mode of AES for encrypt- ence, 8349:265–290, 2014. ing hard disks. IEEE Se- CODEN LNCSD9. ISSN curity & Privacy, 8(3):68– 0302-9743 (print), 1611- 69, May/June 2010. CO- 3349 (electronic). URL DEN ???? ISSN 1540-7993 http://link.springer. (print), 1558-4046 (elec- com/chapter/10.1007/978- tronic). 3-642-54242-8_12/. Mazumdar:2016:CIS Matthiessen:2019:RCM [MAS16] Bodhisatwa Mazumdar, [Mat19] Dana Matthiessen. The Sk. Subidh Ali, and Ozgur rise of cryptographic metaphors Sinanoglu. A compact in Boyle and their use implementation of Salsa20 for the mechanical phi- and its vul- losophy. Studies in His- nerabilities. ACM Trans- tory and Philosophy of Sci- REFERENCES 428

ence Part A, 73(??):8–21, Milo:2011:FGB February 2019. CODEN SHPSB5. ISSN 0039-3681 [MBB11] Fabrizio Milo, Massimo (print), 1879-2510 (elec- Bernaschi, and Mauro tronic). URL http:// Bisson. A fast, GPU www.sciencedirect.com/ based, dictionary attack to science/article/pii/S0039368117302522. OpenPGP secret keyrings. The Journal of Systems Maurer:2012:CCN and Software, 84(12):2088– [Mau12] Ueli Maurer. Construc- 2096, December 2011. CO- tive cryptography — a new DEN JSSODM. ISSN paradigm for security def- 0164-1212 (print), 1873- initions and proofs. Lec- 1228 (electronic). URL ture Notes in Computer http://www.sciencedirect. Science, 6993:33–56, 2012. com/science/article/pii/ CODEN LNCSD9. ISSN S0164121211001270. 0302-9743 (print), 1611- Mao:2015:PUA 3349 (electronic). URL http://link.springer. [MBC15] Qian Mao, K. Bharanitha- com/chapter/10.1007/978- ran, and Chin-Chen Chang. 3-642-27375-9_3/. A proxy user authen- tication protocol using Mayron:2015:BAM source-based image mor- [May15] Liam M. Mayron. Biomet- phing. The Computer ric authentication on mo- Journal, 58(7):1573–1584, bile devices. IEEE Secu- July 2015. CODEN CM- rity & Privacy, 13(3):70– PJA6. ISSN 0010-4620 73, May/June 2015. CO- (print), 1460-2067 (elec- DEN ???? ISSN 1540-7993 tronic). URL http:// (print), 1558-4046 (elec- comjnl.oxfordjournals. tronic). URL http:// org/content/58/7/1573. www.computer.org/csdl/ Matias:2018:NNZ mags/sp/2015/03/msp2015030070- abs.html. [MBC+18] P. Matias, P. Barbosa, Mazurczyk:2013:VSD T. N. C. Cardoso, D. M. Campos, and D. F. Aranha. [Maz13] Wojciech Mazurczyk. VoIP NIZKCTF: A noninterac- steganography and its de- tive zero-knowledge capture- tection — a survey. ACM the-flag platform. IEEE Computing Surveys,46 Security & Privacy, 16(6): (2):20:1–20:??, November 42–51, November/December 2013. CODEN CMSVAN. 2018. ISSN 1540-7993 ISSN 0360-0300 (print), (print), 1558-4046 (elec- 1557-7341 (electronic). tronic). REFERENCES 429

Malone:2013:MOD 9087 (print), 1558-3465 (electronic). [MBF+13] C. V. Malone, E. J. Barkie, Mukhopadhyay:2011:PEA B. L. Fletcher, N. Wei, A. Keren, and A. Wyskida. [MC11] Debdeep Mukhopadhyay Mobile Optimized Digital and Dipanwita Roy Chowd- Identity (MODI): A frame- hury. A parallel effi- work for easier digital cer- cient architecture for large tificate use. IBM Jour- cryptographically robust nal of Research and De- n × k(k ≥ n/2) map- velopment, 57(6):9:1–9:11, pings. IEEE Transactions November–December 2013. on Computers, 60(3):375– CODEN IBMJAE. ISSN 385, March 2011. CODEN 0018-8646 (print), 2151- ITCOB4. ISSN 0018-9340 8556 (electronic). (print), 1557-9956 (elec- tronic). Migliore:2018:PPF Matula:2019:PCG [MBF18] Vincent Migliore, Guil- [MC19] David W. Matula and laume Bonnoron, and Car- Zizhen Chen. Precise and oline Fontaine. Practical concise graphical represen- parameters for somewhat tation of the natural num- homomorphic encryption bers. In Takagi et al. schemes on binary cir- [TBL19], pages 100–103. cuits. IEEE Transactions ISBN 1-72813-366-1. ISSN on Computers, 67(11): 1063-6889. 1550–1560, ???? 2018. CO- DEN ITCOB4. ISSN 0018- Madanayake:2012:BPS 9340 (print), 1557-9956 [MCDB12] H. L. P. Arjuna Madanayake, (electronic). URL https: R. J. Cintra, V. S. Dim- //ieeexplore.ieee.org/ itrov, and L. T. Bru- document/8302942/. ton. Block-parallel systolic- Massolino:2015:OSC array architecture for 2-D NTT-based fragile water- [MBR15] Pedro Maat C. Massolino, mark embedding. Parallel Paulo S. L. M. Barreto, Processing Letters, 22(3): and Wilson V. Ruggiero. 1250009, September 2012. Optimized and scalable co- CODEN PPLTEE. ISSN processor for McEliece with 0129-6264 (print), 1793- binary Goppa codes. ACM 642X (electronic). Transactions on Embed- McGrew:2017:IDH ded Computing Systems,14 (3):45:1–45:??, April 2015. [MCF17] Danile McGrew, M. Cur- CODEN ???? ISSN 1539- cio, and Scott Fluhrer. REFERENCES 430

Internet-draft: Hash-based codebreaking centre by the signatures. Internet Engi- men and women who were neering Task Force docu- there. Aurum, London, ment., 2017. URL http:/ UK, 2010. ISBN 1-84513- /datatracker.ietf.org/ 539-3 (hardcover). vi + 336 doc/draft-mcgrew-hash- + 8 pp. LCCN D810.C88 sigs. M35 2010x. McGrayne:2011:TWH McKay:2011:SLB

[McG11] Sharon Bertsch McGrayne. [McK11] Sinclair McKay. The se- The theory that would cret life of Bletchley Park: not die: how Bayes’ rule the history of the wartime cracked the Enigma code, codebreaking centre by the hunted down Russian sub- men and women who were marines, and emerged tri- there. Gardners Books, umphant from two cen- 2011. ISBN 1-84513-633-0. turies of controversy. Yale ???? pp. LCCN ???? University Press, New McKay:2012:SLC Haven, CT, USA, 2011. ISBN 0-300-16969-8. xiii [McK12] Sinclair McKay. The se- + 320 pp. LCCN cret lives of codebreakers: QA279.5 2011. URL the men and women who http://yalepress.yale. cracked the Enigma code edu/yupbooks/book.asp? at Bletchley Park. Plume, isbn=9780300169690. New York, NY, USA, 2012. McGraw:2016:SBTd ISBN 0-452-29871-7. vi + 338 pp. LCCN D810.C88 [McG16] Gary McGraw. Silver M39 2012. Bullet talks with Mar- tin Hellman. IEEE Se- Ma:2019:TOP curity & Privacy, 14(4): [MCL+19] Ziqiang Ma, Quanwei Cai, 7–11, July/August 2016. Jingqiang Lin, Bo Luo, and CODEN ???? ISSN Jiwu Jing. Towards the 1540-7993 (print), 1558- optimal performance of in- 4046 (electronic). URL tegrating Warm and Delay https://www.computer. against remote cache tim- org/csdl/mags/sp/2016/ ing side channels on block 04/msp2016040007.html. ciphers. Journal of Com- McKay:2010:SLB puter Security, 27(5):547– 580, ???? 2019. CODEN [McK10] Sinclair McKay. The se- JCSIET. ISSN 0926-227X cret life of Bletchley Park: (print), 1875-8924 (elec- the history of the wartime tronic). REFERENCES 431

Mahmood:2018:ECC (print), 1872-6208 (elec- tronic). URL https:// + [MCN 18] Khalid Mahmood, She- www.sciencedirect.com/ hzad Ashraf Chaudhry, science/article/pii/S0167404818306059. Husnain Naqvi, Saru Ku- mari, Xiong Li, and Mathew:2015:NMB Arun Kumar Sangaiah. An + elliptic curve cryptography [MCS 15] Jimson Mathew, Rajat Subhra based lightweight authen- Chakraborty, Durga Prasad tication scheme for smart Sahoo, Yuanfan Yang, grid communication. Fu- and Dhiraj K. Pradhan. ture Generation Computer A novel memristor-based Systems, 81(??):557–565, hardware security primi- April 2018. CODEN FG- tive. ACM Transactions SEVI. ISSN 0167-739X on Embedded Computing (print), 1872-7115 (elec- Systems, 14(3):60:1–60:??, tronic). URL http:// April 2015. CODEN ???? www.sciencedirect.com/ ISSN 1539-9087 (print), science/article/pii/S0167739X17309263. 1558-3465 (electronic). Marquez-Corbella:2015:ECP Majzoub:2012:MRH [MCP15] Irene M´arquez-Corbella [MD12a] Sohaib Majzoub and Has- and Ruud Pellikaan. Error- san Diab. MorphoSys re- correcting pairs: a new ap- configurable hardware for proach to code-based cryp- cryptography: the Twofish tography. ACM Communi- case. The Journal of cations in Computer Alge- Supercomputing, 59(1):22– bra, 49(1):21, March 2015. 41, January 2012. CO- CODEN ???? ISSN 1932- DEN JOSUED. ISSN 2232 (print), 1932-2240 0920-8542 (print), 1573- (electronic). 0484 (electronic). URL http://link.springer. Mhenni:2019:DSA com/article/10.1007/s11227- [MCRB19] Abir Mhenni, Estelle Cher- 010-0413-3. rier, Christophe Rosen- Mansouri:2012:ACA berger, and Najoua Es- soukri Ben Amara. Double [MD12b] Shohreh Sharif Mansouri serial adaptation mecha- and Elena Dubrova. An nism for keystroke dynam- architectural countermea- ics authentication based on sure against power analy- a single password. Comput- sis attacks for FSR-based ers & Security, 83(??):151– stream ciphers. Lecture 166, June 2019. CODEN Notes in Computer Sci- CPSEDU. ISSN 0167-4048 ence, 7275:54–68, 2012. REFERENCES 432

CODEN LNCSD9. ISSN efficient two-factor zero- 0302-9743 (print), 1611- knowledge authentication 3349 (electronic). URL solution for access control http://link.springer. systems. Computers & com/chapter/10.1007/978- Security, 77(??):500–513, 3-642-29912-4_5/. August 2018. CODEN CPSEDU. ISSN 0167-4048 Mansfield-Devine:2015:MIC (print), 1872-6208 (elec- [MD15] Steve Mansfield-Devine. tronic). URL https:// Managing identity for a www.sciencedirect.com/ competitive edge. Net- science/article/pii/S0167404818304942. work Security, 2015(1):14– Mosenia:2017:PTS 18, January 2015. CODEN NTSCF5. ISSN 1353-4858 [MDMJ17] Arsalan Mosenia, Xiao- (print), 1872-9371 (elec- liang Dai, Prateek Mittal, tronic). URL http:// and Niraj Jha. PinMe: www.sciencedirect.com/ Tracking a smartphone science/article/pii/S1353485815700103. user around the world. IEEE Transactions on Murdoch:2010:CPB Multi-Scale Computing Sys- tems, ??(??):1–17, ???? [MDAB10] Steven J. Murdoch, Saar 2017. ISSN 2332-7766. Drimer, Ross Anderson, and Mike Bond. Chip and Maachaoui:2012:MLA PIN is broken. In IEEE, [MEFO12] M. Maachaoui, A. Abou editor, 2010 IEEE Sym- El Kalam, C. Fraboul, posium on Security and and A. Ait Ouahman. Privacy, 16–19 May 2010, Multi-level authentication Oakland, CA, USA, pages based single sign-on for 433–446. IEEE Computer IMS services. Lecture Society Press, 1109 Spring Notes in Computer Sci- Street, Suite 300, Silver ence, 7394:174–187, 2012. Spring, MD 20910, USA, CODEN LNCSD9. ISSN 2010. ISBN 1-4244-6894- 0302-9743 (print), 1611- 9. ISSN 1081-6011. LCCN 3349 (electronic). URL ???? URL http://www. http://link.springer. cl.cam.ac.uk/~sjm217/ com/chapter/10.1007/978- papers/oakland10chipbroken. 3-642-32805-3_14/. pdf. Meiklejohn:2010:BRB Malina:2018:SET [Mei10] Sarah Meiklejohn. Book [MDHM18] Lukas Malina, Petr Dzurenda, review: An Introduction Jan Hajny, and Zdenek to Mathematical Cryptog- Martinasek. Secure and raphy, by Jeffrey Hoffstein, REFERENCES 433

Jill Pipher, and Joseph www.sciencedirect.com/ Silverman Springer-Verlag, science/article/pii/S0020019014002221. 2008. ACM SIGACT News, 41(4):47–50, De- Mandal:2016:DIW cember 2010. CODEN [MFG16] Kalikinkar Mandal, Xinxin SIGNDM. ISSN 0163-5700 Fan, and Guang Gong. (print), 1943-5827 (elec- Design and implementa- tronic). See [HPS08]. tion of Warbler family of lightweight pseudoran- Menezes:2013:IPB dom number generators [Men13a] Alfred Menezes. An in- for smart devices. ACM troduction to pairing-based Transactions on Embedded cryptography. Report, De- Computing Systems, 15(1): partment of Mathemat- 1:1–1:??, February 2016. ics, University of Wa- CODEN ???? ISSN 1539- terloo, Waterloo, ON, 9087 (print), 1558-3465 Canada, October 27, 2013. (electronic). 19 pp. URL https:// Moreno:2013:NIP www.math.uwaterloo.ca/ ~ajmeneze/publications/ [MFH13] Carlos Moreno, Sebas- pairings.pdf. tian Fischmeister, and M. Anwar Hasan. Non- Menn:2013:ESC intrusive program trac- ing and debugging of de- [Men13b] Joseph Menn. Exclusive: ployed embedded systems Secret contract tied NSA through side-channel anal- and security industry pio- ysis. ACM SIGPLAN No- neer. Reuters, December tices, 48(5):77–88, May 13, 2013. 2013. CODEN SINODQ. ISSN 0362-1340 (print), Meshram:2015:EIB 1523-2867 (print), 1558- [Mes15] Chandrashekhar Meshram. 1160 (electronic). An efficient ID-based cryp- Moufek:2015:MCB tographic encryption based on discrete logarithm prob- [MG15] Hamza Moufek and Kenza lem and integer factor- Guenda. McEliece cryp- ization problem. Infor- tosystem based on punc- mation Processing Letters, tured convolutional codes 115(2):351–358, Febru- and the pseudo-random ary 2015. CODEN IF- generators. ACM Com- PLAT. ISSN 0020-0190 munications in Computer (print), 1872-6119 (elec- Algebra, 49(1):21, March tronic). URL http:// 2015. CODEN ???? ISSN REFERENCES 434

1932-2232 (print), 1932- Marmol:2010:TPA 2240 (electronic). [MGP10] F´elix G´omez M´armol, Mukherjee:2019:EBV Joao Girao, and Gre- gorio Mart´ınez P´erez. [MGB19] Sankar Mukherjee, Daya Sagar TRIMS, a privacy-aware Gupta, and G. P. Biswas. trust and reputation model An efficient and batch veri- for identity management fiable conditional privacy- systems. Computer Net- preserving authentication works (Amsterdam, Nether- scheme for VANETs using lands: 1999), 54(16):2899– lattice. Computing, 101 2912, November 15, 2010. (12):1763–1788, December CODEN ???? ISSN 1389- 2019. CODEN CMPTA2. 1286. ISSN 0010-485X (print), Matsuda:2014:CCS 1436-5057 (electronic). [MH14] Takahiro Matsuda and Misoczki:2019:TPS Goichiro Hanaoka. Cho- sen ciphertext security via [MGG+19] R. Misoczki, S. Gulley, point obfuscation. Lecture V. Gopal, M. G. Dixon, Notes in Computer Sci- H. Vrsalovic, and W. K. ence, 8349:95–120, 2014. Feghali. Toward postquan- CODEN LNCSD9. ISSN tum security for embedded 0302-9743 (print), 1611- cores. IEEE Micro, 39(4): 3349 (electronic). URL 17–26, July/August 2019. http://link.springer. CODEN IEMIDZ. ISSN com/chapter/10.1007/978- 0272-1732 (print), 1937- 3-642-54242-8_5/. 4143 (electronic). Meloni:2016:RDR

Meng:2019:SDD [MH16] Nicolas M´eloni and M. An- war Hasan. Random [MGJ19] Wenjuan Meng, Jianhua digit representation of in- Ge, and Tao Jiang. Se- tegers. In Montuschi et al. + cure data deduplication [MSH 16], pages 118– with reliable data dele- 125. ISBN 1-5090-1615-5. tion in cloud. Interna- ISSN 1063-6889. LCCN tional Journal of Foun- QA76.9.C62 S95 2016. dations of Computer Sci- URL http://ieeexplore. ence (IJFCS), 30(4):551– ieee.org/servlet/opac? 570, June 2019. ISSN punumber=7562813. 0129-0541. URL https: Meziani:2012:IPS //www.worldscientific. com/doi/10.1142/S0129054119400124[MHC12]. Mohammed Meziani, Ger- REFERENCES 435

hard Hoffmann, and Pierre- Munoz-Hernandez:2016:EES Louis Cayrel. Improv- ing the performance of [MHMSGH16] Mario Diego Munoz-Hernandez, the SYND stream ci- Miguel Morales-Sandoval, pher. Lecture Notes in and Jose Juan Garcia- Computer Science, 7374: Hernandez. An end-to- 99–116, 2012. CO- end security approach for DEN LNCSD9. ISSN digital document manage- 0302-9743 (print), 1611- ment. The Computer 3349 (electronic). URL Journal, 59(7):1076–1090, http://link.springer. July 2016. CODEN CM- com/chapter/10.1007/978- PJA6. ISSN 0010-4620 3-642-31410-0_7/. (print), 1460-2067 (elec- tronic). URL http:// Miller:2014:ADS comjnl.oxfordjournals. org/content/59/7/1076.

[MHKS14] Andrew Miller, Michael Mou:2013:CBC Hicks, Jonathan Katz, [MHT+13] Luntian Mou, Tiejun and Elaine Shi. Authen- Huang, Yonghong Tian, ticated data structures, Menglin Jiang, and Wen generically. ACM SIG- Gao. Content-based copy PLAN Notices, 49(1):411– detection through multi- 423, January 2014. CO- modal feature representa- DEN SINODQ. ISSN 0362- tion and temporal pyramid 1340 (print), 1523-2867 matching. ACM Transac- (print), 1558-1160 (elec- tions on Multimedia Com- tronic). POPL ’14 confer- puting, Communications, ence proceedings. and Applications, 10(1): 5:1–5:??, December 2013. Mo:2018:RUA CODEN ???? ISSN 1551- 6857 (print), 1551-6865 [MHL18] Jiaqing Mo, Zhongwang (electronic). Hu, and Yuhua Lin. Re- Mohd:2015:SLB mote user authentication and key agreement for mo- [MHV15] Bassam J. Mohd, Thaier bile client-server environ- Hayajneh, and Athana- ments on elliptic curve sios V. Vasilakos. A sur- cryptography. The Jour- vey on lightweight block ci- nal of Supercomputing,74 phers for low-resource de- (11):5927–5943, November vices: Comparative study 2018. CODEN JOSUED. and open issues. Journal ISSN 0920-8542 (print), of Network and Computer 1573-0484 (electronic). Applications, 58(??):73–93, REFERENCES 436

December 2015. CODEN Micciancio:2010:FGC JNCAF3. ISSN 1084-8045 (print), 1095-8592 (elec- [Mic10a] Daniele Micciancio. A first tronic). URL http:// glimpse of cryptography’s www.sciencedirect.com/ Holy Grail. Communica- science/article/pii/S1084804515002076. tions of the Association for Computing Machinery,53 Ma:2019:PFC (3):96, March 2010. CO- DEN CACMA2. ISSN [MHW+19] Ruijun Ma, Haifeng Hu, 0001-0782 (print), 1557- Weixuan Wang, Jia Xu, 7317 (electronic). and Zhengming Li. Pho- torealistic face comple- Michiels:2010:OWB tion with semantic pars- ing and face identity- [Mic10b] Wil Michiels. Opportuni- preserving features. ACM ties in white-box cryptog- Transactions on Multi- raphy. IEEE Security & media Computing, Com- Privacy, 8(1):64–67, Jan- munications, and Appli- uary/February 2010. ISSN cations, 15(1):28:1–28:??, 1540-7993 (print), 1558- February 2019. CODEN 4046 (electronic). ???? ISSN 1551-6857 (print), 1551-6865 (elec- Michael:2016:RNI tronic). URL https:// dl.acm.org/ft_gateway. [Mic16] K. Michael. RFID/NFC . cfm?id=3300940 implants for Bitcoin trans- Mohd:2018:HDM actions. IEEE Consumer Electronics Magazine, 5(3): [MHY+18] Bassam Jamil Mohd, Thaier 103–106, July 2016. ISSN Hayajneh, Khalil M. Ah- 2162-2248 (print), 2162- mad Yousef, Zaid Abu 2256 (electronic). Khalaf, and Md Za- kirul Alam Bhuiyan. Hard- Midgley:2010:SEE ware design and modeling of lightweight block ciphers [Mid10] Stephen Midgley. The state for secure communications. of encryption in Europe: Future Generation Com- some cultural comparisons. puter Systems, 83(??):510– Network Security, 2010(8): 521, June 2018. CODEN 18–19, August 2010. CO- FGSEVI. ISSN 0167-739X DEN NTSCF5. ISSN 1353- (print), 1872-7115 (elec- 4858 (print), 1872-9371 tronic). URL https:// (electronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0167739X17304661. science/article/pii/S1353485810701070. REFERENCES 437

Martinez-Julia:2012:NIB DEN ???? ISSN 1550-4859 (print), 1550-4867 (elec- [MJGS12] P. Martinez-Julia and A. F. tronic). URL https:// G´omez-Skarmeta. A novel dl.acm.org/ft_gateway. identity-based network ar- cfm?id=3277505. chitecture for next gener- ation Internet. J.UCS: Memon:2018:TFS Journal of Universal Com- [MJW+18] Shiraz Memon, Jensen puter Science, 18(12): Jens, Elbers Willem, Hel- 1643–??, ???? 2012. CO- mut Neukirchen, Matthias DEN ???? ISSN 0948- Book, and Morris Riedel. 6968. URL http://www. Towards federated ser- jucs.org/jucs_18_12/a_ vice discovery and iden- novel_identity_based. tity management in col- Martinez-Julia:2013:BSI laborative data and com- pute cloud infrastruc- [MJS13] Pedro Martinez-Julia and tures. Journal of Grid Antonio F. Skarmeta. Be- Computing, 16(4):663–681, yond the separation of December 2018. CO- identifier and locator: DEN ???? ISSN Building an identity-based 1570-7873 (print), 1572- overlay network architec- 9184 (electronic). URL ture for the Future Inter- https://link.springer. net. Computer Networks com/article/10.1007/s10723- (Amsterdam, Netherlands: 018-9445-3. 1999), 57(10):2280–2300, Mohanty:2011:RTP July 5, 2013. CODEN ???? ISSN 1389-1286 [MK11] Saraju P. Mohanty and (print), 1872-7069 (elec- Elias Kougianos. Real- tronic). URL http:// time perceptual water- www.sciencedirect.com/ marking architectures for science/article/pii/S1389128613000066. video broadcasting. The Miao:2019:PPT Journal of Systems and Software, 84(5):724–738, [MJS+19] Chenglin Miao, Wenjun May 2011. CODEN JS- Jiang, Lu Su, Yaliang Li, SODM. ISSN 0164-1212. Suxin Guo, Zhan Qin, Moessner:2012:SAS Houping Xiao, Jing Gao, and Kui Ren. Privacy- [MK12a] M. Moessner and Gul N. preserving truth discovery Khan. Secure authenti- in crowd sensing systems. cation scheme for passive ACM Transactions on Sen- C1G2 RFID tags. Com- sor Networks, 15(1):9:1– puter Networks (Amster- 9:??, February 2019. CO- dam, Netherlands: 1999), REFERENCES 438

56(1):273–286, January tectures of hash-counter- 12, 2012. CODEN hash tweakable enciphering ???? ISSN 1389-1286 schemes. ACM Transac- (print), 1872-7069 (elec- tions on Embedded Com- tronic). URL http:// puting Systems, 17(2): www.sciencedirect.com/ 54:1–54:??, April 2018. science/article/pii/S1389128611003422. CODEN ???? ISSN 1539- 9087 (print), 1558-3465 Muller:2012:HPC (electronic).

[MK12b] Sascha M¨uller and Ste- McGrew:2016:SMH fan Katzenbeisser. Hiding the policy in cryptographic [MKF+16] Daniel McGrew, Panos access control. Lecture Kampanakis, Scott Fluhrer, Notes in Computer Sci- Stefan-Lukas Gazdag, De- ence, 7170:90–105, 2012. nis Butin, and Johannes CODEN LNCSD9. ISSN Buchmann. State manage- 0302-9743 (print), 1611- ment for hash-based sig- 3349 (electronic). URL natures. Lecture Notes in http://link.springer. Computer Science, 10074: com/chapter/10.1007/978- 244–260, 2016. CO- 3-642-29963-6_8/. DEN LNCSD9. ISSN Mozaffari-Kermani:2017:FDA 0302-9743 (print), 1611- 3349 (electronic). URL [MKAA17] Mehran Mozaffari-Kermani, https://link.springer. Reza Azarderakhsh, and com/chapter/10.1007/978- Anita Aghaie. Fault detec- 3-319-49100-4_11. tion architectures for post- Malik:2012:AIC quantum cryptographic stateless hash-based secure [MKH+12] Sana Ambreen Malik, Asi- signatures benchmarked on fullah Khan, Mutawarra ASIC. ACM Transactions Hussain, Khurram Jawad, on Embedded Computing Rafiullah Chamlawi, and Systems, 16(2):59:1–59:??, Abdul Jalil. Authenti- April 2017. CODEN ???? cation of images for 3D ISSN 1539-9087 (print), cameras: Reversibly em- 1558-3465 (electronic). bedding information us- Mozaffari-Kermani:2018:ERE ing intelligent approaches. The Journal of Systems [MKASJ18] Mehran Mozaffari-Kermani, and Software, 85(11):2665– Reza Azarderakhsh, Aus- 2673, November 2012. CO- mita Sarker, and Amir DEN JSSODM. ISSN Jalali. Efficient and reli- 0164-1212 (print), 1873- able error detection archi- 1228 (electronic). URL REFERENCES 439

http://www.sciencedirect. (electronic). URL http: com/science/article/pii/ //ieeexplore.ieee.org/ S0164121212001719. stamp/stamp.jsp?tp=&arnumber= Menesidou:2017:CKM 5406504. Montecchi:2012:QSE [MKK17] Sofia Anna Menesidou, Vasilios Katos, and Geor- [MLBL12] Leonardo Montecchi, Paolo gios Kambourakis. Cryp- Lollini, Andrea Bondavalli, tographic key management and Ernesto La Mat- in delay tolerant networks: tina. Quantitative se- a survey. Future Internet,9 curity evaluation of a (3):26, June 27, 2017. CO- multi-biometric authenti- DEN ???? ISSN 1999- cation system. Lecture 5903. URL https://www. Notes in Computer Sci- mdpi.com/1999-5903/9/ ence, 7613:209–221, 2012. 3/26. CODEN LNCSD9. ISSN Marconato:2013:VLC 0302-9743 (print), 1611- 3349 (electronic). URL [MKN13] G. Vache Marconato, M. Kaˆaniche, http://link.springer. and V. Nicomette. A com/chapter/10.1007/978- vulnerability life cycle- 3-642-33675-1_19/. based security model- Mancillas-Lopez:2010:RHI ing and evaluation ap- proach. The Computer [MLCH10] C. Mancillas-Lopez, D. Chakraborty, Journal, 56(4):422–439, and F. Rodriguez Hen- April 2013. CODEN CM- riquez. Reconfigurable PJA6. ISSN 0010-4620 hardware implementations (print), 1460-2067 (elec- of tweakable enciphering tronic). URL http:// schemes. IEEE Transac- comjnl.oxfordjournals. tions on Computers,59 org/content/56/4/422. (11):1547–1561, Novem- full.pdf+html. ber 2010. CODEN IT- Mozaffari-Kermani:2010:CSI COB4. ISSN 0018-9340 (print), 1557-9956 (elec- [MKRM10] M. Mozaffari-Kermani and tronic). URL http:/ A. Reyhani-Masoleh. Con- /ieeexplore.ieee.org/ current structure-independent stamp/stamp.jsp?tp=&arnumber= fault detection schemes for 5432161. the Advanced Encryption Mendez:2016:PES Standard. IEEE Transac- tions on Computers, 59(5): [MLM16] Alejandro P´erez M´endez, 608–622, May 2010. CO- Rafael Mar´ın L´opez, and DEN ITCOB4. ISSN 0018- Gabriel L´opez Mill´an. Pro- 9340 (print), 1557-9956 viding efficient SSO to REFERENCES 440

cloud service access in Madhusudhan:2012:DIB AAA-based identity feder- ations. Future Generation [MM12] R. Madhusudhan and R. C. Computer Systems, 58(??): Mittal. Dynamic ID-based 13–28, May 2016. CO- remote user password au- DEN FGSEVI. ISSN 0167- thentication schemes us- 739X (print), 1872-7115 ing smart cards: a re- (electronic). URL http:// view. Journal of Net- www.sciencedirect.com/ work and Computer Appli- science/article/pii/S0167739X15003854. cations, 35(4):1235–1248, July 2012. CODEN JN- Manzanares-Lopez:2012:ICU CAF3. ISSN 1084-8045 (print), 1095-8592 (elec- [MLMSMG12] Pilar Manzanares-Lopez, tronic). URL http:// Josemaria Malgosa-Sanahuja, www.sciencedirect.com/ and Juan Pedro Mu˜noz- science/article/pii/S1084804512000215. Gea. The importance Meshram:2013:IBC of considering unauthentic transactions in trust man- [MM13] Chandrashekhar Meshram agement systems. Journal and Suchitra A. Meshram. of Parallel and Distributed An identity-based cryp- Computing, 72(6):809–818, tographic model for dis- June 2012. CODEN JPD- crete logarithm and inte- CER. ISSN 0743-7315 ger factoring based cryp- (print), 1096-0848 (elec- tosystem. Information tronic). URL http:// Processing Letters, 113 www.sciencedirect.com/ (10–11):375–380, May/ science/article/pii/S0743731512000718. June 2013. CODEN IF- PLAT. ISSN 0020-0190 Ma:2017:LBI (print), 1872-6119 (elec- tronic). URL http:// [MLO17] Chunguang Ma, Juyan www.sciencedirect.com/ Li, and Weiping Ouyang. science/article/pii/S0020019013000550. Lattice-based identity-based Maity:2014:FIR homomorphic conditional proxy re-encryption for se- [MM14a] Hirak Kumar Maity and cure big data computing in Santi P. Maity. FPGA im- cloud environment. Inter- plementation of reversible national Journal of Foun- watermarking in digital im- dations of Computer Sci- ages using reversible con- ence (IJFCS), 28(6):645– trast mapping. The Jour- ??, September 2017. CO- nal of Systems and Soft- DEN IFCSEN. ISSN 0129- ware, 96(??):93–104, Oc- 0541. tober 2014. CODEN JS- REFERENCES 441

SODM. ISSN 0164-1212 Mulholland:2017:DCD (print), 1873-1228 (elec- tronic). URL http:// [MMB17] John Mulholland, Michele www.sciencedirect.com/ Mosca, and Johannes science/article/pii/S0164121214001393. Braun. The day the cryp- tography dies. IEEE Se- Mondal:2014:DSM curity & Privacy, 15(4): 14–21, July/August 2017. [MM14b] Subijit Mondal and Sub- CODEN ???? ISSN hashis Maitra. Data 1540-7993 (print), 1558- security-modified AES al- 4046 (electronic). URL gorithm and its applica- https://www.computer. tions. ACM SIGARCH org/csdl/mags/sp/2017/ Computer Architecture News, 04/msp2017040014-abs. 42(2):1–8, May 2014. CO- html. DEN CANED2. ISSN 0163-5964 (print), 1943- Martins:2019:HHR 5851 (electronic). [MMBS19] Paulo Martins, Jeremy Maity:2017:ODC Marrez, Jean-Claude Ba- jard, and Leonel Sousa. [MM17a] Santi P. Maity and Hi- HyPoRes: An hybrid rak Kumar Maity. Op- representation system for timality in distortion con- ECC. In Takagi et al. trol in reversible water- [TBL19], pages 207–214. marking using genetic algo- ISBN 1-72813-366-1. ISSN rithms. International Jour- 1063-6889. nal of Image and Graph- Merlo:2015:MEP ics (IJIG), 17(3):1750013, July 2017. CODEN ???? [MMF15] Alessio Merlo, Mauro ISSN 0219-4678. Migliardi, and Paolo Fontanelli. Measuring and estimating Mazumdar:2017:CRS power consumption in An- [MM17b] Bodhisatwa Mazumdar droid to support energy- and Debdeep Mukhopad- based intrusion detection. hyay. Construction of ro- Journal of Computer Se- tation symmetric S-boxes curity, 23(5):611–637, ???? with high nonlinearity and 2015. CODEN JCSIET. improved DPA resistiv- ISSN 0926-227X (print), ity. IEEE Transactions 1875-8924 (electronic). on Computers, 66(1):59– Mailloux:2016:PSS 72, January 2017. CODEN ITCOB4. ISSN 0018-9340 [MMKP16] Logan O. Mailloux, Michael A. (print), 1557-9956 (elec- McEvilley, Stephen Khou, tronic). and John M. Pecarina. REFERENCES 442

Putting the ‘Systems’ in lay Moldovyan, and Evge- security engineering: An nia Novikova. Blind 384-bit examination of NIST Spe- digital signature scheme. cial Publication 800-160. Lecture Notes in Computer IEEE Security & Privacy, Science, 7531:77–83, 2012. 14(4):76–80, July/August CODEN LNCSD9. ISSN 2016. CODEN ???? ISSN 0302-9743 (print), 1611- 1540-7993 (print), 1558- 3349 (electronic). URL 4046 (electronic). URL http://link.springer. https://www.computer. com/chapter/10.1007/978- org/csdl/mags/sp/2016/ 3-642-33704-8_7/. 04/msp2016040076-abs. Mahmoody:2014:PPK html. Miao:2016:RAS [MMP14] Mohammad Mahmoody, Hemanta K. Maji, and [MML16] Yinbin Miao, Jianfeng Ma, Manoj Prabhakaran. On and Zhiquan Liu. Revoca- the power of public-key en- ble and anonymous search- cryption in secure compu- able encryption in multi- tation. Lecture Notes in user setting. Concurrency Computer Science, 8349: and Computation: Prac- 240–264, 2014. CO- tice and Experience,28 DEN LNCSD9. ISSN (4):1204–1218, March 25, 0302-9743 (print), 1611- 2016. CODEN CCPEBO. 3349 (electronic). URL ISSN 1532-0626 (print), http://link.springer. 1532-0634 (electronic). com/chapter/10.1007/978- Maeng:2015:TAU 3-642-54242-8_11/. Marino:2019:ACN [MMLN15] YoungJae Maeng, Aziz Mohaisen, Mun-Kyu Lee, [MMP19] Francesco Marino, Cor- and DaeHun Nyang. Trans- rado Moiso, and Mat- action authentication us- teo Petracca. Automatic ing complementary col- contract negotiation, ser- ors. Computers & Se- vice discovery and mu- curity, 48(??):167–181, tual authentication solu- February 2015. CODEN tions: a survey on the en- CPSEDU. ISSN 0167-4048 abling technologies of the (print), 1872-6208 (elec- forthcoming IoT ecosys- tronic). URL https:// tems. Computer Networks www.sciencedirect.com/ (Amsterdam, Netherlands: science/article/pii/S0167404814001473. 1999), 148(??):176–195, January 15, 2019. CO- Moldovyan:2012:BBD DEN ???? ISSN 1389-1286 [MMN12] Alexandr Moldovyan, Niko- (print), 1872-7069 (elec- REFERENCES 443

tronic). URL http:// CODEN CCPEBO. ISSN www.sciencedirect.com/ 1532-0626 (print), 1532- science/article/pii/S1389128618312167. 0634 (electronic). Macedo:2017:SSP Maity:2013:CRS

+ [MMS 17a] Ricardo Macedo, Leonardo [MMSD13] Santi P. Maity, Seba Maity, Melniski, Aldri Santos, Jaya Sil, and Claude Yacine Ghamri-Doudane, Delpha. Collusion re- and Michele Nogueira. silient spread spectrum SPARTA: a survival perfor- watermarking in M-band mance degradation frame- wavelets using GA-fuzzy work for identity federa- hybridization. The Jour- tions. Computer Networks nal of Systems and Soft- (Amsterdam, Netherlands: ware, 86(1):47–59, Jan- 1999), 121(??):37–52, July uary 2013. CODEN JS- 5, 2017. CODEN ???? SODM. ISSN 0164-1212 ISSN 1389-1286 (print), (print), 1873-1228 (elec- 1872-7069 (electronic). URL tronic). URL http:// http://www.sciencedirect. www.sciencedirect.com/ com/science/article/pii/ science/article/pii/S0164121212001938. S1389128617301524. Matsuo:2012:MAK Mazumder:2017:PSK [MMS17b] Rashed Mazumder, At- [MMY12] Shin’ichiro Matsuo, Daisuke suko Miyaji, and Chunhua Moriyama, and Moti Yung. Su. Probably secure keyed- Multifactor authenticated function based authenti- key renewal. Lecture cated encryption schemes Notes in Computer Sci- for big data. Interna- ence, 7222:204–220, 2012. tional Journal of Foun- CODEN LNCSD9. ISSN dations of Computer Sci- 0302-9743 (print), 1611- ence (IJFCS), 28(6):661– 3349 (electronic). URL ??, September 2017. CO- http://link.springer. DEN IFCSEN. ISSN 0129- com/chapter/10.1007/978- 0541. 3-642-32298-3_14/. Mazumder:2017:SAE Meshram:2012:IBC [MMS17c] Rashed Mazumder, Atsuko [MMZ12] Chandrashekhar Meshram, Miyaji, and Chunhua Su. A Suchitra A. Meshram, and simple authentication en- Mingwu Zhang. An ID- cryption scheme. Concur- based cryptographic mech- rency and Computation: anisms based on GDLP Practice and Experience, and IFP. Informa- 29(16), August 25, 2017. tion Processing Letters, REFERENCES 444

112(19):753–758, October Rines, Shannon X. Wang, 15, 2012. CODEN IF- Isaac L. Chuang, and PLAT. ISSN 0020-0190 Rainer Blatt. Realiza- (print), 1872-6119 (elec- tion of a scalable Shor tronic). URL http:// algorithm. Science, 351 www.sciencedirect.com/ (6277):1068–1070, March science/article/pii/S002001901200169X. 4, 2016. ISSN 0036-8075. URL http://science. Moran:2010:BCP sciencemag.org/content/ [MN10] Tal Moran and Moni Naor. 351/6277/1068. Basing cryptographic pro- tocols on tamper-evident McKusick:2015:DIF seals. Theoretical Com- puter Science, 411(10): [MNNW15] Marshall Kirk McKusick, 1283–1310, March 4, 2010. George V. Neville-Neil, and CODEN TCSCDI. ISSN Robert N. M. Watson. The 0304-3975 (print), 1879- design and implementation 2294 (electronic). of the FreeBSD operating system. Addison-Wesley, Mukhopadhyay:2014:EMP Reading, MA, USA, sec- ond edition, 2015. ISBN [MN14] Debapriyay Mukhopad- 0-321-96897-2 (hardcover). hyay and Subhas C. Nandy. xxx + 886 pp. LCCN Efficient multiple-precision QA76.774.F74 M35 2015. integer division algorithm. URL http://proquest. Information Processing safaribooksonline.com/ Letters, 114(3):152–157, 9780133761825. March 2014. CODEN IF- PLAT. ISSN 0020-0190 Minier:2012:RKI (print), 1872-6119 (elec- tronic). URL http:// [MNP12] Marine Minier and Mar´ıa www.sciencedirect.com/ Naya-Plasencia. A re- science/article/pii/S0020019013002627. lated key impossible dif- This paper provides a cor- ferential attack against 22 rection to the algorithm rounds of the lightweight presented in [HZSL05], and block cipher LBlock. In- also supplies a complicated formation Processing Let- correctness proof. ters, 112(16):624–629, Au- Monz:2016:RSS gust 31, 2012. CODEN IFPLAT. ISSN 0020-0190 [MNM+16] Thomas Monz, Daniel (print), 1872-6119 (elec- Nigg, Esteban A. Mar- tronic). URL http:// tinez, Matthias F. Brandl, www.sciencedirect.com/ Philipp Schindler, Richard science/article/pii/S0020019012001238. REFERENCES 445

Mizuki:2011:ASN Mone:2013:FPE

[Mon13] Gregory Mone. Future- [MNS11] Takaaki Mizuki, Satoru proof encryption. Com- Nakayama, and Hideaki munications of the As- Sone. An application of sociation for Computing ST-numbering to secret Machinery, 56(11):12–14, key agreement. Interna- November 2013. CODEN tional Journal of Founda- CACMA2. ISSN 0001-0782 tions of Computer Science (print), 1557-7317 (elec- (IJFCS), 22(5):1211–1227, August 2011. CODEN tronic). IFCSEN. ISSN 0129-0541 Moore:2012:RFF (print), 1793-6373 (elec- tronic). [Moo12] Samuel K. Moore. RSA flaw found. IEEE Spec- Maimut:2012:LCR trum, ??(??):??, Febru- ary 14, 2012. CO- [MO12] Diana Maimut and Khaled DEN IEESAM. ISSN Ouafi. Lightweight cryp- 0018-9235 (print), 1939- tography for RFID tags. 9340 (electronic). URL IEEE Security & Privacy, http://spectrum.ieee. 10(2):76–79, March/April org/tech-talk/computing/ 2012. ISSN 1540-7993 it/rsa-flaw-found. (print), 1558-4046 (elec- Moody:2014:DMW tronic). [Moo14] Oliver Moody. Death of Minamoto:2014:BDI man who cracked Hitler’s code. The Times [Lon- [MO14] Teruya Minamoto and don], March 27, 2014. URL Ryuji Ohura. A blind http://www.thetimes.co. digital image watermark- uk/tto/news/uk/defence/ ing method based on article4046291.ece. the dyadic wavelet trans- Morad:2012:OEA form and interval arith- metic. Applied Math- [Mor12] Ameer H. Morad. Of- ematics and Computa- fice employees authen- tion, 226(??):306–319, Jan- tication based on E- uary 1, 2014. CODEN exam techniques. Lec- AMHCBQ. ISSN 0096- ture Notes in Computer 3003 (print), 1873-5649 Science, 7666:60–65, 2012. (electronic). URL http:// CODEN LNCSD9. ISSN www.sciencedirect.com/ 0302-9743 (print), 1611- science/article/pii/S0096300313010850. 3349 (electronic). URL REFERENCES 446

http://link.springer. Minier:2012:EEC com/chapter/10.1007/978- 3-642-34478-7_8/. [MP12] Marine Minier and Raphael C.-W. Phan. Energy- Morawiecki:2019:MS efficient cryptographic en- gineering paradigm. Lec- [Mor19a] Pawel Morawiecki. Mali- ture Notes in Computer cious SHA-3. Fundamenta Science, 7039:78–88, 2012. Informaticae, 169(4):331– CODEN LNCSD9. ISSN 343, ???? 2019. CODEN 0302-9743 (print), 1611- FUMAAJ. ISSN 0169-2968 3349 (electronic). URL (print), 1875-8681 (elec- http://link.springer. tronic). com/chapter/10.1007/978- 3-642-27585-2_7/. Moriai:2019:PPD Min:2018:AAB [Mor19b] Shiho Moriai. Privacy- + preserving deep learning [MPA 18] Donghyun Min, Dong- via additively homomor- gyu Park, Jinwoo Ahn, phic encryption. In Takagi Ryan Walker, Junghee et al. [TBL19], page 198. Lee, Sungyong Park, and ISBN 1-72813-366-1. ISSN Youngjae Kim. Amoeba: 1063-6889. An autonomous backup and recovery SSD for ran- Mosca:2018:CEQ somware attack defense. IEEE Computer Architec- [Mos18] M. Mosca. Cybersecu- ture Letters, 17(2):243– rity in an era with quan- 246, July/December 2018. tum computers: Will we CODEN ???? ISSN 1556- be ready? IEEE Se- 6056 (print), 1556-6064 curity & Privacy, 16(5): (electronic). 38–41, September/October 2018. ISSN 1540-7993 Meiklejohn:2016:FBC

(print), 1558-4046 (elec- + tronic). [MPJ 16] Sarah Meiklejohn, Mar- jori Pomarole, Grant Jor- Moulick:2015:RDS dan, Kirill Levchenko, Da- mon McCoy, Geoffrey M. [Mou15] Subhayan Roy Moulick. Voelker, and Stefan Sav- Review of: Digital Signa- age. A fistful of Bit- tures by Jonathan Katz. coins: characterizing pay- ACM SIGACT News,46 ments among men with no (1):10–12, March 2015. names. Communications of CODEN SIGNDM. ISSN the Association for Com- 0163-5700 (print), 1943- puting Machinery, 59(4): 5827 (electronic). 86–93, April 2016. CODEN REFERENCES 447

CACMA2. ISSN 0001-0782 Mark D. Ryan. Iden- (print), 1557-7317 (elec- tity escrow protocol and tronic). URL http:// anonymity analysis in the cacm.acm.org/magazines/ applied pi-calculus. ACM 2016/4/200174/fulltext. Transactions on Informa- Mundhenk:2017:SAN tion and System Secu- rity, 13(4):41:1–41:??, De- [MPM+17] Philipp Mundhenk, An- cember 2010. CODEN drew Paverd, Artur Mrowca, ATISBQ. ISSN 1094-9224 Sebastian Steinhorst, Mar- (print), 1557-7406 (elec- tin Lukasiewycz, Suhaib A. tronic). Fahmy, and Samarjit Maimut:2014:AET Chakraborty. Security in automotive networks: [MR14a] Diana Maimut and Reza Lightweight authentication Reyhanitabar. Authen- and authorization. ACM ticated encryption: To- Transactions on Design ward next-generation algo- Automation of Electronic rithms. IEEE Security Systems, 22(2):25:1–25:??, & Privacy, 12(2):70–72, March 2017. CODEN March/April 2014. ISSN ATASFO. ISSN 1084-4309 1540-7993. (print), 1557-7309 (elec- Marasco:2014:SAS tronic). [MR14b] Emanuela Marasco and Mironov:2012:IDP Arun Ross. A survey on [MPRS12] Ilya Mironov, Omkant antispoofing schemes for Pandey, Omer Reingold, fingerprint recognition sys- and Gil Segev. Incremen- tems. ACM Computing tal deterministic public- Surveys, 47(2):28:1–28:??, key encryption. Lecture November 2014. CODEN Notes in Computer Sci- CMSVAN. ISSN 0360-0300 ence, 7237:628–644, 2012. (print), 1557-7341 (elec- CODEN LNCSD9. ISSN tronic). 0302-9743 (print), 1611- Micali:2014:CMS 3349 (electronic). URL http://link.springer. [MR14c] Silvio Micali and Michael O. com/accesspage/chapter/ Rabin. Cryptography 10.1007/978-3-642-29011- miracles, secure auctions, 4_36; http://link.springer. matching problem verifica- com/chapter/10.1007/978- tion. Communications of 3-642-29011-4_37/. the Association for Com- puting Machinery, 57(2): Mukhamedov:2010:IEP 85–93, February 2014. CO- [MR10] Aybek Mukhamedov and DEN CACMA2. ISSN REFERENCES 448

0001-0782 (print), 1557- JCSIET. ISSN 0926-227X 7317 (electronic). (print), 1875-8924 (elec- tronic). Manimehalai:2016:NRR Martinovic:2017:AUP [MR16] P. Manimehalai and P. Arockia Jansi Rani. A new robust re- [MRRT17] Ivan Martinovic, Kasper versible blind watermark- Rasmussen, Marc Roeschlin, ing in wavelet-domain for and Gene Tsudik. Au- color images. Interna- thentication using pulse- tional Journal of Image response biometrics. Com- and Graphics (IJIG),16 munications of the As- (2):1650006, April 2016. sociation for Computing CODEN ???? ISSN 0219- Machinery, 60(2):108–115, 4678. February 2017. CODEN CACMA2. ISSN 0001-0782 Migliore:2018:HSC (print), 1557-7317 (elec- [MRL+18] Vincent Migliore, Maria M´endez tronic). URL http:// Real, Vianney Lapotre, Ar- cacm.acm.org/magazines/ naud Tisserand, Caroline 2017/2/212440/fulltext. Fontaine, and Guy Gog- Matsumoto:2017:ACG niat. Hardware/software co-design of an acceler- [MRS+17] Stephanos Matsumoto, ator for FV homomor- Raphael M. Reischuk, phic encryption scheme us- Pawel Szalachowski, Tiffany ing Karatsuba algorithm. Hyun-Jin Kim, and Adrian IEEE Transactions on Perrig. Authentication Computers, 67(3):335–347, challenges in a global en- March 2018. CODEN vironment. ACM Transac- ITCOB4. ISSN 0018- tions on Privacy and Se- 9340 (print), 1557-9956 curity (TOPS), 20(1):1:1– (electronic). URL http: 1:??, February 2017. CO- //ieeexplore.ieee.org/ DEN ???? ISSN 2471-2566 document/7797469/. (print), 2471-2574 (elec- tronic). Moataz:2018:SSE Moghadam:2010:DRN [MRR+18] Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdul- [MRT10] I. Zarei Moghadam, A. S. latif Shikfa, Fr´ed´eric Cup- Rostami, and M. R. Tan- pens, and Nora Cuppens. hatalab. Designing a Substring search over en- random number generator crypted data. Journal of with novel parallel LFSR Computer Security, 26(1): substructure for key stream 1–30, ???? 2018. CODEN ciphers. In 2010 Interna- REFERENCES 449

tional Conference on Com- Trivium and quadraticity puter Design and Applica- tests. Fundamenta Infor- tions (ICCDA), volume 5, maticae, 114(3–4):309–318, pages V5–598–V5–601. August 2012. CODEN FU- IEEE Computer Society MAAJ. ISSN 0169-2968 Press, 1109 Spring Street, (print), 1875-8681 (elec- Suite 300, Silver Spring, tronic). MD 20910, USA, 2010. URL http://ieeexplore. Maitra:2013:DSM ieee.org/stamp/stamp. [MS13a] Subhashis Maitra and jsp?tp=&arnumber=5541188. Amitabha Sinha. Design Mendel:2012:DAL and simulation of MAC unit using combinational [MRTV12] Florian Mendel, Vincent circuit and adder. ACM Rijmen, Deniz Toz, and SIGARCH Computer Ar- Kerem Varıcı. Differen- chitecture News, 41(5):25– tial analysis of the LED 33, December 2013. CO- block cipher. Lecture DEN CANED2. ISSN Notes in Computer Sci- 0163-5964 (print), 1943- ence, 7658:190–207, 2012. 5851 (electronic). CODEN LNCSD9. ISSN 0302-9743 (print), 1611- Maitra:2013:HEM 3349 (electronic). URL [MS13b] Subhashis Maitra and http://link.springer. Amitabha Sinha. High ef- com/chapter/10.1007/978- ficiency MAC unit used 3-642-34961-4_13/. in digital signal process- Maitra:2012:NAC ing and elliptic curve cryptography. ACM [MS12a] Subhashis Maitra and SIGARCH Computer Ar- Amitabha Sinha. A new chitecture News, 41(4):1–7, algorithm for computing September 2013. CODEN triple-base number system. CANED2. ISSN 0163-5964 ACM SIGARCH Computer (print), 1943-5851 (elec- Architecture News, 40(4): tronic). 3–9, September 2012. CO- DEN CANED2. ISSN Maitra:2013:HPM 0163-5964 (print), 1943- [MS13c] Subhashis Maitra and 5851 (electronic). Amitabha Sinha. High Mroczkowski:2012:CAS performance MAC unit for DSP and crypto- [MS12b] Piotr Mroczkowski and graphic applications. ACM Janusz Szmidt. The cube SIGARCH Computer Ar- attack on stream cipher chitecture News, 41(2):47– REFERENCES 450

55, May 2013. CODEN 149–165, 2012. CO- CANED2. ISSN 0163-5964 DEN LNCSD9. ISSN (print), 1943-5851 (elec- 0302-9743 (print), 1611- tronic). 3349 (electronic). URL http://link.springer. Miller:2016:RPS com/chapter/10.1007/978- [MS16] Carl A. Miller and Yaoyun 3-642-32928-9_9/. Shi. Robust protocols Myers:2013:BBC for securely expanding ran- domness and distributing [MSas13] Steven Myers, Mona Sergi, keys using untrusted quan- and abhi shelat. Black- tum devices. Journal of box construction of a more the ACM, 63(4):33:1–33:??, than non-malleable CCA1 November 2016. CODEN encryption scheme from JACOAH. ISSN 0004-5411 plaintext awareness. Jour- (print), 1557-735X (elec- nal of Computer Security, tronic). 21(5):721–748, ???? 2013. CODEN JCSIET. ISSN Mukherjee:2017:EPP 0926-227X (print), 1875- 8924 (electronic). [MS17] Srilekha Mukherjee and Goutam Sanyal. Enhanced Morales-Sandoval:2018:PBC position power first map- ping (PPFM) based im- [MSGCDPSS18] Miguel Morales-Sandoval, age steganography. Inter- Jose Luis Gonzalez-Compean, national Journal of Com- Arturo Diaz-Perez, and puter Applications, 39(2): Victor J. Sosa-Sosa. A 59–68, 2017. CODEN pairing-based cryptographic IJCAFW. ISSN 1206- approach for data secu- 212X (print), 1925-7074 rity in the cloud. In- (electronic). URL https: ternational Journal of In- //www.tandfonline.com/ formation Security, 17(4): doi/full/10.1080/1206212X. 441–461, August 2018. 2016.1273624. CODEN ???? ISSN 1615-5262 (print), 1615- Myers:2012:BCM 5270 (electronic). URL [MSas12] Steven Myers, Mona Sergi, http://link.springer. and abhi shelat. Black- com/article/10.1007/s10207- box construction of a 017-0375-z. more than non-malleable Montuschi:2016:ISC CCA 1 encryption scheme from plaintext aware- [MSH+16] Paolo Montuschi, Michael ness. Lecture Notes in Schulte, Javier Hormigo, Computer Science, 7485: Stuart Oberman, and REFERENCES 451

Nathalie Revol, editors. Mosenia:2017:CCA 2016 IEEE 23nd Sympo- sium on Computer Arith- [MSKRJ17] A. Mosenia, S. Sur-Kolay, metic (ARITH 2016), A. Raghunathan, and Santa Clara, California, N. K. Jha. CABA: Contin- USA, 10–13 July 2016. uous authentication based IEEE Computer Soci- on BioAura. IEEE Trans- ety Press, 1109 Spring actions on Computers,66 Street, Suite 300, Sil- (5):759–772, May 2017. ver Spring, MD 20910, CODEN ITCOB4. ISSN USA, 2016. ISBN 1- 0018-9340 (print), 1557- 5090-1615-5. ISSN 1063- 9956 (electronic). 6889. LCCN QA76.9.C62 Mazurczyk:2013:FWS S95 2016. URL http: //ieeexplore.ieee.org/ [MSL13] W. Mazurczyk, K. Szczyp- servlet/opac?punumber= iorski, and J. Lubacz. Four 7562813. ways to smuggle messages Marton:2010:RDC through Internet services. IEEE Spectrum, 50(11):42– [MSI10] Kinga Marton, Alin Su- 45, November 2013. CO- ciu, and Iosif Ignat. Ran- DEN IEESAM. ISSN domness in digital cryp- 0018-9235 (print), 1939- tography: a survey. Ro- 9340 (electronic). manian Journal of In- formation Science and Martins:2018:SFH Technology, 13(3):219–240, ???? 2010. CODEN [MSM18a] Paulo Martins, Leonel ???? ISSN 1453-8245. Sousa, and Artur Mari- URL http:www.imt.ro/ ano. A survey on fully romjist/Volum13/Number13_ homomorphic encryption: 3/pdf/KMarton.pdf. an engineering perspective. ACM Computing Surveys, Mashimo:2018:VMS 50(6):83:1–83:??, January [MSI18] Susumu Mashimo, Ryota 2018. CODEN CMSVAN. Shioya, and Koji Inoue. ISSN 0360-0300 (print), VMOR: Microarchitectural 1557-7341 (electronic). support for operand ac- Muhammad:2018:ISU cess in an interpreter. IEEE Computer Architec- [MSM+18b] Khan Muhammad, Muham- ture Letters, 17(2):217– mad Sajjad, Irfan Mehmood, 220, July/December 2018. Seungmin Rho, and Sung Wook CODEN ???? ISSN 1556- Baik. Image steganog- 6056 (print), 1556-6064 raphy using uncorrelated (electronic). color space and its appli- REFERENCES 452

cation for security of vi- Maitra:2018:TAA sual contents in online so- cial networks. Future Gen- [MSS+18] Subhamoy Maitra, Nis- eration Computer Systems, hant Sinha, Akhilesh Sid- 86(??):951–960, Septem- dhanti, Ravi Anand, and ber 2018. CODEN FG- Sugata Gangopadhyay. A SEVI. ISSN 0167-739X TMDTO attack against (print), 1872-7115 (elec- Lizard. IEEE Transac- tronic). URL https:// tions on Computers, 67(5): www.sciencedirect.com/ 733–739, May 2018. CO- science/article/pii/S0167739X16306768. DEN ITCOB4. ISSN 0018- Migliore:2017:HSA 9340 (print), 1557-9956 (electronic). URL https: [MSR+17] Vincent Migliore, C´edric //ieeexplore.ieee.org/ Seguin, Maria M´endez document/8107499/. Real, Vianney Lapotre, Arnaud Tisserand, Caro- Miret:2018:PBC line Fontaine, Guy Gog- niat, and Russell Tessier. [MST18] Josep M. Miret, Daniel A high-speed accelera- Sadornil, and Juan G. tor for homomorphic en- Tena. Pairing-based cryp- cryption using the Karat- tography on elliptic curves. suba algorithm. ACM Mathematics in Computer Transactions on Embed- Science, 12(3):309–318, ded Computing Systems,16 September 2018. CODEN (5s):138:1–138:??, October ???? ISSN 1661-8270 2017. CODEN ???? ISSN (print), 1661-8289 (elec- 1539-9087 (print), 1558- tronic). 3465 (electronic). Maitin-Shepard:2017:ECM Maitra:2017:DFA

[MSS17] Subhamoy Maitra, Akhilesh [MSTA17] Jeremy Maitin-Shepard, Siddhanti, and Santanu Mehdi Tibouchi, and Sarkar. A differential fault Diego F. Aranha. Elliptic attack on Plantlet. IEEE curve multiset hash. The Transactions on Comput- Computer Journal, 60(4): ers, 66(10):1804–1808, Oc- 476–490, March 23, 2017. tober 2017. CODEN IT- CODEN CMPJA6. ISSN COB4. ISSN 0018-9340 0010-4620 (print), 1460- (print), 1557-9956 (elec- 2067 (electronic). URL tronic). URL http:/ https://academic.oup. /ieeexplore.ieee.org/ com/comjnl/article/60/ document/7917296/. 4/476/2608055. REFERENCES 453

Mosca:2013:QKD Mouris:2018:TSB

[MSU13] Michele Mosca, Douglas [MTM18] Dimitris Mouris, Nektar- Stebila, and Berkant Us- ios Georgios Tsoutsos, and tao˘glu. Quantum key Michail Maniatakos. Ter- distribution in the classi- minator suite: Benchmark- cal authenticated key ex- ing privacy-preserving ar- change framework. Lecture chitectures. IEEE Com- Notes in Computer Sci- puter Architecture Let- ence, 7932:136–154, 2013. ters, 17(2):122–125, July/ CODEN LNCSD9. ISSN December 2018. CODEN 0302-9743 (print), 1611- ???? ISSN 1556-6056 3349 (electronic). URL (print), 1556-6064 (elec- http://link.springer. tronic). com/chapter/10.1007/978- Malkin:2011:ECS 3-642-38616-9_9/. [MTY11] Tal Malkin, Isamu Teran- Morozov:2012:ZKP ishi, and Moti Yung. Ef- ficient circuit-size inde- [MT12] Kirill Morozov and Tsuyoshi pendent public key en- Takagi. Zero-knowledge cryption with KDM se- protocols for the McEliece curity. Lecture Notes in encryption. Lecture Notes Computer Science, 6632: in Computer Science, 7372: 507–526, 2011. CO- 180–193, 2012. CO- DEN LNCSD9. ISSN DEN LNCSD9. ISSN 0302-9743 (print), 1611- 0302-9743 (print), 1611- 3349 (electronic). URL 3349 (electronic). URL http://link.springer. http://link.springer. com/content/pdf/10.1007/ com/chapter/10.1007/978- 978-3-642-20465-4_28. 3-642-31448-3_14/. Meerwald:2012:ERW Mamais:2017:BVP [MU12] Peter Meerwald and An- [MT17] Stylianos S. Mamais and dreas Uhl. An efficient ro- George Theodorakopoulos. bust watermarking method Behavioural verification: integrated in H.264/SVC. Preventing report fraud in Lecture Notes in Computer decentralized advert dis- Science, 7110:1–14, 2012. tribution systems. Future CODEN LNCSD9. ISSN Internet, 9(4):88, Novem- 0302-9743 (print), 1611- ber 20, 2017. CODEN 3349 (electronic). URL ???? ISSN 1999-5903. http://link.springer. URL https://www.mdpi. com/chapter/10.1007/978- com/1999-5903/9/4/88. 3-642-28693-3_1/. REFERENCES 454

Muftic:2016:BCC Murdoch:2016:IDP

[Muf16] Sead Muftic. BIX certifi- [Mur16] Steven J. Murdoch. In- cates: Cryptographic to- secure by design: Proto- kens for anonymous trans- cols for encrypted phone actions based on certifi- calls. Computer, 49(3):25– cates public ledger. Ledger, 33, March 2016. CODEN 1(??):19–37, ???? 2016. CPTRB4. ISSN 0018-9162 ISSN 2379-5980. URL (print), 1558-0814 (elec- http://www.ledgerjournal. tronic). URL http:// org/ojs/index.php/ledger/ www.computer.org/csdl/ article/view/27. mags/co/2016/03/mco2016030025- abs.html. Mundy:2017:CGU Miri:2012:SAC

[Mun17] Liza Mundy. Code girls: [MV12] Ali Miri and Serge Vau- the untold story of the denay, editors. Selected American women code Areas in Cryptography: breakers of World War 18th International Work- II. Hachette Books, shop, SAC 2011, Toronto, New York, NY, USA, ON, Canada, August 11– 2017. ISBN 0-316-35253-5 12, Revised Selected Pa- (hardcover), 0-316-43989-4 pers, volume 7118 of Lec- (large print), 1-4789-2270-2 ture Notes in Computer (audio book), 1-4789-2271- Science. Springer-Verlag, 0 (audio download), 0-316- Berlin, Germany / Heidel- 35255-1 (e-book). xiv + berg, Germany / London, 416 pp. LCCN D810.C88 UK / etc., 2012. CO- M86 2017. DEN LNCSD9. ISBN 3- 642-28495-7. ISSN 0302- Murphy:2010:BRB 9743 (print), 1611-3349 (electronic). URL http:/ [Mur10] Cillian Murphy. Book /www.springerlink.com/ review: Introduction to content/978-3-642-28495- Cryptography, by Hans 3. Delfs and Helmut Knebl, Min:2016:RSC Publisher: Springer, 2007, ISBN 978-3-540-49243-6. [MV16a] Byungho Min and Vijay ACM SIGACT News,41 Varadharajan. Rethinking (4):42–44, December 2010. software component secu- CODEN SIGNDM. ISSN rity: Software component 0163-5700 (print), 1943- level integrity and cross 5827 (electronic). See verification. The Computer [DK02, DK07]. Journal, 59(11):1735–1748, REFERENCES 455

November 2016. CODEN academic.oup.com/comjnl/ CMPJA6. ISSN 0010-4620 article/62/8/1194/5488732. (print), 1460-2067 (elec- Mannan:2011:LPD tronic). URL http:// comjnl.oxfordjournals. [MvO11] Mohammad Mannan and org/content/59/11/1735. P. C. van Oorschot. Lever- Mishra:2016:AFP aging personal devices for stronger password authen- [MV16b] Abhishek Mishra and Parv tication from untrusted Venkitasubramaniam. Anonymity computers. Journal of and fairness in packet Computer Security, 19(4): scheduling: a quantita- 703–750, ???? 2011. CO- tive tradeoff. IEEE/ACM DEN JCSIET. ISSN 0926- Transactions on Network- 227X (print), 1875-8924 ing, 24(2):688–702, April (electronic). 2016. CODEN IEANEP. Maes:2012:PFF ISSN 1063-6692 (print), 1558-2566 (electronic). [MVV12] Roel Maes, Anthony Van Modersheim:2018:ABP Herrewege, and Ingrid Ver- bauwhede. PUFKY: a [MV18] Sebastian M¨odersheim and fully functional PUF-based Luca Vigan`o. Alpha– cryptographic key gener- beta privacy. ACM ator. Lecture Notes in Transactions on Privacy Computer Science, 7428: and Security (TOPS), 302–319, 2012. CO- 22(1):7:1–7:??, January DEN LNCSD9. ISSN 2018. ISSN 2471-2566 0302-9743 (print), 1611- (print), 2471-2574 (elec- 3349 (electronic). URL tronic). URL https://dl. http://link.springer. acm.org/citation.cfm? com/chapter/10.1007/978- id=3289255. 3-642-33027-8_18/. Mefenza:2019:CSA Mathew:2012:EIC

[MV19] Thierry Mefenza and Damien [MVVR12] K. Preetha Mathew, Sachin Vergnaud. Cryptanalysis Vasant, Sridhar Venkate- of server-aided RSA proto- san, and C. Pandu Ran- cols with private-key split- gan. An efficient IND- ting. The Computer Jour- CCA2 secure variant of nal, 62(8):1194–1213, Au- the Niederreiter encryp- gust 2019. CODEN CM- tion scheme in the stan- PJA6. ISSN 0010-4620 dard model. Lecture (print), 1460-2067 (elec- Notes in Computer Sci- tronic). URL http:// ence, 7372:166–179, 2012. REFERENCES 456

CODEN LNCSD9. ISSN provement of Sood et al.’s 0302-9743 (print), 1611- dynamic ID-based authen- 3349 (electronic). URL tication scheme. Lecture http://link.springer. Notes in Computer Sci- com/chapter/10.1007/978- ence, 7154:141–152, 2012. 3-642-31448-3_13/. CODEN LNCSD9. ISSN 0302-9743 (print), 1611- Moghimi:2019:MFD 3349 (electronic). URL [MWES19] Ahmad Moghimi, Jan http://link.springer. Wichelmann, Thomas Eisen- com/chapter/10.1007/978- barth, and Berk Sunar. 3-642-28073-3_13/. MemJam: a false de- Mahmoody:2013:LEZ pendency attack against constant-time crypto im- [MX13] Mohammad Mahmoody plementations. Interna- and David Xiao. Lan- tional Journal of Parallel guages with efficient zero- Programming, 47(4):538– knowledge PCPs are in 570, August 2019. CODEN SZK. Lecture Notes in IJPPE5. ISSN 0885-7458 Computer Science, 7785: (print), 1573-7640 (elec- 297–314, 2013. CO- tronic). DEN LNCSD9. ISSN 0302-9743 (print), 1611- Meng:2018:TTB 3349 (electronic). URL http://link.springer. + [MWW 18] Weizhi Meng, Yu Wang, com/chapter/10.1007/978- Duncan S. Wong, Sheng 3-642-36594-2_17/. Wen, and Yang Xiang. TouchWB: Touch behav- Ma:2013:PVP ioral user authentication [MYYR13] Chris Y. T. Ma, David based on web browsing K. Y. Yau, Nung Kwan on smartphones. Journal Yip, and Nageswara S. V. of Network and Computer Rao. Privacy vulnerabil- Applications, 117(??):1–9, ity of published anonymous September 1, 2018. CO- mobility traces. IEEE/ DEN JNCAF3. ISSN 1084- ACM Transactions on Net- 8045 (print), 1095-8592 working, 21(3):720–733, (electronic). URL http:// June 2013. CODEN www.sciencedirect.com/ IEANEP. ISSN 1063-6692 science/article/pii/S1084804518301723. (print), 1558-2566 (elec- Ma:2012:CIS tronic). Meng:2015:CRS [MWZ12] Chun-Guang Ma, Ding Wang, and Qi-Ming Zhang. [MZ15] Xianmeng Meng and Xuexin Cryptanalysis and im- Zheng. Cryptanalysis of REFERENCES 457

