Filter your results
- 5
- 5
- 5
- 1
- 1
- 1
- 2
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Energy-Efficiency Protocol for Securing the Wireless Sensor Networks9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.589-598, ⟨10.1007/978-3-642-35606-3_70⟩
Conference papers
hal-01551345v1
|
||
|
A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.10-23, ⟨10.1007/978-3-662-43826-8_2⟩
Conference papers
hal-01400917v1
|
||
|
Nibble-CRC for Underwater Acoustic Communication9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.550-558, ⟨10.1007/978-3-642-35606-3_65⟩
Conference papers
hal-01551338v1
|
||
|
Forward Secure Identity-Based Signature Scheme with RSA34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.314-327, ⟨10.1007/978-3-030-22312-0_22⟩
Conference papers
hal-03744294v1
|
||
|
Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.523-537, ⟨10.1007/978-3-319-58469-0_35⟩
Conference papers
hal-01648999v1
|