|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 271 occurrences of 156 keywords
|
|
|
Results
Found 272 publication records. Showing 272 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Olivier Savry, Florian Pebay-Peyroula, François Dehmas, Gérard Robert, Jacques Reverdy |
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? |
CHES |
2007 |
DBLP DOI BibTeX RDF |
ISO 14443, Tausworthe cell, RFID, smartcard, eavesdropping, RNG |
20 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
RSA, smartcard, Montgomery multiplication, crypto-coprocessor |
20 | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Silicon physical random functions. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
physical random function, unclonability, identification, smartcard, tamper resistance, physical security |
20 | Kimio Kuramitsu, Ken Sakamura |
Towards ubiquitous database in mobile commerce. |
MobiDE |
2001 |
DBLP DOI BibTeX RDF |
data model and querying for ubiquitous data, smartcard database, ubiquitous computing, mobile commerce |
20 | Kimio Kuramitsu, Tadashi Murakami, Hajime Matsuda, Ken Sakamura |
TTP: Secure ACID Transfer Protocol for Electronic Ticket between Personal Tamper-Proof Devices . |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
electronic transferable ticket, ACID transfer protocols and security, Electronic commerce, smartcard |
20 | Bob Briscoe, Ian Fairman |
Nark: receiver-based multicast non-repudiation and key management. |
EC |
1999 |
DBLP DOI BibTeX RDF |
Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail |
20 | Marcus Oestreicher |
Transactions in Java Card. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Transactions, Smartcard, Java Card |
13 | Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan 0002 |
An effective crypto-biometric system for secure email in wireless environment. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
bio-passphrase, biometric key, email security |
13 | Wojciech Mostowski, Erik Poll, Julien Schmaltz, Jan Tretmans, Ronny Wichers Schreur |
Model-Based Testing of Electronic Passports. |
FMICS |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Thierry Lecomte |
Applying a Formal Method in Industry: A 15-Year Trajectory. |
FMICS |
2009 |
DBLP DOI BibTeX RDF |
B formal method, deployment, industry |
13 | Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur |
Wirelessly Pickpocketing a Mifare Classic Card. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Corinne S. Irwin, Dennis C. Taylor |
Identity, credential, and access management at NASA, from Zachman to attributes. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS) |
13 | Song Sun, Zijun Yan, Joseph Zambreno |
Experiments in attacking FPGA-based embedded systems using differential power analysis. |
EIT |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Online/Offline Encryption. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Gerald Madlmayr, Oliver Dillinger, Josef Langer, Josef Scharinger |
Management of Multiple Cards in NFC-Devices. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff |
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Fabio Massacci, Frank Piessens, Ida Sri Rejeki Siahaan |
Security-By-Contract for the Future Internet. |
FIS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Scott D. Mainwaring, Wendy March, Bill Maurer |
From meiwaku to tokushita!: lessons for digital money design from japan. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
digital money, e-wallets, ubiquitous computing, ethnography, mobile payment, japan, e-cash |
13 | Gerald Madlmayr, Peter Kleebauer, Josef Langer, Josef Scharinger |
Secure Communication between Web Browsers and NFC Targets by the Example of an e-Ticketing System. |
EC-Web |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola |
Secure Failure Detection in TrustedPals. |
SSS |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Frédéric Amiel, Benoit Feix, Karine Villegas |
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
arithmetic coprocessors, reverse engineering, Public key cryptography, side-channel analysis, exponentiation |
13 | Umut Topkara, Mikhail J. Atallah, Mercan Topkara |
Passwords decay, words endure: secure and re-usable multiple password mnemonics. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
mnemonic sentence, usability, authentication, natural language processing, passwords |
13 | Augusto Jun Devegili, Michael Scott, Ricardo Dahab |
Implementing Cryptographic Pairings over Barreto-Naehrig Curves. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Feike W. Dillema, Simone Lupetti |
Rendezvous-based access control for medical records in the pre-hospital environment. |
HealthNet |
2007 |
DBLP DOI BibTeX RDF |
aggregation threat, pre-hospital environment, security model, capabilities, electronic health records |
13 | MohammadReza Gholami, Seyyed Mohsen Hashemi, Mohammad Teshnehlab |
A Framework for Secure Message Transmission Using SMS-Based VPN. |
CONFENIS (1) |
2007 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, E-commerce, E-business, EAI, EDI |
13 | Luis A. Plana, Doug A. Edwards, Sam Taylor, Luis A. Tarazona, Andrew Bardsley |
Performance-driven syntax-directed synthesis of asynchronous processors. |
CASES |
2007 |
DBLP DOI BibTeX RDF |
handshake components, syntax-directed synthesis, asynchronous circuits |
13 | Jinyoung Moon, Jongyoul Park, Eui Hyun Paik |
JavaCard-based Two-Level User Key Management for IP Conditional Access Systems. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Eddie Jaffuel, Bruno Legeard |
LEIRIOS Test Generator: Automated Test Generation from B Models. |
B |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Alper Kanak, Ibrahim Sogukpinar |
Fingerprint Hardening with Randomly Selected Chaff Minutiae. |
CAIP |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Marina Blanton, Mikhail J. Atallah |
Succinct representation of flexible and privacy-preserving access rights. |
VLDB J. |
2006 |
DBLP DOI BibTeX RDF |
Privacy-preserving access rights, Flexible access rights, Compact representation |
13 | Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli |
Power Modeling of Precharged Address Bus and Application to Multi-bit DPA Attacks to DES Algorithm. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Pascal Urien, Mesmin Dandjinou |