RSA with a small pa- Computing Surveys, 45(3): rameter revisited. Infor- 25:1–25:??, June 2013. CO- mation Processing Letters, DEN CMSVAN. ISSN 115(11):858–862, Novem- 0360-0300 (print), 1557- ber 2015. CODEN IF- 7341 (electronic). PLAT. ISSN 0020-0190 (print), 1872-6119 (elec- Ma:2015:PKE tronic). URL http:// [MZHY15] Sha Ma, Mingwu Zhang, www.sciencedirect.com/ Qiong Huang, and Bo Yang. science/article/pii/S002001901500109X. Public key encryption Marko:2017:MDI with delegated equality test in a multi-user set- [MZ17a] Frantisek Marko and Alexandr N. ting. The Computer Jour- Zubkov. Minimal de- nal, 58(4):986–1002, April grees of invariants of (su- 2015. CODEN CM- per)groups — a connection PJA6. ISSN 0010-4620 to cryptology. Linear Mul- (print), 1460-2067 (elec- tilinear Algebra, 65(11): tronic). URL http:// 2340–2355, 2017. CODEN comjnl.oxfordjournals. LNMLAZ. ISSN 0308-1087 org/content/58/4/986. (print), 1563-5139 (elec- tronic). Meng:2019:ESF + Mastroeni:2017:APS [MZL 19] Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, [MZ17b] Isabella Mastroeni and and Yan Li. Enhancing Damiano Zanardini. Ab- the security of FinTech stract program slicing: applications with map- an abstract interpretation- based graphical password based approach to program authentication. Future slicing. ACM Transactions Generation Computer Sys- on Computational Logic, tems, 101(??):1018–1027, 18(1):7:1–7:??, April 2017. December 2019. CODEN CODEN ???? ISSN 1529- FGSEVI. ISSN 0167-739X 3785 (print), 1557-945X (print), 1872-7115 (elec- (electronic). tronic). URL http:// www.sciencedirect.com/ Manshaei:2013:GTM science/article/pii/S0167739X19302882. + [MZA 13] Mohammad Hossein Man- Mofrad:2018:CSI shaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacsar, and [MZLS18] Saeid Mofrad, Fengwei Jean-Pierre Hubaux. Game Zhang, Shiyong Lu, and theory meets network se- Weidong (Larry) Shi. A curity and privacy. ACM comparison study of In- REFERENCES 458

tel SGX and AMD mem- on the Occasion of His ory encryption technology. 65th Birthday, volume 6805 Web lecture slides., May of Lecture Notes in Com- 30, 2018. URL https: puter Science. Spring- //caslab.csl.yale.edu/ er-Verlag, Berlin, Ger- workshops/hasp2018/HASP18_ many / Heidelberg, Ger- a9-mofrad_slides.pdf. many / London, UK / etc., 2012. CODEN LNCSD9. Nagy:2010:OTP ISBN 3-642-28367-5. ISSN [NA10a] Naya Nagy and Selim G. 0302-9743 (print), 1611- Akl. One-time pads with- 3349 (electronic). ???? out prior encounter. Par- pp. URL http://www. allel Processing Letters, springerlink.com/content/ 20(3):263–273, September 978-3-642-28367-3. 2010. CODEN PPLTEE. Naccache:2016:FHE ISSN 0129-6264. Nagy:2010:QCS [Nac16] David Naccache. Fully homomorphic encryption: [NA10b] Naya Nagy and Selim G. Computations with a blind- Akl. A quantum cryp- fold. IEEE Security & tographic solution to the Privacy, 14(1):63–67, Jan- problem of access control in uary/February 2016. CO- a hierarchy. Parallel Pro- DEN ???? ISSN 1540-7993 cessing Letters, 20(3):251– (print), 1558-4046 (elec- 261, September 2010. CO- tronic). DEN PPLTEE. ISSN 0129- 6264. Naranjo:2012:SAK Nikiforakis:2014:BYO [NACLR12] J. A. M. Naranjo, N. An- tequera, L. G. Casado, [NA14] N. Nikiforakis and G. Acar. and J. A. L´opez-Ramos. Browse at your own risk. A suite of algorithms for IEEE Spectrum, 51(8):30– key distribution and au- 35, August 2014. CODEN thentication in centralized IEESAM. ISSN 0018-9235 secure multicast environ- (print), 1939-9340 (elec- ments. Journal of Compu- tronic). tational and Applied Math- Naccache:2012:CST ematics, 236(12):3042– 3051, June 2012. CODEN [Nac12] David Naccache, editor. JCAMDI. ISSN 0377-0427 Cryptography and Security: (print), 1879-1778 (elec- From Theory to Applica- tronic). URL http:// tions: Essays Dedicated www.sciencedirect.com/ to Jean-Jacques Quisquater science/article/pii/S0377042711000914. REFERENCES 459

Nagaraj:2019:RCC towards cloud federation in the enterprise. The Journal [Nag19] S. V. Nagaraj. Review of Systems and Software, of Codes, Cryptology and 86(9):2269–2275, Septem- Curves with Computer Al- ber 2013. CODEN JS- gebra. ACM SIGACT SODM. ISSN 0164-1212 News, 50(1):14–16, March (print), 1873-1228 (elec- 2019. CODEN SIGNDM. tronic). URL http:// ISSN 0163-5700 (print), www.sciencedirect.com/ 1943-5827 (electronic). science/article/pii/S0164121212003408. Nunez:2017:PRE Nain:2017:SPE [NAL17] David Nu˜nez, Isaac Agudo, [NBZP17] Ajay Kumar Nain, Ja- and Javier Lopez. Proxy gadish Bandaru, Mo- re-encryption: Analysis of hammed Abdullah Zubair, constructions and its appli- and Rajalakshmi Pachamuthu. cation to secure access del- A secure phase-encrypted egation. Journal of Net- IEEE 802.15.4 transceiver work and Computer Ap- design. IEEE Transactions plications, 87(??):193–209, on Computers, 66(8):1421– June 1, 2017. CODEN 1427, ???? 2017. CO- JNCAF3. ISSN 1084-8045 DEN ITCOB4. ISSN 0018- (print), 1095-8592 (elec- 9340 (print), 1557-9956 tronic). URL http:// (electronic). URL http: www.sciencedirect.com/ //ieeexplore.ieee.org/ science/article/pii/S1084804517301078. document/7862216/. Namasudra:2019:IAB Naskar:2012:FIR [Nam19] Suyel Namasudra. An im- [NC12] Ruchira Naskar and Ra- proved attribute-based en- jat Subhra Chakraborty. cryption technique towards Fuzzy inference rule based the data security in cloud reversible watermarking for computing. Concurrency digital images. Lecture and Computation: Prac- Notes in Computer Sci- tice and Experience, 31(3): ence, 7671:149–163, 2012. e4364:1–e4364:??, Febru- CODEN LNCSD9. ISSN ary 10, 2019. CODEN 0302-9743 (print), 1611- CCPEBO. ISSN 1532-0626 3349 (electronic). URL (print), 1532-0634 (elec- http://link.springer. tronic). com/chapter/10.1007/978- Noureddine:2013:AMT 3-642-35130-3_11/. Naskar:2013:GTL [NB13] M. Noureddine and R. Bashroush. An authentication model [NC13] Ruchira Naskar and Ra- REFERENCES 460

jat Subhra Chakraborty. www.sciencedirect.com/ A generalized tamper lo- science/article/pii/S089812211200051X. calization approach for re- versible watermarking al- Narasimhan:2013:HTD gorithms. ACM Transac- [NDC+13] Seetharam Narasimhan, tions on Multimedia Com- Dongdong Du, Rajat Subhra puting, Communications, Chakraborty, Somnath and Applications, 9(3): Paul, Francis G. Wolff, 19:1–19:??, June 2013. CO- Christos A. Papachris- DEN ???? ISSN 1551-6857 tou, Kaushik Roy, and (print), 1551-6865 (elec- Swarup Bhunia. Hard- tronic). ware Trojan detection by Naranjo:2013:FDA multiple-parameter side- channel analysis. IEEE [NCCG13] J. A. M. Naranjo, F. Cores, Transactions on Com- L. G. Casado, and F. Guirado. puters, 62(11):2183–2195, Fully distributed authen- November 2013. CODEN tication with locality ex- ITCOB4. ISSN 0018-9340 ploitation for the CoDiP2P (print), 1557-9956 (elec- peer-to-peer computing tronic). platform. The Jour- nal of Supercomputing, Ngo:2017:CSS 65(3):1037–1049, Septem- [NDG+17] Xuan Thuy Ngo, Jean-Luc ber 2013. CODEN JO- Danger, Sylvain Guilley, SUED. ISSN 0920-8542 Tarik Graba, Yves Math- (print), 1573-0484 (elec- ieu, Zakaria Najm, and tronic). URL http:// Shivam Bhasin. Cryp- link.springer.com/article/ tographically secure shield 10.1007/s11227-012-0842- for security IPs protec- 2. tion. IEEE Transactions Ni:2013:EIB on Computers, 66(2):354– [NCL13] Liang Ni, Gongliang Chen, 360, ???? 2017. CODEN and Jianhua Li. Es- ITCOB4. ISSN 0018-9340 crowable identity-based au- (print), 1557-9956 (elec- thenticated key agreement tronic). protocol with strong se- Nedjah:2016:PYP curity. Computers and Mathematics with Appli- [NdMMW16] Nadia Nedjah, Luiza de Macedo Mourelle, cations, 65(9):1339–1349, and Chao Wang. A par- May 2013. CODEN allel yet pipelined archi- CMAPDK. ISSN 0898- tecture for efficient im- 1221 (print), 1873-7668 plementation of the Ad- (electronic). URL http:// vanced Encryption Stan- REFERENCES 461

dard algorithm on reconfig- bari, Hachem Slimani, urable hardware. Interna- and Djamil Aissani. A tional Journal of Parallel distributed authentication Programming, 44(6):1102– model for composite Web 1117, December 2016. CO- services. Computers & DEN IJPPE5. ISSN Security, 70(??):144–178, 0885-7458 (print), 1573- September 2017. CODEN 7640 (electronic). URL CPSEDU. ISSN 0167-4048 http://link.springer. (print), 1872-6208 (elec- com/article/10.1007/s10766- tronic). URL https:// 016-0408-7. www.sciencedirect.com/ Newell:2013:PCD science/article/pii/S0167404817301153. [NDNR13] Andrew Newell, Jing Dong, Naeem:2014:EIC

and Cristina Nita-Rotaru. + On the practicality of cryp- [NES 14] Ensherah A. Naeem, Mustafa tographic defences against M. Abd Elnaby, Naglaa F. pollution attacks in wire- Soliman, Alaa M. Ab- less network coding. ACM bas, Osama S. Faragallah, Computing Surveys, 45(3): Noura Semary, Mohiy M. 39:1–39:??, June 2013. CO- Hadhoud, Saleh A. Alshe- DEN CMSVAN. ISSN beili, and Fathi E. Abd 0360-0300 (print), 1557- El-Samie. Efficient imple- 7341 (electronic). mentation of chaotic im- age encryption in trans- Nejatollahi:2019:PQL form domains. The Journal

+ of Systems and Software, [NDR 19] Hamid Nejatollahi, Nikil 97(??):118–127, Novem- Dutt, Sandip Ray, Francesco ber 2014. CODEN JS- Regazzoni, Indranil Baner- SODM. ISSN 0164-1212 jee, and Rosario Cam- (print), 1873-1228 (elec- marota. Post-quantum tronic). URL http:// lattice-based cryptography www.sciencedirect.com/ implementations: a sur- science/article/pii/S0164121214001575. vey. ACM Computing Sur- veys, 51(6):129:1–129:??, Nafea:2016:HMB February 2019. CODEN CMSVAN. ISSN 0360-0300 [NGAuHQ16] Ohoud Nafea, Sanaa Ghouzali, (print), 1557-7341 (elec- Wadood Abdul, and Emad tronic). URL https:// ul Haq Qazi. Hybrid multi- dl.acm.org/ft_gateway. biometric template protec- cfm?id=3292548. tion using watermarking. Nacer:2017:DAM The Computer Journal, 59(9):1392–1407, Septem- [NDSA17] Hassina Nacer, Nabil Dje- ber 2016. CODEN CM- REFERENCES 462

PJA6. ISSN 0010-4620 NIST:2015:SSP (print), 1460-2067 (elec- tronic). URL http:// [NIS15] NIST. SHA-3 stan- comjnl.oxfordjournals. dard: Permutation-based org/content/59/9/1392. hash and extendable- output functions. FIPS Nievergelt:2002:FLM PUB 202, National In- [Nie02] Yves Nievergelt. Founda- stitute for Standards and tions of Logic and Math- Technology, Gaithersburg, ematics: Applications to MD 20899-8900, USA, Computer Science and 2015. viii + 29 pp. Cryptography. Birkh¨auser Verlag, Basel, Switzerland, Najafi:2019:VRS 2002. ISBN 0-8176-4249- 8 , 3-7643-4249-8. xvi [NJB19] Aniseh Najafi, Hamid + 415 pp. LCCN QA9 Haj Seyyed Javadi, and .N53 2002. URL http: Majid Bayat. Verifiable //www.loc.gov/catdir/ ranked search over en- enhancements/fy0812/2001052551- crypted data with forward d.html; http://www. and backward privacy. Fu- loc.gov/catdir/enhancements/ ture Generation Computer fy0812/2001052551-t.html. Systems, 101(??):410–419, December 2019. CODEN NIST:2012:RRN FGSEVI. ISSN 0167-739X (print), 1872-7115 (elec- [NIS12] NIST. Recommendation tronic). URL http:// for random number gen- www.sciencedirect.com/ eration using determinis- science/article/pii/S0167739X18323318. tic random bit generators. Special Publication 800- Nguyen:2014:DDI 90, National Institute for Standards and Technology, [NKWF14] Thanhvu Nguyen, Deepak Gaithersburg, MD 20899- Kapur, Westley Weimer, 8900, USA, 2012. URL and Stephanie Forrest. http://csrc.nist.gov/ DIG: a dynamic invari- publications/PubsSPs. ant generator for poly- html#800-90A. nomial and array invari- NIST:2013:CSS ants. ACM Transactions on Software Engineering [NIS13] NIST. Cryptographic stan- and Methodology, 23(4): dards statement. Na- 30:1–30:??, August 2014. tional Institute of Stan- CODEN ATSMER. ISSN dards and Technology, 1049-331X (print), 1557- September 2013. 7392 (electronic). REFERENCES 463

Ning:2012:DPB CODEN CCPEBO. ISSN 1532-0626 (print), 1532- [NLLJ12] H. Ning, H. Liu, Q. Liu, 0634 (electronic). and G. Ji. Directed path based authentication Nguyen:2018:TBU scheme for the Internet of [NM18] Toan Nguyen and Nasir Things. J.UCS: Journal Memon. Tap-based user of Universal Computer Sci- authentication for smart- ence, 18(9):1112–??, ???? watches. Computers & 2012. CODEN ???? ISSN Security, 78(??):174–186, 0948-6968. URL http:/ September 2018. CODEN /www.jucs.org/jucs_18_ CPSEDU. ISSN 0167-4048 9/directed_path_based_ (print), 1872-6208 (elec- authentication. tronic). URL https:// Ning:2015:APB www.sciencedirect.com/ science/article/pii/S0167404818303778. [NLY15] Huansheng Ning, Hong Liu, and Laurence T. Yang. Norta:2019:SFB Aggregated-proof based hi- erarchical authentication [NML19] Alex Norta, Raimundas scheme for the Internet of Matulevicius, and Ben- Things. IEEE Transac- jamin Leiding. Safe- tions on Parallel and Dis- guarding a formalized tributed Systems, 26(3): blockchain-enabled identity- 657–667, March 2015. CO- authentication protocol by DEN ITDSEO. ISSN 1045- applying security risk- 9219 (print), 1558-2183 oriented patterns. Com- (electronic). URL http:// puters & Security, 86(??): www.computer.org/csdl/ 253–269, September 2019. trans/td/2015/03/06767153- CODEN CPSEDU. ISSN abs.html. 0167-4048 (print), 1872- 6208 (electronic). URL Ning:2012:DCA https://www.sciencedirect. [NLYZ12] Huansheng Ning, Hong com/science/article/pii/ Liu, Laurence T. Yang, S0167404818302670. and Yan Zhang. Dual Nieto:2013:PVC cryptography authentica- tion protocol and its secu- [NMP+13] Juan Gonz´alez Nieto, Mark rity analysis for radio fre- Manulis, Bertram Poetter- quency identification sys- ing, Jothi Rangasamy, and tems. Concurrency and Douglas Stebila. Pub- Computation: Practice and licly verifiable ciphertexts. Experience, 24(17):2040– Journal of Computer Se- 2054, December 10, 2012. curity, 21(5):749–778, ???? REFERENCES 464

2013. CODEN JCSIET. CODEN LNCSD9. ISSN ISSN 0926-227X (print), 0302-9743 (print), 1611- 1875-8924 (electronic). 3349 (electronic). URL http://link.springer. Nieto:2014:FSH com/chapter/10.1007/978- [NMS14] Juan Manuel Gonz´alez Ni- 3-642-33065-0_8/. eto, Mark Manulis, and Neville-Neil:2015:KVH Dongdong Sun. Forward- secure hierarchical predi- [NN15] George V. Neville-Neil. cate encryption. The Com- Kode vicious: Hickory puter Journal, 57(4):510– dickory doc. Commu- 536, April 2014. CODEN nications of the Associa- CMPJA6. ISSN 0010-4620 tion for Computing Ma- (print), 1460-2067 (elec- chinery, 58(8):27–28, Au- tronic). URL http:// gust 2015. CODEN comjnl.oxfordjournals. CACMA2. ISSN 0001-0782 org/content/57/4/510. (print), 1557-7317 (elec- full.pdf+html. tronic). URL http:// cacm.acm.org/magazines/ Ntantogian:2015:GTF 2015/8/189849/fulltext. [NMX15] Christoforos Ntantogian, Nagy:2010:KDV Stefanos Malliaros, and [NNA10] Naya Nagy, Marius Nagy, Christos Xenakis. Gaithash- and Selim G. Akl. Key ing: a two-factor authen- distribution versus key en- tication scheme based on hancement in quantum gait features. Comput- cryptography. Parallel ers & Security, 52(??):17– Processing Letters, 20(3): 32, July 2015. CODEN 239–250, September 2010. CPSEDU. ISSN 0167-4048 CODEN PPLTEE. ISSN (print), 1872-6208 (elec- 0129-6264. tronic). URL https:// www.sciencedirect.com/ Navin:2010:ETU science/article/pii/S0167404815000413[NNAM10]. A. H. Navin, Z. Navadad, Nguyen:2012:DQB B. Aasadi, and M. Mir- nia. Encrypted tag [NN12] Anh P. Nguyen and by using data-oriented Thuc D. Nguyen. De- random number genera- termining quality of S- tor to increase security boxes using pseudo ran- in wireless sensor net- dom sequences generated work. In 2010 Interna- from stream ciphers. Lec- tional Conference on Com- ture Notes in Computer putational Intelligence and Science, 7440:72–79, 2012. Communication Networks REFERENCES 465

(CICN), pages 335–338. (print), 1872-6119 (elec- IEEE Computer Society tronic). URL http:// Press, 1109 Spring Street, www.sciencedirect.com/ Suite 300, Silver Spring, science/article/pii/S0020019013002731. MD 20910, USA, 2010. URL http://ieeexplore. Novotny:2010:TAE ieee.org/stamp/stamp. [Nov10] Martin Novotny. Time- jsp?tp=&arnumber=5701989. area efficient hardware Nordrum:2017:GBD architectures for cryp- tography and cryptanal- [Nor17] A. Nordrum. Govern by ysis, volume 12 of IT- blockchain: Dubai wants Security. Europ¨aischer one platform to rule them Universit¨atsverlag, Bochum, all, while Illinois will try Germany, 2010. ISBN 3- anything. IEEE Spec- 89966-351-9. xxvi + 194 trum, 54(10):54–55, Oc- pp. LCCN ???? tober 2017. CODEN IEESAM. ISSN 0018-9235 Nichols:2014:CSS (print), 1939-9340 (elec- [NPH+14] Tyler Nichols, Joe Pletcher, tronic). Braden Hollembaek, Adam Nose:2011:SWA Bates, Dave Tian, Ab- dulrahman Alkhelaifi, and [Nos11] Peter Nose. Security weak- Kevin Butler. CertShim: nesses of authenticated key Securing SSL certificate agreement protocols. In- verification through dy- formation Processing Let- namic linking. In ????, ed- ters, 111(14):687–696, July itor, ACM Conference on 31, 2011. CODEN IF- Computer and Communi- PLAT. ISSN 0020-0190 cations Security, page ?? (print), 1872-6119 (elec- ACM Press, New York, NY tronic). URL http:// 10036, USA, 2014. ISBN www.sciencedirect.com/ ???? LCCN ???? URL science/article/pii/S0020019011001074. ????. Nose:2014:SWS Nguyen:2011:APB

[Nos14] Peter Nose. Security [NR11] L. H. Nguyen and A. W. weaknesses of a signa- Roscoe. Authentication ture scheme and authenti- protocols based on low- cated key agreement proto- bandwidth unspoofable cols. Information Process- channels: A comparative ing Letters, 114(3):107– survey. Journal of Com- 115, March 2014. CODEN puter Security, 19(1):139– IFPLAT. ISSN 0020-0190 201, ???? 2011. CODEN REFERENCES 466

JCSIET. ISSN 0926-227X (print), 1532-0634 (elec- (print), 1875-8924 (elec- tronic). tronic). Niu:2015:CRS Nguyen:2012:SOU [NRZQ15] Danmei Niu, Lanlan Rui, [NR12] Long Hoang Nguyen and Cheng Zhong, and Xuesong A. W. Roscoe. Short- Qiu. A composition and output universal hash func- recovery strategy for mo- tions and their use in fast bile social network service and secure data authenti- in disaster. The Com- cation. Lecture Notes in puter Journal, 58(4):700– Computer Science, 7549: 708, April 2015. CODEN 326–345, 2012. CO- CMPJA6. ISSN 0010-4620 DEN LNCSD9. ISSN (print), 1460-2067 (elec- 0302-9743 (print), 1611- tronic). URL http:// 3349 (electronic). URL comjnl.oxfordjournals. http://link.springer. org/content/58/4/700. com/chapter/10.1007/978- 3-642-34047-5_19/. Naccache:2010:THI Negre:2015:NPA [NS10] David Naccache and Ahmad- Reza Sadeghi. Towards [NR15] C. Negre and J.-M. Robert. hardware-intrinsic secu- New parallel approaches rity: foundations and prac- for scalar multiplication in tice. Information Security elliptic curve over fields of and Cryptography. Spring- small characteristic. IEEE er-Verlag, Berlin, Ger- Transactions on Comput- many / Heidelberg, Ger- ers, 64(10):2875–2890, Oc- many / London, UK / etc., tober 2015. CODEN IT- 2010. ISBN 3-642-14451-9, COB4. ISSN 0018-9340 3-642-14452-7. xvi + 407 (print), 1557-9956 (elec- pp. LCCN ???? tronic). Nojoumian:2012:SRS Namasudra:2017:NSA [NS12] Mehrdad Nojoumian and [NR17] Suyel Namasudra and Douglas R. Stinson. Socio- Pinki Roy. A new secure rational secret sharing as authentication scheme for a new direction in ratio- cloud computing environ- nal cryptography. Lec- ment. Concurrency and ture Notes in Computer Computation: Practice and Science, 7638:18–37, 2012. Experience, 29(20):??, Oc- CODEN LNCSD9. ISSN tober 25, 2017. CODEN 0302-9743 (print), 1611- CCPEBO. ISSN 1532-0626 3349 (electronic). URL REFERENCES 467

http://link.springer. April 2014. CODEN CM- com/chapter/10.1007/978- PJA6. ISSN 0010-4620 3-642-34266-0_2/. (print), 1460-2067 (elec- tronic). URL http:// Natarajan:2015:MAD comjnl.oxfordjournals. [NSA15] V. Natarajan, Shina Sheen, org/content/57/4/494. and R. Anitha. Multilevel full.pdf+html. analysis to detect covert so- Neustaedter:2018:BTW cial botnet in multimedia social networks. The Com- [NSP+18] Carman Neustaedter, Samarth puter Journal, 58(4):679– Singhal, Rui Pan, Yasamin 687, April 2015. CODEN Heshmat, Azadeh Forghani, CMPJA6. ISSN 0010-4620 and John Tang. From (print), 1460-2067 (elec- being there to watch- tronic). URL http:// ing: Shared and dedi- comjnl.oxfordjournals. cated telepresence robot org/content/58/4/679. usage at academic confer- ences. ACM Transactions Nguyen:2017:DPA on Computer-Human In- teraction, 25(6):33:1–33:??, [NSBM17] Toan Van Nguyen, Napa December 2018. CODEN Sae-Bae, and Nasir Memon. ATCIF4. ISSN 1073-0516 DRAW-a-PIN: Authenti- (print), 1557-7325 (elec- cation using finger-drawn tronic). PIN on touch devices. Computers & Security,66 Nagano:2018:PRT (??):115–128, May 2017. CODEN CPSEDU. ISSN [NSX+18] Koki Nagano, Jaewoo Seo, 0167-4048 (print), 1872- Jun Xing, Lingyu Wei, 6208 (electronic). URL Zimo Li, Shunsuke Saito, https://www.sciencedirect. Aviral Agarwal, Jens Fur- com/science/article/pii/ sund, and Hao Li. paGAN: S0167404817300123. real-time avatars using dy- namic textures. ACM Niksefat:2014:ZPP Transactions on Graph- [NSMS14] Salman Niksefat, Babak ics, 37(6):258:1–258:??, Sadeghiyan, Payman Mo- November 2018. CODEN hassel, and Saeed Sadeghian. ATGRDF. ISSN 0730-0301 ZIDS: a privacy-preserving (print), 1557-7368 (elec- intrusion detection sys- tronic). tem using secure two- Nandakumar:2017:CAI party computation pro- tocols. The Computer [NTKG17] Rajalakshmi Nandakumar, Journal, 57(4):494–509, Alex Takakuwa, Tadayoshi REFERENCES 468

Kohno, and Shyamnath (print), 2197-845X (elec- Gollakota. CovertBand: tronic). LCCN QA9.58 Activity information leak- .L55 2010; QA76. Confer- age using music. Proceed- ence in honour of the 25th ings of the ACM on In- birthday of the Lenstra– teractive, Mobile, Wear- Lenstra–Lovasz Lattice Re- able and Ubiquitous Tech- duction Algorithm, LLL, nologies (IMWUT), 1(3): Caen, France. 87:1–87:24, ???? 2017. CODEN ???? ISSN Noorman:2017:SLC ???? URL http:// musicattacks.cs.washington.[NVM+17] Job Noorman, Jo Van edu/activity-information- Bulck, Jan Tobias M¨uhlberg, leakage.pdf. Frank Piessens, Pieter Maene, Bart Preneel, In- Nguyen:2012:LRS grid Verbauwhede, Jo- [NTY12] Manh Ha Nguyen, Keisuke hannes G¨otzfried, Tilo Tanaka, and Kenji Ya- M¨uller, and Felix Freiling. sunaga. Leakage-resilience Sancus 2.0: a low-cost se- of stateless/stateful public- curity architecture for IoT key encryption from hash devices. ACM Transac- proofs. Lecture Notes in tions on Privacy and Se- Computer Science, 7372: curity (TOPS), 20(3):7:1– 208–222, 2012. CO- 7:??, August 2017. CO- DEN LNCSD9. ISSN DEN ???? ISSN 2471-2566 0302-9743 (print), 1611- (print), 2471-2574 (elec- 3349 (electronic). URL tronic). http://link.springer. com/chapter/10.1007/978- Nie:2013:CHB 3-642-31448-3_16/. [NXB13] Xuyun Nie, Zhaohu Xu, Nguyen:2010:LAS and Johannes Buchmann. [NV10] Phong Quang Nguyen and Cryptanalysis of hash- Brigitte Vall´ee, editors. based tamed transforma- The LLL Algorithm: Sur- tion and minus signa- vey and Applications, In- ture scheme. Lecture formation Security and Notes in Computer Sci- Cryptography. Springer- ence, 7932:155–164, 2013. Verlag, Berlin, Germany / CODEN LNCSD9. ISSN Heidelberg, Germany / 0302-9743 (print), 1611- London, UK / etc., 2010. 3349 (electronic). URL ISBN 3-642-02294-4 (hard- http://link.springer. cover), 3-642-02295-2 (e- com/chapter/10.1007/978- book). ISSN 1619-7100 3-642-38616-9_10/. REFERENCES 469

Natgunanathan:2017:PBM (print), 1557-7341 (elec- tronic). [NXH+17] Iynkaran Natgunanathan, Yong Xiang, Guang Hua, Niu:2015:NAS Gleb Beliakov, and John [NZL+15] Ben Niu, Xiaoyan Zhu, Yearwood. Patchwork- Qinghua Li, Jie Chen, and based multilayer audio Hui Li. A novel attack watermarking. IEEE/ to spatial cloaking schemes ACM Transactions on Au- in location-based services. dio, Speech, and Lan- Future Generation Com- guage Processing, 25(11): puter Systems, 49(??):125– 2176–2187, ???? 2017. 132, August 2015. CO- CODEN ???? ISSN DEN FGSEVI. ISSN 0167- 2329-9290. URL http: 739X (print), 1872-7115 //ieeexplore.ieee.org/ (electronic). URL http:// document/8025572/. www.sciencedirect.com/ Ntantogian:2010:GME science/article/pii/S0167739X14002209. [NXS10] Christoforos Ntantogian, Nikooghadam:2010:EUE Christos Xenakis, and [NZM10] Morteza Nikooghadam, Ioannis Stavrakakis. A Ali Zakerolhosseini, and generic mechanism for ef- Mohsen Ebrahimi Moghad- ficient authentication in dam. Efficient utilization of b3g networks. Comput- elliptic curve cryptosystem ers & Security, 29(4):460– for hierarchical access con- 475, June 2010. CODEN trol. The Journal of Sys- CPSEDU. ISSN 0167-4048 tems and Software, 83(10): (print), 1872-6208 (elec- 1917–1929, October 2010. tronic). URL https:// CODEN JSSODM. ISSN www.sciencedirect.com/ 0164-1212. science/article/pii/S0167404809001242. Obana:2011:AOC Newell:2014:NCR [Oba11] Satoshi Obana. Al- [NYR+14] Andrew Newell, Hongyi most optimum t-cheater Yao, Alex Ryker, Tracey identifiable secret shar- Ho, and Cristina Nita- ing schemes. Lecture Rotaru. Node-capture re- Notes in Computer Sci- silient key establishment ence, 6632:284–302, 2011. in sensor networks: De- CODEN LNCSD9. ISSN sign space and new pro- 0302-9743 (print), 1611- tocols. ACM Computing 3349 (electronic). URL Surveys, 47(2):24:1–24:??, http://link.springer. November 2014. CODEN com/content/pdf/10.1007/ CMSVAN. ISSN 0360-0300 978-3-642-20465-4_17. REFERENCES 470

Oligeri:2011:REA Ozturk:2017:CAH

[OCDG11] Gabriele Oligeri, Stefano [ODSS17]¨ Erdin¸c Ozt¨¨ urk, Yarkın Chessa, Roberto Di Pietro, Dor¨oz, Erkay Sava¸s, and and Gaetano Giunta. Ro- Berk Sunar. A custom bust and efficient authen- accelerator for homomor- tication of video stream phic encryption applica- broadcasting. ACM Trans- tions. IEEE Transactions actions on Information and on Computers, 66(1):3–16, System Security, 14(1):5:1– January 2017. CODEN IT- 5:??, May 2011. CODEN COB4. ISSN 0018-9340 ATISBQ. ISSN 1094-9224 (print), 1557-9956 (elec- (print), 1557-7406 (elec- tronic). tronic). Oggier:2011:ACA Obrenovic:2012:IUC [OF11] Fr´ed´erique Oggier and [OdH12] Zeljkoˇ Obrenovic and Bart Hanane Fathi. An authen- den Haak. Integrating user tication code against pol- customization and authen- lution attacks in network tication: The identity cri- coding. IEEE/ACM Trans- sis. IEEE Security & Pri- actions on Networking,19 vacy, 10(5):82–85, Septem- (6):1587–1596, December ber/October 2012. ISSN 2011. CODEN IEANEP. 1540-7993 (print), 1558- ISSN 1063-6692 (print), 4046 (electronic). 1558-2566 (electronic).

Odelu:2017:PSA Obrien:2012:EPM

[ODK+17] Vanga Odelu, Ashok Ku- [OF12] James F. O’brien and Hany mar Das, Saru Kumari, Farid. Exposing photo Xinyi Huang, and Mo- manipulation with incon- hammad Wazid. Provably sistent reflections. ACM secure authenticated key Transactions on Graph- agreement scheme for dis- ics, 31(1):4:1–4:??, Jan- tributed mobile cloud com- uary 2012. CODEN AT- puting services. Future GRDF. ISSN 0730-0301 Generation Computer Sys- (print), 1557-7368 (elec- tems, 68(??):74–88, March tronic). 2017. CODEN FG- Onica:2016:CPP SEVI. ISSN 0167-739X (print), 1872-7115 (elec- [OFMR16] Emanuel Onica, Pascal Fel- tronic). URL http:// ber, Hugues Mercier, and www.sciencedirect.com/ Etienne Rivi`ere. Confidentiality- science/article/pii/S0167739X16303065. preserving publish/subscribe: REFERENCES 471

a survey. ACM Computing 30(2):??, January 25, 2018. Surveys, 49(2):27:1–27:??, CODEN CCPEBO. ISSN September 2016. CODEN 1532-0626 (print), 1532- CMSVAN. ISSN 0360-0300 0634 (electronic). (print), 1557-7341 (elec- tronic). Oliveira:2012:STA Oliynykov:2015:NES [OKG+12] Leonardo B. Oliveira, Aman Kansal, Conrado + [OGK 15] Roman Oliynykov, Ivan P. L. Gouvˆea, Diego F. Gorbenko, Oleksandr Kazymy- Aranha, Julio L´opez, rov, Victor Ruzhentsev, Bodhi Priyantha, Michel Oleksandr Kuznetsov, Yurii Goraczko, and Feng Zhao. Gorbenko, Oleksandr Dyrda, Secure-TWS: Authenticat- Viktor Dolgov, Andrii ing node to multi-user com- Pushkaryov, Ruslan Mord- munication in shared sen- vinov, and Dmytro Kaidalov. sor networks. The Com- A new encryption stan- puter Journal, 55(4):384– dard of Ukraine: The Ka- 396, April 2012. CODEN lyna block cipher. Cryp- CMPJA6. ISSN 0010-4620 tology ePrint Archive, Re- (print), 1460-2067 (elec- port 2015/650, 2015. URL tronic). URL http:// http://eprint.iacr.org/ comjnl.oxfordjournals. 2015/650. org/content/55/4/384. Ou:2010:CPA full.pdf+html. [OHJ10] Hsia-Hung Ou, Min-Shiang Or-Meir:2019:DMA Hwang, and Jinn-Ke Jan. A cocktail protocol with [OMNER19] Ori Or-Meir, Nir Nissim, the Authentication and Yuval Elovici, and Lior Key Agreement on the Rokach. Dynamic mal- UMTS. The Journal ware analysis in the mod- of Systems and Software, ern era — a state of the art 83(2):316–325, February survey. ACM Computing 2010. CODEN JSSODM. Surveys, 52(5):88:1–88:??, ISSN 0164-1212. October 2019. CODEN CMSVAN. ISSN 0360-0300 Ogiela:2018:EBI (print), 1557-7341 (elec- [OK18] Marek R. Ogiela and Hoon tronic). URL https:// Ko. Editorial: Bio-inspired dl.acm.org/ft_gateway. and cognitive approaches cfm?id=3329786. in cryptography and secu- Ortiz-Martin:2019:FAI rity applications. Concur- rency and Computation: [OMPSPL+19] Lara Ortiz-Martin, Pablo Practice and Experience, Picazo-Sanchez, Pedro REFERENCES 472

Peris-Lopez, Juan Tapi- 3349 (electronic). URL ador, and Gerardo Schnei- http://link.springer. der. Feasibility analysis of com/chapter/10.1007/978- inter-pulse intervals based 3-642-27890-7_15/. solutions for cryptographic Ogiela:2018:LTC token generation by two electrocardiogram sensors. [OO18] Urszula Ogiela and Lidia Future Generation Com- Ogiela. Linguistic tech- puter Systems, 96(??):283– niques for cryptographic 296, July 2019. CODEN data sharing algorithms. FGSEVI. ISSN 0167-739X Concurrency and Compu- (print), 1872-7115 (elec- tation: Practice and Ex- tronic). URL http:// perience, 30(3), Febru- www.sciencedirect.com/ ary 10, 2018. CO- science/article/pii/S0167739X18330784. DEN CCPEBO. ISSN 1532-0626 (print), 1532- Ogiela:2010:UML 0634 (electronic). URL [OO10] Marek R. Ogiela and https://onlinelibrary. Urszula Ogiela. The wiley.com/doi/abs/10. use of mathematical lin- 1002/cpe.4275. guistic methods in creat- Orlandi:2014:SCN ing secret sharing thresh- old algorithms. Comput- [OOR+14] Claudio Orlandi, Rafail ers and Mathematics with Ostrovsky, Vanishree Rao, Applications, 60(2):267– Amit Sahai, and Ivan Vis- 271, July 2010. CODEN conti. Statistical concur- CMAPDK. ISSN 0898- rent non-malleable zero 1221 (print), 1873-7668 knowledge. Lecture Notes (electronic). URL http:// in Computer Science, 8349: www.sciencedirect.com/ 167–191, 2014. CO- science/article/pii/S0898122110001379. DEN LNCSD9. ISSN 0302-9743 (print), 1611- Ohtake:2012:AAH 3349 (electronic). URL [OO12] Go Ohtake and Kazuto http://link.springer. Ogawa. Application au- com/chapter/10.1007/978- thentication for hybrid 3-642-54242-8_8/. services of broadcasting Obert:2016:PAE and communications net- works. Lecture Notes in [OPHC16] James Obert, Inna Pivk- Computer Science, 7115: ina, Hong Huang, and 171–186, 2012. CO- Huiping Cao. Proactively DEN LNCSD9. ISSN applied encryption in mul- 0302-9743 (print), 1611- tipath networks. Comput- REFERENCES 473

ers & Security, 58(??):106– Ormond:2016:CPR 124, May 2016. CODEN CPSEDU. ISSN 0167-4048 [Orm16] Jim Ormond. Cryptogra- (print), 1872-6208 (elec- phy pioneers receive ACM tronic). URL https:// A. M. Turing Award: Diffie www.sciencedirect.com/ and Hellman’s invention science/article/pii/S0167404815001960. of public-key cryptography and digital signatures rev- Oppliger:2011:CC olutionized computer se- curity and made Internet [Opp11] Rolf Oppliger. Con- commerce possible. Web temporary cryptography. document, March 1, 2016. Artech House Inc., Nor- URL http://www.acm. wood, MA, USA, second org/media-center/2016/ edition, 2011. ISBN 1- march/turing-award-2015. 60807-145-6. 612 (est.) pp. LCCN ???? URL http: Ozen:2011:MIS //www.artechhouse.com/ Detail.aspx?strIsbn=978- [O¸¨ S11] Mehmet Ozen¨ and Vedat 1-60807-145-6. Siap.¸ The MacWilliams Orumiehchiha:2014:PAN identity for m-spotty weight enumerators of linear codes [OPS14] Mohammad Ali Orumiehchiha, over finite fields. Comput- Josef Pieprzyk, and Ron ers and Mathematics with Steinfeld. Practical attack Applications, 61(4):1000– on NLM–MAC scheme. In- 1004, February 2011. CO- formation Processing Let- DEN CMAPDK. ISSN ters, 114(10):547–550, Oc- 0898-1221 (print), 1873- tober 2014. CODEN IF- 7668 (electronic). URL PLAT. ISSN 0020-0190 http://www.sciencedirect. (print), 1872-6119 (elec- com/science/article/pii/ tronic). URL http:// S0898122110009533. www.sciencedirect.com/ Owczarek:2012:LPL science/article/pii/S0020019014000696. ´ Orejel:2014:E [OS12] Agnieszka Owczarek and Krzysztof Slot.´ Lipreading [Ore14] Jorge Luis Orejel. ENIGMA. procedure for liveness ver- Web posting adapted from ification in video authen- chapter of unpublished tication systems. Lecture textbook, Applied Algo- Notes in Computer Sci- rithms and Data Struc- ence, 7208:115–124, 2012. tures., October 20, 2014. CODEN LNCSD9. ISSN URL http://www.codeproject. 0302-9743 (print), 1611- com/Articles/831015/ENIGMA. 3349 (electronic). URL REFERENCES 474

http://link.springer. January/June 2016. CO- com/chapter/10.1007/978- DEN ???? ISSN 1556-6056 3-642-28942-2_11/. (print), 1556-6064 (elec- tronic). Osborn:2016:SSR Ohtake:2019:OSA [OS16] Emma Osborn and Andrew Simpson. On safety and [OSNZ19] Go Ohtake, Reihaneh security requirements in Safavi-Naini, and Liang Feng emerging ubiquitous com- Zhang. Outsourcing puting models. The Com- scheme of ABE encryption puter Journal, 59(4):570– secure against malicious 591, April 2016. CODEN adversary. Computers & CMPJA6. ISSN 0010-4620 Security, 86(??):437–452, (print), 1460-2067 (elec- September 2019. CODEN tronic). URL http:// CPSEDU. ISSN 0167-4048 comjnl.oxfordjournals. (print), 1872-6208 (elec- org/content/59/4/570. tronic). URL https:// www.sciencedirect.com/ Ostad-Sharif:2019:TPS science/article/pii/S0167404819300525. [OSANAM19] Arezou Ostad-Sharif, Hamed Odelu:2019:EPP Arshad, Morteza Nikooghadam, and Dariush Abbasinezhad- [OSP+19] Vanga Odelu, Sourav Saha, Mood. Three party secure Rajendra Prasath, Lak- data transmission in IoT shminarayana Sadineni, networks through design of Mauro Conti, and Minho a lightweight authenticated Jo. Efficient privacy pre- key agreement scheme. Fu- serving device authentica- ture Generation Computer tion in WBANs for in- Systems, 100(??):882–892, dustrial e-health appli- November 2019. CODEN cations. Computers & FGSEVI. ISSN 0167-739X Security, 83(??):300–312, (print), 1872-7115 (elec- June 2019. CODEN tronic). URL http:// CPSEDU. ISSN 0167-4048 www.sciencedirect.com/ (print), 1872-6208 (elec- science/article/pii/S0167739X18309452. tronic). URL https:// www.sciencedirect.com/ Olson:2016:SIT science/article/pii/S0167404818308204. [OSH16] Lena E. Olson, Simha Orencik:2016:MKS Sethumadhavan, and Mark D. Hill. Security implications [OSSK16] Cengiz Orencik, Ayse Sel- of third-party accelerators. cuk, Erkay Savas, and Mu- IEEE Computer Architec- rat Kantarcio˘glu. Multi- ture Letters, 15(1):50–53, keyword search over en- REFERENCES 475

crypted data with scoring issn=1661-8270&volume= and search pattern obfus- 3&issue=2&spage=129. cation. International Jour- nal of Information Secu- Ogiela:2018:VCA rity, 15(3):251–269, June [OTO18] Urszula Ogiela, Makoto 2016. CODEN ???? ISSN Takizawa, and Lidia Ogiela. 1615-5262 (print), 1615- Visual CAPTCHA applica- 5270 (electronic). URL tion in linguistic cryptog- http://link.springer. raphy. Concurrency and com/article/10.1007/s10207- Computation: Practice and 015-0294-9. Experience, 30(2):??, Jan- Okamoto:2012:AAH uary 25, 2018. CODEN CCPEBO. ISSN 1532-0626 [OT12] Tatsuaki Okamoto and (print), 1532-0634 (elec- Katsuyuki Takashima. Adap- tronic). tively attribute-hiding (hi- erarchical) inner prod- Ohzeki:2012:NWM uct encryption. Lecture Notes in Computer Sci- [OWHS12] Kazuo Ohzeki, YuanYu ence, 7237:591–608, 2012. Wei, Yutaka Hirakawa, CODEN LNCSD9. ISSN and Kiyotsugu Sato. A 0302-9743 (print), 1611- new watermarking method 3349 (electronic). URL with obfuscated quasi- http://link.springer. chirp transform. Lecture com/accesspage/chapter/ Notes in Computer Sci- 10.1007/978-3-642-29011- ence, 7128:57–71, 2012. 4_34; http://link.springer. CODEN LNCSD9. ISSN com/chapter/10.1007/978- 0302-9743 (print), 1611- 3-642-29011-4_35/. 3349 (electronic). URL http://link.springer. Otmani:2010:CTM com/chapter/10.1007/978- [OTD10] Ayoub Otmani, Jean- 3-642-32205-1_7/. Pierre Tillich, and L´eonard Ortiz-Yepes:2014:BSA Dallot. Cryptanalysis of two McEliece cryptosys- [OYHSB14] D. A. Ortiz-Yepes, R. J. tems based on quasi-cyclic Hermann, H. Steinauer, codes. Mathematics in and P. Buhler. Bring- Computer Science, 3(2): ing strong authentication 129–140, April 2010. CO- and transaction security to DEN ???? ISSN 1661- the realm of mobile de- 8270 (print), 1661-8289 vices. IBM Journal of Re- (electronic). URL http:/ search and Development, /www.springerlink.com/ 58(1):4:1–4:11, January– openurl.asp?genre=article& February 2014. CODEN REFERENCES 476

IBMJAE. ISSN 0018-8646 DEN ???? ISSN 1550- (print), 2151-8556 (elec- 4832. tronic). Pal:2015:SDC Praba:2010:MAC [Pal15] Jiban K. Pal. Sciento- [PA10] V. Lakshmi Praba and metric dimensions of cryp- G. Arumugam. Message tographic research. Sci- authentication code algo- entometrics, 105(1):179– rithm for IP-SEC. Inter- 202, October 2015. CO- national Journal of Com- DEN SCNTDX. ISSN puter Systems Science 0138-9130 (print), 1588- and Engineering, 25(5):??, 2861 (electronic). URL September 2010. CODEN http://link.springer. CSSEEI. ISSN 0267-6192. com/article/10.1007/s11192- Parrilla:2019:ECC 015-1661-z.

[PABC´ +19] Luis Parrilla, Jos´eA. Pal:2016:ACC Alvarez-Bermejo,´ Encar- naci´on Castillo, Juan A. [Pal16] Jiban K. Pal. Adminis- L´opez-Ramos, Diego P. tering a cryptology centre Morales-Santos, and An- by means of scientometric tonio Garc´ıa. Elliptic indicators. Collnet Jour- curve cryptography hard- nal of Scientometrics and ware accelerator for high- Information Management, performance secure servers. 10(1):97–123, 2016. CO- The Journal of Supercom- DEN ???? ISSN 0973-7766 puting, 75(3):1107–1122, (print), 2168-930X (elec- March 2019. CODEN JO- tronic). SUED. ISSN 0920-8542 (print), 1573-0484 (elec- Pandey:2014:ACR tronic). Parveen:2018:IEE [Pan14] Omkant Pandey. Achiev- ing constant round leakage- [PAF18] Farhana Parveen, Shaahin resilient zero-knowledge. Angizi, and Deliang Fan. Lecture Notes in Com- IMFlexCom: Energy ef- puter Science, 8349:146– ficient in-memory flexi- 166, 2014. CODEN ble computing using dual- LNCSD9. ISSN 0302-9743 mode SOT-MRAM. ACM (print), 1611-3349 (elec- Journal on Emerging Tech- tronic). URL http:// nologies in Computing Sys- link.springer.com/chapter/ tems (JETC), 14(3):35:1– 10.1007/978-3-642-54242- 35:??, October 2018. CO- 8_7/. REFERENCES 477

Parent:2012:WAI Pass:2013:USP

[Par12a] Xavier Parent. Why be [Pas13a] Rafael Pass. Unprov- afraid of identity? Lecture able security of perfect Notes in Computer Sci- NIZK and non-interactive ence, 7360:295–307, 2012. non-malleable commit- CODEN LNCSD9. ISSN ments. Lecture Notes in 0302-9743 (print), 1611- Computer Science, 7785: 3349 (electronic). URL 334–354, 2013. CO- http://link.springer. DEN LNCSD9. ISSN com/chapter/10.1007/978- 0302-9743 (print), 1611- 3-642-29414-3_16/. 3349 (electronic). URL http://link.springer. Park:2012:APO com/chapter/10.1007/978- 3-642-36594-2_19/. [Par12b] Jong Hyuk Park. An au- thentication protocol of- Pranata:2013:MDR fering service anonymity [PAS13b] Ilung Pranata, Rukshan of mobile device in ubiq- Athauda, and Geoff Skin- uitous environment. The ner. Modeling decentral- Journal of Supercomput- ized reputation-based trust ing, 62(1):105–117, Octo- for initial transactions in ber 2012. CODEN JO- digital environments. ACM SUED. ISSN 0920-8542 Transactions on Internet (print), 1573-0484 (elec- Technology (TOIT), 12(3): tronic). URL http:/ 8:1–8:??, May 2013. CO- /www.springerlink.com/ DEN ???? ISSN 1533-5399 openurl.asp?genre=article& (print), 1557-6051 (elec- issn=0920-8542&volume= tronic). 62&issue=1&spage=105. Paulson:2010:SDO Park:2018:OTP [Pau10] Linda Dailey Paulson. [Par18] Chang-Seop Park. One- Steganography develop- time password based on ment offers promise. Com- hash chain without shared puter, 43(6):18–21, June secret and re-registration. 2010. CODEN CPTRB4. Computers & Security,75 ISSN 0018-9162 (print), (??):138–146, June 2018. 1558-0814 (electronic). CODEN CPSEDU. ISSN Paul:2019:RCS 0167-4048 (print), 1872- 6208 (electronic). URL [Pau19] J. D. Paul. Re-creating https://www.sciencedirect. the Sigsaly quantizer: This com/science/article/pii/ 1943 analog-to-digital con- S0167404818301391. verter gave the Allies an REFERENCES 478

unbreakable scrambler — Doo Ho Choi. A fault- [resources]. IEEE Spec- resistant implementation trum, 56(2):16–17, Febru- of AES using differential ary 2019. CODEN bytes between input and IEESAM. ISSN 0018-9235 output. The Journal of Su- (print), 1939-9340 (elec- percomputing, 67(3):615– tronic). 634, March 2014. CO- DEN JOSUED. ISSN Pandit:2012:EFS 0920-8542 (print), 1573- [PB12] Tapas Pandit and Rana 0484 (electronic). URL Barua. Efficient fully se- http://link.springer. cure attribute-based en- com/article/10.1007/s11227- cryption schemes for gen- 013-0950-7. eral access structures. Lecture Notes in Com- Poddar:2019:AED puter Science, 7496:193– 214, 2012. CODEN [PBP19] Rishabh Poddar, Tobias LNCSD9. ISSN 0302-9743 Boelter, and Raluca Ada (print), 1611-3349 (elec- Popa. Arx: an en- tronic). URL http:// crypted database using se- link.springer.com/chapter/ mantically secure encryp- 10.1007/978-3-642-33272- tion. Proceedings of the 2_13/. VLDB Endowment, 12(11): 1664–1678, July 2019. CO- Poh:2017:SDV DEN ???? ISSN 2150- [PBC+17] Geong Sen Poh, Vishnu Monn 8097. Baskaran, Ji-Jian Chin, Moesfa Soeheila Mohamad, Pun:2014:GIT Kay Win Lee, Dhar- madharshni Maniam, and [PC14] Chi-Man Pun and Ka- Muhammad Reza Z’aba. Cheng Choi. Generalized Searchable data vault: En- integer transform based crypted queries in secure reversible watermarking distributed cloud storage. algorithm using efficient Algorithms (Basel),10 location map encoding (2), June 2017. CODEN and adaptive threshold- ALGOCH. ISSN 1999- ing. Computing, 96(10): 4893 (electronic). URL 951–973, October 2014. https://www.mdpi.com/ CODEN CMPTA2. ISSN 1999-4893/10/2/52. 0010-485X (print), 1436- 5057 (electronic). URL Park:2014:FRI http://link.springer. [PBCC14] Jeong Soo Park, Ki Seok com/article/10.1007/s00607- Bae, Yong Je Choi, and 013-0357-6. REFERENCES 479

Paul:2016:TSO Premnath:2014:EHR [PC16] G. Paul and A. Chattopad- [PCPK14] Sriram Nandha Premnath, hyay. Three snakes in one Jessica Croft, Neal Pat- hole: The first system- wari, and Sneha Kumar atic hardware accelerator Kasera. Efficient high- design for SOSEMANUK rate secret key extraction with optional and in wireless sensor networks SNOW 2.0 modes. IEEE using collaboration. ACM Transactions on Comput- Transactions on Sensor ers, 65(2):640–653, ???? Networks, 11(1):2:1–2:??, 2016. CODEN ITCOB4. August 2014. CODEN ???? ISSN 0018-9340 (print), ISSN 1550-4859 (print), 1557-9956 (electronic). 1550-4867 (electronic). Papadopoulos:2014:LQA Poh:2017:SSE [PCDG14] Stavros Papadopoulos, Gra- [PCY+17] Geong Sen Poh, Ji-Jian ham Cormode, Antonios Chin, Wei-Chuen Yau, Deligiannakis, and Minos Kim-Kwang Raymond Choo, Garofalakis. Lightweight and Moesfa Soeheila Mo- query authentication on hamad. Searchable sym- streams. ACM Trans- metric encryption: Designs actions on Database Sys- and challenges. ACM Com- tems, 39(4):30:1–30:??, De- puting Surveys, 50(3):40:1– cember 2014. CODEN 40:??, October 2017. CO- ATDSD3. ISSN 0362-5915 DEN CMSVAN. ISSN (print), 1557-4644 (elec- 0360-0300 (print), 1557- tronic). 7341 (electronic). Perkovic:2019:LVL Pang:2014:PPA [PCK19] Toni Perkovi´c, Mario Ca- [PD14] Hweehwa Pang and Xuhua galj, and Tonko Kovacevi´c. Ding. Privacy-preserving LISA: Visible light based ad-hoc equi-join on out- initialization and SMS sourced data. ACM based authentication of Transactions on Database constrained IoT devices. Systems, 39(3):23:1–23:??, Future Generation Com- September 2014. CODEN puter Systems, 97(??):105– ATDSD3. ISSN 0362-5915 118, August 2019. CO- (print), 1557-4644 (elec- DEN FGSEVI. ISSN 0167- tronic). 739X (print), 1872-7115 Patranabis:2019:SCS (electronic). URL http:// www.sciencedirect.com/ [PDJ+19] S. Patranabis, N. Datta, science/article/pii/S0167739X18321083. D. Jap, J. Breier, S. Bhasin, REFERENCES 480

and D. Mukhopadhyay. comjnl.oxfordjournals. SCADFA: Combined SCA org/content/58/10/2738. + DFA attacks on block ciphers with practical val- Pippal:2012:SVU idations. IEEE Transac- [PDT12] Ravi Singh Pippal, Jaid- tions on Computers,68 har C. D., and Shashikala (10):1498–1510, October Tapaswi. Security vul- 2019. CODEN ITCOB4. nerabilities of user au- ISSN 0018-9340 (print), thentication scheme us- 1557-9956 (electronic). ing smart card. Lecture Notes in Computer Sci- Paul:2012:KSS ence, 7371:106–113, 2012. [PDMR12] Goutam Paul, Ian David- CODEN LNCSD9. ISSN son, Imon Mukherjee, and 0302-9743 (print), 1611- S. S. Ravi. Keyless 3349 (electronic). URL steganography in spatial http://link.springer. domain using energetic pix- com/chapter/10.1007/978- els. Lecture Notes in 3-642-31540-4_8/. Computer Science, 7671: Pearson:2011:NWC 134–148, 2012. CO- DEN LNCSD9. ISSN [Pea11] Joss Pearson, editor. Neil 0302-9743 (print), 1611- Webster’s cribs for vic- 3349 (electronic). URL tory: the untold story http://link.springer. of Bletchley Park’s secret com/chapter/10.1007/978- room. Polperro Heritage, 3-642-35130-3_10/. Clifton-upon-Teme, UK, 2011. ISBN 0-9559541-8- Pereira:2015:PKE 5 (paperback). ???? pp. LCCN ???? [PDNH15] Mayana Pereira, Rafael Dowsley, Anderson C. A. Peck:2012:CAC Nascimento, and Goichiro Hanaoka. Public-key en- [Pec12] Morgan E. Peck. The cryption schemes with cryptoanarchists’ answer to bounded CCA security cash. IEEE Spectrum,49 and optimal ciphertext (6):50–56, June 2012. CO- length based on the CDH DEN IEESAM. ISSN and HDH assumptions. 0018-9235 (print), 1939- The Computer Journal, 9340 (electronic). 58(10):2738–2746, Octo- Peck:2017:BWD ber 2015. CODEN CM- PJA6. ISSN 0010-4620 [Pec17] Morgan E. Peck. Blockchain (print), 1460-2067 (elec- world — do you need a tronic). URL http:// blockchain? This chart will REFERENCES 481

tell you if the technology ence, 7672:194–211, 2012. can solve your problem. CODEN LNCSD9. ISSN IEEE Spectrum, 54(10):38– 0302-9743 (print), 1611- 60, October 2017. CODEN 3349 (electronic). URL IEESAM. ISSN 0018-9235 http://link.springer. (print), 1939-9340 (elec- com/chapter/10.1007/978- tronic). 3-642-35362-8_16/. Persichetti:2013:SAH Pfleeger:2010:CJD

[Per13] Edoardo Persichetti. Se- [Pfl10] Charles P. Pfleeger. Crypto: cure and anonymous hy- Not just for the defen- brid encryption from cod- sive team. IEEE Secu- ing theory. Lecture Notes rity & Privacy, 8(2):63–66, in Computer Science, 7932: March/April 2010. CO- 174–187, 2013. CO- DEN ???? ISSN 1540-7993 DEN LNCSD9. ISSN (print), 1558-4046 (elec- 0302-9743 (print), 1611- tronic). 3349 (electronic). URL Peinado:2012:CAT http://link.springer. com/chapter/10.1007/978- [PFS12] Alberto Peinado and Am- 3-642-38616-9_12/. paro F´uster-Sabater. Cryp- Peterson:2011:SWS tographic analysis of a type of sequence genera- [Pet11] Heather R. Peterson. The tors. Lecture Notes in shape of the world: the Computer Science, 7671: story of Spanish expansion 265–276, 2012. CO- and the secret science of DEN LNCSD9. ISSN cosmography. Studies in 0302-9743 (print), 1611- History and Philosophy of 3349 (electronic). URL Science Part A, 42(1):223– http://link.springer. 226, March 2011. CODEN com/chapter/10.1007/978- SHPSB5. ISSN 0039-3681 3-642-35130-3_19/. (print), 1879-2510 (elec- tronic). URL http:// Poppelmann:2012:TEA www.sciencedirect.com/ [PG12] Thomas P¨oppelmann and science/article/pii/S0039368110000919. Tim G¨uneysu. Towards Petrlic:2012:PRE efficient arithmetic for lattice-based cryptography [Pet12] Ronald Petrlic. Proxy re- on reconfigurable hard- encryption in a privacy- ware. Lecture Notes in preserving cloud comput- Computer Science, 7533: ing DRM scheme. Lecture 139–158, 2012. CO- Notes in Computer Sci- DEN LNCSD9. ISSN REFERENCES 482

0302-9743 (print), 1611- 0302-9743 (print), 1611- 3349 (electronic). URL 3349 (electronic). URL http://link.springer. http://link.springer. com/chapter/10.1007/978- com/chapter/10.1007/978- 3-642-33481-8_8/. 3-642-35416-8_7/. Pendleton:2017:SSS Pohls:2012:RDI

[PGLCX17] Marcus Pendleton, Richard [PH12b] Henrich C. P¨ohls and Garcia-Lebron, Jin-Hee Focke H¨ohne. The role Cho, and Shouhuai Xu. A of data integrity in EU survey on systems security digital signature legisla- metrics. ACM Computing tion — achieving statutory Surveys, 49(4):62:1–62:??, trust for sanitizable sig- February 2017. CODEN nature schemes. Lecture CMSVAN. ISSN 0360-0300 Notes in Computer Sci- (print), 1557-7341 (elec- ence, 7170:175–192, 2012. tronic). CODEN LNCSD9. ISSN 0302-9743 (print), 1611- Peng:2010:SFW 3349 (electronic). URL http://link.springer. [PGLL10] Fei Peng, Re-Si Guo, com/chapter/10.1007/978- Chang-Tsun Li, and Min 3-642-29963-6_13/. Long. A semi-fragile watermarking algorithm Premnath:2016:SPC for authenticating 2D [PH16] Sriram Nandha Premnath CAD engineering graphics and Zygmunt J. Haas. Sup- based on log-polar trans- porting privacy of compu- formation. Computer- tations in mobile big data Aided Design, 42(12):1207– systems. Future Internet,8 1216, 2010. CODEN (2):17, May 10, 2016. CO- CAIDA5. ISSN 0010-4485 DEN ???? ISSN 1999- (print), 1879-2685 (elec- 5903. URL https://www. tronic). URL http:// mdpi.com/1999-5903/8/ www.sciencedirect.com/ 2/17. science/article/pii/S0010448510001491. Parno:2016:PNP Park:2012:IDF [PHGR16] Bryan Parno, Jon Howell, [PH12a] JeaHoon Park and JaeCheol Craig Gentry, and Mar- Ha. Improved differen- iana Raykova. Pinoc- tial fault analysis on block chio: nearly practical veri- cipher ARIA. Lecture fiable computation. Com- Notes in Computer Sci- munications of the As- ence, 7690:82–95, 2012. sociation for Computing CODEN LNCSD9. ISSN Machinery, 59(2):103–112, REFERENCES 483

February 2016. CODEN cryptographers’ track at CACMA2. ISSN 0001-0782 the RSA conference 2010, (print), 1557-7317 (elec- San Francisco, CA, USA, tronic). URL http:// March 1–5, 2010. Pro- cacm.acm.org/magazines/ ceedings, volume 5985 of 2016/2/197429/fulltext. Lecture notes in computer science. Springer-Verlag, Papas:2012:MLR Berlin, Germany / Heidel- [PHN+12] Marios Papas, Thomas berg, Germany / London, Houit, Derek Nowrouzezahrai, UK / etc., 2010. ISBN Markus Gross, and Woj- 3-642-11924-7 (softcover). ciech Jarosz. The magic LCCN ???? lens: refractive steganog- Pointcheval:2012:ACE raphy. ACM Transactions on Graphics, 31(6):186:1– [PJ12] David Pointcheval and 186:??, November 2012. Thomas Johansson, edi- CODEN ATGRDF. ISSN tors. Advances in Cryp- 0730-0301 (print), 1557- tology — EUROCRYPT 7368 (electronic). 2012: 31st Annual In- ternational Conference on Park:2010:SIC the Theory and Appli- cations of Cryptographic [PHWM10] Jong Hyuk Park, Sajid Techniques, Cambridge, Hussain, Guilin Wang, and UK, April 15–19. Proceed- Yi Mu. Special issue of ings, volume 7237 of Lec- computers and mathemat- ture Notes in Computer ics with applications on Science. Springer-Verlag, “Advances in cryptogra- Berlin, Germany / Heidel- phy, security and appli- berg, Germany / London, cations for future com- UK / etc., 2012. CO- puter science”. Com- DEN LNCSD9. ISBN 3- puters and Mathematics 642-29010-8. ISSN 0302- with Applications, 60(2): 9743 (print), 1611-3349 175, July 2010. CODEN (electronic). URL http:/ CMAPDK. ISSN 0898- /www.springerlink.com/ 1221 (print), 1873-7668 content/978-3-642-29010- (electronic). URL http:// 7. www.sciencedirect.com/ science/article/pii/S0898122110002695. Patel:2018:LLA Pieprzyk:2010:TCC [PJ18] Hasmukh Patel and De- vesh C. Jinwala. LPM: A [Pie10] Josef Pieprzyk, editor. lightweight authenticated Topics in cryptology — packet marking approach CT-RSA 2010: the 10th for IP traceback. Computer REFERENCES 484

Networks (Amsterdam, www.sciencedirect.com/ Netherlands: 1999), 140 science/article/pii/S0164121217302522. (??):41–50, July 20, 2018. Peter:2012:AHE CODEN ???? ISSN 1389- 1286 (print), 1872-7069 [PKTK12] Andreas Peter, Max Kron- (electronic). URL http:// berg, Wilke Trei, and Ste- www.sciencedirect.com/ fan Katzenbeisser. Ad- science/article/pii/S1389128618301786. ditively homomorphic en- cryption with a double de- Premarathne:2015:LDD cryption mechanism, re- visited. Lecture Notes in [PKA15] Uthpala Subodhani Pre- Computer Science, 7483: marathne, Ibrahim Khalil, 242–257, 2012. CO- and Mohammed Atiquzza- DEN LNCSD9. ISSN man. Location-dependent 0302-9743 (print), 1611- disclosure risk based de- 3349 (electronic). URL cision support framework http://link.springer. for persistent authentica- com/chapter/10.1007/978- tion in pervasive comput- 3-642-33383-5_15/. ing applications. Com- Phuc:2016:SAS puter Networks (Amster- dam, Netherlands: 1999), [PL16] Tran Song Dat Phuc and 88(??):161–177, Septem- Changhoon Lee. Secu- ber 9, 2015. CODEN rity analysis of SDDO- ???? ISSN 1389-1286 based block cipher for (print), 1872-7069 (elec- wireless sensor network. tronic). URL http:// The Journal of Supercom- www.sciencedirect.com/ puting, 72(9):3619–3628, science/article/pii/S1389128615001954. September 2016. CO- DEN JOSUED. ISSN Pramila:2018:ICA 0920-8542 (print), 1573- 0484 (electronic). URL [PKS18] Anu Pramila, Anja Ke- http://link.springer. skinarkaus, and Tapio com/article/10.1007/s11227- Sepp¨anen. Increasing 015-1589-3. the capturing angle in Perez:2011:FDS print-cam robust water- marking. The Journal [PLCGS11] Alejandro P´erez, Gabriel of Systems and Software, L´opez, Oscar´ C´anovas, 135(??):205–215, January and Antonio F. G´omez- 2018. CODEN JS- Skarmeta. Formal descrip- SODM. ISSN 0164-1212 tion of the SWIFT iden- (print), 1873-1228 (elec- tity management frame- tronic). URL http:// work. Future Generation REFERENCES 485

Computer Systems, 27(8): C. A. van der Lubbe, 1113–1123, October 2011. and Luis A. Entrena. CODEN FGSEVI. ISSN Cryptographically secure 0167-739X (print), 1872- pseudo-random bit gener- 7115 (electronic). ator for RFID tags. In 2010 International Confer- Peris-Lopez:2018:EAC ence for Internet Technol- [PLGMCdF18] Pedro Peris-Lopez, Lorena ogy and Secured Transac- Gonz´alez-Manzano, Car- tions (ICITST), pages 1– men Camara, and Jos´e Mar´ıa 6. IEEE Computer Society de Fuentes. Effect of at- Press, 1109 Spring Street, tacker characterization in Suite 300, Silver Spring, ECG-based continuous au- MD 20910, USA, 2010. thentication mechanisms URL http://ieeexplore. for Internet of Things. ieee.org/stamp/stamp. Future Generation Com- jsp?tp=&arnumber=5678035. puter Systems, 81(??):67– Perumal:2019:SDE 77, April 2018. CODEN FGSEVI. ISSN 0167-739X [PMG19a] Kaliram Perumal, Sug- (print), 1872-7115 (elec- anthi Muthusamy, and tronic). URL http:// Gowrison Gengavel. Sparse www.sciencedirect.com/ data encoder and decoder science/article/pii/S0167739X17300407. to improve security in video steganography. Con- Pang:2013:IMA currency and Computa- [PLPW13] Liaojun Pang, Huixian tion: Practice and Ex- Li, Qingqi Pei, and Yu- perience, 31(14):e4971:1– min Wang. Improvement e4971:??, July 25, 2019. on Meshram et al.’s ID- CODEN CCPEBO. ISSN based cryptographic mech- 1532-0626 (print), 1532- anism. Information Pro- 0634 (electronic). cessing Letters, 113(19– Pisani:2019:ABS 21):789–792, September/ October 2013. CODEN IF- [PMG+19b] Paulo Henrique Pisani, PLAT. ISSN 0020-0190 Abir Mhenni, Romain (print), 1872-6119 (elec- Giot, Estelle Cherrier, Nor- tronic). URL http:// man Poh, Andr´e Car- www.sciencedirect.com/ los Ponce de Leon Ferreira science/article/pii/S0020019013002081. de Carvalho, Christophe Peris-Lopez:2010:CSP Rosenberger, and Na- joua Essoukri Ben Amara. [PLSvdLE10] Pedro Peris-Lopez, En- Adaptive biometric sys- rique San Mill´an, Jan tems: Review and per- REFERENCES 486

spectives. ACM Comput- Computer Systems Science ing Surveys, 52(5):102:1– and Engineering, 25(1):??, 102:??, October 2019. CO- January 2010. CODEN DEN CMSVAN. ISSN CSSEEI. ISSN 0267-6192. 0360-0300 (print), 1557- Puthal:2017:DDK 7341 (electronic). URL https://dl.acm.org/ft_ [PNRC17] Deepak Puthal, Surya gateway.cfm?id=3344255. Nepal, Rajiv Ranjan, and Jinjun Chen. DLSeF: a Poh:2012:SEC dynamic key-length-based [PMZ12] Geong Sen Poh, Moesfa Soe- efficient real-time secu- heila Mohamad, and Muham- rity verification model for mad Reza Z’aba. Struc- big data stream. ACM tured encryption for con- Transactions on Embed- ceptual graphs. Lecture ded Computing Systems,16 Notes in Computer Sci- (2):51:1–51:??, April 2017. ence, 7631:105–122, 2012. CODEN ???? ISSN 1539- CODEN LNCSD9. ISSN 9087 (print), 1558-3465 0302-9743 (print), 1611- (electronic). 3349 (electronic). URL Niu:2014:RDW http://link.springer. com/chapter/10.1007/978- [pNyWyY+14] Pan pan Niu, Xiang yang 3-642-34117-5_7/. Wang, Hong ying Yang, Pande:2013:SMC Pei Wang, and Ai long Wang. A robust digital [PMZ13] Amit Pande, Prasant Mo- watermarking based on lo- hapatra, and Joseph Zam- cal complex angular radial breno. Securing multi- transform. Fundamenta media content using joint Informaticae, 135(3):243– compression and encryp- 268, July 2014. CODEN tion. IEEE MultiMe- FUMAAJ. ISSN 0169-2968 dia, 20(4):50–61, October/ (print), 1875-8681 (elec- December 2013. CODEN tronic). IEMUE4. ISSN 1070-986X (print), 1941-0166 (elec- Powers:2014:OSCa tronic). [Pow14] Shawn Powers. The open- Poursakidis:2010:TPC source classroom: encrypt- ing your cat photos. Linux [PN10] V. Poursakidis and C. Niko- Journal, 2014(237):8:1– laou. Towards a person- 8:??, January 2014. CO- centric Identity Manage- DEN LIJOFX. ISSN 1075- ment Infrastructure (IMI). 3583 (print), 1938-3827 International Journal of (electronic). REFERENCES 487

Paar:2010:UCT P:2018:ABE

[PP10a] Christof Paar and Jan [PPA18] Praveen Kumar P, Syam Ku- Pelzl. Understanding Cryp- mar P, and Alphonse P. J. tography: a Textbook for A. Attribute based encryp- Students and Practitioners. tion in cloud computing: A Springer-Verlag, Berlin, survey, gap analysis, and Germany / Heidelberg, future directions. Journal Germany / London, UK / of Network and Computer etc., 2010. ISBN 3-642- Applications, 108(??):37– 04100-0 (hardcover), 3-642- 52, April 15, 2018. CODEN 04101-9 (ebk.). xviii + 372 JNCAF3. ISSN 1084-8045 pp. LCCN Z104 .P33 2010. (print), 1095-8592 (elec- tronic). URL http:// www.sciencedirect.com/ Papadopoulos:2010:TRM science/article/pii/S1084804518300547.

