The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WISTP"( http://dblp.L3S.de/Venues/WISTP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/wistp

Publication years (Num. hits)
2007 (21) 2008-2009 (24) 2010 (31) 2011 (29) 2012 (19) 2013-2014 (26) 2015 (19) 2016 (19) 2017-2018 (28) 2019 (16) 2020 (1)
Publication types (Num. hits)
inproceedings(220) proceedings(13)
Venues (Conferences, Journals, ...)
WISTP(233)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 87 occurrences of 67 keywords

Results
Found 233 publication records. Showing 233 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Simon Hoerder, Kimmo Järvinen 0001, Daniel Page On Secure Embedded Token Design. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Lackner, Reinhard Berlach, Wolfgang Raschke, Reinhold Weiss, Christian Steger A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kun Peng, Matt Henricksen Multiplicative Homomorphic E-Auction with Formally Provable Security. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Panagiotis Ilia, George C. Oikonomou, Theo Tryfonas Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lorenzo Cavallaro, Dieter Gollmann (eds.) Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Henrich Christopher Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer Malleable Signatures for Resource Constrained Platforms. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Max Günther, Bernd Borchert Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pierre Dusart, Sinaly Traoré Lightweight Authentication Protocol for Low-Cost RFID Tags. Search on Bibsonomy WISTP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi Another Fallen Hash-Based RFID Authentication Protocol. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier HiPoLDS: A Security Policy Language for Distributed Systems. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chaya Ganesh, C. Pandu Rangan Optimal Parameters for Efficient Two-Party Computation Protocols. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake Privacy Preservation of User History Graph. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nezar Nassr, Eric Steegmans ROAC: A Role-Oriented Access Control Model. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dieter Gollmann Veracity, Plausibility, and Reputation. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang 0135 Privacy Preserving Social Network Publication on Bipartite Graphs. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Johann Großschädl, Dan Page, Stefan Tillich Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1G. Kirubavathi Venkatesh, R. Anitha Nadarajan HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Delphine Christin, Pablo Sánchez López, Andreas Reinhardt 0001, Matthias Hollick, Michaela Kauer Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens Recent Developments in Low-Level Software Security. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga (eds.) Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci Impossible Differential Cryptanalysis of Reduced-Round LBlock. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rachid El Bansarkhani, Mohammed Meziani An Efficient Lattice-Based Secret Sharing Construction. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fanbao Liu, Tao Xie How to Break EAP-MD5. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jens-Matthias Bohli, Wenting Li, Jan Seedorf Assisting Server for Secure Multi-Party Computation. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paul Kearney Towards a C2I Platform for Combating the Cyber-Threat. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Theodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou STORM - Collaborative Security Management Environment. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jingyu Hua, Kouichi Sakurai A SMS-Based Mobile Botnet Using Flooding Algorithm. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Antonios Gouglidis, Ioannis Mavridis Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Antoine Amarilli, Sascha Müller 0003, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall Can Code Polymorphism Limit Information Leakage? Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Claudio A. Ardagna, Jianying Zhou 0001 (eds.) Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Andreas Noack Trust Agreement in Wireless Mesh Networks. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan A Comparison of Post-Processing Techniques for Biased Random Number Generators. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chen Bangdao, A. W. Roscoe 0001 Mobile Electronic Identity: Securing Payment on Mobile Phones. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger Leakage Squeezing Countermeasure against High-Order Attacks. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Bertram Poettering Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia Information Leakage Discovery Techniques to Enhance Secure Chip Design. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kun Peng Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann AES Variants Secure against Related-Key Differential and Boomerang Attacks. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Reine Lundin, Stefan Lindskog Entropy of Selectively Encrypted Strings. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chunhua Chen 0002, Chris J. Mitchell, Shaohua Tang SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Savvas Mousionis, Alex Vakaloudis, Constantinos S. Hilas A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger Privacy Protection for Smartphones: An Ontology-Based Firewall. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada Practical Attacks on HB and HB+ Protocols. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin Formal Analysis of Security Metrics and Risk. