Search - IFIP Open Digital Library Access content directly

Filter your results

10 results
Structure: Internal structure identifier : 263320
Image document

Anonymous Client Authentication for Transport Layer Security

Kurt Dietrich
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.268-280, ⟨10.1007/978-3-642-13241-4_24⟩
Conference papers hal-01056373v1
Image document

A Security Analysis of FirstCoin

Alexander Marsalek , Christian Kollmann , Thomas Zefferer
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.127-140, ⟨10.1007/978-3-319-99828-2_10⟩
Conference papers hal-02023720v1
Image document

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves

Christian Hanser , Christian Wagner
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers hal-01506561v1
Image document

Qualified Mobile Server Signature

Clemens Orthacker , Martin Centner , Christian Kittl
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.103-111, ⟨10.1007/978-3-642-15257-3_10⟩
Conference papers hal-01054524v1
Image document

Code Between the Lines: Semantic Analysis of Android Applications

Johannes Feichtner , Stefan Gruber
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.171-186, ⟨10.1007/978-3-030-58201-2_12⟩
Conference papers hal-03440841v1
Image document

Hunting Password Leaks in Android Applications

Johannes Feichtner
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.278-292, ⟨10.1007/978-3-319-99828-2_20⟩
Conference papers hal-02023717v1
Image document

Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves

Gerwin Gsenger , Christian Hanser
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.155-167
Conference papers hal-01506564v1
Image document

Side-Channel Leakage across Borders

Jörn-Marc Schmidt , Thomas Plos , Mario Kirschbaum , Michael Hutter , Marcel Medwed , et al.
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.36-48, ⟨10.1007/978-3-642-12510-2_4⟩
Conference papers hal-01056100v1
Image document

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms

Kurt Dietrich , Johannes Winter , Granit Luzhnica , Siegfried Podesser
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.45-58, ⟨10.1007/978-3-642-24712-5_4⟩
Conference papers hal-01596194v1
Image document

Fine-Grained Access Control in Industrial Internet of Things

Dominik Ziegler , Josef Sabongui , Gerald Palfinger
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.91-104, ⟨10.1007/978-3-030-22312-0_7⟩
Conference papers hal-03744312v1