[PP10b] Konstantinos Papadopou- Pereira:2016:SHB los and Ioannis Papaef- stathiou. Titan-R: a [PPB16] Geovandro C. C. F. Pereira, multigigabit reconfigurable Cassius Puodzius, and combined compression/ Paulo S. L. M. Bar- decompression unit. ACM reto. Shorter hash- Transactions on Reconfig- based signatures. The urable Technology and Sys- Journal of Systems and tems, 3(2):7:1–7:??, May Software, 116(??):95–100, 2010. CODEN ???? ISSN June 2016. CODEN JS- 1936-7406 (print), 1936- SODM. ISSN 0164-1212 7414 (electronic). (print), 1873-1228 (elec- tronic). URL http:// Park:2011:ACC www.sciencedirect.com/ science/article/pii/S0164121215001466.

[PP11] Ki-Woong Park and Kyu Ho Pennino:2019:PIS Park. ACCENT: Cogni- tive cryptography plugged [PPG19] Diego Pennino, Maur- compression for SSL/TLS- izio Pizzonia, and Fed- based cloud computing ser- erico Griscioli. Pipeline- vices. ACM Transac- integrity: Scaling the use of tions on Internet Tech- authenticated data struc- nology (TOIT), 11(2):7:1– tures up to the cloud. Fu- 7:??, December 2011. CO- ture Generation Computer DEN ???? ISSN 1533-5399 Systems, 100(??):618–647, (print), 1557-6051 (elec- November 2019. CODEN tronic). FGSEVI. ISSN 0167-739X REFERENCES 488

(print), 1872-7115 (elec- Notes in Computer Sci- tronic). URL http:// ence, 7483:1–22, 2012. CO- www.sciencedirect.com/ DEN LNCSD9. ISSN science/article/pii/S0167739X18328048. 0302-9743 (print), 1611- 3349 (electronic). URL Pendl:2012:ECC http://link.springer. [PPH12] Christian Pendl, Markus com/chapter/10.1007/978- Pelnar, and Michael Hut- 3-642-33383-5_1/. ter. Elliptic curve cryp- Phan:2012:DDB tography on the WISP UHF RFID tag. Lec- [PPS12a] Duong Hieu Phan, David ture Notes in Computer Pointcheval, and Mario Science, 7055:32–47, 2012. Strefler. Decentralized dy- CODEN LNCSD9. ISSN namic broadcast encryp- 0302-9743 (print), 1611- tion. Lecture Notes in 3349 (electronic). URL Computer Science, 7485: http://link.springer. 166–183, 2012. CO- com/chapter/10.1007/978- DEN LNCSD9. ISSN 3-642-25286-0_3/. 0302-9743 (print), 1611- 3349 (electronic). URL Pyun:2012:IBF http://link.springer. [PPR+12] Young June Pyun, Younghee com/chapter/10.1007/978- Park, Douglas S. Reeves, 3-642-32928-9_10/. Xinyuan Wang, and Peng Phan:2012:MBT Ning. Interval-based flow watermarking for tracing [PPS12b] Duong Hieu Phan, David interactive traffic. Com- Pointcheval, and Mario puter Networks (Amster- Strefler. Message-based dam, Netherlands: 1999), traitor tracing with opti- 56(5):1646–1665, March mal ciphertext rate. Lec- 30, 2012. CODEN ture Notes in Computer ???? ISSN 1389-1286 Science, 7533:56–77, 2012. (print), 1872-7069 (elec- CODEN LNCSD9. ISSN tronic). URL http:// 0302-9743 (print), 1611- www.sciencedirect.com/ 3349 (electronic). URL science/article/pii/S1389128612000412. http://link.springer. com/chapter/10.1007/978- Pathak:2012:PPS 3-642-33481-8_4/. [PPRT12] Manas Pathak, Jose Portelo, Papadopoulos:2015:PAP Bhiksha Raj, and Is- abel Trancoso. Privacy- [PPTT15] Dimitrios Papadopoulos, preserving speaker au- Charalampos Papaman- thentication. Lecture thou, Roberto Tamassia, REFERENCES 489

and Nikos Triandopou- Bosque, C. S´anchez-Azqueta, los. Practical authen- and S. Celma. Self- ticated pattern matching synchronized encryption with optimal proof size. for physical layer in 10Gbps Proceedings of the VLDB optical links. IEEE Trans- Endowment, 8(7):750–761, actions on Computers,68 February 2015. CODEN (6):899–911, June 2019. ???? ISSN 2150-8097. CODEN ITCOB4. ISSN Pandey:2012:PPS 0018-9340 (print), 1557- 9956 (electronic). [PR12] Omkant Pandey and Yan- nis Rouselakis. Prop- Puthal:2019:SAL erty preserving symmet- [PRN+19] Deepak Puthal, Rajiv ric encryption. Lecture Ranjan, Ashish Nanda, Notes in Computer Sci- Priyadarsi Nanda, Prem Prakash ence, 7237:375–391, 2012. Jayaraman, and Albert Y. CODEN LNCSD9. ISSN Zomaya. Secure authenti- 0302-9743 (print), 1611- cation and load balancing 3349 (electronic). URL of distributed edge data- http://link.springer. centers. Journal of Parallel com/accesspage/chapter/ and Distributed Comput- 10.1007/978-3-642-29011- ing, 124(??):60–69, Febru- 4_22; http://link.springer. ary 2019. CODEN JPD- com/chapter/10.1007/978- CER. ISSN 0743-7315 3-642-29011-4_23/. (print), 1096-0848 (elec- Piret:2012:PBC tronic). URL http:// www.sciencedirect.com/ [PRC12] Gilles Piret, Thomas Roche, science/article/pii/S074373151830741X. and Claude Carlet. PI- CARO — a block cipher Proudfoot:2015:WTH allowing efficient higher- order side-channel resis- [Pro15] D. Proudfoot. What Tur- tance. Lecture Notes in ing himself said about the Computer Science, 7341: imitation game. IEEE 311–328, 2012. CO- Spectrum, 52(7):42–47, DEN LNCSD9. ISSN July 2015. CODEN 0302-9743 (print), 1611- IEESAM. ISSN 0018-9235 3349 (electronic). URL (print), 1939-9340 (elec- http://link.springer. tronic). com/chapter/10.1007/978- Polyakov:2017:FPR 3-642-31284-7_19/. Perez-Resa:2019:SSE [PRSV17] Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, and [PRGBSAC19] A. P´erez-Resa, M. Garcia- Vinod Vaikuntanathan. REFERENCES 490

Fast proxy re-encryption analysis of cryptographic for publish/subscribe sys- protocols: Coloured Petri tems. ACM Transactions nets-based method. Fun- on Privacy and Security damenta Informaticae, 130 (TOPS), 20(4):14:1–14:??, (4):423–466, October 2014. October 2017. CODEN CODEN FUMAAJ. ISSN ???? ISSN 2471-2566 0169-2968 (print), 1875- (print), 2471-2574 (elec- 8681 (electronic). tronic). Perazzo:2015:DRL Popa:2012:CPQ [PSD15] Pericle Perazzo, Pavel [PRZB12] Raluca Ada Popa, Cather- Skvortsov, and Gianluca ine M. S. Redfield, Nicko- Dini. On designing re- lai Zeldovich, and Hari Bal- silient location-privacy ob- akrishnan. CryptDB: pro- fuscators. The Computer cessing queries on an en- Journal, 58(10):2649–2664, crypted database. Com- October 2015. CODEN munications of the As- CMPJA6. ISSN 0010-4620 sociation for Computing (print), 1460-2067 (elec- Machinery, 55(9):103–111, tronic). URL http:// September 2012. CODEN comjnl.oxfordjournals. CACMA2. ISSN 0001-0782 org/content/58/10/2649. (print), 1557-7317 (elec- tronic). Pereira:2013:SLC Priemuth-Schmid:2012:ASV [PSdO+13] Geovandro C. C. F. Pereira, Mateus A. S. Santos, [PS12] Deike Priemuth-Schmid. Bruno T. de Oliveira, Attacks on simplified ver- Marcos A. Simplicio, Jr., sions of K2. Lecture Paulo S. L. M. Barreto, Notes in Computer Sci- C´ıntia B. Margi, and Wil- ence, 7053:117–127, 2012. son V. Ruggiero. SM- CODEN LNCSD9. ISSN SCrypto: a lightweight 0302-9743 (print), 1611- cryptographic framework 3349 (electronic). URL for secure SMS transmis- http://link.springer. sion. The Journal of Sys- com/chapter/10.1007/978- tems and Software, 86(3): 3-642-25261-7_9/. 698–706, March 2013. CO- Permpoontanalarp:2014:FTG DEN JSSODM. ISSN 0164-1212 (print), 1873- [PS14] Yongyuth Permpoontanalarp 1228 (electronic). URL and Panupong Sornkhom. http://www.sciencedirect. On-the-fly trace generation com/science/article/pii/ approach to the security S0164121212003056. REFERENCES 491

Phatak:2013:SIN URL https://www.mdpi. com/1999-5903/10/7/66. [PSJ+13] Dhananjay Phatak, Alan T. Sherman, Nikhil Joshi, Picazo-Sanchez:2013:CRS Bhushan Sonawane, Vivek G. [PSOMPL13] Pablo Picazo-Sanchez, Lara Relan, and Amol Dawalb- Ortiz-Martin, and Pedro hakta. Spread identity: Peris-Lopez. Cryptanal- A new dynamic address ysis of the RNTS sys- remapping mechanism for tem. The Journal of Su- anonymity and DDoS de- percomputing, 65(2):949– fense. Journal of Com- 960, August 2013. CO- puter Security, 21(2):233– DEN JOSUED. ISSN 281, ???? 2013. CODEN 0920-8542 (print), 1573- JCSIET. ISSN 0926-227X 0484 (electronic). URL (print), 1875-8924 (elec- http://link.springer. tronic). com/article/10.1007/s11227- Patranabis:2017:PSK 013-0873-3. Park:2013:PPM [PSM17] S. Patranabis, Y. Shrivas- tava, and D. Mukhopad- [PSS+13] Y. Park, C. Sur, S. Shin, hyay. Provably secure key- K.-H. Rhee, and C. Seo. aggregate cryptosystems A privacy preserving mes- with broadcast aggregate sage delivery protocol us- keys for online data shar- ing identity-hidden index ing on the cloud. IEEE in VDTNs. J.UCS: Jour- Transactions on Comput- nal of Universal Computer ers, 66(5):891–904, May Science, 19(16):2385–??, 2017. CODEN ITCOB4. ???? 2013. CODEN ISSN 0018-9340 (print), ???? ISSN 0948-695X 1557-9956 (electronic). (print), 0948-6968 (elec- tronic). URL http://www. Pizzi:2018:ETM jucs.org/jucs_19_16/a_ [PSM+18] Sara Pizzi, Chiara Suraci, privacy_preserving_message. Leonardo Militano, An- Pankhuri:2019:PBM tonino Orsino, Antonella Molinaro, Antonio Iera, [PSSK19] Pankhuri, Akash Sinha, and Giuseppe Araniti. En- Gulshan Shrivastava, and abling trustworthy mul- Prabhat Kumar. A ticast wireless services pattern-based multi-factor through D2D communi- authentication system. Scal- cations in 5G networks. able Computing: Prac- Future Internet, 10(7):66, tice and Experience,20 July 11, 2018. CODEN (1):101–112, ???? 2019. ???? ISSN 1999-5903. CODEN ???? ISSN REFERENCES 492

1895-1767. URL https: AMHCBQ. ISSN 0096- //www.scpe.org/index. 3003 (print), 1873-5649 php/scpe/article/view/ (electronic). URL http:// 1460. www.sciencedirect.com/ Papamanthou:2013:SCC science/article/pii/S0096300313012046. [PST13] Charalampos Papaman- Paletov:2018:ICA thou, Elaine Shi, and [PTRV18] Rumen Paletov, Petar Roberto Tamassia. Sig- Tsankov, Veselin Raychev, natures of correct compu- and Martin Vechev. Infer- tation. Lecture Notes in ring crypto API rules from Computer Science, 7785: code changes. ACM SIG- 222–242, 2013. CO- PLAN Notices, 53(4):450– DEN LNCSD9. ISSN 464, April 2018. CODEN 0302-9743 (print), 1611- SINODQ. ISSN 0362-1340 3349 (electronic). URL (print), 1523-2867 (print), http://link.springer. 1558-1160 (electronic). com/chapter/10.1007/978- 3-642-36594-2_13/. Papamanthou:2016:AHT Peng:2019:GCS [PTT16] Charalampos Papaman- thou, Roberto Tamassia, [PT19] Liqiang Peng and At- and Nikos Triandopou- sushi Takayasu. General- los. Authenticated hash ized cryptanalysis of small tables based on crypto- CRT-exponent RSA. The- graphic accumulators. Al- oretical Computer Science, gorithmica, 74(2):664–712, 795(??):432–458, Novem- February 2016. CO- ber 26, 2019. CODEN DEN ALGOEJ. ISSN TCSCDI. ISSN 0304-3975 0178-4617 (print), 1432- (print), 1879-2294 (elec- 0541 (electronic). URL tronic). URL http:// http://link.springer. www.sciencedirect.com/ com/article/10.1007/s00453- science/article/pii/S0304397519304669. 014-9968-3. Papakostas:2014:MBL Pudovkina:2012:RKA [PTK14] G. A. Papakostas, E. D. [Pud12] Marina Pudovkina. A Tsougenis, and D. E. related-key attack on block Koulouriotis. Moment- ciphers with weak recur- based local image water- rent key schedules. Lecture marking via genetic opti- Notes in Computer Sci- mization. Applied Math- ence, 6888:90–101, 2012. ematics and Computa- CODEN LNCSD9. ISSN tion, 227(??):222–236, Jan- 0302-9743 (print), 1611- uary 15, 2014. CODEN 3349 (electronic). URL REFERENCES 493

http://link.springer. www.sciencedirect.com/ com/chapter/10.1007/978- science/article/pii/S0164121213001623. 3-642-27901-0_8/. Pham:2019:SSS Padget:2017:FGA [PWS19a] Hoang Pham, Jason Wood- [PV17] Julian A. Padget and worth, and Mohsen Amini Wamberto W. Vasconce- Salehi. Survey on secure los. Fine-grained access search over encrypted data control via policy-carrying on the cloud. Concurrency data. ACM Transac- and Computation: Practice tions on Internet Technol- and Experience, 31(17): ogy (TOIT), 18(3):31:1– e5284:1–e5284:??, Septem- 31:??, May 2017. CO- ber 10, 2019. CODEN DEN ???? ISSN 1533-5399 CCPEBO. ISSN 1532-0626 (print), 1557-6051 (elec- (print), 1532-0634 (elec- tronic). tronic). Pellikaan:2017:CCC Puthal:2019:SSE

[PWBJ17] Ruud Pellikaan, Xin- [PWS+19b] D. Puthal, X. Wu, N. Surya, Wen Wu, Stanislav Bu- R. Ranjan, and J. Chen. lygin, and Relinde Jur- SEEN: A selective encryp- rius. Codes, Cryptology and tion method to ensure con- Curves with Computer Al- fidentiality for big sensing gebra. Cambridge Univer- data streams. IEEE Trans- sity Press, Cambridge, UK, actions on Big Data, 5(3): 2017. ISBN 0-521-52036-3 379–392, September 2019. (paperback), 0-521-81711- ISSN 2332-7790. 0 (hardcover), 0-511-98217- Poller:2012:EIC 8 (e-book). xii + 597 pp. LCCN QA268 .P45 2017. [PWVT12] Andreas Poller, Ulrich Waldmann, Sven Vowe, Pei:2013:ARW and Sven Turpe. Electronic [PWLL13] Qingqi Pei, Xiang Wang, identity cards for user au- Yuan Li, and Hui Li. Adap- thentication — promise tive reversible watermark- and practice. IEEE Se- ing with improved embed- curity & Privacy, 10(1): ding capacity. The Journal 46–54, January/February of Systems and Software, 2012. ISSN 1540-7993 86(11):2841–2848, Novem- (print), 1558-4046 (elec- ber 2013. CODEN JS- tronic). SODM. ISSN 0164-1212 Peng:2010:IWM (print), 1873-1228 (elec- tronic). URL http:// [PWW10] Hong Peng, Jun Wang, and REFERENCES 494

Weixing Wang. Image wa- thentication. Future Gen- termarking method in mul- eration Computer Systems, tiwavelet domain based on 80(??):627–639, March support vector machines. 2018. CODEN FG- The Journal of Systems SEVI. ISSN 0167-739X and Software, 83(8):1470– (print), 1872-7115 (elec- 1477, August 2010. CO- tronic). URL http:// DEN JSSODM. ISSN www.sciencedirect.com/ 0164-1212. science/article/pii/S0167739X16301492. Pongaliur:2013:SNS Philippaerts:2013:CMC

[PX13] Kanthakumar Pongaliur [PYM+13] Pieter Philippaerts, Yves and Li Xiao. Sensor node Younan, Stijn Muylle, source privacy and packet Frank Piessens, Sven Lach- recovery under eavesdrop- mund, and Thomas Walter. ping and node compromise CPM: Masking code point- attacks. ACM Transac- ers to prevent code injec- tions on Sensor Networks, tion attacks. ACM Trans- 9(4):50:1–50:??, July 2013. actions on Information and CODEN ???? ISSN 1550- System Security, 16(1):1:1– 4859 (print), 1550-4867 1:??, June 2013. CODEN (electronic). ATISBQ. ISSN 1094-9224 (print), 1557-7406 (elec- Pja:2019:SSG tronic). [PY19] Alphonse Pja and Venka- Pei:2015:SWT tramana Reddy Y. Scal- able and secure group key [PYM+15] Qingqi Pei, Dingyu Yan, agreement for wireless ad- Lichuan Ma, Zi Li, and hoc networks by extending Yang Liao. A strong and RSA scheme. Concurrency weak ties feedback-based and Computation: Practice trust model in multimedia and Experience, 31(14): social networks. The Com- e4969:1–e4969:??, July 25, puter Journal, 58(4):627– 2019. CODEN CCPEBO. 643, April 2015. CODEN ISSN 1532-0626 (print), CMPJA6. ISSN 0010-4620 1532-0634 (electronic). (print), 1460-2067 (elec- tronic). URL http:// Pagnin:2018:HDB comjnl.oxfordjournals. [PYH+18] Elena Pagnin, Anjia Yang, org/content/58/4/627. Qiao Hu, Gerhard Hancke, Papadopoulos:2010:CAR and Aikaterini Mitrokotsa. HB+DB: Distance bound- [PYP10] Stavros Papadopoulos, Yin ing meets human based au- Yang, and Dimitris Pa- REFERENCES 495

padias. Continuous au- 92, April 7, 2018. CO- thentication on relational DEN ???? ISSN 1389-1286 streams. VLDB Journal: (print), 1872-7069 (elec- Very Large Data Bases, tronic). URL http:// 19(2):161–180, April 2010. www.sciencedirect.com/ CODEN VLDBFR. ISSN science/article/pii/S1389128618300227. 1066-8888 (print), 0949- 877X (electronic). Peng:2019:EDI + Phuong:2018:CBE [PZL 19] Su Peng, Fucai Zhou, Jin Li, Qiang Wang, and [PYS18] Tran Viet Xuan Phuong, Zifeng Xu. Efficient, dy- Guomin Yang, and Willy namic and identity-based Susilo. Criteria-based Remote Data Integrity encryption. The Com- Checking for multiple repli- puter Journal, 61(4):512– cas. Journal of Network 525, April 1, 2018. CODEN and Computer Applica- CMPJA6. ISSN 0010-4620 tions, 134(??):72–88, May (print), 1460-2067 (elec- 15, 2019. CODEN JN- tronic). URL http:// CAF3. ISSN 1084-8045 academic.oup.com/comjnl/ (print), 1095-8592 (elec- article/61/4/512/4430306. tronic). URL http:// www.sciencedirect.com/ Popa:2015:HCD science/article/pii/S1084804519300657. [PZ15] R. A. Popa and N. Zel- Patsakis:2015:PSM dovich. How to compute with data you can’t see. [PZPS15] Constantinos Patsakis, Athana- IEEE Spectrum, 52(8):42– sios Zigomitros, Achil- 47, August 2015. CODEN leas Papageorgiou, and IEESAM. ISSN 0018-9235 Agusti Solanas. Privacy (print), 1939-9340 (elec- and security for multi- tronic). media content shared on OSNs: Issues and coun- Pournaghi:2018:NNE termeasures. The Com- [PZBF18] Seyed Morteza Pournaghi, puter Journal, 58(4):518– Behnam Zahednejad, Ma- 535, April 2015. CODEN jid Bayat, and Yaghoub CMPJA6. ISSN 0010-4620 Farjami. NECPPA: A (print), 1460-2067 (elec- novel and efficient condi- tronic). URL http:// tional privacy-preserving comjnl.oxfordjournals. authentication scheme for org/content/58/4/518. VANET. Computer Net- Qiu:2018:QDS works (Amsterdam, Nether- lands: 1999), 134(??):78– [QCX18] Lirong Qiu, Feng Cai, and REFERENCES 496

Guixian Xu. Quantum dig- Qu:2013:DPA ital signature for the access control of sensitive data [QGGL13] Bo Qu, Dawu Gu, Zheng in the big data era. Fu- Guo, and Junrong Liu. ture Generation Computer Differential power anal- Systems, 86(??):372–379, ysis of stream ciphers September 2018. CODEN with LFSRs. Comput- FGSEVI. ISSN 0167-739X ers and Mathematics with (print), 1872-7115 (elec- Applications, 65(9):1291– tronic). URL https:// 1299, May 2013. CODEN www.sciencedirect.com/ CMAPDK. ISSN 0898- science/article/pii/S0167739X18301250. 1221 (print), 1873-7668 (electronic). URL http:// Qin:2016:VTQ www.sciencedirect.com/ science/article/pii/S0898122112001381. [QD16] Huawang Qin and Yuewei Dai. Verifiable (t, n) Qin:2018:NUW threshold quantum se- cret sharing using d- [QJC+18] C. Qin, P. Ji, C. Chang, dimensional Bell state. In- J. Dong, and X. Sun. Non- formation Processing Let- uniform watermark shar- ters, 116(5):351–355, May ing based on optimal iter- 2016. CODEN IF- ative BTC for image tam- PLAT. ISSN 0020-0190 pering recovery. IEEE Mul- (print), 1872-6119 (elec- tiMedia, 25(3):36–48, July/ tronic). URL http:// September 2018. CODEN www.sciencedirect.com/ IEMUE4. ISSN 1070-986x science/article/pii/S0020019016000077. (print), 1941-0166 (elec- tronic). Queiroz:2019:WBF Qin:2017:DIR [QF19] Jordan S. Queiroz and Eduardo L. Feitosa. A [QLL17] Chuan Qin, Jingwei Li, and Web browser fingerprinting Patrick P. C. Lee. The method based on the Web design and implementation audio API. The Computer of a rekeying-aware en- Journal, 62(8):1106–1120, crypted deduplication stor- August 2019. CODEN age system. ACM Trans- CMPJA6. ISSN 0010-4620 actions on Storage, 13(1): (print), 1460-2067 (elec- 9:1–9:??, March 2017. CO- tronic). URL http:// DEN ???? ISSN 1553-3077 academic.oup.com/comjnl/ (print), 1553-3093 (elec- article/62/8/1106/5298776. tronic). REFERENCES 497

Qiu:2019:CPT 2017. CODEN JN- CAF3. ISSN 1084-8045 [QLZ19] Jian Qiu, Hengjian Li, and (print), 1095-8592 (elec- Chuan Zhao. Cancelable tronic). URL http:// palmprint templates based www.sciencedirect.com/ on random measurement science/article/pii/S1084804517300449. and noise data for secu- rity and privacy-preserving Qiao:2018:CTC authentication. Comput- [QRW+18] Huidong Qiao, Jiangchun ers & Security, 82(??):1– Ren, Zhiying Wang, Haihe 14, May 2019. CODEN Ba, and Huaizhe Zhou. CPSEDU. ISSN 0167-4048 Compulsory traceable ciphertext- (print), 1872-6208 (elec- policy attribute-based en- tronic). URL https:// cryption against privilege www.sciencedirect.com/ abuse in fog computing. science/article/pii/S0167404818306618. Future Generation Com- Qiu:2017:AAS puter Systems, 88(??):107– 116, November 2018. CO- [QMC17] Yue Qiu, Maode Ma, and DEN FGSEVI. ISSN 0167- Shuo Chen. An anonymous 739X (print), 1872-7115 authentication scheme for (electronic). URL http:// multi-domain machine- www.sciencedirect.com/ to-machine communica- science/article/pii/S0167739X17328820. tion in cyber-physical sys- tems. Computer Networks Quaglia:2018:SVA (Amsterdam, Netherlands: 1999), 129 (part 1)(??): [QS18] Elizabeth A. Quaglia and 306–318, December 24, Ben Smyth. Secret, ver- 2017. CODEN ???? ISSN ifiable auctions from elec- 1389-1286 (print), 1872- tions. Theoretical Com- 7069 (electronic). URL puter Science, 730(??):44– http://www.sciencedirect. 92, June 19, 2018. CODEN com/science/article/pii/ TCSCDI. ISSN 0304-3975 S138912861730381X. (print), 1879-2294 (elec- tronic). URL http:// Qiu:2017:PSB www.sciencedirect.com/ [QMW17] Yue Qiu, Maode Ma, and science/article/pii/S030439751830183X. Xilei Wang. A proxy Qin:2016:STI signature-based handover authentication scheme for [QYWX16] Zhen Qin, Chen Yuan, LTE wireless networks. Yilei Wang, and Hu Xiong. Journal of Network and On the security of two Computer Applications, identity-based signature 83(??):63–71, April 1, schemes based on pair- REFERENCES 498

ings. Information Process- trol in RFID-enabled sup- ing Letters, 116(6):416– ply chain. IEEE/ACM 418, June 2016. CODEN Transactions on Network- IFPLAT. ISSN 0020-0190 ing, 24(6):3551–3564, De- (print), 1872-6119 (elec- cember 2016. CODEN tronic). URL http:// IEANEP. ISSN 1063-6692 www.sciencedirect.com/ (print), 1558-2566 (elec- science/article/pii/S0020019016300096. tronic). Qian:2014:IAF Qi:2016:SPR

[QZ14] Zhenxing Qian and Xin- [QZL+16b] Saiyu Qi, Yuanqing Zheng, peng Zhang. Improved Mo Li, Li Lu, and Yun- anti-forensics of JPEG hao Liu. Secure and pri- compression. The Jour- vate RFID-enabled third- nal of Systems and Soft- party supply chain sys- ware, 91(??):100–108, May tems. IEEE Transac- 2014. CODEN JS- tions on Computers,65 SODM. ISSN 0164-1212 (11):3413–3426, November (print), 1873-1228 (elec- 2016. CODEN ITCOB4. tronic). URL http:// ISSN 0018-9340 (print), www.sciencedirect.com/ 1557-9956 (electronic). science/article/pii/S0164121214000168. Qin:2018:BRO Qiang:2016:SCF [QZZ18] Baodong Qin, Qinglan [QZDJ16] Weizhong Qiang, Kang Zhao, and Dong Zheng. Zhang, Weiqi Dai, and Bounded revocable and Hai Jin. Secure cryp- outsourceable ABE for se- tographic functions via cure data sharing. The virtualization-based out- Computer Journal,61 sourced computing. Con- (8):1259–1268, August 1, currency and Computa- 2018. CODEN CM- tion: Practice and Expe- PJA6. ISSN 0010-4620 rience, 28(11):3149–3163, (print), 1460-2067 (elec- August 10, 2016. CODEN tronic). URL http:// CCPEBO. ISSN 1532-0626 academic.oup.com/comjnl/ (print), 1532-0634 (elec- article/61/8/1259/5045945. tronic). Rabin:2010:ACC Qi:2016:SID [Rab10] Tal Rabin, editor. Ad- [QZL+16a] Saiyu Qi, Yuanqing Zheng, vances in cryptology — Mo Li, Yunhao Liu, and Crypto 2010: 30th an- Jinli Qiu. Scalable in- nual cryptology conference, dustry data access con- Santa Barbara, CA, USA, REFERENCES 499

August 15–19, 2010. Pro- cient undeciphered script. ceedings, volume 6223 of Computer, 43(4):76–80, Lecture notes in computer April 2010. CODEN CP- science. Springer-Verlag, TRB4. ISSN 0018-9162 Berlin, Germany / Heidel- (print), 1558-0814 (elec- berg, Germany / London, tronic). UK / etc., 2010. ISBN 3-642-14622-8 (softcover). Rao:2017:SEC LCCN ???? [Rao17] Y. Sreenivasa Rao. A se- Rankin:2010:HLH cure and efficient ciphertext- policy attribute-based sign- [Ran10] Kyle Rankin. Hack and cryption for personal health /: lightning hacks—SSH records sharing in cloud strikes back. Linux Jour- computing. Future Gen- nal, 2010(195):10:1–10:??, eration Computer Systems, July 2010. CODEN LI- 67(??):133–151, February JOFX. ISSN 1075-3583 2017. CODEN FG- (print), 1938-3827 (elec- SEVI. ISSN 0167-739X tronic). (print), 1872-7115 (elec- Rankin:2014:HEY tronic). URL http:// www.sciencedirect.com/ [Ran14] Kyle Rankin. Hack and / science/article/pii/S0167739X16302746. : encrypt your dog (Mutt and GPG). Linux Journal, Rauscher:2015:FMT 2014(242):7:1–7:??, June 2014. CODEN LIJOFX. [Rau15] Karl Frederick Rauscher. ISSN 1075-3583 (print), Forum: A matter of trust. 1938-3827 (electronic). Scientific American, 312 (3):8, March 2015. CO- Rankin:2016:HSP DEN SCAMAC. ISSN 0036-8733 (print), 1946- [Ran16] Kyle Rankin. Hack and / 7087 (electronic). URL : Preseeding full disk en- http://www.nature.com/ cryption. Linux Journal, scientificamerican/journal/ 2016(261):5:1–5:??, Jan- v312/n3/full/scientificamerican0315- uary 2016. CODEN LI- 8.html; http://www. JOFX. ISSN 1075-3583 nature.com/scientificamerican/ (print), 1938-3827 (elec- journal/v312/n3/pdf/scientificamerican0315 tronic). URL http:// 8.pdf. dl.acm.org/ft_gateway. cfm?id=2903198. Raz:2019:FLR Rao:2010:PAA [Raz19] Ran Raz. Fast learning [Rao10] Rajesh P. N. Rao. Prob- requires good memory: a abilistic analysis of an an- time-space lower bound for REFERENCES 500

parity learning. Journal of 17(3):10:1–10:??, March the ACM, 66(1):3:1–3:??, 2015. CODEN ATISBQ. January 2019. CODEN ISSN 1094-9224 (print), JACOAH. ISSN 0004-5411 1557-7406 (electronic). (print), 1557-735X (elec- tronic). Radke:2015:CFA

Ruoti:2015:WJS [RBNB15] Kenneth Radke, Colin Boyd, Juan Gonzalez Ni- [RAZS15] Scott Ruoti, Jeff Andersen, eto, and Harry Bartlett. Daniel Zappala, and Kent CHURNs: Freshness as- Seamons. Why Johnny surance for humans. The still, still can’t encrypt: Computer Journal,58 Evaluating the usability (10):2404–2425, October of a modern PGP client. 2015. CODEN CM- arxiv.org, ??(??):1–5, Octo- PJA6. ISSN 0010-4620 ber 29, 2015. URL http: (print), 1460-2067 (elec- //arxiv.org/pdf/1510. tronic). URL http:// 08555.pdf. comjnl.oxfordjournals. org/content/58/10/2404. Radke:2017:SPP Reaves:2017:MBM [RB17] Kenneth Radke and Colin Boyd. Security proofs [RBS+17] Bradley Reaves, Jasmine for protocols involving hu- Bowers, Nolen Scaife, mans. The Computer Adam Bates, Arnav Bhar- Journal, 60(4):527–540, tiya, Patrick Traynor, March 23, 2017. CO- and Kevin R. B. Butler. DEN CMPJA6. ISSN Mo(bile) money, mo(bile) 0010-4620 (print), 1460- problems: Analysis of 2067 (electronic). URL branchless banking appli- https://academic.oup. cations. ACM Transac- com/comjnl/article/60/ tions on Privacy and Se- 4/527/2354604. curity (TOPS), 20(3):11:1– 11:??, August 2017. CO- Rupp:2015:CTM DEN ???? ISSN 2471-2566 [RBHP15] Andy Rupp, Foteini Baldimtsi, (print), 2471-2574 (elec- Gesine Hinterw¨alder, and tronic). Christof Paar. Crypto- R:2018:SDM graphic theory meets prac- tice: Efficient and privacy- [RC18] Jithin R and Priya Chan- preserving payments for dran. Secure and dy- public transport. ACM namic memory manage- Transactions on Informa- ment architecture for vir- tion and System Security, tualization technologies in REFERENCES 501

IoT devices. Future In- and Jean-Pierre Hubaux. ternet, 10(12):119, Novem- Protecting privacy and se- ber 30, 2018. CODEN curity of genomic data in ???? ISSN 1999-5903. URL i2b2 with homomorphic https://www.mdpi.com/ encryption and differen- 1999-5903/10/12/119. tial privacy. IEEE/ACM Transactions on Computa- Rao:2019:HPR tional Biology and Bioin- [RCBK19] Fang-Yu Rao, Jianneng formatics, 15(5):1413–1426, Cao, Elisa Bertino, and September 2018. CODEN Murat Kantarcioglu. Hy- ITCBCY. ISSN 1545-5963 brid private record link- (print), 1557-9964 (elec- age: Separating differen- tronic). tially private synopses from Rabbachin:2015:WNI matching records. ACM Transactions on Privacy [RCW15] Alberto Rabbachin, An- and Security (TOPS),22 drea Conti, and Moe Z. (3):15:1–15:??, July 2019. Win. Wireless network in- ISSN 2471-2566 (print), trinsic secrecy. IEEE/ACM 2471-2574 (electronic). URL Transactions on Network- https://dl.acm.org/citation. ing, 23(1):56–69, February cfm?id=3318462. 2015. CODEN IEANEP. Reinicke:2017:RDS ISSN 1063-6692 (print), 1558-2566 (electronic). [RCK17] Bryan Reinicke, Jeffrey Cummings, and Howard Rao:2017:CFA Kleinberg. The right to digital self-defense. IEEE [RD17] Y. Sreenivasa Rao and Security & Privacy, 15(4): Ratna Dutta. Computa- 68–71, July/August 2017. tional friendly attribute- CODEN ???? ISSN based encryptions with 1540-7993 (print), 1558- short ciphertext. The- 4046 (electronic). URL oretical Computer Sci- https://www.computer. ence, 668(??):1–26, March org/csdl/mags/sp/2017/ 15, 2017. CODEN TC- 04/msp2017040068-abs. SCDI. ISSN 0304-3975 html. (print), 1879-2294 (elec- tronic). URL http:// Raisaro:2018:PPS www.sciencedirect.com/ [RCP+18] Jean Louis Raisaro, Gwang- science/article/pii/S0304397516307587. bae Choi, Sylvain Prader- Riazi:2019:DLP vand, Raphael Colsenet, Nathalie Jacquemont, Nico- [RDK19] M. S. Riazi, B. Darvish las Rosat, Vincent Mooser, Rouani, and F. Koushan- REFERENCES 502

far. Deep learning on pri- SC Magazine, ??(??):??, vate data. IEEE Secu- September 2, 2015. URL rity & Privacy, 17(6):54– http://www.scmagazine. 63, November 2019. ISSN com/aged-rc4-cipher-to- 1540-7993 (print), 1558- be-shunned-by-security- 4046 (electronic). conscious-browsers/article/ 436521/. Ren:2016:IBE Ren:2010:CSH [RDZ+16] Yanli Ren, Ning Ding, Xin- peng Zhang, Haining Lu, [RG10] Yanli Ren and Dawu Gu. and Dawu Gu. Identity- CCA2 secure (hierarchi- based encryption with ver- cal) identity-based paral- ifiable outsourced revo- lel key-insulated encryp- cation. The Computer tion without random or- Journal, 59(11):1659–1668, acles. The Journal of November 2016. CODEN Systems and Software,83 CMPJA6. ISSN 0010-4620 (1):153–162, January 2010. (print), 1460-2067 (elec- CODEN JSSODM. ISSN tronic). URL http:// 0164-1212. comjnl.oxfordjournals. Roh:2010:BSW org/content/59/11/1659. [RH10] Dongyoung Roh and Sang Geun Reardon:2016:SDD Hahn. On the bit secu- [Rea16] Joel Reardon. Secure rity of the weak Diffie– Data Deletion. Informa- Hellman problem. In- tion security and cryp- formation Processing Let- tography. Springer-Verlag, ters, 110(18–19):799–802, Berlin, Germany / Heidel- September 15, 2010. CO- berg, Germany / London, DEN IFPLAT. ISSN 0020- UK / etc., 2016. ISBN 0190 (print), 1872-6119 3-319-28778-8 (e-book), 3- (electronic). 319-28777-X. ISSN 1619- Rouhani:2018:RRT 7100 (print), 2197-845X (electronic). xvii + 203 + [RHLK18] Bita Darvish Rouhani, 32 pp. LCCN QA76.9.D3 Siam Umar Hussain, Kristin R4223 2016. URL http:/ Lauter, and Farinaz Koushan- /www.springerlink.com/ far. ReDCrypt: Real-time content/978-3-319-28778- privacy-preserving deep 2. learning inference in clouds using FPGAs. ACM Trans- Reeve:2015:ARC actions on Reconfigurable [Ree15] Tom Reeve. Aged RC4 ci- Technology and Systems, pher to be shunned by se- 11(3):21:1–21:??, Decem- curity conscious browsers. ber 2018. CODEN ???? REFERENCES 503

ISSN 1936-7406 (print), tronic). URL https: 1936-7414 (electronic). //ieeexplore.ieee.org/ document/8318681/. Robert-Inacio:2011:SAP Regev:2011:QOW [RITF+11] Fr´ed´erique Robert-Inacio, Alain Tr´emeau, Mike [RK11] Oded Regev and Bo’az Fournigault, Yannick Teglia, Klartag. Quantum one- and Pierre-Yvan Liardet. way communication can Shape analysis for power be exponentially stronger signal cryptanalysis on se- than classical communica- cure components. The tion. In ACM [ACM11], Journal of Systems and pages 31–40. ISBN ???? Software, 84(5):753–762, LCCN ???? URL http:// May 2011. CODEN JS- www.gbv.de/dms/tib-ub- SODM. ISSN 0164-1212. hannover/63314455x.. Rjasko:2012:BBP Rakshit:2018:LLO [Rja12] Michal Rjaˇsko. Black-box property of cryptographic [RM18] Joydeep Rakshit and Kar- hash functions. Lecture tik Mohanram. LEO: Notes in Computer Sci- Low overhead encryption ence, 6888:181–193, 2012. ORAM for non-volatile CODEN LNCSD9. ISSN memories. IEEE Computer 0302-9743 (print), 1611- Architecture Letters, 17(2): 3349 (electronic). URL 100–104, July/December http://link.springer. 2018. CODEN ???? ISSN com/chapter/10.1007/978- 1556-6056 (print), 1556- 3-642-27901-0_14/. 6064 (electronic). Roy:2018:HFB Rezaeibagha:2019:EMC [RJV+18] Sujoy Sinha Roy, Kimmo J¨arvinen, Jo Vliegen, Fred- [RM19] Fatemeh Rezaeibagha and erik Vercauteren, and In- Yi Mu. Efficient micro- grid Verbauwhede. HEP- payment of cryptocurrency Cloud: An FPGA-based from blockchains. The multicore processor for FV Computer Journal, 62(4): somewhat homomorphic 507–517, April 2019. CO- function evaluation. IEEE DEN CMPJA6. ISSN Transactions on Com- 0010-4620 (print), 1460- puters, 67(11):1637–1650, 2067 (electronic). URL November 2018. CODEN http://academic.oup.com/ ITCOB4. ISSN 0018-9340 comjnl/article/62/4/507/ (print), 1557-9956 (elec- 5155318. REFERENCES 504

Reyhani-Masoleh:2019:NMI Reyhani-Masoleh:2018:NAR

[RMERM19] A. Reyhani-Masoleh, H. El- [RMTA18] Arash Reyhani-Masoleh, Razouk, and A. Monfared. Mostafa Taha, and Doaa New multiplicative inverse Ashmawy. New area architectures using Gaus- record for the AES com- sian normal basis. IEEE bined S-box/inverse S- Transactions on Comput- box. In Tenca and Tak- ers, 68(7):991–1006, July agi [TT18], pages 145– 2019. CODEN ITCOB4. 152. ISBN 1-5386-2612- ISSN 0018-9340 (print), 8 (USB), 1-5386-2665-9. 1557-9956 (electronic). ISSN 2576-2265. LCCN QA76.9.C62. IEEE catalog Roy:2018:HIR number CFP18121-USB. [RMG18] Aniket Roy, Arpan Ku- Rezaeibagha:2019:PSB mar Maiti, and Kuntal Ghosh. An HVS inspired [RMZW19] Fatemeh Rezaeibagha, Yi Mu, robust non-blind water- Shiwei Zhang, and Xi- marking scheme in YCbCr aofen Wang. Provably se- color space. Interna- cure (broadcast) homomor- tional Journal of Image phic signcryption. Inter- and Graphics (IJIG),18 national Journal of Foun- (3):??, July 2018. ISSN dations of Computer Sci- 0219-4678. URL https: ence (IJFCS), 30(4):511– //www.worldscientific. 529, June 2019. ISSN com/doi/10.1142/S0219467818500158. 0129-0541. URL https: //www.worldscientific. Rahaman:2010:STB com/doi/10.1142/S0129054119400100.

[RMP10] H. Rahaman, J. Mathew, Rogaway:2016:POP and D. K. Pradhan. Secure testable S-box architecture [Rog16] Phillip Rogaway. Practice- for cryptographic hardware oriented provable security implementation. The Com- and the social construction puter Journal, 53(5):581– of cryptography. IEEE Se- 591, June 2010. CODEN curity & Privacy, 14(6):10– CMPJA6. ISSN 0010-4620 17, November/December (print), 1460-2067 (elec- 2016. CODEN ???? ISSN tronic). URL http:// 1540-7993 (print), 1558- comjnl.oxfordjournals. 4046 (electronic). URL org/cgi/content/abstract/ https://www.computer. 53/5/581; http://comjnl. org/csdl/mags/sp/2016/ oxfordjournals.org/cgi/ 06/msp2016060010-abs. reprint/53/5/581. html. REFERENCES 505

Rohloff:2019:CAR Notes in Computer Sci- ence, 6411:181–188, 2012. [Roh19] Kurt Rohloff. Computer CODEN LNCSD9. ISSN arithmetic research to ac- 0302-9743 (print), 1611- celerate privacy-protecting 3349 (electronic). URL encrypted computing such http://link.springer. as homomorphic encryp- com/content/pdf/10.1007/ tion. In Takagi et al. 978-3-642-27872-3_27. [TBL19], page 197. ISBN 1-72813-366-1. ISSN 1063- Rifa-Pous:2012:AHD 6889. [RPG12] Helena Rif`a-Pous and Car- Romero:2011:FSW les Garrigues. Authenti- [Rom11] J. J. Romero. Fast start cating hard decision sens- for world’s biggest biomet- ing reports in cognitive ra- rics ID project. IEEE Spec- dio networks. Computer trum, 48(5):11–12, May Networks (Amsterdam, 2011. CODEN IEESAM. Netherlands: 1999), 56(2): ISSN 0018-9235 (print), 566–576, February 2, 2012. 1939-9340 (electronic). CODEN ???? ISSN 1389- 1286 (print), 1872-7069 Romero:2012:IBB (electronic). URL http:// [Rom12] J. J. Romero. India’s big www.sciencedirect.com/ science/article/pii/S1389128611003720. bet on identity. IEEE Spec- trum, 49(3):48–56, March Rifa-Pous:2011:CEC 2012. CODEN IEESAM. ISSN 0018-9235 (print), [RPHJ11] Helena Rif`a-Pous and Jordi 1939-9340 (electronic). Herrera-Joancomart´ı. Com- putational and energy Rose:2011:KBT costs of cryptographic al- [Ros11] Greg Rose. KISS: a gorithms on handheld de- bit too simple. Re- vices. Future Internet, port ??, Qualcomm Inc., 3(1):31–48, February 14, San Diego, CA, USA, April 2011. CODEN ???? 18, 2011. URL http:/ ISSN 1999-5903. URL /eprint.iacr.org/2011/ https://www.mdpi.com/ 007.pdf. 1999-5903/3/1/31. Rao:2012:SSA Rhee:2010:TSS [RP12] Burepalli V. S. Rao and [RPSL10] Hyun Sook Rhee, Jong Hwan Munaga V. N. K. Prasad. Park, Willy Susilo, and Subset selection approach Dong Hoon Lee. Trap- for watermarking rela- door security in a search- tional databases. Lecture able public-key encryption REFERENCES 506

scheme with a designated www.sciencedirect.com/ tester. The Journal of Sys- science/article/pii/S0167404816300979. tems and Software, 83(5): Razaque:2017:SDA 763–771, May 2010. CO- DEN JSSODM. ISSN [RR17] Abdul Razaque and Syed S. 0164-1212. Rizvi. Secure data aggre- Ren:2015:ASE gation using access con- trol and authentication + [RQD 15] Jianbao Ren, Yong Qi, for wireless sensor net- Yuehua Dai, Xiaoguang works. Computers & Wang, and Yi Shi. AppSec: Security, 70(??):532–545, a safe execution environ- September 2017. CODEN ment for security sensitive CPSEDU. ISSN 0167-4048 applications. ACM SIG- (print), 1872-6208 (elec- PLAN Notices, 50(7):187– tronic). URL https:// 199, July 2015. CODEN www.sciencedirect.com/ SINODQ. ISSN 0362-1340 science/article/pii/S0167404817301402. (print), 1523-2867 (print), 1558-1160 (electronic). Rosen:2010:CCS Rawat:2011:CBR [RS10] Alon Rosen and Gil Segev. Chosen-ciphertext security [RR11] Sanjay Rawat and Bala- via correlated products. subramanian Raman. A SIAM Journal on Comput- chaos-based robust wa- ing, 39(7):3058–3088, ???? termarking algorithm for 2010. CODEN SMJCAT. rightful ownership protec- ISSN 0097-5397 (print), tion. International Jour- 1095-7111 (electronic). nal of Image and Graphics (IJIG), 11(4):471–493, Oc- Reeder:2011:WPD tober 2011. CODEN ???? ISSN 0219-4678. [RS11] Robert W. Reeder and Stuart Schechter. When Razaque:2016:TDP the password doesn’t work: [RR16] Abdul Razaque and Syed S. Secondary authentication Rizvi. Triangular data for websites. IEEE Secu- privacy-preserving model rity & Privacy, 9(2):43–49, for authenticating all key March/April 2011. CO- stakeholders in a cloud en- DEN ???? ISSN 1540-7993 vironment. Computers & (print), 1558-4046 (elec- Security, 62(??):328–347, tronic). September 2016. CODEN Rivest:2014:SSR CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- [RS14] Ronald L. Rivest and Jacob tronic). URL https:// C. N. Schuldt. Spritz —- REFERENCES 507

a spongy RC4-like stream tation of Keccak. IEEE cipher and hash function. Transactions on Comput- Report, MIT CSAIL and ers, 66(10):1778–1789, Oc- Research Institute for Se- tober 2017. CODEN IT- cure Systems, Cambridge, COB4. ISSN 0018-9340 MA 02139, USA and AIST, (print), 1557-9956 (elec- Japan, October 27, 2014. tronic). URL http:/ 30 pp. URL http:/ /ieeexplore.ieee.org/ /people.csail.mit.edu/ document/7918507/. rivest/pubs/RS14.pdf. Rivest:2017:WEV Rossi:2015:IBS [RS17b] Ronald L. Rivest and [RS15] Francesco Rossi and Gio- Philip B. Stark. When is an vanni Schmid. Identity- election verifiable? IEEE based secure group com- Security & Privacy,15 munications using pair- (3):48–50, May/June 2017. ings. Computer Networks CODEN ???? ISSN (Amsterdam, Netherlands: 1540-7993 (print), 1558- 1999), 89(??):32–43, 2015. 4046 (electronic). URL CODEN ???? ISSN 1389- https://www.computer. 1286 (print), 1872-7069 org/csdl/mags/sp/2017/ (electronic). URL http:// 03/msp2017030048-abs. www.sciencedirect.com/ html. science/article/pii/S1389128615002303. Roy:2017:LOS Rana:2016:DBV [RS17c] Dipanjan Roy and Anir- ban Sengupta. Low over- [RS16] Shuvendu Rana and Ari- head symmetrical protec- jit Sur. Depth-based view- tion of reusable IP core invariant blind 3D im- using robust fingerprint- age watermarking. ACM ing and watermarking dur- Transactions on Multime- ing high level synthesis. dia Computing, Communi- Future Generation Com- cations, and Applications, puter Systems, 71(??):89– 12(4):48:1–48:??, August 101, June 2017. CODEN 2016. CODEN ???? ISSN FGSEVI. ISSN 0167-739X 1551-6857 (print), 1551- (print), 1872-7115 (elec- 6865 (electronic). tronic). URL http:// Rawat:2017:VIS www.sciencedirect.com/ science/article/pii/S0167739X16305556. [RS17a] Hemendra Rawat and Roetteler:2018:QCC Patrick Schaumont. Vec- tor instruction set exten- [RS18] M. Roetteler and K. M. sions for efficient compu- Svore. Quantum com- REFERENCES 508

puting: Codebreaking and 2018. CODEN ITCBCY. beyond. IEEE Security ISSN 1545-5963 (print), & Privacy, 16(5):22–36, 1557-9964 (electronic). September/October 2018. ISSN 1540-7993 (print), Rastegari:2019:ECS 1558-4046 (electronic). [RSD19] Parvin Rastegari, Willy Ruoti:2019:JJT Susilo, and Mohammad Dakhlalian. Efficient [RS19] S. Ruoti and K. Seamons. certificateless signcryp- Johnny’s journey toward tion in the standard usable secure email. IEEE model: Revisiting Luo Security & Privacy,17 and Wan’s scheme from (6):72–76, November 2019. wireless personal commu- ISSN 1540-7993 (print), nications (2018). The 1558-4046 (electronic). Computer Journal,62 (8):1178–1193, August Rangasamy:2012:ERP 2019. CODEN CM- [RSBGN12] Jothi Rangasamy, Douglas PJA6. ISSN 0010-4620 Stebila, Colin Boyd, and (print), 1460-2067 (elec- Juan Manuel Gonz´alez- tronic). URL http:// Nieto. Effort-release academic.oup.com/comjnl/ public-key encryption from article/62/8/1178/5485598. cryptographic puzzles. Lec- Roy:2015:SCP ture Notes in Computer Science, 7372:194–207, [RSGG15] Arpan Roy, Santonu Sarkar, 2012. CODEN LNCSD9. Rajeshwari Ganesan, and ISSN 0302-9743 (print), Geetika Goel. Secure the 1611-3349 (electronic). URL cloud: From the perspec- http://link.springer. tive of a service-oriented com/chapter/10.1007/978- organization. ACM Com- 3-642-31448-3_15/. puting Surveys, 47(3):41:1– 41:??, April 2015. CODEN Ren:2018:IAS CMSVAN. ISSN 0360-0300 [RSCX18] Shuai Ren, Yan Shi, Maolin (print), 1557-7341 (elec- Cai, and Weiqing Xu. In- tronic). fluence of airway secre- Ribeiro:2015:QBS tion on airflow dynam- ics of mechanical venti- [RSM15] J. Ribeiro, A. Souto, and lated respiratory system. P. Mateus. Quantum blind IEEE/ACM Transactions signature with an offline on Computational Biol- repository. International ogy and Bioinformatics,15 Journal of Quantum In- (5):1660–1668, September formation, 13(2):1550016, REFERENCES 509

???? 2015. URL www. on Audio, Speech, and worldscientific.com/doi/ Language Processing,27 pdf/10.1142/S0219749915500161. (3):496–506, March 2019. See also news story [Ano15a]. ISSN 2329-9290.

Resende:2019:BMI Ryan:2015:EEVa [RST15a] Peter Y. A. Ryan, Steve [RSMA19] Jo˜ao S. Resende, Patr´ıcia R. Schneider, and Vanessa Sousa, Rolando Martins, Teague. End-to-end ver- and Lu´ıs Antunes. Break- ifiability in voting sys- ing MPC implementations tems, from theory to prac- through compression. In- tice. IEEE Security & Pri- ternational Journal of In- vacy, 13(3):59–62, May/ formation Security, 18(4): June 2015. CODEN 505–518, August 2019. ???? ISSN 1540-7993 CODEN ???? ISSN (print), 1558-4046 (elec- 1615-5262 (print), 1615- tronic). URL http:// 5270 (electronic). URL www.computer.org/csdl/ http://link.springer. mags/sp/2015/03/msp2015030059- com/article/10.1007/s10207- abs.html. 018-0424-2. Ryan:2015:EEVb Ruj:2014:DAC [RST15b] Peter Y. A. Ryan, Steve [RSN14] Sushmita Ruj, Milos Sto- Schneider, and Vanessa jmenovic, and Amiya Teague. End-to-end veri- Nayak. Decentralized ac- fiability in voting systems, cess control with anony- from theory to practice. mous authentication of ComputingEdge, 1(10):9– data stored in clouds. 11, October 2015. ISSN IEEE Transactions on 2376-113X. URL http:/ Parallel and Distributed /www.computer.org/cms/ Systems, 25(2):384–394, Computer.org/computing- February 2014. CODEN edge/ce-oct15-final.pdf. ITDSEO. ISSN 1045-9219 (print), 1558-2183 (elec- Rexha:2018:ITF tronic). [RSX18] Blerim Rexha, Gresa Rahulamathavan:2019:PPI Shala, and Valon Xhafa. Increasing trustworthiness [RSR+19] Y. Rahulamathavan, K. R. of face authentication in Sutharsini, I. G. Ray, mobile devices by model- R. Lu, and M. Rajarajan. ing gesture behavior and Privacy-preserving iVector- location using neural net- based speaker verification. works. Future Internet,10 IEEE/ACM Transactions (2):17, February 05, 2018. REFERENCES 510

CODEN ???? ISSN 1999- DEN LNCSD9. ISSN 5903. URL https://www. 0302-9743 (print), 1611- mdpi.com/1999-5903/10/ 3349 (electronic). URL 2/17. http://link.springer. com/content/pdf/10.1007/ Russo:2015:FPT 978-3-642-27549-4_76. [Rus15] Alejandro Russo. Func- Reaves:2018:CSS tional pearl: two can keep a secret, if one of them [RVS+18] Bradley Reaves, Luis Var- uses Haskell. ACM SIG- gas, Nolen Scaife, Dave PLAN Notices, 50(9):280– Tian, Logan Blue, Patrick 288, September 2015. CO- Traynor, and Kevin R. B. DEN SINODQ. ISSN 0362- Butler. Characterizing the 1340 (print), 1523-2867 security of the SMS ecosys- (print), 1558-1160 (elec- tem with public gate- tronic). ways. ACM Transactions on Privacy and Security Rahulamathavan:2016:UCA (TOPS), 22(1):2:1–2:??, [RVH+16] Yogachandran Rahula- January 2018. ISSN 2471- mathavan, Suresh Veluru, 2566 (print), 2471-2574 Jinguang Han, Fei Li, Mut- (electronic). URL https: tukrishnan Rajarajan, and //dl.acm.org/citation. Rongxing Lu. User collu- cfm?id=3268932. sion avoidance scheme for Roettger:2012:PKC privacy-preserving decen- tralized key-policy attribute- [RW12] Eric Roettger and Hugh C. based encryption. IEEE Williams. Public-key cryp- Transactions on Comput- tography based on a cu- ers, 65(9):2939–2946, ???? bic extension of the Lucas 2016. CODEN ITCOB4. functions. Fundamenta In- ISSN 0018-9340 (print), formaticae, 114(3–4):325– 1557-9956 (electronic). 344, August 2012. CODEN FUMAAJ. ISSN 0169-2968 Rodriguez-Vazquez:2012:SCB (print), 1875-8681 (elec- tronic). [RVRSCM12] Juan Jos´eRodr´ıguez- V´azquez, Sixto Romero- Ren:2014:HHM S´anchez, and Miguel C´ardenas- Montes. Speeding up [RWLL14] Jian Ren, Jie Wu, Yun a chaos-based image en- Li, and Jian Li. Hop- cryption algorithm using by-hop message authen- GPGPU. Lecture Notes tication and source pri- in Computer Science, 6927: vacy in wireless sensor net- 592–599, 2012. CO- works. IEEE Transactions REFERENCES 511

on Parallel and Distributed hedging deployed cryp- Systems, 25(5):1223–1232, tography. In Anony- May 2014. CODEN ITD- mous [Ano10a], page ?? SEO. ISSN 1045-9219 ISBN 1-891562-29-0, 1- (print), 1558-2183 (elec- 891562-30-4. LCCN ???? tronic). URL http://www.isoc. org/isoc/conferences/ Rogaway:2012:SCS ndss/10/pdf/15.pdf; http://www.isoc.org/isoc/ [RWZ12] Phillip Rogaway, Mark conferences/ndss/10/proceedings. Wooding, and Haibin shtml. Zhang. The security of ci- phertext stealing. Lecture Ren:2013:DSE Notes in Computer Sci- [RYF+13] Ling Ren, Xiangyao Yu, ence, 7549:180–195, 2012. Christopher W. Fletcher, CODEN LNCSD9. ISSN Marten van Dijk, and 0302-9743 (print), 1611- Srinivas Devadas. Design 3349 (electronic). URL space exploration and opti- http://link.springer. mization of path oblivious com/chapter/10.1007/978- RAM in secure processors. 3-642-34047-5_11/. ACM SIGARCH Computer Ren:2013:PPK Architecture News, 41(3): 571–582, June 2013. ICSA [RWZ13] Yanli Ren, Shuozhong ’13 conference proceedings. Wang, and Xinpeng Zhang. Practical parallel key- Romashchenko:2019:OCM insulated encryption with [RZ19] Andrei Romashchenko and multiple helper keys. Com- Marius Zimand. An oper- puters and Mathematics ational characterization of with Applications, 65(9): mutual information in al- 1403–1412, May 2013. CO- gorithmic information the- DEN CMAPDK. ISSN ory. Journal of the ACM, 0898-1221 (print), 1873- 66(5):38:1–38:??, Septem- 7668 (electronic). URL ber 2019. CODEN JA- http://www.sciencedirect. COAH. ISSN 0004-5411 com/science/article/pii/ (print), 1557-735X (elec- S0898122112000429. tronic). URL https:// Ristenpart:2010:WGR dl.acm.org/ft_gateway. cfm?id=3356867. [RY10] Thomas Ristenpart and Rajendran:2015:FAB Scott Yilek. When good randomness goes [RZZ+15] J. Rajendran, Huan Zhang, bad: Virtual machine Chi Zhang, G. S. Rose, reset vulnerabilities and Youngok Pino, O. Sinanoglu, REFERENCES 512

and R. Karri. Fault thentication, key man- analysis-based logic en- agement, and adjacency cryption. IEEE Transac- management for securing tions on Computers, 64(2): inter-router control mes- ??, February 2015. CO- sages. Computer Networks DEN ITCOB4. ISSN 0018- (Amsterdam, Netherlands: 9340 (print), 1557-9956 1999), 79(??):68–90, March (electronic). 14, 2015. CODEN ???? ISSN 1389-1286 Sang:2012:SSF (print), 1872-7069 (elec- [SA12] Lifeng Sang and Anish tronic). URL http:// Arora. A shared-secret www.sciencedirect.com/ free security infrastruc- science/article/pii/S1389128614004691. ture for wireless networks. ACM Transactions on Au- Shivani:2016:PVC tonomous and Adaptive Systems (TAAS), 7(2): [SA16a] Shivendra Shivani and 23:1–23:??, July 2012. CO- Suneeta Agarwal. Progres- DEN ???? ISSN 1556-4665 sive visual cryptography (print), 1556-4703 (elec- with unexpanded meaning- tronic). ful shares. ACM Transac- tions on Multimedia Com- Sakalli:2014:ACC puting, Communications, [SA14] Muharrem Tolga Sakalli and Applications, 12(4): and Bora Aslan. On 50:1–50:??, August 2016. the algebraic construction CODEN ???? ISSN 1551- of cryptographically good 6857 (print), 1551-6865 32 × 32 binary linear trans- (electronic). formations. Journal of Computational and Applied Siad:2016:NFI Mathematics, 259 (part B)(??):485–494, March [SA16b] A. Siad and M. Amara. 15, 2014. CODEN A new framework for im- JCAMDI. ISSN 0377-0427 plementing identity-based (print), 1879-1778 (elec- cryptosystems. The Jour- tronic). URL http:// nal of Systems and Soft- www.sciencedirect.com/ ware, 118(??):36–48, Au- science/article/pii/S0377042713002719. gust 2016. CODEN JS- Somanatha:2015:RAK SODM. ISSN 0164-1212 (print), 1873-1228 (elec- [SA15] Revathi Bangalore So- tronic). URL http:// manatha and J. William www.sciencedirect.com/ Atwood. Router au- science/article/pii/S0164121216300346. REFERENCES 513

Subramanian:2019:SAF Sarreshtedari:2015:WMD

[SA19] Nalini Subramanian and [SAA15] S. Sarreshtedari, M. A. J. Andrews. Strong au- Akhaee, and A. Abbas- thentication framework us- far. A watermarking ing statistical approach for method for digital speech cloud environments. Con- self-recovery. IEEE/ACM currency and Computa- Transactions on Audio, tion: Practice and Ex- Speech, and Language Pro- perience, 31(12):e4870:1– cessing, 23(11):1917–1925, e4870:??, June 25, 2019. November 2015. CODEN CODEN CCPEBO. ISSN ???? ISSN 2329-9290. 1532-0626 (print), 1532- Schutz:2010:DIN 0634 (electronic). [SAAB10] Simon Sch¨utz, Henrik Saarinen:2012:PPK Abrahamsson, Bengt Ahlgren, and Marcus Brunner. De- [Saa12a] Markku-Juhani O. Saari- sign and implementation nen. The PASSER- of the Node Identity In- INE public key encryption ternetworking Architec- and authentication mech- ture. Computer Networks anism. Lecture Notes in (Amsterdam, Netherlands: Computer Science, 7127: 1999), 54(7):1142–1154, 283–288, 2012. CO- May 17, 2010. CODEN DEN LNCSD9. ISSN ???? ISSN 1389-1286. 0302-9743 (print), 1611- 3349 (electronic). URL Sacco:2014:MC http://link.springer. [Sac14] Luigi Sacco. Manuale com/chapter/10.1007/978- di crittografia. (Italian) 3-642-27937-9_20/. [Manual of cryptography]. Suoranta:2012:SAM Apogeo, Milano, Italia, fourth edition, 2014. ???? [SAA12b] Sanna Suoranta, Andr´e pp. Andrade, and Tuomas Sahai:2013:TCT Aura. Strong authentica- tion with mobile phone. [Sah13] Amit Sahai, editor. The- Lecture Notes in Computer ory of cryptography: 10th Science, 7483:70–85, 2012. Theory of Cryptography CODEN LNCSD9. ISSN Conference, TCC 2013, 0302-9743 (print), 1611- Tokyo, Japan, March 3–6, 3349 (electronic). URL 2013: proceedings, volume http://link.springer. 7785 of Lecture Notes in com/chapter/10.1007/978- Computer Science. Spring- 3-642-33383-5_5/. er-Verlag, Berlin, Ger- REFERENCES 514

many / Heidelberg, Ger- Suomalainen:2018:SAS many / London, UK / etc., + 2013. ISBN 3-642-36594- [SAM 18] Jani Suomalainen, Kimmo 9 (paperback), 3-642- Ahola, Mikko Majanen, 36593-0 (e-book). ISSN Olli M¨ammel¨a, and Pekka 0302-9743 (print), 1611- Ruuska. Security aware- 3349 (electronic). LCCN ness in software-defined QA76.9.A25 T473 2013. multi-domain 5G networks. URL http://www.loc. Future Internet, 10(3):27, gov/catdir/enhancements/ March 08, 2018. CODEN fy1310/2013931230-d.html; ???? ISSN 1999-5903. http://www.loc.gov/catdir/ URL https://www.mdpi. enhancements/fy1310/2013931230- com/1999-5903/10/3/27. t.html; http://www. Sadat:2019:SSG springerlink.com/content/ + 978-3-642-36594-2. [SAM 19a] Md Nazmus Sadat, Md Momin Al Aziz, Noman Mo- Saeed:2016:IID hammed, Feng Chen, Xi- aoqian Jiang, and Shuang [SAJL16] Ahmed Saeed, Ali Ahma- Wang. SAFETY: Secure dinia, Abbas Javed, and gwAs in Federated Envi- Hadi Larijani. Intelligent ronment through a hY- intrusion detection in low- brid Solution. IEEE/ACM power IoTs. ACM Trans- Transactions on Computa- actions on Internet Tech- tional Biology and Bioin- nology (TOIT), 16(4):27:1– formatics, 16(1):93–102, 27:??, December 2016. CO- January 2019. CODEN DEN ???? ISSN 1533-5399 ITCBCY. ISSN 1545-5963 (print), 1557-6051 (elec- (print), 1557-9964 (elec- tronic). tronic). Saleh:2016:PED Saracevic:2019:NAS [SAKM16] Eyad Saleh, Ahmad Alsa’deh,[SAM+19b] Muzafer Saracevi´c, Sasa Ahmad Kayed, and Christoph Adamovi´c, Vladislav Miskovic, Meinel. Processing over en- Nemanja Macek, and crypted data: Between the- Marko Sarac. A novel ap- ory and practice. SIGMOD proach to steganography Record (ACM Special In- based on the properties terest Group on Manage- of Catalan numbers and ment of Data), 45(3):5–16, Dyck words. Future Gen- September 2016. CODEN eration Computer Systems, SRECD8. ISSN 0163-5808 100(??):186–197, Novem- (print), 1943-5835 (elec- ber 2019. CODEN FG- tronic). SEVI. ISSN 0167-739X REFERENCES 515

