%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.03", %%% date = "14 October 2017", %%% time = "10:23:42 MDT", %%% filename = "lncs2011a.bib", %%% University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "56121 1265 4745 53121", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "BibTeX; bibliography; Lecture Notes in %%% Computer Science", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a bibliography of papers published in %%% Lecture Notes in Computer Science %%% (Springer-Verlag) for 2011. %%% %%% Bibliography entries below treat the series %%% as a journal, rather than as conference %%% proceedings. %%% %%% The companion bibliography lncs.bib lists %%% just the individual volumes in the series, %%% and the lncs19xy*.bib files list individual %%% papers for year 19xy. The large number of %%% papers in this collection, and limitations %%% in TeX and BibTeX, and in WWW HTTP transfer %%% speeds, necessitate the splitting of the %%% papers bibliographies into yearly files. %%% %%% At version 1.03, the year coverage looked %%% like this: %%% %%% 2011 ( 57) %%% %%% Article: 55 %%% Proceedings: 2 %%% %%% Total entries: 57 %%% %%% This bibliography has been constructed %%% primarily from the publisher Web site. %%% Regrettably, final page numbers are not %%% available at that source. %%% %%% Numerous errors in the sources noted above %%% have been corrected. Spelling has been %%% verified with the UNIX spell and GNU ispell %%% programs using the exception dictionary %%% stored in the companion file with extension %%% .sok. %%% %%% BibTeX citation tags are uniformly chosen as %%% name:year:abbrev, where name is the family %%% name of the first author or editor, year is a %%% 4-digit number, and abbrev is a 3-letter %%% condensation of important title words. %%% Citation labels were automatically generated %%% by software developed for the BibNet Project. %%% %%% In this bibliography, entries are sorted in %%% publication order, with the help of ``bibsort %%% -byvolume''. The bibsort utility is available %%% from ftp.math.utah.edu in /pub/tex/bib. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi" # "\ifx \undefined \circled \def \circled #1{(#1)}\fi" # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi" # "\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" # "\ifx \undefined \ocirc \def \ocirc #1{{\accent'27#1}}\fi" # "\ifx \undefined \reg \def \reg {\circled{R}}\fi" # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" # "\hyphenation{ Ay-ka-nat Giun-chi-glia Lakh-neche Mal-er-ba Mart-el-li Reut-e-nau-er Thiel-sch-er }" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Publisher abbreviations: @String{pub-SV = "Springer-Verlag Inc."} @String{pub-SV:adr = "New York, NY, USA"} %%% ==================================================================== %%% Series abbreviations: @String{ser-LNAI = "Lecture Notes in Artificial Intelligence"} @String{ser-LNCS = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Bibliography entries: @Article{Anonymous:2011:FM, author = "Anonymous", title = "Front Matter", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "??--??", year = "2011", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/bfm:978-3-642-20465-4/1", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Cramer:2011:ACT, author = "Ronald Cramer", title = "The Arithmetic Codex: Theory and Applications", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "1--1", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_1", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_1", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Nguyen:2011:LRA, author = "Phong Q. Nguyen", title = "Lattice Reduction Algorithms: Theory and Practice", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "2--6", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_2", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_2", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Kiltz:2011:EAH, author = "Eike Kiltz and Krzysztof Pietrzak and David Cash and Abhishek Jain and Daniele Venturi", title = "Efficient Authentication from Hard Learning Problems", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "7--26", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_3", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_3", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Stehle:2011:MNS, author = "Damien Stehl{\'e} and Ron Steinfeld", title = "Making {NTRU} as Secure as Worst-Case Problems over Ideal Lattices", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "27--47", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_4", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_4", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Aranha:2011:FEF, author = "Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio L{\'o}pez", title = "Faster Explicit Formulas for Computing Pairings over Ordinary Curves", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "48--68", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_5", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_5", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Moradi:2011:PLV, author = "Amir Moradi and Axel Poschmann and San Ling and Christof Paar and Huaxiong Wang", title = "Pushing the Limits: {A} Very Compact and a Threshold Implementation of {AES}", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "69--88", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_6", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_6", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Boyle:2011:FLR, author = "Elette Boyle and Gil Segev and Daniel Wichs", title = "Fully Leakage-Resilient Signatures", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "89--108", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_7", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_7", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Renauld:2011:FSP, author = "Mathieu Renauld and Fran{\c{c}}ois-Xavier Standaert and Nicolas Veyrat-Charvillon and Dina Kamel", title = "A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "109--128", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_8", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_8", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Gentry:2011:IGF, author = "Craig Gentry and Shai Halevi", title = "Implementing {Gentry}'s Fully-Homomorphic Encryption Scheme", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "129--148", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_9", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Boneh:2011:HSP, author = "Dan Boneh and David Mandell Freeman", title = "Homomorphic Signatures for Polynomial Functions", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "149--168", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_10", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_10", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Bendlin:2011:SHE, author = "Rikke Bendlin and Ivan Damga{\aa}rd and Claudio Orlandi and Sarah Zakarias", title = "Semi-homomorphic Encryption and Multiparty Computation", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "169--188", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_11", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_11", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Schage:2011:TPS, author = "Sven Sch{\"a}ge", title = "Tight Proofs for Signature Schemes without Random Oracles", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "189--206", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_12", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_12", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Catalano:2011:APF, author = "Dario Catalano and Dario Fiore and Bogdan Warinschi", title = "Adaptive Pseudo-free Groups and Applications", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "207--223", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_13", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_13", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Fuchsbauer:2011:CSV, author = "Georg Fuchsbauer", title = "Commuting Signatures and Verifiable