Search dblp for Publications

export results for "stream:streams/conf/wistp:"

 download as .bib file

@proceedings{DBLP:conf/wistp/2019,
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-41702-4},
  doi          = {10.1007/978-3-030-41702-4},
  isbn         = {978-3-030-41701-7},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AssidiS19,
  author       = {Hafsa Assidi and
                  El Mamoun Souidi},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Strong Designated Verifier Signature Based on the Rank Metric},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_6},
  doi          = {10.1007/978-3-030-41702-4\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AssidiS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BryansLNSSZ19,
  author       = {Jeremy W. Bryans and
                  Lin Shen Liew and
                  Hoang Nga Nguyen and
                  Giedre Sabaliauskaite and
                  Siraj A. Shaikh and
                  Fengjun Zhou},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {A Template-Based Method for the Generation of Attack Trees},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {155--165},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_10},
  doi          = {10.1007/978-3-030-41702-4\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BryansLNSSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CandelGN19,
  author       = {Ga{\"{e}}lle Candel and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {How to Compartment Secrets},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {3--11},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_1},
  doi          = {10.1007/978-3-030-41702-4\_1},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/CandelGN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChengDGRR19,
  author       = {Hao Cheng and
                  Daniel Dinu and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {A Lightweight Implementation of {NTRU} Prime for the Post-quantum
                  Internet of Things},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_7},
  doi          = {10.1007/978-3-030-41702-4\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ChengDGRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DejonCVAM19,
  author       = {Nicolas Dejon and
                  Davide Caputo and
                  Luca Verderame and
                  Alessandro Armando and
                  Alessio Merlo},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Automated Security Analysis of IoT Software Updates},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_14},
  doi          = {10.1007/978-3-030-41702-4\_14},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/DejonCVAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GagliardiL19,
  author       = {Eva Gagliardi and
                  Olivier Levillain},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Analysis of {QUIC} Session Establishment and Its Implementations},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_11},
  doi          = {10.1007/978-3-030-41702-4\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GagliardiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GajeraGGD019,
  author       = {Hardik Gajera and
                  Matthieu Giraud and
                  David G{\'{e}}rault and
                  Manik Lal Das and
                  Pascal Lafourcade},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Verifiable and Private Oblivious Polynomial Evaluation},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {49--65},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_4},
  doi          = {10.1007/978-3-030-41702-4\_4},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GajeraGGD019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JakubeitDP19,
  author       = {Philipp Jakubeit and
                  Albert Dercksen and
                  Andreas Peter},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {{SSI-AWARE:} Self-sovereign Identity Authenticated Backup with Auditing
                  by Remote Entities},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {202--219},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_13},
  doi          = {10.1007/978-3-030-41702-4\_13},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/JakubeitDP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KassemF0CS19,
  author       = {Nada El Kassem and
                  Lu{\'{\i}}s Fiolhais and
                  Paulo Martins and
                  Liqun Chen and
                  Leonel Sousa},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {A Lattice-Based Enhanced Privacy {ID}},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {15--31},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_2},
  doi          = {10.1007/978-3-030-41702-4\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KassemF0CS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LandryLP19,
  author       = {Simon Landry and
                  Yanis Linge and
                  Emmanuel Prouff},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Monomial Evaluation of Polynomial Functions Protected by Threshold
                  Implementations},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {66--84},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_5},
  doi          = {10.1007/978-3-030-41702-4\_5},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LandryLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MaimutT19,
  author       = {Diana Maimut and
                  George Teseleanu},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {A Generic View on the Unified Zero-Knowledge Protocol and Its Applications},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_3},
  doi          = {10.1007/978-3-030-41702-4\_3},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/MaimutT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PiskozubSM19,
  author       = {Michal Piskozub and
                  Riccardo Spolaor and
                  Ivan Martinovic},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {CompactFlow: {A} Hybrid Binary Format for Network Flow Data},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {185--201},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_12},
  doi          = {10.1007/978-3-030-41702-4\_12},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/PiskozubSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SatoIO19,
  author       = {Teppei Sato and
                  Mitsuyoshi Imamura and
                  Kazumasa Omote},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Threat Analysis of Poisoning Attack Against Ethereum Blockchain},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {139--154},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_9},
  doi          = {10.1007/978-3-030-41702-4\_9},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/SatoIO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SyllaCKS19,
  author       = {Tidiane Sylla and
                  Mohamed Aymen Chalouf and
                  Francine Krief and
                  Karim Samak{\'{e}}},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Towards a Context-Aware Security and Privacy as a Service in the Internet
                  of Things},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {240--252},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_15},
  doi          = {10.1007/978-3-030-41702-4\_15},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/SyllaCKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TrouchkineBC19,
  author       = {Thomas Trouchkine and
                  Guillaume Bouffard and
                  Jessy Cl{\'{e}}di{\`{e}}re},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Fault Injection Characterization on Modern CPUs},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {123--138},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_8},
  doi          = {10.1007/978-3-030-41702-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/TrouchkineBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2018,
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20074-9},
  doi          = {10.1007/978-3-030-20074-9},
  isbn         = {978-3-030-20073-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CianciulloG18,
  author       = {Louis Cianciullo and
                  Hossein Ghodosi},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Efficient Information Theoretic Multi-party Computation from Oblivious
                  Linear Evaluation},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {78--90},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_7},
  doi          = {10.1007/978-3-030-20074-9\_7},
  timestamp    = {Tue, 14 May 2019 14:17:01 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CianciulloG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/EomLL18,
  author       = {Soo{-}Kyung Eom and
                  Hyang{-}Sook Lee and
                  Seongan Lim},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {On the Non-repudiation of Isogeny Based Signature Scheme},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_6},
  doi          = {10.1007/978-3-030-20074-9\_6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/EomLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GhatpandeGL18,
  author       = {Sankalp Ghatpande and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Zhe Liu},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {A Family of Lightweight Twisted Edwards Curves for the Internet of
                  Things},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {193--206},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_14},
  doi          = {10.1007/978-3-030-20074-9\_14},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GhatpandeGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Jambert18,
  author       = {Amandine Jambert},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Blockchain and the {GDPR:} {A} Data Protection Authority Point of
                  View},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {3--6},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_1},
  doi          = {10.1007/978-3-030-20074-9\_1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Jambert18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JanovskyKM18,
  author       = {Adam Janovsky and
                  Jan Krhovjak and
                  Vashek Matyas},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Bringing Kleptography to Real-World {TLS}},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_3},
  doi          = {10.1007/978-3-030-20074-9\_3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/JanovskyKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KarrayDGE18,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Moulay Abdelaziz Elaabid},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Prediction-Based Intrusion Detection System for In-Vehicle Networks
                  Using Supervised Learning and Outlier-Detection},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_9},
  doi          = {10.1007/978-3-030-20074-9\_9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KarrayDGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MashianeK18,
  author       = {Thulani Mashiane and
                  Elmarie Kritzinger},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Cybersecurity Behaviour: {A} Conceptual Taxonomy},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {147--156},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_11},
  doi          = {10.1007/978-3-030-20074-9\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/MashianeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MeisterAM18,
  author       = {Julia A. Meister and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Deep Learning Application in Security and Privacy - Theory and Practice:
                  {A} Position Paper},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {129--144},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_10},
  doi          = {10.1007/978-3-030-20074-9\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MeisterAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/OkadaCHK18,
  author       = {Hiroki Okada and
                  Carlos Cid and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Linear Depth Integer-Wise Homomorphic Division},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {91--106},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_8},
  doi          = {10.1007/978-3-030-20074-9\_8},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/OkadaCHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RakhaID18,
  author       = {Mohamed Sami Rakha and
                  Fahim T. Imam and
                  Thomas R. Dean},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Generating a Real-Time Constraint Engine for Network Protocols},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {44--60},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_5},
  doi          = {10.1007/978-3-030-20074-9\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RakhaID18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Rodriguez18,
  author       = {Juan D. Parra Rodriguez},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {A Generic Lightweight and Scalable Access Control Framework for IoT
                  Gateways},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_15},
  doi          = {10.1007/978-3-030-20074-9\_15},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Rodriguez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ShepherdAM18,
  author       = {Carlton Shepherd and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Remote Credential Management with Mutual Attestation for Trusted Execution
                  Environments},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {157--173},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_12},
  doi          = {10.1007/978-3-030-20074-9\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ShepherdAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TehraniDG18,
