Filter your results
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 4
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.35-50, ⟨10.1007/978-3-319-45931-8_3⟩
Conference papers
hal-01639601v1
|
||
|
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.338-351, ⟨10.1007/978-3-030-58201-2_23⟩
Conference papers
hal-03440818v1
|
||
|
Practical Cryptographic Data Integrity Protection with Full Disk Encryption33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.79-93, ⟨10.1007/978-3-319-99828-2_6⟩
Conference papers
hal-02023745v1
|
||
|
On Secrecy Amplification Protocols9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.3-19, ⟨10.1007/978-3-319-24018-3_1⟩
Conference papers
hal-01442550v1
|