Filter your results
- 25
- 1
- 25
- 1
- 26
- 26
- 26
- 2
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers
hal-01573294v1
|
||
|
A SMS-Based Mobile Botnet Using Flooding Algorithm5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.264-279, ⟨10.1007/978-3-642-21040-2_19⟩
Conference papers
hal-01573306v1
|
||
|
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers
hal-01573313v1
|
||
|
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Conference papers
hal-01573296v1
|
||
|
Entropy of Selectively Encrypted Strings5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.234-243, ⟨10.1007/978-3-642-21040-2_16⟩
Conference papers
hal-01573290v1
|
||
|
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.116-127, ⟨10.1007/978-3-642-21040-2_8⟩
Conference papers
hal-01573301v1
|
||
|
A Comparison of Post-Processing Techniques for Biased Random Number Generators5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.175-190, ⟨10.1007/978-3-642-21040-2_12⟩
Conference papers
hal-01573305v1
|
||
|
AES Variants Secure against Related-Key Differential and Boomerang Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers
hal-01573307v1
|
||
|
Formal Analysis of Security Metrics and Risk5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.304-319, ⟨10.1007/978-3-642-21040-2_22⟩
Conference papers
hal-01573302v1
|
||
|
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers
hal-01573308v1
|
||
|
Hardware Trojan Side-Channels Based on Physical Unclonable Functions5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.294-303, ⟨10.1007/978-3-642-21040-2_21⟩
Conference papers
hal-01573309v1
|
||
|
A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.381-389, ⟨10.1007/978-3-642-21040-2_28⟩
Conference papers
hal-01573314v1
|
||
|
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.224-233, ⟨10.1007/978-3-642-21040-2_15⟩
Conference papers
hal-01573310v1
|
||
|
Trust Agreement in Wireless Mesh Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers
hal-01573304v1
|
||
|
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.54-68, ⟨10.1007/978-3-642-21040-2_4⟩
Conference papers
hal-01573291v1
|
||
|
Information Leakage Discovery Techniques to Enhance Secure Chip Design5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.128-143, ⟨10.1007/978-3-642-21040-2_9⟩
Conference papers
hal-01573297v1
|
||
|
Mobile Electronic Identity: Securing Payment on Mobile Phones5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.22-37, ⟨10.1007/978-3-642-21040-2_2⟩
Conference papers
hal-01573293v1
|
||
|
Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.254-263, ⟨10.1007/978-3-642-21040-2_18⟩
Conference papers
hal-01573311v1
|
||
|
Practical Attacks on HB and HB+ Protocols5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.244-253, ⟨10.1007/978-3-642-21040-2_17⟩
Conference papers
hal-01573292v1
|
||
|
Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.351-360, ⟨10.1007/978-3-642-21040-2_25⟩
Conference papers
hal-01573300v1
|
||
|
STORM - Collaborative Security Management Environment5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.320-335, ⟨10.1007/978-3-642-21040-2_23⟩
Conference papers
hal-01573312v1
|
||
|
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.69-84, ⟨10.1007/978-3-642-21040-2_5⟩
Conference papers
hal-01573298v1
|
||
|
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.160-174, ⟨10.1007/978-3-642-21040-2_11⟩
Conference papers
hal-01573303v1
|
||
|
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless CommunicationSpringer, LNCS-6633, 2011, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-21040-2⟩
Books
hal-01573289v1
|
||
|
Privacy Respecting Targeted Advertising for Social Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers
hal-01573299v1
|
||
|
Leakage Squeezing Countermeasure against High-Order Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers
hal-01573295v1
|