Filter your results
- 815
- 27
- 815
- 814
- 104
- 15
- 12
- 788
- 815
- 9
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Cloud Forensics7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.35-46, ⟨10.1007/978-3-642-24212-0_3⟩
Conference papers
hal-01569563v1
|
||
|
Case-Based Reasoning in Live Forensics7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.77-88, ⟨10.1007/978-3-642-24212-0_6⟩
Conference papers
hal-01569564v1
|
||
|
An FPGA System for Detecting Malicious DNS Network Traffic7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.195-207, ⟨10.1007/978-3-642-24212-0_15⟩
Conference papers
hal-01569565v1
|
||
|
Entropy of Selectively Encrypted Strings5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.234-243, ⟨10.1007/978-3-642-21040-2_16⟩
Conference papers
hal-01573290v1
|
||
|
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.54-68, ⟨10.1007/978-3-642-21040-2_4⟩
Conference papers
hal-01573291v1
|
||
|
Practical Attacks on HB and HB+ Protocols5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.244-253, ⟨10.1007/978-3-642-21040-2_17⟩
Conference papers
hal-01573292v1
|
||
|
Mobile Electronic Identity: Securing Payment on Mobile Phones5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.22-37, ⟨10.1007/978-3-642-21040-2_2⟩
Conference papers
hal-01573293v1
|
||
|
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers
hal-01573294v1
|
||
|
Leakage Squeezing Countermeasure against High-Order Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers
hal-01573295v1
|
||
|
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Conference papers
hal-01573296v1
|
||
|
Information Leakage Discovery Techniques to Enhance Secure Chip Design5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.128-143, ⟨10.1007/978-3-642-21040-2_9⟩
Conference papers
hal-01573297v1
|
||
|
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.69-84, ⟨10.1007/978-3-642-21040-2_5⟩
Conference papers
hal-01573298v1
|
||
|
Privacy Respecting Targeted Advertising for Social Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers
hal-01573299v1
|
||
|
Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.351-360, ⟨10.1007/978-3-642-21040-2_25⟩
Conference papers
hal-01573300v1
|
||
|
Formal Analysis of Security Metrics and Risk5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.304-319, ⟨10.1007/978-3-642-21040-2_22⟩
Conference papers
hal-01573302v1
|
||
|
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.116-127, ⟨10.1007/978-3-642-21040-2_8⟩
Conference papers
hal-01573301v1
|
||
|
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.160-174, ⟨10.1007/978-3-642-21040-2_11⟩
Conference papers
hal-01573303v1
|
||
|
Trust Agreement in Wireless Mesh Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers
hal-01573304v1
|
||
|
A SMS-Based Mobile Botnet Using Flooding Algorithm5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.264-279, ⟨10.1007/978-3-642-21040-2_19⟩
Conference papers
hal-01573306v1
|
||
|
A Comparison of Post-Processing Techniques for Biased Random Number Generators5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.175-190, ⟨10.1007/978-3-642-21040-2_12⟩
Conference papers
hal-01573305v1
|
||
|
AES Variants Secure against Related-Key Differential and Boomerang Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers
hal-01573307v1
|
||
|
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers
hal-01573308v1
|
||
|
Hardware Trojan Side-Channels Based on Physical Unclonable Functions5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.294-303, ⟨10.1007/978-3-642-21040-2_21⟩
Conference papers
hal-01573309v1
|
||
|
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.224-233, ⟨10.1007/978-3-642-21040-2_15⟩
Conference papers
hal-01573310v1
|
||
|
Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.254-263, ⟨10.1007/978-3-642-21040-2_18⟩
Conference papers
hal-01573311v1
|
||
|
STORM - Collaborative Security Management Environment5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.320-335, ⟨10.1007/978-3-642-21040-2_23⟩
Conference papers
hal-01573312v1
|
||
|
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers
hal-01573313v1
|
||
|
A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.381-389, ⟨10.1007/978-3-642-21040-2_28⟩
Conference papers
hal-01573314v1
|
||
|
An Efficient Management of Correlation Sets with Broadcast13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.80-94, ⟨10.1007/978-3-642-21464-6_6⟩
Conference papers
hal-01582988v1
|
||
|
Simulation-Based Performance Analysis of Channel-Based Coordination Models13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.187-201, ⟨10.1007/978-3-642-21464-6_13⟩
Conference papers
hal-01582989v1
|