Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

2 results
Deposit type : Fulltext
labStructName_s : Computing Science Laboratory - Oxford University
labStructName_s : SAP Research [Karlsruhe]
Image document

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity

Florian Kerschbaum
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers hal-01586579v1
Image document

Mobile Electronic Identity: Securing Payment on Mobile Phones

Chen Bangdao , A. W. Roscoe
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.22-37, ⟨10.1007/978-3-642-21040-2_2⟩
Conference papers hal-01573293v1