Filter your results
- 32
- 1
- 32
- 32
- 21
- 32
- 32
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.442-456
Conference papers
hal-01506553v1
|
||
|
PPM: Privacy Policy Manager for Personalized Services1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.377-392
Conference papers
hal-01506558v1
|
||
|
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.137-154
Conference papers
hal-01506572v1
|
||
|
Optimal Parameters for XMSSMT1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers
hal-01506577v1
|
||
|
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.222-235
Conference papers
hal-01506557v1
|
||
|
Code-Based Public-Key Encryption Resistant to Key Leakage1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.44-54
Conference papers
hal-01506563v1
|
||
|
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers
hal-01506570v1
|
||
|
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.414-429
Conference papers
hal-01506692v1
|
||
|
Intelligent UBMSS Systems for Strategic Information Management1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers
hal-01506573v1
|
||
|
Solving the Discrete Logarithm Problem for Packing Candidate Preferences1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.209-221
Conference papers
hal-01506684v1
|
||
|
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.16-28
Conference papers
hal-01506569v1
|
||
|
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252
Conference papers
hal-01506705v1
|
||
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
Cumulus4j: A Provably Secure Database Abstraction Layer1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.180-193
Conference papers
hal-01506571v1
|
||
|
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers
hal-01506556v1
|
||
|
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers
hal-01506559v1
|
||
|
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.393-407
Conference papers
hal-01506576v1
|
||
|
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.345-360
Conference papers
hal-01506568v1
|
||
|
Analyzing the Internet Stability in Presence of Disasters1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.253-268
Conference papers
hal-01506694v1
|
||
|
A Denial of Service Attack to GSM Networks via Attach Procedure1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.361-376
Conference papers
hal-01506555v1
|
||
|
Using Probabilistic Analysis for the Certification of Machine Control Systems1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.305-320
Conference papers
hal-01506575v1
|
||
|
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.29-43
Conference papers
hal-01506562v1
|
||
|
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.321-336
Conference papers
hal-01506554v1
|
||
|
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.269-287
Conference papers
hal-01506574v1
|
||
|
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.105-121
Conference papers
hal-01506698v1
|
||
|
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.430-441
Conference papers
hal-01506565v1
|
||
|
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.155-167
Conference papers
hal-01506564v1
|
||
|
A Multiple-Key Management Scheme in Wireless Sensor Networks1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.337-344
Conference papers
hal-01506711v1
|
||
|
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.1-15
Conference papers
hal-01506560v1
|
- 1
- 2