@Preamble{
"\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi" #
"\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
"\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi" #
"\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" #
"\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" #
"\ifx \undefined \ocirc \def \ocirc #1{{\accent'27#1}}\fi" #
"\ifx \undefined \reg \def \reg {\circled{R}}\fi" #
"\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" #
"\hyphenation{
Ay-ka-nat
Giun-chi-glia
Lakh-neche
Mal-er-ba
Mart-el-li
Reut-e-nau-er
Thiel-sch-er
}"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"}
@String{pub-SV = "Springer-Verlag Inc."}
@String{pub-SV:adr = "New York, NY, USA"}
@String{ser-LNAI = "Lecture Notes in Artificial Intelligence"}
@String{ser-LNCS = "Lecture Notes in Computer Science"}
@Article{Anonymous:2011:FM,
author = "Anonymous",
title = "Front Matter",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "??--??",
year = "2011",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/bfm:978-3-642-20465-4/1",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Cramer:2011:ACT,
author = "Ronald Cramer",
title = "The Arithmetic Codex: Theory and Applications",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "1--1",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_1",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_1",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Nguyen:2011:LRA,
author = "Phong Q. Nguyen",
title = "Lattice Reduction Algorithms: Theory and Practice",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "2--6",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_2",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_2",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Kiltz:2011:EAH,
author = "Eike Kiltz and Krzysztof Pietrzak and David Cash and
Abhishek Jain and Daniele Venturi",
title = "Efficient Authentication from Hard Learning Problems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "7--26",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_3",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_3",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Stehle:2011:MNS,
author = "Damien Stehl{\'e} and Ron Steinfeld",
title = "Making {NTRU} as Secure as Worst-Case Problems over
Ideal Lattices",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "27--47",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_4",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_4",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Aranha:2011:FEF,
author = "Diego F. Aranha and Koray Karabina and Patrick Longa
and Catherine H. Gebotys and Julio L{\'o}pez",
title = "Faster Explicit Formulas for Computing Pairings over
Ordinary Curves",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "48--68",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_5",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_5",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Moradi:2011:PLV,
author = "Amir Moradi and Axel Poschmann and San Ling and
Christof Paar and Huaxiong Wang",
title = "Pushing the Limits: {A} Very Compact and a Threshold
Implementation of {AES}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "69--88",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_6",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_6",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Boyle:2011:FLR,
author = "Elette Boyle and Gil Segev and Daniel Wichs",
title = "Fully Leakage-Resilient Signatures",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "89--108",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_7",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_7",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Renauld:2011:FSP,
author = "Mathieu Renauld and Fran{\c{c}}ois-Xavier Standaert
and Nicolas Veyrat-Charvillon and Dina Kamel",
title = "A Formal Study of Power Variability Issues and
Side-Channel Attacks for Nanoscale Devices",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "109--128",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_8",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_8",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Gentry:2011:IGF,
author = "Craig Gentry and Shai Halevi",
title = "Implementing {Gentry}'s Fully-Homomorphic Encryption
Scheme",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "129--148",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_9",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Boneh:2011:HSP,
author = "Dan Boneh and David Mandell Freeman",
title = "Homomorphic Signatures for Polynomial Functions",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "149--168",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_10",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_10",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bendlin:2011:SHE,
author = "Rikke Bendlin and Ivan Damga{\aa}rd and Claudio
Orlandi and Sarah Zakarias",
title = "Semi-homomorphic Encryption and Multiparty
Computation",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "169--188",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_11",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_11",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Schage:2011:TPS,
author = "Sven Sch{\"a}ge",
title = "Tight Proofs for Signature Schemes without Random
Oracles",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "189--206",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_12",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_12",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Catalano:2011:APF,
author = "Dario Catalano and Dario Fiore and Bogdan Warinschi",
title = "Adaptive Pseudo-free Groups and Applications",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "207--223",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_13",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_13",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Fuchsbauer:2011:CSV,
author = "Georg Fuchsbauer",
title = "Commuting Signatures and Verifiable Encryption",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "224--245",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_14",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_14",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bouman:2011:SAW,
author = "Niek J. Bouman and Serge Fehr",
title = "Secure Authentication from a Weak Key, without Leaking
Information",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "246--265",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_15",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_15",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Ahmadi:2011:SKC,
author = "Hadi Ahmadi and Reihaneh Safavi-Naini",
title = "Secret Keys from Channel Noise",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "266--283",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_16",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_16",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Obana:2011:AOC,
author = "Satoshi Obana",
title = "Almost Optimum $t$-Cheater Identifiable Secret Sharing
Schemes",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "284--302",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_17",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_17",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Leander:2011:LHS,
author = "Gregor Leander",
title = "On Linear Hulls, Statistical Saturation Attacks,
{PRESENT} and a Cryptanalysis of {PUFFIN}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "303--322",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_18",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_18",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Dodis:2011:DEM,
author = "Yevgeniy Dodis and John Steinberger",
title = "Domain Extension for {MACs} Beyond the Birthday
Barrier",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "323--342",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_19",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_19",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Sepehrdad:2011:SAR,
author = "Pouyan Sepehrdad and Serge Vaudenay and Martin
Vuagnoux",