Encryption", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "224--245", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_14", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_14", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Bouman:2011:SAW, author = "Niek J. Bouman and Serge Fehr", title = "Secure Authentication from a Weak Key, without Leaking Information", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "246--265", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_15", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_15", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Ahmadi:2011:SKC, author = "Hadi Ahmadi and Reihaneh Safavi-Naini", title = "Secret Keys from Channel Noise", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "266--283", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_16", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_16", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Obana:2011:AOC, author = "Satoshi Obana", title = "Almost Optimum $t$-Cheater Identifiable Secret Sharing Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "284--302", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_17", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_17", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Leander:2011:LHS, author = "Gregor Leander", title = "On Linear Hulls, Statistical Saturation Attacks, {PRESENT} and a Cryptanalysis of {PUFFIN}", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "303--322", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_18", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_18", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Dodis:2011:DEM, author = "Yevgeniy Dodis and John Steinberger", title = "Domain Extension for {MACs} Beyond the Birthday Barrier", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "323--342", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_19", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_19", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Sepehrdad:2011:SAR, author = "Pouyan Sepehrdad and Serge Vaudenay and Martin Vuagnoux", title = "Statistical Attack on {RC4}", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "343--363", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_20", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_20", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Becker:2011:IGA, author = "Anja Becker and Jean-S{\'e}bastien Coron and Antoine Joux", title = "Improved Generic Algorithms for Hard Knapsacks", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "364--385", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_21", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_21", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{shelat:2011:TOS, author = "Abhi shelat and Chih-hao Shen", title = "Two-Output Secure Computation with Malicious Adversaries", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "386--405", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_22", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_22", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Ishai:2011:ENI, author = "Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai", title = "Efficient Non-interactive Secure Computation", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "406--425", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_23", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_23", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Asharov:2011:TGT, author = "Gilad Asharov and Ran Canetti and Carmit Hazay", title = "Towards a Game Theoretic View of Secure Computation", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "426--445", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_24", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_24", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Lindell:2011:HEU, author = "Yehuda Lindell", title = "Highly-Efficient Universally-Composable Commitments Based on the {DDH} Assumption", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "446--466", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_25", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_25", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Unruh:2011:CCB, author = "Dominique Unruh", title = "Concurrent Composition in the Bounded Quantum Storage Model", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "467--486", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_26", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_26", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Ristenpart:2011:CCL, author = "Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton", title = "Careful with Composition: Limitations of the Indifferentiability Framework", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "487--506", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_27", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_27", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Malkin:2011:ECS, author = "Tal Malkin and Isamu Teranishi and Moti Yung", title = "Efficient Circuit-Size Independent Public Key Encryption with {KDM} Security", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "507--526", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_28", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_28", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Applebaum:2011:KDM, author = "Benny Applebaum", title = "Key-Dependent Message Security: Generic Amplification and Completeness", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "527--546", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_29", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_29", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Lewko:2011:UHA, author = "Allison Lewko and Brent Waters", title = "Unbounded {HIBE} and Attribute-Based Encryption", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "547--567", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_30", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_30", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Lewko:2011:DAB, author = "Allison Lewko and Brent Waters", title = "Decentralizing Attribute-Based Encryption", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "568--588", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_31", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_31", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Wee:2011:TRC, author = "Hoeteck Wee", title = "Threshold and Revocation Cryptosystems via Extractable Hash Proofs", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "589--609", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_32", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Jan 21 18:23:52 MST 2013", bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib; http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_32", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-20465-4", book-URL = "http://www.springerlink.com/content/978-3-642-20465-4", fjournal = "Lecture Notes in Computer Science", } @Article{Durmuth:2011:DEN, author = "Markus D{\"u}rmuth and David Mandell Freeman", title = "Deniable Encryption with Negligible Detection Probability: An Interactive Construction", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "610--626", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-20465-4_33", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_33", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Anonymous:2011:BM, author = "Anonymous", title = "Back Matter", journal = j-LECT-NOTES-COMP-SCI, volume = "6632", pages = "??--??", year = "2011", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Sat Dec 15 17:44:03 MST 2012", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/content/pdf/bbm:978-3-642-20465-4/1", acknowledgement = ack-nhfb, fjournal = "Lecture Notes in Computer Science", } @Article{Kopetz:2011:WLB, author = "Hermann Kopetz", title = "What {I} Learned from {Brian}", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "1--6", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_1", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_1/; http://link.springer.com/content/pdf/bfm:978-3-642-24541-1/1.