  author       = {Etienne Tehrani and
                  Jean{-}Luc Danger and
                  Tarik Graba},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Generic Architecture for Lightweight Block Ciphers: {A} First Step
                  Towards Agile Implementation of Multiple Ciphers},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {28--43},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_4},
  doi          = {10.1007/978-3-030-20074-9\_4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/TehraniDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Vergnaud18,
  author       = {Damien Vergnaud},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography
                  (Invited Talk)},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {7--11},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_2},
  doi          = {10.1007/978-3-030-20074-9\_2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Vergnaud18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ZarpelaoMR18,
  author       = {Bruno Bogaz Zarpel{\~{a}}o and
                  Rodrigo Sanches Miani and
                  Muttukrishnan Rajarajan},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Detection of Bitcoin-Based Botnets Using a One-Class Classifier},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_13},
  doi          = {10.1007/978-3-030-20074-9\_13},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ZarpelaoMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2017,
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93524-9},
  doi          = {10.1007/978-3-319-93524-9},
  isbn         = {978-3-319-93523-2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AkramMMBCSC17,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Amina Cherif and
                  Damien Sauveron and
                  Serge Chaumette},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {A Secure and Trusted Channel Protocol for UAVs Fleets},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_1},
  doi          = {10.1007/978-3-319-93524-9\_1},
  timestamp    = {Fri, 09 Apr 2021 18:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AkramMMBCSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BukasaLBLL17,
  author       = {S{\'{e}}banjila Kevin Bukasa and
                  Ronan Lashermes and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern
                  System-on-Chip},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {93--109},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_6},
  doi          = {10.1007/978-3-319-93524-9\_6},
  timestamp    = {Thu, 09 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/BukasaLBLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CheahNBS17,
  author       = {Madeline Cheah and
                  Hoang Nga Nguyen and
                  Jeremy W. Bryans and
                  Siraj A. Shaikh},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {Formalising Systematic Security Evaluations Using Attack Trees for
                  Automotive Applications},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {113--129},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_7},
  doi          = {10.1007/978-3-319-93524-9\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CheahNBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Conejero-Alberola17,
  author       = {Pau Conejero{-}Alberola and
                  M. Francisca Hinarejos and
                  Josep Llu{\'{\i}}s Ferrer{-}Gomila},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {A Selective Privacy-Preserving Identity Attributes Protocol for Electronic
                  Coupons},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {165--176},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_11},
  doi          = {10.1007/978-3-319-93524-9\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/Conejero-Alberola17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CuiZAR17,
  author       = {Shujie Cui and
                  Ming Zhang and
                  Muhammad Rizwan Asghar and
                  Giovanni Russello},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {Long White Cloud {(LWC):} {A} Practical and Privacy-Preserving Outsourced
                  Database},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_3},
  doi          = {10.1007/978-3-319-93524-9\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/CuiZAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GencKK17,
  author       = {Ziya Alper Gen{\c{c}} and
                  S{\"{u}}leyman Kardas and
                  Mehmet Sabir Kiraz},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {Examination of a New Defense Mechanism: Honeywords},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {130--139},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_8},
  doi          = {10.1007/978-3-319-93524-9\_8},
  timestamp    = {Thu, 21 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GencKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JayasingheCMAM17,
  author       = {Danushka Jayasinghe and
                  Sheila Cobourne and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {Philanthropy on the Blockchain},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {25--38},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_2},
  doi          = {10.1007/978-3-319-93524-9\_2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/JayasingheCMAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JiangB17,
  author       = {Hao Jiang and
                  Ahmed Bouabdallah},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {JACPoL: {A} Simple but Expressive JSON-Based Access Control Policy
                  Language},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {56--72},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_4},
  doi          = {10.1007/978-3-319-93524-9\_4},
  timestamp    = {Thu, 21 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/JiangB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KalkarKSU17,
  author       = {{\"{O}}znur Kalkar and
                  Mehmet Sabir Kiraz and
                  Isa Sertkaya and
                  Osmanbey Uzunkol},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear
                  Maps},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {155--164},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_10},
  doi          = {10.1007/978-3-319-93524-9\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KalkarKSU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KaloudiM17,
  author       = {Nektaria Kaloudi and
                  Aikaterini Mitrokotsa},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close
                  Enough?},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {177--188},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_12},
  doi          = {10.1007/978-3-319-93524-9\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KaloudiM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LeguesseVE17,
  author       = {Yonas Leguesse and
                  Mark Vella and
                  Joshua Ellul},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion
                  Heuristics},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {140--152},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_9},
  doi          = {10.1007/978-3-319-93524-9\_9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/LeguesseVE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ShepherdAM17,
  author       = {Carlton Shepherd and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {EmLog: Tamper-Resistant System Logging for Constrained Devices with
                  TEEs},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_5},
  doi          = {10.1007/978-3-319-93524-9\_5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ShepherdAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BahriCFL16,
  author       = {Leila Bahri and
                  Barbara Carminati and
                  Elena Ferrari and
                  William Lucia},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {{LAMP} - Label-Based Access-Control for More Privacy in Online Social
                  Networks},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_11},
  doi          = {10.1007/978-3-319-45931-8\_11},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BahriCFL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BarbuB16,
  author       = {Guillaume Barbu and
                  Alberto Battistello},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Analysis of a Code-Based Countermeasure Against Side-Channel and Fault
                  Attacks},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_10},
  doi          = {10.1007/978-3-319-45931-8\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BarbuB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChabanneKL16,
  author       = {Herv{\'{e}} Chabanne and
                  Julien Keuffer and
                  Roch Lescuyer},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Delegating Biometric Authentication with the Sumcheck Protocol},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {236--244},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_15},
  doi          = {10.1007/978-3-319-45931-8\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ChabanneKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CheahSBN16,
  author       = {Madeline Cheah and
                  Siraj A. Shaikh and
                  Jeremy W. Bryans and
                  Hoang Nga Nguyen},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Combining Third Party Components Securely in Automotive Systems},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {262--269},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_18},
  doi          = {10.1007/978-3-319-45931-8\_18},
  timestamp    = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/CheahSBN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChenYC16,
  author       = {Ling Chen and
                  Ting Yu and
                  Rada Chirkova},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned
                  Data},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_12},
  doi          = {10.1007/978-3-319-45931-8\_12},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ChenYC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CourousseBRJPL16,
  author       = {Damien Courouss{\'{e}} and
                  Thierno Barry and
                  Bruno Robisson and
                  Philippe Jaillon and
                  Olivier Potin and
                  Jean{-}Louis Lanet},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Runtime Code Polymorphism as a Protection Against Side Channel Attacks},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {136--152},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_9},
  doi          = {10.1007/978-3-319-45931-8\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CourousseBRJPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MaqbaliM16,
  author       = {Fatma Al Maqbali and
                  Chris J. Mitchell},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Password Generators: Old Ideas and New},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {245--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_16},
  doi          = {10.1007/978-3-319-45931-8\_16},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/MaqbaliM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MorgnerBF16,
  author       = {Frank Morgner and
                  Paul Bastian and
                  Marc Fischlin},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Securing Transactions with the eIDAS Protocols},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_1},
  doi          = {10.1007/978-3-319-45931-8\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MorgnerBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MuhlbergCMBPP16,
  author       = {Jan Tobias M{\"{u}}hlberg and
                  Sara Cleemput and
                  Mustafa A. Mustafa and
                  Jo Van Bulck and
                  Bart Preneel and
                  Frank Piessens},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {An Implementation of a High Assurance Smart Meter Using Protected
                  Module Architectures},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_4},
  doi          = {10.1007/978-3-319-45931-8\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MuhlbergCMBPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NguyenOL16,
  author       = {Kim Thuat Nguyen and
                  Nouha Oualha and
                  Maryline Laurent},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Novel Lightweight Signcryption-Based Key Distribution Mechanisms for
                  {MIKEY}},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_2},
  doi          = {10.1007/978-3-319-45931-8\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NguyenOL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PapadopoulosAKS16,
  author       = {Panagiotis Papadopoulos and
                  Elias Athanasopoulos and
                  Eleni Kosta and
                  George Siganos and
                  Angelos D. Keromytis and
                  Evangelos P. Markatos},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Provable Network Activity for Protecting Users Against False Accusation},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {254--261},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_17},
  doi          = {10.1007/978-3-319-45931-8\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PapadopoulosAKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ReganoCBVL16,
  author       = {Leonardo Regano and
                  Daniele Canavese and
                  Cataldo Basile and
                  Alessio Viticchi{\'{e}} and
                  Antonio Lioy},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Towards Automatic Risk Analysis and Mitigation of Software Applications},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_8},
