01.08.2013 Views

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

REFERENCES 126<br />

Guo:<strong>2012</strong>:ETD<br />

[616] Teng Guo, Feng Liu, and ChuanKun Wu. On the equivalence <strong>of</strong> two<br />

def<strong>in</strong>itions <strong>of</strong> visual cryptography scheme. Lecture Notes <strong>in</strong> Computer<br />

Science, 7232:217–227, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t),<br />

1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.<br />

1007/978-3-642-29101-2_15/.<br />

Sh<strong>in</strong>ohara:<strong>2012</strong>:KLE<br />

[617] Naoyuki Sh<strong>in</strong>ohara, Takeshi Shimoyama, Takuya Hayashi, and Tsuyoshi<br />

Takagi. Key length estimation <strong>of</strong> pair<strong>in</strong>g-based cryptosystems us<strong>in</strong>g ηT<br />

pair<strong>in</strong>g. Lecture Notes <strong>in</strong> Computer Science, 7232:228–244, <strong>2012</strong>. CODEN<br />

LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://<br />

l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-642-29101-2_16/.<br />

Izawa:<strong>2012</strong>:LIX<br />

[618] Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote. Lightweight <strong>in</strong>tegrity<br />

for XOR network cod<strong>in</strong>g <strong>in</strong> wireless sensor networks. Lecture Notes<br />

<strong>in</strong> Computer Science, 7232:245–258, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

chapter/10.1007/978-3-642-29101-2_17/.<br />

Braun:<strong>2012</strong>:IMS<br />

[619] Johannes Braun, Moritz Horsch, and Alexander Wiesmaier. iPIN and<br />

mTAN for secure eID applications. Lecture Notes <strong>in</strong> Computer Science,<br />

7232:259–276, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-<br />

3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/<br />

978-3-642-29101-2_18/.<br />

Liedel:<strong>2012</strong>:SDC<br />

[620] Manuel Liedel. Secure distributed computation <strong>of</strong> the square root<br />

and applications. Lecture Notes <strong>in</strong> Computer Science, 7232:277–288,<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-29101-2_19/.<br />

Shuo:<strong>2012</strong>:PKR<br />

[621] Tian Shuo, He Yep<strong>in</strong>g, and D<strong>in</strong>g Baozeng. Prevent kernel return-oriented<br />

programm<strong>in</strong>g attacks us<strong>in</strong>g hardware virtualization. Lecture Notes <strong>in</strong><br />

Computer Science, 7232:289–300, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

chapter/10.1007/978-3-642-29101-2_20/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!