(print), 1872-7115 (elec- tronic). URL http:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0020019011001852. science/article/pii/S0167739X19300184. Sarier:2012:SNB Sarier:2010:IAS [Sar12] Neyire Deniz Sarier. Se- [Sar10a] Neyire Deniz Sarier. Im- curity notions of bio- proving the accuracy and metric remote authenti- storage cost in biomet- cation revisited. Lecture ric remote authentication Notes in Computer Sci- schemes. Journal of Net- ence, 7170:72–89, 2012. work and Computer Ap- CODEN LNCSD9. ISSN plications, 33(3):268–274, 0302-9743 (print), 1611- May 2010. CODEN JN- 3349 (electronic). URL CAF3. ISSN 1084-8045 http://link.springer. (print), 1095-8592 (elec- com/chapter/10.1007/978- tronic). URL http:// 3-642-29963-6_7/. www.sciencedirect.com/ science/article/pii/S1084804510000068. Sarkar:2014:PEK

Sarkar:2010:SGC [Sar14] Santanu Sarkar. Proving [Sar10b] Palash Sarkar. A sim- empirical key-correlations ple and generic construc- in RC4. Information Pro- tion of authenticated en- cessing Letters, 114(5): cryption with associated 234–238, May 2014. CO- data. ACM Transactions DEN IFPLAT. ISSN 0020- on Information and System 0190 (print), 1872-6119 Security, 13(4):33:1–33:??, (electronic). URL http:// December 2010. CODEN www.sciencedirect.com/ ATISBQ. ISSN 1094-9224 science/article/pii/S0020019014000039. (print), 1557-7406 (elec- Sarier:2018:MBI tronic). Sarkar:2011:TES [Sar18a] Neyire Deniz Sarier. Mul- timodal biometric Identity [Sar11] Palash Sarkar. Tweakable Based Encryption. Fu- enciphering schemes using ture Generation Computer only the encryption func- Systems, 80(??):112–125, tion of a block cipher. In- March 2018. CODEN FG- formation Processing Let- SEVI. ISSN 0167-739X ters, 111(19):945–955, Oc- (print), 1872-7115 (elec- tober 15, 2011. CODEN tronic). URL http:// IFPLAT. ISSN 0020-0190 www.sciencedirect.com/ (print), 1872-6119 (elec- science/article/pii/S0167739X17302613. REFERENCES 516

Singh:2018:SDD cations of the Association for Computing Machinery, [SAR18b] Priyanka Singh, Nishant 56(1):19–21, January 2013. Agarwal, and Balasubra- CODEN CACMA2. ISSN manian Raman. Secure 0001-0782 (print), 1557- data deduplication using 7317 (electronic). secret sharing schemes over cloud. Future Genera- Savage:2013:PP tion Computer Systems, 88(??):156–167, Novem- [Sav13b] Neil Savage. Proofs prob- ber 2018. CODEN FG- able. Communications of SEVI. ISSN 0167-739X the Association for Com- (print), 1872-7115 (elec- puting Machinery, 56(6): tronic). URL http:// 22–24, June 2013. CODEN www.sciencedirect.com/ CACMA2. ISSN 0001-0782 science/article/pii/S0167739X17327474. (print), 1557-7317 (elec- tronic). Sasaki:2012:DSW [Sas12] Yu Sasaki. Double-SP Savage:2015:NVS is weaker than single-SP: [Sav15] Neil Savage. News: Vi- Rebound attacks on Feis- sualizing sound. Com- tel ciphers with several munications of the As- rounds. Lecture Notes in sociation for Computing Computer Science, 7668: Machinery, 58(2):15–17, 265–282, 2012. CO- February 2015. CODEN DEN LNCSD9. ISSN CACMA2. ISSN 0001-0782 0302-9743 (print), 1611- (print), 1557-7317 (elec- 3349 (electronic). URL tronic). URL http:// http://link.springer. cacm.acm.org/magazines/ com/chapter/10.1007/978- 2015/2/182639/fulltext. 3-642-34931-7_16/. Sasaki:2018:QKD Savage:2016:NKP

[Sas18] M. Sasaki. Quantum key [Sav16] Neil Savage. News: The distribution and its appli- key to privacy. Com- cations. IEEE Security munications of the As- & Privacy, 16(5):42–48, sociation for Computing September/October 2018. Machinery, 59(6):12–14, ISSN 1540-7993 (print), June 2016. CODEN 1558-4046 (electronic). CACMA2. ISSN 0001-0782 Savage:2013:NSL (print), 1557-7317 (elec- tronic). URL http:// [Sav13a] Neil Savage. News: Stop- cacm.acm.org/magazines/ ping the leaks. Communi- 2016/6/202654/fulltext. REFERENCES 517

Safkhani:2017:PSD faults and minimal as- sumptions. IEEE Trans- [SB17] Masoumeh Safkhani and actions on Computers,64 Nasour Bagheri. Passive (6):1647–1657, June 2015. secret disclosure attack on CODEN ITCOB4. ISSN an ultralightweight authen- 0018-9340 (print), 1557- tication protocol for Inter- 9956 (electronic). net of Things. The Journal of Supercomputing, 73(8): Safkhani:2012:SMA 3579–3585, August 2017. [SBS+12] Masoumeh Safkhani, Na- CODEN JOSUED. ISSN sour Bagheri, Somitra Ku- 0920-8542 (print), 1573- mar Sanadhya, Majid 0484 (electronic). Naderi, and Hamid Behnam. Shwartz:2018:DMI On the security of mu- tual authentication pro- [SB18] Ofir Shwartz and Yitzhak tocols for RFID systems: Birk. Distributed memory The case of Wei et al. integrity trees. IEEE Com- ’s protocol. Lecture puter Architecture Let- Notes in Computer Sci- ters, 17(2):159–162, July/ ence, 7122:90–103, 2012. December 2018. CODEN CODEN LNCSD9. ISSN ???? ISSN 1556-6056 0302-9743 (print), 1611- (print), 1556-6064 (elec- 3349 (electronic). URL tronic). http://link.springer. Stevens:2017:AFS com/chapter/10.1007/978- 3-642-28879-1_7/. + [SBK 17] Marc Stevens, Elie Bursztein, Safkhani:2018:SRO Pierre Karpman, Ange Albertini, Yarik Markov, [SBS18] Masoumeh Safkhani, Na- Alex Petit Bianco, and sour Bagheri, and Mahyar Clement Baisse. Announc- Shariat. On the security ing the first SHA1 colli- of rotation operation based sion. Web report, Febru- ultra-lightweight authenti- ary 23, 2017. URL https: cation protocols for RFID //security.googleblog. systems. Future Internet, com/2017/02/announcing- 10(9):82, August 21, 2018. first-sha1-collision. CODEN ???? ISSN 1999- html. 5903. URL https://www. Sarkar:2015:DFA mdpi.com/1999-5903/10/ 9/82. [SBM15] S. Sarkar, S. Banik, and Santos:2014:ACD S. Maitra. Differen- tial fault attack against [SBV14] Ricardo Jorge Santos, grain family with very few Jorge Bernardino, and REFERENCES 518

Marco Vieira. Approaches data subject rights. IEEE and challenges in database Security & Privacy,17 intrusion detection. SIG- (6):21–30, November 2019. MOD Record (ACM Special ISSN 1540-7993 (print), Interest Group on Man- 1558-4046 (electronic). agement of Data), 43(3): Sujitha:2019:HSP 36–47, September 2014. CODEN SRECD8. ISSN [SC19b] V. Sujitha and D. Chi- 0163-5808 (print), 1943- tra. Highly secure palm- 5835 (electronic). print based biometric tem- plate using fuzzy vault. Shyu:2010:VMS Concurrency and Compu- [SC10] Shyong Jian Shyu and Kun tation: Practice and Ex- Chen. Visual multiple- perience, 31(12):e4513:1– secret sharing by circle ran- e4513:??, June 25, 2019. dom grids. SIAM Jour- CODEN CCPEBO. ISSN nal on Imaging Sciences, 1532-0626 (print), 1532- 3(4):926–953, ???? 2010. 0634 (electronic). CODEN SJISBI. ISSN Sun:2016:TCA 1936-4954. URL http:/ /epubs.siam.org/siims/ [SCBL16] Yanming Sun, Min Chen, resource/1/sjisbi/v3/ Abel Bacchus, and Xi- i4/p926_s1. aodong Lin. Towards collusion-attack-resilient group Srinivasan:2012:RAP key management using one- way function tree. Com- [SC12] Avinash Srinivasan and puter Networks (Amster- Lashidhar Chennupati. Ro- dam, Netherlands: 1999), bust authentication of pub- 104(??):16–26, July 20, lic access points using 2016. CODEN ???? ISSN digital certificates — a 1389-1286 (print), 1872- novel approach. Lecture 7069 (electronic). URL Notes in Computer Sci- http://www.sciencedirect. ence, 7672:153–164, 2012. com/science/article/pii/ CODEN LNCSD9. ISSN S1389128616301128. 0302-9743 (print), 1611- 3349 (electronic). URL Saevanee:2015:CUA http://link.springer. [SCFB15] Hataichanok Saevanee, com/chapter/10.1007/978- Nathan Clarke, Steven 3-642-35362-8_13/. Furnell, and Valerio Bis- Singh:2019:SID cione. Continuous user au- thentication using multi- [SC19a] J. Singh and J. Cobbe. The modal biometrics. Com- security implications of puters & Security, 53(??): REFERENCES 519

234–246, September 2015. CACMA2. ISSN 0001-0782 CODEN CPSEDU. ISSN (print), 1557-7317 (elec- 0167-4048 (print), 1872- tronic). 6208 (electronic). URL https://www.sciencedirect. Schaathun:2012:MLI com/science/article/pii/ [Sch12a] Hans Georg Schaathun. S0167404815000875. Machine learning in im- Syta:2014:SAA age steganalysis. John Wi- ley and Sons, Inc., New [SCGW+14] Ewa Syta, Henry Corrigan- York, NY, USA, 2012. Gibbs, Shu-Chun Weng, ISBN 0-470-66305-7, 1- David Wolinsky, Bryan 118-43795-0, 1-283-60392- Ford, and Aaron John- 6, 1-118-43796-9, 1-118- son. Security analysis of 43798-5, 1-118-43800-0. xi accountable anonymity in + 284 pp. LCCN Q325.5 Dissent. ACM Transac- .S285 2012. URL http: tions on Information and //onlinelibrary.wiley. System Security, 17(1):4:1– com/book/10.1002/9781118437957. 4:??, August 2014. CO- DEN ATISBQ. ISSN 1094- Schneier:2012:LOE 9224 (print), 1557-7406 (electronic). [Sch12b] Bruce Schneier. Liars and outliers: enabling the trust Schoenmakers:2010:VS that society needs to thrive. [Sch10] Berry Schoenmakers. Vot- John Wiley and Sons, Inc., ing Schemes, chapter 15, New York, NY, USA, 2012. pages 1–21. Volume 2 ISBN 1-118-14330-2 (pa- of Atallah and Blanton perback). 384 (est.) pp. [AB10b], second edition, LCCN ???? URL http:/ 2010. ISBN 1-58488-820- /spectrum.ieee.org/at- 2. LCCN QA76.9.A43 work/innovation/review- A433 2010. URL http: liars-outliers. //www.crcnetbase.com/ Schnoor:2012:DES doi/abs/10.1201/9781584888215- c15. [Sch12c] Henning Schnoor. Decid- Schwartz:2011:IMP ing epistemic and strate- gic properties of crypto- [Sch11] Ari Schwartz. Identity graphic protocols. Lecture management and privacy: Notes in Computer Sci- a rare opportunity to get it ence, 7459:91–108, 2012. right. Communications of CODEN LNCSD9. ISSN the Association for Com- 0302-9743 (print), 1611- puting Machinery, 54(6): 3349 (electronic). URL 22–24, June 2011. CODEN http://link.springer. REFERENCES 520

com/chapter/10.1007/978- CPTRB4. ISSN 0018-9162 3-642-33167-1_6/. (print), 1558-0814 (elec- tronic). URL http:// Schneier:2013:HDD www.computer.org/csdl/ [Sch13] Bruce Schneier. How mags/co/2015/11/mco2015110092- to design — and de- abs.html. fend against — the per- Schneier:2015:DGH fect security backdoor. Web site., 2013. URL [Sch15c] Bruce Schneier. Data https://www.schneier. and Goliath: the hid- com/essays/archives/2013/ den battles to collect your 10/how_to_design_and_ data and control your . de.html world. W. W. Norton Schaefer:2015:BRB & Co., New York, NY, USA, 2015. ISBN 0-393- [Sch15a] Edward F. Schaefer. Book 24481-4 (hardcover). 383 review: The Mathematics pp. LCCN HM846 .S362 of Encryption: An Ele- 2015. URL http://www. mentary Introduction, Re- democracynow.org/2015/ viewed work(s): The Math- 3/13/data_and_goliath_ ematics of Encryption: An bruce_schneier_on; http: Elementary Introduction. //www.democracynow.org/ By Margaret Cozzens and blog/2015/3/13/part_2_ Steven J. Miller. Amer- bruce_schneier_on_the. ican Mathematical Soci- ety, Providence, RI, 2013, Schneider:2016:MSI xviii + 332 pp., ISBN 978-0-8218-8321-1, $49.00. [Sch16a] D. Schneider. $100 million American Mathematical SETI initiative starts lis- Monthly, 122(1):83–88, tening for E.T. IEEE Spec- January 2015. CODEN trum, 53(1):41–42, January AMMYAE. ISSN 0002- 2016. CODEN IEESAM. 9890 (print), 1930-0972 ISSN 0018-9235 (print), (electronic). URL http:/ 1939-9340 (electronic). /www.jstor.org/stable/ 10.4169/amer.math.monthly. Schneider:2016:DEE 122.01.83. Schaffer:2015:ECA [Sch16b] D. Schneider. Don’t expect encrypted e-mail in 2016. [Sch15b] Kim B. Schaffer. Expand- IEEE Spectrum, 53(1):42– ing continuous authentica- 43, January 2016. CODEN tion with mobile devices. IEESAM. ISSN 0018-9235 Computer, 48(11):92–95, (print), 1939-9340 (elec- November 2015. CODEN tronic). REFERENCES 521

Schneier:2016:CHT Shrestha:2010:KBA

[Sch16c] Bruce Schneier. Cryptog- [SCKH10] Anish Prasad Shrestha, raphy is harder than it Dong-You Choi, Goo Rak looks. IEEE Security & Kwon, and Seung-Jo Han. Privacy, 14(1):87–88, Jan- Kerberos based authentica- uary/February 2016. CO- tion for inter-domain roam- DEN ???? ISSN 1540-7993 ing in wireless heteroge- (print), 1558-4046 (elec- neous network. Comput- tronic). ers and Mathematics with Applications, 60(2):245– Schneier:2018:CAA 255, July 2010. CODEN CMAPDK. ISSN 0898- [Sch18] B. Schneier. Cryptography 1221 (print), 1873-7668 after the aliens land. IEEE (electronic). URL http:// Security & Privacy, 16(5): www.sciencedirect.com/ 86–88, September/October science/article/pii/S0898122110000416. 2018. ISSN 1540-7993 (print), 1558-4046 (elec- Stobert:2018:TAL tronic). [SCMS18] E. Stobert, E. Cavar, L. Malisa, and D. Som- Schneier:2019:CPI mer. Teaching authentica- tion as a life skill. IEEE [Sch19a] B. Schneier. Cybersecu- Security & Privacy, 16(5): rity for the public inter- 82–85, September/October est. IEEE Security & 2018. ISSN 1540-7993 Privacy, 17(1):84–83, Jan- (print), 1558-4046 (elec- uary/February 2019. ISSN tronic). 1540-7993 (print), 1558- 4046 (electronic). Seberry:2010:CTAa

Scholl:2019:SIE [SCPSN10a] Jennifer Seberry, Chris Charnes, Josef Pieprzyk, [Sch19b] Travis Scholl. Super- and Rei Safavi-Naini. isolated elliptic curves and Crypto Topics and Ap- Abelian surfaces in cryp- plications I, chapter 12, tography. Experimen- pages 1–31. Volume 2 tal Mathematics, 28(4): of Atallah and Blanton 385–397, 2019. CODEN [AB10b], second edition, ???? ISSN 1058-6458 2010. ISBN 1-58488-820- (print), 1944-950X (elec- 2. LCCN QA76.9.A43 tronic). URL http:/ A433 2010. URL http: /www.tandfonline.com/ //www.crcnetbase.com/ doi/full/10.1080/10586458. doi/abs/10.1201/9781584888215- 2017.1412371. c12. REFERENCES 522

Seberry:2010:CTAb A novel word-independent gesture-typing continuous [SCPSN10b] Jennifer Seberry, Chris authentication scheme for Charnes, Josef Pieprzyk, mobile devices. Comput- and Rei Safavi-Naini. ers & Security, 83(??):140– Crypto Topics and Ap- 150, June 2019. CODEN plications II, chapter 13, CPSEDU. ISSN 0167-4048 pages 1–32. Volume 2 (print), 1872-6208 (elec- of Atallah and Blanton tronic). URL https:// [AB10b], second edition, www.sciencedirect.com/ 2010. ISBN 1-58488-820- science/article/pii/S0167404818306552. 2. LCCN QA76.9.A43 A433 2010. URL http: Shu:2015:PML //www.crcnetbase.com/ [SCY15] Tao Shu, Yingying Chen, doi/abs/10.1201/9781584888215- and Jie Yang. Protect- c13. ing multi-lateral localiza- Scriber:2018:FDB tion privacy in pervasive environments. IEEE/ACM [Scr18] B. A. Scriber. A framework Transactions on Network- for determining blockchain ing, 23(5):1688–1701, Oc- applicability. IEEE Soft- tober 2015. CODEN ware, 35(4):70–77, July/ IEANEP. ISSN 1063-6692 August 2018. CODEN (print), 1558-2566 (elec- IESOEG. ISSN 0740-7459 tronic). (print), 1937-4194 (elec- tronic). Saleh:2010:GTF shree:2019:ERC [SD10] Mohamed Saleh and Mourad Debbabi. A game- [sCR19a] S. Raja shree, A. Chil- theoretic framework for ambu Chelvan, and M. Ra- specification and verifica- jesh. An efficient RSA tion of cryptographic pro- cryptosystem by applying tocols. Formal Aspects cuckoo search optimization of Computing, 22(5):585– algorithm. Concurrency 609, September 2010. CO- and Computation: Practice DEN FACME5. ISSN and Experience, 31(12): 0934-5043 (print), 1433- e4845:1–e4845:??, June 25, 299X (electronic). URL 2019. CODEN CCPEBO. http://link.springer. ISSN 1532-0626 (print), com/article/10.1007/s00165- 1532-0634 (electronic). 009-0129-4. Smith-Creasey:2019:NWI Shen:2012:PAS [SCR19b] Max Smith-Creasey and [SD12] Jing Shen and Yusong Du. Muttukrishnan Rajarajan. A password authentication REFERENCES 523

scheme against Smart Card Dark, Agnes Chan, Ry- security breach. Lecture lan Chong, Thomas Mor- Notes in Computer Sci- ris, Linda Oliva, John ence, 7473:37–44, 2012. Springer, Bhavani Thu- CODEN LNCSD9. ISSN raisingham, Christopher 0302-9743 (print), 1611- Vatcher, Rakesh Verma, 3349 (electronic). URL and Susanne Wetzel. IN- http://link.springer. SuRE: Collaborating cen- com/chapter/10.1007/978- ters of academic excellence 3-642-34062-8_5/. engage students in cyber- Sengupta:2017:USB security research. IEEE Security & Privacy, 15(4): [SD17] Binanda Sengupta and 72–78, July/August 2017. Abhijit Das. Use of CODEN ???? ISSN SIMD-based data paral- 1540-7993 (print), 1558- lelism to speed up siev- 4046 (electronic). URL ing in integer-factoring al- https://www.computer. gorithms. Applied Math- org/csdl/mags/sp/2017/ ematics and Computa- 04/msp2017040072-abs. tion, 293(??):204–217, Jan- html. uary 15, 2017. CODEN Shakiba:2010:IID AMHCBQ. ISSN 0096- 3003 (print), 1873-5649 [SDM10] Mohsen Shakiba, Mo- (electronic). URL http:// hammad Dakhilalian, and www.sciencedirect.com/ Hamid Mala. An im- science/article/pii/S0096300316305148. proved impossible differ- ential cryptanalysis of Zo- Streit:2018:PQK diac. The Journal of Sys- [SD18] Silvan Streit and Fabrizio tems and Software, 83(4): De Santis. Post-quantum 702–709, April 2010. CO- key exchange on ARMv8- DEN JSSODM. ISSN A: a new hope for NEON 0164-1212. made simple. IEEE Trans- Souissi:2012:OCP actions on Computers,67 (11):1651–1662, Novem- [SDM+12] Youssef Souissi, Nicolas ber 2018. CODEN IT- Debande, Sami Mekki, COB4. ISSN 0018-9340 Sylvain Guilley, and Ali (print), 1557-9956 (elec- Maalaoui. On the optimal- tronic). URL https: ity of correlation power at- //ieeexplore.ieee.org/ tack on embedded crypto- document/8107588/. graphic systems. Lecture Sherman:2017:ICC Notes in Computer Sci- ence, 7322:169–178, 2012. [SDC+17] Alan Sherman, Melissa CODEN LNCSD9. ISSN REFERENCES 524

0302-9743 (print), 1611- SCDI. ISSN 0304-3975 3349 (electronic). URL (print), 1879-2294 (elec- http://link.springer. tronic). URL http:// com/chapter/10.1007/978- www.sciencedirect.com/ 3-642-30955-7_15/. science/article/pii/S0304397515011354. Shakiba:2014:CCI Salman:2018:BMM

[SDM14] Mohsen Shakiba, Mo- [SE18] S. M. Salman and A. A. hammad Dakhilalian, and Elsadany. On the bifur- Hamid Mala. On computa- cation of Marotto’s map tional complexity of impos- and its application in im- sible differential cryptanal- age encryption. Journal of ysis. Information Process- Computational and Applied ing Letters, 114(5):252– Mathematics, 328(??):177– 255, May 2014. CODEN 196, January 15, 2018. CO- IFPLAT. ISSN 0020-0190 DEN JCAMDI. ISSN 0377- (print), 1872-6119 (elec- 0427 (print), 1879-1778 tronic). URL http:// (electronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0020019013003116. science/article/pii/S0377042717303515. Seo:2014:RHI Sasaki:2012:IKK

[SE14] Jae Hong Seo and Keita [SEHK12] Yu Sasaki, Sareh Emami, Emura. Revocable hier- Deukjo Hong, and Ashish archical identity-based en- Kumar. Improved known- cryption. Theoretical Com- key distinguishers on Feistel– puter Science, 542(??):44– SP ciphers and applica- 62, July 3, 2014. CODEN tion to Camellia. Lecture TCSCDI. ISSN 0304-3975 Notes in Computer Sci- (print), 1879-2294 (elec- ence, 7372:87–100, 2012. tronic). URL http:// CODEN LNCSD9. ISSN www.sciencedirect.com/ 0302-9743 (print), 1611- science/article/pii/S0304397514003363. 3349 (electronic). URL http://link.springer. Seo:2016:RHI com/chapter/10.1007/978- [SE16] Jae Hong Seo and Keita 3-642-31448-3_7/. Emura. Revocable hi- Staples:2019:SAB erarchical identity-based encryption via history- [SEK+19] J. Staples, C. Endi- free approach. Theo- cott, L. Krause, P. Pal, retical Computer Science, P. Samouelian, R. Schantz, 615(??):45–60, February and A. Wellman. A semi- 15, 2016. CODEN TC- autonomic bytecode re- REFERENCES 525

pair framework. IEEE Computing Systems, 17(3): Software, 36(2):97–102, 66:1–66:??, June 2018. CO- March/April 2019. CO- DEN ???? ISSN 1539-9087 DEN IESOEG. ISSN 0740- (print), 1558-3465 (elec- 7459 (print), 1937-4194 tronic). (electronic). Serrato:2012:IAN Sendrier:2010:PQC [Ser12] Christy Serrato. Iden- [Sen10] Nicolas Sendrier, editor. tity assurance and net- Post-Quantum Cryptogra- work security. Network phy: Third International Security, 2012(4):19–20, Workshop, PQCrypto 2010, April 2012. CODEN Darmstadt, Germany, May NTSCF5. ISSN 1353-4858 25–28, 2010. Proceed- (print), 1872-9371 (elec- ings, volume 6061 of Lec- tronic). URL http:// ture Notes in Computer www.sciencedirect.com/ Science. Springer-Verlag, science/article/pii/S1353485812700284. Berlin, Germany / Heidel- Sallam:2012:EBM berg, Germany / London, UK / etc., 2010. ISBN [SERF12] Ahmed I. Sallam, El-Sayed 3-642-12928-5. LCCN El-Rabaie, and Osama S. QA76.9.A25 2010. Faragallah. Encryption- based multilevel model Sendrier:2017:CBC for DBMS. Comput- [Sen17] Nicolas Sendrier. Code- ers & Security, 31(4):437– based cryptography: State 446, June 2012. CODEN of the art and perspectives. CPSEDU. ISSN 0167-4048 IEEE Security & Privacy, (print), 1872-6208 (elec- 15(4):44–50, July/August tronic). URL https:// 2017. CODEN ???? ISSN www.sciencedirect.com/ 1540-7993 (print), 1558- science/article/pii/S0167404812000417. 4046 (electronic). URL Sakai:2016:CDN https://www.computer. org/csdl/mags/sp/2017/ [SES+16] Yusuke Sakai, Keita Emura, 04/msp2017040044-abs. Jacob C. N. Schuldt, html. Goichiro Hanaoka, and Seo:2018:CSI Kazuo Ohta. Construc- tions of dynamic and non- [Seo18] Hwajeong Seo. Com- dynamic threshold public- pact software implementa- key encryption schemes tion of public-key cryptog- with decryption consis- raphy on MSP430X. ACM tency. Theoretical Com- Transactions on Embedded puter Science, 630(??):95– REFERENCES 526

116, May 30, 2016. CO- 1615-5262 (print), 1615- DEN TCSCDI. ISSN 0304- 5270 (electronic). URL 3975 (print), 1879-2294 http://link.springer. (electronic). URL http:// com/article/10.1007/s10207- www.sciencedirect.com/ 017-0367-z. . science/article/pii/S0304397516300317 Savas:2014:SMQ Sethumadhavan:2016:HEP [SEY14] Erkay Savas, Serdar Suer [Set16] Simha Sethumadhavan. Erdem, and Kazim Yum- Hardware-enforced pri- bul. On selection of mod- vacy. Computer, 49(10): ulus of quadratic codes for 10, October 2016. CO- the protection of crypto- DEN CPTRB4. ISSN graphic operations against 0018-9162 (print), 1558- fault attacks. IEEE Trans- 0814 (electronic). URL actions on Computers,63 https://www.computer. (5):1182–1196, May 2014. org/csdl/mags/co/2016/ CODEN ITCOB4. ISSN 10/mco2016100010.html. 0018-9340 (print), 1557- Severance:2016:BSB 9956 (electronic). [Sev16] Charles Severance. Bruce Su:2012:IIN Schneier: Building cryp- [SF12] Chen Su and Haining tographic systems. Com- Fan. Impact of Intel’s puter, 49(4):13–15, April new instruction sets on 2016. CODEN CP- software implementation TRB4. ISSN 0018-9162 of GF(2)[x] multiplica- (print), 1558-0814 (elec- tion. Information Process- tronic). URL http:// ing Letters, 112(12):497– www.computer.org/csdl/ 502, June 30, 2012. CO- mags/co/2016/04/mco2016040013. DEN IFPLAT. ISSN 0020- html. 0190 (print), 1872-6119 Seo:2018:AOF (electronic). URL http:// [SEXY18] Jae Hong Seo, Keita www.sciencedirect.com/ Emura, Keita Xagawa, science/article/pii/S0020019012000804. and Kazuki Yoneyama. Shabtai:2010:SAP Accumulable optimistic fair exchange from verifi- [SFE10] Asaf Shabtai, Yuval Fledel, ably encrypted homomor- and Yuval Elovici. Secur- phic signatures. Inter- ing Android-powered mo- national Journal of In- bile devices using SELinux. formation Security,17 IEEE Security & Pri- (2):193–220, April 2018. vacy, 8(3):36–44, May/ CODEN ???? ISSN June 2010. CODEN ???? REFERENCES 527

ISSN 1540-7993 (print), Sakellariou:2019:HEK 1558-4046 (electronic). [SG19a] Georgios Sakellariou and Schneier:2015:SWC Anastasios Gounaris. Ho- momorphically encrypted [SFKR15] Bruce Schneier, Matthew k-means on cloud-hosted Fredrikson, Tadayoshi Kohno, servers with low client- and Thomas Ristenpart. side load. Computing, 101 Surreptitiously weakening (12):1813–1836, December cryptographic systems. Re- 2019. CODEN CMPTA2. port, Co3 Systems; Univer- ISSN 0010-485X (print), sity of Wisconsin; Univer- 1436-5057 (electronic). sity of Washington, ????; Madison, WI, USA; Seat- Sgantzos:2019:AII tle, WA, USA, February 9, 2015. URL http:/ [SG19b] Konstantinos Sgantzos and /eprint.iacr.org/2015/ Ian Grigg. Artificial intel- 097. ligence implementations on the blockchain. Use cases Sarma:2012:STP and future applications. [SG12] Amardeo Sarma and Joao Future Internet, 11(8):170, Girao. Supporting trust August 02, 2019. CO- and privacy with an DEN ???? ISSN 1999- identity-enabled architec- 5903. URL https://www. ture. Future Internet,4 mdpi.com/1999-5903/11/ (4):1016–1025, November 8/170. 19, 2012. CODEN ???? Shu:2014:DAS ISSN 1999-5903. URL https://www.mdpi.com/ [SGC14] Yuanchao Shu, Yu Jason 1999-5903/4/4/1016. Gu, and Jiming Chen. Dynamic authentication Sasdrich:2015:ICS with sensory information for the access control sys- [SG15] Pascal Sasdrich and Tim tems. IEEE Transactions G¨uneysu. Implement- on Parallel and Distributed ing Curve25519 for side- Systems, 25(2):427–436, channel–protected ellip- February 2014. CODEN tic curve cryptography. ITDSEO. ISSN 1045-9219 ACM Transactions on (print), 1558-2183 (elec- Reconfigurable Technology tronic). and Systems, 9(1):3:1–3:??, November 2015. CODEN Saxena:2016:API ???? ISSN 1936-7406 (print), 1936-7414 (elec- [SGC16] Neetesh Saxena, Santiago tronic). Grijalva, and Narendra S. REFERENCES 528

Chaudhari. Authentication php/scpe/article/view/ protocol for an IoT-enabled 1422. LTE network. ACM Trans- Sanchez-Garcia:2016:SSA actions on Internet Tech- nology (TOIT), 16(4):25:1– [SGGCR+16] J. S´anchez-Garc´ıa, J. M. 25:??, December 2016. CO- Garc´ıa-Campos, D. G. DEN ???? ISSN 1533-5399 Reina, S. L. Toral, and (print), 1557-6051 (elec- F. Barrero. On-siteDriverID: tronic). a secure authentication scheme based on Span- Silva-Garcia:2018:SBG ish eID cards for vehic- ular ad hoc networks. [SGFCRM+18] V. M. Silva-Garc´ıa, R. Flores- Future Generation Com- Carapia, C. Renter´ıa- puter Systems, 64(??):50– M´arquez, B. Luna-Benoso, 60, November 2016. CO- and M. Aldape-P´erez. Sub- DEN FGSEVI. ISSN 0167- stitution box generation 739X (print), 1872-7115 using Chaos: An im- (electronic). URL http:// age encryption applica- www.sciencedirect.com/ tion. Applied Mathe- science/article/pii/S0167739X16301121. matics and Computation, 332(??):123–135, Septem- Sun:2015:FSW ber 1, 2018. CODEN [SGH15] Shi-Feng Sun, Dawu Gu, AMHCBQ. ISSN 0096- and Zhengan Huang. Fully 3003 (print), 1873-5649 secure wicked identity- (electronic). URL http:// based encryption against www.sciencedirect.com/ key leakage attacks. The science/article/pii/S009630031830184X. Computer Journal,58 S:2018:EDS (10):2520–2536, October 2015. CODEN CM- PJA6. ISSN 0010-4620 [SGG18] Prabu S, Gpinath Ganap- (print), 1460-2067 (elec- athy, and Ranjan Goyal. tronic). URL Enhanced data security http:// for public cloud environ- comjnl.oxfordjournals. . ment with secured hy- org/content/58/10/2520 brid encryption authenti- Shen:2018:CAL cation mechanisms. Scal- able Computing: Prac- [SGJ+18] Jian Shen, Ziyuan Gui, tice and Experience,19 Sai Ji, Jun Shen, Haowen (4):351–360, ???? 2018. Tan, and Yi Tang. Cloud- CODEN ???? ISSN aided lightweight cer- 1895-1767. URL https: tificateless authentication //www.scpe.org/index. protocol with anonymity REFERENCES 529

for wireless body area net- Sun:2017:PKE works. Journal of Net- work and Computer Appli- [SGP+17] Shi-Feng Sun, Dawu Gu, cations, 106(??):117–123, Udaya Parampalli, Yu Yu, March 15, 2018. CODEN and Baodong Qin. Pub- JNCAF3. ISSN 1084-8045 lic key encryption resilient (print), 1095-8592 (elec- to leakage and tampering tronic). URL http:// attacks. Journal of Com- www.sciencedirect.com/ puter and System Sciences, science/article/pii/S1084804518300031. 89(??):142–156, Novem- ber 2017. CODEN JC- Susilo:2016:EDT SSBM. ISSN 0022-0000 (print), 1090-2724 (elec- [SGM16] Willy Susilo, Fuchun Guo, tronic). URL http:// and Yi Mu. Efficient dy- www.sciencedirect.com/ namic threshold identity- science/article/pii/S0022000017300326. based encryption with constant-size ciphertext. Sipiran:2014:SCA Theoretical Computer Sci- ence, 609 (part 1)(??):49– [SGS14] Ivan Sipiran, Robert Gre- 59, January 4, 2016. CO- gor, and Tobias Schreck. DEN TCSCDI. ISSN 0304- Shapes and cryptogra- 3975 (print), 1879-2294 phy: Approximate symme- (electronic). URL http:// try detection in partial 3D www.sciencedirect.com/ meshes. Computer Graph- science/article/pii/S0304397515008087. ics Forum, 33(7):131–140, October 2014. CODEN Shankar:2012:BDF CGFODY. ISSN 0167-7055 (print), 1467-8659 (elec- [SGP+12] Deepa D. Shankar, T. Gireeshku- tronic). mar, K. Praveen, R. Jithin, and Ashji S. Raj. Block Shaolan:2011:EDE dependency feature based classification scheme for [SGY11] Zhang Shaolan, Xing uncalibrated image ste- Guobo, and Yang Yixian. ganalysis. Lecture Notes An efficient domain exten- in Computer Science, 6411: sion to construct a crypto- 189–195, 2012. CO- graphic hash function. In DEN LNCSD9. ISSN IEEE [IEE11a], pages 424– 0302-9743 (print), 1611- 427. ISBN 0-7695-4353-7, 3349 (electronic). URL 1-61284-289-5. LCCN ???? http://link.springer. URL http://ieeexplore. com/content/pdf/10.1007/ ieee.org/servlet/opac? 978-3-642-27872-3_28. punumber=5750113. REFERENCES 530

Seyedzadeh:2011:IEA SIGACT News, 41(3):44– 45, September 2010. CO- [SH11] Seyed Mohammad Seyedzadeh DEN SIGNDM. ISSN and Yasaman Hashemi. 0163-5700 (print), 1943- Image encryption algo- 5827 (electronic). See rithm based on Choquet [Shp03]. Fuzzy Integral with self- adaptive pseudo-random Shaw:2013:DE number generator. In 2011 [Sha13] John Shaw. Dealing 11th International Confer- with encryption. Net- ence on Intelligent Systems work Security, 2013(11):8– Design and Applications 11, November 2013. CO- (ISDA), pages 642–647. DEN NTSCF5. ISSN 1353- IEEE Computer Society 4858 (print), 1872-9371 Press, 1109 Spring Street, (electronic). URL http:// Suite 300, Silver Spring, www.sciencedirect.com/ MD 20910, USA, 2011. science/article/pii/S135348581370120X. URL http://ieeexplore. ieee.org/stamp/stamp. Syed:2019:TGB jsp?tp=&arnumber=6121728. [SHBC19] Zahid Syed, Jordan Helmick, Song:2015:ADT Sean Banerjee, and Bo- jan Cukic. Touch gesture- [SH15] WeiTao Song and Bin based authentication on Hu. Approach to de- mobile devices: the effects tecting type-flaw attacks of user posture, device size, based on extended strand configuration, and inter- spaces. The Computer session variability. The Journal, 58(4):572–587, Journal of Systems and April 2015. CODEN CM- Software, 149(??):158–173, PJA6. ISSN 0010-4620 March 2019. CODEN JS- (print), 1460-2067 (elec- SODM. ISSN 0164-1212 tronic). URL http:// (print), 1873-1228 (elec- comjnl.oxfordjournals. tronic). URL http:// org/content/58/4/572. www.sciencedirect.com/ science/article/pii/S0164121218302516. Shallit:2010:BRB Sodsong:2016:DPB [Sha10] Jeffrey Shallit. Book review: Cryptographic [SHC+16] Wasuwee Sodsong, Jin- Applications of Analytic gun Hong, Seongwook Number Theory: Lower Chung, Yeongkyu Lim, Bounds and Pseudoran- Shin-Dug Kim, and Bernd domness, by Igor Shparlin- Burgstaller. Dynamic ski, Birk¨auser, 2003. ACM partitioning-based JPEG REFERENCES 531

decompression on hetero- Shim:2011:SAT geneous multicore architec- tures. Concurrency and [Shi11] K.-A. Shim. Security Computation: Practice and analysis of three password Experience, 28(2):517–536, authentication schemes. February 2016. CODEN J.UCS: Journal of Univer- CCPEBO. ISSN 1532-0626 sal Computer Science,17 (print), 1532-0634 (elec- (11):1623–??, ???? 2011. tronic). CODEN ???? ISSN 0948- 695X (print), 0948-6968 Shen:2014:LES (electronic). URL http:/ [She14] Xuemin Shen. A lightweight /www.jucs.org/jucs_17_ encryption scheme for 11/security_analysis_ . network-coded mobile ad of_three hoc networks. IEEE Shparlinski:2003:CAA Transactions on Parallel and Distributed Systems, [Shp03] Igor E. Shparlinski. Cryp- 25(9):2211–2221, Septem- tographic Applications of ber 2014. CODEN ITD- Analytic Number Theory: SEO. ISSN 1045-9219 Complexity Lower Bounds (print), 1558-2183 (elec- and Pseudorandomness, tronic). URL http:// volume 22 of Progress in www.computer.org/csdl/ computer science and ap- trans/td/2014/09/06559980- plied logic. Birkh¨auser abs.html. Verlag, Basel, Switzerland, Shemanske:2017:MCE 2003. ISBN 3-7643-6654-0 , 0-8176-6654-0. viii + 411 [She17] Thomas R. Shemanske. pp. LCCN QA267.7 .S55 Modern Cryptography and 2003. Elliptic Curves: a Begin- ner’s Guide, volume 83 Shparlinski:2010:NWP of Student mathemati- cal library. Ameri- [Shp10] Igor E. Shparlinski. Num- can Mathematical So- bers at work and play. ciety, Providence, RI, Notices of the Ameri- USA, 2017. ISBN 1- can Mathematical Soci- 4704-3582-9, 1-4704-4123- ety, 57(3):334–342, March 3 (e-book). xii + 250 2010. CODEN AM- pp. LCCN QA567.2.E44 NOAN. ISSN 0002-9920 S534 2017. URL http: (print), 1088-9477 (elec- //public.ebookcentral. tronic). URL http:/ proquest.com/choice/publicfullrecord. /www.ams.org/notices/ aspx?p=4940250. 201003/. REFERENCES 532

Suoranta:2012:ASM Siad:2012:NAP

[SHS12] Sanna Suoranta, Jani [Sia12] Amar Siad. A new ap- Heikkinen, and Pekka Sil- proach for private searches vekoski. Authentication on public-key encrypted session migration. Lec- data. Lecture Notes in ture Notes in Computer Computer Science, 7394: Science, 7127:17–32, 2012. 160–173, 2012. CO- CODEN LNCSD9. ISSN DEN LNCSD9. ISSN 0302-9743 (print), 1611- 0302-9743 (print), 1611- 3349 (electronic). URL 3349 (electronic). URL http://link.springer. http://link.springer. com/chapter/10.1007/978- com/chapter/10.1007/978- 3-642-27937-9_2/. 3-642-32805-3_13/. Simpson:2010:ESB Shyu:2015:VCR [Sim10] Edward Simpson. Ed- [Shy15] Shyong Jian Shyu. Vi- ward Simpson: Bayes at sual cryptograms of ran- Bletchley Park. Signifi- dom grids for threshold cance (Oxford, England),7 access structures. Theo- (2):76–80, June 2010. CO- retical Computer Science, DEN ???? ISSN 1740-9705 565(??):30–49, February (print), 1740-9713 (elec- 2, 2015. CODEN TC- tronic). SCDI. ISSN 0304-3975 Simion:2015:RST (print), 1879-2294 (elec- tronic). URL http:// [Sim15a] Emil Simion. The relevance www.sciencedirect.com/ of statistical tests in cryp- science/article/pii/S0304397514008408. tography. IEEE Security & Privacy, 13(1):66–70, Jan- Satir:2012:CBT uary/February 2015. CO- DEN ???? ISSN 1540-7993 [SI12] Esra Satir and Hakan (print), 1558-4046 (elec- Isik. A compression- tronic). URL http:// based text steganography www.computer.org/csdl/ method. The Journal mags/sp/2015/01/msp2015010066- of Systems and Software, abs.html. 85(10):2385–2394, Octo- Simmonds:2015:DII ber 2012. CODEN JS- SODM. ISSN 0164-1212 [Sim15b] Paul Simmonds. The dig- (print), 1873-1228 (elec- ital identity issue. Net- tronic). URL http:// work Security, 2015(8):8– www.sciencedirect.com/ 13, August 2015. CODEN science/article/pii/S0164121212001379. NTSCF5. ISSN 1353-4858 REFERENCES 533

(print), 1872-9371 (elec- puter Science, 773(??):71– tronic). URL http:// 78, June 14, 2019. CODEN www.sciencedirect.com/ TCSCDI. ISSN 0304-3975 science/article/pii/S1353485815300696. (print), 1879-2294 (elec- tronic). URL http:// Sirer:2016:TPS www.sciencedirect.com/ [Sir16] Emin G¨un Sirer. Tech- science/article/pii/S0304397518305310. nical perspective: The Seo:2018:CIA state (and security) of the Bitcoin economy. Com- [SJLK18] Hwajeong Seo, Ilwoong munications of the As- Jeong, Jungkeun Lee, and sociation for Comput- Woo-Hwan Kim. Com- ing Machinery, 59(4):85, pact implementations of April 2016. CODEN ARX-based block ciphers CACMA2. ISSN 0001-0782 on IoT processors. ACM (print), 1557-7317 (elec- Transactions on Embedded tronic). URL http:// Computing Systems, 17(3): cacm.acm.org/magazines/ 60:1–60:??, June 2018. CO- 2016/4/200172/fulltext. DEN ???? ISSN 1539-9087 (print), 1558-3465 (elec- Shakeri:2012:RZW tronic). [SJ12] Mahsa Shakeri and Man- Shin:2017:CGI sour Jamzad. A ro- bust zero-watermark copy- [SJWH+17] Kyuyong Shin, Carlee Joe- right protection scheme Wong, Sangtae Ha, Yung based on DWT and im- Yi, Injong Rhee, and Dou- age normalization. Lecture glas S. Reeves. T-Chain: Notes in Computer Sci- a general incentive scheme ence, 7088:359–370, 2012. for cooperative comput- CODEN LNCSD9. ISSN ing. IEEE/ACM Transac- 0302-9743 (print), 1611- tions on Networking, 25(4): 3349 (electronic). URL 2122–2137, August 2017. http://link.springer. CODEN IEANEP. ISSN com/content/pdf/10.1007/ 1063-6692 (print), 1558- 978-3-642-25346-1_32. 2566 (electronic). Sartakhti:2019:CPL Sherman:2019:OVB

[SJ19] Javad Salimi Sartakhti and [SJZG19] A. T. Sherman, F. Ja- Saeed Jalili. On the com- vani, H. Zhang, and E. Go- putational power of the laszewski. On the ori- light: a plan for break- gins and variations of ing Data Encryption Stan- blockchain technologies. dard. Theoretical Com- IEEE Security & Pri- REFERENCES 534

vacy, 17(1):72–77, Jan- 3349 (electronic). URL uary/February 2019. ISSN http://link.springer. 1540-7993 (print), 1558- com/chapter/10.1007/978- 4046 (electronic). 3-642-35416-8_5/. Sabri:2011:AFS Scarani:2014:BPQ

[SK11] Khair Eddin Sabri and [SK14] Valerio Scarani and Chris- Ridha Khedri. Algebraic tian Kurtsiefer. The black framework for the spec- paper of quantum cryptog- ification and analysis of raphy: Real implementa- cryptographic-key distri- tion problems. Theoreti- bution. Fundamenta Infor- cal Computer Science, 560 maticae, 112(4):305–335, (part 1)(??):27–32, Decem- December 2011. CODEN ber 4, 2014. CODEN TC- FUMAAJ. ISSN 0169-2968 SCDI. ISSN 0304-3975 (print), 1875-8681 (elec- (print), 1879-2294 (elec- tronic). tronic). URL http:// www.sciencedirect.com/ Sachnev:2012:IME science/article/pii/S0304397514006938. [SK12a] Vasily Sachnev and Hy- Sepczuk:2018:NRB oung Joong Kim. An improved matrix encod- [SK18] Mariusz Sepczuk and Zbig- ing scheme for JPEG niew Kotulski. A new risk- steganography. Lecture based authentication man- Notes in Computer Sci- agement model oriented on ence, 7128:3–15, 2012. CO- user’s experience. Comput- DEN LNCSD9. ISSN ers & Security, 73(??):17– 0302-9743 (print), 1611- 33, March 2018. CODEN 3349 (electronic). URL CPSEDU. ISSN 0167-4048 http://link.springer. (print), 1872-6208 (elec- com/chapter/10.1007/978- tronic). URL https:// 3-642-32205-1_3/. www.sciencedirect.com/ science/article/pii/S0167404817302079. Seo:2012:MPM Son:2017:NOC [SK12b] Hwajeong Seo and Howon Kim. Multi-precision mul- [SKB+17] Junggab Son, Donghyun tiplication for public-key Kim, Md Zakirul Alam cryptography on embed- Bhuiyan, Rasheed Hus- ded microprocessors. Lec- sain, and Heekuck Oh. ture Notes in Computer A new outsourcing condi- Science, 7690:55–67, 2012. tional proxy re-encryption CODEN LNCSD9. ISSN suitable for mobile cloud 0302-9743 (print), 1611- environment. Concurrency REFERENCES 535

and Computation: Practice claims. ACM Transactions and Experience, 29(14), on the Web (TWEB), 8(2): July 25, 2017. CODEN 9:1–9:??, March 2014. CO- CCPEBO. ISSN 1532-0626 DEN ???? ISSN 1559-1131 (print), 1532-0634 (elec- (print), 1559-114X (elec- tronic). tronic). Saha:2018:ASS Seo:2015:AEC

[SKE+18] Seemanta Saha, Ismet Bu- [SKH15] Seog Chung Seo, Taehong rak Kadron, William Eiers, Kim, and Seokhie Hong. Lucas Bang, and Tevfik Accelerating elliptic curve Bultan. Attack synthe- scalar multiplication over sis for strings using meta- GF(2m) on graphic hard- heuristics. ACM SIG- wares. Journal of Parallel SOFT Software Engineer- and Distributed Comput- ing Notes, 43(4):56, Oc- ing, 75(??):152–167, Jan- tober 2018. CODEN uary 2015. CODEN JPD- SFENDP. ISSN 0163-5948 CER. ISSN 0743-7315 (print), 1943-5843 (elec- (print), 1096-0848 (elec- tronic). tronic). URL http:// www.sciencedirect.com/ Soupionis:2014:GTA science/article/pii/S0743731514001646. [SKEG14] Yannis Soupionis, Remous- Shin:2017:SSD Aris Koutsiamanis, Pav- los Efraimidis, and Dim- [SKH17] Youngjoo Shin, Dongyoung itris Gritzalis. A game- Koo, and Junbeom Hur. A theoretic analysis of pre- survey of secure data dedu- venting spam over Inter- plication schemes for cloud net Telephony via audio storage systems. ACM CAPTCHA-based authen- Computing Surveys, 49(4): tication. Journal of Com- 74:1–74:??, February 2017. puter Security, 22(3):383– CODEN CMSVAN. ISSN 413, ???? 2014. CODEN 0360-0300 (print), 1557- JCSIET. ISSN 0926-227X 7341 (electronic). (print), 1875-8924 (elec- tronic). Szalachowski:2010:CCG Sirivianos:2014:LSF [SKK10] P. Szalachowski, B. Ksiezopol- ski, and Z. Kotulski. [SKGY14] Michael Sirivianos, Kyung- CMAC, CCM and GCM/GMAC: baek Kim, Jian Wei Advanced modes of oper- Gan, and Xiaowei Yang. ation of symmetric block Leveraging social feedback ciphers in wireless sen- to verify online identity sor networks. Information REFERENCES 536

Processing Letters, 110(7): Computer Science, 7394: 247–251, March 1, 2010. 107–116, 2012. CO- CODEN IFPLAT. ISSN DEN LNCSD9. ISSN 0020-0190 (print), 1872- 0302-9743 (print), 1611- 6119 (electronic). 3349 (electronic). URL http://link.springer. Stevens:2015:FCF com/chapter/10.1007/978- [SKP15] Marc Stevens, Pierre Karp- 3-642-32805-3_9/. man, and Thomas Peyrin. Schmitz:2012:NAC Freestart collision on full SHA-1. Cryptology ePrint [SLGZ12] Roland Schmitz, Shu- Archive, Report 2015/967., jun Li, Christos Grecos, 2015. URL https:// and Xinpeng Zhang. A eprint.iacr.org/2015/ new approach to com- 967. mutative watermarking- encryption. Lecture Notes Singh:2018:MWT in Computer Science, 7394: [SKS+18] Amit Kumar Singh, Bas- 117–130, 2012. CO- ant Kumar, Sanjay Ku- DEN LNCSD9. ISSN mar Singh, S. P. Ghrera, 0302-9743 (print), 1611- and Anand Mohan. Mul- 3349 (electronic). URL tiple watermarking tech- http://link.springer. nique for securing online com/chapter/10.1007/978- social network contents us- 3-642-32805-3_10/. ing back propagation neu- Srivatsa:2011:ESA ral network. Future Gen- eration Computer Systems, [SLI11] Mudhakar Srivatsa, Ling 86(??):926–939, Septem- Liu, and Arun Iyengar. ber 2018. CODEN FG- EventGuard: a system SEVI. ISSN 0167-739X architecture for secur- (print), 1872-7115 (elec- ing publish–subscribe net- tronic). URL https:// works. ACM Transactions www.sciencedirect.com/ on Computer Systems,29 science/article/pii/S0167739X16306628. (4):10:1–10:??, December 2011. CODEN ACSYEC. Scheidat:2012:STT ISSN 0734-2071 (print), [SKV12] Tobias Scheidat, Karl 1557-7333 (electronic). K¨ummel, and Claus Viel- Schultz:2010:MMP hauer. Short term tem- plate aging effects on bio- [SLL10] David Schultz, Barbara metric dynamic handwrit- Liskov, and Moses Liskov. ing authentication perfor- MPSS: Mobile Proactive mance. Lecture Notes in Secret Sharing. ACM REFERENCES 537

Transactions on Informa- bit-pair shadows. Theo- tion and System Secu- retical Computer Science, rity, 13(4):34:1–34:??, De- 654(??):113–127, Novem- cember 2010. CODEN ber 22, 2016. CODEN ATISBQ. ISSN 1094-9224 TCSCDI. ISSN 0304-3975 (print), 1557-7406 (elec- (print), 1879-2294 (elec- tronic). tronic). URL http:// www.sciencedirect.com/ Sandor:2019:EDM science/article/pii/S0304397516300561. [SLL+19] Voundi Koe Arthur San- Sun:2016:RSP dor, Yaping Lin, Xiehua Li, Feng Lin, and Shi- [SLY+16] Shi-Feng Sun, Joseph K. wen Zhang. Efficient de- Liu, Yu Yu, Baodong Qin, centralized multi-authority and Dawu Gu. RKA- attribute based encryp- secure public key encryp- tion for mobile cloud data tions against efficiently in- storage. Journal of Net- vertible functions. The work and Computer Ap- Computer Journal,59 plications, 129(??):25–36, (11):1637–1658, Novem- March 1, 2019. CODEN ber 2016. CODEN CM- JNCAF3. ISSN 1084-8045 PJA6. ISSN 0010-4620 (print), 1095-8592 (elec- (print), 1460-2067 (elec- tronic). URL http:// tronic). URL http:// www.sciencedirect.com/ comjnl.oxfordjournals. science/article/pii/S1084804519300037. org/content/59/11/1637. Somani:2010:IDS Shao:2012:AKP

[SLM10] U. Somani, K. Lakhani, [SLZ12] Jun Shao, Peng Liu, and and M. Mundra. Imple- Yuan Zhou. Achiev- menting digital signature ing key privacy without with RSA encryption algo- losing CCA security in rithm to enhance the data proxy re-encryption. The security of cloud in cloud Journal of Systems and computing. In Chaud- Software, 85(3):655–665, huri et al. [CGB+10], pages March 2012. CODEN JS- 211–216. ISBN 1-4244- SODM. ISSN 0164-1212 7675-5. LCCN ???? (print), 1873-1228 (elec- tronic). URL http:// Su:2016:SSP www.sciencedirect.com/ [SLXX16] Shenghui Su, Shuwang L¨u, science/article/pii/S0164121211002421. Maozhi Xu, and Tao Xie. Sarkar:2010:CRM A semantically secure pub- lic key cryptoscheme using [SM10a] Santanu Sarkar and Sub- REFERENCES 538

hamoy Maitra. Cryptanal- 2011 International Sympo- ysis of RSA with more sium on Artificial Intelli- than one decryption expo- gence and Signal Process- nent. Information Process- ing (AISP), pages 101–106. ing Letters, 110(8–9):336– IEEE Computer Society 340, April 1, 2010. CODEN Press, 1109 Spring Street, IFPLAT. ISSN 0020-0190 Suite 300, Silver Spring, (print), 1872-6119 (elec- MD 20910, USA, 2011. tronic). URL http://ieeexplore. ieee.org/stamp/stamp. Sarkar:2010:CRT jsp?tp=&arnumber=5960982. [SM10b] Santanu Sarkar and Sub- Sengupta:2012:SAI hamoy Maitra. Cryptanal- ysis of RSA with two de- [SM12] Madhumita Sengupta and cryption exponents. Infor- J. K. Mandal. Self authen- mation Processing Letters, tication of image through 110(5):178–181, February Daubechies transform tech- 1, 2010. CODEN IF- nique (SADT). arXiv.org, PLAT. ISSN 0020-0190 ??(??):1–4, December 9, (print), 1872-6119 (elec- 2012. CODEN ???? ISSN tronic). 2331-8422. URL https: //arxiv.org/abs/1212. Sorniotti:2010:PSS 1863. [SM10c] Alessandro Sorniotti and Sencar:2013:DIF Refik Molva. A prov- [SM13] Husrev T. Sencar and ably secure secret hand- Nasir D. Memon, editors. shake with dynamic con- Digital image forensics: trolled matching. Comput- there is more to a picture ers & Security, 29(5):619– than meets the eye. Spring- 627, July 2010. CODEN er-Verlag, Berlin, Ger- CPSEDU. ISSN 0167-4048 many / Heidelberg, Ger- (print), 1872-6208 (elec- many / London, UK / tronic). URL https:// etc., 2013. ISBN 1-4614- www.sciencedirect.com/ 0757-5 (ebook). viii + science/article/pii/S0167404809001370. 370 pp. LCCN TA1637 Seyedzadeh:2011:IES .D54 2013. URL http: //site.ebrary.com/id/ [SM11] S. M. Seyedzadeh and 10589376. S. Mirzakuchaki. Image Swami:2018:AAS encryption scheme based on Choquet fuzzy inte- [SM18] Shivam Swami and Kar- gral with pseudo-random tik Mohanram. ARSE- keystream generator. In NAL: Architecture for se- REFERENCES 539

cure non-volatile memo- etc., 2016. ISBN 3-319- ries. IEEE Computer Ar- 21935-9 (hardcover), 3-319- chitecture Letters, 17(2): 21936-7 (e-book). ISSN 192–196, July/December 1619-7100 (print), 2197- 2018. CODEN ???? ISSN 845X (electronic). xii + 1556-6056 (print), 1556- 481 + 119 pp. LCCN 6064 (electronic). QA76.9.A25; QA76.9.D35 S63 2016. URL http:/ Shibu:2019:ARR /link.springer.com/10. [SM19a] N. V. Shibu and P. Malathi. 1007/978-3-319-21936- Accurate and reliable re- 3. versible data hiding us- Stanton:2010:FAD ing sequential encoding techniques. Concurrency [SMBA10] Paul T. Stanton, Ben- and Computation: Practice jamin McKeown, Randal and Experience, 31(14): Burns, and Giuseppe Ate- e4979:1–e4979:??, July 25, niese. FastAD: an authenti- 2019. CODEN CCPEBO. cated directory for billions ISSN 1532-0626 (print), of objects. Operating Sys- 1532-0634 (electronic). tems Review, 44(1):45–49, January 2010. CODEN Shokri:2019:ESS OSRED8. ISSN 0163-5980. [SM19b] Madeh Shokri and Megh- Salmon:2011:PRN dad Mirabi. An efficient stream structure for broad- [SMDS11] John K. Salmon, Mark A. casting the encrypted XML Moraes, Ron O. Dror, and data in mobile wireless David E. Shaw. Paral- broadcast channels. The lel random numbers: as Journal of Supercomputing, easy as 1, 2, 3. In Lathrop 75(11):7147–7173, Novem- et al. [LCK11], pages 16:1– ber 2019. CODEN JO- 16:12. ISBN 1-4503-0771- SUED. ISSN 0920-8542 X. LCCN ???? (print), 1573-0484 (elec- Smith:2011:SSX tronic). Smart:2016:CMS [Smi11a] Michael Smith. The se- crets of Station X: how the [Sma16] Nigel P. (Nigel Paul) Bletchley Park codebreak- Smart. Cryptography Made ers helped win the war. Simple. Information Se- Biteback Pub., London, curity and Cryptography. UK, 2011. ISBN 1-84954- Springer-Verlag, Berlin, 095-0 (paperback). 328 + Germany / Heidelberg, 16 pp. LCCN D810.C88 Germany / London, UK / S659 2011. REFERENCES 540

Smith:2011:RBA Stratix II and Stratix III FPGAs. ACM Trans- [Smi11b] Sean W. Smith. Room actions on Reconfigurable at the bottom: Authenti- Technology and Systems,7 cated encryption on slow (4):7:1–7:??, January 2015. legacy networks. IEEE Se- CODEN ???? ISSN 1936- curity & Privacy, 9(4):60– 7406 (print), 1936-7414 63, July/August 2011. CO- (electronic). DEN ???? ISSN 1540-7993 (print), 1558-4046 (elec- Stankovski:2014:CFE tronic). [SMS14] Tomislav Stankovski, Pe- Smith:2015:HHB ter V. E. McClintock, [Smi15a] Christopher Smith. The and Aneta Stefanovska. hidden history of Bletch- Coupling functions en- ley Park: a social and or- able secure communica- ganisational history, 1939– tions. Physical Review X,4 1945. Palgrave Macmillan, (1):011026, February 2014. New York, NY, USA, 2015. CODEN PRXHAE. ISSN ISBN 1-137-48492-6. vii + 2160-3308. URL http: 238 pp. LCCN D810.C88 //link.aps.org/doi/10. C653 2015. URL http: 1103/PhysRevX.4.011026; //www.loc.gov/catdir/ http://www.rdmag.com/ enhancements/fy1608/2015015176- news/2014/04/unbreakable- d.html; http://www. security-codes-inspired- loc.gov/catdir/enhancements/ nature. fy1608/2015015176-t.html. Sucasas:2016:APP Smith:2015:DBP [SMS+16] Victor Sucasas, Geor- [Smi15b] Michael Smith. The Debs gios Mantas, Firooz B. of Bletchley Park and other Saghezchi, Ayman Rad- stories. Aurum Press, Lon- wan, and Jonathan Ro- don, UK, 2015. ISBN 1- driguez. An autonomous 78131-387-3 (hardcover), 1- privacy-preserving authen- 78131-388-1. 298 + 8 pp. tication scheme for intel- LCCN D810.S7 S65 2015. ligent transportation sys- Swierczynski:2015:PSE tems. Computers & Security, 60(??):193–205, [SMOP15] Pawel Swierczynski, Amir July 2016. CODEN Moradi, David Oswald, CPSEDU. ISSN 0167-4048 and Christof Paar. Phys- (print), 1872-6208 (elec- ical security evaluation tronic). URL https:// of the bitstream encryp- www.sciencedirect.com/ tion mechanism of Altera science/article/pii/S0167404816300463. REFERENCES 541

Sharma:2018:CSS (TOPS), 21(2):10:1–10:??, February 2018. ISSN 2471- [SMSK18] Himani Sharma, D. C. 2566 (print), 2471-2574 Mishra, R. K. Sharma, and (electronic). URL https: Naveen Kumar. Crypto- //dl.acm.org/citation. stego system for securing cfm?id=3177751. text and image data. Inter- national Journal of Image Siadati:2017:MYS and Graphics (IJIG),18 [SNG+17] Hossein Siadati, Toan (4):??, October 2018. ISSN Nguyen, Payas Gupta, 0219-4678. URL https: Markus Jakobsson, and //www.worldscientific. Nasir Memon. Mind . com/doi/10.1142/S0219467818500201 your SMSes: Mitigat- Sadeghi:2010:THI ing social engineering in second factor authenti- [SN10] Ahmad-Reza. Sadeghi and cation. Computers & David Naccache, edi- Security, 65(??):14–28, tors. Towards Hardware- March 2017. CODEN Intrinsic Security: Foun- CPSEDU. ISSN 0167-4048 dations and Practice. Infor- (print), 1872-6208 (elec- mation Security and Cryp- tronic). URL https:// tography. Springer-Verlag, www.sciencedirect.com/ Berlin, Germany / Heidel- science/article/pii/S016740481630116X. berg, Germany / London, UK / etc., 2010. ISBN Safavi-Naini:2011:USC 3-642-14451-9 (hardcover), 3-642-14452-7 (e-book). [SNJ11] Reihaneh Safavi-Naini and ISSN 1619-7100 (print), Shaoquan Jiang. Uncondi- 2197-845X (electronic). xvi tionally secure conference + 407 pp. LCCN TK7887.5 key distribution: Secu- .T69 2010eb. URL http:/ rity notions, bounds and /www.springerlink.com/ constructions. Interna- content/978-3-642-14452- tional Journal of Founda- 3. Foreword by Pim Tuyls. tions of Computer Science (IJFCS), 22(6):1369–1393, Son:2018:GFD September 2011. CODEN IFCSEN. ISSN 0129-0541 [SNCK18] Yunmok Son, Juhwan Noh, (print), 1793-6373 (elec- Jaeyeong Choi, and Yong- tronic). dae Kim. GyrosFinger: Fingerprinting drones for Seyedzadeh:2014:RCI location tracking based on the outputs of MEMS gyro- [SNM14] Seyed Mohammad Seyedzadeh, scopes. ACM Transactions Benyamin Norouzi, and on Privacy and Security Sattar Mirzakuchaki. RGB REFERENCES 542

color image encryption Introduction for embed- based on Choquet fuzzy ded platforms for cryp- integral. The Journal tography in the coming of Systems and Software, decade. ACM Transactions 97(??):128–139, Novem- on Embedded Computing ber 2014. CODEN JS- Systems, 14(3):40:1–40:??, SODM. ISSN 0164-1212 April 2015. CODEN ???? (print), 1873-1228 (elec- ISSN 1539-9087 (print), tronic). URL http:// 1558-3465 (electronic). www.sciencedirect.com/ science/article/pii/S0164121214001563. Strizhov:2016:SPS Soderstrom:2013:DDY [SOR16] Mikhail Strizhov, Zachary Osman, and Indrajit Ray. [S¨od13] Sylvia S¨oderstr¨om. Digi- Substring position search tal differentiation in young over encrypted cloud data people’s Internet use — supporting efficient multi- eliminating or reproduc- user setup. Future Inter- ing disability stereotypes. net, 8(3):28, July 04, 2016. Future Internet, 5(2):190– CODEN ???? ISSN 1999- 204, May 07, 2013. CO- 5903. URL https://www. DEN ???? ISSN 1999- mdpi.com/1999-5903/8/ 5903. URL https://www. 3/28. mdpi.com/1999-5903/5/ Suresh:2015:AGU 2/190. Suriadi:2012:PCV [SOS15] Chandra K. H. Suresh, Sule Ozev, and Ozgur [SOF12] Suriadi Suriadi, Chun Sinanoglu. Adaptive gen- Ouyang, and Ernest Foo. eration of unique IDs for Privacy compliance veri- digital chips through ana- fication in cryptographic log excitation. ACM protocols. Lecture Notes Transactions on Design in Computer Science, 7400: Automation of Electronic 251–276, 2012. CO- Systems, 20(3):46:1–46:??, DEN LNCSD9. ISSN June 2015. CODEN 0302-9743 (print), 1611- ATASFO. ISSN 1084-4309 3349 (electronic). URL (print), 1557-7309 (elec- http://link.springer. tronic). com/chapter/10.1007/978- Serwadda:2013:ELK 3-642-35179-2_11/. Schaumont:2015:IEP [SP13] Abdul Serwadda and Vir V. Phoha. Examining a [SOG15] Patrick Schaumont, Maire large keystroke biomet- O’Neill, and Tim G¨uneysu. rics dataset for statistical- REFERENCES 543

attack openings. ACM Communications of the Transactions on Informa- Association for Comput- tion and System Security, ing Machinery, 59(3):5, 16(2):8:1–8:??, September March 2016. CODEN 2013. CODEN ATISBQ. CACMA2. ISSN 0001-0782 ISSN 1094-9224 (print), (print), 1557-7317 (elec- 1557-7406 (electronic). tronic). URL http:// cacm.acm.org/magazines/ Shiaeles:2015:FII 2016/3/198867/fulltext. [SP15a] Stavros N. Shiaeles and Maria Papadaki. FHSD: Salvail:2010:STR an improved IP spoof de- tection method for Web [SPD+10] Louis Salvail, Momtchil DDoS attacks. The Com- Peev, Eleni Diamanti, Ro- puter Journal, 58(4):892– main All´eaume, Norbert 903, April 2015. CODEN L¨utkenhaus, and Thomas CMPJA6. ISSN 0010-4620 L¨anger. Security of trusted (print), 1460-2067 (elec- repeater quantum key dis- tronic). URL http:// tribution networks. Jour- comjnl.oxfordjournals. nal of Computer Security, org/content/58/4/892. 18(1):61–87, ???? 2010. CODEN JCSIET. ISSN Shim:2015:SDA 0926-227X (print), 1875- [SP15b] Kyung-Ah Shim and Cheol- 8924 (electronic). Min Park. A secure data aggregation scheme Sherman:2019:PBL based on appropriate cryp- tographic primitives in het- [SPG+19] A. T. Sherman, P. A. H. erogeneous wireless sen- Peterson, E. Golaszewski, sor networks. IEEE E. LaFemina, E. Gold- Transactions on Paral- schen, M. Khan, L. Mundy, lel and Distributed Sys- M. Rather, B. Solis, tems, 26(8):2128–2139, Au- W. Tete, E. Valdez, B. We- gust 2015. CODEN ITD- ber, D. Doyle, C. O’Brien, SEO. ISSN 1045-9219 L. Oliva, J. Roundy, (print), 1558-2183 (elec- and J. Suess. Project- tronic). URL http:// based learning inspires cy- www.computer.org/csdl/ bersecurity students: A trans/td/2015/08/06875932- scholarship-for-service re- abs.html. search study. IEEE Secu- rity & Privacy, 17(3):82– Spafford:2016:SE 88, May/June 2019. ISSN [Spa16] Eugene H. Spafford. The 1540-7993 (print), 1558- strength of encryption. 4046 (electronic). REFERENCES 544

