|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 271 occurrences of 156 keywords
|
|
|
Results
Found 272 publication records. Showing 272 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Olivier Savry, Florian Pebay-Peyroula, François Dehmas, Gérard Robert, Jacques Reverdy |
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 334-345, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ISO 14443, Tausworthe cell, RFID, smartcard, eavesdropping, RNG |
20 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers, pp. 188-202, 2006, Springer, 978-3-540-74461-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RSA, smartcard, Montgomery multiplication, crypto-coprocessor |
20 | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Silicon physical random functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 148-160, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
physical random function, unclonability, identification, smartcard, tamper resistance, physical security |
20 | Kimio Kuramitsu, Ken Sakamura |
Towards ubiquitous database in mobile commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiDE ![In: Proceedings of the Second ACM International Workshop on Data Engineering for Wireless and Mobile Access, May 20, 2001, Santa Barbara, California, USA, pp. 84-89, 2001, ACM. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
data model and querying for ubiquitous data, smartcard database, ubiquitous computing, mobile commerce |
20 | Kimio Kuramitsu, Tadashi Murakami, Hajime Matsuda, Ken Sakamura |
TTP: Secure ACID Transfer Protocol for Electronic Ticket between Personal Tamper-Proof Devices . ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 24th International Computer Software and Applications Conference (COMPSAC 2000), 25-28 October 2000, Taipei, Taiwan, pp. 87-92, 2000, IEEE Computer Society, 0-7695-0792-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
electronic transferable ticket, ACID transfer protocols and security, Electronic commerce, smartcard |
20 | Bob Briscoe, Ian Fairman |
Nark: receiver-based multicast non-repudiation and key management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings of the First ACM Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999, pp. 22-30, 1999, ACM, 1-58113-176-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail |
20 | Marcus Oestreicher |
Transactions in Java Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 291-298, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Transactions, Smartcard, Java Card |
13 | Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan 0002 |
An effective crypto-biometric system for secure email in wireless environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 241-245, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
bio-passphrase, biometric key, email security |
13 | Wojciech Mostowski, Erik Poll, Julien Schmaltz, Jan Tretmans, Ronny Wichers Schreur |
Model-Based Testing of Electronic Passports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMICS ![In: Formal Methods for Industrial Critical Systems, 14th International Workshop, FMICS 2009, Eindhoven, The Netherlands, November 2-3, 2009. Proceedings, pp. 207-209, 2009, Springer, 978-3-642-04569-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Thierry Lecomte |
Applying a Formal Method in Industry: A 15-Year Trajectory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMICS ![In: Formal Methods for Industrial Critical Systems, 14th International Workshop, FMICS 2009, Eindhoven, The Netherlands, November 2-3, 2009. Proceedings, pp. 26-34, 2009, Springer, 978-3-642-04569-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
B formal method, deployment, industry |
13 | Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur |
Wirelessly Pickpocketing a Mifare Classic Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 3-15, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Corinne S. Irwin, Dennis C. Taylor |
Identity, credential, and access management at NASA, from Zachman to attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 1-14, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS) |
13 | Song Sun, Zijun Yan, Joseph Zambreno |
Experiments in attacking FPGA-based embedded systems using differential power analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2008 IEEE International Conference on Electro/Information Technology, EIT 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008, pp. 7-12, 2008, IEEE, 978-1-4244-2030-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Online/Offline Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 247-261, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Gerald Madlmayr, Oliver Dillinger, Josef Langer, Josef Scharinger |
Management of Multiple Cards in NFC-Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 149-161, 2008, Springer, 978-3-540-85892-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff |
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 191-205, 2008, Springer, 978-3-540-85892-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Fabio Massacci, Frank Piessens, Ida Sri Rejeki Siahaan |
Security-By-Contract for the Future Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIS ![In: Future Internet - FIS 2008, First Future Internet Symposium, FIS 2008, Vienna, Austria, September 29-30, 2008, Revised Selected Papers, pp. 29-43, 2008, Springer, 978-3-642-00984-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Scott D. Mainwaring, Wendy March, Bill Maurer |
From meiwaku to tokushita!: lessons for digital money design from japan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008, pp. 21-24, 2008, ACM, 978-1-60558-011-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital money, e-wallets, ubiquitous computing, ethnography, mobile payment, japan, e-cash |
13 | Gerald Madlmayr, Peter Kleebauer, Josef Langer, Josef Scharinger |
Secure Communication between Web Browsers and NFC Targets by the Example of an e-Ticketing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 9th International Conference, EC-Web 2008, Turin, Italy, September 3-4, 2008, Proceedings, pp. 1-10, 2008, Springer, 978-3-540-85716-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola |
Secure Failure Detection in TrustedPals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 9th International Symposium, SSS 2007, Paris, France, November 14-16, 2007, Proceedings, pp. 173-188, 2007, Springer, 978-3-540-76626-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Frédéric Amiel, Benoit Feix, Karine Villegas |
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 110-125, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
arithmetic coprocessors, reverse engineering, Public key cryptography, side-channel analysis, exponentiation |
13 | Umut Topkara, Mikhail J. Atallah, Mercan Topkara |
