Filter your results
- 5
- 5
- 5
- 5
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.113-129, ⟨10.1007/978-3-319-93524-9_7⟩
Conference papers
hal-01875515v1
|
||
|
A More Efficient 1–Checkable Secure Outsourcing Algorithm for Bilinear Maps11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.155-164, ⟨10.1007/978-3-319-93524-9_10⟩
Conference papers
hal-01875517v1
|
||
|
Philanthropy on the Blockchain11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers
hal-01875527v1
|
||
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.75-92, ⟨10.1007/978-3-319-93524-9_5⟩
Conference papers
hal-01875526v1
|
||
|
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.165-176, ⟨10.1007/978-3-319-93524-9_11⟩
Conference papers
hal-01875519v1
|