Filter your results
- 6
- 1
- 6
- 1
- 7
- 2
- 3
- 1
- 1
- 7
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 5
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart DevicesSpringer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books
hal-01550529v1
|
||
|
CAN Bus Risk Analysis Revisit8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.170-179, ⟨10.1007/978-3-662-43826-8_13⟩
Conference papers
hal-01400939v1
|
||
|
Philanthropy on the Blockchain11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers
hal-01875527v1
|
||
|
Remote Credential Management with Mutual Attestation for Trusted Execution Environments12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.157-173, ⟨10.1007/978-3-030-20074-9_12⟩
Conference papers
hal-02294612v1
|
||
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.75-92, ⟨10.1007/978-3-319-93524-9_5⟩
Conference papers
hal-01875526v1
|
||
|
Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.129-144, ⟨10.1007/978-3-030-20074-9_10⟩
Conference papers
hal-02294604v1
|