title = "Statistical Attack on {RC4}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "343--363",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_20",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_20",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Becker:2011:IGA,
author = "Anja Becker and Jean-S{\'e}bastien Coron and Antoine
Joux",
title = "Improved Generic Algorithms for Hard Knapsacks",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "364--385",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_21",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_21",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{shelat:2011:TOS,
author = "Abhi shelat and Chih-hao Shen",
title = "Two-Output Secure Computation with Malicious
Adversaries",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "386--405",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_22",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_22",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Ishai:2011:ENI,
author = "Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky
and Manoj Prabhakaran and Amit Sahai",
title = "Efficient Non-interactive Secure Computation",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "406--425",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_23",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_23",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Asharov:2011:TGT,
author = "Gilad Asharov and Ran Canetti and Carmit Hazay",
title = "Towards a Game Theoretic View of Secure Computation",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "426--445",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_24",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_24",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Lindell:2011:HEU,
author = "Yehuda Lindell",
title = "Highly-Efficient Universally-Composable Commitments
Based on the {DDH} Assumption",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "446--466",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_25",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_25",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Unruh:2011:CCB,
author = "Dominique Unruh",
title = "Concurrent Composition in the Bounded Quantum Storage
Model",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "467--486",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_26",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_26",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Ristenpart:2011:CCL,
author = "Thomas Ristenpart and Hovav Shacham and Thomas
Shrimpton",
title = "Careful with Composition: Limitations of the
Indifferentiability Framework",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "487--506",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_27",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_27",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Malkin:2011:ECS,
author = "Tal Malkin and Isamu Teranishi and Moti Yung",
title = "Efficient Circuit-Size Independent Public Key
Encryption with {KDM} Security",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "507--526",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_28",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_28",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Applebaum:2011:KDM,
author = "Benny Applebaum",
title = "Key-Dependent Message Security: Generic Amplification
and Completeness",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "527--546",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_29",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_29",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Lewko:2011:UHA,
author = "Allison Lewko and Brent Waters",
title = "Unbounded {HIBE} and Attribute-Based Encryption",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "547--567",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_30",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_30",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Lewko:2011:DAB,
author = "Allison Lewko and Brent Waters",
title = "Decentralizing Attribute-Based Encryption",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "568--588",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_31",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_31",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Wee:2011:TRC,
author = "Hoeteck Wee",
title = "Threshold and Revocation Cryptosystems via Extractable
Hash Proofs",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "589--609",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_32",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Jan 21 18:23:52 MST 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_32",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-20465-4",
book-URL = "http://www.springerlink.com/content/978-3-642-20465-4",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Durmuth:2011:DEN,
author = "Markus D{\"u}rmuth and David Mandell Freeman",
title = "Deniable Encryption with Negligible Detection
Probability: An Interactive Construction",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "610--626",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-20465-4_33",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_33",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Anonymous:2011:BM,
author = "Anonymous",
title = "Back Matter",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6632",
pages = "??--??",
year = "2011",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Sat Dec 15 17:44:03 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/content/pdf/bbm:978-3-642-20465-4/1",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Article{Kopetz:2011:WLB,
author = "Hermann Kopetz",
title = "What {I} Learned from {Brian}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "1--6",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_1",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_1/;
http://link.springer.com/content/pdf/bfm:978-3-642-24541-1/1.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Lloyd:2011:BRB,
author = "John L. Lloyd and Tom Anderson",
title = "{Brian Randell}: a Biographical Note",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "7--14",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_2",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_2/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Aviienis:2011:BRA,
author = "Algirdas Avi ienis",
title = "On Building a Referee's Avatar",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "15--22",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_3",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_3/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Campbell-Kelly:2011:TPI,
author = "Martin Campbell-Kelly",
title = "From Theory to Practice: The Invention of Programming,
1947--51",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "23--37",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_4",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_4/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Lomet:2011:TLA,
author = "David Lomet",
title = "Transactions: From Local Atomicity to Atomicity in the
Cloud",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "38--52",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_5",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_5/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Rushby:2011:DM,
author = "John Rushby",
title = "From {DSS} to {MILS}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "53--57",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_6",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_6/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Swade:2011:PEC,
author = "Doron Swade",
title = "Pre-electronic Computing",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "58--83",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_7",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_7/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Wichmann:2011:WW,
author = "Brian Wichmann",
title = "{Whetstone} Wanderings",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "84--92",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_8",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_8/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bacon:2011:URT,
author = "Jean Bacon and Andrei Iu. Bejan and Alastair R.
