Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.03",
%%%     date            = "14 October 2017",
%%%     time            = "10:23:42 MDT",
%%%     filename        = "lncs2011a.bib",
%%%                        University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "56121 1265 4745 53121",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "BibTeX; bibliography; Lecture Notes in
%%%                        Computer Science",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a bibliography of papers published in
%%%                        Lecture Notes in Computer Science
%%%                        (Springer-Verlag) for 2011.
%%%
%%%                        Bibliography entries below treat the series
%%%                        as a journal, rather than as conference
%%%                        proceedings.
%%%
%%%                        The companion bibliography lncs.bib lists
%%%                        just the individual volumes in the series,
%%%                        and the lncs19xy*.bib files list individual
%%%                        papers for year 19xy.  The large number of
%%%                        papers in this collection, and limitations
%%%                        in TeX and BibTeX, and in WWW HTTP transfer
%%%                        speeds, necessitate the splitting of the
%%%                        papers bibliographies into yearly files.
%%%
%%%                        At version 1.03, the year coverage looked
%%%                        like this:
%%%
%%%                             2011 (  57)
%%%
%%%                             Article:         55
%%%                             Proceedings:      2
%%%
%%%                             Total entries:   57
%%%
%%%                        This bibliography has been constructed
%%%                        primarily from the publisher Web site.
%%%                        Regrettably, final page numbers are not
%%%                        available at that source.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.  Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title words.
%%%                        Citation labels were automatically generated
%%%                        by software developed for the BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, with the help of ``bibsort
%%%                        -byvolume''.  The bibsort utility is available
%%%                        from ftp.math.utah.edu in /pub/tex/bib.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi" #
    "\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
    "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi" #
    "\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" #
    "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" #
    "\ifx \undefined \ocirc  \def \ocirc #1{{\accent'27#1}}\fi" #
    "\ifx \undefined \reg \def \reg {\circled{R}}\fi" #
    "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" #
    "\hyphenation{
        Ay-ka-nat
        Giun-chi-glia
        Lakh-neche
        Mal-er-ba
        Mart-el-li
        Reut-e-nau-er
        Thiel-sch-er
        }"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-LECT-NOTES-COMP-SCI   = "Lecture Notes in Computer Science"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-SV                  = "Springer-Verlag Inc."}

@String{pub-SV:adr              = "New York, NY, USA"}

%%% ====================================================================
%%% Series abbreviations:
@String{ser-LNAI                = "Lecture Notes in Artificial Intelligence"}