Skracic:2017:AAU Investigating users’ per- spectives of Web single [SPK17] Kristian Skraci´c, Predrag sign-on: Conceptual gaps Pale, and Zvonko Kostan- and acceptance model. jcar. Authentication ap- ACM Transactions on In- proach using one-time chal- ternet Technology (TOIT), lenge generation based 13(1):2:1–2:??, November on user behavior patterns 2013. CODEN ???? ISSN captured in transactional 1533-5399 (print), 1557- data sets. Computers 6051 (electronic). & Security, 67(??):107– 121, June 2017. CODEN Serwadda:2016:TRR CPSEDU. ISSN 0167-4048 [SPW+16] Abdul Serwadda, Vir V. (print), 1872-6208 (elec- Phoha, Zibo Wang, Ra- tronic). URL https:// jesh Kumar, and Diksha www.sciencedirect.com/ Shukla. Toward robotic science/article/pii/S016740481730055X. robbery on the touch Safkhani:2014:CCA screen. ACM Transactions on Information and Sys- [SPLHCB14] Masoumeh Safkhani, Pe- tem Security, 18(4):14:1– dro Peris-Lopez, Julio Ce- 14:??, May 2016. CODEN sar Hernandez-Castro, and ATISBQ. ISSN 1094-9224 Nasour Bagheri. Crypt- (print), 1557-7406 (elec- analysis of the Cho et tronic). al. protocol: a hash- Shaikh:2010:CTO based RFID tag mutual authentication protocol. [SR10] Siraj A. Shaikh and Journal of Computational Joseph R. Rabaiotti. Char- and Applied Mathematics, acteristic trade-offs in de- 259 (part B)(??):571–577, signing large-scale biometric- March 15, 2014. CODEN based identity management JCAMDI. ISSN 0377-0427 systems. Journal of Net- (print), 1879-1778 (elec- work and Computer Ap- tronic). URL http:// plications, 33(3):342–351, www.sciencedirect.com/ May 2010. CODEN JN- science/article/pii/S0377042713005281. CAF3. ISSN 1084-8045 See [CJP12]. (print), 1095-8592 (elec- tronic). URL http:// Sun:2013:IUP www.sciencedirect.com/ [SPM+13] San-Tsai Sun, Eric Pospisil, science/article/pii/S1084804510000032. Ildar Muslukhov, Nuray Schilling:2012:ATU Dindar, Kirstie Hawkey, and Konstantin Beznosov. [SR12a] Thorsten Ernst Schilling REFERENCES 545

and H˚avard Raddum. Singh:2017:SCB Analysis of Trivium us- ing compressed right hand [SRAA17] Priyanka Singh, Balasub- side equations. Lecture ramanian Raman, Nishant Notes in Computer Sci- Agarwal, and Pradeep K. ence, 7259:18–32, 2012. Atrey. Secure cloud-based CODEN LNCSD9. ISSN image tampering detection 0302-9743 (print), 1611- and localization using POB 3349 (electronic). URL number system. ACM http://link.springer. Transactions on Multime- com/chapter/10.1007/978- dia Computing, Communi- 3-642-31912-9_2/. cations, and Applications, 13(3):23:1–23:??, August Sur:2012:SSU 2017. CODEN ???? ISSN 1551-6857 (print), 1551- [SR12b] Arijit Sur and Vignesh 6865 (electronic). Ramanathan. Secure steganography using ran- Stefan:2012:ACT domized cropping. Lec- [SRB+12] Deian Stefan, Alejandro ture Notes in Computer Russo, Pablo Buiras, Amit Science, 7110:82–95, 2012. Levy, John C. Mitchell, CODEN LNCSD9. ISSN and David Mazi´eres. Ad- 0302-9743 (print), 1611- dressing covert termina- 3349 (electronic). URL tion and timing channels http://link.springer. in concurrent information com/chapter/10.1007/978- flow systems. ACM SIG- 3-642-28693-3_6/. PLAN Notices, 47(9):201– 214, September 2012. CO- Stanton:2014:BRB DEN SINODQ. ISSN 0362- 1340 (print), 1523-2867 [SR14] Jeffrey M. Stanton and (print), 1558-1160 (elec- Ben Rothke. Book re- tronic). views: Burdens of Proof: Cryptographic Culture and Sutar:2017:DPI Evidence Law in the Age of Electronic Docu- [SRK+17] Soubhagya Sutar, Arnab ments — by Jean-Fran¸cois Raha, Devadatta Kulka- Blanchette. Journal of the rni, Rajeev Shorey, Jef- Association for Informa- frey Tew, and Vijay Raghu- tion Science and Technol- nathan. D-PUF: An in- ogy, 65(7):1509–1510, July trinsically reconfigurable 2014. CODEN ???? ISSN DRAM PUF for device au- 2330-1643 (print), 2330- thentication and random 1643 (electronic). number generation. ACM REFERENCES 546

Transactions on Embed- hybrid discrete-continuous ded Computing Systems,17 architectures. IEEE Com- (1):1–31, December 2017. puter Architecture Letters, ISSN 1539-9087 (print), 11(1):1–4, January/June 1558-3465 (electronic). 2012. CODEN ???? ISSN 1556-6056 (print), 1556- Sutar:2018:DPI 6064 (electronic). [SRK+18] Soubhagya Sutar, Arnab Saklikar:2010:IFV Raha, Devadatta Kulka- rni, Rajeev Shorey, Jef- [SS10a] Samir Saklikar and Subir frey Tew, and Vijay Raghu- Saha. Identity federation nathan. D-PUF: an in- for VoIP systems. Jour- trinsically reconfigurable nal of Computer Security, DRAM PUF for device au- 18(4):499–540, ???? 2010. thentication and random CODEN JCSIET. ISSN number generation. ACM 0926-227X (print), 1875- Transactions on Embed- 8924 (electronic). ded Computing Systems, 17(1):17:1–17:??, January Saxena:2010:SGC 2018. CODEN ???? ISSN 1539-9087 (print), 1558- [SS10b] N. Saxena and C. Se- 3465 (electronic). shadhri. From Sylvester– Gallai configurations to Sluganovic:2018:ARE rank bounds: Improved [SRRM18] Ivo Sluganovic, Marc black-box identity test Roeschlin, Kasper B. Ras- for depth-3 circuits. In mussen, and Ivan Mar- IEEE [IEE10], pages 21– tinovic. Analysis of re- 29. ISBN 1-4244-8525-8. flexive eye movements LCCN ???? URL http: for fast replay-resistant //ieeexplore.ieee.org/ biometric authentication. servlet/opac?punumber= ACM Transactions on Pri- 5669376. IEEE Com- vacy and Security (TOPS), puter Society Order Num- 22(1):4:1–4:??, January ber P4244. 2018. ISSN 2471-2566 Sopka:2010:BTS (print), 2471-2574 (elec- tronic). URL https://dl. [SS10c] Katherine R. Sopka and acm.org/citation.cfm? Elisabeth M. Sopka. The id=3281745. Bonebrake Theological Sem- inary: Top-secret Manhat- Sethumadhavan:2012:CHD tan Project site. Physics in [SRT12] Simha Sethumadhavan, Perspective (PIP), 12(3): Ryan Roberts, and Yan- 338–349, September 2010. nis Tsividis. A case for CODEN PHPEF2. ISSN REFERENCES 547

1422-6944 (print), 1422- (print), 1496-4287 (elec- 6960 (electronic). URL tronic). http://link.springer. com/article/10.1007/s00016- Sendrier:2013:HCE 010-0019-4. [SS13] Nicolas Sendrier and Dim- Szaban:2011:IQB itris E. Simos. The hard- [SS11] Miroslaw Szaban and Fran- ness of code equivalence ciszek Seredynski. Improv- over Fq and its applica- ing quality of DES S-boxes tion to code-based cryp- by cellular automata-based tography. Lecture Notes S-boxes. The Journal in Computer Science, 7932: of Supercomputing, 57(2): 203–216, 2013. CO- 216–226, August 2011. CO- DEN LNCSD9. ISSN DEN JOSUED. ISSN 0920- 0302-9743 (print), 1611- 8542 (print), 1573-0484 3349 (electronic). URL (electronic). URL http:/ http://link.springer. /www.springerlink.com/ com/chapter/10.1007/978- . openurl.asp?genre=article& 3-642-38616-9_14/ issn=0920-8542&volume= Singh:2015:EST 57&issue=2&spage=216. [SS15] Dilraj Singh and Amardeep Saxena:2012:BIT Singh. Enhanced secure [SS12a] Nitin Saxena and C. Se- trusted AODV (ESTA) shadhri. Blackbox identity protocol to mitigate black- testing for bounded top- hole attack in mobile ad fanin depth-3 circuits: The hoc networks. Future Inter- field doesn’t matter. SIAM net, 7(3):342–362, Septem- Journal on Computing,41 ber 23, 2015. CODEN (5):1285–1298, ???? 2012. ???? ISSN 1999-5903. CODEN SMJCAT. ISSN URL https://www.mdpi. 0097-5397 (print), 1095- com/1999-5903/7/3/342. 7111 (electronic). Sadhya:2017:PRE Shparlinski:2012:CSD [SS17a] Debanjan Sadhya and San- [SS12b] Igor E. Shparlinski and jay Kumar Singh. Privacy Katherine E. Stange. Char- risks ensuing from cross- acter sums with division matching among databases: polynomials. Bulletin a case study for soft bio- canadien de math´ematiques metrics. Information Pro- = Canadian Mathematical cessing Letters, 128(??):38– Bulletin, 55(4):850–??, De- 45, December 2017. CO- cember 2012. CODEN CM- DEN IFPLAT. ISSN 0020- BUA3. ISSN 0008-4395 0190 (print), 1872-6119 REFERENCES 548

(electronic). URL http:// and Bernd Freisleben. Se- www.sciencedirect.com/ cure mobile communica- science/article/pii/S0020019017301436. tion via identity-based cryptography and server- Shivani:2017:RIE aided computations. The [SS17b] J. L. Divya Shivani and Journal of Supercomput- Ranjan K. Senapati. Ro- ing, 55(2):284–306, Febru- bust image embedded wa- ary 2011. CODEN JO- termarking using DCT SUED. ISSN 0920-8542 and listless SPIHT. Fu- (print), 1573-0484 (elec- ture Internet, 9(3):33, July tronic). URL http:/ 12, 2017. CODEN ???? /www.springerlink.com/ ISSN 1999-5903. URL openurl.asp?genre=article& https://www.mdpi.com/ issn=0920-8542&volume= 1999-5903/9/3/33. 55&issue=2&spage=284. Siegel:2019:UOC Sakai:2016:NCS [SS19] J. E. Siegel and S. Sarma. Using open channels to [SSKL16] K. Sakai, M. Sun, W. Ku, trigger the invited, unin- and T. H. Lai. A novel cod- tended consequences of the ing scheme for secure com- Internet of Things. IEEE munications in distributed Security & Privacy,17 RFID systems. IEEE (3):49–55, May/June 2019. Transactions on Comput- ISSN 1540-7993 (print), ers, 65(2):409–421, Febru- 1558-4046 (electronic). ary 2016. CODEN IT- COB4. ISSN 0018-9340 Singh:2013:QBF (print), 1557-9956 (elec- [SSA13] Durgesh Singh, Shivendra tronic). Shivani, and Suneeta Agar- wal. Quantization-based Shahandashti:2015:RUP fragile watermarking us- ing block-wise authentica- [SSNS15] Siamak F. Shahandashti, tion and pixel-wise recov- Reihaneh Safavi-Naini, ery scheme for tampered and Nashad Ahmed Safa. image. International Jour- Reconciling user privacy nal of Image and Graphics and implicit authentica- (IJIG), 13(2), April 2013. tion for mobile devices. CODEN ???? ISSN 0219- Computers & Security, 4678. 53(??):215–233, Septem- ber 2015. CODEN Smith:2011:SMC CPSEDU. ISSN 0167-4048 [SSAF11] Matthew Smith, Chris- (print), 1872-6208 (elec- tian Schridde, Bj¨orn Agel, tronic). URL https:// REFERENCES 549

www.sciencedirect.com/ plants. ACM Transactions science/article/pii/S0167404815000838. on Architecture and Code Optimization, 10(4):57:1– Sundararajan:2019:SMC 57:??, December 2013. CO- [SSP19] Aditya Sundararajan, Arif I. DEN ???? ISSN 1544-3566 Sarwat, and Alexander (print), 1544-3973 (elec- Pons. A survey on modal- tronic). ity characteristics, perfor- mance evaluation metrics, Sood:2011:SDI and security for traditional and wearable biometric [SSS11] Sandeep K. Sood, Anil K. systems. ACM Comput- Sarje, and Kuldip Singh. ing Surveys, 52(2):39:1– A secure dynamic identity 39:??, May 2019. CODEN based authentication pro- CMSVAN. ISSN 0360-0300 tocol for multi-server archi- (print), 1557-7341 (elec- tecture. Journal of Net- tronic). URL https:// work and Computer Ap- dl.acm.org/ft_gateway. plications, 34(2):609–618, cfm?id=3309550. March 2011. CODEN JN- Shrivastava:2012:UIE CAF3. ISSN 1084-8045 (print), 1095-8592 (elec- [SSPC12] Swapnil Shrivastava, Zia tronic). URL http:// Saquib, Gopinath P., www.sciencedirect.com/ and Peeyush Chomal. science/article/pii/S1084804510002092. Unique identity enabled service delivery through NSDG. Lecture Notes in Saadeh:2018:HAP Computer Science, 7452: 103–111, 2012. CO- [SSSA18] Maha Saadeh, Azzam Sleit, DEN LNCSD9. ISSN Khair Eddin Sabri, and 0302-9743 (print), 1611- Wesam Almobaideen. Hi- 3349 (electronic). URL erarchical architecture and http://link.springer. protocol for mobile object com/chapter/10.1007/978- authentication in the con- 3-642-32701-8_10/. text of IoT smart cities. Strydis:2013:SAP Journal of Network and Computer Applications, [SSPL+13] Christos Strydis, Robert M. 121(??):1–19, November Seepers, Pedro Peris- 1, 2018. CODEN JN- Lopez, Dimitrios Siskos, CAF3. ISSN 1084-8045 and Ioannis Sourdis. A (print), 1095-8592 (elec- system architecture, pro- tronic). URL http:// cessor, and communica- www.sciencedirect.com/ tion protocol for secure im- science/article/pii/S1084804518302339. REFERENCES 550

Spiez:2012:RCT Schillewaert:2014:CCA

[SSU12] Stanislaw Spie˙z, Marian [ST14] Jeroen Schillewaert and Srebrny, and Jerzy Ur- Koen Thas. Construction banowicz. Remarks on and comparison of authen- the classical threshold tication codes. SIAM Jour- secret sharing schemes. nal on Discrete Mathemat- Fundamenta Informaticae, ics, 28(1):474–489, ???? 114(3–4):345–357, August 2014. CODEN SJDMEC. 2012. CODEN FUMAAJ. ISSN 0895-4801 (print), ISSN 0169-2968 (print), 1095-7146 (electronic). 1875-8681 (electronic). Shrestha:2015:CIS Sahai:2012:DCC [ST15] Ajaya Shrestha and Arun Timalsina. Color image [SSW12] Amit Sahai, Hakan Seyali- steganography technique oglu, and Brent Waters. using Daubechies discrete Dynamic credentials and wavelet transform. In 2015 ciphertext delegation for 9th International Confer- attribute-based encryp- ence on Software, Knowl- tion. Lecture Notes in edge, Information Man- Computer Science, 7417: agement and Applications 199–217, 2012. CO- (SKIMA). IEEE Computer DEN LNCSD9. ISSN Society Press, 1109 Spring 0302-9743 (print), 1611- Street, Suite 300, Silver 3349 (electronic). URL Spring, MD 20910, USA, http://link.springer. December 2015. com/chapter/10.1007/978- 3-642-32009-5_13/. Shen:2016:RMM Schaffer:2012:EII [ST16] Wuqiang Shen and Shao- hua Tang. RGB, a [SSY12] J. S. Schaffer, M. L. Stokes, mixed multivariate signa- and N. Yan. Enabling ture scheme. The Com- an integrated identity from puter Journal, 59(4):439– disparate sources. IBM 451, April 2016. CODEN Journal of Research and CMPJA6. ISSN 0010-4620 Development, 56(6):6:1– (print), 1460-2067 (elec- 6:10, ???? 2012. CO- tronic). URL http:// DEN IBMJAE. ISSN 0018- comjnl.oxfordjournals. 8646 (print), 2151-8556 org/content/59/4/439. (electronic). URL http: Sethumadhavan:2019:SA //ieeexplore.ieee.org/ stamp/stamp.jsp?tp=&arnumber=[ST19] S. Sethumadhavan and 6355654. M. Tiwari. Secure archi- REFERENCES 551

tectures. IEEE Micro,39 tiple ciphertexts. Lec- (4):6–7, July/August 2019. ture Notes in Computer CODEN IEMIDZ. ISSN Science, 6888:62–72, 2012. 0272-1732 (print), 1937- CODEN LNCSD9. ISSN 4143 (electronic). 0302-9743 (print), 1611- 3349 (electronic). URL Stallings:2011:C http://link.springer. [Sta11a] William Stallings. Ci- com/chapter/10.1007/978- phers. WIREs Computa- 3-642-27901-0_6/. tional Statistics, 3(5):239– Staff:2013:ITD 250, May/June 2011. CO- DEN ???? ISSN 1939-0068 [Sta13] S. Staff. Inside TAO: (print), 1939-5108 (elec- Documents reveal top tronic). NSA hacking unit. Der Spiegel, ??(??):??, De- Stallings:2011:CNS cember 29, 2013. URL http://www.spiegel.de/ [Sta11b] William Stallings. Cryp- international/world/the- tography and network secu- nsa-uses-powerful-toolbox- rity: principles and prac- in-effort-to-spy-on-global- tice. Prentice-Hall, Inc., networks-a-940969-3.html. Upper Saddle River, NJ 07458, USA, fifth edition, Stewart:2011:CCI 2011. ISBN 0-13-609704- [STC11] James Michael Stewart, 9. xxiii + 719 pp. LCCN Ed Tittel, and Mike Chap- TK5105.59 .S713 2011. ple. CISSP: Certified Stanoyevitch:2011:ICM Information Systems Se- curity Professional Study [Sta11c] Alexander Stanoyevitch. Guide. John Wiley and Introduction to cryptog- Sons, Inc., New York, raphy with mathematical NY, USA, fifth edition, foundations and computer 2011. ISBN 0-470-94498- implementations. Discrete 6. ???? pp. LCCN QA76.3 mathematics and its ap- .T5735 2011. URL http: plications. Chapman and //catalogimages.wiley. Hall/CRC, Boca Raton, com/images/db/jimages/ FL, USA, 2011. ISBN 9780470944981.jpg. 1-4398-1763-4 (hardcover). xix + 649 pp. LCCN Steel:2015:APF QA268 .S693 2011. [Ste15a] Graham Steel. Automated Stanek:2012:TEM proof and flaw-finding tools in cryptography. IEEE Se- [Sta12] Martin Stanek. Thresh- curity & Privacy, 13(2):81– old encryption into mul- 83, March/April 2015. CO- REFERENCES 552

DEN ???? ISSN 1540-7993 news/code-breakers-secret- (print), 1558-4046 (elec- service/. tronic). URL http:// Stiles:2019:HSB www.computer.org/csdl/ mags/sp/2015/02/msp2015020081-[Sti19] D. Stiles. The hard- abs.html. ware security behind Azure Sphere. IEEE Micro, Stenn:2015:SNT 39(2):20–28, March/April [Ste15b] Harlan Stenn. Securing 2019. CODEN IEMIDZ. Network Time Protocol. ISSN 0272-1732 (print), Communications of the As- 1937-4143 (electronic). sociation for Computing Stolte:2012:EDA Machinery, 58(2):48–51, February 2015. CODEN [Sto12] Daniel Stolte. Experts de- CACMA2. ISSN 0001-0782 termine age of book ’no- (print), 1557-7317 (elec- body can read’. UANews, tronic). URL http:// February 11, 2012. URL cacm.acm.org/magazines/ http://uanews.org/node/ 2015/2/182654/fulltext. 37825; http://www.rdmag. com/News/2011/02/Materials- Stipcevic:2011:QRN Testing-Experts-determine- age-of-book-nobody-can- [Sti11] M. Stipcevic. Quan- read/. tum random number gen- erators and their use in Suciu:2012:SED cryptography. In 2011 [Suc12] Dan Suciu. SQL on an en- Proceedings of the 34th crypted database: techni- International Convention cal perspective. Communi- MIPRO, pages 1474–1479. cations of the Association IEEE Computer Society for Computing Machinery, Press, 1109 Spring Street, 55(9):102, September 2012. Suite 300, Silver Spring, CODEN CACMA2. ISSN MD 20910, USA, 2011. 0001-0782 (print), 1557- URL http://ieeexplore. 7317 (electronic). ieee.org/stamp/stamp. jsp?tp=&arnumber=5967293. Sung:2011:DCE

Stickney:2015:CBS [Sun11] Jaechul Sung. Differen- tial cryptanalysis of eight- [Sti15] Zephorene Stickney. Code round SEED. Informa- breakers: The secret ser- tion Processing Letters, vice. Wheaton Quar- 111(10):474–478, April 30, terly, ??(??):??, Sum- 2011. CODEN IFPLAT. mer 2015. URL https: ISSN 0020-0190 (print), //wheatoncollege.edu/ 1872-6119 (electronic). REFERENCES 553

Sun:2016:NEB Shmueli:2014:IDE

[Sun16] Shuliang Sun. A novel [SVGE14] Erez Shmueli, Ronen edge based image steganog- Vaisenberg, Ehud Gudes, raphy with 2k correction and Yuval Elovici. Im- and Huffman encoding. In- plementing a database formation Processing Let- encryption solution, de- ters, 116(2):93–99, Febru- sign and implementa- ary 2016. CODEN IF- tion issues. Comput- PLAT. ISSN 0020-0190 ers & Security, 44(??):33– (print), 1872-6119 (elec- 50, July 2014. CODEN tronic). URL http:// CPSEDU. ISSN 0167-4048 www.sciencedirect.com/ (print), 1872-6208 (elec- science/article/pii/S0020019015001738. tronic). URL https:// www.sciencedirect.com/ Shen:2015:CSC science/article/pii/S0167404814000509.

[SVCV15] Emily Shen, Mayank Varia, Svozil:2014:NCC Robert K. Cunningham, and W. Konrad Vesey. [Svo14] Karl Svozil. Non-contextual Cryptographically secure chocolate balls versus value computation. Computer, indefinite quantum cryp- 48(4):78–81, April 2015. tography. Theoretical CODEN CPTRB4. ISSN Computer Science, 560 0018-9162 (print), 1558- (part 1)(??):82–90, Decem- 0814 (electronic). URL ber 4, 2014. CODEN TC- http://csdl.computer. SCDI. ISSN 0304-3975 org/csdl/mags/co/2015/ (print), 1879-2294 (elec- 04/mco2015040078-abs. tronic). URL http:// html. www.sciencedirect.com/ science/article/pii/S0304397514006975. Song:2016:IAR Svaba:2010:PKC [SVG16] Yang Song, Arun Venkatara- mani, and Lixin Gao. [SvT10] Pavol Svaba and Tran Identifying and address- van Trung. Public key ing reachability and pol- cryptosystem MST 1tn3: icy attacks in “Secure” cryptanalysis and realiza- BGP. IEEE/ACM Trans- tion. Technical report actions on Networking, 2010,2, Institut f¨ur Experi- 24(5):2969–2982, October mentelle Mathematik, Uni- 2016. CODEN IEANEP. versit¨at Duisburg-Essen, ISSN 1063-6692 (print), Duisburg, Germany, 2010. 1558-2566 (electronic). 37 pp. REFERENCES 554

ShanmugaPriya:2019:PAS stamp/stamp.jsp?tp=&arnumber= 5477413. [SVY19] S. ShanmugaPriya, A. Valar- Song:2016:IBS mathi, and D. Yuvaraj. The personal authentica- [SWW+16] Lingwei Song, Jinxia Wei, tion service and security Licheng Wang, Chen- enhancement for optimal lei Cao, and Xinxin strong password. Con- Niu. Identity-based storage currency and Computa- management and integrity tion: Practice and Ex- verify protocol for secure perience, 31(14):e5009:1– outsourcing in multi-cloud. e5009:??, July 25, 2019. Concurrency and Compu- CODEN CCPEBO. ISSN tation: Practice and Ex- 1532-0626 (print), 1532- perience, 28(6):1930–1945, 0634 (electronic). April 25, 2016. CODEN CCPEBO. ISSN 1532-0626 Shi:2019:LWW (print), 1532-0634 (elec- [SWF+19] Y. Shi, W. Wei, H. Fan, tronic). M. H. Au, and X. Luo. Song:2017:PPF A light-weight white-box encryption scheme for se- [SWW+17] Wei Song, Bing Wang, curing distributed embed- Qian Wang, Zhiyong Peng, ded devices. IEEE Trans- Wenjing Lou, and Yihui actions on Computers,68 Cui. A privacy-preserved (10):1411–1427, October full-text retrieval algo- 2019. CODEN ITCOB4. rithm over encrypted data ISSN 0018-9340 (print), for cloud storage applica- 1557-9956 (electronic). tions. Journal of Paral- lel and Distributed Com- Shoufan:2010:NCA puting, 99(??):14–27, Jan- [SWM+10] A. Shoufan, T. Wink, H. G. uary 2017. CODEN JPD- Molter, S. A. Huss, and CER. ISSN 0743-7315 E. Kohnert. A novel cryp- (print), 1096-0848 (elec- toprocessor architecture tronic). URL http:// for the McEliece public- www.sciencedirect.com/ key cryptosystem. IEEE science/article/pii/S0743731516300533. Transactions on Com- Sheldon:2012:IWN puters, 59(11):1533–1546, November 2010. CODEN [SWYP12] Frederick T. Sheldon, ITCOB4. ISSN 0018- John Mark Weber, Seong- 9340 (print), 1557-9956 Moo Yoo, and W. David (electronic). URL http: Pan. The insecurity of //ieeexplore.ieee.org/ wireless networks. IEEE REFERENCES 555

Security & Privacy, 10(4): programming. Compu- 54–61, July/August 2012. ter Graphics Forum,33 ISSN 1540-7993 (print), (7):121–130, October 2014. 1558-4046 (electronic). CODEN CGFODY. ISSN 0167-7055 (print), 1467- Sha:2019:CED 8659 (electronic). [SXH+19] Le-Tian Sha, Fu Xiao, Hai- Savas:2015:GMA Ping Huang, Yu Chen, and Ru-Chuan Wang. Catch- [SY15a] Erkay Sava¸s and Cemal ing escapers: a detection Yılmaz. A generic method method for advanced per- for the analysis of a class of sistent escapers in industry cache attacks: a case study Internet of Things based on for AES. The Computer identity-based broadcast Journal, 58(10):2716–2737, encryption (IBBE). ACM October 2015. CODEN Transactions on Embedded CMPJA6. ISSN 0010-4620 Computing Systems, 18(3): (print), 1460-2067 (elec- 29:1–29:??, June 2019. CO- tronic). URL http:// DEN ???? ISSN 1539-9087 comjnl.oxfordjournals. (print), 1558-3465 (elec- org/content/58/10/2716. tronic). URL https:// dl.acm.org/ft_gateway. Shao:2015:SAS cfm?id=3319615. [SY15b] Zhi-Yi Shao and Bo Yang. Su:2016:PSN On security against the [SXL16] Shenghui Su, Tao Xie, and server in designated tester Shuwang L¨u. A provably public key encryption with secure non-iterative hash keyword search. Infor- function resisting birth- mation Processing Letters, day attack. Theoreti- 115(12):957–961, Decem- cal Computer Science, 654 ber 2015. CODEN IF- (??):128–142, November PLAT. ISSN 0020-0190 22, 2016. CODEN TC- (print), 1872-6119 (elec- SCDI. ISSN 0304-3975 tronic). URL http:// (print), 1879-2294 (elec- www.sciencedirect.com/ tronic). URL http:// science/article/pii/S0020019015001283. www.sciencedirect.com/ Song:2017:SSI science/article/pii/S0304397516001547. [SYC+17] Jun Song, Fan Yang, Kim- Sahillioglu:2014:SCM Kwang Raymond Choo, [SY14] Y. Sahillio˘glu and Y. Yemez. Zhijian Zhuang, and Lizhe Shapes and cryptogra- Wang. SIPF: a secure in- phy: Multiple shape cor- stallment payment frame- respondence by dynamic work for drive-thru Inter- REFERENCES 556

net. ACM Transactions 76(??):146–158, Novem- on Embedded Computing ber 2017. CODEN FG- Systems, 16(2):52:1–52:??, SEVI. ISSN 0167-739X April 2017. CODEN ???? (print), 1872-7115 (elec- ISSN 1539-9087 (print), tronic). URL http:// 1558-3465 (electronic). www.sciencedirect.com/ science/article/pii/S0167739X16301960. Seo:2013:PIC Shuai:2019:AAS [SYL13] Jae Woo Seo, Dae Hyun Yum, and Pil Joong [SYWX19] Mengxia Shuai, Nenghai Lee. Proxy-invisible CCA- Yu, Hongxia Wang, and secure type-based proxy Ling Xiong. Anonymous re-encryption without ran- authentication scheme for dom oracles. Theoret- smart home environment ical Computer Science, with provable security. 491(??):83–93, June 17, Computers & Security, 2013. CODEN TC- 86(??):132–146, Septem- SCDI. ISSN 0304-3975 ber 2019. CODEN (print), 1879-2294 (elec- CPSEDU. ISSN 0167-4048 tronic). URL http:// (print), 1872-6208 (elec- www.sciencedirect.com/ tronic). URL https:// science/article/pii/S0304397512010560. www.sciencedirect.com/ science/article/pii/S0167404818313701. SoltaniPanah:2019:CDG Shen:2017:RDP [SYv+19] A. Soltani Panah, A. Yavari, R. van Schyndel, D. Geor- [SYY+17] Wenting Shen, Guangyang gakopoulos, and X. Yi. Yang, Jia Yu, Hanlin Context-driven granular Zhang, Fanyu Kong, and disclosure control for In- Rong Hao. Remote data ternet of Things applica- possession checking with tions. IEEE Transactions privacy-preserving authen- on Big Data, 5(3):408–422, ticators for cloud storage. September 2019. ISSN Future Generation Com- 2332-7790. puter Systems, 76(??):136– 145, November 2017. CO- Song:2017:SAM DEN FGSEVI. ISSN 0167- [SYW17] Jun Song, Fan Yang, and 739X (print), 1872-7115 Lizhe Wang. Secure au- (electronic). URL http:// thentication in motion: www.sciencedirect.com/ a novel online payment science/article/pii/S0167739X16304939. framework for drive-thru Sui:2014:DAH Internet. Future Gener- ation Computer Systems, [SZDL14] Yan Sui, Xukai Zou, REFERENCES 557

Eliza Y. Du, and Feng www.sciencedirect.com/ Li. Design and analysis science/article/pii/S0743731512002547. of a highly user-friendly, secure, privacy-preserving, Sun:2017:CPP and revocable authentica- [SZQ+17] Jiameng Sun, Binrui Zhu, tion method. IEEE Trans- Jing Qin, Jiankun Hu, and actions on Computers,63 Qianhong Wu. Confidentiality- (4):902–916, April 2014. preserving publicly verifi- CODEN ITCOB4. ISSN able computation. Inter- 0018-9340. national Journal of Foun- Shah:2019:PCB dations of Computer Sci- ence (IJFCS), 28(6):799– [SZHY19] Mohsin Shah, Weiming ??, September 2017. CO- Zhang, Honggang Hu, and DEN IFCSEN. ISSN 0129- Nenghai Yu. Paillier 0541. cryptosystem based mean value computation for en- Shen:2014:ERC crypted domain image pro- cessing operations. ACM [SZS14] Limin Shen, Futai Zhang, Transactions on Multi- and Yinxia Sun. Efficient media Computing, Com- revocable certificateless en- munications, and Appli- cryption secure in the stan- cations, 15(3):76:1–76:??, dard model. The Com- September 2019. CODEN puter Journal, 57(4):592– ???? ISSN 1551-6857 601, April 2014. CODEN (print), 1551-6865 (elec- CMPJA6. ISSN 0010-4620 (print), 1460-2067 (elec- tronic). URL https:// tronic). URL dl.acm.org/ft_gateway. http:// cfm?id=3325194. comjnl.oxfordjournals. org/content/57/4/592. Shi:2013:REA full.pdf+html. [SZMK13] Qi Shi, Ning Zhang, Mad- Sun:2018:RPP jid Merabti, and Kashif Ki- fayat. Resource-efficient [SZZT18] Weiwei Sun, Jiantao Zhou, authentic key establish- Shuyuan Zhu, and Yuan Yan ment in heterogeneous Tang. Robust privacy- wireless sensor networks. preserving image sharing Journal of Parallel and over online social networks Distributed Computing, (OSNs). ACM Transac- 73(2):235–249, February tions on Multimedia Com- 2013. CODEN JPD- puting, Communications, CER. ISSN 0743-7315 and Applications, 14(1): (print), 1096-0848 (elec- 14:1–14:??, January 2018. tronic). URL http:// CODEN ???? ISSN 1551- REFERENCES 558

6857 (print), 1551-6865 Tan:2012:SLM (electronic). [Tan12a] Shunquan Tan. Steganaly- Tsang:2010:BRR sis of LSB matching revis- ited for consecutive pixels [TAKS10] Patrick P. Tsang, Man Ho using B-spline functions. Au, Apu Kapadia, and Lecture Notes in Computer Sean W. Smith. BLAC: Science, 7128:16–29, 2012. Revoking repeatedly mis- CODEN LNCSD9. ISSN behaving anonymous users 0302-9743 (print), 1611- without relying on TTPs. 3349 (electronic). URL ACM Transactions on In- http://link.springer. formation and System Se- com/chapter/10.1007/978- curity, 13(4):39:1–39:??, 3-642-32205-1_4/. December 2010. CODEN ATISBQ. ISSN 1094-9224 Tan:2012:LCP (print), 1557-7406 (elec- tronic). [Tan12b] Zuowen Tan. A lightweight conditional privacy-preserving Tamayo:2015:AFH authentication and access control scheme for perva- [Tam15] Matthew Tamayo. Al- sive computing environ- gebraic full homomorphic ments. Journal of Net- encryption and resisting work and Computer Appli- Gr¨obner basis cryptanaly- cations, 35(6):1839–1846, sis. ACM Communications November 2012. CODEN in Computer Algebra,49 JNCAF3. ISSN 1084-8045 (2):63, June 2015. CO- (print), 1095-8592 (elec- DEN ???? ISSN 1932-2232 tronic). URL http:// (print), 1932-2240 (elec- www.sciencedirect.com/ tronic). science/article/pii/S1084804512001609.

Tan:2011:CTA Tang:2015:ETE

[Tan11] Zuowen Tan. Comments on [Tan15a] Qiang Tang. From a threshold authenticated ephemerizer to timed- encryption scheme. Inter- ephemerizer: Achieve as- national Journal of Com- sured lifecycle enforce- puter Applications, 33(2): ment for sensitive data. 132–136, 2011. ISSN 1206- The Computer Journal, 212X (print), 1925-7074 58(4):1003–1020, April (electronic). URL https: 2015. CODEN CM- //www.tandfonline.com/ PJA6. ISSN 0010-4620 doi/full/10.2316/Journal. (print), 1460-2067 (elec- 202.2011.2.202-2858. tronic). URL http:// REFERENCES 559

comjnl.oxfordjournals. cember 2018. CODEN org/content/58/4/1003. NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- Tang:2015:HAC tronic). URL http:// [Tan15b] Zhaohui Tang. Homomor- www.sciencedirect.com/ phic authentication codes science/article/pii/S1353485818301284. for network coding. Con- Toth:2019:SSD currency and Computa- tion: Practice and Expe- [TAP19] K. C. Toth and A. Anderson- rience, 27(15):3892–3911, Priddy. Self-sovereign dig- October 2015. CODEN ital identity: A paradigm CCPEBO. ISSN 1532-0626 shift for identity. IEEE Se- (print), 1532-0634 (elec- curity & Privacy, 17(3):17– tronic). 27, May/June 2019. ISSN 1540-7993 (print), 1558- Tankard:2017:BNK 4046 (electronic). [Tan17a] Colin Tankard. BYOE: Tarnovsky:2010:DSP New kid on the block. Net- work Security, 2017(11):20, [Tar10] Christopher Tarnovsky. November 2017. CODEN Deconstructing a secure NTSCF5. ISSN 1353-4858 processor. BlackHat Brief- (print), 1872-9371 (elec- ings, 2010. tronic). URL http:// Taylor:2014:WSE www.sciencedirect.com/ science/article/pii/S135348581730096X[Tay14]. Dave Taylor. Work the Tankard:2017:ECB shell: easy watermark- ing with ImageMagick. [Tan17b] Colin Tankard. Encryp- Linux Journal, 2014(237): tion as the cornerstone of 6:1–6:??, January 2014. big data security. Net- CODEN LIJOFX. ISSN work Security, 2017(3):5– 1075-3583 (print), 1938- 7, March 2017. CODEN 3827 (electronic). NTSCF5. ISSN 1353-4858 (print), 1872-9371 (elec- Taylor:2017:EBH tronic). URL http:// [Tay17] Michael Bedford Taylor. www.sciencedirect.com/ The evolution of Bitcoin science/article/pii/S1353485817300259. hardware. Computer,50 Tankard:2018:LAA (9):58–66, September 2017. CODEN CPTRB4. ISSN [Tan18] Colin Tankard. A lay- 0018-9162 (print), 1558- ered approach to authen- 0814 (electronic). URL tication. Network Se- https://www.computer. curity, 2018(12):20, De- org/csdl/mags/co/2017/ REFERENCES 560

09/mco2017090058-abs. Takagi:2019:ISC html. [TBL19] Naofumi Takagi, Sylvie Taylor:2019:DST Boldo, and Martin Lang- hammer, editors. 2019 [Tay19] Adrian Taylor. Decrypt- IEEE 26th Symposium ing SSL traffic: best prac- on Computer Arithmetic tices for security, compli- ARITH-26 (2019), Kyoto, ance and productivity. Net- Japan, 10–12 June 2019. work Security, 2019(8):17– IEEE Computer Society 19, August 2019. CODEN Press, 1109 Spring Street, NTSCF5. ISSN 1353-4858 Suite 300, Silver Spring, (print), 1872-9371 (elec- MD 20910, USA, June tronic). URL http:// 2019. ISBN 1-72813-366-1. www.sciencedirect.com/ ISSN 1063-6889. science/article/pii/S1353485819300984. Treleaven:2017:BTF

Talbi:2018:SIW [TBY17] Philip Treleaven, Richard Gen- dal Brown, and Danny [TB18] Mourad Talbi and Med Salim Yang. Blockchain technol- Bouhlel. Secure image ogy in finance. Computer, watermarking based on 50(9):14–17, September LWT and SVD. Inter- 2017. CODEN CP- national Journal of Image TRB4. ISSN 0018-9162 and Graphics (IJIG),18 (print), 1558-0814 (elec- (4):??, October 2018. ISSN tronic). URL https:// 0219-4678. URL https: www.computer.org/csdl/ //www.worldscientific. mags/co/2017/09/mco2017090014. com/doi/10.1142/S0219467818500213. html. Tuan:2010:AWB Tilli:2015:GCR [TC10] Do Van Tuan and Ui- [TBCB15] Andrea Tilli, Andrea Pil Chong. Audio wa- Bartolini, Matteo Cac- termarking based on ad- ciari, and Luca Benini. vanced Wigner distribu- Guaranteed computational tion and important fre- resprinting via model- quency peaks. The Inter- predictive control. ACM national Journal of High Transactions on Embed- Performance Computing ded Computing Systems,14 Applications, 24(2):154– (3):48:1–48:??, April 2015. 163, May 2010. CODEN CODEN ???? ISSN 1539- IHPCFL. ISSN 1094-3420 9087 (print), 1558-3465 (print), 1741-2846 (elec- (electronic). tronic). URL http://hpc. REFERENCES 561

sagepub.com/content/24/ DEN CMSVAN. ISSN 2/154.full.pdf+html. 0360-0300 (print), 1557- 7341 (electronic). URL Taylor:2011:DR https://dl.acm.org/ft_ [TC11] Greg Taylor and George gateway.cfm?id=3292652. Cox. Digital random- Tan:2017:JDC ness. IEEE Spectrum,48 (9):32–58, September 2011. [TCN+17] Rui Tan, Sheng-Yuan CODEN IEESAM. ISSN Chiu, Hoang Hai Nguyen, 0018-9235 (print), 1939- David K. Y. Yau, and De- 9340 (electronic). URL okwoo Jung. A joint data http://spectrum.ieee. compression and encryp- org/semiconductors/processors/ tion approach for wireless behind-intels-new-randomnumber- energy auditing networks. generator/. ACM Transactions on Sen- sor Networks, 13(2):9:1– Tang:2015:CER 9:??, June 2017. CODEN [TCL15] Ying-Kai Tang, Sher- ???? ISSN 1550-4859 man S. M. Chow, and (print), 1550-4867 (elec- Joseph K. Liu. Com- tronic). ments on ‘Efficient Revoca- Tian:2014:DFS ble Certificateless Encryp- tion Secure in the Stan- [TCS14] Haibo Tian, Xiaofeng dard Model’. The Com- Chen, and Willy Susilo. puter Journal, 58(4):779– Deniability and forward 781, April 2015. CODEN secrecy of one-round au- CMPJA6. ISSN 0010-4620 thenticated key exchange. (print), 1460-2067 (elec- The Journal of Super- tronic). URL http:// computing, 67(3):671–690, comjnl.oxfordjournals. March 2014. CODEN JO- org/content/58/4/779. SUED. ISSN 0920-8542 (print), 1573-0484 (elec- Testa:2019:SFE tronic). URL http:// [TCMLN19] Rafael Luiz Testa, Cl´eber Gimenez link.springer.com/article/ Corrˆea, Ariane Machado- 10.1007/s11227-013-0968- Lima, and F´atima L. S. x. Nunes. Synthesis of fa- Tiplea:2014:NSC cial expressions in pho- tographs: Characteris- [TD14] Ferucio Laurentiu Tiplea tics, approaches, and chal- and Constantin Catalin lenges. ACM Comput- Dragan. A necessary and ing Surveys, 51(6):124:1– sufficient condition for the 124:??, February 2019. CO- asymptotic idealness of the REFERENCES 562

GRS threshold secret shar- 21, December 2011. CO- ing scheme. Information DEN SIGNDM. ISSN Processing Letters, 114(6): 0163-5700 (print), 1943- 299–303, June 2014. CO- 5827 (electronic). See DEN IFPLAT. ISSN 0020- [Nie02]. 0190 (print), 1872-6119 (electronic). URL http:// Tseng:2019:AMR www.sciencedirect.com/ [TFS19] Yi-Fan Tseng, Chun-I Fan, science/article/pii/S0020019014000179. and Cheng-Wei Sung. On Tao:2013:SMS the anonymity of multi- receiver identity-based en- [TDTD13] Chengdong Tao, Adama cryption based on Fujisaki– Diene, Shaohua Tang, and Okamoto transformation. Jintai Ding. Simple ma- International Journal of trix scheme for encryp- Foundations of Computer tion. Lecture Notes in Science (IJFCS), 30(4): Computer Science, 7932: 493–509, June 2019. ISSN 231–242, 2013. CO- 0129-0541. URL https: DEN LNCSD9. ISSN //www.worldscientific. 0302-9743 (print), 1611- com/doi/10.1142/S0129054119400094. 3349 (electronic). URL Tassa:2012:SDC http://link.springer. com/chapter/10.1007/978- [TG12] Tamir Tassa and Ehud 3-642-38616-9_16/. Gudes. Secure dis- Teng:2018:KPA tributed computation of anonymized views of shared [Ten18] Sheng-Hua Teng. 2018 databases. ACM Trans- Knuth Prize is awarded actions on Database Sys- to Johan H˚astad. ACM tems, 37(2):11:1–11:??, SIGACT News, 49(3):78– May 2012. CODEN 79, September 2018. CO- ATDSD3. ISSN 0362-5915 DEN SIGNDM. ISSN (print), 1557-4644 (elec- 0163-5700 (print), 1943- tronic). 5827 (electronic). Tewari:2017:CNU Terai:2011:BRB [TG17] Aakanksha Tewari and [Ter11] Saif Terai. Book re- B. B. Gupta. Cryptanalysis view: Foundations of Logic of a novel ultra-lightweight and Mathematics Applica- mutual authentication pro- tions to Computer Sci- tocol for IoT devices using ence and Cryptography,by RFID tags. The Journal Yves Nievergelt. ACM of Supercomputing, 73(3): SIGACT News, 42(4):17– 1085–1102, March 2017. REFERENCES 563

CODEN JOSUED. ISSN & Security, 32(??):1–18, 0920-8542 (print), 1573- February 2013. CODEN 0484 (electronic). CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- Theofanos:2016:SUE tronic). URL https:// [TGC16] Mary Theofanos, Simson www.sciencedirect.com/ Garfinkel, and Yee-Yin science/article/pii/S0167404812001599. Choong. Secure and us- Tian:2015:IBP able enterprise authen- tication: Lessons from [Tia15] Miaomiao Tian. Identity- the field. IEEE Security based proxy re-signatures & Privacy, 14(5):14–21, from lattices. Information September/October 2016. Processing Letters, 115(4): CODEN ???? ISSN 462–467, April 2015. CO- 1540-7993 (print), 1558- DEN IFPLAT. ISSN 0020- 4046 (electronic). URL 0190 (print), 1872-6119 https://www.computer. (electronic). URL http:// org/csdl/mags/sp/2016/ www.sciencedirect.com/ 05/msp2016050014-abs. science/article/pii/S002001901400266X. html. Tian:2012:TOE Tian:2016:IBS [TJZF12] Hui Tian, Hong Jiang, [TH16] Miaomiao Tian and Liusheng Ke Zhou, and Dan Feng. Huang. Identity-based sig- Transparency-orientated natures from lattices: Sim- encoding strategies for pler, faster, shorter. Fun- Voice-over-IP steganogra- damenta Informaticae, 145 phy. The Computer Jour- (2):171–187, ???? 2016. nal, 55(6):702–716, June CODEN FUMAAJ. ISSN 2012. CODEN CM- 0169-2968 (print), 1875- PJA6. ISSN 0010-4620 8681 (electronic). (print), 1460-2067 (elec- tronic). URL http:// Toledo:2013:DFS comjnl.oxfordjournals. [THA+13] Nerea Toledo, Marivi org/content/55/6/702. Higuero, Jasone Astorga, full.pdf+html. Marina Aguado, and Jean Marie Thabit:2014:RRW Bonnin. Design and for- mal security evaluation of [TK14] Rasha Thabit and Bee Ee NeMHIP: a new secure Khoo. Robust reversible and efficient network mo- watermarking scheme us- bility management proto- ing Slantlet transform col based on the host iden- matrix. The Journal tity protocol. Computers of Systems and Soft- REFERENCES 564

ware, 88(??):74–86, Febru- Tu:2014:EPB ary 2014. CODEN JS- SODM. ISSN 0164-1212 [TKHK14] Hang Tu, Neeraj Ku- (print), 1873-1228 (elec- mar, Debiao He, and tronic). URL http:// Jongsung Kim. An www.sciencedirect.com/ efficient password-based science/article/pii/S0164121213002380. three-party authenticated multiple key exchange pro- Takayasu:2019:PKE tocol for wireless mobile networks. The Journal of Supercomputing, 70(1): [TK19] Atsushi Takayasu and 224–235, October 2014. Noboru Kunihiro. Par- CODEN JOSUED. ISSN tial key exposure attacks 0920-8542 (print), 1573- on RSA: Achieving the 0484 (electronic). URL Boneh–Durfee bound. The- http://link.springer. oretical Computer Science, com/article/10.1007/s11227- 761(??):51–77, February 014-1198-6. 21, 2019. CODEN TC- SCDI. ISSN 0304-3975 Tani:2012:EQA (print), 1879-2294 (elec- tronic). URL http:// [TKM12] Seiichiro Tani, Hirotada www.sciencedirect.com/ Kobayashi, and Keiji Mat- science/article/pii/S0304397518305371. sumoto. Exact quantum algorithms for the leader Tuna:2017:SIS election problem. ACM Transactions on Computa-

+ tion Theory, 4(1):1:1–1:??, [TKG 17] Gurkan Tuna, Dimitrios G. March 2012. CODEN Kogias, V. Cagri Gun- ???? ISSN 1942-3454 gor, Cengiz Gezer, Erhan (print), 1942-3462 (elec- Taskin, and Erman Ayday. tronic). A survey on information security threats and solu- Tu:2013:PAQ tions for Machine to Ma- chine (M2M) communica- [TKMZ13] Stephen Tu, M. Frans tions. Journal of Paral- Kaashoek, Samuel Mad- lel and Distributed Com- den, and Nickolai Zel- puting, 109(??):142–154, dovich. Processing analyti- November 2017. CODEN cal queries over encrypted JPDCER. ISSN 0743-7315 data. Proceedings of the (print), 1096-0848 (elec- VLDB Endowment, 6(5): tronic). URL http:// 289–300, March 2013. CO- www.sciencedirect.com/ DEN ???? ISSN 2150- science/article/pii/S0743731517301867. 8097. REFERENCES 565

Tariq:2014:SBL www.sciencedirect.com/ science/article/pii/S0164121211002810. [TKR14] Muhammad Adnan Tariq, Boris Koldehofe, and Tsai:2013:ZWS Kurt Rothermel. Se- curing broker-less pub- [TLL13] Hung-Hsu Tsai, Yen-Shou lish/subscribe systems us- Lai, and Shih-Che Lo. ing identity-based encryp- A zero-watermark scheme tion. IEEE Transactions with geometrical invari- on Parallel and Distributed ants using SVM and PSO Systems, 25(2):518–528, against geometrical attacks February 2014. CODEN for image protection. The ITDSEO. ISSN 1045-9219 Journal of Systems and (print), 1558-2183 (elec- Software, 86(2):335–348, tronic). February 2013. CODEN JSSODM. ISSN 0164-1212 Tan:2016:ESE (print), 1873-1228 (elec- tronic). URL http:// [TLCF16] Jingweijia Tan, Zhi Li, www.sciencedirect.com/ Mingsong Chen, and Xin science/article/pii/S0164121212002440. Fu. Exploring soft-error robust and energy-efficient Tetali:2013:MSA register file in GPGPUs us- ing resistive memory. ACM [TLMM13] Sai Deep Tetali, Mohsen Transactions on Design Lesani, Rupak Majumdar, Automation of Electronic and Todd Millstein. Mr- Systems, 21(2):34:1–34:??, Crypt: static analysis for January 2016. CODEN secure cloud computations. ATASFO. ISSN 1084-4309 ACM SIGPLAN Notices, (print), 1557-7309 (elec- 48(10):271–286, October tronic). 2013. CODEN SINODQ. ISSN 0362-1340 (print), Tsaur:2012:ESM 1523-2867 (print), 1558- [TLL12] Woei-Jiunn Tsaur, Jia- 1160 (electronic). OOP- Hong Li, and Wei-Bin SLA ’13 conference pro- Lee. An efficient and ceedings. secure multi-server au- Tang:2012:RSS thentication scheme with key agreement. The [TLW12] Zhaohui Tang, Hoon Wei Journal of Systems and Lim, and Huaxiong Wang. Software, 85(4):876–882, Revisiting a secret shar- April 2012. CODEN JS- ing approach to network SODM. ISSN 0164-1212 codes. Lecture Notes in (print), 1873-1228 (elec- Computer Science, 7496: tronic). URL http:// 300–317, 2012. CO- REFERENCES 566

DEN LNCSD9. ISSN random errors in addi- 0302-9743 (print), 1611- tive encrypted computa- 3349 (electronic). URL tion. IEEE Transactions http://link.springer. on Computers, 67(1):16– com/chapter/10.1007/978- 31, January 2018. CO- 3-642-33272-2_20/. DEN ITCOB4. ISSN 0018- 9340 (print), 1557-9956 Tian:2017:RSP (electronic). URL http: [TLZ+17] Z. Tian, T. Liu, Q. Zheng, //ieeexplore.ieee.org/ E. Zhuang, M. Fan, and document/7967774/. Z. Yang. Reviving se- Tang:2015:ECP quential program birth- marking for multithreaded [TMC15] Qiang Tang, Hua Ma, software plagiarism detec- and Xiaofeng Chen. Ex- tion. IEEE Transactions tend the concept of public on Software Engineering, key encryption with dele- PP(99):1, ???? 2017. CO- gated search. The Com- DEN IESEDJ. ISSN 0098- puter Journal, 58(4):724– 5589 (print), 1939-3520 734, April 2015. CODEN (electronic). URL http: CMPJA6. ISSN 0010-4620 //ieeexplore.ieee.org/ (print), 1460-2067 (elec- stamp/stamp.jsp?arnumber= tronic). URL http:// 7888597. comjnl.oxfordjournals. Tsay:2012:VUL org/content/58/4/724. [TM12] Joe-Kai Tsay and Stig F. Tormo:2013:IMP Mjølsnes. A vulnerability in the UMTS and LTE au- [TMGP13] Gines Dolera Tormo, Fe- thentication and key agree- lix Gomez Marmol, Joao ment protocols. Lecture Girao, and Gregorio Mar- Notes in Computer Sci- tinez Perez. Identity man- ence, 7531:65–76, 2012. agement — in privacy we CODEN LNCSD9. ISSN trust: Bridging the trust 0302-9743 (print), 1611- gap in eHealth environ- 3349 (electronic). URL ments. IEEE Security http://link.springer. & Privacy, 11(6):34–41, com/chapter/10.1007/978- November/December 2013. 3-642-33704-8_6/. CODEN ???? ISSN 1540-7993 (print), 1558- Tsoutsos:2018:EDM 4046 (electronic).

[TM18] Nektarios Georgios Tsout- Terrovitis:2011:LGR sos and Michail Mani- atakos. Efficient detec- [TMK11] Manolis Terrovitis, Nikos tion for malicious and Mamoulis, and Panos Kal- REFERENCES 567

nis. Local and global recod- & Privacy, 14(6):26–33, ing methods for anonymiz- November/December 2016. ing set-valued data. VLDB CODEN ???? ISSN Journal: Very Large 1540-7993 (print), 1558- Data Bases, 20(1):83–106, 4046 (electronic). URL February 2011. CODEN https://www.computer. VLDBFR. ISSN 1066-8888 org/csdl/mags/sp/2016/ (print), 0949-877X (elec- 06/msp2016060026-abs. tronic). html. Terrovitis:2012:PPD Toxen:2014:NSS [TMLS12] Manolis Terrovitis, Nikos [Tox14] Bob Toxen. The NSA and Mamoulis, John Liagouris, Snowden: securing the all- and Spiros Skiadopoulos. seeing eye. Communica- Privacy preservation by tions of the Association for disassociation. Proceedings Computing Machinery,57 of the VLDB Endowment, (5):44–51, May 2014. CO- 5(10):944–955, June 2012. DEN CACMA2. ISSN CODEN ???? ISSN 2150- 0001-0782 (print), 1557- 8097. 7317 (electronic). Tao:2018:AAC Tsougenis:2012:PEM [TODQ18] Ming Tao, Kaoru Ota, Mianxiong Dong, and [TPKT12] E. D. Tsougenis, G. A. Pa- Zhuzhong Qian. Acces- pakostas, D. E. Koulouri- sAuth: Capacity-aware otis, and V. D. Tourassis. security access authenti- Performance evaluation of cation in federated-IoT- moment-based watermark- enabled V2G networks. ing methods: a review. The Journal of Parallel and Journal of Systems and Distributed Computing, Software, 85(8):1864–1884, 118 (part 1)(??):107–117, August 2012. CODEN JS- August 2018. CODEN SODM. ISSN 0164-1212 JPDCER. ISSN 0743-7315 (print), 1873-1228 (elec- (print), 1096-0848 (elec- tronic). URL http:// tronic). URL https:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0164121212000684. science/article/pii/S0743731517302587. Tan:2016:BIB Tomb:2016:AVR [TPL16] Chik How Tan, Theo Fanuela [Tom16] Aaron Tomb. Automated Prabowo, and Duc-Phong verification of real-world Le. Breaking an ID-based cryptographic implemen- encryption based on dis- tations. IEEE Security crete logarithm and factor- REFERENCES 568

ization problems. Infor- tacks on ISO standard mation Processing Letters, CLEFIA: Expansion tech- 116(2):116–119, Febru- nique revisited. Infor- ary 2016. CODEN IF- mation Processing Letters, PLAT. ISSN 0020-0190 116(2):136–143, Febru- (print), 1872-6119 (elec- ary 2016. CODEN IF- tronic). URL http:// PLAT. ISSN 0020-0190 www.sciencedirect.com/ (print), 1872-6119 (elec- science/article/pii/S0020019015001696. tronic). URL http:// www.sciencedirect.com/ Tang:2014:PAB science/article/pii/S0020019015001659. + [TQL 14] Ming Tang, Zhenlong Qiu, Tschorsch:2016:BBT Weijie Li, Weijin Sun, Xi- aobo Hu, and Huanguo [TS16b] F. Tschorsch and B. Scheuer- Zhang. Power analysis mann. Bitcoin and be- based reverse engineering yond: A technical sur- on the secret round func- vey on decentralized digital tion of block ciphers. Con- currencies. IEEE Commu- currency and Computa- nications Surveys Tutori- tion: Practice and Ex- als, 18(3):2084–2123, Third perience, 26(8):1531–1545, Quarter 2016. ISSN 1553- June 10, 2014. CODEN 877X. CCPEBO. ISSN 1532-0626 Taassori:2018:VRP (print), 1532-0634 (elec- tronic). [TSB18] Meysam Taassori, Ali Shafiee, and Rajeev Bal- Taylor:2011:CAS asubramonian. VAULT: [TRD11] Ken Taylor, Scott Rickard, Reducing paging overheads and Konstantinos Drakakis. in SGX with efficient in- Costas arrays: Survey, tegrity verification struc- standardization, and MAT- tures. ACM SIGPLAN LAB toolbox. ACM Trans- Notices, 53(2):665–678, actions on Mathematical February 2018. CODEN Software, 37(4):41:1–41:31, SINODQ. ISSN 0362-1340 February 2011. CODEN (print), 1523-2867 (print), ACMSCU. ISSN 0098-3500 1558-1160 (electronic). (print), 1557-7295 (elec- tronic). Tao:2014:CFS Tezcan:2016:IID [TSH14] Jia Tao, Giora Slutzki, and Vasant Honavar. A concep- [TS16a] Cihangir Tezcan and Ali Ay- tual framework for secrecy- din Sel¸cuk. Improved im- preserving reasoning in probable differential at- knowledge bases. ACM REFERENCES 569

Transactions on Compu- http://link.springer. tational Logic, 16(1):3:1– com/article/10.1007/s11227- 3:??, December 2014. CO- 013-0917-8. DEN ???? ISSN 1529-3785 Tseng:2012:ERI (print), 1557-945X (elec- tronic). [TT12] Yuh-Min Tseng and Tung- Tso Tsai. Efficient re- Toreini:2017:TRP vocable ID-based encryp- [TSH17] Ehsan Toreini, Siamak F. tion with a public chan- Shahandashti, and Feng nel. The Computer Jour- Hao. Texture to the res- nal, 55(4):475–486, April cue: Practical paper finger- 2012. CODEN CM- printing based on texture PJA6. ISSN 0010-4620 patterns. ACM Transac- (print), 1460-2067 (elec- tions on Privacy and Se- tronic). URL http:// curity (TOPS), 20(3):9:1– comjnl.oxfordjournals. 9:??, August 2017. CO- org/content/55/4/475. DEN ???? ISSN 2471-2566 full.pdf+html. (print), 2471-2574 (elec- Tenca:2018:PIS tronic). [TT18] Alexandre Tenca and Nao- Tang:2011:IDC fumi Takagi, editors. Pro- [TSLL11] Xuehai Tang, Bing Sun, ceedings of the 25th In- Ruilin Li, and Chao ternational Symposium on Li. Impossible differen- Computer Arithmetic, 25– tial cryptanalysis of 13- 27 June 2018 Amherst, round CLEFIA-128. The MA, USA. IEEE Computer Journal of Systems and Society Press, 1109 Spring Software, 84(7):1191–1196, Street, Suite 300, Silver July 2011. CODEN JS- Spring, MD 20910, USA, SODM. ISSN 0164-1212. June 2018. ISBN 1-5386- Tso:2013:SAI 2612-8 (USB), 1-5386- 2665-9. ISSN 2576-2265. [Tso13] Raylin Tso. Security anal- LCCN QA76.9.C62. IEEE ysis and improvements of catalog number CFP18121- a communication-efficient USB. three-party password au- Tseng:2015:LFI thenticated key exchange protocol. The Journal [TTH15] Yuh-Min Tseng, Tung- of Supercomputing, 66(2): Tso Tsai, and Sen-Shan 863–874, November 2013. Huang. Leakage-free ID- CODEN JOSUED. ISSN based signature. The Com- 0920-8542 (print), 1573- puter Journal, 58(4):750– 0484 (electronic). URL 757, April 2015. CODEN REFERENCES 570

CMPJA6. ISSN 0010-4620 (print), 1558-3465 (elec- (print), 1460-2067 (elec- tronic). URL https:// tronic). URL http:// dl.acm.org/ft_gateway. comjnl.oxfordjournals. cfm?id=3312742. org/content/58/4/750. Thorpe:2012:CRB Tsai:2010:RLI [TW12] Christopher Thorpe and Steven R. Willis. Crypto- [TTL10] H.-H. Tsai, H.-C. Tseng, graphic rule-based trading. and Y.-S. Lai. Robust Lecture Notes in Computer lossless image watermark- Science, 7397:65–72, 2012. ing based on α-trimmed CODEN LNCSD9. ISSN mean algorithm and sup- 0302-9743 (print), 1611- port vector machine. The 3349 (electronic). URL Journal of Systems and http://link.springer. Software, 83(6):1015–1028, com/chapter/10.1007/978- June 2010. CODEN JS- 3-642-32946-3_6/. SODM. ISSN 0164-1212. Tripunitara:2014:CKM Tupakula:2015:TES [TW14] Mahesh V. Tripunitara and [TV15] Udaya Tupakula and Vi- Jeffrey Lok Tin Woo. Com- jay Varadharajan. Trust posing Kerberos and Mul- enhanced security for ten- timedia Internet KEYing ant transactions in the (MIKEY) for authenti- cloud environment. The cated transport of group Computer Journal,58 keys. IEEE Transactions (10):2388–2403, October on Parallel and Distributed 2015. CODEN CM- Systems, 25(4):898–907, PJA6. ISSN 0010-4620 April 2014. CODEN ITD- (print), 1460-2067 (elec- SEO. ISSN 1045-9219 tronic). URL http:// (print), 1558-2183 (elec- comjnl.oxfordjournals. tronic). org/content/58/10/2388. Wu:2012:SWG Turan:2019:CFF [tWmC12] Hao tian Wu and Yiu [TV19] Furkan Turan and Ingrid ming Cheung. Secure wa- Verbauwhede. Compact termarking on 3D geome- and flexible FPGA imple- try via ICA and orthogo- mentation of Ed25519 and nal transformation. Lec- X25519. ACM Transac- ture Notes in Computer tions on Embedded Com- Science, 7110:52–62, 2012. puting Systems, 18(3): CODEN LNCSD9. ISSN 24:1–24:??, June 2019. CO- 0302-9743 (print), 1611- DEN ???? ISSN 1539-9087 3349 (electronic). URL REFERENCES 571

http://link.springer. 156–166, 2012. CO- com/chapter/10.1007/978- DEN LNCSD9. ISSN 3-642-28693-3_4/. 0302-9743 (print), 1611- 3349 (electronic). URL Toor:2018:VQA http://link.springer. [TWNC18] Andeep S. Toor, Harry com/chapter/10.1007/978- Wechsler, Michele Nappi, 3-642-32205-1_14/. and Kim-Kwang Ray- Trost:2016:OPC mond Choo. Visual ques- tion authentication pro- [TX16] William R. Trost and tocol (VQAP). Comput- Guangwu Xu. On the op- ers & Security, 76(??):285– timal pre-computation of 294, July 2018. CODEN window NAF for Koblitz CPSEDU. ISSN 0167-4048 curves. IEEE Transactions (print), 1872-6208 (elec- on Computers, 65(9):2918– tronic). URL https:// 2924, September 2016. CO- www.sciencedirect.com/ DEN ITCOB4. ISSN 0018- science/article/pii/S0167404817302547. 9340 (print), 1557-9956 (electronic). Tartary:2011:EIT Tan:2016:CCA [TWZ11] Christophe Tartary, Huax- iong Wang, and Yun [TY16a] Syh-Yuan Tan and Wun- Zhang. An efficient and in- She Yap. Cryptanaly- formation theoretically se- sis of a CP–ABE scheme cure rational secret shar- with policy in normal ing scheme based on sym- forms. Information Pro- metric bivariate polynomi- cessing Letters, 116(7): als. International Jour- 492–495, July 2016. CO- nal of Foundations of Com- DEN IFPLAT. ISSN 0020- puter Science (IJFCS),22 0190 (print), 1872-6119 (6):1395–1416, September (electronic). URL http:// 2011. CODEN IFCSEN. www.sciencedirect.com/ ISSN 0129-0541 (print), science/article/pii/S0020019016300126. 1793-6373 (electronic). Tolba:2016:GMA Tian:2012:SSB [TY16b] Mohamed Tolba and Amr M. [TWZ+12] Huawei Tian, Zheng Wang, Youssef. Generalized MitM Yao Zhao, Rongrong Ni, attacks on full TWINE. and Lunming Qin. Spread Information Processing spectrum-based multi-bit Letters, 116(2):128–135, watermarking for free-view February 2016. CODEN video. Lecture Notes in IFPLAT. ISSN 0020-0190 Computer Science, 7128: (print), 1872-6119 (elec- REFERENCES 572

tronic). URL http:// Security, 59(??):210–235, www.sciencedirect.com/ June 2016. CODEN science/article/pii/S0020019015001660. CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- Trammel:2012:DTP tronic). URL https:// www.sciencedirect.com/ [TYK+12] John Trammel, Umit¨ science/article/pii/S0167404816300256. Yal¸cinalp, Andrei Kalfas, James Boag, and Dan Ehatisham-ul-Haq:2018:CAS Brotsky. Device token pro- [uHAN+18] Muhammad Ehatisham tocol for persistent authen- ul Haq, Muhammad Awais tication shared across ap- Azam, Usman Naeem, plications. Lecture Notes Yasar Amin, and Jonathan in Computer Science, 7592: Loo. Continuous authenti- 230–243, 2012. CO- cation of smartphone users DEN LNCSD9. ISSN based on activity pattern 0302-9743 (print), 1611- recognition using passive 3349 (electronic). URL mobile sensing. Journal http://link.springer. of Network and Computer com/chapter/10.1007/978- Applications, 109(??):24– 3-642-33427-6_20/. 35, May 1, 2018. CODEN Tian:2017:ORA JNCAF3. ISSN 1084-8045 (print), 1095-8592 (elec- + [TYM 17] Yangguang Tian, Guomin tronic). URL http:// Yang, Yi Mu, Shiwei www.sciencedirect.com/ Zhang, Kaitai Liang, and science/article/pii/S1084804518300717. Yong Yu. One-round attribute-based key ex- Uzunkol:2018:SWU change in the multi- [UK18] Osmanbey Uzunkol and party setting. Interna- Mehmet Sabir Kiraz. Still tional Journal of Foun- wrong use of pairings in dations of Computer Sci- cryptography. Applied ence (IJFCS), 28(6):725– Mathematics and Com- ??, September 2017. CO- putation, 333(??):467–479, DEN IFCSEN. ISSN 0129- September 15, 2018. CO- 0541. DEN AMHCBQ. ISSN Teh:2016:STD 0096-3003 (print), 1873- 5649 (electronic). URL [TZTC16] Pin Shen Teh, Ning Zhang, http://www.sciencedirect. Andrew Beng Jin Teoh, com/science/article/pii/ and Ke Chen. A sur- S0096300318302352. vey on touch dynamics Unruh:2015:RQT authentication in mobile devices. Computers & [Unr15] Dominique Unruh. Re- REFERENCES 573

vocable quantum timed- CODEN JSSODM. ISSN release encryption. Journal 0164-1212. of the ACM, 62(6):49:1– Ulutas:2013:ISI 49:??, December 2015. CO- DEN JACOAH. ISSN [UUN13] Mustafa Ulutas, G¨uzin 0004-5411 (print), 1557- Ulutas, and Vasif V. 735X (electronic). Nabiyev. Invertible se- cret image sharing for Ueno:2019:TBP gray level and dithered cover images. The Journal [USH19] R. Ueno, M. Suzuki, and of Systems and Software, N. Homma. Tackling bi- 86(2):485–500, February ased PUFs through bi- 2013. CODEN JS- ased masking: a debiasing SODM. ISSN 0164-1212 method for efficient fuzzy (print), 1873-1228 (elec- extractor. IEEE Trans- tronic). URL http:// actions on Computers,68 www.sciencedirect.com/ (7):1091–1104, July 2019. science/article/pii/S0164121212002701. CODEN ITCOB4. ISSN 0018-9340 (print), 1557- Vaikuntanathan:2011:CBN 9956 (electronic). [Vai11] V. Vaikuntanathan. Com- Uto:2013:MRI puting blindfolded: New developments in fully ho- [Uto13] Nelson Uto. A method- momorphic encryption. In ology for retrieving in- IEEE [IEE11b], pages 5– formation from malware 16. ISBN 1-4577-1843-X. encrypted output files: LCCN ???? Brazilian case studies. Fu- Vaikuntanathan:2012:HCE ture Internet, 5(2):140– 167, April 25, 2013. CO- [Vai12] Vinod Vaikuntanathan. DEN ???? ISSN 1999- How to compute on en- 5903. URL https://www. crypted data. Lecture mdpi.com/1999-5903/5/ Notes in Computer Sci- 2/140. ence, 7668:1–15, 2012. CO- Ulutas:2011:MIS DEN LNCSD9. ISSN 0302-9743 (print), 1611- [UUN11] Mustafa Ulutas, G¨uzin 3349 (electronic). URL Ulutas, and Vasif V. http://link.springer. Nabiyev. Medical image com/chapter/10.1007/978- security and EPR hiding 3-642-34931-7_1/. using Shamir’s secret shar- Vigil:2015:IAN ing scheme. The Journal of Systems and Software,84 [VBC+15] Mart´ın Vigil, Johannes (3):341–353, March 2011. Buchmann, Daniel Cabar- REFERENCES 574

cas, Christian Weinert, and 5851 (electronic). ISCA ’12 Alexander Wiesmaier. In- conference proceedings. tegrity, authenticity, non- Vatajelu:2016:SMB repudiation, and proof of existence for long-term [VDB+16] Elena Ioana Vatajelu, archiving: a survey. Com- Giorgio Di Natale, Mario puters & Security, 50(??): Barbareschi, Lionel Torres, 16–32, May 2015. CODEN Marco Indaco, and Paolo CPSEDU. ISSN 0167-4048 Prinetto. STT–MRAM- (print), 1872-6208 (elec- based PUF architecture tronic). URL https:// exploiting magnetic tun- www.sciencedirect.com/ nel junction fabrication- science/article/pii/S0167404814001849. induced variability. ACM Venkataramani:2016:DHC Journal on Emerging Tech- nologies in Computing Sys- [VCD16] Guru Venkataramani, Jie tems (JETC), 13(1):5:1– Chen, and Milos Doroslo- 5:??, December 2016. CO- vacki. Detecting hardware DEN ???? ISSN 1550- covert timing channels. 4832. IEEE Micro, 36(5):17–27, vandeGraaf:2017:LTT September/October 2016. CODEN IEMIDZ. ISSN [vdG17] Jeroen van de Graaf. 0272-1732 (print), 1937- Long-term threats to bal- 4143 (electronic). URL lot privacy. IEEE Se- https://www.computer. curity & Privacy, 15(3): org/csdl/mags/mi/2016/ 40–47, May/June 2017. 05/mmi2016050017-abs. CODEN ???? ISSN html. 1540-7993 (print), 1558- Valamehr:2012:IRM 4046 (electronic). URL https://www.computer. [VCK+12] Jonathan Valamehr, Melissa org/csdl/mags/sp/2017/ Chase, Seny Kamara, 03/msp2017030040-abs. Andrew Putnam, Dan html. Shumow, Vinod Vaikun- vanDam:2011:TQC tanathan, and Timothy Sherwood. Inspection re- [vDKS11] Wim van Dam, Vivian M. sistant memory: architec- Kendon, and Simone Sev- tural support for security erini, editors. Theory from physical examination. of quantum computation, ACM SIGARCH Computer communication, and cryp- Architecture News, 40(3): tography: 5th conference, 130–141, June 2012. CO- TQC 2010, Leeds, UK, DEN CANED2. ISSN April 13–15, 2010, revised 0163-5964 (print), 1943- selected papers, volume REFERENCES 575