Designing Smartcards for Emerging Wireless Networks. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Martin Schaffer, Peter Schartner |
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Thomas Neubauer, Edgar R. Weippl, Stefan Biffl |
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Gilles Barthe, Tamara Rezk, David A. Naumann |
Deriving an Information Flow Checker and Certifying Compiler for Java. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng |
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Richard Banach |
Retrenchment Tutorial. |
SEFM |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Mikhail J. Atallah, Jiangtao Li 0001 |
Secure outsourcing of sequence comparisons . |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Secure outsourcing, Privacy, Edit distance, Secure multiparty computation, Sequence comparison |
13 | Paul D. Ezhilchelvan, Santosh K. Shrivastava |
A Family of Trusted Third Party Based Fair-Exchange Protocols. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Trusted Third Party (TTP), crash tolerance, security, distributed systems, smartcards, Fair exchange |
13 | Ningyi Xu, Shaohua Li, Wei Yu, Guanghui He, Hao Zhang, Fei Luo, Zucheng Zhou |
The design and implementation of a DVB receiving chip with PCI interface. |
ASP-DAC |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Stefano Bistarelli, Francesco Santini 0001, Anna Vaccarelli |
An Asymmetric Fingerprint Matching Algorithm for Java Card™. |
AVBPA |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Masayuki Terada, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura |
TENeT: A Framework for Distributed Smartcards. |
SPC |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Wieland Fischer, Jean-Pierre Seifert |
High-Speed Modular Multiplication. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Sedlaks algorithm, Computer arithmetic, Modular multiplication, Implementation issues, Booth recoding |
13 | Gilles Barthe, Guillaume Dufay |
A Tool-Assisted Framework for Certified Bytecode Verification. |
FASE |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Johannes Blömer, Jean-Pierre Seifert |
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Secure Banking, Smart Cards, AES, Fault Attacks, Implementation Issues |
13 | Bruce Christianson |
Where Have All the Protocols Gone? |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Deok-Gyu Lee, Im-Yeong Lee, Jong-Keun Ahn, Yong-Hae Kong |
The Illegal Copy Protection Using Hidden Agent. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Won Jay Song, Byung-Ha Ahn, Won Hee Kim |
Healthcare Information Systems Using Digital Signature and Synchronized Smart Cards via the Internet. |
ITCC |
2002 |
DBLP DOI BibTeX RDF |
|
13 | David von Oheimb, Volkmar Lotz |
Formal Security Analysis with Interacting State Machines. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Robert Siegmund, Dietmar Müller 0001 |
A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications. |
DAC |
2002 |
DBLP DOI BibTeX RDF |
controller hardware synthesis, interface-based design, protocol specification |
13 | Gilles Barthe, Dilian Gurov, Marieke Huisman |
Compositional Verification of Secure Applet Interactions. |
FASE |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Roger Kehr, Hendrik Mieves |
SIMspeak - Towards an Open and Secure Application Platform for GSM SIMs. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves |
Personal Secure Booting. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
13 | David May 0001, Henk L. Muller, Nigel P. Smart |
Non-deterministic Processors. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
13 | David May 0001, Henk L. Muller, Nigel P. Smart |
Random Register Renaming to Foil DPA. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Thomas S. Messerges |
Securing the AES Finalists Against Power Analysis Attacks. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Pieter H. Hartel, Eduard de Jong |
A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations. |
Java Card Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Juan A. Garay, Jessica Staddon, Avishai Wool |
Long-Lived Broadcast Encryption. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Rita Mayer-Sommer |
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Thomas S. Messerges |
Using Second-Order Power Analysis to Attack DPA Resistant Software. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Neil Daswani, Dan Boneh |
Experimenting with Electronic Commerce on the PalmPilot. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
PalmPilot, digital wallet, electronic commerce, personal digital assistants, electronic payment systems |
13 | Detlef Hühnlein |
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Roger Kehr, Joachim Posegga, Harald Vogt |
PCA: Jini-based Personal Card Assistant. |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Aviad Kipnis, Jacques Patarin, Louis Goubin |
Unbalanced Oil and Vinegar Signature Schemes. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi |
NICE - New Ideal Coset Encryption. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
fast decryption, quadratic order, smart card implementation, public-key cryptosystem |
13 | Markus Jakobsson, David M'Raïhi |
Mix-Based Electronic Payments. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
13 | Adam L. Young, Moti Yung |
Sliding Encryption: A Cryptographic Tool for Mobile Agents. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
13 | Moni Naor, Benny Pinkas |
Visual Authentication and Identification. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Authentication, identification, visual cryptography |
13 | Dan Craigen, Susan L. Gerhart, Ted Ralston |
Formal Methods Reality Check: Industrial Usage. |
IEEE Trans. Software Eng. |
1995 |
DBLP DOI BibTeX RDF |
real-time systems, Formal methods, formal verification, safety-critical systems, industrial applications, validation and verification, technology assessment |
13 | Dan Craigen, Susan L. Gerhart, Ted Ralston |
Formal Methods Reality Check: Industrial Usage. |
FME |
1993 |
DBLP DOI BibTeX RDF |
|
13 | Ross J. Anderson |
UEPS - A Second Generation Electronic Wallet. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #272 of 272 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3] |
|