Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

2 results
Image document

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

Johann Grossschädl , Dan Page , Stefan Tillich
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.189-207, ⟨10.1007/978-3-642-30955-7_17⟩
Conference papers hal-01534311v1
Image document

Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project

Thomas Schaberreiter , Sébastien Varrette , Pascal Bouvry , Juha Röning , Djamel Khadraoui
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.269-287
Conference papers hal-01506574v1