 |
|
 |
Accepted Papers
Networks, Security and Cryptography- Dušan Bernát (Bratislava, Slovakia)
Domain name system as a memory and communication medium
- Feng Cheng and Christoph Meinel (Potsdam, Germany)
Strong authentication over lock-keeper
- Jacek Cichoń, Mirosław Kutyłowski, and Bogdan Węglorz (Wrocław, Poland)
Short ballot assumption and threeballot voting protocol
- Marek Klonowski, Przemysław Kubiak, and Mirosław Kutyłowski (Wrocław, Poland)
Practical deniable encryption
- Matej Košík (Bratislava, Slovakia)
Taming of Pict
- Shoichi Morimoto (Tokyo, Japan), Shinjiro Shigematsu, Yuichi Goto, and Jingde Cheng (Saitama, Japan)
Classification, formalization and verification of security functional requirements
- Jordi Pont-Tuset, Pau Medrano-Gracia (Barcelona, Spain), Jordi Nin (Bellaterra, Spain), Josep-L. Larriba-Pey, and Victor Muntés-Mulero (Barcelona, Spain)
ONN the use of neural networks for data privacy
- Peishun Wang, Huaxiong Wang, and Josef Pieprzyk (Sydney/NSW, Australia)
Threshold privacy preserving keyword searches
|
|