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Lloyd:2011:BRB, author = "John L. Lloyd and Tom Anderson", title = "{Brian Randell}: a Biographical Note", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "7--14", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_2", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_2/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Aviienis:2011:BRA, author = "Algirdas Avi ienis", title = "On Building a Referee's Avatar", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "15--22", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_3", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_3/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Campbell-Kelly:2011:TPI, author = "Martin Campbell-Kelly", title = "From Theory to Practice: The Invention of Programming, 1947--51", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "23--37", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_4", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_4/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Lomet:2011:TLA, author = "David Lomet", title = "Transactions: From Local Atomicity to Atomicity in the Cloud", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "38--52", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_5", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_5/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Rushby:2011:DM, author = "John Rushby", title = "From {DSS} to {MILS}", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "53--57", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_6", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_6/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Swade:2011:PEC, author = "Doron Swade", title = "Pre-electronic Computing", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "58--83", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_7", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_7/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Wichmann:2011:WW, author = "Brian Wichmann", title = "{Whetstone} Wanderings", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "84--92", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_8", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_8/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Bacon:2011:URT, author = "Jean Bacon and Andrei Iu. Bejan and Alastair R. Beresford and David Evans and Richard J. Gibbens", title = "Using Real-Time Road Traffic Data to Evaluate Congestion", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "93--117", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_9/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Bantre:2011:FTA, author = "Jean-Pierre Ban{\^a}tre and Christine Morin and Thierry Priol", title = "Fault Tolerant Autonomic Computing Systems in a Chemical Setting", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "118--129", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_10", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_10/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Bell:2011:CEY, author = "Gordon Bell", title = "Out of a Closet: The Early Years of {The Computer Museum}", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "130--146", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_11", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_11/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Burns:2011:TFM, author = "Alan Burns and Sanjoy Baruah", title = "Timing Faults and Mixed Criticality Systems", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "147--166", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_12", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_12/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Ceruzzi:2011:PBR, author = "Paul E. Ceruzzi", title = "{Professor Brian Randell} and the History of Computing", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "167--173", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_13", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_13/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Coffman:2011:CSF, author = "Ed Coffman", title = "Computer Storage Fragmentation: Pioneering Work of {Brian Randell}", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "174--184", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_14", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_14/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Conway:2011:IAR, author = "Lynn Conway", title = "{IBM-ACS}: Reminiscences and Lessons Learned from a 1960's Supercomputer Project", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "185--224", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_15", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_15/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Courtois:2011:BEM, author = "Pierre-Jacques Courtois", title = "The {Belgian Electronic Mathematical Machine} (1951--1962): an Account", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "225--237", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_16", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_16/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Dacier:2011:RDF, author = "Marc Dacier", title = "On the Resilience of the Dependability Framework to the Intrusion of New Security Threats", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "238--250", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_17", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_17/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Denning:2011:VFT, author = "Peter J. Denning", title = "Virtual Fault Tolerance", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "251--260", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_18", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_18/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Hoare:2011:RB, author = "Tony Hoare", title = "Recovery Blocks", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "261--266", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_19", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_19/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } @Article{Horning:2011:DWP, author = "J. J. Horning", title = "The Development and Writing of ``Process Structuring''", journal = j-LECT-NOTES-COMP-SCI, volume = "6875", pages = "267--272", year = "2011", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-24541-1_20", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Mar 5 11:41:15 MST 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_20/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-24541-1", book-URL = "http://www.springerlink.com/content/978-3-642-24541-1", fjournal = "Lecture Notes in Computer Science", } %%% ==================================================================== %%% Cross-referenced entries must come last: @Proceedings{Kiayias:2011:TCC, editor = "Aggelos Kiayias", booktitle = "{Topics in cryptology --- CT-RSA 2011: the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14--18, 2011. proceedings}", title = "{Topics in cryptology --- CT-RSA 2011: the cryptographers' track at the RSA conference 2011, San Francisco, CA, USA, February 14--18, 2011. proceedings}", volume = "6558", publisher = pub-SV, address = pub-SV:adr, pages = "????", year = "2011", ISBN = "3-642-19073-1", ISBN-13 = "978-3-642-19073-5", LCCN = "????", bibdate = "Mon Jan 10 18:16:07 MST 2011", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib; z3950.loc.gov:7090/Voyager", series = "Lecture notes in computer science", acknowledgement = ack-nhfb, } @Proceedings{vanDam:2011:TQC, editor = "Wim van Dam and Vivian M. Kendon and Simone Severini", booktitle = "{Theory of quantum computation, communication, and cryptography: 5th conference, TQC 2010, Leeds, UK, April 13--15, 2010, revised selected papers}", title = "{Theory of quantum computation, communication, and cryptography: 5th conference, TQC 2010, Leeds, UK, April 13--15, 2010, revised selected papers}", volume = "6519", publisher = pub-SV, address = pub-SV:adr, pages = "????", year = "2011", ISBN = "3-642-18072-8 (softcover)", ISBN-13 = "978-3-642-18072-9 (softcover)", LCCN = "????", bibdate = "Mon Jan 10 18:22:26 MST 2011", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib; z3950.loc.gov:7090/Voyager", series = "Lecture notes in computer science", acknowledgement = ack-nhfb, }