Filter your results
- 10
- 10
- 10
- 1
- 1
- 1
- 2
- 2
- 1
- 3
- 10
- 10
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Fine-Grained Access Control in Industrial Internet of Things34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.91-104, ⟨10.1007/978-3-030-22312-0_7⟩
Conference papers
hal-03744312v1
|
||
|
Side-Channel Leakage across Borders9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.36-48, ⟨10.1007/978-3-642-12510-2_4⟩
Conference papers
hal-01056100v1
|
||
|
Qualified Mobile Server Signature25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.103-111, ⟨10.1007/978-3-642-15257-3_10⟩
Conference papers
hal-01054524v1
|
||
|
A Security Analysis of FirstCoin33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.127-140, ⟨10.1007/978-3-319-99828-2_10⟩
Conference papers
hal-02023720v1
|
||
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.155-167
Conference papers
hal-01506564v1
|
||
|
Code Between the Lines: Semantic Analysis of Android Applications35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.171-186, ⟨10.1007/978-3-030-58201-2_12⟩
Conference papers
hal-03440841v1
|
||
|
Hunting Password Leaks in Android Applications33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.278-292, ⟨10.1007/978-3-319-99828-2_20⟩
Conference papers
hal-02023717v1
|
||
|
Anonymous Client Authentication for Transport Layer Security11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.268-280, ⟨10.1007/978-3-642-13241-4_24⟩
Conference papers
hal-01056373v1
|
||
|
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.45-58, ⟨10.1007/978-3-642-24712-5_4⟩
Conference papers
hal-01596194v1
|