@String{ser-LNCS                = "Lecture Notes in Computer Science"}

%%% ====================================================================
%%% Bibliography entries:
@Article{Anonymous:2011:FM,
  author =       "Anonymous",
  title =        "Front Matter",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "??--??",
  year =         "2011",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/bfm:978-3-642-20465-4/1",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cramer:2011:ACT,
  author =       "Ronald Cramer",
  title =        "The Arithmetic Codex: Theory and Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "1--1",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_1",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nguyen:2011:LRA,
  author =       "Phong Q. Nguyen",
  title =        "Lattice Reduction Algorithms: Theory and Practice",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "2--6",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_2",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kiltz:2011:EAH,
  author =       "Eike Kiltz and Krzysztof Pietrzak and David Cash and
                 Abhishek Jain and Daniele Venturi",
  title =        "Efficient Authentication from Hard Learning Problems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "7--26",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_3",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Stehle:2011:MNS,
  author =       "Damien Stehl{\'e} and Ron Steinfeld",
  title =        "Making {NTRU} as Secure as Worst-Case Problems over
                 Ideal Lattices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "27--47",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_4",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Aranha:2011:FEF,
  author =       "Diego F. Aranha and Koray Karabina and Patrick Longa
                 and Catherine H. Gebotys and Julio L{\'o}pez",
  title =        "Faster Explicit Formulas for Computing Pairings over
                 Ordinary Curves",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "48--68",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_5",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Moradi:2011:PLV,
  author =       "Amir Moradi and Axel Poschmann and San Ling and
                 Christof Paar and Huaxiong Wang",
  title =        "Pushing the Limits: {A} Very Compact and a Threshold
                 Implementation of {AES}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "69--88",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_6",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Boyle:2011:FLR,
  author =       "Elette Boyle and Gil Segev and Daniel Wichs",
  title =        "Fully Leakage-Resilient Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "89--108",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_7",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Renauld:2011:FSP,
  author =       "Mathieu Renauld and Fran{\c{c}}ois-Xavier Standaert
                 and Nicolas Veyrat-Charvillon and Dina Kamel",
  title =        "A Formal Study of Power Variability Issues and
                 Side-Channel Attacks for Nanoscale Devices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "109--128",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_8",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gentry:2011:IGF,
  author =       "Craig Gentry and Shai Halevi",
  title =        "Implementing {Gentry}'s Fully-Homomorphic Encryption
                 Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "129--148",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_9",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Boneh:2011:HSP,
  author =       "Dan Boneh and David Mandell Freeman",
  title =        "Homomorphic Signatures for Polynomial Functions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "149--168",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_10",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bendlin:2011:SHE,
  author =       "Rikke Bendlin and Ivan Damga{\aa}rd and Claudio
                 Orlandi and Sarah Zakarias",
  title =        "Semi-homomorphic Encryption and Multiparty
                 Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "169--188",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_11",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Schage:2011:TPS,
  author =       "Sven Sch{\"a}ge",
  title =        "Tight Proofs for Signature Schemes without Random
                 Oracles",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "189--206",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_12",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Catalano:2011:APF,
  author =       "Dario Catalano and Dario Fiore and Bogdan Warinschi",
  title =        "Adaptive Pseudo-free Groups and Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "207--223",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_13",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fuchsbauer:2011:CSV,
  author =       "Georg Fuchsbauer",
  title =        "Commuting Signatures and Verifiable Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "224--245",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_14",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bouman:2011:SAW,
  author =       "Niek J. Bouman and Serge Fehr",
  title =        "Secure Authentication from a Weak Key, without Leaking
                 Information",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "246--265",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_15",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ahmadi:2011:SKC,
  author =       "Hadi Ahmadi and Reihaneh Safavi-Naini",
  title =        "Secret Keys from Channel Noise",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "266--283",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_16",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Obana:2011:AOC,
  author =       "Satoshi Obana",
  title =        "Almost Optimum $t$-Cheater Identifiable Secret Sharing
                 Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "284--302",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_17",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Leander:2011:LHS,
  author =       "Gregor Leander",
  title =        "On Linear Hulls, Statistical Saturation Attacks,
                 {PRESENT} and a Cryptanalysis of {PUFFIN}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "303--322",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_18",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dodis:2011:DEM,
  author =       "Yevgeniy Dodis and John Steinberger",
  title =        "Domain Extension for {MACs} Beyond the Birthday
                 Barrier",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "323--342",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_19",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sepehrdad:2011:SAR,
  author =       "Pouyan Sepehrdad and Serge Vaudenay and Martin
                 Vuagnoux",
  title =        "Statistical Attack on {RC4}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "343--363",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_20",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Becker:2011:IGA,
  author =       "Anja Becker and Jean-S{\'e}bastien Coron and Antoine
                 Joux",
  title =        "Improved Generic Algorithms for Hard Knapsacks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "364--385",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_21",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_21",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{shelat:2011:TOS,
  author =       "Abhi shelat and Chih-hao Shen",
  title =        "Two-Output Secure Computation with Malicious
                 Adversaries",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "386--405",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_22",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_22",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ishai:2011:ENI,
  author =       "Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky
                 and Manoj Prabhakaran and Amit Sahai",
  title =        "Efficient Non-interactive Secure Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "406--425",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_23",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_23",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Asharov:2011:TGT,
  author =       "Gilad Asharov and Ran Canetti and Carmit Hazay",
  title =        "Towards a Game Theoretic View of Secure Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "426--445",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_24",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_24",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lindell:2011:HEU,
  author =       "Yehuda Lindell",
  title =        "Highly-Efficient Universally-Composable Commitments
                 Based on the {DDH} Assumption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "446--466",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_25",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_25",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Unruh:2011:CCB,
  author =       "Dominique Unruh",
  title =        "Concurrent Composition in the Bounded Quantum Storage
                 Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "467--486",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_26",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_26",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ristenpart:2011:CCL,
  author =       "Thomas Ristenpart and Hovav Shacham and Thomas
                 Shrimpton",
  title =        "Careful with Composition: Limitations of the
                 Indifferentiability Framework",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "487--506",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_27",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_27",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Malkin:2011:ECS,
  author =       "Tal Malkin and Isamu Teranishi and Moti Yung",
  title =        "Efficient Circuit-Size Independent Public Key
                 Encryption with {KDM} Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "507--526",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_28",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_28",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Applebaum:2011:KDM,
  author =       "Benny Applebaum",
  title =        "Key-Dependent Message Security: Generic Amplification
                 and Completeness",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "527--546",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_29",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_29",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lewko:2011:UHA,
  author =       "Allison Lewko and Brent Waters",
  title =        "Unbounded {HIBE} and Attribute-Based Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "547--567",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_30",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_30",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lewko:2011:DAB,
  author =       "Allison Lewko and Brent Waters",
  title =        "Decentralizing Attribute-Based Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "568--588",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_31",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_31",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wee:2011:TRC,
  author =       "Hoeteck Wee",
  title =        "Threshold and Revocation Cryptosystems via Extractable
                 Hash Proofs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "589--609",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_32",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Jan 21 18:23:52 MST 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_32",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-20465-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-20465-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Durmuth:2011:DEN,
  author =       "Markus D{\"u}rmuth and David Mandell Freeman",
  title =        "Deniable Encryption with Negligible Detection
                 Probability: An Interactive Construction",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "610--626",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_33",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_33",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2011:BM,
  author =       "Anonymous",
  title =        "Back Matter",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "??--??",
  year =         "2011",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/bbm:978-3-642-20465-4/1",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kopetz:2011:WLB,
  author =       "Hermann Kopetz",
  title =        "What {I} Learned from {Brian}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "1--6",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_1/;
                 http://link.springer.com/content/pdf/bfm:978-3-642-24541-1/1.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lloyd:2011:BRB,
  author =       "John L. Lloyd and Tom Anderson",
  title =        "{Brian Randell}: a Biographical Note",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "7--14",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Aviienis:2011:BRA,
  author =       "Algirdas Avi ienis",
  title =        "On Building a Referee's Avatar",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "15--22",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Campbell-Kelly:2011:TPI,
  author =       "Martin Campbell-Kelly",
  title =        "From Theory to Practice: The Invention of Programming,
                 1947--51",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "23--37",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lomet:2011:TLA,
  author =       "David Lomet",
  title =        "Transactions: From Local Atomicity to Atomicity in the
                 Cloud",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "38--52",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Rushby:2011:DM,
  author =       "John Rushby",
  title =        "From {DSS} to {MILS}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "53--57",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Swade:2011:PEC,
  author =       "Doron Swade",
  title =        "Pre-electronic Computing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "58--83",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wichmann:2011:WW,
  author =       "Brian Wichmann",
  title =        "{Whetstone} Wanderings",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "84--92",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bacon:2011:URT,
  author =       "Jean Bacon and Andrei Iu. Bejan and Alastair R.
                 Beresford and David Evans and Richard J. Gibbens",
  title =        "Using Real-Time Road Traffic Data to Evaluate
                 Congestion",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "93--117",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bantre:2011:FTA,
  author =       "Jean-Pierre Ban{\^a}tre and Christine Morin and
                 Thierry Priol",
  title =        "Fault Tolerant Autonomic Computing Systems in a
                 Chemical Setting",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "118--129",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bell:2011:CEY,
  author =       "Gordon Bell",
  title =        "Out of a Closet: The Early Years of {The Computer
                 Museum}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "130--146",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Burns:2011:TFM,
  author =       "Alan Burns and Sanjoy Baruah",
  title =        "Timing Faults and Mixed Criticality Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "147--166",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ceruzzi:2011:PBR,
  author =       "Paul E. Ceruzzi",
  title =        "{Professor Brian Randell} and the History of
                 Computing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "167--173",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Coffman:2011:CSF,
  author =       "Ed Coffman",
  title =        "Computer Storage Fragmentation: Pioneering Work of
                 {Brian Randell}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "174--184",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Conway:2011:IAR,
  author =       "Lynn Conway",
  title =        "{IBM-ACS}: Reminiscences and Lessons Learned from a
                 1960's Supercomputer Project",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "185--224",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Courtois:2011:BEM,
  author =       "Pierre-Jacques Courtois",
  title =        "The {Belgian Electronic Mathematical Machine}
                 (1951--1962): an Account",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "225--237",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dacier:2011:RDF,
  author =       "Marc Dacier",
  title =        "On the Resilience of the Dependability Framework to
                 the Intrusion of New Security Threats",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "238--250",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Denning:2011:VFT,
  author =       "Peter J. Denning",
  title =        "Virtual Fault Tolerance",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "251--260",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hoare:2011:RB,
  author =       "Tony Hoare",
  title =        "Recovery Blocks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "261--266",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Horning:2011:DWP,
  author =       "J. J. Horning",
  title =        "The Development and Writing of ``Process
                 Structuring''",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6875",
  pages =        "267--272",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-24541-1_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Mar 5 11:41:15 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-24541-1_20/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-24541-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-24541-1",
  fjournal =     "Lecture Notes in Computer Science",
}

