Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/wistp:"
@proceedings{DBLP:conf/wistp/2019, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-41702-4}, doi = {10.1007/978-3-030-41702-4}, isbn = {978-3-030-41701-7}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AssidiS19, author = {Hafsa Assidi and El Mamoun Souidi}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Strong Designated Verifier Signature Based on the Rank Metric}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {85--102}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_6}, doi = {10.1007/978-3-030-41702-4\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/AssidiS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BryansLNSSZ19, author = {Jeremy W. Bryans and Lin Shen Liew and Hoang Nga Nguyen and Giedre Sabaliauskaite and Siraj A. Shaikh and Fengjun Zhou}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {A Template-Based Method for the Generation of Attack Trees}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {155--165}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_10}, doi = {10.1007/978-3-030-41702-4\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BryansLNSSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CandelGN19, author = {Ga{\"{e}}lle Candel and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {How to Compartment Secrets}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {3--11}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_1}, doi = {10.1007/978-3-030-41702-4\_1}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/CandelGN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChengDGRR19, author = {Hao Cheng and Daniel Dinu and Johann Gro{\ss}sch{\"{a}}dl and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {A Lightweight Implementation of {NTRU} Prime for the Post-quantum Internet of Things}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {103--119}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_7}, doi = {10.1007/978-3-030-41702-4\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ChengDGRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DejonCVAM19, author = {Nicolas Dejon and Davide Caputo and Luca Verderame and Alessandro Armando and Alessio Merlo}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Automated Security Analysis of IoT Software Updates}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {223--239}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_14}, doi = {10.1007/978-3-030-41702-4\_14}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/DejonCVAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GagliardiL19, author = {Eva Gagliardi and Olivier Levillain}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Analysis of {QUIC} Session Establishment and Its Implementations}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {169--184}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_11}, doi = {10.1007/978-3-030-41702-4\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GagliardiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GajeraGGD019, author = {Hardik Gajera and Matthieu Giraud and David G{\'{e}}rault and Manik Lal Das and Pascal Lafourcade}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Verifiable and Private Oblivious Polynomial Evaluation}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {49--65}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_4}, doi = {10.1007/978-3-030-41702-4\_4}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GajeraGGD019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JakubeitDP19, author = {Philipp Jakubeit and Albert Dercksen and Andreas Peter}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {{SSI-AWARE:} Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {202--219}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_13}, doi = {10.1007/978-3-030-41702-4\_13}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/JakubeitDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KassemF0CS19, author = {Nada El Kassem and Lu{\'{\i}}s Fiolhais and Paulo Martins and Liqun Chen and Leonel Sousa}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {A Lattice-Based Enhanced Privacy {ID}}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {15--31}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_2}, doi = {10.1007/978-3-030-41702-4\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KassemF0CS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LandryLP19, author = {Simon Landry and Yanis Linge and Emmanuel Prouff}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {66--84}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_5}, doi = {10.1007/978-3-030-41702-4\_5}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LandryLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MaimutT19, author = {Diana Maimut and George Teseleanu}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {A Generic View on the Unified Zero-Knowledge Protocol and Its Applications}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {32--46}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_3}, doi = {10.1007/978-3-030-41702-4\_3}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/MaimutT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PiskozubSM19, author = {Michal Piskozub and Riccardo Spolaor and Ivan Martinovic}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {CompactFlow: {A} Hybrid Binary Format for Network Flow Data}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {185--201}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_12}, doi = {10.1007/978-3-030-41702-4\_12}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/PiskozubSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SatoIO19, author = {Teppei Sato and Mitsuyoshi Imamura and Kazumasa Omote}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Threat Analysis of Poisoning Attack Against Ethereum Blockchain}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {139--154}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_9}, doi = {10.1007/978-3-030-41702-4\_9}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/SatoIO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SyllaCKS19, author = {Tidiane Sylla and Mohamed Aymen Chalouf and Francine Krief and Karim