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg Privacy Respecting Targeted Advertising for Social Networks. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zheng Gong, Marc X. Makkes Hardware Trojan Side-Channels Based on Physical Unclonable Functions. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Manuel San Pedro, Mate Soos, Sylvain Guilley FIRE: Fault Injection for Reverse Engineering. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Luigi Catuogno, Clemente Galdi On the Security of a Two-Factor Authentication Scheme. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Falko Strenzke A Smart Card Implementation of the McEliece PKC. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexandre Venelli Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs 0002 Trust in Peer-to-Peer Content Distribution Protocols. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dai Yamamoto, Kouichi Itoh, Jun Yajima A Very Compact Hardware Implementation of the KASUMI Block Cipher. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan Evaluation Metrics of Physical Non-invasive Security. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens Efficient and Effective Buffer Overflow Protection on ARM Processors. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Qussai Yaseen, Brajendra Panda Predicting and Preventing Insider Threat in Relational Database Systems. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Igor Ruiz-Agundez, Yoseba K. Penya, Pablo García Bringas Fraud Detection for Voice over IP Services on Next-Generation Networks. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík Random Number Generation Based on Fingerprints. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Braun, Ulrike Meyer, Susanne Wetzel Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonathan Hart, Konstantinos Markantonakis, Keith Mayes Website Credential Storage and Two-Factor Web Authentication with a Java SIM. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jaap-Henk Hoepman, Rieks Joosten Practical Schemes for Privacy and Security Enhanced RFID. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ronald Kainda, Ivan Flechais, A. W. Roscoe 0001 Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Giovanni Russello, Enrico Scalavino Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nitesh B. Guinde, Sotirios G. Ziavras Novel FPGA-Based Signature Matching for Deep Packet Inspection. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Heiko Rossnagel The Market Failure of Anonymity Services. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti Proxy Smart Card Systems. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xianghan Zheng, Vladimir A. Oleshchuk The Design of Secure and Efficient P2PSIP Communication Systems. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marián Novotný Design and Analysis of a Generalized Canvas Protocol. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Werner Backes, Jared Cordasco MoteAODV - An AODV Implementation for TinyOS 2.0. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sergio Sánchez García, Ana Gómez Oliva Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Neyire Deniz Sarier Generic Constructions of Biometric Identity Based Encryption Systems. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Achim D. Brucker, Helmut Petritsch, Stefan G. Weber Attribute-Based Encryption with Break-Glass. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ulrich Rührmair, Qingqing Chen 0004, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba Towards Electrical, Integrated Implementations of SIMPL Systems. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron (eds.) Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole Security Analysis of Mobile Phones Used as OTP Generators. Search on Bibsonomy WISTP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau PKIX Certificate Status in Hybrid MANETs. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hybrid MANET, Certification, Risk, Public Key Infrastructure, Revocation
1Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Olivier Heen, Gilles Guette, Thomas Genet On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ton van Deursen, Sasa Radomirovic Algebraic Attacks on RFID Protocols. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, Formal verification, security protocols, attacks, algebraic methods
1Hendrik Tews, Bart Jacobs 0001 Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF selective disclosure, blinded issuing, performance, Java Card
1Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater (eds.) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima Privacy-Aware Location Database Service for Granular Queries. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy, Location-based services, k-anonymity
1Keith M. Martin, Maura B. Paterson Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF one-dimensional networks, wireless sensor networks, key management
1Helen Balinsky, Edward McDonnell, Liqun Chen 0002, Keith A. Harrison Anti-counterfeiting Using Memory Spots. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF memory spot, anti-counterfeiting, package authentication, RFID
1Pierre Paradinas, Julien Cordry, Samia Bouzefrane 0001 Measurement Analysis When Benchmarking Java Card Platforms. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Performance, Benchmark, Java Card
1J. A. M. Naranjo, Juan Antonio López-Ramos, Leocadio G. Casado Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF peer-to-peer networks, secret sharing, digital rights management, key distribution, Conditional access
1Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code passing, collusion attack, Mobile agent security, malicious hosts
Displaying result #101 - #200 of 233 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license