6519 of Lecture notes in Heartbleed_Threat_Research_ computer science. Spring- Analysis.pdf. er-Verlag, Berlin, Ger- many / Heidelberg, Ger- Vergnaud:2017:CAB many / London, UK / etc., 2011. ISBN 3-642-18072-8 [Ver17] Damien Vergnaud. Com- (softcover). LCCN ???? ment on ‘Attribute-Based Signatures for Support- Visegrady:2014:SCV ing Anonymous Certifi- cation’ by N. Kaaniche [VDO14] T. Visegrady, S. Dragone, and M. Laurent (ESORICS and M. Osborne. Stateless 2016). The Computer cryptography for virtual Journal, 60(12):1801–1808, environments. IBM Jour- December 1, 2017. CO- nal of Research and De- DEN CMPJA6. ISSN velopment, 58(1):5:1–5:10, 0010-4620 (print), 1460- January–February 2014. 2067 (electronic). URL CODEN IBMJAE. ISSN https://academic.oup. 0018-8646 (print), 2151- com/comjnl/article/60/ 8556 (electronic). 12/1801/3861971.

vanderWalt:2018:CSI Vetter:2010:ABV

[vdWEG18] Estee van der Walt, [Vet10] Ron Vetter. Authenti- J. H. P. Eloff, and Ja- cation by biometric ver- comine Grobler. Cyber- ification. Computer,43 security: Identity decep- (2):28–29, February 2010. tion detection on social me- CODEN CPTRB4. ISSN dia platforms. Computers 0018-9162 (print), 1558- & Security, 78(??):76–89, 0814 (electronic). September 2018. CODEN CPSEDU. ISSN 0167-4048 Vo:2019:ISA (print), 1872-6208 (elec- tronic). URL https:// [VFFHF19] Tri Hoang Vo, Woldemar www.sciencedirect.com/ Fuhrmann, Klaus-Peter science/article/pii/S0167404818306503. Fischer-Hellmann, and Steven Furnell. Identity- VenafiLabs:2014:VLQ as-a-service: An adaptive security infrastructure and [Ven14] Venafi Labs. Venafi Labs privacy-preserving user Q3 Heartbleed threat re- identity for the cloud envi- search analysis. Web site., ronment. Future Internet, 2014. URL https:// 11(5):116, May 15, 2019. www.venafi.com/assets/ CODEN ???? ISSN 1999- pdf/wp/Venafi_Labs_Q3_ 5903. URL https://www. REFERENCES 576

mdpi.com/1999-5903/11/ 22:1–22:34, June 2017. CO- 5/116. DEN ???? ISSN 2476- 1249. URL http://dl. Voulgaris:2019:BTI acm.org/citation.cfm? [VFS+19] Spyros Voulgaris, Nikos id=3084459. Fotiou, Vasilios A. Siris, Vernize:2015:MNI George C. Polyzos, Mikael [VGA15] Grazielle Vernize, Andr´e Jaatinen, and Yannis Luiz Pires Guedes, and Oikonomidis. Blockchain Luiz Carlos Pessoa Albini. technology for intelligent Malicious nodes identifi- environments. Future In- cation for complex net- ternet, 11(10):213, Octo- work based on local views. ber 11, 2019. CODEN The Computer Journal, ???? ISSN 1999-5903. URL 58(10):2476–2491, Octo- https://www.mdpi.com/ ber 2015. CODEN CM- 1999-5903/11/10/213. PJA6. ISSN 0010-4620 Venkatakrishnan:2017:DRB (print), 1460-2067 (elec- tronic). URL http:// [VFV17a] Shaileshh Bojja Venkatakr- comjnl.oxfordjournals. ishnan, Giulia Fanti, and org/content/58/10/2476. Pramod Viswanath. Dan- delion: Redesigning the Vijayarajan:2019:BKB Bitcoin network for anonymity[VGA19]. R. Vijayarajan, P. Gnana- Proceedings of the ACM sivam, and R. Avuda- on Measurement and Anal- iammal. Bio-key based ysis of Computing Sys- AES for personalized im- tems (POMACS), 1(1): age cryptography. The 22:1–22:??, June 2017. CO- Computer Journal,62 DEN ???? ISSN 2476- (11):1695–1705, Novem- 1249. URL http://dl. ber 2019. CODEN CM- acm.org/citation.cfm? PJA6. ISSN 0010-4620 id=3084459. (print), 1460-2067 (elec- Venkatakrishnan:2017:DRBb tronic). URL http:// academic.oup.com/comjnl/ [VFV17b] Shaileshh Bojja Venkatakr- article/62/11/1695/5436925. ishnan, Giulia Fanti, and Vrakas:2014:OUI Pramod Viswanath. Dan- delion: Redesigning the [VGL14] Nikos Vrakas, Dimitris Bitcoin network for anonymity. Geneiatakis, and Costas Proceedings of the ACM Lambrinoudakis. Ob- on Measurement and Anal- scuring users’ identity ysis of Computing Sys- in VoIP/IMS environ- tems (POMACS), 1(1): ments. Computers & REFERENCES 577

Security, 43(??):145–158, for network vulnerabil- June 2014. CODEN ity analysis. The Com- CPSEDU. ISSN 0167-4048 puter Journal, 58(4):878– (print), 1872-6208 (elec- 891, April 2015. CODEN tronic). URL https:// CMPJA6. ISSN 0010-4620 www.sciencedirect.com/ (print), 1460-2067 (elec- science/article/pii/S0167404814000510. tronic). URL http:// comjnl.oxfordjournals. Viennot:2014:MSG org/content/58/4/878. [VGN14] Nicolas Viennot, Edward Vgena:2019:TAL Garcia, and Jason Nieh. A measurement study of [VKK+19] Katerina Vgena, Angeliki Google Play. ACM SIG- Kitsiou, Christos Kalloni- METRICS Performance atis, Dimitris Kavroudakis, Evaluation Review, 42(1): and Stefanos Gritzalis. To- 221–233, June 2014. CO- ward addressing location DEN ???? ISSN 0163-5999 privacy issues: New af- (print), 1557-9484 (elec- filiations with social and tronic). location attributes. Fu- ture Internet, 11(11):234, Vasisht:2018:DEU November 01, 2019. CO- [VJH+18] Deepak Vasisht, Anub- DEN ???? ISSN 1999- hav Jain, Chen-Yu Hsu, 5903. URL https://www. Zachary Kabelac, and Dina mdpi.com/1999-5903/11/ Katabi. Duet: Estimat- 11/234. ing user position and iden- Vasiliadis:2017:DIS tity in smart homes us- ing intermittent and in- [VKPI17] Giorgos Vasiliadis, Lazaros complete RF-Data. Pro- Koromilas, Michalis Poly- ceedings of the ACM on chronakis, and Sotiris Ioan- Interactive, Mobile, Wear- nidis. Design and im- able and Ubiquitous Tech- plementation of a state- nologies (IMWUT), 2(2): ful network packet process- 1–21, July 2018. CODEN ing framework for GPUs. ???? ISSN 2474-9567 (elec- IEEE/ACM Transactions tronic). URL https:// on Networking, 25(1):610– dl.acm.org/doi/abs/10. 623, February 2017. CO- 1145/3214287. DEN IEANEP. ISSN 1063-6692 (print), 1558- Vu:2015:NAN 2566 (electronic). [VKC15] Hai L. Vu, Kenneth K. Vleju:2012:CCA Khaw, and Tsong Yueh Chen. A new approach [Vle12] Mircea Boris Vleju. A REFERENCES 578

client-centric ASM-based Nissanke. A novel permis- approach to identity man- sion hierarchy for RBAC agement in cloud comput- for dealing with SoD in ing. Lecture Notes in MAC models. The Com- Computer Science, 7518: puter Journal, 59(4):462– 34–43, 2012. CODEN 492, April 2016. CODEN LNCSD9. ISSN 0302-9743 CMPJA6. ISSN 0010-4620 (print), 1611-3349 (elec- (print), 1460-2067 (elec- tronic). URL http:// tronic). URL http:// link.springer.com/chapter/ comjnl.oxfordjournals. 10.1007/978-3-642-33999- org/content/59/4/462. 8_5/. Vollala:2017:EEM Vivek:2014:CSC [VN17] Satyanarayana Vollala and [VM14] Srinivas Vivek and C. E. Veni Ramasubramanian N. En- Madhavan. Cubic Sieve ergy efficient modular ex- Congruence of the Dis- ponentiation for public- crete Logarithm Problem, key cryptography based and fractional part se- on bit forwarding tech- quences. Journal of Sym- niques. Information Pro- bolic Computation, 64(??): cessing Letters, 119(??):25– 22–34, August 2014. CO- 38, March 2017. CODEN DEN JSYCEH. ISSN 0747- IFPLAT. ISSN 0020-0190 7171 (print), 1095-855X (print), 1872-6119 (elec- (electronic). URL http:// tronic). URL http:// www.sciencedirect.com/ www.sciencedirect.com/ science/article/pii/S0747717113001703. science/article/pii/S0020019016301715. Vliegen:2015:SRD VonMaurich:2015:IQM

[VMV15] Jo Vliegen, Nele Mentens, [VOG15] Ingo Von Maurich, Tobias and Ingrid Verbauwhede. Oder, and Tim G¨uneysu. Secure, remote, dynamic Implementing QC–MDPC reconfiguration of FP- McEliece encryption. ACM GAs. ACM Transactions Transactions on Embed- on Reconfigurable Technol- ded Computing Systems,14 ogy and Systems, 7(4):8:1– (3):44:1–44:??, April 2015. 8:??, January 2015. CO- CODEN ???? ISSN 1539- DEN ???? ISSN 1936-7406 9087 (print), 1558-3465 (print), 1936-7414 (elec- (electronic). tronic). Varadharajan:2018:AUR Veloudis:2016:NPH [VOGB18] V. S. Varadharajan, D. S. [VN16] Simeon Veloudis and Nimal Onge, C. Guß, and G. Bel- REFERENCES 579

trame. Over-the-air up- DEN CPTRB4. ISSN dates for robotic swarms. 0018-9162 (print), 1558- IEEE Software, 35(2):44– 0814 (electronic). URL 50, March/April 2018. CO- https://www.computer. DEN IESOEG. ISSN org/csdl/mags/co/2016/ 0740-7459 (print), 1937- 09/mco2016090098-abs. 4194 (electronic). html. vanRijswijk-Deij:2017:PIE Vivek:2012:CSE [VSR12] S. Sree Vivek, S. Sharmila Deva [vRDHSP17] Roland van Rijswijk-Deij, Selvi, and C. Pandu Ran- Kaspar Hageman, Anna gan. Compact state- Sperotto, and Aiko Pras. ful encryption schemes The performance impact with ciphertext verifiabil- of elliptic curve cryptog- ity. Lecture Notes in raphy on DNSSEC valida- Computer Science, 7631: tion. IEEE/ACM Trans- 87–104, 2012. CO- actions on Networking,25 DEN LNCSD9. ISSN (2):738–750, April 2017. 0302-9743 (print), 1611- CODEN IEANEP. ISSN 3349 (electronic). URL 1063-6692 (print), 1558- http://link.springer. 2566 (electronic). com/chapter/10.1007/978- Vembuselvi:2011:LLL 3-642-34117-5_6/.

[VS11] C. Vembuselvi and S. Sel- Vlachos:2015:DPC vakumar. LISISAP: link [VSV15] Michail Vlachos, Johannes level signature based se- Schneider, and Vassilios G. cure anonymous protocol Vassiliadis. On data for prevention of traffic publishing with cluster- analysis attacks. ACM ing preservation. ACM SIGSOFT Software Engi- Transactions on Knowl- neering Notes, 36(2):1–10, edge Discovery from Data March 2011. CODEN (TKDD), 9(3):23:1–23:??, SFENDP. ISSN 0163-5948 April 2015. CODEN ???? (print), 1943-5843 (elec- ISSN 1556-4681 (print), tronic). 1556-472X (electronic). Vassilev:2016:ESU vanTilborg:2011:ECS [VS16] Apostol Vassilev and Robert [vTJ11] Henk C. A. van Tilborg Staples. Entropy as a and Sushil Jajodia, editors. service: Unlocking cryp- Encyclopedia of Cryptogra- tography’s full potential. phy and Security. Springer- Computer, 49(9):98–102, Verlag, Berlin, Germany / September 2016. CO- Heidelberg, Germany / REFERENCES 580

London, UK / etc., sec- survey of network traf- ond edition, 2011. ISBN fic anonymisation tech- 1-4419-5905-X (print), 1- niques and implementa- 4419-5906-8 (e-book). xl + tions. ACM Comput- 1416 pp. LCCN ???? ing Surveys, 51(3):52:1– 52:??, July 2018. CODEN Viswanathan:2018:EEG CMSVAN. ISSN 0360-0300 [VTY18] Sreejaya Viswanathan, Rui (print), 1557-7341 (elec- Tan, and David K. Y. tronic). Yau. Exploiting electrical Vazirani:2019:FDI grid for accurate and se- cure clock synchronization. [VV19] Umesh Vazirani and Thomas ACM Transactions on Sen- Vidick. Fully device in- sor Networks, 14(2):12:1– dependent quantum key 12:??, July 2018. CODEN distribution. Communica- ???? ISSN 1550-4859 tions of the Association for (print), 1550-4867 (elec- Computing Machinery,62 tronic). (4):133, April 2019. CO- DEN CACMA2. ISSN Vuagnoux:2010:CAC 0001-0782 (print), 1557- [Vua10] Martin Vuagnoux. Com- 7317 (electronic). URL puter Aided Cryptanalysis https://cacm.acm.org/ from Ciphers to Side Chan- magazines/2019/4/235624/ nels.Th`ese, Ecole´ poly- fulltext. technique f´ed´erale de Lau- Valente:2019:SSA sanne (EPFL), Lausanne, 2010. 191 pp. [VWC19] J. Valente, M. A. Wynn, and A. A. Cardenas. Steal- vanVredendaal:2016:RMM ing, spying, and abusing: [vV16] Christine van Vredendaal. Consequences of attacks on Reduced memory meet-in- Internet of Things devices. the-middle attack against IEEE Security & Privacy, the NTRU private key. 17(5):10–21, September/ LMS Journal of Computa- October 2019. ISSN 1540- tion and Mathematics,19 7993 (print), 1558-4046 (A):43–57, 2016. CODEN (electronic). ???? ISSN 1461-1570. URL Wagstaff:2010:C https://www.cambridge. org/core/product/2FD6898DA25DD88B007F12A56421BA73[Wag10] Samuel S.. Wagstaff, Jr. VanDijkhuizen:2018:SNT Cryptanalysis, chapter 11, pages 1–16. Volume 2 [VV18] Niels Van Dijkhuizen and of Atallah and Blanton Jeroen Van Der Ham. A [AB10b], second edition, REFERENCES 581

2010. ISBN 1-58488-820- 2018/08/researchers-close- 2. LCCN QA76.9.A43 security-vulnerability- A433 2010. URL http: popular-encryption-program. //www.crcnetbase.com/ doi/abs/10.1201/9781584888215- Wang:2010:NSB c11. [Wan10] Xiang Wang. A new SDVS Wagner:2016:TPF based on NTRUSign. In Cheng-Xiang Wang, edi- [Wag16] David Wagner. Tech- tor, Proceedings of the 2010 nical perspective: Fair- International Conference ness and the coin flip. on Communications and Communications of the Mobile Computing (CMC). Association for Comput- 12–14 April 2010, Shen- ing Machinery, 59(4):75, zhen, China, pages 205– April 2016. CODEN ?? IEEE Computer So- CACMA2. ISSN 0001-0782 ciety Press, 1109 Spring (print), 1557-7317 (elec- Street, Suite 300, Silver tronic). URL http:// Spring, MD 20910, USA, cacm.acm.org/magazines/ 2010. ISBN 1-4244-6327-0. 2016/4/200173/fulltext. LCCN ???? URL http: Wo o:2019:UEM //ieeexplore.ieee.org/ servlet/opac?punumber= [WAK+19] Simon S. Woo, Ron Art- 5471195. stein, Elsi Kaiser, Xiao Le, and Jelena Mirkovic. Wang:2013:CRA Using episodic memory for user authentication. [Wan13] Honggang Wang. Communication- ACM Transactions on Pri- resource-aware adaptive vacy and Security (TOPS), watermarking for multi- 22(2):11:1–11:??, April media authentication in 2019. ISSN 2471-2566 wireless multimedia sen- (print), 2471-2574 (elec- sor networks. The Jour- tronic). URL https://dl. nal of Supercomputing,64 acm.org/citation.cfm? (3):883–897, June 2013. id=3308992. CODEN JOSUED. ISSN 0920-8542 (print), 1573- Walter:2018:RCS 0484 (electronic). URL [Wal18] Kenny Walter. Researchers http://link.springer. close security vulnerabil- com/article/10.1007/s11227- ity in popular encryption 010-0500-5. program. R&D Maga- Wang:2014:IIA zine, ??(??):??, August 9, 2018. URL https:// [Wan14] Huaqun Wang. Insecurity www.rdmag.com/article/ of ‘Improved Anonymous REFERENCES 582

Multi-Receiver Identity- Ward:2011:CCM Based Encryption’. The Computer Journal, 57(4): [War11] Mark Ward. Code-cracking 636–638, April 2014. CO- machine returned to life. DEN CMPJA6. ISSN BBC News, May 27, 2011. 0010-4620 (print), 1460- URL http://www.bbc. 2067 (electronic). URL co.uk/news/technology- http://comjnl.oxfordjournals. 13566878. org/content/57/4/636. Watt:2010:IPI full.pdf+html. See [Chi12]. [Wat10] Stephen M. Watt, edi- tor. ISSAC 2010: Proceed- Wang:2018:LRI ings of the 2010 Interna- tional Symposium on Sym- [Wan18a] Zhiwei Wang. Leakage re- bolic and Algebraic Compu- silient ID-based proxy re- tation, July 25–28, 2010, encryption scheme for ac- Munich, Germany.ACM cess control in fog com- Press, New York, NY puting. Future Gen- 10036, USA, 2010. ISBN eration Computer Sys- 1-4503-0150-9. LCCN tems, 87(??):679–685, Oc- QA76.95 .I59 2010. tober 2018. CODEN FG- Waters:2012:FER SEVI. ISSN 0167-739X (print), 1872-7115 (elec- [Wat12] Brent Waters. Func- tronic). URL https:// tional encryption for reg- www.sciencedirect.com/ ular languages. Lecture science/article/pii/S0167739X17310075. Notes in Computer Sci- ence, 7417:218–235, 2012. Wang:2018:PPA CODEN LNCSD9. ISSN 0302-9743 (print), 1611- [Wan18b] Zhiwei Wang. A privacy- 3349 (electronic). URL preserving and account- http://link.springer. able authentication pro- com/chapter/10.1007/978- tocol for IoT end-devices 3-642-32009-5_14/. with weaker identity. Fu- Watts:2014:ICB ture Generation Computer Systems, 82(??):342–348, [Wat14a] Steve Watts. Intelligent May 2018. CODEN FG- combination — the bene- SEVI. ISSN 0167-739X fits of tokenless two-factor (print), 1872-7115 (elec- authentication. Network tronic). URL https:// Security, 2014(8):17–20, www.sciencedirect.com/ August 2014. CODEN science/article/pii/S0167739X17307495. NTSCF5. ISSN 1353-4858 REFERENCES 583

(print), 1872-9371 (elec- Weisse:2017:RLC tronic). URL http:// www.sciencedirect.com/ [WBA17] Ofir Weisse, Valeria Bertacco, science/article/pii/S1353485814700820. and Todd Austin. Regain- ing lost cycles with Hot- Watts:2014:PYI Calls: a fast interface for [Wat14b] Steve Watts. Protect- SGX secure enclaves. ACM ing your identity when SIGARCH Computer Ar- working remotely. Net- chitecture News, 45(2):81– work Security, 2014(1):5– 93, May 2017. CODEN 7, January 2014. CODEN CANED2. ISSN 0163-5964 NTSCF5. ISSN 1353-4858 (print), 1943-5851 (elec- (print), 1872-9371 (elec- tronic). tronic). URL http:// Wright:2010:USP www.sciencedirect.com/ science/article/pii/S1353485814700054[WBC+10]. Charles V. Wright, Lucas Ballard, Scott E. Coull, Watts:2015:HGA Fabian Monrose, and Ger- [Wat15] Steve Watts. The holy grail ald M. Masson. Uncover- of authentication. Network ing spoken phrases in en- Security, 2015(12):18–19, crypted voice over IP con- December 2015. CODEN versations. ACM Trans- NTSCF5. ISSN 1353-4858 actions on Information (print), 1872-9371 (elec- and System Security,13 tronic). URL http:// (4):35:1–35:??, December www.sciencedirect.com/ 2010. CODEN ATISBQ. science/article/pii/S1353485815301136. ISSN 1094-9224 (print), 1557-7406 (electronic). Wang:2012:PCE Wu:2018:ESS [WB12] Qingju Wang and Andrey Bogdanov. The prov- [WCCH18] Libing Wu, Biwen Chen, able constructive effect of Kim-Kwang Raymond Choo, diffusion switching mech- and Debiao He. Effi- anism in CLEFIA-type cient and secure search- block ciphers. Informa- able encryption protocol tion Processing Letters, for cloud-based Internet of 112(11):427–432, June 15, Things. Journal of Parallel 2012. CODEN IF- and Distributed Comput- PLAT. ISSN 0020-0190 ing, 111(??):152–161, Jan- (print), 1872-6119 (elec- uary 2018. CODEN JPD- tronic). URL http:// CER. ISSN 0743-7315 www.sciencedirect.com/ (print), 1096-0848 (elec- science/article/pii/S0020019012000555. tronic). URL http:// REFERENCES 584

www.sciencedirect.com/ uary 2018. CODEN IT- science/article/pii/S074373151730237X. COB4. ISSN 0018-9340 (print), 1557-9956 (elec- Wang:2019:IFT tronic). URL http:/ [WCD19] Gaoli Wang, Zhenfu Cao, /ieeexplore.ieee.org/ and Xiaolei Dong. Im- document/7962191/. proved fault-tolerant ag- Wu:2017:HMA gregate signatures. The Computer Journal, 62(4): [WCXZ17] Ying Wu, Jinyong Chang, 481–489, April 2019. CO- Rui Xue, and Rui Zhang. DEN CMPJA6. ISSN Homomorphic MAC from 0010-4620 (print), 1460- algebraic one-way func- 2067 (electronic). URL tions for network cod- http://academic.oup.com/ ing with small key size. The Computer Journal, comjnl/article/62/4/481/ 5139676. 60(12):1785–1800, Decem- ber 1, 2017. CO- Wang:2018:SNU DEN CMPJA6. ISSN 0010-4620 (print), 1460- [WCFW18] King-Hang Wang, Chien- 2067 (electronic). URL Ming Chen, Weicheng https://academic.oup. Fang, and Tsu-Yang Wu. com/comjnl/article/60/ On the security of a new 12/1785/3885827. ultra-lightweight authenti- cation protocol in IoT en- Wang:2018:SEA vironment for RFID tags. [WDCL18] Haijiang Wang, Xiaolei The Journal of Supercom- Dong, Zhenfu Cao, and puting, 74(1):65–70, Jan- Dongmei Li. Secure and ef- uary 2018. CODEN JO- ficient attribute-based en- SUED. ISSN 0920-8542 cryption with keyword (print), 1573-0484 (elec- search. The Computer tronic). Journal, 61(8):1133–1142, Wei:2018:GCQ August 1, 2018. CODEN CMPJA6. ISSN 0010-4620 [WCL+18] Chun-Yan Wei, Xiao- (print), 1460-2067 (elec- Qiu Cai, Bin Liu, Tian- tronic). URL http:// Yin Wang, and Fei Gao. academic.oup.com/comjnl/ A generic construction article/61/8/1133/4975828. of quantum-oblivious-key- Wei:2012:NTB transfer-based private query with ideal database se- [WDDW12] Zhuo Wei, Xuhua Ding, curity and zero failure. Robert Huijie Deng, and IEEE Transactions on Yongdong Wu. No trade- Computers, 67(1):2–8, Jan- off between confidentiality REFERENCES 585

and performance: An anal- www.sciencedirect.com/ ysis on H.264/SVC par- science/article/pii/S0167739X18303959. tial encryption. Lecture Notes in Computer Sci- Wazid:2018:AKM ence, 7394:72–86, 2012. [WDV18] Mohammad Wazid, Ashok Ku- CODEN LNCSD9. ISSN mar Das, and Athana- 0302-9743 (print), 1611- sios V. Vasilakos. Au- 3349 (electronic). URL thenticated key manage- http://link.springer. ment protocol for cloud- com/chapter/10.1007/978- assisted body area sensor 3-642-32805-3_6/. networks. Journal of Net- Wang:2019:FTSa work and Computer Appli- cations, 123(??):112–126, [WDG19] Leimin Wang, Tiandu December 1, 2018. CO- Dong, and Ming-Feng DEN JNCAF3. ISSN 1084- Ge. Finite-time syn- 8045 (print), 1095-8592 chronization of memris- (electronic). URL http:// tor chaotic systems and www.sciencedirect.com/ its application in im- science/article/pii/S1084804518302960. age encryption. Applied Wang:2019:SFE Mathematics and Com- putation, 347(??):293–305, [WDZ19] Xiaofen Wang, Hong-Ning April 15, 2019. CODEN Dai, and Ke Zhang. Secure AMHCBQ. ISSN 0096- and flexible economic data 3003 (print), 1873-5649 sharing protocol based on (electronic). URL http:// ID-based dynamic exclu- www.sciencedirect.com/ sive broadcast encryption science/article/pii/S0096300318309901. in economic system. Future Generation Computer Sys- Wazid:2019:DSK tems, 99(??):177–185, Oc- [WDKV19] Mohammad Wazid, Ashok Ku- tober 2019. CODEN FG- mar Das, Neeraj Kumar, SEVI. ISSN 0167-739X and Athanasios V. Vasi- (print), 1872-7115 (elec- lakos. Design of secure key tronic). URL http:// management and user au- www.sciencedirect.com/ thentication scheme for fog science/article/pii/S0167739X18316145. computing services. Fu- Wang:2013:SES ture Generation Computer Systems, 91(??):475–492, [WDZL13] Guojun Wang, Qiushuang February 2019. CODEN Du, Wei Zhou, and Qin FGSEVI. ISSN 0167-739X Liu. A scalable encryp- (print), 1872-7115 (elec- tion scheme for multi- tronic). URL https:// privileged group communi- REFERENCES 586

cations. The Journal of Su- Foundations of Computer percomputing, 64(3):1075– Science (IJFCS), 29(7):??, 1091, June 2013. CO- November 2018. ISSN DEN JOSUED. ISSN 0129-0541. URL https: 0920-8542 (print), 1573- //www.worldscientific. 0484 (electronic). URL com/doi/10.1142/S0129054118500235. http://link.springer. Wang:2016:SSS com/article/10.1007/s11227- 011-0683-4. [WGF16] Xianfang Wang, Jian Gao, West:2015:EC and Fang-Wei Fu. Se- cret sharing schemes from [Wes15] Tom West. The Einstein linear codes over F + code. Pan Books, Lon- p νF . International Jour- don, UK, 2015. ISBN 1- p nal of Foundations of Com- 4472-1034-4 (paperback), puter Science (IJFCS),27 1-4472-4660-8 (ePub e- (5):595–??, August 2016. book). 400 pp. LCCN ???? CODEN IFCSEN. ISSN Wess:2016:JWM 0129-0541. [Wes16] Jane Wess. John Wal- Wang:2010:DVT lis (1616–1703). Mathe- [WGJT10] Xiaofeng Wang, Philippe matics, music theory, and Golle, Markus Jakobsson, cryptography in 17th cen- and Alex Tsow. Deter- tury Oxford. Oxford Uni- ring voluntary trace disclo- versity Mathematical Insti- sure in re-encryption mix- tute, 9 June 2016. BSHM networks. ACM Transac- Bulletin: Journal of the tions on Information and British Society for the His- System Security, 13(2): tory of Mathematics,31 18:1–18:??, February 2010. (3):252–253, 2016. CO- CODEN ATISBQ. ISSN DEN ???? ISSN 1749- 1094-9224 (print), 1557- 8430 (print), 1749-8341 7406 (electronic). (electronic). URL http: //www.tandfonline.com/ Wang:2012:BRR doi/full/10.1080/17498430. 2016.1215868. [WgMdZlZ12] Ding Wang, Chun guang Wang:2018:ERS Ma, Sen dong Zhao, and Chang li Zhou. Break- [WGD18] Hong Wang, Jie Guan, and ing a robust remote user Lin Ding. On equivalence authentication scheme us- relations of state diagram ing smart cards. Lecture of cascade connection of Notes in Computer Sci- an LFSR into an NFSR. ence, 7513:110–118, 2012. International Journal of CODEN LNCSD9. ISSN REFERENCES 587

0302-9743 (print), 1611- PRESENT with area opti- 3349 (electronic). URL mization for RFID appli- http://link.springer. cations. ACM Transac- com/chapter/10.1007/978- tions on Embedded Com- 3-642-35606-3_13/. puting Systems, 16(4): 102:1–102:??, August 2017. Wang:2012:SPB CODEN ???? ISSN 1539- [WgMW12] Ding Wang, Chun guang 9087 (print), 1558-3465 Ma, and Peng Wu. Secure (electronic). password-based remote Wang:2018:GAD user authentication scheme with non-tamper resistant [WH18] Lin Wang and Zhi Hu. On smart cards. Lecture graph algorithms for de- Notes in Computer Sci- generacy test and recursive ence, 7371:114–121, 2012. description of stream ci- CODEN LNCSD9. ISSN phers. Fundamenta Infor- 0302-9743 (print), 1611- maticae, 160(3):343–359, 3349 (electronic). URL ???? 2018. CODEN FU- http://link.springer. MAAJ. ISSN 0169-2968 com/chapter/10.1007/978- (print), 1875-8681 (elec- 3-642-31540-4_9/. tronic). Wei:2012:NCI Wang:2015:EFF

[WGZ+12] Xiaopeng Wei, Ling Guo, [WHC+15] Wei Wang, Yin Hu, Qiang Zhang, Jianxin Lianmu Chen, Xinming Zhang, and Shiguo Lian. Huang, and B. Sunar. Ex- A novel color image en- ploring the feasibility of cryption algorithm based fully homomorphic encryp- on DNA sequence oper- tion. IEEE Transactions ation and hyper-chaotic on Computers, 64(3):698– system. The Journal 706, March 2015. CODEN of Systems and Software, ITCOB4. ISSN 0018-9340 85(2):290–299, February (print), 1557-9956 (elec- 2012. CODEN JS- tronic). SODM. ISSN 0164-1212 (print), 1873-1228 (elec- Wang:2017:DVP tronic). URL http:// [WHJ17] Huaqun Wang, Debiao He, www.sciencedirect.com/ and Yimu Ji. Designated- science/article/pii/S0164121211002147. verifier proof of assets for Wang:2017:DRM Bitcoin exchange using el- liptic curve cryptography. [WH17] Yi Wang and Yajun Ha. A Future Generation Com- DFA-resistant and masked puter Systems, ??(??):??, REFERENCES 588

???? 2017. CODEN FG- ZUC. Lecture Notes in SEVI. ISSN 0167-739X Computer Science, 7658: (print), 1872-7115 (elec- 262–277, 2012. CO- tronic). URL http:// DEN LNCSD9. ISSN www.sciencedirect.com/ 0302-9743 (print), 1611- science/article/pii/S0167739X1731350X. 3349 (electronic). URL http://link.springer. Wei:2016:PAB com/chapter/10.1007/978- [WHLH16] Jianghong Wei, Xinyi 3-642-34961-4_17/. Huang, Wenfen Liu, and Xuexian Hu. Practical Wang:2012:FOP attribute-based signature: Traceability and revocabil- [WHY+12] Xu An Wang, Xinyi ity. The Computer Journal, Huang, Xiaoyuan Yang, 59(11):1714–1734, Novem- Longfei Liu, and Xuguang ber 2016. CODEN CM- Wu. Further observa- PJA6. ISSN 0010-4620 tion on proxy re-encryption (print), 1460-2067 (elec- with keyword search. The tronic). URL http:// Journal of Systems and comjnl.oxfordjournals. Software, 85(3):643–654, org/content/59/11/1714. March 2012. CODEN JS- SODM. ISSN 0164-1212 Wei:2017:CES (print), 1873-1228 (elec- [WHLH17] Jianghong Wei, Xinyi tronic). URL http:// Huang, Wenfen Liu, and www.sciencedirect.com/ Xuexian Hu. Cost-effective science/article/pii/S0164121211002433. and scalable data shar- ing in cloud storage us- Wang:2012:NFS ing hierarchical attribute- based encryption with for- [WHZ12] Hui Wang, Anthony T. S. ward security. Interna- Ho, and Xi Zhao. A novel tional Journal of Foun- fast self-restoration semi- dations of Computer Sci- fragile watermarking algo- ence (IJFCS), 28(7):843– rithm for image content ??, November 2017. CO- authentication resistant to DEN IFCSEN. ISSN 0129- JPEG compression. Lec- 0541. ture Notes in Computer Wu:2012:DAA Science, 7128:72–85, 2012. CODEN LNCSD9. ISSN [WHN+12] Hongjun Wu, Tao Huang, 0302-9743 (print), 1611- Phuong Ha Nguyen, Huax- 3349 (electronic). URL iong Wang, and San http://link.springer. Ling. Differential at- com/chapter/10.1007/978- tacks against stream cipher 3-642-32205-1_8/. REFERENCES 589

Wang:2019:RSI window to completely break libgcrypt RSA- [WHZ+19] Ping Wang, Xing He, 1024. Web blog., July Yushu Zhang, Wenying 6, 2017. URL https:/ Wen, and Ming Li. A /www.scmagazineuk.com/ robust and secure image researchers-open-sliding- sharing scheme with per- window-to-completely- sonal identity information break-libgcrypt-rsa-1024/ embedded. Computers & article/673178/. See Security, 85(??):107–121, [BBG+17]. August 2019. CODEN CPSEDU. ISSN 0167-4048 Wang:2019:MBN (print), 1872-6208 (elec- [WJ19] Qian Wang and Chenhui tronic). URL https:// Jin. A method to bound www.sciencedirect.com/ the number of active S- science/article/pii/S0167404819300914. boxes for a kind of AES-like Willyard:2011:MM structure. The Computer Journal, 62(8):1121–1131, [Wil11] C. Willyard. Me, myself, or August 2019. CODEN I. IEEE Spectrum, 48(6): CMPJA6. ISSN 0010-4620 52–84, June 2011. CODEN (print), 1460-2067 (elec- IEESAM. ISSN 0018-9235 tronic). URL http:// (print), 1939-9340 (elec- academic.oup.com/comjnl/ tronic). article/62/8/1121/5319150.

Williams:2018:FPD Wang:2018:VMF [WK18] Nana Wang and Mohan [Wil18] Michael Williams. The Kankanhalli. 2D vector first public discussion map fragile watermark- of the secret Colossus ing with region location. Project. IEEE Annals ACM Transactions on Spa- of the History of Com- tial Algorithms and Sys- puting, 40(1):84–87, Jan- tems (TSAS), 4(4):12:1– uary/March 2018. CO- 12:??, October 2018. CO- DEN IAHCEX. ISSN DEN ???? ISSN 2374- 1058-6180 (print), 1934- 0353. URL https://dl. 1547 (electronic). URL acm.org/citation.cfm? https://www.computer. id=3239163. org/csdl/mags/an/2018/ 01/man2018010084.pdf. Wang:2016:DRS Winder:2017:ROS [WKB16] Zhen Wang, Mark Kar- povsky, and Lake Bu. De- [Win17] Davey Winder. Re- sign of reliable and secure searchers open sliding devices realizing Shamir’s REFERENCES 590

secret sharing. IEEE 1532-0626 (print), 1532- Transactions on Comput- 0634 (electronic). ers, 65(8):2443–2455, ???? 2016. CODEN ITCOB4. Wu:2019:VFS ISSN 0018-9340 (print), 1557-9956 (electronic). [WL19] Zhiqiang Wu and Kenli Li. VBTree: forward se- Wu:2011:HQI cure conjunctive queries over encrypted data for [WKH11] Chia-Chun Wu, Shang- cloud computing. VLDB Juh Kao, and Min-Shiang Journal: Very Large Data Hwang. A high qual- Bases, 28(1):25–46, Febru- ity image sharing with ary 2019. CODEN steganography and adap- VLDBFR. ISSN 1066-8888 tive authentication scheme. (print), 0949-877X (elec- The Journal of Systems tronic). and Software, 84(12):2196– 2207, December 2011. CO- Wei:2012:IRK DEN JSSODM. ISSN 0164-1212 (print), 1873- [WLC12] Yuechuan Wei, Chao Li, 1228 (electronic). URL and Dan Cao. Improved http://www.sciencedirect. related-key rectangle at- com/science/article/pii/ tack on the full HAS-160 S0164121211001488. encryption mode. Inter- Weissman:2011:LLB national Journal of Foun- dations of Computer Sci- [WL11] Clark Weissman and Timo- ence (IJFCS), 23(3):733– thy Levin. Lessons learned ??, April 2012. CODEN from building a high- IFCSEN. ISSN 0129-0541 assurance crypto gateway. (print), 1793-6373 (elec- IEEE Security & Pri- tronic). vacy, 9(1):31–39, January/ February 2011. ISSN 1540- Wang:2011:RBM 7993 (print), 1558-4046 (electronic). [WLDB11] Kai Wang, Guillaume Lavou´e, Florence Denis, Wang:2012:MCE and Atilla Baskurt. Ro- [WL12] Jinwei Wang and Shiguo bust and blind mesh wa- Lian. On multiwatermark- termarking based on vol- ing in cloud environment. ume moments. Computers Concurrency and Compu- and Graphics, 35(1):1–19, tation: Practice and Expe- February 2011. CODEN rience, 24(17):2151–2164, COGRD2. ISSN 0097-8493 December 10, 2012. CO- (print), 1873-7684 (elec- DEN CCPEBO. ISSN tronic). URL http:// REFERENCES 591

www.sciencedirect.com/ tronic). URL http:// science/article/pii/S0097849310001433. comjnl.oxfordjournals. org/content/58/10/2492. Wang:2017:CAS Wei:2014:EEF [WLFX17] Changji Wang, Yuan Li, Jian Fang, and Jianguo [WLS14] Guiyi Wei, Rongxing Lu, Xie. Cloud-aided scal- and Jun Shao. EFADS: Ef- able revocable identity- ficient, flexible and anony- based encryption scheme mous data sharing protocol with ciphertext update. for cloud computing with Concurrency and Compu- proxy re-encryption. Jour- tation: Practice and Ex- nal of Computer and Sys- perience, 29(20):??, Octo- tem Sciences, 80(8):1549– ber 25, 2017. CODEN 1562, December 2014. CO- CCPEBO. ISSN 1532-0626 DEN JCSSBM. ISSN 0022- (print), 1532-0634 (elec- 0000 (print), 1090-2724 tronic). (electronic). URL http:// www.sciencedirect.com/ Wang:2013:HCL science/article/pii/S0022000014000658. [WLH13] Kan Wang, Zhe-Ming Wang:2011:HAB Lu, and Yong-Jian Hu. [WLWG11] Guojun Wang, Qin Liu, Jie A high capacity loss- Wu, and Minyi Guo. Hi- less data hiding scheme erarchical attribute-based for JPEG images. The encryption and scalable Journal of Systems and user revocation for sharing Software, 86(7):1965–1975, data in cloud servers. Com- July 2013. CODEN JS- puters & Security, 30(5): SODM. ISSN 0164-1212 320–331, July 2011. CO- (print), 1873-1228 (elec- DEN CPSEDU. ISSN tronic). URL http:// 0167-4048 (print), 1872- www.sciencedirect.com/ 6208 (electronic). URL science/article/pii/S0164121213000812. https://www.sciencedirect. Wei:2015:FST com/science/article/pii/ S0167404811000678. [WLH15] Jianghong Wei, Wenfen Wu:2015:TRM Liu, and Xuexian Hu. Forward-secure threshold [WLY+15] Guowei Wu, Zuosong Liu, attribute-based signature Lin Yao, Jing Deng, and scheme. The Computer Jie Wang. A trust rout- Journal, 58(10):2492–2506, ing for multimedia so- October 2015. CODEN cial networks. The Com- CMPJA6. ISSN 0010-4620 puter Journal, 58(4):688– (print), 1460-2067 (elec- 699, April 2015. CODEN REFERENCES 592

CMPJA6. ISSN 0010-4620 Rongmao Chen. Privacy- (print), 1460-2067 (elec- preserving data search and tronic). URL http:// sharing protocol for social comjnl.oxfordjournals. networks through wireless org/content/58/4/688. applications. Concurrency and Computation: Practice Wang:2017:ABS and Experience, 29(7):??, [WLY17] Qi Wang, Xiangxue Li, and April 10, 2017. CODEN Yu Yu. Anonymity for Bit- CCPEBO. ISSN 1532-0626 coin from secure escrow ad- (print), 1532-0634 (elec- dress. IEEE Access, ??(??): tronic). 1, ???? 2017. ISSN 2169- 3536. Wu:2012:PSC

Wang:2016:LLE [WMS+12] Wei Wu, Yi Mu, Willy [WLZ+16] Mingzhong Wang, Dan Susilo, Xinyi Huang, and Liu, Liehuang Zhu, Yongjun Li Xu. A provably secure Xu, and Fei Wang. LESPP: construction of certificate- lightweight and efficient based encryption from strong privacy preserving certificateless encryption. authentication scheme for The Computer Journal, secure VANET communi- 55(10):1157–1168, Octo- cation. Computing, 98(7): ber 2012. CODEN CM- 685–708, July 2016. CO- PJA6. ISSN 0010-4620 DEN CMPTA2. ISSN (print), 1460-2067 (elec- 0010-485X (print), 1436- tronic). URL http:// 5057 (electronic). comjnl.oxfordjournals. org/content/55/10/1157. Wang:2012:RTC full.pdf+html.

[WLZL12] Liyun Wang, Hefei Ling, Watanabe:2014:OAC Fuhao Zou, and Zhengding Lu. Real-time compressed- [WMU14] Shun Watanabe, Ryutaroh domain video watermark- Matsumoto, and Tomohiko ing resistance to geomet- Uyematsu. Optimal axis ric distortions. IEEE Mul- compensation in quantum tiMedia, 19(1):70–79, Jan- key distribution protocols uary/March 2012. CODEN over unital channels. The- IEMUE4. ISSN 1070-986X oretical Computer Science, (print), 1941-0166 (elec- 560 (part 1)(??):91–106, tronic). December 4, 2014. CO- Wang:2017:PPD DEN TCSCDI. ISSN 0304- 3975 (print), 1879-2294 [WMC17] Xiaofen Wang, Yi Mu, and (electronic). URL http:// REFERENCES 593

www.sciencedirect.com/ CMPJA6. ISSN 0010-4620 science/article/pii/S0304397514006987. (print), 1460-2067 (elec- tronic). URL http:// Wang:2017:CES comjnl.oxfordjournals. [WMX+17] Xu An Wang, Jianfeng org/content/58/10/2443. Ma, Fatos Xhafa, Mingwu Wu:2012:UFS Zhang, and Xiaoshuang Luo. Cost-effective secure [WOLS12] Xiaotian Wu, Duanhao Ou, e-health cloud system us- Qiming Liang, and Wei ing identity based crypto- Sun. A user-friendly se- graphic techniques. Fu- cret image sharing scheme ture Generation Computer with reversible steganog- Systems, 67(??):242–254, raphy based on cellular February 2017. CODEN automata. The Jour- FGSEVI. ISSN 0167-739X nal of Systems and Soft- (print), 1872-7115 (elec- ware, 85(8):1852–1863, Au- tronic). URL http:// gust 2012. CODEN JS- www.sciencedirect.com/ SODM. ISSN 0164-1212 science/article/pii/S0167739X16302588. (print), 1873-1228 (elec- tronic). URL http:// Won:2016:PAA www.sciencedirect.com/ [WMYR16] Jongho Won, Chris Y. T. science/article/pii/S0164121212000696. Ma, David K. Y. Yau, Wendzel:2015:CME and Nageswara S. V. Rao. Privacy-assured aggrega- [WP15] S. Wendzel and C. Palmer. tion protocol for smart me- Creativity in mind: Evalu- tering: a proactive fault- ating and maintaining ad- tolerant approach. IEEE/ vances in network stegano- ACM Transactions on Net- graphic research. J.UCS: working, 24(3):1661–1674, Journal of Universal Com- June 2016. CODEN puter Science, 21(12): IEANEP. ISSN 1063-6692 1684–??, ???? 2015. CO- (print), 1558-2566 (elec- DEN ???? ISSN 0948- tronic). 695X (print), 0948-6968 (electronic). URL http:/ Wang:2015:HAD /www.jucs.org/jucs_21_ [WOLP15] Xing Wang, Nga Lam Or, 12/creativity_in_mind_ Ziyan Lu, and Derek Pao. evaluating. Hardware accelerator to Wang:2017:PPK detect multi-segment virus patterns. The Computer [WP17] Yujue Wang and Hwee- Journal, 58(10):2443–2460, Hwa Pang. Probabilistic October 2015. CODEN public key encryption for REFERENCES 594

controlled equijoin in re- Contributory broadcast en- lational databases. The cryption with efficient en- Computer Journal, 60(4): cryption and short cipher- 600–612, March 23, 2017. texts. IEEE Transactions CODEN CMPJA6. ISSN on Computers, 65(2):466– 0010-4620 (print), 1460- 479, ???? 2016. CODEN 2067 (electronic). URL ITCOB4. ISSN 0018-9340 https://academic.oup. (print), 1557-9956 (elec- com/comjnl/article/60/ tronic). 4/600/2354608. Wei:2015:TPE Wang:2016:SEP [WR15] Lei Wei and Michael K. [WPZM16] Xinlei Wang, Amit Pande, Reiter. Toward practi- Jindan Zhu, and Prasant cal encrypted email that Mohapatra. STAMP: En- supports private, regular- abling privacy-preserving expression searches. In- location proofs for mobile ternational Journal of In- users. IEEE/ACM Trans- formation Security, 14(5): actions on Networking,24 397–416, October 2015. (6):3276–3289, December CODEN ???? ISSN 2016. CODEN IEANEP. 1615-5262 (print), 1615- ISSN 1063-6692 (print), 5270 (electronic). URL 1558-2566 (electronic). http://link.springer. Wu:2013:FTR com/article/10.1007/s10207- 014-0268-3; http:// [WQZ+13] Qianhong Wu, Bo Qin, link.springer.com/content/ Lei Zhang, Josep Domingo- pdf/10.1007/s10207-014- Ferrer, and Jes´us A. 0268-3.pdf. Manj´on. Fast transmis- sion to remote cooperative Wani:1970:PEA groups: a new key man- [WRP70] Abdul Raoof Wani, Q. P. agement paradigm. IEEE/ Rana, and Nitin Pandey. ACM Transactions on Net- Performance evaluation working, 21(2):621–633, and analysis of advanced April 2013. CODEN symmetric key crypto- IEANEP. ISSN 1063-6692 graphic algorithms for (print), 1558-2566 (elec- cloud computing security. tronic). In Kanad Ray, Tarun K. Wu:2016:CBE Sharma, Sanyog Rawat, R. K. Saini, and Anirban [WQZ+16] Q. Wu, B. Qin, L. Zhang, Bandyopadhyay, editors, J. Domingo-Ferrer, O. Far- Soft Computing: Theories ras, and J. A. Manjon. and Applications: Proceed- REFERENCES 595

ings of SoCTA 2017, pages problems and challenges 261–270. Springer-Verlag, in a machine learning- Berlin, Germany / Heidel- based hybrid big data pro- berg, Germany / London, cessing network systems. UK / etc., 1970. ISBN ACM SIGMETRICS Per- 981-13-0588-9 (print), 981- formance Evaluation Re- 13-0589-7 (e-book). ISSN view, 41(4):82–85, March 2194-5357 (print), 2194- 2014. CODEN ???? ISSN 5365 (electronic). LCCN 0163-5999 (print), 1557- QA76.9.S63. URL http:/ 9484 (electronic). /link.springer.com/10. 1007/978-981-13-0589- Wo odworth:2019:SSS 4. [WS19] Jason W. Woodworth and Wu:2012:RGB Mohsen Amini Salehi. S3BD: Secure semantic [WS12] Xiaotian Wu and Wei search over encrypted big Sun. Random grid-based data in the cloud. Con- visual secret sharing for currency and Computa- general access structures tion: Practice and Ex- with cheat-preventing abil- perience, 31(11):e5050:1– ity. The Journal of Systems e5050:??, June 10, 2019. and Software, 85(5):1119– CODEN CCPEBO. ISSN 1134, May 2012. CODEN 1532-0626 (print), 1532- JSSODM. ISSN 0164-1212 0634 (electronic). (print), 1873-1228 (elec- tronic). URL http:// Wang:2015:RSA www.sciencedirect.com/ science/article/pii/S0164121211003220[WSA15]. Yang Wang, Willy Susilo, and Man Ho Au. Revisit- Williams:2013:APC ing security against the ar- [WS13] Peter Williams and Radu bitrator in optimistic fair Sion. Access privacy and exchange. The Computer correctness on untrusted Journal, 58(10):2665–2676, storage. ACM Trans- October 2015. CODEN actions on Information CMPJA6. ISSN 0010-4620 and System Security,16 (print), 1460-2067 (elec- (3):12:1–12:??, November tronic). URL http:// 2013. CODEN ATISBQ. comjnl.oxfordjournals. ISSN 1094-9224 (print), org/content/58/10/2665. 1557-7406 (electronic). Wang:2014:NDH Whitworth:2014:SPC [WSC14] Zhiwei Wang, Guozi Sun, [WS14] Jeff Whitworth and Shan and Danwei Chen. A Suthaharan. Security new definition of homo- REFERENCES 596

morphic signature for iden- Watanabe:2012:ITT tity management in mobile cloud computing. Jour- [WSS12] Yohei Watanabe, Takenobu nal of Computer and Sys- Seito, and Junji Shikata. tem Sciences, 80(3):546– Information-theoretic timed- 553, May 2014. CODEN release security: Key- JCSSBM. ISSN 0022-0000 agreement, encryption, (print), 1090-2724 (elec- and authentication codes. tronic). URL http:// Lecture Notes in Com- www.sciencedirect.com/ puter Science, 7412:167– science/article/pii/S0022000013001190. 186, 2012. CODEN LNCSD9. ISSN 0302-9743 Wang:2019:CPB (print), 1611-3349 (elec- tronic). URL http:// [WSL+19] Licheng Wang, Xiaoying link.springer.com/chapter/ Shen, Jing Li, Jun Shao, 10.1007/978-3-642-32284- and Yixian Yang. Cryp- 6_10/. tographic primitives in Wei:2019:VFA blockchains. Journal of Network and Computer [WSS+19] Shih-En Wei, Jason Saragih, Applications, 127(??):43– Tomas Simon, Adam W. 58, February 1, 2019. CO- Harley, Stephen Lombardi, DEN JNCAF3. ISSN 1084- Michal Perdoch, Alexan- 8045 (print), 1095-8592 der Hypes, Dawei Wang, (electronic). URL http:// Hernan Badino, and Yaser www.sciencedirect.com/ Sheikh. VR facial anima- science/article/pii/S108480451830362X. tion via multiview image translation. ACM Trans- Wu:2016:BPK actions on Graphics,38 (4):67:1–67:??, July 2019. [WSQ+16] Qianhong Wu, Yang Sun, CODEN ATGRDF. ISSN Bo Qin, Jiankun Hu, 0730-0301 (print), 1557- Weiran Liu, Jianwei Liu, 7368 (electronic). and Yong Ding. Batch pub- Wang:2012:PAC lic key cryptosystem with batch multi-exponentiation. [WSSO12] Lei Wang, Yu Sasaki, Future Generation Com- Kazuo Sakiyama, and puter Systems, 62(??):196– Kazuo Ohta. Polynomial- 204, September 2016. CO- advantage cryptanalysis of DEN FGSEVI. ISSN 0167- 3D cipher and 3D-based 739X (print), 1872-7115 hash function. Lecture (electronic). URL http:// Notes in Computer Sci- www.sciencedirect.com/ ence, 7631:170–181, 2012. science/article/pii/S0167739X15003933. CODEN LNCSD9. ISSN REFERENCES 597

0302-9743 (print), 1611- 113(14–16):567–571, July/ 3349 (electronic). URL August 2013. CODEN IF- http://link.springer. PLAT. ISSN 0020-0190 com/chapter/10.1007/978- (print), 1872-6119 (elec- 3-642-34117-5_11/. tronic). URL http:// Wu:2010:EUA www.sciencedirect.com/ science/article/pii/S0020019013001348. [WT10a] Tsu-Yang Wu and Yuh- Min Tseng. An effi- Wu:2012:RIB cient user authentication [WTT12] Tsu-Yang Wu, Yuh-Min and key exchange pro- Tseng, and Tung-Tso Tsai. tocol for mobile client– A revocable ID-based au- server environment. Com- thenticated group key ex- puter Networks (Amster- change protocol with resis- dam, Netherlands: 1999), tant to malicious partici- 54(9):1520–1530, June 17, pants. Computer Networks 2010. CODEN ???? ISSN (Amsterdam, Netherlands: 1389-1286. 1999), 56(12):2994–3006, Wu:2010:IBM August 16, 2012. CO- DEN ???? ISSN 1389-1286 [WT10b] Tsu-Yang Wu and Yuh- (print), 1872-7069 (elec- Min Tseng. An ID-based tronic). URL http:// mutual authentication and www.sciencedirect.com/ key exchange protocol for science/article/pii/S1389128612001995. low-power mobile devices. The Computer Journal, Wu:2016:LTN 53(7):1062–1070, Septem- ber 2010. CODEN CM- [Wu16] Felix Wu. Law and PJA6. ISSN 0010-4620 technology: No easy an- (print), 1460-2067 (elec- swers in the fight over tronic). URL http:// iPhone decryption. Com- comjnl.oxfordjournals. munications of the As- org/cgi/content/abstract/ sociation for Computing 53/7/1062; http://comjnl. Machinery, 59(9):20–22, oxfordjournals.org/cgi/ September 2016. CODEN reprint/53/7/1062. CACMA2. ISSN 0001-0782 (print), 1557-7317 (elec- Wang:2013:NMC tronic). URL http:// [WT13] Qichun Wang and Chik How cacm.acm.org/magazines/ Tan. A new method to 2016/9/206250/fulltext. construct Boolean func- Wu:2017:SPM tions with good crypto- graphic properties. Infor- [Wu17] Wei-Chen Wu. A secret mation Processing Letters, push messaging service in REFERENCES 598

VANET clouds. The Jour- tions. Computer Networks nal of Supercomputing,73 (Amsterdam, Netherlands: (7):3085–3097, July 2017. 1999), 73(??):41–57, Novem- CODEN JOSUED. ISSN ber 14, 2014. CODEN 0920-8542 (print), 1573- ???? ISSN 1389-1286 0484 (electronic). (print), 1872-7069 (elec- tronic). URL http:// Wu:2012:AST www.sciencedirect.com/ [WW12] Shengbao Wu and Ming- science/article/pii/S1389128614002643. sheng Wang. Automatic Wen:2014:MZC search of truncated im- possible differentials for word-oriented block ci- [WWBC14] Long Wen, Meiqin Wang, phers. Lecture Notes in Andrey Bogdanov, and Computer Science, 7668: Huaifeng Chen. Multidi- 283–302, 2012. CO- mensional zero-correlation DEN LNCSD9. ISSN attacks on lightweight 0302-9743 (print), 1611- block cipher HIGHT: Im- 3349 (electronic). URL proved cryptanalysis of an ISO standard. Information http://link.springer. com/chapter/10.1007/978- Processing Letters, 114(6): 3-642-34931-7_17/. 322–330, June 2014. CO- DEN IFPLAT. ISSN 0020- Willis:2013:IFI 0190 (print), 1872-6119 (electronic). URL http:// [WW13] Karl D. D. Willis and An- www.sciencedirect.com/ drew D. Wilson. InfraS- science/article/pii/S0020019014000088. tructs: fabricating infor- mation inside physical ob- Wang:2011:MMW jects for imaging in the ter- ahertz region. ACM Trans- [WWC+11] Yini Wang, Sheng Wen, actions on Graphics, 32(4): Silvio Cesare, Wanlei Zhou, 138:1–138:??, July 2013. and Yang Xiang. The CODEN ATGRDF. ISSN microcosmic model of 0730-0301 (print), 1557- worm propagation. The 7368 (electronic). Computer Journal,54 Wang:2014:ATF (10):1700–1720, October 2011. CODEN CM- [WW14] Ding Wang and Ping PJA6. ISSN 0010-4620 Wang. On the anonymity (print), 1460-2067 (elec- of two-factor authentica- tronic). URL http:// tion schemes for wire- comjnl.oxfordjournals. less sensor networks: At- org/content/54/10/1700. tacks, principle and solu- full.pdf+html. REFERENCES 599

Weng:2012:NCC ???? ISSN 1389-1286 (print), 1872-7069 (elec- [WWHL12] Zhiwei Weng, Jian Weng, tronic). URL http:// Kai He, and Yingkai Li. www.sciencedirect.com/ New chosen ciphertext se- science/article/pii/S1389128617301664. cure public key encryption in the standard model with Wang:2011:CIB public verifiability. Lecture Notes in Computer Sci- [WWYY11] Xu An Wang, Jian Weng, ence, 6839:170–176, 2012. Xiaoyuan Yang, and Yan- CODEN LNCSD9. ISSN jiang Yang. Crypt- 0302-9743 (print), 1611- analysis of an identity 3349 (electronic). URL based broadcast encryption scheme without random or- http://link.springer. acles. Information Pro- com/content/pdf/10.1007/ cessing Letters, 111(10): 978-3-642-25944-9_22. 461–464, April 30, 2011. Wahaballa:2014:MLS CODEN IFPLAT. ISSN

+ 0020-0190 (print), 1872- [WWL 14] Abubaker Wahaballa, Os- 6119 (electronic). man Wahballa, Fagen Li, Mohammed Ramadan, and Wang:2011:CHI Zhiguang Qin. Multiple- layered securities using [WWYZ11] Xu An Wang, Jian Weng, steganography and cryp- Xiaoyuan Yang, and Min- tography. International qing Zhang. Crypt- Journal of Computer Ap- analysis of an (hierarchi- plications, 36(3):93–100, cal) identity based paral- 2014. ISSN 1206-212X lel key-insulated encryp- (print), 1925-7074 (elec- tion scheme. The Journal tronic). URL https: of Systems and Software, //www.tandfonline.com/ 84(2):219–225, February doi/full/10.2316/Journal. 2011. CODEN JSSODM. 202.2014.3.202-3917. ISSN 0164-1212. Werner:2017:CIM Wu:2017:EAK [WWW17] Jorge Werner, Carla Merkle [WXK+17] Fan Wu, Lili Xu, Saru Westphall, and Carlos Becker Kumari, Xiong Li, Jian Westphall. Cloud iden- Shen, Kim-Kwang Ray- tity management: a sur- mond Choo, Mohammad vey on privacy strate- Wazid, and Ashok Kumar gies. Computer Networks Das. An efficient authenti- (Amsterdam, Netherlands: cation and key agreement 1999), 122(??):29–42, July scheme for multi-gateway 20, 2017. CODEN wireless sensor networks in REFERENCES 600

IoT deployment. Journal Wang:2019:CSS of Network and Computer Applications, 89(??):72–85, [WXMZ19] Xu An Wang, Fatos Xhafa, July 1, 2017. CODEN JN- Jianfeng Ma, and Zhiheng CAF3. ISSN 1084-8045 Zheng. Controlled secure (print), 1095-8592 (elec- social cloud data sharing tronic). URL http:// based on a novel identity www.sciencedirect.com/ based proxy re-encryption science/article/pii/S1084804516303150. plus scheme. Journal of Parallel and Distributed Wang:2017:FWA Computing, 130(??):153– 165, August 2019. CODEN + [WXL 17] Ran Wang, Guangquan JPDCER. ISSN 0743-7315 Xu, Bin Liu, Yan Cao, (print), 1096-0848 (elec- and Xiaohong Li. Flow tronic). URL http:// watermarking for anti- www.sciencedirect.com/ noise and multistream trac- science/article/pii/S0743731519302345. ing in anonymous net- works. IEEE MultiMe- Wang:2019:NTB dia, 24(4):38–47, Octo- ber/December 2017. CO- [WXSH19] Chen Wang, Lu Xiao, Jian DEN IEMUE4. ISSN Shen, and Rui Huang. 1070-986X (print), 1941- Neighborhood trustworthiness- 0166 (electronic). URL based vehicle-to-vehicle au- https://www.computer. thentication scheme for ve- org/csdl/mags/mu/2017/ hicular ad hoc networks. 04/mmu2017040038-abs. Concurrency and Compu- html. tation: Practice and Ex- perience, 31(21):e4643:1– Wang:2016:SHI e4643:??, November 10, 2019. CODEN CCPEBO. [WXLY16] Wei Wang, Peng Xu, Hui ISSN 1532-0626 (print), Li, and Laurence Tian- 1532-0634 (electronic). ruo Yang. Secure hybrid- indexed search for high Wang:2017:SRS efficiency over keyword searchable ciphertexts. Fu- [WXY+17] Wei Wang, Peng Xu, Lau- ture Generation Computer rence Tianruo Yang, Willy Systems, 55(??):353–361, Susilo, and Jinjun Chen. February 2016. CODEN Securely reinforcing syn- FGSEVI. ISSN 0167-739X chronization for embed- (print), 1872-7115 (elec- ded online contests. ACM tronic). URL http:// Transactions on Embed- www.sciencedirect.com/ ded Computing Systems,16 science/article/pii/S0167739X14001484. (2):58:1–58:??, April 2017. REFERENCES 601

CODEN ???? ISSN 1539- Weir:2012:IHV 9087 (print), 1558-3465 (electronic). [WYK12] Jonathan Weir, Weiqi Yan, and Mohan S. Kankan- Wang:2010:IIB halli. Image hatching for visual cryptography. ACM [WY10] Xu An Wang and Xiaoyuan Transactions on Multime- Yang. On the insecurity of dia Computing, Communi- an identity based proxy re- cations, and Applications, encryption scheme. Fun- 8(2S):32:1–32:??, Septem- damenta Informaticae,98 ber 2012. CODEN ???? (2–3):277–281, April 2010. ISSN 1551-6857 (print), CODEN FUMAAJ. ISSN 1551-6865 (electronic). 0169-2968 (print), 1875- 8681 (electronic). Wang:2013:NSW

Weir:2012:AVC [WYL13] Xiaogang Wang, Ming Yang, and Junzhou Luo. [WY12] Jonathan Weir and WeiQi A novel sequential water- Yan. Authenticating vi- mark detection model for sual cryptography shares efficient traceback of se- using 2D barcodes. Lecture cret network attack flows. Notes in Computer Sci- Journal of Network and ence, 7128:196–210, 2012. Computer Applications, CODEN LNCSD9. ISSN 36(6):1660–1670, Novem- 0302-9743 (print), 1611- ber 2013. CODEN JN- 3349 (electronic). URL CAF3. ISSN 1084-8045 http://link.springer. (print), 1095-8592 (elec- com/chapter/10.1007/978- tronic). URL http:// 3-642-32205-1_17/. www.sciencedirect.com/ science/article/pii/S1084804513000246. Wang:2014:NAI Wei:2014:IDC [WYCF14] Xiaojing Wang, Qizhao Yuan, Hongliang Cai, and [WYL14] Yuechuan Wei, Xiaoyuan Jiajia Fang. A new ap- Yang, and Chao Li. Impos- proach to image sharing sible differential cryptanal- with high-security thresh- ysis on cipher E2. Concur- old structure. Journal of rency and Computation: the ACM, 61(6):39:1–39:??, Practice and Experience, November 2014. CODEN 26(8):1477–1489, June 10, JACOAH. ISSN 0004-5411 2014. CODEN CCPEBO. (print), 1557-735X (elec- ISSN 1532-0626 (print), tronic). 1532-0634 (electronic). REFERENCES 602

