(2012): Volumes 7200–7249 - Index of files in - University of Utah
(2012): Volumes 7200–7249 - Index of files in - University of Utah
(2012): Volumes 7200–7249 - Index of files in - University of Utah
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
REFERENCES 126<br />
Guo:<strong>2012</strong>:ETD<br />
[616] Teng Guo, Feng Liu, and ChuanKun Wu. On the equivalence <strong>of</strong> two<br />
def<strong>in</strong>itions <strong>of</strong> visual cryptography scheme. Lecture Notes <strong>in</strong> Computer<br />
Science, 7232:217–227, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t),<br />
1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.<br />
1007/978-3-642-29101-2_15/.<br />
Sh<strong>in</strong>ohara:<strong>2012</strong>:KLE<br />
[617] Naoyuki Sh<strong>in</strong>ohara, Takeshi Shimoyama, Takuya Hayashi, and Tsuyoshi<br />
Takagi. Key length estimation <strong>of</strong> pair<strong>in</strong>g-based cryptosystems us<strong>in</strong>g ηT<br />
pair<strong>in</strong>g. Lecture Notes <strong>in</strong> Computer Science, 7232:228–244, <strong>2012</strong>. CODEN<br />
LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://<br />
l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-642-29101-2_16/.<br />
Izawa:<strong>2012</strong>:LIX<br />
[618] Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote. Lightweight <strong>in</strong>tegrity<br />
for XOR network cod<strong>in</strong>g <strong>in</strong> wireless sensor networks. Lecture Notes<br />
<strong>in</strong> Computer Science, 7232:245–258, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />
9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />
chapter/10.1007/978-3-642-29101-2_17/.<br />
Braun:<strong>2012</strong>:IMS<br />
[619] Johannes Braun, Moritz Horsch, and Alexander Wiesmaier. iPIN and<br />
mTAN for secure eID applications. Lecture Notes <strong>in</strong> Computer Science,<br />
7232:259–276, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-<br />
3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/<br />
978-3-642-29101-2_18/.<br />
Liedel:<strong>2012</strong>:SDC<br />
[620] Manuel Liedel. Secure distributed computation <strong>of</strong> the square root<br />
and applications. Lecture Notes <strong>in</strong> Computer Science, 7232:277–288,<br />
<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />
URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />
642-29101-2_19/.<br />
Shuo:<strong>2012</strong>:PKR<br />
[621] Tian Shuo, He Yep<strong>in</strong>g, and D<strong>in</strong>g Baozeng. Prevent kernel return-oriented<br />
programm<strong>in</strong>g attacks us<strong>in</strong>g hardware virtualization. Lecture Notes <strong>in</strong><br />
Computer Science, 7232:289–300, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />
9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />
chapter/10.1007/978-3-642-29101-2_20/.