Filter your results
- 3
- 3
- 3
- 3
- 1
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Assets Dependencies Model in Information Security Risk Management2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.405-412, ⟨10.1007/978-3-642-55032-4_40⟩
Conference papers
hal-01397241v1
|
||
|
On Identifying Proper Security Mechanisms1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.285-294, ⟨10.1007/978-3-642-36818-9_29⟩
Conference papers
hal-01480182v1
|
||
|
Differential Fault Attack on LEA3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.265-274, ⟨10.1007/978-3-319-24315-3_27⟩
Conference papers
hal-01466228v1
|