Wu:2018:SMI Cryptanalysis of GOST R hash function. Infor- [WYL18] Pin Wu, Yang Yang, and mation Processing Letters, Xiaoqiang Li. StegNet: 114(12):655–662, Decem- Mega image steganography ber 2014. CODEN IF- capacity with deep con- PLAT. ISSN 0020-0190 volutional network. Fu- (print), 1872-6119 (elec- ture Internet, 10(6):54, tronic). URL http:// June 15, 2018. CODEN www.sciencedirect.com/ ???? ISSN 1999-5903. science/article/pii/S0020019014001458. URL https://www.mdpi. com/1999-5903/10/6/54. Wang:2017:RRA Wei:2016:APS + [WYML16] Jiannan Wei, Guomin [WYZ 17] YiPeng Wang, Xiaochun Yang, Yi Mu, and Kaitai Yun, Yongzheng Zhang, Liang. Anonymous proxy Liwei Chen, and Tian- signature with hierarchi- ning Zang. Rethinking ro- cal traceability. The Com- bust and accurate appli- puter Journal, 59(4):559– cation protocol identifica- 569, April 2016. CODEN tion. Computer Networks CMPJA6. ISSN 0010-4620 (Amsterdam, Netherlands: (print), 1460-2067 (elec- 1999), 129 (part 1)(??): tronic). URL http:// 64–78, December 24, 2017. comjnl.oxfordjournals. CODEN ???? ISSN 1389- org/content/59/4/559. 1286 (print), 1872-7069 (electronic). URL http:// Wang:2013:BSB www.sciencedirect.com/ [WYW+13] Xiangyang Wang, Hongy- science/article/pii/S1389128617303572. ing Yang, Jing Wang, Lili Chen, and Panpan Wen:2011:DSH Niu. Bayesian segmenta- tion based local geometri- [WZ11] Yamin Wen and Fang- cally invariant image wa- guo Zhang. Delegat- termarking. Fundamenta able secret handshake Informaticae, 128(4):475– scheme. The Journal of 501, October 2013. CO- Systems and Software,84 DEN FUMAAJ. ISSN (12):2284–2292, Decem- 0169-2968 (print), 1875- ber 2011. CODEN JS- 8681 (electronic). SODM. ISSN 0164-1212 (print), 1873-1228 (elec- Wang:2014:CGR tronic). URL http:// [WYW14] Zongyue Wang, Hongbo www.sciencedirect.com/ Yu, and Xiaoyun Wang. science/article/pii/S0164121211001580. REFERENCES 603

Wei:2015:CPK Wu:2019:PFI

[WZ15] Puwen Wei and Yuliang [WZCH19] Libing Wu, Yubo Zhang, Zheng. On the construction Kim-Kwang Raymond Choo, of public key encryption and Debiao He. Pairing- with sender recovery. Inter- free identity-based encryp- national Journal of Foun- tion with authorized equal- dations of Computer Sci- ity test in online so- ence (IJFCS), 26(1):1–??, cial networks. Interna- January 2015. CODEN tional Journal of Foun- IFCSEN. ISSN 0129-0541. dations of Computer Sci- ence (IJFCS), 30(4):647– Wang:2016:SAP 664, June 2019. ISSN 0129-0541. URL https: [WZC16] Minqian Wang, Zhenfeng //www.worldscientific. Zhang, and Cheng Chen. com/doi/10.1142/S0129054119400185. Security analysis of a privacy-preserving decen- Weng:2013:VWI tralized ciphertext-policy attribute-based encryption [WZLW13] Chi-Yao Weng, Yu Hong scheme. Concurrency and Zhang, Li Chun Lin, and Computation: Practice and Shiuh-Jeng Wang. Visi- Experience, 28(4):1237– ble watermarking images in 1245, March 25, 2016. CO- high quality of data hid- DEN CCPEBO. ISSN ing. The Journal of Su- 1532-0626 (print), 1532- percomputing, 66(2):1033– 0634 (electronic). 1048, November 2013. CO- DEN JOSUED. ISSN Wang:2018:AMB 0920-8542 (print), 1573- 0484 (electronic). URL [WZCC18] Rong Wang, Yan Zhu, http://link.springer. Tung-Shou Chen, and com/article/10.1007/s11227- Chin-Chen Chang. An au- 013-0969-9. thentication method based Wei:2012:CSO on the turtle shell algo- rithm for privacy-preserving [WZM12a] Fushan Wei, Zhenfeng data mining. The Com- Zhang, and Chuangui Ma. puter Journal, 61(8):1123– Corrigendum to “Gateway- 1132, August 1, 2018. CO- oriented password-authenticated DEN CMPJA6. ISSN key exchange protocol in 0010-4620 (print), 1460- the standard model’ [J. 2067 (electronic). URL Syst. Softw. 85 (March (3)) http://academic.oup.com/ (2012) 760–768]. The Jour- comjnl/article/61/8/1123/ nal of Systems and Soft- 4925401. ware, 85(9):2192, Septem- REFERENCES 604

ber 2012. CODEN JS- identity-based three-party SODM. ISSN 0164-1212 authenticated key agree- (print), 1873-1228 (elec- ment protocol with prov- tronic). URL http:// able security. Journal www.sciencedirect.com/ of Network and Computer science/article/pii/S0164121212001550. Applications, 36(2):927– See [WZM12b]. 932, March 2013. CODEN JNCAF3. ISSN 1084-8045 Wei:2012:GOP (print), 1095-8592 (elec- [WZM12b] Fushan Wei, Zhenfeng tronic). URL http:// Zhang, and Chuangui www.sciencedirect.com/ Ma. Gateway-oriented science/article/pii/S1084804512002184. password-authenticated key Xu:2014:AHA exchange protocol in the standard model. The [XGLM14] Chang Xu, Hua Guo, Journal of Systems and Zhoujun Li, and Yi Mu. Software, 85(3):760–768, Affiliation-hiding authen- March 2012. CODEN JS- ticated asymmetric group SODM. ISSN 0164-1212 key agreement based on (print), 1873-1228 (elec- short signature. The tronic). URL http:// Computer Journal,57 www.sciencedirect.com/ (10):1580–1590, October science/article/pii/S0164121211002597. 2014. CODEN CM- PJA6. ISSN 0010-4620 Wang:2012:NIS (print), 1460-2067 (elec- [WZXL12] Xiaofeng Wang, Nanning tronic). URL http:// Zheng, Jianru Xue, and comjnl.oxfordjournals. Zhenli Liu. A novel org/content/57/10/1580. image signature method Xu:2012:APA for content authentica- tion. The Computer Jour- [XHC+12] Zhi Xu, Hungyuan Hsu, nal, 55(6):686–701, June Xin Chen, Sencun Zhu, 2012. CODEN CM- and Ali R. Hurson. AK- PJA6. ISSN 0010-4620 PPM: An authenticated (print), 1460-2067 (elec- packet attribution scheme tronic). URL http:// for mobile ad hoc net- comjnl.oxfordjournals. works. Lecture Notes in org/content/55/6/686. Computer Science, 7462: full.pdf+html. 147–168, 2012. CO- Xiong:2013:NIB DEN LNCSD9. ISSN 0302-9743 (print), 1611- [XCL13] Hu Xiong, Zhong Chen, 3349 (electronic). URL and Fagen Li. New http://link.springer. REFERENCES 605

com/chapter/10.1007/978- nal of Computer and Sys- 3-642-33338-5_8/. tem Sciences, 80(1):195– 206, February 2014. CO- Xu:2014:TBH DEN JCSSBM. ISSN 0022- [XHCH14] Li Xu, Yuan He, Xiaofeng 0000 (print), 1090-2724 Chen, and Xinyi Huang. (electronic). URL http:// Ticket-based handoff au- www.sciencedirect.com/ thentication for wireless science/article/pii/S0022000013001426. mesh networks. Com- puter Networks (Amster- Xue:2017:CNC dam, Netherlands: 1999), + 73(??):185–194, Novem- [XHX 17] Kaiping Xue, Jianan Hong, ber 14, 2014. CODEN Yingjie Xue, David S. L. ???? ISSN 1389-1286 Wei, Nenghai Yu, and (print), 1872-7069 (elec- Peilin Hong. CABE: A tronic). URL http:// new comparable attribute- www.sciencedirect.com/ based encryption construc- science/article/pii/S1389128614002886. tion with 0-encoding and 1-encoding. IEEE Trans- Xi:2012:MDA actions on Computers,66 (9):1491–1503, Septem- [XHH12] Kai Xi, Jiankun Hu, and ber 2017. CODEN IT- Fengling Han. Mobile de- COB4. ISSN 0018-9340 vice access control: an im- (print), 1557-9956 (elec- proved correlation based tronic). URL http:/ face authentication scheme /ieeexplore.ieee.org/ and its Java ME appli- document/7896558/. cation. Concurrency and Computation: Practice and Xue:2019:SEA Experience, 24(10):1066– 1085, July 2012. CODEN [XHZ+19] Kaiping Xue, Peixuan He, CCPEBO. ISSN 1532-0626 Xiang Zhang, Qiudong (print), 1532-0634 (elec- Xia, David S. L. Wei, Hao tronic). Yue, and Feng Wu. A Xue:2014:LDP secure, efficient, and ac- countable edge-based ac- [XHM14] Kaiping Xue, Peilin Hong, cess control framework for and Changsha Ma. A information centric net- lightweight dynamic pseudonym works. IEEE/ACM Trans- identity based authentica- actions on Networking,27 tion and key agreement (3):1220–1233, June 2019. protocol without verifi- CODEN IEANEP. ISSN cation tables for multi- 1063-6692 (print), 1558- server architecture. Jour- 2566 (electronic). REFERENCES 606

Xie:2012:RAA wen Luo, Neil Bergmann, and Wen Hu. Gait-Key: [Xie12a] Yulai Xie. Review of a gait-based shared se- Applied Algebra: Codes, cret key generation proto- Ciphers and Discrete Al- col for wearable devices. gorithms, by Darel W. ACM Transactions on Sen- Hardy, Fred Richman, and sor Networks, 13(1):6:1– Carol L. Walker. ACM 6:??, February 2017. CO- SIGACT News, 43(3):25– DEN ???? ISSN 1550-4859 27, September 2012. CO- (print), 1550-4867 (elec- DEN SIGNDM. ISSN tronic). 0163-5700 (print), 1943- 5827 (electronic). Xu:2016:CIB Xie:2012:RBA [XJW+16] P. Xu, T. Jiao, Q. Wu, W. Wang, and H. Jin. [Xie12b] Yulai Xie. Review of Conditional identity-based Applied Algebra: Codes, broadcast proxy re-encryption Ciphers and Discrete Al- and its application to cloud gorithms, by Darel W. email. IEEE Transactions Hardy, Fred Richman, and on Computers, 65(1):66– Carol L. Walker. ACM 79, ???? 2016. CODEN SIGACT News, 43(3):25– ITCOB4. ISSN 0018-9340 27, September 2012. CO- (print), 1557-9956 (elec- DEN SIGNDM. ISSN tronic). 0163-5700 (print), 1943- 5827 (electronic). Xu:2013:PKE

Xiong:2012:PPK [XJWW13] Peng Xu, Hai Jin, Qian- [Xio12] Kaiqi Xiong. The per- hong Wu, and Wei Wang. formance of public key- Public-key encryption with based authentication pro- fuzzy keyword search: A tocols. Lecture Notes in provably secure scheme Computer Science, 7645: under keyword guessing 206–219, 2012. CO- attack. IEEE Transac- DEN LNCSD9. ISSN tions on Computers,62 0302-9743 (print), 1611- (11):2266–2277, November 3349 (electronic). URL 2013. CODEN ITCOB4. http://link.springer. ISSN 0018-9340 (print), com/chapter/10.1007/978- 1557-9956 (electronic). 3-642-34601-9_16/. Xu:2019:TPT Xu:2017:GKG [XLC+19] Lingling Xu, Jin Li, Xi- [XJR+17] Weitao Xu, Chitra Javali, aofeng Chen, Wanhua Li, Girish Revadigar, Cheng- Shaohua Tang, and Hao- REFERENCES 607

Tian Wu. Tc-PEDCKS: Z. Qin. Provably se- Towards time controlled cure identity based thresh- public key encryption with old signature without ran- delegatable conjunctive dom oracles. Interna- keyword search for Internet tional Journal of Com- of Things. Journal of Net- puter Applications, 31(4): work and Computer Ap- 290–295, 2009. ISSN 1206- plications, 128(??):11–20, 212X (print), 1925-7074 February 15, 2019. CO- (electronic). URL https: DEN JNCAF3. ISSN 1084- //www.tandfonline.com/ 8045 (print), 1095-8592 doi/full/10.1080/1206212X. (electronic). URL http:// 2009.11441953. www.sciencedirect.com/ Xiang:2016:EMP science/article/pii/S1084804518303850. [XLWZ16] Xinyin Xiang, Hui Li, Xu:2012:AHA Mingyu Wang, and Xing- [XLM+12] Chang Xu, Zhoujun Li, wen Zhao. Efficient multi- Yi Mu, Hua Guo, and party concurrent signature Tao Guo. Affiliation- from lattices. Information hiding authenticated asym- Processing Letters, 116(8): metric group key agree- 497–502, August 2016. CO- ment. The Computer Jour- DEN IFPLAT. ISSN 0020- nal, 55(10):1180–1191, Oc- 0190 (print), 1872-6119 tober 2012. CODEN CM- (electronic). URL http:// PJA6. ISSN 0010-4620 www.sciencedirect.com/ (print), 1460-2067 (elec- science/article/pii/S0020019016300138. tronic). URL http:// Xue:2013:TCB comjnl.oxfordjournals. org/content/55/10/1180. [XMHD13] Kaiping Xue, Chang- full.pdf+html. sha Ma, Peilin Hong, and Rong Ding. A Xue:2018:SNN temporal-credential-based [XLP+18] W. Xue, H. Li, Y. Peng, mutual authentication and J. Cui, and Y. Shi. Se- key agreement scheme cure k nearest neighbors for wireless sensor net- query for high-dimensional works. Journal of Net- vectors in outsourced en- work and Computer Ap- vironments. IEEE Trans- plications, 36(1):316–323, actions on Big Data, 4(4): January 2013. CODEN 586–599, December 2018. JNCAF3. ISSN 1084-8045 ISSN 2332-7790. (print), 1095-8592 (elec- tronic). URL http:// Xiong:2009:PSI www.sciencedirect.com/ [XLQ09] H. Xiong, F. Li, and science/article/pii/S1084804512001403. REFERENCES 608

Xie:2013:ECP 22(9):1413–1423, Septem- ber 2014. CODEN ???? [XMLC13] X. Xie, H. Ma, J. Li, ISSN 2329-9290. and X. Chen. An ef- Xia:2015:SPK ficient ciphertext-policy attribute-based access con- [XNKG15] Q. Xia, J. Ni, A. J. B. A. trol towards revocation in Kanpogninge, and J. C. cloud computing. J.UCS: Gee. Searchable public- Journal of Universal Com- key encryption with data puter Science, 19(16): sharing in dynamic groups 2349–??, ???? 2013. CO- for mobile cloud storage. DEN ???? ISSN 0948- J.UCS: Journal of Univer- 695X (print), 0948-6968 sal Computer Science,21 (electronic). URL http:/ (3):440–??, ???? 2015. CO- /www.jucs.org/jucs_19_ DEN ???? ISSN 0948- 16/an_efficient_ciphertext_ 695X (print), 0948-6968 policy. (electronic). URL http:/ Xu:2017:EOS /www.jucs.org/jucs_21_ 3/searchable_public_key_ [XMY+17] Rui Xu, Kirill Morozov, encryption. Yanjiang Yang, Jianying Zhou, and Tsuyoshi Tak- Xiang:2018:SSA agi. Efficient outsourc- [XNP+18] Y. Xiang, I. Natgu- ing of secure k-nearest nanathan, D. Peng, G. Hua, neighbour query over en- and B. Liu. Spread spec- crypted database. Comput- trum audio watermarking ers & Security, 69(??):65– using multiple orthogonal 83, August 2017. CODEN PN sequences and vari- CPSEDU. ISSN 0167-4048 able embedding strengths (print), 1872-6208 (elec- and polarities. IEEE/ tronic). URL https:// ACM Transactions on Au- www.sciencedirect.com/ dio, Speech, and Language science/article/pii/S0167404816301651. Processing, 26(3):529–539, Xiang:2014:PBA March 2018. ISSN 2329- 9290. + [XNG 14] Yong Xiang, I. Natgu- Xiang:2015:SSB nanathan, Song Guo, Wan- lei Zhou, and S. Nahavandi. [XNRG15] Yong Xiang, I. Nat- Patchwork-based audio wa- gunanathan, Yue Rong, termarking method robust and Song Guo. Spread to de-synchronization at- spectrum-based high em- tacks. IEEE/ACM Trans- bedding capacity water- actions on Audio, Speech, marking method for au- and Language Processing, dio signals. IEEE/ACM REFERENCES 609

Transactions on Audio, the algorithm. ACM Speech, and Language Pro- Transactions on Database cessing, 23(12):2228–2237, Systems, 35(2):8:1–8:??, December 2015. CODEN April 2010. CODEN ???? ISSN 2329-9290. ATDSD3. ISSN 0362-5915 (print), 1557-4644 (elec- Xiong:2011:CIB tronic). [XQL11] Hu Xiong, Zhiguang Qin, Xu:2019:DAB and Fagen Li. Cryptanal- ysis of an identity based [XTZ+19] Qian Xu, Chengxiang Tan, signcryption without ran- Wenye Zhu, Ya Xiao, Zhijie dom oracles. Fundamenta Fan, and Fujia Cheng. De- Informaticae, 107(1):105– centralized attribute-based 109, January 2011. CO- conjunctive keyword search DEN FUMAAJ. ISSN scheme with online/offline 0169-2968 (print), 1875- encryption and outsource 8681 (electronic). decryption for cloud com- puting. Future Generation Xin:2010:IEB Computer Systems, 97(??): [XSWC10] Hong Xin, Zhu Shu- 306–326, August 2019. CO- jing, Chen Weibin, and DEN FGSEVI. ISSN 0167- Jian Chongjun. An im- 739X (print), 1872-7115 age encryption base on (electronic). URL http:// non-linear pseudo-random www.sciencedirect.com/ number generator. In science/article/pii/S0167739X18329613. 2010 International Confer- Xie:2012:ORI ence on Computer Appli- cation and System Model- [XW12] Min Xie and Libin Wang. ing (ICCASM), volume 9, One-round identity-based pages V9–238–V9–241. key exchange with Perfect IEEE Computer Society Forward Security. Infor- Press, 1109 Spring Street, mation Processing Letters, Suite 300, Silver Spring, 112(14–15):587–591, Au- MD 20910, USA, 2010. gust 15, 2012. CODEN URL http://ieeexplore. IFPLAT. ISSN 0020-0190 ieee.org/stamp/stamp. (print), 1872-6119 (elec- jsp?tp=&arnumber=5623043. tronic). URL http:// www.sciencedirect.com/ Xiao:2010:TAT science/article/pii/S0020019012001196. [XTK10] Xiaokui Xiao, Yufei Tao, Xie:2013:SIP and Nick Koudas. Trans- parent anonymization: Thwart-[XW13] Yongming Xie and Guojun ing adversaries who know Wang. Special issue papers: REFERENCES 610

Practical distributed secret Jin. Circuit ciphertext- key generation for delay policy attribute-based hy- tolerant networks. Concur- brid encryption with ver- rency and Computation: ifiable delegation in cloud Practice and Experience, computing. IEEE Trans- 25(14):2067–2079, Septem- actions on Parallel and ber 25, 2013. CODEN Distributed Systems, 27(1): CCPEBO. ISSN 1532-0626 119–129, January 2016. (print), 1532-0634 (elec- CODEN ITDSEO. ISSN tronic). 1045-9219 (print), 1558- 2183 (electronic). URL Xiong:2012:CBP http://www.computer.org/ [XWDN12] Kaiqi Xiong, Ronghua csdl/trans/td/2016/01/ Wang, Wenliang Du, and 07010954-abs.html. See Peng Ning. Containing comments [XWS17]. bogus packet insertion at- Xiong:2017:CCC tacks for broadcast authen- tication in sensor networks. [XWS17] Hu Xiong, Qiang Wang, ACM Transactions on Sen- and Jianfei Sun. Comments sor Networks, 8(3):20:1– on “Circuit ciphertext- 20:??, July 2012. CO- policy attribute-based hy- DEN ???? ISSN 1550-4859 brid encryption with veri- (print), 1550-4867 (elec- fiable delegation”. Infor- tronic). mation Processing Letters, 127(??):67–70, Novem- Xu:2017:SEP ber 2017. CODEN IF- [XWK+17] Zhiyan Xu, Libing Wu, PLAT. ISSN 0020-0190 Muhammad Khurram Khan, (print), 1872-6119 (elec- Kim-Kwang Raymond Choo, tronic). URL http:// and Debiao He. A secure www.sciencedirect.com/ and efficient public audit- science/article/pii/S0020019017301308. ing scheme using RSA al- See [XWLJ16]. gorithm for cloud storage. Xia:2016:SDM The Journal of Supercom- puting, 73(12):5285–5309, [XWSW16] Zhihua Xia, Xinhui Wang, December 2017. CODEN Xingming Sun, and Qian JOSUED. ISSN 0920-8542 Wang. A secure and (print), 1573-0484 (elec- dynamic multi-keyword tronic). ranked search scheme over Xu:2016:CCP encrypted cloud data. IEEE Transactions on [XWLJ16] Jie Xu, Qiaoyan Wen, Parallel and Distributed Wenmin Li, and Zhengping Systems, 27(2):340–352, REFERENCES 611

February 2016. CODEN Merkle tree for lightweight ITDSEO. ISSN 1045-9219 streaming authenticated (print), 1558-2183 (elec- data structures. Journal tronic). URL http:// of Network and Computer www.computer.org/csdl/ Applications, 107(??):113– trans/td/2016/02/07039216- 124, April 1, 2018. CODEN abs.html. JNCAF3. ISSN 1084-8045 Xie:2014:SCP (print), 1095-8592 (elec- tronic). URL http:// [XWXC14] Qi Xie, Guilin Wang, Fu- www.sciencedirect.com/ biao Xia, and Deren Chen. science/article/pii/S1084804518300286. Self-certified proxy con- vertible authenticated en- Xiao:2016:REM cryption: formal defini- tions and a provably se- [XWZW16] Chen Xiao, Lifeng Wang, cure scheme. Concurrency Mengjiao Zhu, and Wen- and Computation: Prac- dong Wang. A resource- tice and Experience, 26(5): efficient multimedia en- 1038–1051, April 10, 2014. cryption scheme for em- CODEN CCPEBO. ISSN bedded video sensing sys- 1532-0626 (print), 1532- tem based on unmanned 0634 (electronic). aircraft. Journal of Net- work and Computer Ap- Xu:2018:SKS plications, 59(??):117–125, January 2016. CODEN [XWY+18] Li Xu, Chi-Yao Weng, Lun- JNCAF3. ISSN 1084-8045 Pin Yuan, Mu-En Wu, (print), 1095-8592 (elec- Raylin Tso, and Hung- tronic). URL http:// Min Sun. A shareable www.sciencedirect.com/ keyword search over en- science/article/pii/S1084804515001654. crypted data in cloud com- puting. The Journal of Su- Xu:2019:LAM percomputing, 74(3):1001– 1023, March 2018. CODEN [XXCY19] Zisang Xu, Cheng Xu, JOSUED. ISSN 0920-8542 Haixian Chen, and Fang (print), 1573-0484 (elec- Yang. A lightweight anony- tronic). mous mutual authentica- Xu:2018:DFH tion and key agreement scheme for WBAN. Con- [XWZ+18] Jian Xu, Laiwen Wei, currency and Computa- Yu Zhang, Andi Wang, Fu- tion: Practice and Ex- cai Zhou, and Chong zhi perience, 31(14):e5295:1– Gao. Dynamic fully homo- e5295:??, July 25, 2019. morphic encryption-based CODEN CCPEBO. ISSN REFERENCES 612

1532-0626 (print), 1532- academic.oup.com/comjnl/ 0634 (electronic). article/61/8/1228/5035449. Xu:2019:SIC Xiong:2015:SRE [XYML19] Shengmin Xu, Guomin [XXX15] Lizhi Xiong, Zhengquan Yang, Yi Mu, and Xi- Xu, and Yanyan Xu. A se- meng Liu. A secure IoT cure re-encryption scheme cloud storage system with for data services in a cloud fine-grained access control computing environment. and decryption key expo- Concurrency and Compu- sure resistance. Future tation: Practice and Expe- Generation Computer Sys- rience, 27(17):4573–4585, tems, 97(??):284–294, Au- December 10, 2015. CO- gust 2019. CODEN FG- DEN CCPEBO. ISSN SEVI. ISSN 0167-739X 1532-0626 (print), 1532- (print), 1872-7115 (elec- 0634 (electronic). tronic). URL http:// www.sciencedirect.com/ Xie:2012:DPK science/article/pii/S0167739X18320922. [XXZ12] Xiang Xie, Rui Xue, and Xing-Yuan:2011:PRS Rui Zhang. Determin- istic public key encryp- [XYXYX11] Wang Xing-Yuan, Qin tion and identity-based en- Xue, and Xie Yi-Xin. cryption from lattices in Pseudo-random sequences the auxiliary-input setting. generated by a class of one- Lecture Notes in Computer dimensional smooth map. Science, 7485:1–18, 2012. Chinese Physics Letters,28 CODEN LNCSD9. ISSN (8):080501, 2011. CODEN 0302-9743 (print), 1611- CPLEEU. ISSN 0256- 3349 (electronic). URL 307X (print), 1741-3540 (electronic). URL http://link.springer. http: com/chapter/10.1007/978- //stacks.iop.org/0256- . 3-642-32928-9_1/. 307X/28/i=8/a=080501 Xiao:2019:NEA Xiao:2018:KRL [XZL+19] C. Xiao, L. Zhang, W. Liu, [XY18] Dianyan Xiao and Yang L. Cheng, P. Li, Y. Pan, Yu. Klepto for ring-LWE and N. Bergmann. NV- encryption. The Computer eCryptfs: Accelerating Journal, 61(8):1228–1239, enterprise-level crypto- August 1, 2018. CODEN graphic file system with CMPJA6. ISSN 0010-4620 non-volatile memory. IEEE (print), 1460-2067 (elec- Transactions on Com- tronic). URL http:// puters, 68(9):1338–1352, REFERENCES 613

September 2019. CODEN and Sihan Qing. Con- ITCOB4. ISSN 0018-9340 tinual leakage-resilient dy- (print), 1557-9956 (elec- namic secret sharing in the tronic). split-state model. Lecture Notes in Computer Sci- Xu:2015:ORA ence, 7618:119–130, 2012. [XZLW15] Chang Xu, Liehuang Zhu, CODEN LNCSD9. ISSN Zhoujun Li, and Feng 0302-9743 (print), 1611- Wang. One-round affiliation- 3349 (electronic). URL hiding authenticated asym- http://link.springer. metric group key agree- com/chapter/10.1007/978- ment with semi-trusted 3-642-34129-8_11/. group authority. The Xiao:2018:FEI Computer Journal,58 (10):2509–2519, October [XZZ18] Chang Xiao, Cheng Zhang, 2015. CODEN CM- and Changxi Zheng. Font- PJA6. ISSN 0010-4620 Code: Embedding in- (print), 1460-2067 (elec- formation in text docu- tronic). URL http:// ments using glyph pertur- comjnl.oxfordjournals. bation. ACM Transactions org/content/58/10/2509. on Graphics, 37(2):15:1– 15:??, July 2018. CODEN Xiong:2019:PPH ATGRDF. ISSN 0730-0301 [XZP+19] Hu Xiong, Yanan Zhao, (print), 1557-7368 (elec- Li Peng, Hao Zhang, and tronic). Kuo-Hui Yeh. Partially Yo o:2017:PQD policy-hidden attribute- based broadcast encryption [Y+17] Y. Yoo et al. A post- with secure delegation in quantum digital signature edge computing. Future scheme based on super- Generation Computer Sys- singular isogenies. Cryp- tems, 97(??):453–461, Au- tology ePrint Archive re- gust 2019. CODEN FG- port, 2017. URL http:/ SEVI. ISSN 0167-739X /eprint.iacr.org/2017/ (print), 1872-7115 (elec- 186. tronic). URL http:// Yaacoubi:2019:REM www.sciencedirect.com/ science/article/pii/S0167739X19300172[Yaa19]. Omar Yaacoubi. The rise Xiong:2012:CLR of encrypted malware. Net- work Security, 2019(5):6– [XZY+12] Hao Xiong, Cong Zhang, 9, May 2019. CODEN Tsz Hon Yuen, Echo P. NTSCF5. ISSN 1353-4858 Zhang, Siu Ming Yiu, (print), 1872-9371 (elec- REFERENCES 614

tronic). URL http:// USA, 2010. ISBN 1- www.sciencedirect.com/ 4244-6942-2. LCCN science/article/pii/S1353485819300595. QA76.9.A25. URL http: //ieeexplore.ieee.org/ Yamaguchi:2012:EVC servlet/opac?punumber= [Yam12] Yasushi Yamaguchi. An 5680738. extended visual cryptogra- Yang:2011:PQC phy scheme for continuous- [Yan11] Bo-Yin Yang, editor. Post- tone images. Lecture Quantum Cryptography: Notes in Computer Sci- 4th International Work- ence, 7128:228–242, 2012. shop, PQCrypto 2011, CODEN LNCSD9. ISSN Taipei, Taiwan, November 0302-9743 (print), 1611- 29 — December 2, 2011. 3349 (electronic). URL Proceedings, volume 7071 http://link.springer. of Lecture Notes in Com- com/chapter/10.1007/978- puter Science. Springer- 3-642-32205-1_19/. Verlag, Berlin, Germany / Yu:2015:SDS Heidelberg, Germany / London, UK / etc., 2011. + [YAM 15] Yong Yu, Man Ho Au, CODEN LNCSD9. ISBN Yi Mu, Willy Susilo, and 3-642-25404-7. ISSN 0302- Huai Wu. Secure delega- 9743 (print), 1611-3349 tion of signing power from (electronic). URL http:/ factorization. The Com- /www.springerlink.com/ puter Journal, 58(4):867– content/978-3-642-25404- 877, April 2015. CODEN 8. CMPJA6. ISSN 0010-4620 Yang:2014:BEB (print), 1460-2067 (elec- tronic). URL http:// [Yan14] Yang Yang. Broadcast comjnl.oxfordjournals. encryption based non- org/content/58/4/867. interactive key distribu- tion in MANETs. Jour- Yang:2010:PII nal of Computer and Sys- [Yan10] Yixian Yang, editor. Pro- tem Sciences, 80(3):533– ceedings 2010 IEEE Inter- 545, May 2014. CODEN national Conference on In- JCSSBM. ISSN 0022-0000 formation Theory and In- (print), 1090-2724 (elec- formation Security: De- tronic). URL http:// cember 17–19, 2010, Bei- www.sciencedirect.com/ jing, China. IEEE Com- science/article/pii/S0022000013001189. puter Society Press, 1109 Yang:2011:GSS Spring Street, Suite 300, Silver Spring, MD 20910, [YC11] Ching-Nung Yang and REFERENCES 615

Yu-Ying Chu. A gen- www.sciencedirect.com/ eral (k, n) scalable se- science/article/pii/S0164121215000205. cret image sharing scheme with the smooth scala- Yi:2017:ZCL bility. The Journal of [YCL17] Wentan Yi, Shaozhen Systems and Software, Chen, and Yuchen Li. Zero- 84(10):1726–1733, Octo- correlation linear crypt- ber 2011. CODEN JS- analysis of SAFER block SODM. ISSN 0164-1212 cipher family using the (print), 1873-1228 (elec- undisturbed bits. The tronic). URL http:// Computer Journal, 60(4): www.sciencedirect.com/ 613–624, March 23, 2017. science/article/pii/S0164121211001105. CODEN CMPJA6. ISSN 0010-4620 (print), 1460- Yang:2012:PST 2067 (electronic). URL https://academic.oup. [YC12] Jun-Han Yang and Tian- com/comjnl/article/60/ Jie Cao. Provably se- 4/613/2354610. cure three-party pass- word authenticated key Yuan:2013:PVQ

exchange protocol in the + standard model. The [YCM 13] Lihua Yuan, Chao-Chih Journal of Systems and Chen, Prasant Mohapatra, Software, 85(2):340–350, Chen-Nee Chuah, and Kr- February 2012. CODEN ishna Kant. A proxy JSSODM. ISSN 0164-1212 view of quality of Do- (print), 1873-1228 (elec- main Name Service, poi- tronic). URL http:// soning attacks and survival www.sciencedirect.com/ strategies. ACM Trans- science/article/pii/S0164121211002172. actions on Internet Tech- nology (TOIT), 12(3):9:1– Yang:2016:EBB 9:??, May 2013. CODEN ???? ISSN 1533-5399 [YCC16] Ching-Nung Yang, Cheng- (print), 1557-6051 (elec- Hua Chen, and Song-Ruei tronic). Cai. Enhanced Boolean- Yu:2016:DNF based multi secret im- age sharing scheme. The [YCR16] Jiangshan Yu, Vincent Journal of Systems and Cheval, and Mark Ryan. Software, 116(??):22–34, DTKI: a new formalized June 2016. CODEN JS- PKI with verifiable trusted SODM. ISSN 0164-1212 parties. The Computer (print), 1873-1228 (elec- Journal, 59(11):1695–1713, tronic). URL http:// November 2016. CODEN REFERENCES 616

CMPJA6. ISSN 0010-4620 cation of physical items. (print), 1460-2067 (elec- Communications of the tronic). URL http:// Association for Comput- comjnl.oxfordjournals. ing Machinery, 60(4):32– org/content/59/11/1695. 39, April 2017. CODEN CACMA2. ISSN 0001-0782 Yao:2015:LAB (print), 1557-7317 (elec- [YCT15] Xuanxia Yao, Zhi Chen, tronic). URL http:// and Ye Tian. A lightweight cacm.acm.org/magazines/ attribute-based encryption 2017/4/215034/fulltext. scheme for the Internet of Yasuda:2015:MQC Things. Future Generation Computer Systems, 49(??): [YDH+15] Takanori Yasuda, Xavier 104–112, August 2015. CO- Dahan, Yun-Ju Huang, DEN FGSEVI. ISSN 0167- Tsuyoshi Takagi, and 739X (print), 1872-7115 Kouichi Sakurai. A mul- (electronic). URL http:// tivariate quadratic chal- www.sciencedirect.com/ lenge toward post-quantum science/article/pii/S0167739X14002039. generation cryptography. ACM Communications in Yuen:2012:IBE Computer Algebra, 49(3): 105–107, September 2015. [YCZY12] Tsz Hon Yuen, Sherman CODEN ???? ISSN 1932- S. M. Chow, Ye Zhang, and 2232 (print), 1932-2240 Siu Ming Yiu. Identity- (electronic). based encryption resilient to continual auxiliary leak- Yao:2019:CTC age. Lecture Notes in Computer Science, 7237: [YDV19] Fan Yao, Miloˇs Doroslovaˇcki, 117–134, 2012. CO- and Guru Venkataramani. DEN LNCSD9. ISSN Covert timing channels ex- 0302-9743 (print), 1611- ploiting cache coherence 3349 (electronic). URL hardware: Characteriza- http://link.springer. tion and defense. Interna- com/accesspage/chapter/ tional Journal of Parallel 10.1007/978-3-642-29011- Programming, 47(4):595– 4_8; http://link.springer. 620, August 2019. CODEN com/chapter/10.1007/978- IJPPE5. ISSN 0885-7458 3-642-29011-4_9/. (print), 1573-7640 (elec- tronic). Yu:2017:PDA Yan:2016:DEB [YD17] Meng-Day (Mandel) Yu and Srinivas Devadas. Per- [YDY+16] Zheng Yan, Wenxiu Ding, vasive, dynamic authenti- Xixun Yu, Haiqi Zhu, and REFERENCES 617

Robert H. Deng. Dedu- 0169-2968 (print), 1875- plication on encrypted big 8681 (electronic). data in cloud. IEEE Trans- actions on Big Data, 2(2): Yekhanin:2010:LDC 138–150, ???? 2016. CO- [Yek10] Sergey Yekhanin. Locally DEN ???? ISSN 2332- Decodable Codes and Pri- 7790. vate Information Retrieval Ye:2010:ACC Schemes. Information Se- [Ye10] Guodong Ye. Another con- curity and Cryptography. structed chaotic image en- Springer-Verlag, Berlin, cryption scheme based on Germany / Heidelberg, Toeplitz matrix and Han- Germany / London, UK / kel matrix. Fundamenta etc., 2010. ISBN 3-642- Informaticae, 101(4):321– 14357-1 (hardcover), 3-642- 333, December 2010. CO- 14358-X (e-book). ISSN DEN FUMAAJ. ISSN 1619-7100 (print), 2197- 0169-2968 (print), 1875- 845X (electronic). xii + 8681 (electronic). 82 pp. LCCN QA76.9.A25 Y45 2010eb. URL http:/ Yamada:2012:PBR /www.springerlink.com/ content/978-3-642-14358- [YE12] Takaaki Yamada and Isao 8. Echizen. PC-based real- time video watermark em- Yoshida:2012:OGT bedding system indepen- dent of platform for par- [YFF12] Maki Yoshida, Toru Fuji- allel computing. Lecture wara, and Marc Fossorier. Notes in Computer Sci- Optimum general thresh- ence, 7110:15–33, 2012. old secret sharing. Lecture CODEN LNCSD9. ISSN Notes in Computer Sci- 0302-9743 (print), 1611- ence, 7412:187–204, 2012. 3349 (electronic). URL CODEN LNCSD9. ISSN http://link.springer. 0302-9743 (print), 1611- com/chapter/10.1007/978- 3349 (electronic). URL 3-642-28693-3_2/. http://link.springer. com/chapter/10.1007/978- Ye:2014:NIE 3-642-32284-6_11/. [Ye14] Ruisong Ye. A novel Yu:2012:EPF image encryption scheme based on generalized multi- [YFK+12] Jia Yu, Fanyu, Kong, Xi- sawtooth maps. Funda- angguo Cheng, Rong Hao, menta Informaticae, 133 and Jianxi Fan. Erratum to (1):87–104, January 2014. the paper: Forward-Secure CODEN FUMAAJ. ISSN Identity-Based Public-Key REFERENCES 618

Encryption without Ran- Nazhandali, and Patrick dom Oracles. Fundamenta Schaumont. Analyzing the Informaticae, 114(1):103, fault injection sensitivity of January 2012. CODEN secure embedded software. FUMAAJ. ISSN 0169-2968 ACM Transactions on Em- (print), 1875-8681 (elec- bedded Computing Systems, tronic). See [YKC+11]. 16(4):95:1–95:??, August 2017. CODEN ???? ISSN Yang:2017:CCS 1539-9087 (print), 1558- [YFT17] Kun Yang, Domenic Forte, 3465 (electronic). and Mark M. Tehra- Yang:2015:SHI nipoor. CDTA: a compre- hensive solution for coun- [YGFL15] Zhen Yang, Kaiming Gao, terfeit detection, trace- Kefeng Fan, and Yingxu ability, and authentication Lai. Sensational headline in the IoT supply chain. identification by normal- ACM Transactions on De- ized cross entropy-based sign Automation of Elec- metric. The Computer tronic Systems, 22(3):42:1– Journal, 58(4):644–655, 42:??, May 2017. CODEN April 2015. CODEN CM- ATASFO. ISSN 1084-4309 PJA6. ISSN 0010-4620 (print), 1557-7309 (elec- (print), 1460-2067 (elec- tronic). tronic). URL http:// comjnl.oxfordjournals. Yang:2018:RRE org/content/58/4/644. [YFT18] Kun Yang, Domenic Forte, Ye:2017:VCS and Mark Tehranipoor. ReSC: an RFID-Enabled [YGS+17] Katherine Q. Ye, Matthew solution for defending IoT Green, Naphat Sanguansin, supply chain. ACM Lennart Beringer, Adam Transactions on Design Petcher, and Andrew W. Automation of Electronic Appel. Verified cor- Systems, 23(3):29:1–29:??, rectness and security of April 2018. CODEN mbedTLS HMAC-DRBG. ATASFO. ISSN 1084-4309 In ACM, editor, Proceed- (print), 1557-7309 (elec- ings of CCS 17, Octo- tronic). ber 30–November 3, 2017, Yuce:2017:AFI Dallas, TX, USA, pages 1–14. ACM Press, New [YGD+17] Bilgiday Yuce, Nahid Farhady York, NY 10036, USA, Ghalaty, Chinmay Desh- 2017. ISBN 1-4503-4946-3. pande, Harika Santa- LCCN ???? URL http:// puri, Conor Patrick, Leyla www.cs.princeton.edu/~ REFERENCES 619

appel/papers/verified- Experience, 28(10):2978– -drbg.pdf. 2990, July 2016. CODEN CCPEBO. ISSN 1532-0626 Ye:2016:IEA (print), 1532-0634 (elec- [YH16] Guodong Ye and Xiaol- tronic). ing Huang. An image en- cryption algorithm based Yu:2010:IBF on autoblocking and elec- [YHK+10] Jia Yu, Rong Hao, Fanyu trocardiography. IEEE Kong, Xiangguo Cheng, MultiMedia, 23(2):64–71, Huawei Zhao, and Chen April/June 2016. CO- Yangkui. Identity-based DEN IEMUE4. ISSN forward secure threshold 1070-986X (print), 1941- signature scheme based on 0166 (electronic). URL mediated RSA. Interna- https://www.computer. tional Journal of Com- org/csdl/mags/mu/2016/ puter Applications, 32(4): 02/mmu2016020064-abs. 469–475, 2010. ISSN 1206- html. 212X (print), 1925-7074 Yang:2018:RKF (electronic). URL https: //www.tandfonline.com/ [YHHM18] Li Yang, Ziyi Han, Zhen- doi/full/10.2316/Journal. gan Huang, and Jianfeng 202.2010.4.202-2927. Ma. A remotely keyed file encryption scheme un- Yang:2016:EHA der mobile cloud com- puting. Journal of Net- [YHL16] Xu Yang, Xinyi Huang, work and Computer Ap- and Joseph K. Liu. Effi- plications, 106(??):90–99, cient handover authentica- March 15, 2018. CODEN tion with user anonymity JNCAF3. ISSN 1084-8045 and untraceability for mo- (print), 1095-8592 (elec- bile cloud computing. Fu- tronic). URL http:// ture Generation Computer www.sciencedirect.com/ Systems, 62(??):190–195, science/article/pii/S1084804517304241. September 2016. CODEN FGSEVI. ISSN 0167-739X Yang:2016:IHA (print), 1872-7115 (elec- [YHHS16] Xu Yang, Xinyi Huang, tronic). URL http:// Jinguang Han, and Chun- www.sciencedirect.com/ hua Su. Improved han- science/article/pii/S0167739X15003088. dover authentication and Yao:2019:RSA key pre-distribution for wireless mesh networks. [YHSW19] Jiaying Yao, Zhigeng Han, Concurrency and Com- Muhammad Sohail, and putation: Practice and Liangmin Wang. A robust REFERENCES 620

security architecture for data. The Journal of Su- SDN-based 5G networks. percomputing, 74(8):3620– Future Internet, 11(4):85, 3638, August 2018. CO- March 28, 2019. CODEN DEN JOSUED. ISSN ???? ISSN 1999-5903. 0920-8542 (print), 1573- URL https://www.mdpi. 0484 (electronic). com/1999-5903/11/4/85. Yang:2018:CPG Yang:2014:MDF [YJSL18] Hongbin Yang, Shuxiong [YI14] Ying Yang and Ioannis Jiang, Wenfeng Shen, and Ivrissimtzis. Mesh discrim- Zhou Lei. Certificate- inative features for 3D ste- less provable group shared ganalysis. ACM Transac- data possession with com- tions on Multimedia Com- prehensive privacy preser- puting, Communications, vation for cloud storage. and Applications, 10(3): Future Internet, 10(6):49, 27:1–27:??, April 2014. June 07, 2018. CODEN CODEN ???? ISSN 1551- ???? ISSN 1999-5903. 6857 (print), 1551-6865 URL https://www.mdpi. (electronic). com/1999-5903/10/6/49.

Yamada:2017:EPA Yang:2016:TCP [YK16] Baijian Justin Yang and [YI17] Asahiko Yamada and Brian Kirk. Try-CybSI: Tatsuro Ikeda. En- A platform for trying out hanced PKI authentica- cybersecurity. IEEE Se- tion with trusted prod- curity & Privacy, 14(4): uct at claimant. Comput- 74–75, July/August 2016. ers & Security, 67(??):324– CODEN ???? ISSN 334, June 2017. CODEN 1540-7993 (print), 1558- CPSEDU. ISSN 0167-4048 4046 (electronic). URL (print), 1872-6208 (elec- https://www.computer. tronic). URL https:// org/csdl/mags/sp/2016/ www.sciencedirect.com/ 04/msp2016040074-abs. science/article/pii/S0167404817300044. html. Youn:2018:DAH Yassein:2016:FSB [YJC18] Taek-Young Youn, Nam-Su [YKA16] M. B. Yassein, Y. Khamay- Jho, and Ku-Young Chang. seh, and M. AbuJazoh. Design of additive homo- Feature selection for black morphic encryption with hole attacks. J.UCS: Jour- multiple message spaces for nal of Universal Com- secure and practical stor- puter Science, 22(4):521– age services over encrypted ??, ???? 2016. CO- REFERENCES 621

DEN ???? ISSN 0948- Software, 85(2):382–391, 695X (print), 0948-6968 February 2012. CODEN (electronic). URL http:/ JSSODM. ISSN 0164-1212 /www.jucs.org/jucs_22_ (print), 1873-1228 (elec- 4/feature_selection_for_ tronic). URL http:// black. www.sciencedirect.com/ Yo o:2010:IRR science/article/pii/S0164121211002342. Young:2013:TPC [YKBS10] Sang-Kyung Yoo, Deniz Karakoyunlu, Berk Birand, [YKGK13] Maxwell Young, Aniket and Berk Sunar. Improv- Kate, Ian Goldberg, and ing the robustness of ring Martin Karsten. Towards oscillator TRNGs. ACM practical communication in Transactions on Reconfig- Byzantine-resistant DHTs. urable Technology and Sys- IEEE/ACM Transactions tems, 3(2):9:1–9:??, May on Networking, 21(1):190– 2010. CODEN ???? ISSN 203, February 2013. CO- 1936-7406 (print), 1936- DEN IEANEP. ISSN 1063- 7414 (electronic). 6692 (print), 1558-2566 (electronic). Yu:2011:FSI Yang:2018:AIW [YKC+11] Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong [YKK18] Zhi-Fang Yang, Chih-Ting Hao, and Jianxi Fan. Kuo, and Te-Hsi Kuo. Au- Forward-secure identity- thorization identification based public-key encryp- by watermarking in log- tion without random ora- polar coordinate system. cles. Fundamenta Infor- The Computer Journal,61 maticae, 111(2):241–256, (11):1710–1723, November April 2011. CODEN FU- 1, 2018. CODEN CM- MAAJ. ISSN 0169-2968 PJA6. ISSN 0010-4620 (print), 1875-8681 (elec- (print), 1460-2067 (elec- tronic). See erratum tronic). URL http:// + [YFK 12]. academic.oup.com/comjnl/ article/61/11/1710/4993056. Yu:2012:IRI Yum:2012:OPE [YKC+12] Jia Yu, Fanyu Kong, Xi- angguo Cheng, Rong Hao, [YKKL12] Dae Hyun Yum, Duk Soo and Jianxi Fan. Intrusion- Kim, Jin Seok Kim, and resilient identity-based sig- Pil Joong Lee. Order- nature: Security defini- preserving encryption for tion and construction. The non-uniformly distributed Journal of Systems and plaintexts. Lecture Notes REFERENCES 622

in Computer Science, 7115: checking multivariate pub- 84–97, 2012. CODEN lic key cryptography for LNCSD9. ISSN 0302-9743 side-channel attacks: The (print), 1611-3349 (elec- case of enTTS scheme. The tronic). URL http:// Computer Journal, 60(8): link.springer.com/chapter/ 1197–1209, August 1, 2017. 10.1007/978-3-642-27890- CODEN CMPJA6. ISSN 7_7/. 0010-4620 (print), 1460- 2067 (electronic). URL Yoshino:2012:SIP https://academic.oup. [YKNS12] Masayuki Yoshino, Noboru com/comjnl/article/60/ Kunihiro, Ken Naganuma, 8/1197/2996413. and Hisayoshi Sato. Sym- Yuen:2013:ELT metric inner-product pred- icate encryption based on [YLA+13] Tsz Hon Yuen, Joseph K. three groups. Lecture Liu, Man Ho Au, Willy Notes in Computer Sci- Susilo, and Jianying Zhou. ence, 7496:215–234, 2012. Efficient linkable and/ CODEN LNCSD9. ISSN or threshold ring signa- 0302-9743 (print), 1611- ture without random ora- 3349 (electronic). URL cles. The Computer Jour- http://link.springer. nal, 56(4):407–421, April com/chapter/10.1007/978- 2013. CODEN CM- 3-642-33272-2_14/. PJA6. ISSN 0010-4620 (print), 1460-2067 (elec- Yum:2011:ACO tronic). URL http:// [YL11] Dae Hyun Yum and comjnl.oxfordjournals. Pil Joong Lee. On the aver- org/content/56/4/407. age cost of order-preserving full.pdf+html. encryption based on hyper- Yang:2012:WSI geometric distribution. In- formation Processing Let- [YLL+12] Chunfang Yang, Fenlin ters, 111(19):956–959, Oc- Liu, Shiguo Lian, Xi- tober 15, 2011. CODEN angyang Luo, and Daoshun IFPLAT. ISSN 0020-0190 Wang. Weighted stego- (print), 1872-6119 (elec- image steganalysis of mes- tronic). URL http:// sages hidden into each www.sciencedirect.com/ bit plane. The Com- science/article/pii/S0020019011001906. puter Journal, 55(6):717– Yi:2017:ICM 727, June 2012. CODEN CMPJA6. ISSN 0010-4620 [YL17] Haibo Yi and Weijian (print), 1460-2067 (elec- Li. On the importance of tronic). URL http:// REFERENCES 623

comjnl.oxfordjournals. ???? ISSN 1550-4859 org/content/55/6/717. (print), 1550-4867 (elec- full.pdf+html. tronic). URL https:// dl.acm.org/ft_gateway. Yang:2018:NSS cfm?id=3303704. + [YLL 18] Zheng Yang, Chao Liu, Yi:2013:ETS Wanping Liu, Daigu Zhang, and Song Luo. A new [YLW13] Xun Yi, San Ling, and strong security model Huaxiong Wang. Effi- for stateful authenticated cient two-server password- group key exchange. In- only authenticated key ex- ternational Journal of In- change. IEEE Trans- formation Security, 17(4): actions on Parallel and 423–440, August 2018. Distributed Systems, 24(9): CODEN ???? ISSN 1773–1782, 2013. CODEN 1615-5262 (print), 1615- ITDSEO. ISSN 1045-9219 5270 (electronic). URL (print), 1558-2183 (elec- http://link.springer. tronic). com/article/10.1007/s10207- 017-0373-1. Yu:2016:CBE You:2012:DDS [YLZ+16] Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, [YLS12] Ilsun You, Jong-Hyouk Xinyi Huang, and Yang Lee, and Kouichi Saku- Xiang. Certificate-based rai. DSSH: Digital signa- encryption resilient to ture based secure handover key leakage. The Jour- for network-based mobil- nal of Systems and Soft- ity management. Inter- ware, 116(??):101–112, national Journal of Com- June 2016. CODEN JS- puter Systems Science and SODM. ISSN 0164-1212 Engineering, 27(3):??, ???? (print), 1873-1228 (elec- 2012. CODEN CSSEEI. tronic). URL http:// ISSN 0267-6192. www.sciencedirect.com/ Yang:2019:NAK science/article/pii/S0164121215001326. [YLSZ19] Zheng Yang, Junyu Lai, Yagan:2016:WSN Yingbing Sun, and Jiany- ing Zhou. A novel authenti- [YM16] Osman Yagan and Ar- cated key agreement proto- mand M. Makowski. Wire- col with dynamic credential less sensor networks un- for WSNs. ACM Trans- der the random pair- actions on Sensor Net- wise key predistribution works, 15(2):22:1–22:??, scheme: Can resiliency be April 2019. CODEN achieved with small key REFERENCES 624

rings? IEEE/ACM Trans- 51:??, October 2017. CO- actions on Networking,24 DEN ???? ISSN 1551-6857 (6):3383–3396, December (print), 1551-6865 (elec- 2016. CODEN IEANEP. tronic). ISSN 1063-6692 (print), 1558-2566 (electronic). Yu:2017:ACA + Yan:2018:FPS [YMC 17] Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Guang Zeng, [YM18] Qiuchen Yan and Stephen and Wenbao Han. Ac- McCamant. Fast Po- countable CP-ABE with keEMU: Scaling generated public verifiability: How instruction tests using ag- to effectively protect the gregation and state chain- outsourced data in cloud. ing. ACM SIGPLAN No- International Journal of tices, 53(3):71–83, March Foundations of Computer 2018. CODEN SINODQ. Science (IJFCS), 28(6): ISSN 0362-1340 (print), 705–??, September 2017. 1523-2867 (print), 1558- CODEN IFCSEN. ISSN 1160 (electronic). 0129-0541. Yao:2019:ACC Ying:2013:PPB

[YM19] Zhongyuan Yao and Yi Mu. [YMM13] Bidi Ying, Dimitrios Makrakis, ACE with compact cipher- and Hussein T. Mouf- text size and decentral- tah. Privacy preserv- ized sanitizers. Interna- ing broadcast message au- tional Journal of Foun- thentication protocol for dations of Computer Sci- VANETs. Journal of Net- ence (IJFCS), 30(4):531– work and Computer Appli- 549, June 2019. ISSN cations, 36(5):1352–1364, 0129-0541. URL https: September 2013. CODEN //www.worldscientific. JNCAF3. ISSN 1084-8045 com/doi/10.1142/S0129054119400112. (print), 1095-8592 (elec- tronic). URL http:// Yakubu:2017:SSN www.sciencedirect.com/ [YMA17] Abukari M. Yakubu, Na- science/article/pii/S1084804512001439. munu C. Maddage, and Yu:2010:PSI Pradeep K. Atrey. Se- curing speech noise reduc- [YMSH10] Gang Yu, Xiaoxiao Ma, tion in outsourced environ- Yong Shen, and Wen- ment. ACM Transactions bao Han. Provable se- on Multimedia Comput- cure identity based gener- ing, Communications, and alized signcryption scheme. Applications, 13(4):51:1– Theoretical Computer Sci- REFERENCES 625

ence, 411(40–42):3614– efficient encryption for 3624, September 6, 2010. non-volatile memories. ACM CODEN TCSCDI. ISSN SIGPLAN Notices, 50(4): 0304-3975 (print), 1879- 33–44, April 2015. CODEN 2294 (electronic). SINODQ. ISSN 0362-1340 (print), 1523-2867 (print), Yu:2011:CLE 1558-1160 (electronic). [YMWS11] Yong Yu, Yi Mu, Guilin Yavuz:2012:BFB Wang, and Ying Sun. Cryptanalysis of an off- [YNR12a] Attila A. Yavuz, Peng line electronic cash scheme Ning, and Michael K. based on proxy blind signa- Reiter. BAF and FI- ture. The Computer Jour- BAF: Efficient and pub- nal, 54(10):1645–1651, Oc- licly verifiable crypto- tober 2011. CODEN CM- graphic schemes for se- PJA6. ISSN 0010-4620 cure logging in resource- (print), 1460-2067 (elec- constrained systems. ACM tronic). URL http:// Transactions on Informa- comjnl.oxfordjournals. tion and System Security, org/content/54/10/1645. 15(2):9:1–9:??, July 2012. full.pdf+html. CODEN ATISBQ. ISSN 1094-9224 (print), 1557- Ying:2019:LRU 7406 (electronic). [YN19] Bidi Ying and Amiya Yavuz:2012:ECR Nayak. Lightweight re- mote user authentication [YNR12b] Attila A. Yavuz, Peng protocol for multi-server Ning, and Michael K. Re- 5G networks using self- iter. Efficient, compromise certified public key cryp- resilient and append-only tography. Journal of Net- cryptographic schemes for work and Computer Ap- secure audit logging. Lec- plications, 131(??):66–74, ture Notes in Computer April 1, 2019. CODEN Science, 7397:148–163, JNCAF3. ISSN 1084-8045 2012. CODEN LNCSD9. (print), 1095-8592 (elec- ISSN 0302-9743 (print), tronic). URL http:// 1611-3349 (electronic). URL www.sciencedirect.com/ http://link.springer. science/article/pii/S1084804519300256. com/chapter/10.1007/978- 3-642-32946-3_12/. Young:2015:DWE Yu:2016:SSD [YNQ15] Vinson Young, Prashant J. Nair, and Moinuddin K. [YNX+16] Yong Yu, Jianbing Ni, Qureshi. DEUCE: Write- Qi Xia, Xiaofen Wang, REFERENCES 626

Haomiao Yang, and Xi- Yang:2017:SAS aosong Zhang. SDIVIP2: shared data integrity ver- [YPRI17] Ying Yang, Ruggero Pin- ification with identity pri- tus, Holly Rushmeier, vacy preserving in mo- and Ioannis Ivrissimtzis. bile clouds. Concurrency A 3D steganalytic algo- and Computation: Prac- rithm and steganalysis- tice and Experience,28 resistant watermarking. (10):2877–2888, July 2016. IEEE Transactions on Vi- CODEN CCPEBO. ISSN sualization and Computer 1532-0626 (print), 1532- Graphics, 23(2):1002–1013, 0634 (electronic). February 2017. CO- DEN ITVGEA. ISSN Yong:2011:SPP 1077-2626 (print), 1941- 0506 (electronic), 2160- [Yon11] J. Yong. Security and pri- 9306. URL https:// vacy preservation for mo- www.computer.org/csdl/ bile E-learning via digital trans/tg/2017/02/07399411- identity attributes. J.UCS: abs.html. Journal of Universal Com- puter Science, 17(2):296– Yang:2012:EMA ??, ???? 2011. CO- [YQH12] Rui Yang, Zhenhua Qu, DEN ???? ISSN 0948- and Jiwu Huang. Expos- 695X (print), 0948-6968 ing MP3 audio forgeries us- (electronic). URL http:/ ing frame offsets. ACM /www.jucs.org/jucs_17_ Transactions on Multime- 2/security_and_privacy_ dia Computing, Communi- preservation. cations, and Applications, 8(2S):35:1–35:??, Septem- Yoneyama:2012:ORA ber 2012. CODEN ???? [Yon12] Kazuki Yoneyama. One- ISSN 1551-6857 (print), round authenticated key 1551-6865 (electronic). exchange with strong for- Yin:2017:QPE ward secrecy in the stan- dard model against con- [YQOL17] Hui Yin, Zheng Qin, strained adversary. Lec- Lu Ou, and Keqin Li. ture Notes in Computer A query privacy-enhanced Science, 7631:69–86, 2012. and secure search scheme CODEN LNCSD9. ISSN over encrypted data in 0302-9743 (print), 1611- cloud computing. Journal 3349 (electronic). URL of Computer and System http://link.springer. Sciences, 90(??):14–27, De- com/chapter/10.1007/978- cember 2017. CODEN JC- 3-642-34117-5_5/. SSBM. ISSN 0022-0000 REFERENCES 627

(print), 1090-2724 (elec- ers, 65(12):3687–3701, ???? tronic). URL http:// 2016. CODEN ITCOB4. www.sciencedirect.com/ ISSN 0018-9340 (print), science/article/pii/S0022000016301301. 1557-9956 (electronic). Yin:2019:SCM Yang:2012:SAK

[YQZ+19] Hui Yin, Zheng Qin, Jixin [YS12] Zheng Yang and J¨org Zhang, Lu Ou, Fangmin Schwenk. Strongly au- Li, and Keqin Li. Secure thenticated key exchange conjunctive multi-keyword protocol from bilinear ranked search over en- groups without random or- crypted cloud data for mul- acles. Lecture Notes in tiple data owners. Fu- Computer Science, 7496: ture Generation Computer 264–275, 2012. CO- Systems, 100(??):689–700, DEN LNCSD9. ISSN November 2019. CODEN 0302-9743 (print), 1611- FGSEVI. ISSN 0167-739X 3349 (electronic). URL (print), 1872-7115 (elec- http://link.springer. tronic). URL http:// com/chapter/10.1007/978- www.sciencedirect.com/ 3-642-33272-2_17/. science/article/pii/S0167739X17321192. Yumbul:2015:EEP Yengisetty:2011:AVC [YS15] Kazim Yumbul and Erkay [YR11] Subba Rao V. Yengisetty Sava¸s. Enhancing an em- and Bimal K. Roy. Ap- bedded processor core for plications of visual cryp- efficient and isolated exe- tography. International cution of cryptographic al- Journal of Parallel, Emer- gorithms. The Computer gent and Distributed Sys- Journal, 58(10):2368–2387, tems: IJPEDS, 26(5):429– October 2015. CODEN 442, 2011. CODEN ???? CMPJA6. ISSN 0010-4620 ISSN 1744-5760 (print), (print), 1460-2067 (elec- 1744-5779 (electronic). tronic). URL http:// comjnl.oxfordjournals. Yi:2016:IPA org/content/58/10/2368. + [YRT 16] Xun Yi, Fang-Yu Rao, Yang:2015:EPS Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim [YSC+15] Bin Yang, Xingming Sun, Khalil, and Albert Y. Xianyi Chen, Jianjun Zomaya. ID2S password- Zhang, and Xu Li. Ex- authenticated key ex- posing photographic splic- change protocols. IEEE ing by detecting the Transactions on Comput- inconsistencies in shad- REFERENCES 628

ows. The Computer Jour- eavesdropping. IEEE/ nal, 58(4):588–600, April ACM Transactions on Net- 2015. CODEN CM- working, 22(6):1978–1987, PJA6. ISSN 0010-4620 December 2014. CODEN (print), 1460-2067 (elec- IEANEP. ISSN 1063-6692 tronic). URL http:// (print), 1558-2566 (elec- comjnl.oxfordjournals. tronic). org/content/58/4/588. Yeh:2010:TRR Yang:2016:ECV [YSL+10] Kuo-Hui Yeh, Chunhua Su, [YSC16] Ching-Nung Yang, Li-Zhe N. W. Lo, Yingjiu Li, and Sun, and Song-Ruei Cai. Yi-Xiang Hung. Two ro- Extended color visual cryp- bust remote user authen- tography for black and tication protocols using white secret image. The- smart cards. The Journal oretical Computer Science, of Systems and Software, 609 (part 1)(??):143–161, 83(12):2556–2565, Decem- January 4, 2016. CODEN ber 2010. CODEN JS- TCSCDI. ISSN 0304-3975 SODM. ISSN 0164-1212. (print), 1879-2294 (elec- Yuen:2014:TCT tronic). URL http:// www.sciencedirect.com/ [YSM14] Tsz Hon Yuen, Willy science/article/pii/S0304397515008452. Susilo, and Yi Mu. To- Yang:2018:HEP wards a cryptographic treatment of publish/ [YSF+18] Kun Yang, Haoting Shen, subscribe systems. Jour- Domenic Forte, Swarup nal of Computer Security, Bhunia, and Mark Tehra- 22(1):33–67, ???? 2014. nipoor. Hardware-enabled CODEN JCSIET. ISSN pharmaceutical supply chain 0926-227X (print), 1875- security. ACM Transac- 8924 (electronic). tions on Design Automa- tion of Electronic Systems, Yang:2019:ISO 23(2):23:1–23:??, January [YSQM19] Haining Yang, Jiameng 2018. CODEN ATASFO. Sun, Jing Qin, and Jixin ISSN 1084-4309 (print), Ma. An improved scheme 1557-7309 (electronic). for outsourced computa- Yao:2014:NCR tion with attribute-based encryption. Concurrency [YSJL14] Hongyi Yao, Danilo Silva, and Computation: Practice Sidharth Jaggi, and Michael and Experience, 31(21): Langberg. Network codes e4833:1–e4833:??, Novem- resilient to jamming and ber 10, 2019. CODEN REFERENCES 629

CCPEBO. ISSN 1532-0626 Yamada:2012:UEW (print), 1532-0634 (elec- tronic). [YT12] Takaaki Yamada and Yoshiyasu Takahashi. Use of “emer- Ylonen:2014:SAA gable watermarks” as copy indicators for securing [YSS14] Tatu Ylonen, Karen Scar- video content. Lecture fone, and Murugiah Soup- Notes in Computer Sci- paya. Security of auto- ence, 7128:181–195, 2012. mated access management CODEN LNCSD9. ISSN using Secure Shell (SSH). 0302-9743 (print), 1611- Technical report NISTIR 3349 (electronic). URL 7966 (draft), National In- http://link.springer. stitute for Standards and com/chapter/10.1007/978- Technology, Gaithersburg, 3-642-32205-1_16/. MD 20899-8900, USA, 2014. URL http://csrc. Yi:2016:VSF nist.gov/publications/ [YT16] Haibo Yi and Shaohua drafts/nistir-7966/nistir_ Tang. Very small FPGA 7966_draft.pdf. processor for multivariate Yang:2011:CCK signatures. The Computer Journal, 59(7):1091–1101, [YT11a] Guomin Yang and Chik How July 2016. CODEN CM- Tan. Certificateless cryp- PJA6. ISSN 0010-4620 tography with KGC trust (print), 1460-2067 (elec- level 3. Theoretical Com- tronic). URL http:// puter Science, 412(39): comjnl.oxfordjournals. 5446–5457, September 9, org/content/59/7/1091. 2011. CODEN TCSCDI. ISSN 0304-3975 (print), Ye:2018:VBA 1879-2294 (electronic). [YTF+18] Guixin Ye, Zhanyong Yang:2011:CPK Tang, Dingyi Fang, Xiao- jiang Chen, Willy Wolff, [YT11b] Guomin Yang and Chik How Adam J. Aviv, and Zheng Tan. Certificateless pub- Wang. A video-based at- lic key encryption: a new tack for Android pattern generic construction and lock. ACM Transactions two pairing-free schemes. on Privacy and Security Theoretical Computer Sci- (TOPS), 21(4):19:1–19:??, ence, 412(8–10):662–674, October 2018. ISSN 2471- March 4, 2011. CODEN 2566 (print), 2471-2574 TCSCDI. ISSN 0304-3975 (electronic). URL https: (print), 1879-2294 (elec- //dl.acm.org/citation. tronic). cfm?id=3230740. REFERENCES 630

Yeh:2017:SIB Yasuda:2012:ASM [YTH17] Lo-Yao Yeh, Woei-Jiunn [YTS12] Takanori Yasuda, Tsuyoshi Tsaur, and Hsin-Han Takagi, and Kouichi Saku- Huang. Secure IoT-based, rai. Application of scalar incentive-aware emergency multiplication of Edwards personnel dispatching scheme curves to pairing-based with weighted fine-grained cryptography. Lecture access control. ACM Notes in Computer Sci- Transactions on Intelli- ence, 7631:19–36, 2012. gent Systems and Tech- CODEN LNCSD9. ISSN nology (TIST), 9(1):10:1– 0302-9743 (print), 1611- 10:??, October 2017. CO- 3349 (electronic). URL DEN ???? ISSN 2157-6904 http://link.springer. (print), 2157-6912 (elec- com/chapter/10.1007/978- tronic). 3-642-34117-5_2/. Yang:2014:IBI Yang:2018:IAC [YTM+14] Guomin Yang, Chik How [YWF18] Xiaokun Yang, Wujie Wen, Tan, Yi Mu, Willy Susilo, and Ming Fan. Improv- and Duncan S. Wong. Iden- ing AES core performance tity based identification via an advanced ASBUS from algebraic coding the- protocol. ACM Jour- ory. Theoretical Com- nal on Emerging Technolo- puter Science, 520(??):51– gies in Computing Sys- 61, February 6, 2014. CO- tems (JETC), 14(1):6:1– DEN TCSCDI. ISSN 0304- 6:??, March 2018. CODEN 3975 (print), 1879-2294 ???? ISSN 1550-4832. (electronic). URL http:// Yan:2019:IFF www.sciencedirect.com/ science/article/pii/S0304397513006786[YWJ+19]. Hongyang Yan, Yu Wang, Yang:2011:ACD Chunfu Jia, Jin Li, Yang Xiang, and Witold Pedrycz. [YTP11] Yang Yang, Xiaohu Tang, IoT-FBAC: Function-based and Udaya Parampalli. Au- access control scheme using thentication codes from identity-based encryption difference balanced func- in IoT. Future Generation tions. International Jour- Computer Systems, 95(??): nal of Foundations of Com- 344–353, June 2019. CO- puter Science (IJFCS),22 DEN FGSEVI. ISSN 0167- (6):1417–1429, September 739X (print), 1872-7115 2011. CODEN IFCSEN. (electronic). URL http:// ISSN 0129-0541 (print), www.sciencedirect.com/ 1793-6373 (electronic). science/article/pii/S0167739X1830997X. REFERENCES 631