Passwords decay, words endure: secure and re-usable multiple password mnemonics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 292-299, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
mnemonic sentence, usability, authentication, natural language processing, passwords |
13 | Augusto Jun Devegili, Michael Scott, Ricardo Dahab |
Implementing Cryptographic Pairings over Barreto-Naehrig Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 197-207, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Feike W. Dillema, Simone Lupetti |
Rendezvous-based access control for medical records in the pre-hospital environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HealthNet ![In: Proceedings of the 1st ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments, HealthNet 2007, San Juan, Puerto Rico, June 11, 2007, pp. 1-6, 2007, ACM, 978-1-59593-767-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
aggregation threat, pre-hospital environment, security model, capabilities, electronic health records |
13 | MohammadReza Gholami, Seyyed Mohsen Hashemi, Mohammad Teshnehlab |
A Framework for Secure Message Transmission Using SMS-Based VPN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONFENIS (1) ![In: Research and Practical Issues of Enterprise Information Systems II, Volume 1, IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007), October 14-16, 2007, Beijing, China, pp. 503-511, 2007, Springer, 978-0-387-75901-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, E-commerce, E-business, EAI, EDI |
13 | Luis A. Plana, Doug A. Edwards, Sam Taylor, Luis A. Tarazona, Andrew Bardsley |
Performance-driven syntax-directed synthesis of asynchronous processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2007 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2007, Salzburg, Austria, September 30 - October 3, 2007, pp. 43-47, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
handshake components, syntax-directed synthesis, asynchronous circuits |
13 | Jinyoung Moon, Jongyoul Park, Eui Hyun Paik |
JavaCard-based Two-Level User Key Management for IP Conditional Access Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia, pp. 72-76, 2007, IEEE, 1-4244-1230-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Eddie Jaffuel, Bruno Legeard |
LEIRIOS Test Generator: Automated Test Generation from B Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
B ![In: B 2007: Formal Specification and Development in B, 7th International Conference of B Users, Besançon, France, January 17-19, 2007, Proceedings, pp. 277-280, 2007, Springer, 3-540-68760-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Alper Kanak, Ibrahim Sogukpinar |
Fingerprint Hardening with Randomly Selected Chaff Minutiae. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAIP ![In: Computer Analysis of Images and Patterns, 12th International Conference, CAIP 2007, Vienna, Austria, August 27-29, 2007, Proceedings, pp. 383-390, 2007, Springer, 978-3-540-74271-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Marina Blanton, Mikhail J. Atallah |
Succinct representation of flexible and privacy-preserving access rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 15(4), pp. 334-354, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy-preserving access rights, Flexible access rights, Compact representation |
13 | Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli |
Power Modeling of Precharged Address Bus and Application to Multi-bit DPA Attacks to DES Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 16th International Workshop, PATMOS 2006, Montpellier, France, September 13-15, 2006, Proceedings, pp. 593-602, 2006, Springer, 3-540-39094-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Pascal Urien, Mesmin Dandjinou |
Designing Smartcards for Emerging Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 165-178, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Martin Schaffer, Peter Schartner |
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 206-221, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Thomas Neubauer, Edgar R. Weippl, Stefan Biffl |
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 723-731, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Gilles Barthe, Tamara Rezk, David A. Naumann |
Deriving an Information Flow Checker and Certifying Compiler for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 230-242, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng |
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 82-91, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Richard Banach |
Retrenchment Tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEFM ![In: Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006), 11-15 September 2006, Pune, India, pp. 259, 2006, IEEE Computer Society, 0-7695-2678-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Mikhail J. Atallah, Jiangtao Li 0001 |
Secure outsourcing of sequence comparisons . ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 4(4), pp. 277-287, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Secure outsourcing, Privacy, Edit distance, Secure multiparty computation, Sequence comparison |
13 | Paul D. Ezhilchelvan, Santosh K. Shrivastava |
A Family of Trusted Third Party Based Fair-Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(4), pp. 273-286, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Trusted Third Party (TTP), crash tolerance, security, distributed systems, smartcards, Fair exchange |
13 | Ningyi Xu, Shaohua Li, Wei Yu, Guanghui He, Hao Zhang, Fei Luo, Zucheng Zhou |
The design and implementation of a DVB receiving chip with PCI interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 2005 Conference on Asia South Pacific Design Automation, ASP-DAC 2005, Shanghai, China, January 18-21, 2005, pp. 15-16, 2005, ACM Press, 0-7803-8737-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Stefano Bistarelli, Francesco Santini 0001, Anna Vaccarelli |
An Asymmetric Fingerprint Matching Algorithm for Java Card™. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings, pp. 279-288, 2005, Springer, 3-540-27887-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Masayuki Terada, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura |
TENeT: A Framework for Distributed Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 3-17, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Wieland Fischer, Jean-Pierre Seifert |
High-Speed Modular Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 264-277, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Sedlaks algorithm, Computer arithmetic, Modular multiplication, Implementation issues, Booth recoding |
13 | Gilles Barthe, Guillaume Dufay |
A Tool-Assisted Framework for Certified Bytecode Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, 7th International Conference, FASE 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004 Barcelona, Spain, March 29 - april 2, 2004, Proceedings, pp. 99-113, 2004, Springer, 3-540-21305-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Johannes Blömer, Jean-Pierre Seifert |
