Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

815 results
Deposit type : Fulltext
Image document

Cloud Forensics

Keyun Ruan , Joe Carthy , Tahar Kechadi , Mark Crosbie
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.35-46, ⟨10.1007/978-3-642-24212-0_3⟩
Conference papers hal-01569563v1
Image document

Case-Based Reasoning in Live Forensics

Bruno Hoelz , Celia Ralha , Frederico Mesquita
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.77-88, ⟨10.1007/978-3-642-24212-0_6⟩
Conference papers hal-01569564v1
Image document

An FPGA System for Detecting Malicious DNS Network Traffic

Brennon Thomas , Barry Mullins , Gilbert Peterson , Robert Mills
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.195-207, ⟨10.1007/978-3-642-24212-0_15⟩
Conference papers hal-01569565v1
Image document

Entropy of Selectively Encrypted Strings

Reine Lundin , Stefan Lindskog
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.234-243, ⟨10.1007/978-3-642-21040-2_16⟩
Conference papers hal-01573290v1
Image document

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

Chunhua Chen , Chris J. Mitchell , Shaohua Tang
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.54-68, ⟨10.1007/978-3-642-21040-2_4⟩
Conference papers hal-01573291v1
Image document

Practical Attacks on HB and HB+ Protocols

Zbigniew Gołębiewski , Krzysztof Majcher , Filip Zagórski , Marcin Zawada
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.244-253, ⟨10.1007/978-3-642-21040-2_17⟩
Conference papers hal-01573292v1
Image document

Mobile Electronic Identity: Securing Payment on Mobile Phones

Chen Bangdao , A. W. Roscoe
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.22-37, ⟨10.1007/978-3-642-21040-2_2⟩
Conference papers hal-01573293v1
Image document

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

Mark Manulis , Bertram Poettering
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers hal-01573294v1
Image document

Leakage Squeezing Countermeasure against High-Order Attacks

Houssem Maghrebi , Sylvain Guilley , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers hal-01573295v1
Image document

Formal Framework for the Evaluation of Waveform Resynchronization Algorithms

Sylvain Guilley , Karim Khalfallah , Victor Lomne , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Conference papers hal-01573296v1
Image document

Information Leakage Discovery Techniques to Enhance Secure Chip Design

Alessandro Barenghi , Gerardo Pelosi , Yannick Teglia
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.128-143, ⟨10.1007/978-3-642-21040-2_9⟩
Conference papers hal-01573297v1
Image document

An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control

Paolo D’arco
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.69-84, ⟨10.1007/978-3-642-21040-2_5⟩
Conference papers hal-01573298v1
Image document

Privacy Respecting Targeted Advertising for Social Networks

Christian Kahl , Stephen Crane , Markus Tschersich , Kai Rannenberg
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers hal-01573299v1
Image document

Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network

Kun Peng
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.351-360, ⟨10.1007/978-3-642-21040-2_25⟩
Conference papers hal-01573300v1
Image document

Formal Analysis of Security Metrics and Risk

Leanid Krautsevich , Fabio Martinelli , Artsiom Yautsiukhin
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.304-319, ⟨10.1007/978-3-642-21040-2_22⟩
Conference papers hal-01573302v1
Image document

Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library

Yumi Sakemi , Tetsuya Izu , Masahiko Takenaka , Masaya Yasuda
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.116-127, ⟨10.1007/978-3-642-21040-2_8⟩
Conference papers hal-01573301v1
Image document

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture

Simon Hoerder , Marcin Wójcik , Stefan Tillich , Daniel Page
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.160-174, ⟨10.1007/978-3-642-21040-2_11⟩
Conference papers hal-01573303v1
Image document

Trust Agreement in Wireless Mesh Networks

Andreas Noack
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers hal-01573304v1
Image document

A SMS-Based Mobile Botnet Using Flooding Algorithm

Jingyu Hua , Kouichi Sakurai
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.264-279, ⟨10.1007/978-3-642-21040-2_19⟩
Conference papers hal-01573306v1
Image document

A Comparison of Post-Processing Techniques for Biased Random Number Generators

Siew-Hwee Kwok , Yen-Ling Ee , Guanhan Chew , Kanghong Zheng , Khoongming Khoo , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.175-190, ⟨10.1007/978-3-642-21040-2_12⟩
Conference papers hal-01573305v1
Image document

AES Variants Secure against Related-Key Differential and Boomerang Attacks

Jiali Choy , Aileen Zhang , Khoongming Khoo , Matt Henricksen , Axel Poschmann
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers hal-01573307v1
Image document

Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems

Antonios Gouglidis , Ioannis Mavridis
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers hal-01573308v1
Image document

Hardware Trojan Side-Channels Based on Physical Unclonable Functions

Zheng Gong , Marc X. Makkes
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.294-303, ⟨10.1007/978-3-642-21040-2_21⟩
Conference papers hal-01573309v1
Image document

Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault

Michael Tunstall , Debdeep Mukhopadhyay , Subidh Ali
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.224-233, ⟨10.1007/978-3-642-21040-2_15⟩
Conference papers hal-01573310v1
Image document

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard

Mohammad Hassan Habibi , Mahdi R. Alagheband , Mohammad Reza Aref
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.254-263, ⟨10.1007/978-3-642-21040-2_18⟩
Conference papers hal-01573311v1
Image document

STORM - Collaborative Security Management Environment

Theodoros Ntouskas , George Pentafronimos , Spyros Papastergiou
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.320-335, ⟨10.1007/978-3-642-21040-2_23⟩
Conference papers hal-01573312v1
Image document

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines

Michael Hutter , Martin Feldhofer , Johannes Wolkerstorfer
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers hal-01573313v1
Image document

A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area

Savvas Mousionis , Alex Vakaloudis , Constantinos Hilas
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.381-389, ⟨10.1007/978-3-642-21040-2_28⟩
Conference papers hal-01573314v1
Image document

An Efficient Management of Correlation Sets with Broadcast

Jacopo Mauro , Maurizio Gabbrielli , Claudio Guidi , Fabrizio Montesi
13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.80-94, ⟨10.1007/978-3-642-21464-6_6⟩
Conference papers hal-01582988v1
Image document

Simulation-Based Performance Analysis of Channel-Based Coordination Models

C. Verhoef , C. Krause , O. Kanters , R. van Der Mei
13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.187-201, ⟨10.1007/978-3-642-21464-6_13⟩
Conference papers hal-01582989v1