Yao:2010:IDA CCPEBO. ISSN 1532-0626 (print), 1532-0634 (elec- + [YWK 10a] Lin Yao, Lei Wang, Xiang- tronic). wei Kong, Guowei Wu, and Feng Xia. An inter-domain Ye:2019:NCA authentication scheme for [YWM19] T. Ye, Y. Wei, and pervasive computing en- W. Meier. A new cube at- vironment. Computers tack on MORUS by using and Mathematics with Ap- division property. IEEE plications, 60(2):234–244, Transactions on Comput- July 2010. CODEN ers, 68(12):1731–1740, De- CMAPDK. ISSN 0898- cember 2019. CODEN IT- 1221 (print), 1873-7668 COB4. ISSN 0018-9340 (electronic). URL http:// (print), 1557-9956 (elec- www.sciencedirect.com/ tronic). science/article/pii/S0898122110000210. Yao:2010:ASP Yang:2015:RCI [YWK10b] Yurong Yao, Edward Wat- [YWNW15] Hong-Ying Yang, Xiang- son, and Beverly K. Yang Wang, Pan-Pan Niu, Kahn. Application ser- and Ai-Long Wang. Ro- vice providers: market bust color image water- and adoption decisions. marking using geometric Communications of the invariant quaternion polar Association for Comput- harmonic transform. ACM ing Machinery, 53(7):113– Transactions on Multime- 117, July 2010. CODEN dia Computing, Communi- CACMA2. ISSN 0001-0782 cations, and Applications, (print), 1557-7317 (elec- 11(3):40:1–40:??, January tronic). 2015. CODEN ???? ISSN 1551-6857 (print), 1551- Yan:2017:PIS 6865 (electronic). + [YWL 17] Jianhua Yan, Licheng Wang:2011:RDA Wang, Jing Li, Muzi Li, Yixan Yang, and Wenbin [yWpNyL11] Xiang yang Wang, Pan pan Yao. Pre-image sample Niu, and Ming yu Lu. A algorithm with irregular robust digital audio wa- Gaussian distribution and termarking scheme using construction of identity- wavelet moment invari- based signature. Con- ance. The Journal of Sys- currency and Computa- tems and Software, 84(8): tion: Practice and Expe- 1408–1421, August 2011. rience, 29(20):??, Octo- CODEN JSSODM. ISSN ber 25, 2017. CODEN 0164-1212. REFERENCES 632

Wang:2013:RBC (print), 1875-8681 (elec- tronic). [yWpWyYpN13] Xiang yang Wang, Chun peng Wang, Hong ying Wang:2018:CIW

Yang, and Pan pan Niu. + A robust blind color image [yWXyZ 18] Xiang yang Wang, Huan watermarking in quater- Xu, Si yu Zhang, Lin lin nion Fourier transform Liang, Pan pan Niu, and domain. The Journal Hong ying Yang. A color of Systems and Software, image watermarking ap- 86(2):255–277, February proach based on synchro- 2013. CODEN JS- nization correction. Fun- SODM. ISSN 0164-1212 damenta Informaticae, 158 (print), 1873-1228 (elec- (4):385–407, ???? 2018. tronic). URL http:// CODEN FUMAAJ. ISSN www.sciencedirect.com/ 0169-2968 (print), 1875- science/article/pii/S0164121212002312. 8681 (electronic). Yu:2012:NWM Yang:2019:SCC [YWT+12] Zhiwei Yu, Chaokun Wang, [YWY+19] Haomiao Yang, Xiaofen Clark Thomborson, Jian- Wang, Chun Yang, Xin min Wang, Shiguo Lian, Cong, and You Zhang. Se- and Athanasios V. Vasi- curing content-centric net- lakos. A novel water- works with content-based marking method for soft- encryption. Journal of Net- ware protection in the work and Computer Ap- cloud. Software—Practice plications, 128(??):21–32, and Experience, 42(4):409– February 15, 2019. CO- 430, ???? 2012. CODEN DEN JNCAF3. ISSN 1084- SPEXBL. ISSN 0038-0644 8045 (print), 1095-8592 (print), 1097-024X (elec- (electronic). URL http:// tronic). www.sciencedirect.com/ science/article/pii/S1084804518303874. Yang:2010:CRS Yan:2012:SMA [YWW10] Cheng-Hsing Yang, Shiuh- Jeng Wang, and Chi- [YWYZ12] Diqun Yan, Rangding Yao Weng. Capacity- Wang, Xianmin Yu, and raising steganography us- Jie Zhu. Steganography ing multi-pixel differenc- for MP3 audio by ex- ing and pixel-value shifting ploiting the rule of win- operations. Fundamenta dow switching. Comput- Informaticae, 98(2–3):321– ers & Security, 31(5):704– 336, April 2010. CODEN 716, July 2012. CODEN FUMAAJ. ISSN 0169-2968 CPSEDU. ISSN 0167-4048 REFERENCES 633

(print), 1872-6208 (elec- integrity checking with tronic). URL https:// an identity-based audit- www.sciencedirect.com/ ing mechanism from RSA. science/article/pii/S0167404812000673. Future Generation Com- puter Systems, 62(??):85– Yu:2012:SME 91, September 2016. CO- [YWZ+12] Jia Yu, Shuguang Wang, DEN FGSEVI. ISSN 0167- Huawei Zhao, Minglei Shu, 739X (print), 1872-7115 Jialiang Lv, and Qiang (electronic). URL http:// Guo. A simultaneous mem- www.sciencedirect.com/ bers enrollment and revo- science/article/pii/S0167739X16300164. cation protocol for secret sharing schemes. Lecture Yang:2018:PBC Notes in Computer Sci- + ence, 7299:190–197, 2012. [YXA 18] Rupeng Yang, Qiuliang CODEN LNCSD9. ISSN Xu, Man Ho Au, Zuoxia 0302-9743 (print), 1611- Yu, Hao Wang, and 3349 (electronic). URL Lu Zhou. Position based http://link.springer. cryptography with loca- com/chapter/10.1007/978- tion privacy: a step for 3-642-30428-6_16/. Fog Computing. Future Generation Computer Sys- Yang:2018:EEC tems, 78 (part 2)(??):799–

+ 806, January 2018. CO- [YWZ 18] Wencheng Yang, Song DEN FGSEVI. ISSN 0167- Wang, Guanglou Zheng, 739X (print), 1872-7115 Junaid Chaudhry, and (electronic). URL http:// Craig Valli. ECB4CI: an www.sciencedirect.com/ enhanced cancelable bio- science/article/pii/S0167739X17311032. metric system for secur- ing critical infrastructures. Ye:2018:ISS The Journal of Supercom- puting, 74(10):4893–4909, [YXD18] Jun Ye, Zheng Xu, and October 2018. CODEN Yong Ding. Image search JOSUED. ISSN 0920-8542 scheme over encrypted (print), 1573-0484 (elec- database. Future Gen- tronic). eration Computer Sys- Yu:2016:CDI tems, 87(??):251–258, Oc- tober 2018. CODEN FG- [YXA+16] Yong Yu, Liang Xue, SEVI. ISSN 0167-739X Man Ho Au, Willy Susilo, (print), 1872-7115 (elec- Jianbing Ni, Yafang Zhang, tronic). URL https:// Athanasios V. Vasilakos, www.sciencedirect.com/ and Jian Shen. Cloud data science/article/pii/S0167739X17324354. REFERENCES 634

Yo on:2011:SBC cacm.acm.org/magazines/ 2017/7/218875/fulltext. [YY11] Eun-Jun Yoon and Kee- Young Yoo. A secure Yu:2017:PFS broadcasting cryptosystem [YY17b] Huifang Yu and Bo Yang. and its application to grid Pairing-free and secure computing. Future Gen- certificateless signcryption eration Computer Systems, scheme. The Computer 27(5):620–626, May 2011. Journal, 60(8):1187–1196, CODEN FGSEVI. ISSN August 1, 2017. CO- 0167-739X (print), 1872- DEN CMPJA6. ISSN 7115 (electronic). 0010-4620 (print), 1460- Yo on:2013:RBB 2067 (electronic). URL https://academic.oup. [YY13] Eun-Jun Yoon and Kee- com/comjnl/article/60/ Young Yoo. Robust 8/1187/2979229. biometrics-based multi- server authentication with Yildiz:2017:BLF

key agreement scheme + for smart cards on el- [YYK 17] Muhammet Yildiz, Berrin liptic curve cryptosys- Yaniko˘glu, Alisher Khol- tem. The Journal of Su- matov, Alper Kanak, percomputing, 63(1):235– Umut Uluda˘g, and Hakan 255, January 2013. CO- Erdo˘gan. Biometric layer- DEN JOSUED. ISSN ing with fingerprints: Tem- 0920-8542 (print), 1573- plate security and privacy 0484 (electronic). URL through multi-biometric http://link.springer. template fusion. The Com- com/article/10.1007/s11227- puter Journal, 60(4):573– 010-0512-1. 587, March 23, 2017. CO- DEN CMPJA6. ISSN Young:2017:PSC 0010-4620 (print), 1460- [YY17a] Adam L. Young and Moti 2067 (electronic). URL Yung. Privacy and se- https://academic.oup. curity: Cryptovirology: com/comjnl/article/60/ the birth, neglect, and 4/573/2354606. explosion of ransomware. Yang:2019:NPP Communications of the Association for Comput- [YYK+19] Xu Yang, Xun Yi, Ibrahim ing Machinery, 60(7):24– Khalil, Hui Cui, Xuechao 26, July 2017. CODEN Yang, Surya Nepal, Xinyi CACMA2. ISSN 0001-0782 Huang, and Yali Zeng. A (print), 1557-7317 (elec- new privacy-preserving au- tronic). URL http:// thentication protocol for REFERENCES 635

anonymous web browsing. Wenting Shen, Qianqian Concurrency and Compu- Su, Zhangjie Fu, and tation: Practice and Ex- Rong Hao. Enabling pub- perience, 31(21):e4706:1– lic auditing for shared e4706:??, November 10, data in cloud storage sup- 2019. CODEN CCPEBO. porting identity privacy ISSN 1532-0626 (print), and traceability. The 1532-0634 (electronic). Journal of Systems and Software, 113(??):130–139, Yesilyurt:2015:RWM March 2016. CODEN JS- [YYO15] Murat Yesilyurt, Yildiray SODM. ISSN 0164-1212 Yalman, and A. Turan (print), 1873-1228 (elec- Ozcerit. A robust wa- tronic). URL http:// termarking method for www.sciencedirect.com/ MPEG-4 based on kur- science/article/pii/S016412121500268X. tosis. The Computer Yu:2019:PSI Journal, 58(7):1645–1655, July 2015. CODEN CM- [YYW19] Yong Yu, Guomin Yang, PJA6. ISSN 0010-4620 and Huaxiong Wang. Pref- (print), 1460-2067 (elec- ace: Special issue cryptog- tronic). URL http:// raphy and provable secu- comjnl.oxfordjournals. rity. International Jour- org/content/58/7/1645. nal of Foundations of Com- Yang:2013:ECS puter Science (IJFCS),30 (4):489–492, June 2019. [yYqWqZC13] Xiao yuan Yang, Li qiang CODEN IFCSEN. ISSN Wu, Min qing Zhang, and 0129-0541. URL https: Xiao-Feng Chen. An ef- //www.worldscientific. ficient CCA-secure cryp- com/doi/10.1142/S0129054119020027. tosystem over ideal lat- Yang:2012:LUC tices from identity-based encryption. Computers and [YZ12] Bo Yang and Mingwu Mathematics with Appli- Zhang. LR-UESDE: cations, 65(9):1254–1263, a continual-leakage re- May 2013. CODEN silient encryption with un- CMAPDK. ISSN 0898- bounded extensible set del- 1221 (print), 1873-7668 egation. Lecture Notes in (electronic). URL http:// Computer Science, 7496: www.sciencedirect.com/ 125–142, 2012. CO- science/article/pii/S0898122112001447. DEN LNCSD9. ISSN Yang:2016:EPA 0302-9743 (print), 1611- 3349 (electronic). URL [YYS+16] Guangyang Yang, Jia Yu, http://link.springer. REFERENCES 636

com/chapter/10.1007/978- (print), 1872-7115 (elec- 3-642-33272-2_9/. tronic). URL https:// www.sciencedirect.com/ Yang:2017:SKS science/article/pii/S0167739X1730554X. [YZCT17] Yang Yang, Xianghan Yang:2012:BPN Zheng, Victor Chang, and Chunming Tang. Se- [YZLC12] Shuguo Yang, Yongbin mantic keyword searchable Zhou, Jiye Liu, and proxy re-encryption for Danyang Chen. Back prop- postquantum secure cloud agation neural network storage. Concurrency and based leakage characteriza- Computation: Practice and tion for practical security Experience, 29(19):??, Oc- analysis of cryptographic tober 10, 2017. CODEN implementations. Lecture CCPEBO. ISSN 1532-0626 Notes in Computer Sci- (print), 1532-0634 (elec- ence, 7259:169–185, 2012. tronic). CODEN LNCSD9. ISSN 0302-9743 (print), 1611- Yan:2019:HDS 3349 (electronic). URL http://link.springer. [YZDZ19] Z. Yan, L. Zhang, W. DING, com/chapter/10.1007/978- and Q. Zheng. Heteroge- 3-642-31912-9_12/. neous data storage man- agement with deduplica- Yang:2012:NIB tion in cloud comput- [YZX+12] Geng Yang, Qiang Zhou, ing. IEEE Transactions Xiaolong Xu, Jian Xu, and on Big Data, 5(3):393–407, Chunming Rong. A novel September 2019. ISSN identity-based key man- 2332-7790. agement and encryption Yang:2018:CDD scheme for distributed sys- tem. Lecture Notes in [YZL+18] Yang Yang, Xianghan Computer Science, 7672: Zheng, Ximeng Liu, Shang- 123–138, 2012. CO- ping Zhong, and Victor DEN LNCSD9. ISSN Chang. Cross-domain dy- 0302-9743 (print), 1611- namic anonymous authen- 3349 (electronic). URL ticated group key man- http://link.springer. agement with symptom- com/chapter/10.1007/978- matching for e-health so- 3-642-35362-8_11/. cial system. Future Gen- Yang:2014:PST eration Computer Sys- tems, 84(??):160–176, July [YZZ+14] Haomin Yang, Yaoxue 2018. CODEN FG- Zhang, Yuezhi Zhou, Xi- SEVI. ISSN 0167-739X aoming Fu, Hao Liu, REFERENCES 637

and Athanasios V. Vasi- (print), 1095-7189 (elec- lakos. Provably secure tronic). three-party authenticated key agreement protocol us- Zidaric:2019:HOA ing smart cards. Com- puter Networks (Amster- [ZAG19] Nusa Zidaric, Mark Aa- dam, Netherlands: 1999), gaard, and Guang Gong. 58(??):29–38, January 15, Hardware optimizations 2014. CODEN ???? ISSN and analysis for the WG- 1389-1286 (print), 1872- 16 cipher with tower field 7069 (electronic). URL arithmetic. IEEE Trans- http://www.sciencedirect. actions on Computers,68 com/science/article/pii/ (1):67–82, ???? 2019. CO- S1389128613002867. DEN ITCOB4. ISSN 0018- 9340 (print), 1557-9956 Zhai:2017:EEI (electronic). URL https: [ZAAB17] Xiaojun Zhai, Amine Ait Si //ieeexplore.ieee.org/ Ali, Abbes Amira, and document/8409309/. Faycal Bensaali. ECG encryption and identifica- Zajac:2019:HEM tion based security solu- [Zaj19] Pavol Zajac. Hybrid en- tion on the Zynq SoC cryption from McEliece for connected health sys- cryptosystem with pseudo- tems. Journal of Parallel random error vector. Fun- and Distributed Comput- damenta Informaticae, 169 ing, 106(??):143–152, Au- (4):345–360, ???? 2019. gust 2017. CODEN JPD- CODEN FUMAAJ. ISSN CER. ISSN 0743-7315 0169-2968 (print), 1875- (print), 1096-0848 (elec- 8681 (electronic). tronic). URL http:// www.sciencedirect.com/ Zoni:2018:CSC science/article/pii/S0743731516301927. Zufiria:2017:GLM [ZBPF18] Davide Zoni, Alessandro Barenghi, Gerardo Pelosi, [ZAC17]´ Pedro J. Zufiria and and William Fornaciari. Jos´eA.Alvarez-Cubero.´ A comprehensive side- Generalized lexicographic channel information leak- MultiObjective combina- age analysis of an in-order torial optimization. Ap- RISC CPU microarchitec- plication to cryptography. ture. ACM Transactions SIAM Journal on Opti- on Design Automation of mization, 27(4):2182–2201, Electronic Systems, 23(5): ???? 2017. CODEN 57:1–57:??, October 2018. SJOPE8. ISSN 1052-6234 CODEN ATASFO. ISSN REFERENCES 638

1084-4309 (print), 1557- ence (IJFCS), 24(6):879– 7309 (electronic). ??, September 2013. CO- DEN IFCSEN. ISSN 0129- Zhang:2011:TNT 0541. [ZBR11] Zhenxia Zhang, Azzedine Zhang:2015:PCL Boukerche, and Hussam [ZCC15] Zongyang Zhang, Sherman Ramadan. TEASE: a novel S. M. Chow, and Zhenfu Tunnel-based sEcure Au- Cao. Post-challenge leak- thentication SchemE to age in public-key encryp- support smooth handoff in tion. Theoretical Com- IEEE 802.11 wireless net- puter Science, 572(??):25– works. Journal of Paral- 49, March 23, 2015. CO- lel and Distributed Com- DEN TCSCDI. ISSN 0304- puting, 71(7):897–905, July 3975 (print), 1879-2294 2011. CODEN JPD- (electronic). URL http:// CER. ISSN 0743-7315 www.sciencedirect.com/ (print), 1096-0848 (elec- science/article/pii/S0304397515000377. tronic). URL http:// www.sciencedirect.com/ Zhang:2012:TCS science/article/pii/S0743731510002686. [ZCL+12] Zhifang Zhang, Yeow Meng Zhu:2012:JLS Chee, San Ling, Mulan Liu, and Huaxiong Wang. [ZC12] Xinglei Zhu and Chang W. Threshold changeable se- Chen. A joint layered cret sharing schemes revis- scheme for reliable and ited. Theoretical Computer secure mobile JPEG-2000 Science, 418(1):106–115, streaming. ACM Transac- February 10, 2012. CO- tions on Multimedia Com- DEN TCSCDI. ISSN 0304- puting, Communications, 3975 (print), 1879-2294 and Applications, 8(3): (electronic). URL http:// 30:1–30:??, July 2012. CO- www.sciencedirect.com/ DEN ???? ISSN 1551-6857 science/article/pii/S0304397511008206. (print), 1551-6865 (elec- tronic). Zhang:2019:EPK + Zhang:2013:RMS [ZCL 19] Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng [ZC13] En Zhang and Yongquan Qian, and Huaxiong Wang. Cai. Rational multi-secret Efficient public key en- sharing scheme in standard cryption with equality test point-to-point communica- in the standard model. tion networks. Interna- Theoretical Computer Sci- tional Journal of Foun- ence, 755(??):65–80, Jan- dations of Computer Sci- uary 10, 2019. CODEN REFERENCES 639

TCSCDI. ISSN 0304-3975 Su, and Marino Anthony (print), 1879-2294 (elec- James. Security analy- tronic). URL http:// sis and new models on www.sciencedirect.com/ the intelligent symmetric science/article/pii/S030439751830464X. key encryption. Comput- ers & Security, 80(??):14– Zhang:2014:GCS 24, January 2019. CODEN [ZCLL14] Yinghui Zhang, Xiaofeng CPSEDU. ISSN 0167-4048 Chen, Jin Li, and Hui Li. (print), 1872-6208 (elec- Generic construction for se- tronic). URL https:// cure and efficient handoff www.sciencedirect.com/ authentication schemes in science/article/pii/S0167404818309647. EAP-based wireless net- Zeng:2019:PKE works. Computer Networks (Amsterdam, Netherlands: [ZCZQ19] Ming Zeng, Jie Chen, 1999), 75 (part A)(??):192– Kai Zhang, and Haifeng 211, December 24, 2014. Qian. Public key encryp- CODEN ???? ISSN 1389- tion with equality test via 1286 (print), 1872-7069 hash proof system. Theo- (electronic). URL http:// retical Computer Science, www.sciencedirect.com/ 795(??):20–35, November science/article/pii/S1389128614003648. 26, 2019. CODEN TC- SCDI. ISSN 0304-3975 Zhang:2015:IAI (print), 1879-2294 (elec- [ZCWS15] Zhi-Kai Zhang, Michael tronic). URL http:// Cheng Yi Cho, Zong-Yu www.sciencedirect.com/ Wu, and Shiuhpyng Win- science/article/pii/S0304397519303822. ston Shieh. Identifying Zhang:2018:SSH and authenticating IoT ob- jects in a natural con- [ZDHZ18] Yinghui Zhang, Robert H. text. Computer, 48(8): Deng, Gang Han, and 81–83, August 2015. CO- Dong Zheng. Secure DEN CPTRB4. ISSN smart health with privacy- 0018-9162 (print), 1558- aware aggregate authen- 0814 (electronic). URL tication and access con- http://csdl.computer. trol in Internet of Things. org/csdl/mags/co/2015/ Journal of Network and 08/mco2015080081-abs. Computer Applications, html. 123(??):89–100, December Zhou:2019:SAN 1, 2018. CODEN JN- CAF3. ISSN 1084-8045 [ZCZ+19] Lu Zhou, Jiageng Chen, (print), 1095-8592 (elec- Yidan Zhang, Chunhua tronic). URL http:// REFERENCES 640

www.sciencedirect.com/ (hardcover), 0-7704-3619-6 science/article/pii/S1084804518302935. (paperback), 0-7704-3618-8 (e-book). ???? pp. LCCN Zhang:2012:AOP UG593 .Z48 2014. [ZDL12] Jiuling Zhang, Beixing Zhou:2018:SAE Deng, and Xing Li. Ad- ditive order preserving en- [ZFH+18] Yukun Zhou, Dan Feng, cryption based encrypted Yu Hua, Wen Xia, Min documents ranking in se- Fu, Fangting Huang, and cure cloud storage. Lec- Yucheng Zhang. A ture Notes in Computer similarity-aware encrypted Science, 7332:58–65, 2012. deduplication scheme with CODEN LNCSD9. ISSN flexible access control in 0302-9743 (print), 1611- the cloud. Future Gen- 3349 (electronic). URL eration Computer Sys- http://link.springer. tems, 84(??):177–189, July com/chapter/10.1007/978- 2018. CODEN FG- 3-642-31020-1_8/. SEVI. ISSN 0167-739X (print), 1872-7115 (elec- Zhou:2016:IBP tronic). URL https:// [ZDW+16] Yunya Zhou, Hua Deng, www.sciencedirect.com/ Qianhong Wu, Bo Qin, science/article/pii/S0167739X17309238. Jianwei Liu, and Yong Zhao:2010:PSA Ding. Identity-based proxy re-encryption version 2: [ZG10] Jianjie Zhao and Dawu Gu. Making mobile access easy Provably secure authenti- in cloud. Future Gener- cated key exchange pro- ation Computer Systems, tocol under the CDH as- 62(??):128–139, Septem- sumption. The Journal of ber 2016. CODEN FG- Systems and Software,83 SEVI. ISSN 0167-739X (11):2297–2304, November (print), 1872-7115 (elec- 2010. CODEN JSSODM. tronic). URL http:// ISSN 0164-1212. www.sciencedirect.com/ Zhou:2016:HFD science/article/pii/S0167739X15003076. Zetter:2014:CZD [ZGC16] Peng Zhou, Xiaojing Gu, and Rocky K. C. Chang. [Zet14] Kim Zetter. Countdown Harvesting file download to Zero Day: Stuxnet and exploits in the Web: a the launch of the world’s hacker’s view. The Com- first digital weapon. Crown, puter Journal, 59(4):522– New York, NY, USA, 540, April 2016. CODEN 2014. ISBN 0-7704-3617-X CMPJA6. ISSN 0010-4620 REFERENCES 641

(print), 1460-2067 (elec- smart healthcare systems. tronic). URL http:// Journal of Network and comjnl.oxfordjournals. Computer Applications, org/content/59/4/522. 117(??):10–16, September 1, 2018. CODEN JN- Zhou:2018:CBG CAF3. ISSN 1084-8045 [ZGCZ18] Caixue Zhou, Guangyong (print), 1095-8592 (elec- Gao, Zongmin Cui, and tronic). URL http:// Zhiqiang Zhao. Certificate- www.sciencedirect.com/ based generalized ring sign- science/article/pii/S1084804518301693. cryption scheme. Interna- Gao:2012:DES tional Journal of Founda- tions of Computer Science [zGXW12] Chong zhi Gao, Dongqing (IJFCS), 29(6):1063–1088, Xie, and Baodian Wei. De- September 2018. ISSN niable encryptions secure 0129-0541. URL https: against adaptive chosen ci- //www.worldscientific. phertext attack. Lecture com/doi/10.1142/S0129054118500211. Notes in Computer Sci- ence, 7232:46–62, 2012. Zhang:2018:AAG CODEN LNCSD9. ISSN [ZGL+18a] Qikun Zhang, Yong Gan, 0302-9743 (print), 1611- Lu Liu, Xianmin Wang, Xi- 3349 (electronic). URL angyang Luo, and Yuanzhang http://link.springer. Li. An authenticated asym- com/chapter/10.1007/978- metric group key agree- 3-642-29101-2_4/. ment based on attribute Zadeh:2015:ASP encryption. Journal of Net- work and Computer Appli- [ZH15] Abdulah Abdulah Zadeh cations, 123(??):1–10, De- and Howard M. Heys. Ap- cember 1, 2018. CODEN plication of simple power JNCAF3. ISSN 1084-8045 analysis to stream ciphers (print), 1095-8592 (elec- constructed using feedback tronic). URL http:// shift registers. The Com- www.sciencedirect.com/ puter Journal, 58(4):961– science/article/pii/S1084804518302704. 972, April 2015. CODEN CMPJA6. ISSN 0010-4620 Zhang:2018:PPE (print), 1460-2067 (elec- [ZGL+18b] Yin Zhang, Raffaele Grav- tronic). URL http:// ina, Huimin Lu, Mas- comjnl.oxfordjournals. simo Villari, and Gian- org/content/58/4/961. carlo Fortino. PEA: Zhang:2012:LDC Parallel electrocardiogram- based authentication for [Zha12] Haibin Zhang. Length- REFERENCES 642

doubling ciphers and tweak- physical-layer phase noise able ciphers. Lecture fingerprint for emerging Notes in Computer Sci- wireless networks. Com- ence, 7341:100–116, 2012. puter Networks (Amster- CODEN LNCSD9. ISSN dam, Netherlands: 1999), 0302-9743 (print), 1611- 128(??):164–171, Decem- 3349 (electronic). URL ber 9, 2017. CODEN http://link.springer. ???? ISSN 1389-1286 com/chapter/10.1007/978- (print), 1872-7069 (elec- 3-642-31284-7_7/. tronic). URL http:// www.sciencedirect.com/ Zhang:2015:BYO science/article/pii/S1389128617302347. [Zha15a] Hongwen Zhang. Bring Zhang:2011:PFB your own encryption: bal- ancing security with prac- [ZHL+11] Peng Zhang, Jiankun Hu, ticality. Network Secu- Cai Li, Mohammed Ben- rity, 2015(1):18–20, Jan- namoun, and Vijayaku- uary 2015. CODEN mar Bhagavatula. A pit- NTSCF5. ISSN 1353-4858 fall in fingerprint bio- (print), 1872-9371 (elec- cryptographic key gen- tronic). URL http:// eration. Computers & www.sciencedirect.com/ Security, 30(5):311–319, science/article/pii/S1353485815700115. July 2011. CODEN Zhang:2015:STR CPSEDU. ISSN 0167-4048 (print), 1872-6208 (elec- [Zha15b] Zhiyong Zhang. Secu- tronic). URL https:// rity, trust and risk in www.sciencedirect.com/ multimedia social net- science/article/pii/S0167404811000459. works. The Computer Journal, 58(4):515–517, Zhu:2015:IDM April 2015. CODEN CM- [ZHL15] Hui Zhu, Cheng Huang, PJA6. ISSN 0010-4620 and Hui Li. Informa- (print), 1460-2067 (elec- tion diffusion model based tronic). URL http:// on privacy setting in on- comjnl.oxfordjournals. line social networking ser- org/content/58/4/515. vices. The Computer Jour- Zhao:2017:RAS nal, 58(4):536–548, April 2015. CODEN CM- [ZHH+17] Caidan Zhao, Minmin PJA6. ISSN 0010-4620 Huang, Lianfen Huang, Xi- (print), 1460-2067 (elec- aojiang Du, and Mohsen tronic). URL http:// Guizani. A robust authen- comjnl.oxfordjournals. tication scheme based on org/content/58/4/536. REFERENCES 643

Zhang:2019:REU 186, January 2013. CO- DEN JNCAF3. ISSN 1084- [ZHS+19] Jun Zhang, Rui Hou, 8045 (print), 1095-8592 Wei Song, Sally A. Mc- (electronic). URL http:// kee, Zhen Jia, Chen www.sciencedirect.com/ Zheng, Mingyu Chen, science/article/pii/S1084804512002159. Lixin Zhang, and Dan Meng. RAGuard: an effi- Zhou:2015:EPP cient and user-transparent [ZHW15] Zhibin Zhou, Dijiang hardware mechanism against Huang, and Zhijie Wang. ROP attacks. ACM Efficient privacy-preserving Transactions on Archi- ciphertext-policy attribute tecture and Code Opti- based-encryption and broad- mization, 15(4):50:1–50:??, cast encryption. IEEE January 2019. CODEN Transactions on Comput- ???? ISSN 1544-3566 ers, 64(1):126–138, Jan- (print), 1544-3973 (elec- uary 2015. CODEN IT- tronic). URL https:// COB4. ISSN 0018-9340 dl.acm.org/ft_gateway. (print), 1557-9956 (elec- cfm?id=3280852. tronic). Zhu:2016:SCI Zhang:2016:PPV [ZHT16] Youwen Zhu, Zhiqiu Huang, and Tsuyoshi Takagi. Se- [ZHW+16] Lei Zhang, Chuanyan cure and controllable k- Hu, Qianhong Wu, Josep NN query over encrypted Domingo-Ferrer, and Bo Qin. cloud data with key con- Privacy-preserving vehicu- fidentiality. Journal of lar communication authen- Parallel and Distributed tication with hierarchical Computing, 89(??):1–12, aggregation and fast re- March 2016. CODEN JPD- sponse. IEEE Transactions CER. ISSN 0743-7315 on Computers, 65(8):2562– (print), 1096-0848 (elec- 2574, ???? 2016. CODEN tronic). URL http:// ITCOB4. ISSN 0018-9340 www.sciencedirect.com/ (print), 1557-9956 (elec- science/article/pii/S0743731515002105. tronic). Zhu:2013:TSC Zuo:2019:WDH [Zhu13] Wen Tao Zhu. Towards se- [ZHZ+19] P. Zuo, Y. Hua, M. Zhao, cure and communication- W. Zhou, and Y. Guo. efficient broadcast encryp- Write deduplication and tion systems. Journal hash mode encryption for of Network and Computer secure nonvolatile main Applications, 36(1):178– memory. IEEE Mi- REFERENCES 644

cro, 39(1):44–51, January/ org/content/57/4/567. February 2019. CODEN full.pdf+html. IEMIDZ. ISSN 0272-1732 (print), 1937-4143 (elec- Zhou:2012:CBF tronic). [ZL12] Qing Zhou and Xiaofeng Zimand:2010:SEC Liao. Collision-based flex- ible image encryption al- [Zim10] Marius Zimand. Simple ex- gorithm. The Journal tractors via constructions of Systems and Software, of cryptographic pseudo- 85(2):400–407, February random generators. The- 2012. CODEN JS- oretical Computer Science, SODM. ISSN 0164-1212 411(10):1236–1250, March (print), 1873-1228 (elec- 4, 2010. CODEN TC- tronic). URL http:// SCDI. ISSN 0304-3975 www.sciencedirect.com/ (print), 1879-2294 (elec- science/article/pii/S0164121211002329. tronic). Zhang:2019:CCF Zhang:2011:FBP [ZL19] X. Zhang and Y. Lao. On [ZJ11] Meng Zhang and Niraj K. the construction of com- Jha. FinFET-based power posite finite fields for hard- management for improved ware obfuscation. IEEE DPA resistance with low Transactions on Com- overhead. ACM Jour- puters, 68(9):1353–1364, nal on Emerging Technolo- September 2019. CODEN gies in Computing Sys- ITCOB4. ISSN 0018-9340 tems (JETC), 7(3):10:1– (print), 1557-9956 (elec- 10:??, August 2011. CO- tronic). DEN ???? ISSN 1550- Zhou:2015:PPS 4832. Zeng:2014:NFC [ZLDC15] Jun Zhou, Xiaodong Lin, Xiaolei Dong, and Zhenfu [ZJ14] Shengke Zeng and Shao- Cao. PSMPA: Patient quan Jiang. A new self-controllable and multi- framework for condition- level privacy-preserving co- ally anonymous ring sig- operative authentication nature. The Computer in distributed-healthcare Journal, 57(4):567–578, cloud computing system. April 2014. CODEN CM- IEEE Transactions on PJA6. ISSN 0010-4620 Parallel and Distributed (print), 1460-2067 (elec- Systems, 26(6):1693–1703, tronic). URL http:// June 2015. CODEN ITD- comjnl.oxfordjournals. SEO. ISSN 1045-9219 REFERENCES 645

(print), 1558-2183 (elec- Au, and Willy Susilo. Effi- tronic). URL http:// cient escrow-free identity- csdl.computer.org/csdl/ based signature. Lecture trans/td/2015/06/06779640- Notes in Computer Sci- abs.html. ence, 7496:161–174, 2012. Zhao:2012:IAS CODEN LNCSD9. ISSN 0302-9743 (print), 1611- [ZLDD12] Yifan Zhao, Swee-Won 3349 (electronic). URL Lo, Robert H. Deng, and http://link.springer. Xuhua Ding. An improved com/chapter/10.1007/978- authentication scheme for 3-642-33272-2_11/. H.264/SVC and its perfor- mance evaluation over non- Zhang:2015:RBA stationary wireless mo- bile networks. Lecture [ZLQ15] Jiliang Zhang, Yaping Lin, Notes in Computer Sci- and Gang Qu. Recon- ence, 7645:192–205, 2012. figurable binding against CODEN LNCSD9. ISSN FPGA replay attacks. 0302-9743 (print), 1611- ACM Transactions on De- 3349 (electronic). URL sign Automation of Elec- http://link.springer. tronic Systems, 20(2):33:1– com/chapter/10.1007/978- 33:??, February 2015. CO- 3-642-34601-9_15/. DEN ATASFO. ISSN 1084- Zhao:2014:TAH 4309 (print), 1557-7309 (electronic). [ZLDD14] Yifan Zhao, Swee-Won Lo, Robert H. Deng, and Xuhua Ding. Technique Zhang:2012:CCB for authenticating H.264/ SVC and its performance [ZLW+12] Leo Yu Zhang, Chengqing evaluation over wireless Li, Kwok-Wo Wong, Shi mobile networks. Jour- Shu, and Guanrong Chen. nal of Computer and Sys- Cryptanalyzing a chaos- tem Sciences, 80(3):520– based image encryption 532, May 2014. CODEN algorithm using alternate JCSSBM. ISSN 0022-0000 structure. The Journal (print), 1090-2724 (elec- of Systems and Software, tronic). URL http:// 85(9):2077–2085, Septem- www.sciencedirect.com/ ber 2012. CODEN JS- science/article/pii/S0022000013001177. SODM. ISSN 0164-1212 Zhang:2012:EEF (print), 1873-1228 (elec- tronic). URL http:// [ZLH+12] Yunmei Zhang, Joseph K. www.sciencedirect.com/ Liu, Xinyi Huang, Man Ho science/article/pii/S016412121200101X. REFERENCES 646

Zhu:2017:PSN www.sciencedirect.com/ science/article/pii/S0167739X18307878. [ZLW+17] Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhang:2016:TLT and Zhiguo Qu. Practical [ZM16] Mingwu Zhang and Yi Mu. secure na¨ıve Bayesian clas- Token-leakage tolerant and sification over encrypted vector obfuscated IPE and big data in cloud. Inter- application in privacy- national Journal of Foun- preserving two-party point/ dations of Computer Sci- polynomial evaluations. ence (IJFCS), 28(6):683– The Computer Journal,59 ??, September 2017. CO- (4):493–507, April 2016. DEN IFCSEN. ISSN 0129- CODEN CMPJA6. ISSN 0541. 0010-4620 (print), 1460- Zhang:2010:ESP 2067 (electronic). URL http://comjnl.oxfordjournals. [ZLY10] Jianhong Zhang, Chenglian org/content/59/4/493. Liu, and Yixian Yang. An efficient secure proxy veri- Zhang:2018:SPF fiably encrypted signature [ZM18] Jianhong Zhang and Jian scheme. Journal of Net- Mao. On the security of work and Computer Appli- a pairing-free certificate- cations, 33(1):29–34, Jan- less signcryption scheme. uary 2010. CODEN JN- The Computer Journal, CAF3. ISSN 1084-8045 61(4):469–471, April 1, (print), 1095-8592 (elec- 2018. CODEN CM- tronic). URL http:// PJA6. ISSN 0010-4620 www.sciencedirect.com/ (print), 1460-2067 (elec- science/article/pii/S1084804509001039. tronic). URL http:// Zhou:2019:LIB academic.oup.com/comjnl/ article/61/4/469/4107198. + [ZLY 19] Lu Zhou, Xiong Li, Kuo- Zhang:2017:FGA Hui Yeh, Chunhua Su, and Wayne Chiu. Lightweight [ZML17] Rui Zhang, Hui Ma, IoT-based authentication and Yao Lu. Fine- scheme in cloud comput- grained access control sys- ing circumstance. Fu- tem based on fully out- ture Generation Computer sourced attribute-based en- Systems, 91(??):244–251, cryption. The Journal of February 2019. CODEN Systems and Software, 125 FGSEVI. ISSN 0167-739X (??):344–353, March 2017. (print), 1872-7115 (elec- CODEN JSSODM. ISSN tronic). URL https:// 0164-1212 (print), 1873- REFERENCES 647

1228 (electronic). URL // tronic). URL http:// www.sciencedirect.com/ comjnl.oxfordjournals. science/article/pii/S0164121216302606. org/content/59/4/452. Zhang:2010:NSS Zaeem:2017:MAI

[ZMM+10] Qing Zhang, John McCul- [ZMYB17] Razieh Nokhbeh Zaeem, lough, Justin Ma, Nabil Monisha Manoharan, Yong- Schear, Michael Vrable, peng Yang, and K. Suzanne Amin Vahdat, Alex C. Sno- Barber. Modeling and eren, Geoffrey M. Voelker, analysis of identity threat and Stefan Savage. Neon: behaviors through text system support for derived mining of identity theft data management. ACM stories. Computers & SIGPLAN Notices, 45(7): Security, 65(??):50–63, 63–74, July 2010. CODEN March 2017. CODEN SINODQ. ISSN 0362-1340 CPSEDU. ISSN 0167-4048 (print), 1523-2867 (print), (print), 1872-6208 (elec- 1558-1160 (electronic). tronic). URL https:// www.sciencedirect.com/ Zielinska:2014:TS science/article/pii/S0167404816301559. [ZMS14] Elzbieta Zieli´nska, Wo- Zafar:2010:GRN jciech Mazurczyk, and Krzysztof Szczypiorski. [ZOC10] Fahad Zafar, Marc Olano, Trends in steganography. and Aaron Curtis. GPU Communications of the random numbers via the Association for Comput- Tiny Encryption Algo- ing Machinery, 57(3):86– rithm. In ????, edi- 95, March 2014. CODEN tor, HPG ’10 Proceed- CACMA2. ISSN 0001-0782 ings of the Conference on (print), 1557-7317 (elec- High Performance Graph- tronic). ics, Saarbrucken, Ger- many, June 25–27, 2010, Zhang:2016:CAH pages 133–141. Eurograph- [ZMW16] Leyou Zhang, Yi Mu, ics Association, Aire-la- and Qing Wu. Com- Ville, Switzerland, 2010. pact anonymous hierarchi- ISBN ???? LCCN cal identity-based encryp- ???? URL http://www. tion with constant size cs.umbc.edu/~olano/papers/ private keys. The Com- GPUTEA.pdf. puter Journal, 59(4):452– Zorpette:2012:BEC 461, April 2016. CODEN CMPJA6. ISSN 0010-4620 [Zor12] Glenn Zorpette. The begin- (print), 1460-2067 (elec- ning of the end of cash [spe- REFERENCES 648

cial report]. IEEE Spec- Zhao:2012:SSS trum, 49(6):27–29, June 2012. CODEN IEESAM. [ZPWY12] Dawei Zhao, Haipeng ISSN 0018-9235 (print), Peng, Cong Wang, and 1939-9340 (electronic). Yixian Yang. A secret shar- ing scheme with a short Zhang:2017:PPN share realizing the (t, n) [ZOSZ17] Yuankai Zhang, Adam threshold and the adver- O’Neill, Micah Sherr, and sary structure. Computers Wenchao Zhou. Privacy- and Mathematics with Ap- preserving network prove- plications, 64(4):611–615, nance. Proceedings of the August 2012. CODEN VLDB Endowment, 10(11): CMAPDK. ISSN 0898- 1550–1561, August 2017. 1221 (print), 1873-7668 CODEN ???? ISSN 2150- (electronic). URL http:// 8097. www.sciencedirect.com/ science/article/pii/S0898122111011382. Zavattoni:2015:SIA Zhou:2017:IBB [ZPM+15] E. Zavattoni, L. J. Dominguez Perez, S. Mitsunari, A. H. [ZPXX17] Fucai Zhou, Su Peng, Sanchez-Ramirez, T. Teruya, Jian Xu, and Zifeng Xu. and F. Rodriguez-Henriquez. Identity-based batch prov- Software implementation able data possession with of an attribute-based en- detailed analyses. Inter- cryption scheme. IEEE national Journal of Foun- Transactions on Comput- dations of Computer Sci- ers, 64(5):1429–1441, ???? ence (IJFCS), 28(6):743– 2015. CODEN ITCOB4. ??, September 2017. CO- ISSN 0018-9340 (print), DEN IFCSEN. ISSN 0129- 1557-9956 (electronic). 0541. Zheng:2016:EUV Zenger:2016:AKE [ZPW16] Nan Zheng, Aaron Paloski, [ZPZ+16] Christian T. Zenger, Mario and Haining Wang. An Pietersz, Jan Zimmer, efficient user verification Jan-Felix Posielek, Thor- system using angle-based ben Lenze, and Christof mouse movement biomet- Paar. Authenticated rics. ACM Transactions key establishment for on Information and Sys- low-resource devices ex- tem Security, 18(3):11:1– ploiting correlated ran- 11:??, April 2016. CODEN dom channels. Com- ATISBQ. ISSN 1094-9224 puter Networks (Amster- (print), 1557-7406 (elec- dam, Netherlands: 1999), tronic). 109 (part 1)(??):105–123, REFERENCES 649

November 9, 2016. CO- October 6, 2010. CODEN DEN ???? ISSN 1389-1286 ???? ISSN 1389-1286. (print), 1872-7069 (elec- Zmudzinski:2012:WEU tronic). URL http:// www.sciencedirect.com/ [ZS12] Sascha Zmudzinski and science/article/pii/S1389128616301943. Martin Steinebach. Wa- termark embedding using Zhang:2016:SBA audio fingerprinting. Lec- ture Notes in Computer [ZQD16] Yue Zhang, Jing Qin, and Science, 7228:63–79, 2012. Lihua Du. A secure biomet- CODEN LNCSD9. ISSN ric authentication based 0302-9743 (print), 1611- on PEKS. Concurrency 3349 (electronic). URL and Computation: Prac- http://link.springer. tice and Experience,28 com/chapter/10.1007/978- (4):1111–1123, March 25, 3-642-31971-6_4/. 2016. CODEN CCPEBO. ISSN 1532-0626 (print), Zhao:2012:SSM 1532-0634 (electronic). [ZSA12] Hong Zhao, Yun Q. Zhang:2015:MAA Shi, and Nirwan Ansari. Steganography in stream- [ZQQ15] G. Zhang, J. Qin, and ing multimedia over net- S. Qazi. Multi-authority works. Lecture Notes in attribute-based encryp- Computer Science, 7110: tion scheme from lattices. 96–114, 2012. CO- J.UCS: Journal of Univer- DEN LNCSD9. ISSN sal Computer Science,21 0302-9743 (print), 1611- (3):483–??, ???? 2015. CO- 3349 (electronic). URL DEN ???? ISSN 0948- http://link.springer. 695X (print), 0948-6968 com/chapter/10.1007/978- (electronic). URL http:/ 3-642-28693-3_7/. /www.jucs.org/jucs_21_ Zhou:2019:LIN 3/multi_authority_attribute_ based. [ZSH+19] Lu Zhou, Chunhua Su, Zhi Zhang:2010:EMO Hu, Sokjoon Lee, and Hwa- jeong Seo. Lightweight [ZQWZ10] Lei Zhang, Bo Qin, Qian- implementations of NIST hong Wu, and Futai Zhang. p-256 and SM2 ECC on Efficient many-to-one au- 8-bit resource-constraint thentication with certifi- embedded device. ACM cateless aggregate signa- Transactions on Embedded tures. Computer Networks Computing Systems, 18(3): (Amsterdam, Netherlands: 23:1–23:??, June 2019. CO- 1999), 54(14):2482–2491, DEN ???? ISSN 1539-9087 REFERENCES 650

(print), 1558-3465 (elec- fied algorithm of construct- tronic). URL https:// ing integral distinguishers dl.acm.org/ft_gateway. for block ciphers. Lecture cfm?id=3236010. Notes in Computer Sci- Zheng:2018:GDP ence, 7341:117–134, 2012. CODEN LNCSD9. ISSN [ZSMS18] Zhigao Zheng, Nitin Sax- 0302-9743 (print), 1611- ena, K. K. Mishra, and 3349 (electronic). URL Arun Kumar Sangaiah. http://link.springer. Guided dynamic parti- com/chapter/10.1007/978- cle swarm optimization 3-642-31284-7_8/. for optimizing digital im- Zhou:2018:TPW age watermarking in in- dustry applications. Fu- [ZSW+18a] Lu Zhou, Chunhua Su, ture Generation Computer Yamin Wen, Weijie Li, Systems, 88(??):92–106, and Zheng Gong. To- November 2018. CODEN wards practical white- FGSEVI. ISSN 0167-739X box lightweight block ci- (print), 1872-7115 (elec- pher implementations for tronic). URL http:// IoTs. Future Genera- www.sciencedirect.com/ tion Computer Systems, science/article/pii/S0167739X18307945. 86(??):507–514, Septem- Zanon:2019:FKC ber 2018. CODEN FG- SEVI. ISSN 0167-739X [ZSP+19] G. H. M. Zanon, M. A. (print), 1872-7115 (elec- Simplicio, G. C. C. F. tronic). URL https:// Pereira, J. Doliskani, and www.sciencedirect.com/ P. S. L. M. Barreto. science/article/pii/S0167739X17326705. Faster key compression for isogeny-based cryptosys- Zuo:2018:CSA tems. IEEE Transactions [ZSW+18b] Cong Zuo, Jun Shao, Guiyi on Computers, 68(5):688– Wei, Mande Xie, and Min 701, May 2019. CODEN Ji. CCA-secure ABE with ITCOB4. ISSN 0018-9340 outsourced decryption for (print), 1557-9956 (elec- fog computing. Future tronic). Generation Computer Sys- Zhang:2012:EHO tems, 78 (part 2)(??):730– 738, January 2018. CO- [ZSW+12] Wentao Zhang, Bozhan DEN FGSEVI. ISSN 0167- Su, Wenling Wu, Dengguo 739X (print), 1872-7115 Feng, and Chuankun Wu. (electronic). URL http:// Extending higher-order in- www.sciencedirect.com/ tegral: An efficient uni- science/article/pii/S0167739X16304745. REFERENCES 651

Zhou:2019:LCP comjnl.oxfordjournals. org/content/58/4/549. [ZSY19] Lu Zhou, Chunhua Su, and Kuo-Hui Yeh. A Zwattendorfer:2012:CBL lightweight cryptographic [ZTSR12] Bernd Zwattendorfer, Arne protocol with certificate- Tauber, Klaus Stranacher, less signature for the In- and Peter Reichst¨adter. ternet of Things. ACM Cross-border legal iden- Transactions on Embedded tity management. Lecture Computing Systems, 18(3): Notes in Computer Sci- 28:1–28:??, June 2019. CO- ence, 7443:149–161, 2012. DEN ???? ISSN 1539-9087 CODEN LNCSD9. ISSN (print), 1558-3465 (elec- 0302-9743 (print), 1611- tronic). URL https:// 3349 (electronic). URL dl.acm.org/ft_gateway. http://link.springer. cfm?id=3301306. com/chapter/10.1007/978- Zhang:2014:NCM 3-642-33489-4_13/. Zhang:2016:EEA [ZT14] Miao Zhang and Xiaojun Tong. A new chaotic [ZTZ16] Liping Zhang, Shanyu map based image encryp- Tang, and Shaohui Zhu. tion schemes for several im- An energy efficient authen- age formats. The Jour- ticated key agreement pro- nal of Systems and Soft- tocol for SIP-based green ware, 98(??):140–154, De- VoIP networks. Journal cember 2014. CODEN JS- of Network and Computer SODM. ISSN 0164-1212 Applications, 59(??):126– (print), 1873-1228 (elec- 133, January 2016. CO- tronic). URL http:// DEN JNCAF3. ISSN 1084- www.sciencedirect.com/ 8045 (print), 1095-8592 science/article/pii/S0164121214001915. (electronic). URL http:// www.sciencedirect.com/ Zhu:2015:PPD science/article/pii/S1084804515001666. [ZTL15] Hong Zhu, Shengli Tian, Zhou:2016:SRB and Kevin L¨u. Privacy- preserving data publication [ZVG16] Lan Zhou, Vijay Varad- with features of indepen- harajan, and K. Gopinath. dent `-diversity. The Com- A secure role-based cloud puter Journal, 58(4):549– storage system for en- 571, April 2015. CODEN crypted patient-centric CMPJA6. ISSN 0010-4620 health records. The (print), 1460-2067 (elec- Computer Journal,59 tronic). URL http:// (11):1593–1611, Novem- REFERENCES 652

ber 2016. CODEN CM- tolerating and attribute- PJA6. ISSN 0010-4620 hiding functional encryp- (print), 1460-2067 (elec- tion mechanism with del- tronic). URL http:// egation in affine subspaces. comjnl.oxfordjournals. The Journal of Supercom- org/content/59/11/1593. puting, 70(3):1405–1432, December 2014. CO- Zhou:2014:SAC DEN JOSUED. ISSN [ZVH14] Lan Zhou, Vijay Varad- 0920-8542 (print), 1573- harajan, and Michael 0484 (electronic). URL Hitchens. Secure admin- http://link.springer. istration of cryptographic com/article/10.1007/s11227- role-based access control 014-1234-6. for large-scale cloud stor- Zhang:2011:AGK age systems. Journal [ZWQ+11] Lei Zhang, Qianhong Wu, of Computer and System Bo Qin, Josep Domingo- Sciences, 80(8):1518–1533, Ferrer, and Ursula´ Gonz´alez- December 2014. CODEN Nicol´as. Asymmetric group JCSSBM. ISSN 0022-0000 key agreement protocol (print), 1090-2724 (elec- for open networks and tronic). URL http:// its application to broad- www.sciencedirect.com/ cast encryption. Com- science/article/pii/S0022000014000634. puter Networks (Amster- Zhang:2015:FAA dam, Netherlands: 1999), 55(15):3246–3255, Octo- [ZW15] Zhiyong Zhang and Kan- ber 27, 2011. CODEN liang Wang. A formal an- ???? ISSN 1389-1286 alytic approach to credible (print), 1872-7069 (elec- potential path and mining tronic). URL http:// algorithms for multimedia www.sciencedirect.com/ social networks. The Com- science/article/pii/S1389128611002283. puter Journal, 58(4):668– 678, April 2015. CODEN Zhou:2018:QTA CMPJA6. ISSN 0010-4620 [ZWS+18] Lu Zhou, Quanlong Wang, (print), 1460-2067 (elec- Xin Sun, Piotr Kulicki, tronic). URL http:// and Arcangelo Castiglione. comjnl.oxfordjournals. Quantum technique for ac- org/content/58/4/668. cess control in cloud com- Zhang:2014:LFL puting II: Encryption and key distribution. Journal [ZWM14] Mingwu Zhang, Chunzhi of Network and Computer Wang, and Kirill Moro- Applications, 103(??):178– zov. LR-FEAD: leakage- 184, February 1, 2018. CO- REFERENCES 653

DEN JNCAF3. ISSN 1084- 5903. URL https://www. 8045 (print), 1095-8592 mdpi.com/1999-5903/9/ (electronic). URL http:// 2/13. www.sciencedirect.com/ Zhang:2013:LPP science/article/pii/S1084804517303922. [ZWY+13] Ye Zhang, Wai-Kit Wong, Zilberberg:2013:PCM S. M. Yiu, Nikos Mamoulis, [ZWT13] Omer Zilberberg, Shlomo and David W. Cheung. Weiss, and Sivan Toledo. Lightweight privacy-preserving Phase-change memory: peer-to-peer data integra- an architectural perspec- tion. Proceedings of the tive. ACM Computing VLDB Endowment, 6(3): Surveys, 45(3):29:1–29:33, 157–168, January 2013. June 2013. CODEN CODEN ???? ISSN 2150- CMSVAN. ISSN 0360-0300 8097. (print), 1557-7341 (elec- Zhang:2019:MAA tronic). [ZWY+19] Xiao Zhang, Faguo Wu, Zhang:2015:FER Wang Yao, Zhao Wang, and Wenhua Wang. Multi- [ZWTM15] Mingwu Zhang, Chun- authority attribute-based zhi Wang, Tsuyoshi Tak- encryption scheme with agi, and Yi Mu. Func- constant-size ciphertexts tional encryption resilient and user revocation. Con- to hard-to-invert leak- currency and Computa- age. The Computer Jour- tion: Practice and Ex- nal, 58(4):735–749, April perience, 31(21):e4678:1– 2015. CODEN CM- e4678:??, November 10, PJA6. ISSN 0010-4620 2019. CODEN CCPEBO. (print), 1460-2067 (elec- ISSN 1532-0626 (print), tronic). URL http:// 1532-0634 (electronic). comjnl.oxfordjournals. org/content/58/4/735. Zhang:2017:FWI Zhang:2017:FBI [ZWZ17a] Heng Zhang, Chengyou Wang, and Xiao Zhou. [ZWWW17] Yunpeng Zhang, Chengyou Fragile watermarking for Wang, Xiaoli Wang, and image authentication using Min Wang. Feature-based the characteristic of SVD. image watermarking al- Algorithms (Basel), 10(1), gorithm using SVD and March 2017. CODEN APBT for copyright pro- ALGOCH. ISSN 1999- tection. Future Internet,9 4893 (electronic). URL (2):13, April 19, 2017. CO- https://www.mdpi.com/ DEN ???? ISSN 1999- 1999-4893/10/1/27. REFERENCES 654

Zhang:2017:RIW extension to a threshold encryption scheme. Fu- [ZWZ17b] Heng Zhang, Chengyou ture Generation Computer Wang, and Xiao Zhou. A Systems, 36(??):180–186, robust image watermark- July 2014. CODEN FG- ing scheme based on SVD SEVI. ISSN 0167-739X in the spatial domain. Fu- (print), 1872-7115 (elec- ture Internet, 9(3):45, Au- tronic). URL http:// gust 07, 2017. CODEN www.sciencedirect.com/ ???? ISSN 1999-5903. science/article/pii/S0167739X13002422. URL https://www.mdpi. com/1999-5903/9/3/45. Zhang:2019:SPB Zhou:2011:PSA [ZXL19] Rui Zhang, Rui Xue, and Ling Liu. Se- [ZX11] Tao Zhou and Jing Xu. curity and privacy on Provable secure authen- blockchain. ACM Com- tication protocol with puting Surveys, 52(3):51:1– anonymity for roaming ser- 51:??, July 2019. CODEN vice in global mobility net- CMSVAN. ISSN 0360-0300 works. Computer Networks (print), 1557-7341 (elec- (Amsterdam, Netherlands: tronic). URL https:// 1999), 55(1):205–213, Jan- dl.acm.org/ft_gateway. uary 7, 2011. CODEN ???? cfm?id=3316481. ISSN 1389-1286. Zhang:2018:AKE Zhang:2016:PAG [ZXW+18] Yuexin Zhang, Yang Xi- [ZXH16] Yuexin Zhang, Yang Xi- ang, Tao Wang, Wei Wu, ang, and Xinyi Huang. and Jian Shen. An Password-authenticated group over-the-air key establish- key exchange: a cross- ment protocol using key- layer design. ACM Trans- less cryptography. Future actions on Internet Tech- Generation Computer Sys- nology (TOIT), 16(4):24:1– tems, 79 (part 1)(??):284– 24:??, December 2016. CO- 294, 2018. CODEN FG- DEN ???? ISSN 1533-5399 SEVI. ISSN 0167-739X (print), 1557-6051 (elec- (print), 1872-7115 (elec- tronic). tronic). URL https:// Zhang:2014:EFH www.sciencedirect.com/ science/article/pii/S0167739X1630752X. [ZXJ+14] Xiaojun Zhang, Chunxiang Zhang:2018:VPA Xu, Chunhua Jin, Run Xie, and Jining Zhao. Efficient [ZXWA18] Yuexin Zhang, Yang Xi- fully homomorphic encryp- ang, Wei Wu, and Ab- tion from RLWE with an dulhameed Alelaiwi. A REFERENCES 655

variant of password au- Zhou:2017:CLR thenticated key exchange protocol. Future Genera- [ZY17a] Yanwei Zhou and Bo Yang. tion Computer Systems,78 Continuous leakage-resilient (part 2)(??):699–711, Jan- public-key encryption scheme uary 2018. CODEN FG- with CCA security. The SEVI. ISSN 0167-739X Computer Journal, 60(8): (print), 1872-7115 (elec- 1161–1172, August 1, 2017. tronic). URL http:// CODEN CMPJA6. ISSN www.sciencedirect.com/ 0010-4620 (print), 1460- science/article/pii/S0167739X17302145. 2067 (electronic). URL https://academic.oup. com/comjnl/article/60/ Zhang:2016:DEP 8/1161/2882687.

[ZXYL16] Rui Zhang, Rui Xue, Ting Zhou:2017:LRC Yu, and Ling Liu. Dy- [ZY17b] Yanwei Zhou and Bo Yang. namic and efficient pri- Leakage-resilient CCA2- vate keyword search over secure certificateless public- inverted index-based en- key encryption scheme crypted data. ACM Trans- without bilinear pair- actions on Internet Tech- ing. Information Process- nology (TOIT), 16(3):21:1– ing Letters, 130(??):16–24, 21:??, August 2016. CO- February 2017. CODEN DEN ???? ISSN 1533-5399 IFPLAT. ISSN 0020-0190 (print), 1557-6051 (elec- (print), 1872-6119 (elec- tronic). tronic). URL http:// www.sciencedirect.com/ Zhang:2011:SIR science/article/pii/S0020019017301680. Zhang:2017:GFD [ZXZ+11] Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, and [ZYC+17] Jian Zhang, Yang Yang, Yi Mu. Secure image Yanjiao Chen, Jing Chen, retrieval based on visual and Qian Zhang. A gen- content and watermarking eral framework to design protocol. The Computer secure cloud storage pro- Journal, 54(10):1661–1674, tocol using homomorphic October 2011. CODEN encryption scheme. Com- CMPJA6. ISSN 0010-4620 puter Networks (Amster- (print), 1460-2067 (elec- dam, Netherlands: 1999), tronic). URL http:// 129 (part 1)(??):37–50, De- comjnl.oxfordjournals. cember 24, 2017. CO- org/content/54/10/1661. DEN ???? ISSN 1389-1286 full.pdf+html. (print), 1872-7069 (elec- REFERENCES 656

tronic). URL http:// plications, 103(??):18–28, www.sciencedirect.com/ February 1, 2018. CODEN science/article/pii/S1389128617303328. JNCAF3. ISSN 1084-8045 (print), 1095-8592 (elec- Zheng:2010:PS tronic). URL http:// [ZYD10] Yuliang Zheng, Moti Yung, www.sciencedirect.com/ and Alexander W. Dent, science/article/pii/S1084804517303909. editors. Practical Signcryp- Zhou:2019:CLR tion. Information Security and Cryptography. Spring- [ZYH+19] Yanwei Zhou, Bo Yang, er-Verlag, Berlin, Ger- Hongxia Hou, Lina Zhang, many / Heidelberg, Ger- Tao Wang, and Mingxiao many / London, UK / etc., Hu. Continuous leakage- 2010. ISBN 3-540-89409- resilient identity-based en- 8, 3-540-89411-X (e-book). cryption with tight secu- xviii + 274 pp. LCCN rity. The Computer Jour- QA76. 9. A25 P73 2010. nal, 62(8):1092–1105, Au- gust 2019. CODEN CM- Zhan:2017:NKG PJA6. ISSN 0010-4620 [ZYGT17] Furui Zhan, Nianmin (print), 1460-2067 (elec- Yao, Zhenguo Gao, and tronic). URL http:// Guozhen Tan. A novel academic.oup.com/comjnl/ key generation method for article/62/8/1092/5288324. wireless sensor networks Zhang:2010:ASL based on system of equa- tions. Journal of Net- [ZYL+10] Youtao Zhang, Jun Yang, work and Computer Ap- Weijia Li, Linzhang Wang, plications, 82(??):114–127, and Lingling Jin. An au- March 15, 2017. CODEN thentication scheme for lo- JNCAF3. ISSN 1084-8045 cating compromised sensor (print), 1095-8592 (elec- nodes in WSNs. Journal tronic). URL http:// of Network and Computer www.sciencedirect.com/ Applications, 33(1):50–62, science/article/pii/S1084804517300395. January 2010. CODEN JNCAF3. ISSN 1084-8045 Zhan:2018:EKG (print), 1095-8592 (elec- [ZYGY18] Furui Zhan, Nianmin Yao, tronic). URL http:// Zhenguo Gao, and Haitao www.sciencedirect.com/ Yu. Efficient key gen- science/article/pii/S1084804509000976. eration leveraging wire- Zhou:2018:CLR less channel reciprocity for MANETs. Journal of Net- [ZYM18] Yanwei Zhou, Bo Yang, work and Computer Ap- and Yi Mu. Continuous REFERENCES 657

leakage-resilient identity- Bo Yang. Leakage resilient based encryption without CCA security in stronger random oracles. The Com- model: Branch hidden puter Journal, 61(4):586– ABO-LTFs and their ap- 600, April 1, 2018. CODEN plications. The Com- CMPJA6. ISSN 0010-4620 puter Journal, 62(4):631– (print), 1460-2067 (elec- 640, April 2019. CODEN tronic). URL http:// CMPJA6. ISSN 0010-4620 academic.oup.com/comjnl/ (print), 1460-2067 (elec- article/61/4/586/4824746. tronic). URL http:// academic.oup.com/comjnl/ Zhou:2019:GCC article/62/4/631/5272751. [ZYM19] Yanwei Zhou, Bo Yang, Zhang:2019:LRH and Yi Mu. The generic + construction of continuous [ZYZ 19] Yinghui Zhang, Men- leakage-resilient identity- glei Yang, Dong Zheng, based cryptosystems. The- Tiantian Zhang, Rui Guo, oretical Computer Sci- and Fang Ren. Leakage- ence, 772(??):1–45, June resilient hierarchical identity- 7, 2019. CODEN TC- based encryption with re- SCDI. ISSN 0304-3975 cipient anonymity. Inter- (print), 1879-2294 (elec- national Journal of Foun- tronic). URL http:// dations of Computer Sci- www.sciencedirect.com/ ence (IJFCS), 30(5):665– science/article/pii/S0304397518307096. 681, August 2019. CO- DEN IFCSEN. ISSN Zhang:2013:BLR 0129-0541. URL https: //www.worldscientific. [ZYT13] Mingwu Zhang, Bo Yang, com/doi/10.1142/S0129054119400197. and Tsuyoshi Takagi. Bounded leakage-resilient Zhang:2011:EPK functional encryption with [ZZ11] Bo Zhang and Fangguo hidden vector predicate. Zhang. An efficient pub- The Computer Journal,56 lic key encryption with (4):464–477, April 2013. conjunctive-subset key- CODEN CMPJA6. ISSN words search. Journal 0010-4620 (print), 1460- of Network and Computer 2067 (electronic). URL Applications, 34(1):262– http://comjnl.oxfordjournals. 267, January 2011. CO- org/content/56/4/464. DEN JNCAF3. ISSN 1084- full.pdf+html. 8045 (print), 1095-8592 Zhao:2019:LRC (electronic). URL http:// www.sciencedirect.com/ [ZYY19] Yi Zhao, Yong Yu, and science/article/pii/S1084804510001293. REFERENCES 658

Zhao:2012:FCS (print), 1532-0634 (elec- tronic). [ZZ12] Xingwen Zhao and Fang- guo Zhang. Fully CCA2 se- Zhou:2017:ENQ cure identity-based broad- [ZZC17] Lu Zhou, Youwen Zhu, and cast encryption with black- Aniello Castiglione. Effi- box accountable authority. cient k-NN query over en- The Journal of Systems crypted data in cloud with and Software, 85(3):708– limited key-disclosure and 716, March 2012. CODEN offline data owner. Com- JSSODM. ISSN 0164-1212 puters & Security, 69(??): (print), 1873-1228 (elec- 84–96, August 2017. CO- tronic). URL http:// DEN CPSEDU. ISSN www.sciencedirect.com/ 0167-4048 (print), 1872- science/article/pii/S016412121100255X. 6208 (electronic). URL Zhang:2015:ITS https://www.sciencedirect. com/science/article/pii/ [ZZ15] Jie Zhang and Futai Zhang. S0167404816301663. Information-theoretical se- Zhuang:2014:SCA cure verifiable secret shar- ing with vector space ac- [ZZCJ14] Yixin Zhuang, Ming Zou, cess structures over bilinear Nathan Carr, and Tao Ju. groups and its applications. Shapes and cryptography: Future Generation Com- Anisotropic geodesics for puter Systems, 52(??):109– live-wire mesh segmenta- 115, November 2015. CO- tion. Computer Graphics DEN FGSEVI. ISSN 0167- Forum, 33(7):111–120, Oc- 739X (print), 1872-7115 tober 2014. CODEN CG- (electronic). URL http:// FODY. ISSN 0167-7055 www.sciencedirect.com/ (print), 1467-8659 (elec- science/article/pii/S0167739X14002477. tronic).

Zheng:2015:EPT Zaidan:2017:NDW

[ZZC15] Minghui Zheng, Huihua [ZZKA17] B. B. Zaidan, A. A. Zaidan, Zhou, and Jing Chen. An H. Abdul. Karim, and efficient protocol for two- N. N. Ahmad. A new party explicit authenti- digital watermarking eval- cated key agreement. Con- uation and benchmarking currency and Computa- methodology using an ex- tion: Practice and Expe- ternal group of evaluators rience, 27(12):2954–2963, and multi-criteria analy- August 25, 2015. CODEN sis based on ‘large-scale CCPEBO. ISSN 1532-0626 data’. Software—Practice REFERENCES 659

and Experience, 47(10): hash proof system. The 1365–1392, October 2017. Computer Journal, 60(4): CODEN SPEXBL. ISSN 541–554, March 23, 2017. 0038-0644 (print), 1097- CODEN CMPJA6. ISSN 024X (electronic). 0010-4620 (print), 1460- 2067 (electronic). URL Zhu:2018:CAC https://academic.oup. [ZZL+18] Biaokai Zhu, Jumin Zhao, com/comjnl/article/60/ Dengao Li, Hong Wang, 4/541/2608069. Ruiqin Bai, Yanxia Li, and Zeng:2019:SAE Hao Wu. Cloud access con- + trol authentication system [ZZQ 19] Ming Zeng, Kai Zhang, using dynamic accelerom- Haifeng Qian, Xiaofeng eters data. Concurrency Chen, and Jie Chen. and Computation: Prac- A searchable asymmet- tice and Experience,30 ric encryption scheme (20):e4474:1–e4474:??, Oc- with support for Boolean tober 25, 2018. CODEN queries for cloud appli- CCPEBO. ISSN 1532-0626 cations. The Computer (print), 1532-0634 (elec- Journal, 62(4):563–578, tronic). April 2019. CODEN CM- PJA6. ISSN 0010-4620 Zhu:2019:ICR (print), 1460-2067 (elec- tronic). URL http:// + [ZZL 19] Youwen Zhu, Yue Zhang, academic.oup.com/comjnl/ Xingxin Li, Hongyang article/62/4/563/5253754. Yan, and Jing Li. Im- proved collusion-resisting Zhang:2019:LAS secure nearest neighbor [ZZY+19] Liping Zhang, Lanchao query over encrypted data Zhao, Shuijun Yin, Chi- in cloud. Concurrency Hung Chi, Ran Liu, and Computation: Practice and Yixin Zhang. A and Experience, 31(21): lightweight authentication e4681:1–e4681:??, Novem- scheme with privacy pro- ber 10, 2019. CODEN tection for smart grid com- CCPEBO. ISSN 1532-0626 munications. Future Gen- (print), 1532-0634 (elec- eration Computer Systems, tronic). 100(??):770–778, Novem- Zhang:2017:NLR ber 2019. CODEN FG- SEVI. ISSN 0167-739X [ZZM17] Leyou Zhang, Jingxia (print), 1872-7115 (elec- Zhang, and Yi Mu. Novel tronic). URL http:// leakage-resilient attribute- www.sciencedirect.com/ based encryption from science/article/pii/S0167739X19310398.