BibTeX records: Tomas Sander

download as .bib file

@inproceedings{DBLP:conf/wpes/CarpentFST17,
  author       = {Xavier Carpent and
                  Sky Faber and
                  Tomas Sander and
                  Gene Tsudik},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {Private Set Projections {\&} Variants},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139554},
  doi          = {10.1145/3139550.3139554},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/CarpentFST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumBS16,
  author       = {Florian Kerschbaum and
                  Erik{-}Oliver Blass and
                  Tomas Sander},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {WISCS'16: The 3rd {ACM} Workshop on Information Sharing and Collaborative
                  Security},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1877--1878},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2990490},
  doi          = {10.1145/2976749.2990490},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KerschbaumBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpentFST16,
  author       = {Xavier Carpent and
                  Sky Faber and
                  Tomas Sander and
                  Gene Tsudik},
  title        = {Private Projections {\&} Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1144},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpentFST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SanderH15,
  author       = {Tomas Sander and
                  Joshua M. Hailpern},
  editor       = {Indrajit Ray and
                  Tomas Sander and
                  Moti Yung},
  title        = {{UX} Aspects of Threat Information Sharing Platforms: An Examination
                  {\&} Lessons Learned Using Personas},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Information Sharing and Collaborative
                  Security, {WISCS} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {51--59},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808128.2808136},
  doi          = {10.1145/2808128.2808136},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SanderH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SanderY15,
  author       = {Tomas Sander and
                  Moti Yung},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {WISCS'15: The 2nd {ACM} Workshop on Information Sharing and Collaborative
                  Security},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1717--1718},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2812627},
  doi          = {10.1145/2810103.2812627},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SanderY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015wiscs,
  editor       = {Indrajit Ray and
                  Tomas Sander and
                  Moti Yung},
  title        = {Proceedings of the 2nd {ACM} Workshop on Information Sharing and Collaborative
                  Security, {WISCS} 2015, Denver, Colorado, USA, October 12, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808128},
  doi          = {10.1145/2808128},
  isbn         = {978-1-4503-3822-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2015wiscs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Sander14,
  author       = {Tomas Sander},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{WISCS} 2014: The First {ACM} Workshop on Information Sharing {\&}
                  Collaborative Security},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1552--1553},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660386},
  doi          = {10.1145/2660267.2660386},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Sander14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014wiscs,
  editor       = {Gail{-}Joon Ahn and
                  Tomas Sander},
  title        = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&}
                  Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663876},
  doi          = {10.1145/2663876},
  isbn         = {978-1-4503-3151-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014wiscs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ontobras/CastilhoGVSR11,
  author       = {Fernando M. B. M. de Castilho and
                  Roger Granada and
                  Renata Vieira and
                  Tomas Sander and
                  Prasad Rao},
  editor       = {Renata Vieira and
                  Giancarlo Guizzardi and
                  Sandro Rama Fiorini},
  title        = {Ontology Enrichment Based on the Mapping of Knowledge Resources for
                  Data Privacy Management},
  booktitle    = {Proceedings of Joint {IV} Seminar on Ontology Research in Brazil and
                  {VI} International Workshop on Metamodels, Ontologies and Semantic
                  Technologies, Gramado, Brazil, September 12-14, 2011},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {776},
  pages        = {85--96},
  publisher    = {CEUR-WS.org},
  year         = {2011},
  url          = {https://ceur-ws.org/Vol-776/ontobras-most2011\_paper7.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ontobras/CastilhoGVSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ekaw/VieiraSSANCBPBR10,
  author       = {Renata Vieira and
                  Douglas da Silva and
                  Tomas Sander and
                  Alexandre Agustini and
                  Caio Northfleet and
                  Fernando M. B. M. de Castilho and
                  M{\'{\i}}rian Bruckschen and
                  Patricia Pizzinato and
                  Paulo Bridi and
                  Prasad Rao and
                  Roger Granada},
  editor       = {Johanna V{\"{o}}lker and
                  {\'{O}}scar Corcho},
  title        = {Representation and Inference of Privacy Risks Using Semantic Web Technologies},
  booktitle    = {Proceedings of the {EKAW2010} Poster and Demo Track, Lisbon, Portugal,
                  October 11 - 15, 2010},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {674},
  publisher    = {CEUR-WS.org},
  year         = {2010},
  url          = {https://ceur-ws.org/Vol-674/Paper187.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:37 +0100},
  biburl       = {https://dblp.org/rec/conf/ekaw/VieiraSSANCBPBR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/notere/PearsonS10,
  author       = {Siani Pearson and
                  Tomas Sander},
  editor       = {Khalil Drira and
                  Ahmed Hadj Kacem and
                  Mohamed Jmaiel},
  title        = {A Mechanism for Policy-Driven Selection of Service Providers in {SOA}
                  and Cloud Environments},
  booktitle    = {{NOTERE} 2010, Annual International Conference on New Technologies
                  of Distributed Systems, Touzeur, Tunisia, May 31 - June 2, 2010, Proceedings},
