Filter your results
- 12
- 1
- 12
- 1
- 13
- 13
- 13
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
13 results
|
|
sorted by
|
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-10741, 2018, Lecture Notes in Computer Science, 978-3-319-93523-2. ⟨10.1007/978-3-319-93524-9⟩
Books
hal-01875516v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.140-152, ⟨10.1007/978-3-319-93524-9_9⟩
Conference papers
hal-01875520v1
|
||
|
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.113-129, ⟨10.1007/978-3-319-93524-9_7⟩
Conference papers
hal-01875515v1
|
||
|
A More Efficient 1–Checkable Secure Outsourcing Algorithm for Bilinear Maps11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.155-164, ⟨10.1007/978-3-319-93524-9_10⟩
Conference papers
hal-01875517v1
|
||
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.41-55, ⟨10.1007/978-3-319-93524-9_3⟩
Conference papers
hal-01875518v1
|
||
|
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.177-188, ⟨10.1007/978-3-319-93524-9_12⟩
Conference papers
hal-01875523v1
|
||
|
Philanthropy on the Blockchain11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers
hal-01875527v1
|
||
|
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers
hal-01875521v1
|
||
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.75-92, ⟨10.1007/978-3-319-93524-9_5⟩
Conference papers
hal-01875526v1
|
||
|
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.165-176, ⟨10.1007/978-3-319-93524-9_11⟩
Conference papers
hal-01875519v1
|
||
|
Examination of a New Defense Mechanism: Honeywords11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.130-139, ⟨10.1007/978-3-319-93524-9_8⟩
Conference papers
hal-01875522v1
|