Filter your results
- 5
- 4
- 5
- 5
- 1
- 1
- 1
- 2
- 5
- 5
- 1
- 1
- 1
- 1
- 3
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Evaluation of the Ability to Transform SIM Applications into Hostile Applications10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.1-17, ⟨10.1007/978-3-642-27257-8_1⟩
Conference papers
hal-00684113v1
|
||
|
Lightweight Authentication Protocol for Low-Cost RFID Tags7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.129-144, ⟨10.1007/978-3-642-38530-8_9⟩
Conference papers
hal-01485938v1
|
||
|
Combined Software and Hardware Attacks on the Java Card Control Flow10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.283-296, ⟨10.1007/978-3-642-27257-8_18⟩
Conference papers
hal-00684616v1
|
||
|
A friendly framework for hidding fault enabled virus for Java based smartcard26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.122-128, ⟨10.1007/978-3-642-31540-4_10⟩
Conference papers
hal-00937307v1
|
||
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|