%%% ====================================================================
%%% Cross-referenced entries must come last:
@Proceedings{Kiayias:2011:TCC,
  editor =       "Aggelos Kiayias",
  booktitle =    "{Topics in cryptology --- CT-RSA 2011: the
                 cryptographers' track at the RSA conference 2011, San
                 Francisco, CA, USA, February 14--18, 2011.
                 proceedings}",
  title =        "{Topics in cryptology --- CT-RSA 2011: the
                 cryptographers' track at the RSA conference 2011, San
                 Francisco, CA, USA, February 14--18, 2011.
                 proceedings}",
  volume =       "6558",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "3-642-19073-1",
  ISBN-13 =      "978-3-642-19073-5",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:16:07 MST 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{vanDam:2011:TQC,
  editor =       "Wim van Dam and Vivian M. Kendon and Simone Severini",
  booktitle =    "{Theory of quantum computation, communication, and
                 cryptography: 5th conference, TQC 2010, Leeds, UK,
                 April 13--15, 2010, revised selected papers}",
  title =        "{Theory of quantum computation, communication, and
                 cryptography: 5th conference, TQC 2010, Leeds, UK,
                 April 13--15, 2010, revised selected papers}",
  volume =       "6519",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "3-642-18072-8 (softcover)",
  ISBN-13 =      "978-3-642-18072-9 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:22:26 MST 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2011a.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}