  doi          = {10.1007/978-3-319-45931-8\_8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ReganoCBVL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RosenbergG16,
  author       = {Ishai Rosenberg and
                  Ehud Gudes},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Attacking and Defending Dynamic Analysis System-Calls Based {IDS}},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_7},
  doi          = {10.1007/978-3-319-45931-8\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RosenbergG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Sabouri16,
  author       = {Ahmad Sabouri},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {The Effect of Semantic Elaboration on the Perceived Security and Privacy
                  Risk of Privacy-ABCs - An Empirical Experiment},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {223--235},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_14},
  doi          = {10.1007/978-3-319-45931-8\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Sabouri16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SamarinSL16,
  author       = {Peter Samarin and
                  Alexander Skripnik and
                  Kerstin Lemke{-}Rust},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Fault-Channel Watermarks},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {204--219},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_13},
  doi          = {10.1007/978-3-319-45931-8\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SamarinSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/StavovaMJ16,
  author       = {Vlasta Stavova and
                  Vashek Matyas and
                  Mike Just},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Codes v. People: {A} Comparative Usability Study of Two Password Recovery
                  Mechanisms},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_3},
  doi          = {10.1007/978-3-319-45931-8\_3},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/StavovaMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/StefanidisV16,
  author       = {Kyriakos Stefanidis and
                  Artemios G. Voyiatzis},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {An HMM-Based Anomaly Detection Approach for {SCADA} Systems},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {85--99},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_6},
  doi          = {10.1007/978-3-319-45931-8\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/StefanidisV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/VassilakisPM16,
  author       = {Vassilios G. Vassilakis and
                  Emmanouil Panaousis and
                  Haralambos Mouratidis},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Security Challenges of Small Cell as a Service in Virtualized Mobile
                  Edge Computing Environments},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {70--84},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_5},
  doi          = {10.1007/978-3-319-45931-8\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/VassilakisPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2016,
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8},
  doi          = {10.1007/978-3-319-45931-8},
  isbn         = {978-3-319-45930-1},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ArfaouiGLT15,
  author       = {Ghada Arfaoui and
                  Sa{\"{\i}}d Gharout and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Jacques Traor{\'{e}}},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Practical and Privacy-Preserving {TEE} Migration},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_10},
  doi          = {10.1007/978-3-319-24018-3\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ArfaouiGLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BulckNMP15,
  author       = {Jo Van Bulck and
                  Job Noorman and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Secure Resource Sharing for Embedded Protected Module Architectures},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {71--87},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_5},
  doi          = {10.1007/978-3-319-24018-3\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BulckNMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CallejaPT15,
  author       = {Alejandro Calleja and
                  Pedro Peris{-}Lopez and
                  Juan E. Tapiador},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Electrical Heart Signals can be Monitored from the Moon: Security
                  Implications for IPI-Based Protocols},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {36--51},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_3},
  doi          = {10.1007/978-3-319-24018-3\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CallejaPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DimitriouK15,
  author       = {Tassos Dimitriou and
                  Ioannis Krontiris},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd
                  Sensing},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {20--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_2},
  doi          = {10.1007/978-3-319-24018-3\_2},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/DimitriouK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/FysarakisKRMP15,
  author       = {Konstantinos Fysarakis and
                  Charalampos Konstantourakis and
                  Konstantinos Rantos and
                  Charalampos Manifavas and
                  Ioannis Papaefstathiou},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {WSACd - {A} Usable Access Control Framework for Smart Home Devices},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {120--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_8},
  doi          = {10.1007/978-3-319-24018-3\_8},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/FysarakisKRMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HatzivasilisPMA15,
  author       = {George Hatzivasilis and
                  Ioannis Papaefstathiou and
                  Charalampos Manifavas and
                  Ioannis G. Askoxylakis},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Lightweight Password Hashing Scheme for Embedded Systems},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {260--270},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_17},
  doi          = {10.1007/978-3-319-24018-3\_17},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HatzivasilisPMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HoepmanLR15,
  author       = {Jaap{-}Henk Hoepman and
                  Wouter Lueks and
                  Sietse Ringers},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {On Linkability and Malleability in Self-blindable Credentials},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_13},
  doi          = {10.1007/978-3-319-24018-3\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HoepmanLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HuDH15,
  author       = {Qiao Hu and
                  Lavinia Mihaela Dinca and
                  Gerhard P. Hancke},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Device Synchronisation: {A} Practical Limitation on Reader Assisted
                  Jamming Methods for {RFID} Confidentiality},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_14},
  doi          = {10.1007/978-3-319-24018-3\_14},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HuDH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/IvanovaPHK15,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Attack Tree Generation by Policy Invalidation},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_16},
  doi          = {10.1007/978-3-319-24018-3\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/IvanovaPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JaegerA0M15,
  author       = {David Jaeger and
                  Amir Azodi and
                  Feng Cheng and
                  Christoph Meinel},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Normalizing Security Events with a Hierarchical Knowledge Base},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {237--248},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_15},
  doi          = {10.1007/978-3-319-24018-3\_15},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/JaegerA0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LeTT15,
  author       = {Duc{-}Phong Le and
                  Chik How Tan and
                  Michael Tunstall},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Randomizing the Montgomery Powering Ladder},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_11},
  doi          = {10.1007/978-3-319-24018-3\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/LeTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Morales-Sandoval15,
  author       = {Miguel Morales{-}Sandoval and
                  Arturo Diaz{-}Perez},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {{DET-ABE:} {A} Java {API} for Data Confidentiality and Fine-Grained
                  Access Control from Attribute Based Encryption},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_7},
  doi          = {10.1007/978-3-319-24018-3\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Morales-Sandoval15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NaroueiT15,
  author       = {Masoud Narouei and
                  Hassan Takabi},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Automatic Top-Down Role Engineering Framework Using Natural Language
                  Processing Techniques},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_9},
  doi          = {10.1007/978-3-319-24018-3\_9},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/NaroueiT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/OstadalSM15,
  author       = {Radim Ost{\'{a}}dal and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {On Secrecy Amplification Protocols},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_1},
  doi          = {10.1007/978-3-319-24018-3\_1},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/OstadalSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RantosFSA15,
  author       = {Konstantinos Rantos and
                  Konstantinos Fysarakis and
                  Othonas Sultatos and
                  Ioannis G. Askoxylakis},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Secure and Authenticated Access to {LLN} Resources Through Policy
                  Constraints},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {271--280},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_18},
  doi          = {10.1007/978-3-319-24018-3\_18},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/RantosFSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RasthoferAHB15,
  author       = {Siegfried Rasthofer and
                  Irfan Asrar and
                  Stephan Huber and
                  Eric Bodden},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {How Current Android Malware Seeks to Evade Automated Code Analysis},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_12},
  doi          = {10.1007/978-3-319-24018-3\_12},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RasthoferAHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Sarier15,
  author       = {Neyire Deniz Sarier},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Private Minutia-Based Fingerprint Matching},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {52--67},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_4},
  doi          = {10.1007/978-3-319-24018-3\_4},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/Sarier15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ThiSG15,
  author       = {Hoi Le Thi and
                  Reihaneh Safavi{-}Naini and
                  Asadullah Al Galib},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Secure Obfuscation of Authoring Style},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_6},
  doi          = {10.1007/978-3-319-24018-3\_6},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ThiSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2015,
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3},
  doi          = {10.1007/978-3-319-24018-3},
  isbn         = {978-3-319-24017-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AkramK14,
  author       = {Raja Naeem Akram and
                  Ryan K. L. Ko},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {End-to-End Secure and Privacy Preserving Mobile Chat Application},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {124--139},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_9},
  doi          = {10.1007/978-3-662-43826-8\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/AkramK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BarbuG14,
  author       = {Guillaume Barbu and
                  Christophe Giraud},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {New Countermeasures against Fault and Software Type Confusion Attacks
                  on Java Cards},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {57--75},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_5},
  doi          = {10.1007/978-3-662-43826-8\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BarbuG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BogdanovEJKMW14,
  author       = {Dan Bogdanov and
                  Keita Emura and
                  Roman Jagom{\"{a}}gis and
                  Akira Kanaoka and
                  Shin'ichiro Matsuo and
                  Jan Willemson},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Secure Genetic Algorithm for the Subset Cover Problem and Its Application
                  to Privacy Protection},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {108--123},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_8},
  doi          = {10.1007/978-3-662-43826-8\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BogdanovEJKMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BringerCCGM14,
