Filter your results
- 6
- 6
- 6
- 1
- 2
- 1
- 1
- 1
- 1
- 6
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Threat Analysis of Poisoning Attack Against Ethereum Blockchain13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.139-154, ⟨10.1007/978-3-030-41702-4_9⟩
Conference papers
hal-03173908v1
|
||
|
A Novel Carrier-Cooperation Scheme with an Incentive for Offering Emergency Lightpath Support in Disaster Recovery23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.362-376, ⟨10.1007/978-3-030-38085-4_31⟩
Conference papers
hal-03200642v1
|
||
|
Can We Securely Use CBC Mode in TLS1.0?3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.151-160, ⟨10.1007/978-3-319-24315-3_15⟩
Conference papers
hal-01466214v1
|
||
|
Urban Disaster Simulation Incorporating Human Psychological Models in Evacuation Behaviors1st International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Nov 2016, Sofia, Bulgaria. pp.20-30, ⟨10.1007/978-3-319-68486-4_3⟩
Conference papers
hal-03213115v1
|
||
|
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.108-123, ⟨10.1007/978-3-662-43826-8_8⟩
Conference papers
hal-01400929v1
|
||
|
A Forward Privacy Model for RFID Authentication Protocols7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.98-111, ⟨10.1007/978-3-642-38530-8_7⟩
Conference papers
hal-01485936v1
|