Filter your results
- 5
- 4
- 5
- 4
- 9
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 9
- 9
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
9 results
|
|
sorted by
|
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-11469, 2019, Lecture Notes in Computer Science, 978-3-030-20073-2. ⟨10.1007/978-3-030-20074-9⟩
Books
hal-02294601v1
|
||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart DevicesSpringer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books
hal-01550529v1
|
||
|
A friendly framework for hidding fault enabled virus for Java based smartcard26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.122-128, ⟨10.1007/978-3-642-31540-4_10⟩
Conference papers
hal-00937307v1
|
||
|
Smart Card Research and Advanced ApplicationsSpringer, LNCS-6035, 2010, Lecture Notes in Computer Science, 978-3-642-12509-6. ⟨10.1007/978-3-642-12510-2⟩
Books
hal-01550563v1
|
||
|
Lightweight Authentication Protocol for Low-Cost RFID Tags7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.129-144, ⟨10.1007/978-3-642-38530-8_9⟩
Conference papers
hal-01485938v1
|
||
|
Combined Software and Hardware Attacks on the Java Card Control Flow10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.283-296, ⟨10.1007/978-3-642-27257-8_18⟩
Conference papers
hal-00684616v1
|
||
|
Information Security Theory and Practice: Securing the Internet of ThingsDavid Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books
hal-01098408v1
|
||
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
Evaluation of the Ability to Transform SIM Applications into Hostile Applications10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.1-17, ⟨10.1007/978-3-642-27257-8_1⟩
Conference papers
hal-00684113v1
|