Beresford and David Evans and Richard J. Gibbens",
title = "Using Real-Time Road Traffic Data to Evaluate
Congestion",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "93--117",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_9/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bantre:2011:FTA,
author = "Jean-Pierre Ban{\^a}tre and Christine Morin and
Thierry Priol",
title = "Fault Tolerant Autonomic Computing Systems in a
Chemical Setting",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "118--129",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_10",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_10/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bell:2011:CEY,
author = "Gordon Bell",
title = "Out of a Closet: The Early Years of {The Computer
Museum}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "130--146",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_11",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_11/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Burns:2011:TFM,
author = "Alan Burns and Sanjoy Baruah",
title = "Timing Faults and Mixed Criticality Systems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "147--166",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_12",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_12/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Ceruzzi:2011:PBR,
author = "Paul E. Ceruzzi",
title = "{Professor Brian Randell} and the History of
Computing",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "167--173",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_13",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_13/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Coffman:2011:CSF,
author = "Ed Coffman",
title = "Computer Storage Fragmentation: Pioneering Work of
{Brian Randell}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "174--184",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_14",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_14/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Conway:2011:IAR,
author = "Lynn Conway",
title = "{IBM-ACS}: Reminiscences and Lessons Learned from a
1960's Supercomputer Project",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "185--224",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_15",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_15/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Courtois:2011:BEM,
author = "Pierre-Jacques Courtois",
title = "The {Belgian Electronic Mathematical Machine}
(1951--1962): an Account",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "225--237",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_16",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_16/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Dacier:2011:RDF,
author = "Marc Dacier",
title = "On the Resilience of the Dependability Framework to
the Intrusion of New Security Threats",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "238--250",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_17",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_17/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Denning:2011:VFT,
author = "Peter J. Denning",
title = "Virtual Fault Tolerance",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "251--260",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_18",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_18/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Hoare:2011:RB,
author = "Tony Hoare",
title = "Recovery Blocks",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "261--266",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_19",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_19/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Horning:2011:DWP,
author = "J. J. Horning",
title = "The Development and Writing of ``Process
Structuring''",
journal = j-LECT-NOTES-COMP-SCI,
volume = "6875",
pages = "267--272",
year = "2011",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-24541-1_20",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Mar 5 11:41:15 MST 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_20/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-24541-1",
book-URL = "http://www.springerlink.com/content/978-3-642-24541-1",
fjournal = "Lecture Notes in Computer Science",
}
@Proceedings{Kiayias:2011:TCC,
editor = "Aggelos Kiayias",
booktitle = "{Topics in cryptology --- CT-RSA 2011: the
cryptographers' track at the RSA conference 2011, San
Francisco, CA, USA, February 14--18, 2011.
proceedings}",
title = "{Topics in cryptology --- CT-RSA 2011: the
cryptographers' track at the RSA conference 2011, San
Francisco, CA, USA, February 14--18, 2011.
proceedings}",
volume = "6558",
publisher = pub-SV,
address = pub-SV:adr,
pages = "????",
year = "2011",
ISBN = "3-642-19073-1",
ISBN-13 = "978-3-642-19073-5",
LCCN = "????",
bibdate = "Mon Jan 10 18:16:07 MST 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib;
z3950.loc.gov:7090/Voyager",
series = "Lecture notes in computer science",
acknowledgement = ack-nhfb,
}
@Proceedings{vanDam:2011:TQC,
editor = "Wim van Dam and Vivian M. Kendon and Simone Severini",
booktitle = "{Theory of quantum computation, communication, and
cryptography: 5th conference, TQC 2010, Leeds, UK,
April 13--15, 2010, revised selected papers}",
title = "{Theory of quantum computation, communication, and
cryptography: 5th conference, TQC 2010, Leeds, UK,
April 13--15, 2010, revised selected papers}",
volume = "6519",
publisher = pub-SV,
address = pub-SV:adr,
pages = "????",
year = "2011",
ISBN = "3-642-18072-8 (softcover)",
ISBN-13 = "978-3-642-18072-9 (softcover)",
LCCN = "????",
bibdate = "Mon Jan 10 18:22:26 MST 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib;
z3950.loc.gov:7090/Voyager",
series = "Lecture notes in computer science",
acknowledgement = ack-nhfb,
}