Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Maryline Laurent, Thanassis Giannetsos (eds.) |
Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![Springer, 978-3-030-41701-7 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Diana Maimut, George Teseleanu |
A Generic View on the Unified Zero-Knowledge Protocol and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 32-46, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké |
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 240-252, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh, Fengjun Zhou |
A Template-Based Method for the Generation of Attack Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 155-165, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Simon Landry, Yanis Linge, Emmanuel Prouff |
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 66-84, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando, Alessio Merlo |
Automated Security Analysis of IoT Software Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 223-239, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hardik Gajera, Matthieu Giraud, David Gérault, Manik Lal Das, Pascal Lafourcade 0001 |
Verifiable and Private Oblivious Polynomial Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 49-65, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Eva Gagliardi, Olivier Levillain |
Analysis of QUIC Session Establishment and Its Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 169-184, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Michal Piskozub, Riccardo Spolaor, Ivan Martinovic |
CompactFlow: A Hybrid Binary Format for Network Flow Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 185-201, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Trouchkine, Guillaume Bouffard, Jessy Clédière |
Fault Injection Characterization on Modern CPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 123-138, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hao Cheng 0009, Daniel Dinu, Johann Großschädl, Peter B. Rønne, Peter Y. A. Ryan |
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 103-119, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Gaëlle Candel, Rémi Géraud-Stewart, David Naccache |
How to Compartment Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 3-11, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hafsa Assidi, El Mamoun Souidi |
Strong Designated Verifier Signature Based on the Rank Metric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 85-102, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Blazy, Chan Yeob Yeun (eds.) |
Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![Springer, 978-3-030-20073-2 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nada El Kassem, Luís Fiolhais, Paulo Martins 0002, Liqun Chen 0002, Leonel Sousa |
A Lattice-Based Enhanced Privacy ID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 15-31, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Philipp Jakubeit, Albert Dercksen, Andreas Peter |
SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 202-219, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote |
Threat Analysis of Poisoning Attack Against Ethereum Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings, pp. 139-154, 2019, Springer, 978-3-030-41701-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Karray, Jean-Luc Danger, Sylvain Guilley, Moulay Abdelaziz Elaabid |
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 109-128, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis |
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 129-144, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Thulani Mashiane, Elmarie Kritzinger |
Cybersecurity Behaviour: A Conceptual Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 147-156, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Amandine Jambert |
Blockchain and the GDPR: A Data Protection Authority Point of View. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 3-6, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Juan D. Parra Rodriguez |
A Generic Lightweight and Scalable Access Control Framework for IoT Gateways. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 207-222, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Soo-Kyung Eom, Hyang-Sook Lee, Seongan Lim |
On the Non-repudiation of Isogeny Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 63-77, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Damien Vergnaud |
Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 7-11, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Muttukrishnan Rajarajan |
Detection of Bitcoin-Based Botnets Using a One-Class Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 174-189, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Adam Janovsky, Jan Krhovjak, Vashek Matyas |
Bringing Kleptography to Real-World TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 15-27, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Gerhard P. Hancke 0002, Ernesto Damiani (eds.) |
Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![Springer, 978-3-319-93523-2 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
Remote Credential Management with Mutual Attestation for Trusted Execution Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 157-173, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Okada 0001, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto |
Linear Depth Integer-Wise Homomorphic Division. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 91-106, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Sami Rakha, Fahim T. Imam, Thomas R. Dean |
Generating a Real-Time Constraint Engine for Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 44-60, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Etienne Tehrani, Jean-Luc Danger, Tarik Graba |
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 28-43, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sankalp Ghatpande, Johann Großschädl, Zhe Liu 0001 |
A Family of Lightweight Twisted Edwards Curves for the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 193-206, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Louis Cianciullo, Hossein Ghodosi |
Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 78-90, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sébanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet, Axel Legay |
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 93-109, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello |
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 41-55, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pau Conejero-Alberola, M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila |
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 165-176, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh |
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 113-129, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hao Jiang, Ahmed Bouabdallah |
JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 56-72, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Öznur Kalkar, Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol |
A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 155-164, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes |
Philanthropy on the Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 25-38, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yonas Leguesse, Mark Vella, Joshua Ellul |
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 140-152, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 75-92, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nektaria Kaloudi, Aikaterini Mitrokotsa |
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 177-188, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette |
A Secure and Trusted Channel Protocol for UAVs Fleets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 3-24, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ziya Alper Genç, Süleyman Kardas, Mehmet Sabir Kiraz |
Examination of a New Defense Mechanism: Honeywords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings, pp. 130-139, 2017, Springer, 978-3-319-93523-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fatma Al Maqbali, Chris J. Mitchell |
Password Generators: Old Ideas and New. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 245-253, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust |
Fault-Channel Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 204-219, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ling Chen, Ting Yu 0001, Rada Chirkova |
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 187-203, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy |
Towards Automatic Risk Analysis and Mitigation of Software Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 120-135, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Barbu, Alberto Battistello |
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 153-168, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Chabanne, Julien Keuffer, Roch Lescuyer |