  pages        = {333--338},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/NOTERE.2010.5536569},
  doi          = {10.1109/NOTERE.2010.5536569},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/notere/PearsonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rita/SilvaBBGAVNRS09,
  author       = {Douglas da Silva and
                  M{\'{\i}}rian Bruckschen and
                  Paulo Bridi and
                  Roger Granada and
                  Alexandre Agustini and
                  Renata Vieira and
                  Caio Northfleet and
                  Prasad Rao and
                  Tomas Sander},
  title        = {Semantic Web and Knowledge Management in User Data Privacy},
  journal      = {{RITA}},
  volume       = {16},
  number       = {2},
  pages        = {69--70},
  year         = {2009},
  url          = {https://doi.org/10.22456/2175-2745.12572},
  doi          = {10.22456/2175-2745.12572},
  timestamp    = {Mon, 03 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/rita/SilvaBBGAVNRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/PearsonRSPPPDS09,
  author       = {Siani Pearson and
                  Prasad Rao and
                  Tomas Sander and
                  A. Parry and
                  A. Paull and
                  S. Patruni and
                  V. Dandamudi{-}Ratnakar and
                  P. Sharma},
  title        = {Scalable, accountable privacy management for large organizations},
  booktitle    = {Workshops Proceedings of the 12th {IEEE} International Enterprise
                  Distributed Object Computing Conference, EDOCw 2009, 1-4 September
                  2009, Auckland, New Zealand},
  pages        = {168--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/EDOCW.2009.5331996},
  doi          = {10.1109/EDOCW.2009.5331996},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/edoc/PearsonRSPPPDS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PearsonSS09,
  author       = {Siani Pearson and
                  Tomas Sander and
                  Rajneesh Sharma},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Yves Roudier},
  title        = {Privacy Management for Global Organizations},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 4th International
                  Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009,
                  St. Malo, France, September 24-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5939},
  pages        = {9--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11207-2\_2},
  doi          = {10.1007/978-3-642-11207-2\_2},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/PearsonSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ThompsonHHSY09,
  author       = {Brian Thompson and
                  Stuart Haber and
                  William G. Horne and
                  Tomas Sander and
                  Danfeng Yao},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Privacy-Preserving Computation and Verification of Aggregate Queries
                  on Outsourced Databases},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {185--201},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_11},
  doi          = {10.1007/978-3-642-03168-7\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ThompsonHHSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaberHHHMSTY08,
  author       = {Stuart Haber and
                  Yasuo Hatano and
                  Yoshinori Honda and
                  William G. Horne and
                  Kunihiko Miyazaki and
                  Tomas Sander and
                  Satoru Tezoku and
                  Danfeng Yao},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Efficient signature schemes supporting redaction, pseudonymization,
                  and data deidentification},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {353--362},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368362},
  doi          = {10.1145/1368310.1368362},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaberHHHMSTY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/HaberHPST03,
  author       = {Stuart Haber and
                  Bill G. Horne and
                  Joe Pato and
                  Tomas Sander and
                  Robert Endre Tarjan},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {If Piracy Is the Problem, Is {DRM} the Answer?},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_15},
  doi          = {10.1007/10941270\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/HaberHPST03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PinkasS02,
  author       = {Benny Pinkas and
                  Tomas Sander},
  editor       = {Vijayalakshmi Atluri},
  title        = {Securing passwords against dictionary attacks},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {161--170},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586133},
  doi          = {10.1145/586110.586133},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PinkasS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001drm,
  editor       = {Tomas Sander},
  title        = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-47870-1},
  doi          = {10.1007/3-540-47870-1},
  isbn         = {3-540-43677-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2001drm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeigenbaumFSS01,
  author       = {Joan Feigenbaum and
                  Michael J. Freedman and
                  Tomas Sander and
                  Adam Shostack},
  editor       = {Tomas Sander},
  title        = {Privacy Engineering for Digital Rights Management Systems},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {76--105},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_6},
  doi          = {10.1007/3-540-47870-1\_6},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FeigenbaumFSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Sander01,
  author       = {Tomas Sander},
  editor       = {Paul F. Syverson},
  title        = {Golden Times for Digital Rights Management?},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {55--65},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_7},
  doi          = {10.1007/3-540-46088-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Sander01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/HornePS01,
  author       = {Bill G. Horne and
                  Benny Pinkas and
                  Tomas Sander},
  editor       = {Michael P. Wellman and
                  Yoav Shoham},
  title        = {Escrow services and incentives in peer-to-peer networks},
  booktitle    = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001),
                  Tampa, Florida, USA, October 14-17, 2001},
  pages        = {85--94},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501158.501168},
