Search - Information Security Theory and Practice Access content directly

Filter your results

5 results
Keywords : Security
Image document

Normalizing Security Events with a Hierarchical Knowledge Base

David Jaeger , Amir Azodi , Feng Cheng , Christoph Meinel
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.237-248, ⟨10.1007/978-3-319-24018-3_15⟩
Conference papers hal-01442546v1
Image document

Secure and Authenticated Access to LLN Resources Through Policy Constraints

Konstantinos Rantos , Konstantinos Fysarakis , Othonas Soultatos , Ioannis Askoxylakis
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.271-280, ⟨10.1007/978-3-319-24018-3_18⟩
Conference papers hal-01442549v1
Image document

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

Qiao Hu , Lavinia Mihaela Dinca , Gerhard Hancke
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.219-234, ⟨10.1007/978-3-319-24018-3_14⟩
Conference papers hal-01442545v1
Image document

Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing

Tassos Dimitriou , Ioannis Krontiris
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.20-35, ⟨10.1007/978-3-319-24018-3_2⟩
Conference papers hal-01442551v1
Image document

Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols

Alejandro Calleja , Pedro Peris-Lopez , Juan E. Tapiador
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.36-51, ⟨10.1007/978-3-319-24018-3_3⟩
Conference papers hal-01442552v1