Filter your results
- 5
- 4
- 5
- 4
- 9
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 9
- 9
- 98
- 78
- 75
- 65
- 59
- 51
- 49
- 47
- 43
- 42
- 40
- 40
- 38
- 35
- 33
- 33
- 33
- 31
- 29
- 29
- 29
- 29
- 28
- 28
- 27
- 26
- 25
- 25
- 25
- 23
- 23
- 22
- 22
- 21
- 21
- 21
- 21
- 20
- 20
- 20
- 20
- 19
- 19
- 19
- 18
- 18
- 18
- 17
- 17
- 17
- 17
- 17
- 16
- 16
- 16
- 15
- 15
- 15
- 15
- 15
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 13
- 13
- 13
- 13
- 13
- 13
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 11
- 11
- 11
- 11
- 11
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
A friendly framework for hidding fault enabled virus for Java based smartcard26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.122-128, ⟨10.1007/978-3-642-31540-4_10⟩
Conference papers
hal-00937307v1
|
||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart DevicesSpringer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books
hal-01550529v1
|
||
|
Smart Card Research and Advanced ApplicationsSpringer, LNCS-6035, 2010, Lecture Notes in Computer Science, 978-3-642-12509-6. ⟨10.1007/978-3-642-12510-2⟩
Books
hal-01550563v1
|
||
|
Lightweight Authentication Protocol for Low-Cost RFID Tags7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.129-144, ⟨10.1007/978-3-642-38530-8_9⟩
Conference papers
hal-01485938v1
|
||
|
Combined Software and Hardware Attacks on the Java Card Control Flow10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.283-296, ⟨10.1007/978-3-642-27257-8_18⟩
Conference papers
hal-00684616v1
|
||
|
Information Security Theory and Practice: Securing the Internet of ThingsDavid Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books
hal-01098408v1
|
||
|
Evaluation of the Ability to Transform SIM Applications into Hostile Applications10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.1-17, ⟨10.1007/978-3-642-27257-8_1⟩
Conference papers
hal-00684113v1
|
||
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-11469, 2019, Lecture Notes in Computer Science, 978-3-030-20073-2. ⟨10.1007/978-3-030-20074-9⟩
Books
hal-02294601v1
|