  author       = {Julien Bringer and
                  Claude Carlet and
                  Herv{\'{e}} Chabanne and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation
                  Paradigm in a Code, with Builtin Protection against Side-Channel and
                  Fault Attacks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_4},
  doi          = {10.1007/978-3-662-43826-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChristinEH14,
  author       = {Delphine Christin and
                  Franziska Engelmann and
                  Matthias Hollick},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Usable Privacy for Mobile Sensing Applications},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {92--107},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_7},
  doi          = {10.1007/978-3-662-43826-8\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ChristinEH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/IgnatenkoP14,
  author       = {Tanya Ignatenko and
                  Milan Petkovic},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {{AU2EU:} Privacy-Preserving Matching of {DNA} Sequences},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {180--189},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_14},
  doi          = {10.1007/978-3-662-43826-8\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/IgnatenkoP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KangKJY14,
  author       = {Ju{-}Sung Kang and
                  Nayoung Kim and
                  Wangho Ju and
                  Okyeon Yi},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Security Analysis of Key Expansion Functions Using Pseudorandom
                  Permutations},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {10--23},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_2},
  doi          = {10.1007/978-3-662-43826-8\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KangKJY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KasperOP14,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Sweet Dreams and Nightmares: Security in the Internet of Things},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_1},
  doi          = {10.1007/978-3-662-43826-8\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KasperOP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ManifavasFRKP14,
  author       = {Charalampos Manifavas and
                  Konstantinos Fysarakis and
                  Konstantinos Rantos and
                  Konstantinos Kagiambakis and
                  Ioannis Papaefstathiou},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Policy-Based Access Control for Body Sensor Networks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {150--159},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_11},
  doi          = {10.1007/978-3-662-43826-8\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ManifavasFRKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MansorMM14,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {{CAN} Bus Risk Analysis Revisit},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {170--179},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_13},
  doi          = {10.1007/978-3-662-43826-8\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/MansorMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14,
  author       = {Yuto Nakano and
                  Youssef Souissi and
                  Robert Nguyen and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_6},
  doi          = {10.1007/978-3-662-43826-8\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PicekBJEG14,
  author       = {Stjepan Picek and
                  Lejla Batina and
                  Domagoj Jakobovic and
                  Baris Ege and
                  Marin Golub},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {S-box, SET, Match: {A} Toolbox for S-box Analysis},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {140--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_10},
  doi          = {10.1007/978-3-662-43826-8\_10},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PicekBJEG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SpreitzerG14,
  author       = {Raphael Spreitzer and
                  Beno{\^{\i}}t G{\'{e}}rard},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Towards More Practical Time-Driven Cache Attacks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {24--39},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_3},
  doi          = {10.1007/978-3-662-43826-8\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SpreitzerG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/XylogiannopoulosKA14,
  author       = {Konstantinos F. Xylogiannopoulos and
                  Panagiotis Karampelas and
                  Reda Alhajj},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Early DDoS Detection Based on Data Mining Techniques},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {190--199},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_15},
  doi          = {10.1007/978-3-662-43826-8\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/XylogiannopoulosKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ZuqueteGT14,
  author       = {Andr{\'{e}} Z{\'{u}}quete and
                  Helder Gomes and
                  Claudio Teixeira},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Personal Identification in the Web Using Electronic Identity Cards
                  and a Personal Identity Provider},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {160--169},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_12},
  doi          = {10.1007/978-3-662-43826-8\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ZuqueteGT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2014,
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8},
  doi          = {10.1007/978-3-662-43826-8},
  isbn         = {978-3-662-43825-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DusartT13,
  author       = {Pierre Dusart and
                  Sinaly Traor{\'{e}}},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {Lightweight Authentication Protocol for Low-Cost {RFID} Tags},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {129--144},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_9},
  doi          = {10.1007/978-3-642-38530-8\_9},
  timestamp    = {Sat, 09 Apr 2022 12:44:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DusartT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GuntherB13,
  author       = {Max G{\"{u}}nther and
                  Bernd Borchert},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_5},
  doi          = {10.1007/978-3-642-38530-8\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GuntherB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HoerderJP13,
  author       = {Simon Hoerder and
                  Kimmo J{\"{a}}rvinen and
                  Daniel Page},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {On Secure Embedded Token Design},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {112--128},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_8},
  doi          = {10.1007/978-3-642-38530-8\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HoerderJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/IliaOT13,
  author       = {Panagiotis Ilia and
                  George C. Oikonomou and
                  Theo Tryfonas},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {34--49},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_3},
  doi          = {10.1007/978-3-642-38530-8\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/IliaOT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LacknerBRWS13,
  author       = {Michael Lackner and
                  Reinhard Berlach and
                  Wolfgang Raschke and
                  Reinhold Weiss and
                  Christian Steger},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java
                  Cards},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_6},
  doi          = {10.1007/978-3-642-38530-8\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LacknerBRWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MoriyamaOM13,
  author       = {Daisuke Moriyama and
                  Miyako Ohkubo and
                  Shin'ichiro Matsuo},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {A Forward Privacy Model for {RFID} Authentication Protocols},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {98--111},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_7},
  doi          = {10.1007/978-3-642-38530-8\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MoriyamaOM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PengH13,
  author       = {Kun Peng and
                  Matt Henricksen},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {Multiplicative Homomorphic E-Auction with Formally Provable Security},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_1},
  doi          = {10.1007/978-3-642-38530-8\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PengH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PohlsPSPM13,
  author       = {Henrich Christopher P{\"{o}}hls and
                  Stefan Peters and
                  Kai Samelin and
                  Joachim Posegga and
                  Hermann de Meer},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {Malleable Signatures for Resource Constrained Platforms},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {18--33},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_2},
  doi          = {10.1007/978-3-642-38530-8\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PohlsPSPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SchrecklingHHP13,
  author       = {Daniel Schreckling and
                  Stephan Huber and
                  Focke H{\"{o}}hne and
                  Joachim Posegga},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {{URANOS:} User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn
                  Security},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {50--65},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_4},
  doi          = {10.1007/978-3-642-38530-8\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SchrecklingHHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2013,
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8},
  doi          = {10.1007/978-3-642-38530-8},
  isbn         = {978-3-642-38529-2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AgtenNSGP12,
  author       = {Pieter Agten and
                  Nick Nikiforakis and
                  Raoul Strackx and
                  Willem De Groef and
                  Frank Piessens},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Recent Developments in Low-Level Software Security},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_1},
  doi          = {10.1007/978-3-642-30955-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AgtenNSGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BansarkhaniM12,
  author       = {Rachid El Bansarkhani and
                  Mohammed Meziani},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {An Efficient Lattice-Based Secret Sharing Construction},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {160--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_14},
  doi          = {10.1007/978-3-642-30955-7\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BansarkhaniM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BohliLS12,
  author       = {Jens{-}Matthias Bohli and
                  Wenting Li and
                  Jan Seedorf},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Assisting Server for Secure Multi-Party Computation},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_13},
  doi          = {10.1007/978-3-642-30955-7\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BohliLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CastroPSBN12,
  author       = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Pedro Peris{-}Lopez and
                  Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Another Fallen Hash-Based {RFID} Authentication Protocol},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {29--37},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_4},
  doi          = {10.1007/978-3-642-30955-7\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CastroPSBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChristinLRHK12,
  author       = {Delphine Christin and
                  Pablo S{\'{a}}nchez L{\'{o}}pez and
                  Andreas Reinhardt and
                  Matthias Hollick and
                  Michaela Kauer},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Privacy Bubbles: User-Centered Privacy Control for Mobile Content
                  Sharing Applications},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {71--86},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_8},
  doi          = {10.1007/978-3-642-30955-7\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ChristinLRHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DellAmicoSIOR12,
  author       = {Matteo Dell'Amico and
                  Gabriel Serme and
                  Muhammad Sabir Idrees and
                  Anderson Santana de Oliveira and
                  Yves Roudier},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {HiPoLDS: {A} Security Policy Language for Distributed Systems},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_10},
  doi          = {10.1007/978-3-642-30955-7\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DellAmicoSIOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GaneshR12,
  author       = {Chaya Ganesh and
                  C. Pandu Rangan},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Optimal Parameters for Efficient Two-Party Computation Protocols},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_12},