  doi          = {10.1145/501158.501168},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/HornePS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FranklinS00,
  author       = {Matthew K. Franklin and
                  Tomas Sander},
  editor       = {Tatsuaki Okamoto},
  title        = {Commital Deniable Proofs and Electronic Campaign Finance},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {373--387},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_28},
  doi          = {10.1007/3-540-44448-3\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FranklinS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfp/FranklinS00,
  author       = {Matthew K. Franklin and
                  Tomas Sander},
  editor       = {Lorrie Faith Cranor},
  title        = {Deniable payments and electronic campaign finance},
  booktitle    = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy:
                  Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada,
                  April 4-7, 2000},
  pages        = {67--68},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/332186.332249},
  doi          = {10.1145/332186.332249},
  timestamp    = {Mon, 23 May 2022 11:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cfp/FranklinS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SanderTY00,
  author       = {Tomas Sander and
                  Amnon Ta{-}Shma and
                  Moti Yung},
  editor       = {Yair Frankel},
  title        = {Blind, Auditable Membership Proofs},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {53--71},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_5},
  doi          = {10.1007/3-540-45472-1\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SanderTY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SanderT99,
  author       = {Tomas Sander and
                  Amnon Ta{-}Shma},
  editor       = {Michael J. Wiener},
  title        = {Auditable, Anonymous Electronic Cash Extended Abstract},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {555--572},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_35},
  doi          = {10.1007/3-540-48405-1\_35},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SanderT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SanderT99,
  author       = {Tomas Sander and
                  Amnon Ta{-}Shma},
  editor       = {Matthew K. Franklin},
  title        = {Flow Control: {A} New Approach for Anonymity Control in Electronic
                  Cash Systems},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {46--61},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_4},
  doi          = {10.1007/3-540-48390-X\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SanderT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/SanderYY99,
  author       = {Tomas Sander and
                  Adam L. Young and
                  Moti Yung},
  title        = {Non-Interactive CryptoComputing For NC\({}^{\mbox{1}}\)},
  booktitle    = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99,
                  17-18 October, 1999, New York, NY, {USA}},
  pages        = {554--567},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/SFFCS.1999.814630},
  doi          = {10.1109/SFFCS.1999.814630},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/SanderYY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Sander99,
  author       = {Tomas Sander},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Efficient Accumulators without Trapdoor Extended Abstracts},
  booktitle    = {Information and Communication Security, Second International Conference,
                  ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1726},
  pages        = {252--262},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-47942-0\_21},
  doi          = {10.1007/978-3-540-47942-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Sander99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SanderT99,
  author       = {Tomas Sander and
                  Amnon Ta{-}Shma},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {On Anonymous Electronic Cash and Crime},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {202--206},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_17},
  doi          = {10.1007/3-540-47790-X\_17},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SanderT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SanderT98,
  author       = {Tomas Sander and
                  Christian F. Tschudin},
  editor       = {David Aucsmith},
  title        = {On Software Protection via Function Hiding},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {111--123},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_9},
  doi          = {10.1007/3-540-49380-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SanderT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/Sander98,
  author       = {Tomas Sander},
  title        = {Protecting mobile code},
  booktitle    = {Ninth International Symposium on Software Reliability Engineering,
                  {ISSRE} 1998, Paderborn, Germany, November 4-7, 1998},
  pages        = {183},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ISSRE.1998.730880},
  doi          = {10.1109/ISSRE.1998.730880},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/Sander98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/SanderT98,
  author       = {Tomas Sander and
                  Christian F. Tschudin},
  editor       = {Giovanni Vigna},
  title        = {Protecting Mobile Agents Against Malicious Hosts},
  booktitle    = {Mobile Agents and Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {1419},
  pages        = {44--60},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68671-1\_4},
  doi          = {10.1007/3-540-68671-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mas/SanderT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SanderT98,
  author       = {Tomas Sander and
                  Christian F. Tschudin},
  title        = {Towards Mobile Cryptography},
  booktitle    = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
                  Oakland, CA, USA, May 3-6, 1998, Proceedings},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SECPRI.1998.674837},
  doi          = {10.1109/SECPRI.1998.674837},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SanderT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/SanderS97,
  author       = {Tomas Sander and
                  Mohammad Amin Shokrollahi},
  title        = {Deciding Properties of Polynomials Without Factoring},
  booktitle    = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
                  Miami Beach, Florida, USA, October 19-22, 1997},
  pages        = {46--55},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SFCS.1997.646092},
  doi          = {10.1109/SFCS.1997.646092},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/SanderS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics