The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WISTP"( http://dblp.L3S.de/Venues/WISTP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/wistp

Publication years (Num. hits)
2007 (21) 2008-2009 (24) 2010 (31) 2011 (29) 2012 (19) 2013-2014 (26) 2015 (19) 2016 (19) 2017-2018 (28) 2019 (16) 2020 (1)
Publication types (Num. hits)
inproceedings(220) proceedings(13)
Venues (Conferences, Journals, ...)
WISTP(233)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 87 occurrences of 67 keywords

Results
Found 233 publication records. Showing 233 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Maryline Laurent, Thanassis Giannetsos (eds.) Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings Search on Bibsonomy WISTP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Diana Maimut, George Teseleanu A Generic View on the Unified Zero-Knowledge Protocol and Its Applications. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké Towards a Context-Aware Security and Privacy as a Service in the Internet of Things. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh, Fengjun Zhou A Template-Based Method for the Generation of Attack Trees. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Simon Landry, Yanis Linge, Emmanuel Prouff Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando, Alessio Merlo Automated Security Analysis of IoT Software Updates. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hardik Gajera, Matthieu Giraud, David Gérault, Manik Lal Das, Pascal Lafourcade 0001 Verifiable and Private Oblivious Polynomial Evaluation. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Eva Gagliardi, Olivier Levillain Analysis of QUIC Session Establishment and Its Implementations. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michal Piskozub, Riccardo Spolaor, Ivan Martinovic CompactFlow: A Hybrid Binary Format for Network Flow Data. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thomas Trouchkine, Guillaume Bouffard, Jessy Clédière Fault Injection Characterization on Modern CPUs. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hao Cheng 0009, Daniel Dinu, Johann Großschädl, Peter B. Rønne, Peter Y. A. Ryan A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gaëlle Candel, Rémi Géraud-Stewart, David Naccache How to Compartment Secrets. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hafsa Assidi, El Mamoun Souidi Strong Designated Verifier Signature Based on the Rank Metric. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Chan Yeob Yeun (eds.) Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nada El Kassem, Luís Fiolhais, Paulo Martins 0002, Liqun Chen 0002, Leonel Sousa A Lattice-Based Enhanced Privacy ID. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Philipp Jakubeit, Albert Dercksen, Andreas Peter SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote Threat Analysis of Poisoning Attack Against Ethereum Blockchain. Search on Bibsonomy WISTP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Khaled Karray, Jean-Luc Danger, Sylvain Guilley, Moulay Abdelaziz Elaabid Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thulani Mashiane, Elmarie Kritzinger Cybersecurity Behaviour: A Conceptual Taxonomy. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Amandine Jambert Blockchain and the GDPR: A Data Protection Authority Point of View. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juan D. Parra Rodriguez A Generic Lightweight and Scalable Access Control Framework for IoT Gateways. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Soo-Kyung Eom, Hyang-Sook Lee, Seongan Lim On the Non-repudiation of Isogeny Based Signature Scheme. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Damien Vergnaud Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk). Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Muttukrishnan Rajarajan Detection of Bitcoin-Based Botnets Using a One-Class Classifier. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adam Janovsky, Jan Krhovjak, Vashek Matyas Bringing Kleptography to Real-World TLS. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gerhard P. Hancke 0002, Ernesto Damiani (eds.) Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis Remote Credential Management with Mutual Attestation for Trusted Execution Environments. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiroki Okada 0001, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto Linear Depth Integer-Wise Homomorphic Division. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohamed Sami Rakha, Fahim T. Imam, Thomas R. Dean Generating a Real-Time Constraint Engine for Network Protocols. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Etienne Tehrani, Jean-Luc Danger, Tarik Graba Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sankalp Ghatpande, Johann Großschädl, Zhe Liu 0001 A Family of Lightweight Twisted Edwards Curves for the Internet of Things. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Louis Cianciullo, Hossein Ghodosi Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sébanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet, Axel Legay How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pau Conejero-Alberola, M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hao Jiang, Ahmed Bouabdallah JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Öznur Kalkar, Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes Philanthropy on the Blockchain. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yonas Leguesse, Mark Vella, Joshua Ellul AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nektaria Kaloudi, Aikaterini Mitrokotsa Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough? Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette A Secure and Trusted Channel Protocol for UAVs Fleets. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ziya Alper Genç, Süleyman Kardas, Mehmet Sabir Kiraz Examination of a New Defense Mechanism: Honeywords. Search on Bibsonomy WISTP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fatma Al Maqbali, Chris J. Mitchell Password Generators: Old Ideas and New. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust Fault-Channel Watermarks. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ling Chen, Ting Yu 0001, Rada Chirkova Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy Towards Automatic Risk Analysis and Mitigation of Software Applications. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guillaume Barbu, Alberto Battistello Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hervé Chabanne, Julien Keuffer, Roch Lescuyer Delegating Biometric Authentication with the Sumcheck Protocol. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ishai Rosenberg, Ehud Gudes Attacking and Defending Dynamic Analysis System-Calls Based IDS. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmad Sabouri The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos Provable Network Activity for Protecting Users Against False Accusation. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia LAMP - Label-Based Access-Control for More Privacy in Online Social Networks. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet Runtime Code Polymorphism as a Protection Against Side Channel Attacks. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vassilios G. Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Hoang Nga Nguyen Combining Third Party Components Securely in Automotive Systems. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vlasta Stavova, Vashek Matyas, Mike Just Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kyriakos Stefanidis, Artemios G. Voyiatzis An HMM-Based Anomaly Detection Approach for SCADA Systems. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frank Morgner, Paul Bastian, Marc Fischlin Securing Transactions with the eIDAS Protocols. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sara Foresti, Javier López 0001 (eds.) Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ghada Arfaoui, Saïd Gharout, Jean-François Lalande, Jacques Traoré Practical and Privacy-Preserving TEE Migration. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou WSACd - A Usable Access Control Framework for Smart Home Devices. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masoud Narouei, Hassan Takabi Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Duc-Phong Le, Chik How Tan, Michael Tunstall Randomizing the Montgomery Powering Ladder. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Ioannis G. Askoxylakis Lightweight Password Hashing Scheme for Embedded Systems. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Neyire Deniz Sarier Private Minutia-Based Fingerprint Matching. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden How Current Android Malware Seeks to Evade Automated Code Analysis. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tassos Dimitriou, Ioannis Krontiris Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens Secure Resource Sharing for Embedded Protected Module Architectures. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qiao Hu, Lavinia Mihaela Dinca, Gerhard P. Hancke 0002 Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Miguel Morales-Sandoval, Arturo Diaz-Perez DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hoi Le Thi, Reihaneh Safavi-Naini, Asadullah Al Galib Secure Obfuscation of Authoring Style. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers On Linkability and Malleability in Self-blindable Credentials. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raja Naeem Akram, Sushil Jajodia (eds.) Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alejandro Calleja, Pedro Peris-Lopez, Juan E. Tapiador Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Radim Ostádal, Petr Svenda, Vashek Matyás On Secrecy Amplification Protocols. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Jaeger, Amir Azodi, Feng Cheng 0002, Christoph Meinel Normalizing Security Events with a Hierarchical Knowledge Base. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller Attack Tree Generation by Policy Invalidation. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Konstantinos Rantos, Konstantinos Fysarakis, Othonas Sultatos, Ioannis G. Askoxylakis Secure and Authenticated Access to LLN Resources Through Policy Constraints. Search on Bibsonomy WISTP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes CAN Bus Risk Analysis Revisit. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Raphael Spreitzer, Benoît Gérard Towards More Practical Time-Driven Cache Attacks. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo, Jan Willemson A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Raja Naeem Akram, Ryan K. L. Ko End-to-End Secure and Privacy Preserving Mobile Chat Application. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Baris Ege, Marin Golub S-box, SET, Match: A Toolbox for S-box Analysis. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guillaume Barbu, Christophe Giraud 0001 New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Timo Kasper, David F. Oswald, Christof Paar Sweet Dreams and Nightmares: Security in the Internet of Things. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ju-Sung Kang, Nayoung Kim, Wangho Ju, Okyeon Yi A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Naccache, Damien Sauveron (eds.) Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tanya Ignatenko, Milan Petkovic AU2EU: Privacy-Preserving Matching of DNA Sequences. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Konstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj Early DDoS Detection Based on Data Mining Techniques. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake A Pre-processing Composition for Secret Key Recovery on Android Smartphone. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Delphine Christin, Franziska Engelmann, Matthias Hollick Usable Privacy for Mobile Sensing Applications. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi Orthogonal Direct Sum Masking - A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou Policy-Based Access Control for Body Sensor Networks. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1André Zúquete, Helder Gomes, Claudio Teixeira Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daisuke Moriyama, Miyako Ohkubo, Shin'ichiro Matsuo A Forward Privacy Model for RFID Authentication Protocols. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 233 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license