  doi          = {10.1007/978-3-642-30955-7\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GaneshR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Gollmann12,
  author       = {Dieter Gollmann},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Veracity, Plausibility, and Reputation},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {20--28},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_3},
  doi          = {10.1007/978-3-642-30955-7\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Gollmann12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GrossschadlPT12,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Dan Page and
                  Stefan Tillich},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled
                  Mobile Devices},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {189--207},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_17},
  doi          = {10.1007/978-3-642-30955-7\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GrossschadlPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KarakocDH12,
  author       = {Ferhat Karako{\c{c}} and
                  H{\"{u}}seyin Demirci and
                  A. Emre Harmanci},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Impossible Differential Cryptanalysis of Reduced-Round LBlock},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {179--188},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_16},
  doi          = {10.1007/978-3-642-30955-7\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/KarakocDH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Kearney12,
  author       = {Paul Kearney},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Towards a {C2I} Platform for Combating the Cyber-Threat},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {17--19},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_2},
  doi          = {10.1007/978-3-642-30955-7\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Kearney12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KiyomotoFM12,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Privacy Preservation of User History Graph},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {87--96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_9},
  doi          = {10.1007/978-3-642-30955-7\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KiyomotoFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LiuX12,
  author       = {Fanbao Liu and
                  Tao Xie},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {How to Break {EAP-MD5}},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {49--57},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_6},
  doi          = {10.1007/978-3-642-30955-7\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LiuX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NassrS12,
  author       = {Nezar Nassr and
                  Eric Steegmans},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {{ROAC:} {A} Role-Oriented Access Control Model},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_11},
  doi          = {10.1007/978-3-642-30955-7\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NassrS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SchrecklingPKS12,
  author       = {Daniel Schreckling and
                  Joachim Posegga and
                  Johannes K{\"{o}}stler and
                  Matthias Schaff},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric
                  Security Policies for Android},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_18},
  doi          = {10.1007/978-3-642-30955-7\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SchrecklingPKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SouissiDMGMD12,
  author       = {Youssef Souissi and
                  Nicolas Debande and
                  Sami Mekki and
                  Sylvain Guilley and
                  Ali Maalaoui and
                  Jean{-}Luc Danger},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {On the Optimality of Correlation Power Attack on Embedded Cryptographic
                  Systems},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {169--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_15},
  doi          = {10.1007/978-3-642-30955-7\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SouissiDMGMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/VenkateshN12,
  author       = {G. Kirubavathi Venkatesh and
                  R. Anitha Nadarajan},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {{HTTP} Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward
                  Neural Network},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {38--48},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_5},
  doi          = {10.1007/978-3-642-30955-7\_5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/VenkateshN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ZhouJXW12,
  author       = {Jian Zhou and
                  Jiwu Jing and
                  Ji Xiang and
                  Lei Wang},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Privacy Preserving Social Network Publication on Bipartite Graphs},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {58--70},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_7},
  doi          = {10.1007/978-3-642-30955-7\_7},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ZhouJXW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2012,
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7},
  doi          = {10.1007/978-3-642-30955-7},
  isbn         = {978-3-642-30954-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AmarilliMNPRT11,
  author       = {Antoine Amarilli and
                  Sascha M{\"{u}}ller and
                  David Naccache and
                  Dan Page and
                  Pablo Rauzy and
                  Michael Tunstall},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Can Code Polymorphism Limit Information Leakage?},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_1},
  doi          = {10.1007/978-3-642-21040-2\_1},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/AmarilliMNPRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BangdaoR11,
  author       = {Chen Bangdao and
                  A. W. Roscoe},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Mobile Electronic Identity: Securing Payment on Mobile Phones},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {22--37},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_2},
  doi          = {10.1007/978-3-642-21040-2\_2},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BangdaoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BarenghiPT11,
  author       = {Alessandro Barenghi and
                  Gerardo Pelosi and
                  Yannick Teglia},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Information Leakage Discovery Techniques to Enhance Secure Chip Design},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_9},
  doi          = {10.1007/978-3-642-21040-2\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/BarenghiPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChenMT11,
  author       = {Chunhua Chen and
                  Chris J. Mitchell and
                  Shaohua Tang},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {{SSL/TLS} Session-Aware User Authentication Using a {GAA} Bootstrapped
                  Key},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_4},
  doi          = {10.1007/978-3-642-21040-2\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ChenMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChoyZKHP11,
  author       = {Jiali Choy and
                  Aileen Zhang and
                  Khoongming Khoo and
                  Matt Henricksen and
                  Axel Poschmann},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {{AES} Variants Secure against Related-Key Differential and Boomerang
                  Attacks},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {191--207},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_13},
  doi          = {10.1007/978-3-642-21040-2\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ChoyZKHP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DArco11,
  author       = {Paolo D'Arco},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {An Almost-Optimal Forward-Private {RFID} Mutual Authentication Protocol
                  with Tag Control},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_5},
  doi          = {10.1007/978-3-642-21040-2\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DArco11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GolebiewskiMZZ11,
  author       = {Zbigniew Golebiewski and
                  Krzysztof Majcher and
                  Filip Zag{\'{o}}rski and
                  Marcin Zawada},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Practical Attacks on {HB} and {HB+} Protocols},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {244--253},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_17},
  doi          = {10.1007/978-3-642-21040-2\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GolebiewskiMZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GongM11,
  author       = {Zheng Gong and
                  Marc X. Makkes},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Hardware Trojan Side-Channels Based on Physical Unclonable Functions},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {294--303},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_21},
  doi          = {10.1007/978-3-642-21040-2\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GongM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GouglidisM11,
  author       = {Antonios Gouglidis and
                  Ioannis Mavridis},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Role-Based Secure Inter-operation and Resource Usage Management in
                  Mobile Grid Systems},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {38--53},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_3},
  doi          = {10.1007/978-3-642-21040-2\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GouglidisM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GuilleyKLD11,
  author       = {Sylvain Guilley and
                  Karim Khalfallah and
                  Victor Lomn{\'{e}} and
                  Jean{-}Luc Danger},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Formal Framework for the Evaluation of Waveform Resynchronization
                  Algorithms},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_7},
  doi          = {10.1007/978-3-642-21040-2\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GuilleyKLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HabibiAA11,
  author       = {Mohammad Hassan Habibi and
                  Mahdi R. Alaghband and
                  Mohammad Reza Aref},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Attacks on a Lightweight Mutual Authentication Protocol under {EPC}
                  {C-1} {G-2} Standard},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {254--263},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_18},
  doi          = {10.1007/978-3-642-21040-2\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HabibiAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HoerderWTP11,
  author       = {Simon Hoerder and
                  Marcin W{\'{o}}jcik and
                  Stefan Tillich and
                  Daniel Page},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor
                  Architecture},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_11},
  doi          = {10.1007/978-3-642-21040-2\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HoerderWTP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HuaS11,
  author       = {Jingyu Hua and
                  Kouichi Sakurai},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {A SMS-Based Mobile Botnet Using Flooding Algorithm},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {264--279},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_19},
  doi          = {10.1007/978-3-642-21040-2\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HuaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HutterFW11,
  author       = {Michael Hutter and
                  Martin Feldhofer and
                  Johannes Wolkerstorfer},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {A Cryptographic Processor for Low-Resource Devices: Canning {ECDSA}
                  and {AES} Like Sardines},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_10},
  doi          = {10.1007/978-3-642-21040-2\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HutterFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KahlCTR11,
  author       = {Christian Kahl and
                  Stephen Crane and
                  Markus Tschersich and
                  Kai Rannenberg},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Privacy Respecting Targeted Advertising for Social Networks},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {361--370},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_26},
  doi          = {10.1007/978-3-642-21040-2\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KahlCTR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KrautsevichMY11,
  author       = {Leanid Krautsevich and
                  Fabio Martinelli and
                  Artsiom Yautsiukhin},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Formal Analysis of Security Metrics and Risk},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {304--319},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_22},
  doi          = {10.1007/978-3-642-21040-2\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KrautsevichMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KwokECZKT11,
  author       = {Siew{-}Hwee Kwok and
                  Yen{-}Ling Ee and
                  Guanhan Chew and
                  Kanghong Zheng and
                  Khoongming Khoo and
                  Chik How Tan},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {A Comparison of Post-Processing Techniques for Biased Random Number