Delegating Biometric Authentication with the Sumcheck Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 236-244, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ishai Rosenberg, Ehud Gudes |
Attacking and Defending Dynamic Analysis System-Calls Based IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 103-119, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Sabouri |
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 223-235, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos |
Provable Network Activity for Protecting Users Against False Accusation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 254-261, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia |
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 171-186, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet |
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 136-152, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens |
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 53-69, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vassilios G. Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis |
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 70-84, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent |
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 19-34, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Hoang Nga Nguyen |
Combining Third Party Components Securely in Automotive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 262-269, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vlasta Stavova, Vashek Matyas, Mike Just |
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 35-50, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kyriakos Stefanidis, Artemios G. Voyiatzis |
An HMM-Based Anomaly Detection Approach for SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 85-99, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Frank Morgner, Paul Bastian, Marc Fischlin |
Securing Transactions with the eIDAS Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 3-18, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sara Foresti, Javier López 0001 (eds.) |
Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![Springer, 978-3-319-45930-1 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ghada Arfaoui, Saïd Gharout, Jean-François Lalande, Jacques Traoré |
Practical and Privacy-Preserving TEE Migration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 153-168, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou |
WSACd - A Usable Access Control Framework for Smart Home Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 120-133, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Masoud Narouei, Hassan Takabi |
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 137-152, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Duc-Phong Le, Chik How Tan, Michael Tunstall |
Randomizing the Montgomery Powering Ladder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 169-184, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Ioannis G. Askoxylakis |
Lightweight Password Hashing Scheme for Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 260-270, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Neyire Deniz Sarier |
Private Minutia-Based Fingerprint Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 52-67, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden |
How Current Android Malware Seeks to Evade Automated Code Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 187-202, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tassos Dimitriou, Ioannis Krontiris |
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 20-35, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens |
Secure Resource Sharing for Embedded Protected Module Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 71-87, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qiao Hu, Lavinia Mihaela Dinca, Gerhard P. Hancke 0002 |
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 219-234, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Morales-Sandoval, Arturo Diaz-Perez |
DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 104-119, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hoi Le Thi, Reihaneh Safavi-Naini, Asadullah Al Galib |
Secure Obfuscation of Authoring Style. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 88-103, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers |
On Linkability and Malleability in Self-blindable Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 203-218, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Raja Naeem Akram, Sushil Jajodia (eds.) |
Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![Springer, 978-3-319-24017-6 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alejandro Calleja, Pedro Peris-Lopez, Juan E. Tapiador |
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 36-51, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Radim Ostádal, Petr Svenda, Vashek Matyás |
On Secrecy Amplification Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 3-19, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David Jaeger, Amir Azodi, Feng Cheng 0002, Christoph Meinel |
Normalizing Security Events with a Hierarchical Knowledge Base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 237-248, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller |
Attack Tree Generation by Policy Invalidation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 249-259, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Konstantinos Rantos, Konstantinos Fysarakis, Othonas Sultatos, Ioannis G. Askoxylakis |
Secure and Authenticated Access to LLN Resources Through Policy Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, pp. 271-280, 2015, Springer, 978-3-319-24017-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes |
CAN Bus Risk Analysis Revisit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 170-179, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Spreitzer, Benoît Gérard |
Towards More Practical Time-Driven Cache Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 24-39, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo, Jan Willemson |
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 108-123, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Raja Naeem Akram, Ryan K. L. Ko |
End-to-End Secure and Privacy Preserving Mobile Chat Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 124-139, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Baris Ege, Marin Golub |
S-box, SET, Match: A Toolbox for S-box Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 140-149, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Barbu, Christophe Giraud 0001 |
New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 57-75, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Timo Kasper, David F. Oswald, Christof Paar |
Sweet Dreams and Nightmares: Security in the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 1-9, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ju-Sung Kang, Nayoung Kim, Wangho Ju, Okyeon Yi |
A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 10-23, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Naccache, Damien Sauveron (eds.) |
Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![Springer, 978-3-662-43825-1 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tanya Ignatenko, Milan Petkovic |
AU2EU: Privacy-Preserving Matching of DNA Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 180-189, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Konstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj |
Early DDoS Detection Based on Data Mining Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 190-199, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake |
A Pre-processing Composition for Secret Key Recovery on Android Smartphone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 76-91, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Delphine Christin, Franziska Engelmann, Matthias Hollick |
Usable Privacy for Mobile Sensing Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 92-107, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi |
Orthogonal Direct Sum Masking - A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 40-56, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou |
Policy-Based Access Control for Body Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 150-159, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | André Zúquete, Helder Gomes, Claudio Teixeira |
Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 160-169, 2014, Springer, 978-3-662-43825-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Moriyama, Miyako Ohkubo, Shin'ichiro Matsuo |
A Forward Privacy Model for RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings, pp. 98-111, 2013, Springer, 978-3-642-38529-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|