Filter your results
- 11
- 1
- 11
- 1
- 12
- 1
- 2
- 3
- 1
- 1
- 4
- 12
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 8
- 5
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart DevicesSpringer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books
hal-01550529v1
|
||
|
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.161-172, ⟨10.1007/978-3-642-15257-3_15⟩
Conference papers
hal-01054520v1
|
||
|
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.102-110, ⟨10.1007/978-3-642-39218-4_8⟩
Conference papers
hal-01463848v1
|
||
|
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.3-16, ⟨10.1007/978-3-030-58201-2_1⟩
Conference papers
hal-03440832v1
|
||
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
CAN Bus Risk Analysis Revisit8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.170-179, ⟨10.1007/978-3-662-43826-8_13⟩
Conference papers
hal-01400939v1
|
||
|
Philanthropy on the Blockchain11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers
hal-01875527v1
|
||
|
Remote Credential Management with Mutual Attestation for Trusted Execution Environments12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.157-173, ⟨10.1007/978-3-030-20074-9_12⟩
Conference papers
hal-02294612v1
|
||
|
Website Credential Storage and Two-Factor Web Authentication with a Java SIM4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.229-236, ⟨10.1007/978-3-642-12368-9_17⟩
Conference papers
hal-01056084v1
|
||
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.75-92, ⟨10.1007/978-3-319-93524-9_5⟩
Conference papers
hal-01875526v1
|
||
|
Firewall Mechanism in a User Centric Smart Card Ownership Model9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.118-132, ⟨10.1007/978-3-642-12510-2_9⟩
Conference papers
hal-01056096v1
|
||
|
Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.129-144, ⟨10.1007/978-3-030-20074-9_10⟩
Conference papers
hal-02294604v1
|