                  Generators},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_12},
  doi          = {10.1007/978-3-642-21040-2\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KwokECZKT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LundinL11,
  author       = {Reine Lundin and
                  Stefan Lindskog},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Entropy of Selectively Encrypted Strings},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {234--243},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_16},
  doi          = {10.1007/978-3-642-21040-2\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LundinL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MaghrebiGD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Leakage Squeezing Countermeasure against High-Order Attacks},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_14},
  doi          = {10.1007/978-3-642-21040-2\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MaghrebiGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ManulisP11,
  author       = {Mark Manulis and
                  Bertram Poettering},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Affiliation-Hiding Authentication with Minimal Bandwidth Consumption},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {85--99},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_6},
  doi          = {10.1007/978-3-642-21040-2\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ManulisP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MousionisVH11,
  author       = {Savvas Mousionis and
                  Alex Vakaloudis and
                  Constantinos S. Hilas},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {A Study on the Security, the Performance and the Penetration of Wi-Fi
                  Networks in a Greek Urban Area},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {381--389},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_28},
  doi          = {10.1007/978-3-642-21040-2\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MousionisVH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Noack11,
  author       = {Andreas Noack},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Trust Agreement in Wireless Mesh Networks},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {336--350},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_24},
  doi          = {10.1007/978-3-642-21040-2\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Noack11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NtouskasPP11,
  author       = {Theodoros Ntouskas and
                  Giorgos Pentafronimos and
                  Spyridon Papastergiou},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {{STORM} - Collaborative Security Management Environment},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {320--335},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_23},
  doi          = {10.1007/978-3-642-21040-2\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NtouskasPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PedroSG11,
  author       = {Manuel San Pedro and
                  Mate Soos and
                  Sylvain Guilley},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {{FIRE:} Fault Injection for Reverse Engineering},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {280--293},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_20},
  doi          = {10.1007/978-3-642-21040-2\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PedroSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Peng11,
  author       = {Kun Peng},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless
                  Network},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {351--360},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_25},
  doi          = {10.1007/978-3-642-21040-2\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SakemiITY11,
  author       = {Yumi Sakemi and
                  Tetsuya Izu and
                  Masahiko Takenaka and
                  Masaya Yasuda},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Solving {DLP} with Auxiliary Input over an Elliptic Curve Used in
                  TinyTate Library},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {116--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_8},
  doi          = {10.1007/978-3-642-21040-2\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SakemiITY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TunstallMA11,
  author       = {Michael Tunstall and
                  Debdeep Mukhopadhyay and
                  Subidh Ali},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Differential Fault Analysis of the Advanced Encryption Standard Using
                  a Single Fault},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_15},
  doi          = {10.1007/978-3-642-21040-2\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/TunstallMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/VincentPBL11,
  author       = {Johann Vincent and
                  Christine Porquet and
                  Maroua Borsali and
                  Harold Leboulanger},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Privacy Protection for Smartphones: An Ontology-Based Firewall},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {371--380},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_27},
  doi          = {10.1007/978-3-642-21040-2\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/VincentPBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2011,
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2},
  doi          = {10.1007/978-3-642-21040-2},
  isbn         = {978-3-642-21039-6},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AlpcanBS10,
  author       = {Tansu Alpcan and
                  Christian Bauckhage and
                  Aubrey{-}Derrick Schmidt},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_3},
  doi          = {10.1007/978-3-642-12368-9\_3},
  timestamp    = {Fri, 27 Mar 2020 08:56:51 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/AlpcanBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BackesC10,
  author       = {Werner Backes and
                  Jared Cordasco},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {MoteAODV - An {AODV} Implementation for TinyOS 2.0},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_11},
  doi          = {10.1007/978-3-642-12368-9\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BackesC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BraunMW10,
  author       = {Michael Braun and
                  Ulrike Meyer and
                  Susanne Wetzel},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Efficient Mutual Authentication for Multi-domain {RFID} Systems Using
                  Distributed Signatures},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_9},
  doi          = {10.1007/978-3-642-12368-9\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BraunMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BruckerPW10,
  author       = {Achim D. Brucker and
                  Helmut Petritsch and
                  Stefan G. Weber},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Attribute-Based Encryption with Break-Glass},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {237--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_18},
  doi          = {10.1007/978-3-642-12368-9\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BruckerPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CattaneoFPV10,
  author       = {Giuseppe Cattaneo and
                  Pompeo Faruolo and
                  Vincenzo Palazzo and
                  Ivan Visconti},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Proxy Smart Card Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_15},
  doi          = {10.1007/978-3-642-12368-9\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CattaneoFPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CatuognoG10,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {On the Security of a Two-Factor Authentication Scheme},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {245--252},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_19},
  doi          = {10.1007/978-3-642-12368-9\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CatuognoG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Delgado-MohatarSBF10,
  author       = {Oscar Delgado{-}Mohatar and
                  Jos{\'{e}} M. Sierra and
                  Ljiljana Brankovic and
                  Amparo F{\'{u}}ster{-}Sabater},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {An Energy-Efficient Symmetric Cryptography Based Authentication Scheme
                  for Wireless Sensor Networks},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {332--339},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_27},
  doi          = {10.1007/978-3-642-12368-9\_27},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Delgado-MohatarSBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DragoniGM10,
  author       = {Nicola Dragoni and
                  Olga Gadyatskaya and
                  Fabio Massacci},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Can We Support Applications' Evolution in Multi-application Smart
                  Cards by Security-by-Contract?},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {221--228},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_16},
  doi          = {10.1007/978-3-642-12368-9\_16},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/DragoniGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GarciaO10,
  author       = {Sergio S{\'{a}}nchez Garc{\'{\i}}a and
                  Ana G{\'{o}}mez Oliva},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Improvements of pan-European {IDM} Architecture to Enable Identity
                  Delegation Based on {X.509} Proxy Certificates and {SAML}},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_13},
  doi          = {10.1007/978-3-642-12368-9\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GarciaO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GerguriMRS10,
  author       = {Shkodran Gerguri and
                  V{\'{a}}clav Maty{\'{a}}s Jr. and
                  Zdenek R{\'{\i}}ha and
                  Ludek Smol{\'{\i}}k},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Random Number Generation Based on Fingerprints},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {170--182},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_12},
  doi          = {10.1007/978-3-642-12368-9\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GerguriMRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GuindeZ10,
  author       = {Nitesh B. Guinde and
                  Sotirios G. Ziavras},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Novel FPGA-Based Signature Matching for Deep Packet Inspection},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {261--276},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_21},
  doi          = {10.1007/978-3-642-12368-9\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GuindeZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HartMM10,
  author       = {Jonathan Hart and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Website Credential Storage and Two-Factor Web Authentication with
                  a Java {SIM}},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {229--236},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_17},
  doi          = {10.1007/978-3-642-12368-9\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HartMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HoepmanJ10,
  author       = {Jaap{-}Henk Hoepman and
                  Rieks Joosten},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Practical Schemes for Privacy and Security Enhanced {RFID}},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_10},
  doi          = {10.1007/978-3-642-12368-9\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HoepmanJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KaindaFR10,
  author       = {Ronald Kainda and
                  Ivan Flechais and
                  A. W. Roscoe},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Secure and Usable Out-Of-Band Channels for \emph{Ad Hoc} Mobile Device
                  Interactions},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {308--315},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_24},
  doi          = {10.1007/978-3-642-12368-9\_24},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KaindaFR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KuntzeRF10,
  author       = {Nicolai Kuntze and
                  Carsten Rudolph and
                  Andreas Fuchs},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Trust in Peer-to-Peer Content Distribution Protocols},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {76--89},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_6},
  doi          = {10.1007/978-3-642-12368-9\_6},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KuntzeRF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LiWYY10,
  author       = {Huiyun Li and
                  Keke Wu and
                  Fengqi Yu and
                  Hai Yuan},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Evaluation Metrics of Physical Non-invasive Security},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {60--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_5},
  doi          = {10.1007/978-3-642-12368-9\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LiWYY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LoinigSWH10,
  author       = {Johannes Loinig and
                  Christian Steger and
                  Reinhold Weiss and
                  Ernst Haselsteiner},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Identification and Verification of Security Relevant Functions in
