Filter your results
- 5
- 5
- 5
- 1
- 1
- 3
- 5
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Dedicated Hardware for Attribute-Based Credential Verification14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.50-65, ⟨10.1007/978-3-642-40779-6_4⟩
Conference papers
hal-01492833v1
|
||
|
Radon Transform-Based Secure Image Hashing12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.186-193, ⟨10.1007/978-3-642-24712-5_17⟩
Conference papers
hal-01596211v1
|
||
|
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.171-177, ⟨10.1007/978-3-642-24712-5_15⟩
Conference papers
hal-01596204v1
|
||
|
A Secure Perceptual Hash Algorithm for Image Content Authentication12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.108-121, ⟨10.1007/978-3-642-24712-5_9⟩
Conference papers
hal-01596205v1
|
||
|
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.53-69, ⟨10.1007/978-3-319-45931-8_4⟩
Conference papers
hal-01639618v1
|