Filter your results
- 7
- 1
- 1
- 8
- 1
- 9
- 2
- 1
- 2
- 1
- 3
- 9
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.123-138, ⟨10.1007/978-3-030-41702-4_8⟩
Conference papers
hal-03138010v1
|
||
|
How to Compartment Secrets13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.3-11, ⟨10.1007/978-3-030-41702-4_1⟩
Conference papers
hal-03173906v1
|
||
|
When Clocks Fail: On Critical Paths and Clock Faults9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers
emse-00505344v1
|
||
|
Information Security Theory and Practice: Securing the Internet of ThingsDavid Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books
hal-01098408v1
|
||
|
Can code polymorphism limit information leakage?5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers
hal-01110259v1
|
||
|
Secure Delegation of Elliptic-Curve Pairing9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.24-35, ⟨10.1007/978-3-642-12510-2_3⟩
Conference papers
hal-01056101v1
|
||
|
The Polynomial Composition Problem in (ℤ/nℤ)[X]9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.1-12, ⟨10.1007/978-3-642-12510-2_1⟩
Conference papers
hal-01056103v1
|
||
|
New Algorithmic Approaches to Point Constellation Recognition29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.80-90, ⟨10.1007/978-3-642-55415-5_7⟩
Conference papers
hal-01098401v2
|
||
|
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.109-128, ⟨10.1007/978-3-030-20074-9_9⟩
Conference papers
hal-02294610v1
|