                  Embedded Systems Based on Source Code Annotations and Assertions},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {316--323},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_25},
  doi          = {10.1007/978-3-642-12368-9\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LoinigSWH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Novotny10,
  author       = {Mari{\'{a}}n Novotn{\'{y}}},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Design and Analysis of a Generalized Canvas Protocol},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {106--121},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_8},
  doi          = {10.1007/978-3-642-12368-9\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Novotny10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RaddumNH10,
  author       = {H{\aa}vard Raddum and
                  Lars Hopland Nest{\aa}s and
                  Kjell J{\o}rgen Hole},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Security Analysis of Mobile Phones Used as {OTP} Generators},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {324--331},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_26},
  doi          = {10.1007/978-3-642-12368-9\_26},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RaddumNH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Rossnagel10,
  author       = {Heiko Rossnagel},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {The Market Failure of Anonymity Services},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_28},
  doi          = {10.1007/978-3-642-12368-9\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Rossnagel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RuhrmairCSLSC10,
  author       = {Ulrich R{\"{u}}hrmair and
                  Qingqing Chen and
                  Martin Stutzmann and
                  Paolo Lugli and
                  Ulf Schlichtmann and
                  Gy{\"{o}}rgy Csaba},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Towards Electrical, Integrated Implementations of {SIMPL} Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_22},
  doi          = {10.1007/978-3-642-12368-9\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/RuhrmairCSLSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Ruiz-AgundezPB10,
  author       = {Igor Ruiz{-}Agundez and
                  Yoseba K. Penya and
                  Pablo Garc{\'{\i}}a Bringas},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Fraud Detection for Voice over {IP} Services on Next-Generation Networks},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {199--212},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_14},
  doi          = {10.1007/978-3-642-12368-9\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/Ruiz-AgundezPB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RusselloS10,
  author       = {Giovanni Russello and
                  Enrico Scalavino},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {355--367},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_29},
  doi          = {10.1007/978-3-642-12368-9\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RusselloS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Sarier10,
  author       = {Neyire Deniz Sarier},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Generic Constructions of Biometric Identity Based Encryption Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {90--105},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_7},
  doi          = {10.1007/978-3-642-12368-9\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Sarier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/StrackxYPP10,
  author       = {Raoul Strackx and
                  Yves Younan and
                  Pieter Philippaerts and
                  Frank Piessens},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Efficient and Effective Buffer Overflow Protection on {ARM} Processors},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_1},
  doi          = {10.1007/978-3-642-12368-9\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/StrackxYPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Strenzke10,
  author       = {Falko Strenzke},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A Smart Card Implementation of the McEliece {PKC}},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_4},
  doi          = {10.1007/978-3-642-12368-9\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Strenzke10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Venelli10,
  author       = {Alexandre Venelli},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Efficient Entropy Estimation for Mutual Information Analysis Using
                  B-Splines},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {17--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_2},
  doi          = {10.1007/978-3-642-12368-9\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Venelli10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YamamotoIY10,
  author       = {Dai Yamamoto and
                  Kouichi Itoh and
                  Jun Yajima},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A Very Compact Hardware Implementation of the {KASUMI} Block Cipher},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_23},
  doi          = {10.1007/978-3-642-12368-9\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YamamotoIY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YaseenP10,
  author       = {Qussai Yaseen and
                  Brajendra Panda},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Predicting and Preventing Insider Threat in Relational Database Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {368--383},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_30},
  doi          = {10.1007/978-3-642-12368-9\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YaseenP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ZhengO10,
  author       = {Xianghan Zheng and
                  Vladimir A. Oleshchuk},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {The Design of Secure and Efficient {P2PSIP} Communication Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {253--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_20},
  doi          = {10.1007/978-3-642-12368-9\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ZhengO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2010,
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9},
  doi          = {10.1007/978-3-642-12368-9},
  isbn         = {978-3-642-12367-2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BalinskyMCH09,
  author       = {Helen Balinsky and
                  Edward McDonnell and
                  Liqun Chen and
                  Keith A. Harrison},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Anti-counterfeiting Using Memory Spots},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {52--67},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_5},
  doi          = {10.1007/978-3-642-03944-7\_5},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BalinskyMCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DeursenR09,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Algebraic Attacks on {RFID} Protocols},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {38--51},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_4},
  doi          = {10.1007/978-3-642-03944-7\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DeursenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DottaxGRS09,
  author       = {Emmanuelle Dottax and
                  Christophe Giraud and
                  Matthieu Rivain and
                  Yannick Sierra},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {On Second-Order Fault Analysis Resistance for {CRT-RSA} Implementations},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {68--83},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_6},
  doi          = {10.1007/978-3-642-03944-7\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DottaxGRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HeenGG09,
  author       = {Olivier Heen and
                  Gilles Guette and
                  Thomas Genet},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_1},
  doi          = {10.1007/978-3-642-03944-7\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HeenGG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JaimezEMAM09,
  author       = {Marc Jaimez and
                  Oscar Esparza and
                  Jose L. Mu{\~{n}}oz and
                  Juan J. Alins{-}Delgado and
                  Jorge Mata{-}D{\'{\i}}az},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile
                  Agent Systems},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {12--27},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_2},
  doi          = {10.1007/978-3-642-03944-7\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/JaimezEMAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KiyomotoMF09,
  author       = {Shinsaku Kiyomoto and
                  Keith M. Martin and
                  Kazuhide Fukushima},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Privacy-Aware Location Database Service for Granular Queries},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {28--37},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_3},
  doi          = {10.1007/978-3-642-03944-7\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KiyomotoMF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LedererMKGST09,
  author       = {Christian Lederer and
                  Roland Mader and
                  Manuel Koschuch and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Alexander Szekely and
                  Stefan Tillich},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Energy-Efficient Implementation of {ECDH} Key Exchange for Wireless
                  Sensor Networks},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_9},
  doi          = {10.1007/978-3-642-03944-7\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LedererMKGST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MartinP09,
  author       = {Keith M. Martin and
                  Maura B. Paterson},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Ultra-Lightweight Key Predistribution in Wireless Sensor Networks
                  for Monitoring Linear Infrastructure},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {143--152},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_11},
  doi          = {10.1007/978-3-642-03944-7\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MartinP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MunozEGP09,
  author       = {Jose L. Mu{\~{n}}oz and
                  Oscar Esparza and
                  Carlos Ga{\~{n}}{\'{a}}n and
                  Javier Parra{-}Arnau},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {{PKIX} Certificate Status in Hybrid MANETs},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {153--166},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_12},
  doi          = {10.1007/978-3-642-03944-7\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MunozEGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NaranjoLC09,
  author       = {J. A. M. Naranjo and
                  Juan Antonio L{\'{o}}pez{-}Ramos and
                  Leocadio G. Casado},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay
                  Networks},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {128--142},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_10},
  doi          = {10.1007/978-3-642-03944-7\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NaranjoLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ParadinasCB09,
  author       = {Pierre Paradinas and
                  Julien Cordry and
                  Samia Bouzefrane},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Measurement Analysis When Benchmarking Java Card Platforms},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {84--94},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_7},
  doi          = {10.1007/978-3-642-03944-7\_7},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ParadinasCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TewsJ09,
  author       = {Hendrik Tews and
                  Bart Jacobs},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Performance Issues of Selective Disclosure and Blinded Issuing Protocols
                  on Java Card},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {95--111},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_8},
  doi          = {10.1007/978-3-642-03944-7\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/TewsJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2009,
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7},
  doi          = {10.1007/978-3-642-03944-7},
  isbn         = {978-3-642-03943-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AmielF08,
  author       = {Fr{\'{e}}d{\'{e}}ric Amiel and
                  Benoit Feix},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {On the {BRIP} Algorithms Security for {RSA}},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {136--149},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_10},
  doi          = {10.1007/978-3-540-79966-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AmielF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AnderssonKMP08,
  author       = {Christer Andersson and
                  Markulf Kohlweiss and
                  Leonardo A. Martucci and
                  Andriy Panchenko},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {A Self-certified and Sybil-Free Framework for Secure Digital Identity
                  Domain Buildup},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {64--77},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_5},
  doi          = {10.1007/978-3-540-79966-5\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AnderssonKMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Bursztein08,
  author       = {Elie Bursztein},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Probabilistic Identification for Hard to Classify Protocol},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {49--63},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_4},
