|
|
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?
Konstantinos Rantos
Conference papers
hal-01596183v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Mapping between Classical Risk Management and Game Theoretical Approaches
Lisa Rajbhandari
,
Einar Arthur Snekkenes
Conference papers
hal-01596184v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
High Capacity FFT-Based Audio Watermarking
Mehdi Fallahpour
,
David Megias
Conference papers
hal-01596185v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Security Warnings for Children’s Smart Phones: A First Design Approach
Jana Dittmann
,
Jana Fruth
,
Ronny Merkel
Conference papers
hal-01596186v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
Muhammad Asim
,
Luan Ibraimi
,
Milan Petković
Conference papers
hal-01596187v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Analysis of Revocation Strategies for Anonymous Idemix Credentials
Jorn Lapon
,
Markulf Kohlweiss
,
Bart De Decker
,
Vincent Naessens
Conference papers
hal-01596188v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Low-Attention Forwarding for Mobile Network Covert Channels
Steffen Wendzel
,
Jörg Keller
Conference papers
hal-01596189v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites
Ronald E. Leenes
Conference papers
hal-01596190v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Twin Clouds: Secure Cloud Computing with Low Latency
Sven Bugiel
,
Stefan Nürnberger
,
Ahmad-Reza Sadeghi
,
Thomas Schneider
Conference papers
hal-01596191v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Mobile Identity Management
Jaap-Henk Hoepman
Conference papers
hal-01596192v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature
Ronny Merkel
,
Jana Dittmann
,
Claus Vielhauer
Conference papers
hal-01596193v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
Kurt Dietrich
,
Johannes Winter
,
Granit Luzhnica
,
Siegfried Podesser
Conference papers
hal-01596194v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning
Koen Decroix
,
Milica Milutinovic
,
Bart De Decker
,
Vincent Naessens
Conference papers
hal-01596195v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Cryptanalysis of a SIP Authentication Scheme
Fuwen Liu
,
Hartmut Koenig
Conference papers
hal-01596196v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks
Mahdi R. Alagheband
,
Mohammad Reza Aref
Conference papers
hal-01596197v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
From Protecting a System to Protecting a Global Ecosystem
Moti Yung
Conference papers
hal-01596198v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking
Reinhard Huber
,
Herbert Stögner
,
Andreas Uhl
Conference papers
hal-01596199v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Dynamic Software Birthmark for Java Based on Heap Memory Analysis
Patrick Chan
,
Lucas Hui
,
S. M. Yiu
Conference papers
hal-01596200v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting
Karl Kümmel
,
Tobias Scheidat
,
Christian Arndt
,
Claus Vielhauer
Conference papers
hal-01596201v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Secure Negotiation for Manual Authentication Protocols
Milica Milutinovic
,
Roel Peeters
,
Bart De Decker
Conference papers
hal-01596202v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Anonymous Authentication from Public-Key Encryption Revisited
Daniel Slamanig
Conference papers
hal-01596203v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications
Geoffrey Ottoy
,
Jeroen Martens
,
Nick Saeys
,
Bart Preneel
,
Lieven De Strycker
,
et al.
Conference papers
hal-01596204v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
A Secure Perceptual Hash Algorithm for Image Content Authentication
Li Weng
,
Bart Preneel
Conference papers
hal-01596205v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Efficient Prevention of Credit Card Leakage from Enterprise Networks
Matthew Hall
,
Reinoud Koornstra
,
Miranda Mowbray
Conference papers
hal-01596206v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
GPU-Assisted AES Encryption Using GCM
Georg Schönberger
,
Jürgen Fuss
Conference papers
hal-01596207v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
A Secure One-Way Authentication Protocol in IMS Context
Mohamed Maachaoui
,
Anas Abou El Kalam
,
Christian Fraboul
Conference papers
hal-01596208v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
On Detecting Abrupt Changes in Network Entropy Time Series
Philipp Winter
,
Harald Lampesberger
,
Markus Zeilinger
,
Eckehard Hermann
Conference papers
hal-01596209v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Motif-Based Attack Detection in Network Communication Graphs
Krzysztof Juszczyszyn
,
Grzegorz Kołaczek
Conference papers
hal-01596210v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Radon Transform-Based Secure Image Hashing
Dung Q. Nguyen
,
Li Weng
,
Bart Preneel
Conference papers
hal-01596211v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|
|
|
Communications and Multimedia Security
Bart De Decker
,
Jorn Lapon
,
Vincent Naessens
,
Andreas Uhl
Books
hal-01596212v1
|
Share
Gmail
Facebook
X
LinkedIn
More
|