Filter your results
- 17
- 1
- 17
- 1
- 18
- 1
- 17
- 18
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Fault-Channel Watermarks10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.204-219, ⟨10.1007/978-3-319-45931-8_13⟩
Conference papers
hal-01639613v1
|
||
|
Delegating Biometric Authentication with the Sumcheck Protocol10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.236-244, ⟨10.1007/978-3-319-45931-8_15⟩
Conference papers
hal-01639622v1
|
||
|
Attacking and Defending Dynamic Analysis System-Calls Based IDS10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.103-119, ⟨10.1007/978-3-319-45931-8_7⟩
Conference papers
hal-01639619v1
|
||
|
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.35-50, ⟨10.1007/978-3-319-45931-8_3⟩
Conference papers
hal-01639601v1
|
||
|
Combining Third Party Components Securely in Automotive Systems10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.262-269, ⟨10.1007/978-3-319-45931-8_18⟩
Conference papers
hal-01639623v1
|
||
|
Assessing the Performance of Agile Teams17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.71-83, ⟨10.1007/978-3-030-46540-7_8⟩
Conference papers
hal-03188826v1
|
||
|
Provable Network Activity for Protecting Users Against False Accusation10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.254-261, ⟨10.1007/978-3-319-45931-8_17⟩
Conference papers
hal-01639610v1
|
||
|
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-45931-8_10⟩
Conference papers
hal-01639620v1
|
||
|
Securing Transactions with the eIDAS Protocols10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.3-18, ⟨10.1007/978-3-319-45931-8_1⟩
Conference papers
hal-01639614v1
|
||
|
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.187-203, ⟨10.1007/978-3-319-45931-8_12⟩
Conference papers
hal-01639604v1
|
||
|
An HMM-Based Anomaly Detection Approach for SCADA Systems10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.85-99, ⟨10.1007/978-3-319-45931-8_6⟩
Conference papers
hal-01639609v1
|
||
|
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.70-84, ⟨10.1007/978-3-319-45931-8_5⟩
Conference papers
hal-01639606v1
|
||
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-9895, 2016, Lecture Notes in Computer Science, 978-3-319-45930-1. ⟨10.1007/978-3-319-45931-8⟩
Books
hal-01639612v1
|
||
|
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs — An Empirical Experiment10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.223-235, ⟨10.1007/978-3-319-45931-8_14⟩
Conference papers
hal-01639611v1
|
||
|
Password Generators: Old Ideas and New10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.245-253, ⟨10.1007/978-3-319-45931-8_16⟩
Conference papers
hal-01639616v1
|
||
|
Towards Automatic Risk Analysis and Mitigation of Software Applications10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.120-135, ⟨10.1007/978-3-319-45931-8_8⟩
Conference papers
hal-01639603v1
|
||
|
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.171-186, ⟨10.1007/978-3-319-45931-8_11⟩
Conference papers
hal-01639607v1
|
||
|
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.53-69, ⟨10.1007/978-3-319-45931-8_4⟩
Conference papers
hal-01639618v1
|