Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
authFullName_s : Jakub Breier
Image document

Assets Dependencies Model in Information Security Risk Management

Jakub Breier , Frank Schindler
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.405-412, ⟨10.1007/978-3-642-55032-4_40⟩
Conference papers hal-01397241v1
Image document

On Identifying Proper Security Mechanisms

Jakub Breier , Ladislav Hudec
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.285-294, ⟨10.1007/978-3-642-36818-9_29⟩
Conference papers hal-01480182v1
Image document

Differential Fault Attack on LEA

Dirmanto Jap , Jakub Breier
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.265-274, ⟨10.1007/978-3-319-24315-3_27⟩
Conference papers hal-01466228v1