Filter your results
- 6
- 6
- 6
- 1
- 1
- 1
- 1
- 2
- 1
- 6
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
6 results
|
|
sorted by
|
|
Sweet Dreams and Nightmares: Security in the Internet of Things8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.1-9, ⟨10.1007/978-3-662-43826-8_1⟩
Conference papers
hal-01400916v1
|
||
|
Fault-Channel Watermarks10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.204-219, ⟨10.1007/978-3-319-45931-8_13⟩
Conference papers
hal-01639613v1
|
||
|
Achieving Anonymity against Major Face Recognition Algorithms14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.18-33, ⟨10.1007/978-3-642-40779-6_2⟩
Conference papers
hal-01492830v1
|
||
|
Secure Location Verification24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.366-373, ⟨10.1007/978-3-642-13739-6_29⟩
Conference papers
hal-01056742v1
|
||
|
Memory Encryption for Smart Cards10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.199-216, ⟨10.1007/978-3-642-27257-8_13⟩
Conference papers
hal-01596296v1
|
||
|
Trust Agreement in Wireless Mesh Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers
hal-01573304v1
|