Filter your results
- 14
- 14
- 14
- 3
- 1
- 2
- 1
- 1
- 1
- 4
- 1
- 2
- 1
- 14
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Optimal Parameters for XMSSMT1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers
hal-01506577v1
|
||
|
Expiration and Revocation of Keys for Attribute-Based Signatures29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.153-169, ⟨10.1007/978-3-319-20810-7_10⟩
Conference papers
hal-01745835v1
|
||
|
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.155-162, ⟨10.1007/978-3-642-24712-5_13⟩
Conference papers
hal-01596183v1
|
||
|
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.271-285, ⟨10.1007/978-3-642-23300-5_21⟩
Conference papers
hal-01590395v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
That’s My DNA: Detecting Malicious Tampering of Synthesized DNA33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.61-80, ⟨10.1007/978-3-030-22479-0_4⟩
Conference papers
hal-02384604v1
|
||
|
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.179-194, ⟨10.1007/978-3-642-39256-6_12⟩
Conference papers
hal-01490704v1
|
||
|
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers
hal-01284842v1
|
||
|
Modular Architecture for Adaptable Signature-Creation Tools12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Conference papers
hal-01490913v1
|
||
|
Benchmarking Cryptographic Schemes for Securing Public Cloud Storages17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.163-176, ⟨10.1007/978-3-319-59665-5_12⟩
Conference papers
hal-01800117v1
|
||
|
Philanthropy on the Blockchain11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers
hal-01875527v1
|
||
|
Pairing-Based Cryptography on the Internet of Things: A Feasibility StudyInternational Conference on Wired/Wireless Internet Communication (WWIC), Jun 2018, Boston, MA, United States. pp.219-230, ⟨10.1007/978-3-030-02931-9_18⟩
Conference papers
hal-02269719v1
|
||
|
Fmeter: Extracting Indexable Low-Level System Signatures by Counting Kernel Function Calls13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.81-100, ⟨10.1007/978-3-642-35170-9_5⟩
Conference papers
hal-01555553v1
|
||
|
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.122-137, ⟨10.1007/978-3-642-12368-9_9⟩
Conference papers
hal-01056062v1
|