Filter your results
- 15
- 15
- 15
- 3
- 1
- 1
- 2
- 4
- 3
- 4
- 15
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.209-222, ⟨10.1007/978-3-642-12510-2_15⟩
Conference papers
hal-01056105v1
|
||
|
A Smart Card Implementation of the McEliece PKC4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers
hal-01056067v1
|
||
|
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers
hal-01551363v1
|
||
|
AUTSEG: Automatic Test Set Generator for Embedded Reactive Systems26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.97-112, ⟨10.1007/978-3-662-44857-1_7⟩
Conference papers
hal-01069101v1
|
||
|
A Robust Remote User Authentication Scheme against Smart Card Security Breach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers
hal-01586587v1
|
||
|
Security Vulnerabilities of User Authentication Scheme Using Smart Card26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers
hal-01534770v1
|
||
|
Type Checking Privacy Policies in the π-calculus35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers
hal-01767337v1
|
||
|
Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers
hal-01059143v1
|
||
|
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers
hal-01534767v1
|
||
|
Breaking a Robust Remote User Authentication Scheme Using Smart Cards9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.110-118, ⟨10.1007/978-3-642-35606-3_13⟩
Conference papers
hal-01551357v1
|
||
|
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.171-177, ⟨10.1007/978-3-642-24712-5_15⟩
Conference papers
hal-01596204v1
|
||
|
An Efficient Three Factor Based Remote User Authentication Protocol for Distributed Networks15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.682-693, ⟨10.1007/978-3-319-45378-1_59⟩
Conference papers
hal-01637488v1
|
||
|
Memory Encryption for Smart Cards10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.199-216, ⟨10.1007/978-3-642-27257-8_13⟩
Conference papers
hal-01596296v1
|
||
|
Improved Fault Analysis of Signature Schemes9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.164-181, ⟨10.1007/978-3-642-12510-2_12⟩
Conference papers
hal-01056107v1
|
||
|
An Evaluation of Argument Patterns Based on Data Flow2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.432-437, ⟨10.1007/978-3-642-55032-4_43⟩
Conference papers
hal-01397249v1
|