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 162-181, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Secure Banking, Smart Cards, AES, Fault Attacks, Implementation Issues |
13 | Bruce Christianson |
Where Have All the Protocols Gone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 1-2, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Deok-Gyu Lee, Im-Yeong Lee, Jong-Keun Ahn, Yong-Hae Kong |
The Illegal Copy Protection Using Hidden Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EurAsia-ICT ![In: EurAsia-ICT 2002: Information and Communication Technology, First EurAsian Conference, Shiraz, Iran, October 29-31, 2002, Proceedings, pp. 832-841, 2002, Springer, 3-540-00028-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Won Jay Song, Byung-Ha Ahn, Won Hee Kim |
Healthcare Information Systems Using Digital Signature and Synchronized Smart Cards via the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2002 International Symposium on Information Technology (ITCC 2002), 8-10 April 2002, Las Vegas, NV, USA, pp. 177-182, 2002, IEEE Computer Society, 0-7695-1506-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
13 | David von Oheimb, Volkmar Lotz |
Formal Security Analysis with Interacting State Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 212-228, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Robert Siegmund, Dietmar Müller 0001 |
A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 39th Design Automation Conference, DAC 2002, New Orleans, LA, USA, June 10-14, 2002, pp. 602-607, 2002, ACM, 1-58113-461-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
controller hardware synthesis, interface-based design, protocol specification |
13 | Gilles Barthe, Dilian Gurov, Marieke Huisman |
Compositional Verification of Secure Applet Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, 5th International Conference, FASE 2002, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2002, Grenoble, France, April 8-12, 2002, Proceedings, pp. 15-32, 2002, Springer, 3-540-43353-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Roger Kehr, Hendrik Mieves |
SIMspeak - Towards an Open and Secure Application Platform for GSM SIMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-smart ![In: Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, pp. 135-149, 2001, Springer, 3-540-42610-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves |
Personal Secure Booting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 130-144, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
13 | David May 0001, Henk L. Muller, Nigel P. Smart |
Non-deterministic Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 115-129, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
13 | David May 0001, Henk L. Muller, Nigel P. Smart |
Random Register Renaming to Foil DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 28-38, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 125-127, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Thomas S. Messerges |
Securing the AES Finalists Against Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 150-164, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Pieter H. Hartel, Eduard de Jong |
A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Java Card Workshop ![In: Java on Smart Cards: Programming and Security, First International Workshop, JavaCard 2000, Cannes, France, September 14, 2000, Revised Papers, pp. 52-72, 2000, Springer, 3-540-42167-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Juan A. Garay, Jessica Staddon, Avishai Wool |
Long-Lived Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 333-352, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Rita Mayer-Sommer |
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 78-92, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Thomas S. Messerges |
Using Second-Order Power Analysis to Attack DPA Resistant Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 238-251, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Neil Daswani, Dan Boneh |
Experimenting with Electronic Commerce on the PalmPilot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 1-16, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
PalmPilot, digital wallet, electronic commerce, personal digital assistants, electronic payment systems |
13 | Detlef Hühnlein |
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, pp. 147-162, 1999, Springer, 3-540-67185-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Roger Kehr, Joachim Posegga, Harald Vogt |
PCA: Jini-based Personal Card Assistant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQRE ![In: Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings, pp. 64-75, 1999, Springer, 3-540-66800-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Aviad Kipnis, Jacques Patarin, Louis Goubin |
Unbalanced Oil and Vinegar Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 206-222, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi |
NICE - New Ideal Coset Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 328-339, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
fast decryption, quadratic order, smart card implementation, public-key cryptosystem |
13 | Markus Jakobsson, David M'Raïhi |
Mix-Based Electronic Payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 157-173, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
13 | Adam L. Young, Moti Yung |
Sliding Encryption: A Cryptographic Tool for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 230-241, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
13 | Moni Naor, Benny Pinkas |
Visual Authentication and Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 322-336, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Authentication, identification, visual cryptography |
13 | Dan Craigen, Susan L. Gerhart, Ted Ralston |
Formal Methods Reality Check: Industrial Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 21(2), pp. 90-98, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
real-time systems, Formal methods, formal verification, safety-critical systems, industrial applications, validation and verification, technology assessment |
13 | Dan Craigen, Susan L. Gerhart, Ted Ralston |
Formal Methods Reality Check: Industrial Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FME ![In: FME '93: Industrial-Strength Formal Methods, First International Symposium of Formal Methods Europe, Odense, Denmark, April 19-23, 1993, Proceedings, pp. 250-267, 1993, Springer, 3-540-56662-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
13 | Ross J. Anderson |
UEPS - A Second Generation Electronic Wallet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 411-418, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #272 of 272 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3] |
|