Filter your results
- 5
- 5
- 5
- 5
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Normalizing Security Events with a Hierarchical Knowledge Base9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.237-248, ⟨10.1007/978-3-319-24018-3_15⟩
Conference papers
hal-01442546v1
|
||
|
Secure and Authenticated Access to LLN Resources Through Policy Constraints9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.271-280, ⟨10.1007/978-3-319-24018-3_18⟩
Conference papers
hal-01442549v1
|
||
|
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.219-234, ⟨10.1007/978-3-319-24018-3_14⟩
Conference papers
hal-01442545v1
|
||
|
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.20-35, ⟨10.1007/978-3-319-24018-3_2⟩
Conference papers
hal-01442551v1
|
||
|
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.36-51, ⟨10.1007/978-3-319-24018-3_3⟩
Conference papers
hal-01442552v1
|