Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : SAP Research [Karlsruhe]
labStructName_s : Oberthur Technologies
Image document

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity

Florian Kerschbaum
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers hal-01586579v1
Image document

Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0

Guillaume Barbu , Hugues Thiebeauld
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers hal-00692172v1
Image document

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Guillaume Barbu , Guillaume Duc , Philippe Hoogvorst
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers hal-00692171v1