  doi          = {10.1007/978-3-540-79966-5\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Bursztein08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CatuognoG08,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {A Graphical {PIN} Authentication Mechanism with Applications to Smart
                  Cards and Low-Cost Devices},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {16--35},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_2},
  doi          = {10.1007/978-3-540-79966-5\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CatuognoG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DeursenMR08,
  author       = {Ton van Deursen and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Untraceability of {RFID} Protocols},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_1},
  doi          = {10.1007/978-3-540-79966-5\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DeursenMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GuetteB08,
  author       = {Gilles Guette and
                  Ciar{\'{a}}n Bryce},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {106--116},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_8},
  doi          = {10.1007/978-3-540-79966-5\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GuetteB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JudgeWKM08,
  author       = {Matthew Judge and
                  Paul D. Williams and
                  Yong Kim and
                  Barry E. Mullins},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Software Cannot Protect Software: An Argument for Dedicated Hardware
                  in Security and a Categorization of the Trustworthiness of Information},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {36--48},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_3},
  doi          = {10.1007/978-3-540-79966-5\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/JudgeWKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PandeyGL08,
  author       = {Navneet Kumar Pandey and
                  S. K. Gupta and
                  Shaveta Leekha},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Algebra for Capability Based Attack Correlation},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {117--135},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_9},
  doi          = {10.1007/978-3-540-79966-5\_9},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PandeyGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SeedorfM08,
  author       = {Jan Seedorf and
                  Christian Muus},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Availability for DHT-Based Overlay Networks with Unidirectional Routing},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {78--91},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_6},
  doi          = {10.1007/978-3-540-79966-5\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SeedorfM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TorresICS08,
  author       = {Joaqu{\'{\i}}n Torres M{\'{a}}rquez and
                  Antonio Izquierdo and
                  Mildrey Carbonell and
                  Jos{\'{e}} Mar{\'{\i}}a Sierra},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Network Smart Card Performing {U(SIM)} Functionalities in {AAA} Protocol
                  Architectures},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {92--105},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_7},
  doi          = {10.1007/978-3-540-79966-5\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/TorresICS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2008,
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5},
  doi          = {10.1007/978-3-540-79966-5},
  isbn         = {978-3-540-79965-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AtallahC07,
  author       = {Eve Atallah and
                  Serge Chaumette},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {A Smart Card Based Distributed Identity Management Infrastructure
                  for Mobile Ad Hoc Networks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_1},
  doi          = {10.1007/978-3-540-72354-7\_1},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AtallahC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BambergerWS07,
  author       = {Walter Bamberger and
                  Oliver Welter and
                  Stephan Spitz},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {175--188},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_15},
  doi          = {10.1007/978-3-540-72354-7\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BambergerWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BekaraL07,
  author       = {Chakib Bekara and
                  Maryline Laurent{-}Maknavicius},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {A New Resilient Key Management Protocol for Wireless Sensor Networks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_2},
  doi          = {10.1007/978-3-540-72354-7\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BekaraL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BoscherNP07,
  author       = {Arnaud Boscher and
                  Robert Naciri and
                  Emmanuel Prouff},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {{CRT} {RSA} Algorithm Protected Against Fault Attacks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_19},
  doi          = {10.1007/978-3-540-72354-7\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BoscherNP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/EaglesMM07,
  author       = {Kevin Eagles and
                  Constantinos Markantonakis and
                  Keith Mayes},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {A Comparative Analysis of Common Threats, Vulnerabilities, Attacks
                  and Countermeasures Within Smart Card and Wireless Sensor Network
                  Node Technologies},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {161--174},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_14},
  doi          = {10.1007/978-3-540-72354-7\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/EaglesMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/FournelMU07,
  author       = {Nicolas Fournel and
                  Marine Minier and
                  St{\'{e}}phane Ub{\'{e}}da},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {202--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_17},
  doi          = {10.1007/978-3-540-72354-7\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/FournelMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GhindiciGS07,
  author       = {Dorina Ghindici and
                  Gilles Grimaud and
                  Isabelle Simplot{-}Ryl},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {An Information Flow Verifier for Small Embedded Systems},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {189--201},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_16},
  doi          = {10.1007/978-3-540-72354-7\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GhindiciGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HengYK07,
  author       = {Swee{-}Huay Heng and
                  Wun{-}She Yap and
                  Khoongming Khoo},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Linkability of Some Blind Signature Schemes},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {80--89},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_7},
  doi          = {10.1007/978-3-540-72354-7\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HengYK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KasperCP07,
  author       = {Timo Kasper and
                  Dario Carluccio and
                  Christof Paar},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {An Embedded System for Practical Security Analysis of Contactless
                  Smartcards},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {150--160},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_13},
  doi          = {10.1007/978-3-540-72354-7\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KasperCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KimKRHKL07,
  author       = {HeeSeok Kim and
                  Tae Hyun Kim and
                  Jeong Choon Ryoo and
                  Dong{-}Guk Han and
                  Howon Kim and
                  Jongin Lim},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Enhanced Doubling Attacks on Signed-All-Bits Set Recoding},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {39--52},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_4},
  doi          = {10.1007/978-3-540-72354-7\_4},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/KimKRHKL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KimQ07,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Fault Attacks for {CRT} Based {RSA:} New Attacks, New Results, and
                  New Countermeasures},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {215--228},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_18},
  doi          = {10.1007/978-3-540-72354-7\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KimQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ParadinasCB07,
  author       = {Pierre Paradinas and
                  Julien Cordry and
                  Samia Bouzefrane},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Performance Evaluation of Java Card Bytecodes},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {127--137},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_11},
  doi          = {10.1007/978-3-540-72354-7\_11},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ParadinasCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SantiagoV07,
  author       = {Judson Santiago and
                  Laurent Vigneron},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Optimistic Non-repudiation Protocol Analysis},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {90--101},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_8},
  doi          = {10.1007/978-3-540-72354-7\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SantiagoV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SevincSB07,
  author       = {Paul E. Sevin{\c{c}} and
                  Mario Strasser and
                  David A. Basin},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Securing the Distribution and Storage of Secrets with Trusted Platform
                  Modules},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {53--66},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_5},
  doi          = {10.1007/978-3-540-72354-7\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SevincSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SorboGP07,
  author       = {Aniello Del Sorbo and
                  Clemente Galdi and
                  Giuseppe Persiano},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Distributed Certified Information Access for Mobile Devices},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {67--79},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_6},
  doi          = {10.1007/978-3-540-72354-7\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SorboGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TunstallB07,
  author       = {Michael Tunstall and
                  Olivier Beno{\^{\i}}t},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Efficient Use of Random Delays in Embedded Software},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {27--38},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_3},
  doi          = {10.1007/978-3-540-72354-7\_3},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/TunstallB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/VaterPL07,
  author       = {Frank Vater and
                  Steffen Peter and
                  Peter Langend{\"{o}}rfer},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Combinatorial Logic Circuitry as Means to Protect Low Cost Devices
                  Against Side Channel Attacks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {244--253},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_20},
  doi          = {10.1007/978-3-540-72354-7\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/VaterPL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/VermoenWG07,
  author       = {Dennis Vermoen and
                  Marc F. Witteman and
                  Georgi Gaydadjiev},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Reverse Engineering Java Card Applets Using Power Analysis},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {138--149},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_12},
  doi          = {10.1007/978-3-540-72354-7\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/VermoenWG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YapHG07,
  author       = {Wun{-}She Yap and
                  Swee{-}Huay Heng and
                  Bok{-}Min Goi},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptanalysis of Some Proxy Signature Schemes Without Certificates},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_10},
  doi          = {10.1007/978-3-540-72354-7\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YapHG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YoonLY07,
  author       = {Eun{-}Jun Yoon and
                  Wan{-}Soo Lee and
                  Kee{-}Young Yoo},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Secure Remote User Authentication Scheme Using Bilinear Pairings},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {102--114},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_9},
  doi          = {10.1007/978-3-540-72354-7\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YoonLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2007,
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7},
  doi          = {10.1007/978-3-540-72354-7},
  isbn         = {978-3-540-72353-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics