Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

15 results
Keywords : smart card
Image document

Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

Lejla Batina , Jaap-Henk Hoepman , Bart Jacobs , Wojciech Mostowski , Pim Vullers
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.209-222, ⟨10.1007/978-3-642-12510-2_15⟩
Conference papers hal-01056105v1
Image document

A Smart Card Implementation of the McEliece PKC

Falko Strenzke
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers hal-01056067v1
Image document

Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme

Hae-Jung Kim , Eun-Jun Yoon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers hal-01551363v1
Image document

AUTSEG: Automatic Test Set Generator for Embedded Reactive Systems

Mariem Abdelmoula , Daniel Gaffé , Michel Auguin
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.97-112, ⟨10.1007/978-3-662-44857-1_7⟩
Conference papers hal-01069101v1
Image document

A Robust Remote User Authentication Scheme against Smart Card Security Breach

Chun-Ta Li , Cheng-Chi Lee , Chen-Ju Liu , Chin-Wen Lee
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers hal-01586587v1
Image document

Security Vulnerabilities of User Authentication Scheme Using Smart Card

Ravi Singh Pippal , Jaidhar C.D. , Shashikala Tapaswi
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers hal-01534770v1
Image document

Type Checking Privacy Policies in the π-calculus

Dimitrios Kouzapas , Anna Philippou
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers hal-01767337v1
Image document

Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?

Nicola Dragoni , Olga Gadyatskaya , Fabio Massacci
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers hal-01059143v1
Image document

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Ding Wang , Chun-Guang Ma , Peng Wu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers hal-01534767v1
Image document

Breaking a Robust Remote User Authentication Scheme Using Smart Cards

Ding Wang , Chun-Guang Ma , Sen-Dong Zhao , Chang-Li Zhou
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.110-118, ⟨10.1007/978-3-642-35606-3_13⟩
Conference papers hal-01551357v1
Image document

A Modular Test Platform for Evaluation of Security Protocols in NFC Applications

Geoffrey Ottoy , Jeroen Martens , Nick Saeys , Bart Preneel , Lieven De Strycker , et al.
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.171-177, ⟨10.1007/978-3-642-24712-5_15⟩
Conference papers hal-01596204v1
Image document

An Efficient Three Factor Based Remote User Authentication Protocol for Distributed Networks

Ashish Singh , Kakali Chatterjee
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.682-693, ⟨10.1007/978-3-319-45378-1_59⟩
Conference papers hal-01637488v1
Image document

Memory Encryption for Smart Cards

Bariş Ege , Elif Bilge Kavun , Tolga Yalçin
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.199-216, ⟨10.1007/978-3-642-27257-8_13⟩
Conference papers hal-01596296v1
Image document

Improved Fault Analysis of Signature Schemes

Christophe Giraud , Erik W. Knudsen , Michael Tunstall
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.164-181, ⟨10.1007/978-3-642-12510-2_12⟩
Conference papers hal-01056107v1
Image document

An Evaluation of Argument Patterns Based on Data Flow

Shuichiro Yamamoto
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.432-437, ⟨10.1007/978-3-642-55032-4_43⟩
Conference papers hal-01397249v1