Samak{\'{e}}}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Towards a Context-Aware Security and Privacy as a Service in the Internet of Things}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {240--252}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_15}, doi = {10.1007/978-3-030-41702-4\_15}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/SyllaCKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TrouchkineBC19, author = {Thomas Trouchkine and Guillaume Bouffard and Jessy Cl{\'{e}}di{\`{e}}re}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Fault Injection Characterization on Modern CPUs}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {123--138}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_8}, doi = {10.1007/978-3-030-41702-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/TrouchkineBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2018, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-20074-9}, doi = {10.1007/978-3-030-20074-9}, isbn = {978-3-030-20073-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CianciulloG18, author = {Louis Cianciullo and Hossein Ghodosi}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {78--90}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_7}, doi = {10.1007/978-3-030-20074-9\_7}, timestamp = {Tue, 14 May 2019 14:17:01 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CianciulloG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/EomLL18, author = {Soo{-}Kyung Eom and Hyang{-}Sook Lee and Seongan Lim}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {On the Non-repudiation of Isogeny Based Signature Scheme}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {63--77}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_6}, doi = {10.1007/978-3-030-20074-9\_6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/EomLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GhatpandeGL18, author = {Sankalp Ghatpande and Johann Gro{\ss}sch{\"{a}}dl and Zhe Liu}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {A Family of Lightweight Twisted Edwards Curves for the Internet of Things}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {193--206}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_14}, doi = {10.1007/978-3-030-20074-9\_14}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GhatpandeGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Jambert18, author = {Amandine Jambert}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Blockchain and the {GDPR:} {A} Data Protection Authority Point of View}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {3--6}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_1}, doi = {10.1007/978-3-030-20074-9\_1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Jambert18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JanovskyKM18, author = {Adam Janovsky and Jan Krhovjak and Vashek Matyas}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Bringing Kleptography to Real-World {TLS}}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {15--27}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_3}, doi = {10.1007/978-3-030-20074-9\_3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/JanovskyKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KarrayDGE18, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and Moulay Abdelaziz Elaabid}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {109--128}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_9}, doi = {10.1007/978-3-030-20074-9\_9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KarrayDGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MashianeK18, author = {Thulani Mashiane and Elmarie Kritzinger}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Cybersecurity Behaviour: {A} Conceptual Taxonomy}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {147--156}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_11}, doi = {10.1007/978-3-030-20074-9\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/MashianeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MeisterAM18, author = {Julia A. Meister and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Deep Learning Application in Security and Privacy - Theory and Practice: {A} Position Paper}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {129--144}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_10}, doi = {10.1007/978-3-030-20074-9\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MeisterAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/OkadaCHK18, author = {Hiroki Okada and Carlos Cid and Seira Hidano and Shinsaku Kiyomoto}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Linear Depth Integer-Wise Homomorphic Division}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {91--106}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_8}, doi = {10.1007/978-3-030-20074-9\_8}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/OkadaCHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RakhaID18, author = {Mohamed Sami Rakha and Fahim T. Imam and Thomas R. Dean}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Generating a Real-Time Constraint Engine for Network Protocols}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {44--60}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_5}, doi = {10.1007/978-3-030-20074-9\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RakhaID18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Rodriguez18, author = {Juan D. Parra Rodriguez}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {A Generic Lightweight and Scalable Access Control Framework for IoT Gateways}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {207--222}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_15}, doi = {10.1007/978-3-030-20074-9\_15}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Rodriguez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ShepherdAM18, author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Remote Credential Management with Mutual Attestation for Trusted Execution Environments}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {157--173}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_12}, doi = {10.1007/978-3-030-20074-9\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ShepherdAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TehraniDG18, author = {Etienne Tehrani and Jean{-}Luc Danger and Tarik Graba}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Generic Architecture for Lightweight Block Ciphers: {A} First Step Towards Agile Implementation of Multiple Ciphers}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {28--43}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_4}, doi = {10.1007/978-3-030-20074-9\_4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/TehraniDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Vergnaud18, author = {Damien Vergnaud}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk)}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {7--11}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_2}, doi = {10.1007/978-3-030-20074-9\_2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Vergnaud18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ZarpelaoMR18, author = {Bruno Bogaz Zarpel{\~{a}}o and Rodrigo Sanches Miani and Muttukrishnan Rajarajan}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Detection of Bitcoin-Based Botnets Using a One-Class Classifier}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {174--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_13}, doi = {10.1007/978-3-030-20074-9\_13}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ZarpelaoMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2017, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93524-9}, doi = {10.1007/978-3-319-93524-9}, isbn = {978-3-319-93523-2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AkramMMBCSC17, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes and Pierre{-}Fran{\c{c}}ois Bonnefoi and Amina Cherif and Damien Sauveron and Serge Chaumette}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {A Secure and Trusted Channel Protocol for UAVs Fleets}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {3--24}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_1}, doi = {10.1007/978-3-319-93524-9\_1}, timestamp = {Fri, 09 Apr 2021 18:48:54 +0200}, biburl = {https://dblp.org/rec/conf/wistp/AkramMMBCSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BukasaLBLL17, author = {S{\'{e}}banjila Kevin Bukasa and Ronan Lashermes and H{\'{e}}l{\`{e}}ne Le Bouder and Jean{-}Louis Lanet and Axel Legay}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {93--109}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_6}, doi = {10.1007/978-3-319-93524-9\_6}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/BukasaLBLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CheahNBS17, author = {Madeline Cheah and Hoang Nga Nguyen and Jeremy W. Bryans and Siraj A. Shaikh}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {113--129}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_7}, doi = {10.1007/978-3-319-93524-9\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CheahNBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Conejero-Alberola17, author = {Pau Conejero{-}Alberola and M. Francisca Hinarejos and Josep Llu{\'{\i}}s Ferrer{-}Gomila}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {165--176}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_11}, doi = {10.1007/978-3-319-93524-9\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/Conejero-Alberola17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CuiZAR17, author = {Shujie Cui and Ming Zhang and Muhammad Rizwan Asghar and Giovanni Russello}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {Long White Cloud {(LWC):} {A} Practical and Privacy-Preserving Outsourced Database}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {41--55}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_3}, doi = {10.1007/978-3-319-93524-9\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/CuiZAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GencKK17, author = {Ziya Alper Gen{\c{c}} and S{\"{u}}leyman Kardas and Mehmet Sabir Kiraz}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {Examination of a New Defense Mechanism: Honeywords}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {130--139}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_8}, doi = {10.1007/978-3-319-93524-9\_8}, timestamp = {Thu, 21 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GencKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JayasingheCMAM17, author = {Danushka Jayasinghe and Sheila Cobourne and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {Philanthropy on the Blockchain}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {25--38}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_2}, doi = {10.1007/978-3-319-93524-9\_2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/JayasingheCMAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JiangB17, author = {Hao Jiang and Ahmed Bouabdallah}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {JACPoL: {A} Simple but Expressive JSON-Based Access Control Policy Language}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {56--72}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_4}, doi = {10.1007/978-3-319-93524-9\_4}, timestamp = {Thu, 21 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/JiangB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KalkarKSU17, author = {{\"{O}}znur Kalkar and Mehmet Sabir Kiraz and Isa Sertkaya and Osmanbey Uzunkol}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {155--164}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_10}, doi = {10.1007/978-3-319-93524-9\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KalkarKSU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KaloudiM17, author = {Nektaria Kaloudi and Aikaterini Mitrokotsa}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {177--188}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_12}, doi = {10.1007/978-3-319-93524-9\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KaloudiM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LeguesseVE17, author = {Yonas Leguesse and Mark Vella and Joshua Ellul}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {140--152}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_9}, doi = {10.1007/978-3-319-93524-9\_9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/LeguesseVE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ShepherdAM17, author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {75--92}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_5}, doi = {10.1007/978-3-319-93524-9\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ShepherdAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BahriCFL16, author = {Leila Bahri and Barbara Carminati and Elena Ferrari and William Lucia}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {{LAMP} - Label-Based Access-Control for More Privacy in Online Social Networks}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {171--186}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_11}, doi = {10.1007/978-3-319-45931-8\_11}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BahriCFL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BarbuB16, author = {Guillaume Barbu and Alberto Battistello}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {153--168}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_10}, doi = {10.1007/978-3-319-45931-8\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BarbuB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChabanneKL16, author = {Herv{\'{e}} Chabanne and Julien Keuffer and Roch Lescuyer}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Delegating Biometric Authentication with the Sumcheck Protocol}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {236--244}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_15}, doi = {10.1007/978-3-319-45931-8\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ChabanneKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CheahSBN16, author = {Madeline Cheah and Siraj A. Shaikh and Jeremy W. Bryans and Hoang Nga Nguyen}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Combining Third Party Components Securely in Automotive Systems}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {262--269}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_18}, doi = {10.1007/978-3-319-45931-8\_18}, timestamp = {Thu, 14 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/CheahSBN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChenYC16, author = {Ling Chen and Ting Yu and Rada Chirkova}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {187--203}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_12}, doi = {10.1007/978-3-319-45931-8\_12}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ChenYC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CourousseBRJPL16, author = {Damien Courouss{\'{e}} and Thierno Barry and Bruno Robisson and Philippe Jaillon and Olivier Potin and Jean{-}Louis Lanet}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Runtime Code Polymorphism as a Protection Against Side Channel Attacks}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {136--152}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_9}, doi = {10.1007/978-3-319-45931-8\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CourousseBRJPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MaqbaliM16, author = {Fatma Al Maqbali and Chris J. Mitchell}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Password Generators: Old Ideas and New}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {245--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_16}, doi = {10.1007/978-3-319-45931-8\_16}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/MaqbaliM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MorgnerBF16, author = {Frank Morgner and Paul Bastian and Marc Fischlin}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Securing Transactions with the eIDAS Protocols}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {3--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_1}, doi = {10.1007/978-3-319-45931-8\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MorgnerBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MuhlbergCMBPP16, author = {Jan Tobias M{\"{u}}hlberg and Sara Cleemput and Mustafa A. Mustafa and Jo Van Bulck and Bart Preneel and Frank Piessens}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {An Implementation of a High Assurance Smart Meter Using Protected Module Architectures}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {53--69}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_4}, doi = {10.1007/978-3-319-45931-8\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MuhlbergCMBPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NguyenOL16, author = {Kim Thuat Nguyen and Nouha Oualha and Maryline Laurent}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Novel Lightweight Signcryption-Based Key Distribution Mechanisms for {MIKEY}}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {19--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_2}, doi = {10.1007/978-3-319-45931-8\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NguyenOL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PapadopoulosAKS16, author = {Panagiotis Papadopoulos and Elias Athanasopoulos and Eleni Kosta and George Siganos and Angelos D. Keromytis and Evangelos P. Markatos}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Provable Network Activity for Protecting Users Against False Accusation}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {254--261}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_17}, doi = {10.1007/978-3-319-45931-8\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PapadopoulosAKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ReganoCBVL16, author = {Leonardo Regano and Daniele Canavese and Cataldo Basile and Alessio Viticchi{\'{e}} and Antonio Lioy}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Towards Automatic Risk Analysis and Mitigation of Software Applications}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {120--135}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_8}, doi = {10.1007/978-3-319-45931-8\_8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ReganoCBVL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RosenbergG16, author = {Ishai Rosenberg and Ehud Gudes}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Attacking and Defending Dynamic Analysis System-Calls Based {IDS}}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {103--119}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_7}, doi = {10.1007/978-3-319-45931-8\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RosenbergG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Sabouri16, author = {Ahmad Sabouri}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {223--235}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_14}, doi = {10.1007/978-3-319-45931-8\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Sabouri16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SamarinSL16, author = {Peter Samarin and Alexander Skripnik and Kerstin Lemke{-}Rust}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Fault-Channel Watermarks}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {204--219}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_13}, doi = {10.1007/978-3-319-45931-8\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SamarinSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/StavovaMJ16, author = {Vlasta Stavova and Vashek Matyas and Mike Just}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Codes v. People: {A} Comparative Usability Study of Two Password Recovery Mechanisms}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {35--50}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_3}, doi = {10.1007/978-3-319-45931-8\_3}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/StavovaMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/StefanidisV16, author = {Kyriakos Stefanidis and Artemios G. Voyiatzis}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {An HMM-Based Anomaly Detection Approach for {SCADA} Systems}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {85--99}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_6}, doi = {10.1007/978-3-319-45931-8\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/StefanidisV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/VassilakisPM16, author = {Vassilios G. Vassilakis and Emmanouil Panaousis and Haralambos Mouratidis}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {70--84}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_5}, doi = {10.1007/978-3-319-45931-8\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/VassilakisPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2016, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8}, doi = {10.1007/978-3-319-45931-8}, isbn = {978-3-319-45930-1}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ArfaouiGLT15, author = {Ghada Arfaoui and Sa{\"{\i}}d Gharout and Jean{-}Fran{\c{c}}ois Lalande and Jacques Traor{\'{e}}}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Practical and Privacy-Preserving {TEE} Migration}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {153--168}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_10}, doi = {10.1007/978-3-319-24018-3\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ArfaouiGLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BulckNMP15, author = {Jo Van Bulck and Job Noorman and Jan Tobias M{\"{u}}hlberg and Frank Piessens}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Secure Resource Sharing for Embedded Protected Module Architectures}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {71--87}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_5}, doi = {10.1007/978-3-319-24018-3\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BulckNMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CallejaPT15, author = {Alejandro Calleja and Pedro Peris{-}Lopez and Juan E. Tapiador}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {36--51}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_3}, doi = {10.1007/978-3-319-24018-3\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CallejaPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DimitriouK15, author = {Tassos Dimitriou and Ioannis Krontiris}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {20--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_2}, doi = {10.1007/978-3-319-24018-3\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/DimitriouK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/FysarakisKRMP15, author = {Konstantinos Fysarakis and Charalampos Konstantourakis and Konstantinos Rantos and Charalampos Manifavas and Ioannis Papaefstathiou}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {WSACd - {A} Usable Access Control Framework for Smart Home Devices}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {120--133}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_8}, doi = {10.1007/978-3-319-24018-3\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/FysarakisKRMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HatzivasilisPMA15, author = {George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas and Ioannis G. Askoxylakis}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Lightweight Password Hashing Scheme for Embedded Systems}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {260--270}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_17}, doi = {10.1007/978-3-319-24018-3\_17}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HatzivasilisPMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HoepmanLR15, author = {Jaap{-}Henk Hoepman and Wouter Lueks and Sietse Ringers}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {On Linkability and Malleability in Self-blindable Credentials}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {203--218}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_13}, doi = {10.1007/978-3-319-24018-3\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HoepmanLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HuDH15, author = {Qiao Hu and Lavinia Mihaela Dinca and Gerhard P. Hancke}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Device Synchronisation: {A} Practical Limitation on Reader Assisted Jamming Methods for {RFID} Confidentiality}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {219--234}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_14}, doi = {10.1007/978-3-319-24018-3\_14}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HuDH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/IvanovaPHK15, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Attack Tree Generation by Policy Invalidation}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {249--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_16}, doi = {10.1007/978-3-319-24018-3\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/IvanovaPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JaegerA0M15, author = {David Jaeger and Amir Azodi and Feng Cheng and Christoph Meinel}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Normalizing Security Events with a Hierarchical Knowledge Base}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {237--248}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_15}, doi = {10.1007/978-3-319-24018-3\_15}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/JaegerA0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LeTT15, author = {Duc{-}Phong Le and Chik How Tan and Michael Tunstall}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Randomizing the Montgomery Powering Ladder}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {169--184}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_11}, doi = {10.1007/978-3-319-24018-3\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/LeTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Morales-Sandoval15, author = {Miguel Morales{-}Sandoval and Arturo Diaz{-}Perez}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {{DET-ABE:} {A} Java {API} for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {104--119}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_7}, doi = {10.1007/978-3-319-24018-3\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Morales-Sandoval15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NaroueiT15, author = {Masoud Narouei and Hassan Takabi}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {137--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_9}, doi = {10.1007/978-3-319-24018-3\_9}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/NaroueiT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/OstadalSM15, author = {Radim Ost{\'{a}}dal and Petr Svenda and Vashek Maty{\'{a}}s}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {On Secrecy Amplification Protocols}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {3--19}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_1}, doi = {10.1007/978-3-319-24018-3\_1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/OstadalSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RantosFSA15, author = {Konstantinos Rantos and Konstantinos Fysarakis and Othonas Sultatos and Ioannis G. Askoxylakis}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Secure and Authenticated Access to {LLN} Resources Through Policy Constraints}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {271--280}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_18}, doi = {10.1007/978-3-319-24018-3\_18}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/RantosFSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RasthoferAHB15, author = {Siegfried Rasthofer and Irfan Asrar and Stephan Huber and Eric Bodden}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {How Current Android Malware Seeks to Evade Automated Code Analysis}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {187--202}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_12}, doi = {10.1007/978-3-319-24018-3\_12}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RasthoferAHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Sarier15, author = {Neyire Deniz Sarier}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Private Minutia-Based Fingerprint Matching}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {52--67}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_4}, doi = {10.1007/978-3-319-24018-3\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/Sarier15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ThiSG15, author = {Hoi Le Thi and Reihaneh Safavi{-}Naini and Asadullah Al Galib}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Secure Obfuscation of Authoring Style}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {88--103}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_6}, doi = {10.1007/978-3-319-24018-3\_6}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ThiSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2015, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3}, doi = {10.1007/978-3-319-24018-3}, isbn = {978-3-319-24017-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AkramK14, author = {Raja Naeem Akram and Ryan K. L. Ko}, editor = {David Naccache and Damien Sauveron}, title = {End-to-End Secure and Privacy Preserving Mobile Chat Application}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {124--139}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_9}, doi = {10.1007/978-3-662-43826-8\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/AkramK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BarbuG14, author = {Guillaume Barbu and Christophe Giraud}, editor = {David Naccache and Damien Sauveron}, title = {New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {57--75}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_5}, doi = {10.1007/978-3-662-43826-8\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BarbuG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BogdanovEJKMW14, author = {Dan Bogdanov and Keita Emura and Roman Jagom{\"{a}}gis and Akira Kanaoka and Shin'ichiro Matsuo and Jan Willemson}, editor = {David Naccache and Damien Sauveron}, title = {A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {108--123}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_8}, doi = {10.1007/978-3-662-43826-8\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BogdanovEJKMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BringerCCGM14, author = {Julien Bringer and Claude Carlet and Herv{\'{e}} Chabanne and Sylvain Guilley and Houssem Maghrebi}, editor = {David Naccache and Damien Sauveron}, title = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {40--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_4}, doi = {10.1007/978-3-662-43826-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChristinEH14, author = {Delphine Christin and Franziska Engelmann and Matthias Hollick}, editor = {David Naccache and Damien Sauveron}, title = {Usable Privacy for Mobile Sensing Applications}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {92--107}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_7}, doi = {10.1007/978-3-662-43826-8\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ChristinEH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/IgnatenkoP14, author = {Tanya Ignatenko and Milan Petkovic}, editor = {David Naccache and Damien Sauveron}, title = {{AU2EU:} Privacy-Preserving Matching of {DNA} Sequences}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {180--189}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_14}, doi = {10.1007/978-3-662-43826-8\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/IgnatenkoP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KangKJY14, author = {Ju{-}Sung Kang and Nayoung Kim and Wangho Ju and Okyeon Yi}, editor = {David Naccache and Damien Sauveron}, title = {A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {10--23}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_2}, doi = {10.1007/978-3-662-43826-8\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KangKJY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KasperOP14, author = {Timo Kasper and David F. Oswald and Christof Paar}, editor = {David Naccache and Damien Sauveron}, title = {Sweet Dreams and Nightmares: Security in the Internet of Things}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {1--9}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_1}, doi = {10.1007/978-3-662-43826-8\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KasperOP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ManifavasFRKP14, author = {Charalampos Manifavas and Konstantinos Fysarakis and Konstantinos Rantos and Konstantinos Kagiambakis and Ioannis Papaefstathiou}, editor = {David Naccache and Damien Sauveron}, title = {Policy-Based Access Control for Body Sensor Networks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {150--159}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_11}, doi = {10.1007/978-3-662-43826-8\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ManifavasFRKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MansorMM14, author = {Hafizah Mansor and Konstantinos Markantonakis and Keith Mayes}, editor = {David Naccache and Damien Sauveron}, title = {{CAN} Bus Risk Analysis Revisit}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {170--179}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_13}, doi = {10.1007/978-3-662-43826-8\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/MansorMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14, author = {Yuto Nakano and Youssef Souissi and Robert Nguyen and Laurent Sauvage and Jean{-}Luc Danger and Sylvain Guilley and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {David Naccache and Damien Sauveron}, title = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {76--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_6}, doi = {10.1007/978-3-662-43826-8\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PicekBJEG14, author = {Stjepan Picek and Lejla Batina and Domagoj Jakobovic and Baris Ege and Marin Golub}, editor = {David Naccache and Damien Sauveron}, title = {S-box, SET, Match: {A} Toolbox for S-box Analysis}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {140--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_10}, doi = {10.1007/978-3-662-43826-8\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PicekBJEG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SpreitzerG14, author = {Raphael Spreitzer and Beno{\^{\i}}t G{\'{e}}rard}, editor = {David Naccache and Damien Sauveron}, title = {Towards More Practical Time-Driven Cache Attacks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {24--39}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_3}, doi = {10.1007/978-3-662-43826-8\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SpreitzerG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/XylogiannopoulosKA14, author = {Konstantinos F. Xylogiannopoulos and Panagiotis Karampelas and Reda Alhajj}, editor = {David Naccache and Damien Sauveron}, title = {Early DDoS Detection Based on Data Mining Techniques}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {190--199}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_15}, doi = {10.1007/978-3-662-43826-8\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/XylogiannopoulosKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ZuqueteGT14, author = {Andr{\'{e}} Z{\'{u}}quete and Helder Gomes and Claudio Teixeira}, editor = {David Naccache and Damien Sauveron}, title = {Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {160--169}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_12}, doi = {10.1007/978-3-662-43826-8\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ZuqueteGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2014, editor = {David Naccache and Damien Sauveron}, title = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8}, doi = {10.1007/978-3-662-43826-8}, isbn = {978-3-662-43825-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DusartT13, author = {Pierre Dusart and Sinaly Traor{\'{e}}}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {Lightweight Authentication Protocol for Low-Cost {RFID} Tags}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {129--144}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_9}, doi = {10.1007/978-3-642-38530-8\_9}, timestamp = {Sat, 09 Apr 2022 12:44:35 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DusartT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GuntherB13, author = {Max G{\"{u}}nther and Bernd Borchert}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {66--81}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_5}, doi = {10.1007/978-3-642-38530-8\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GuntherB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HoerderJP13, author = {Simon Hoerder and Kimmo J{\"{a}}rvinen and Daniel Page}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {On Secure Embedded Token Design}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {112--128}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_8}, doi = {10.1007/978-3-642-38530-8\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HoerderJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/IliaOT13, author = {Panagiotis Ilia and George C. Oikonomou and Theo Tryfonas}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {34--49}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_3}, doi = {10.1007/978-3-642-38530-8\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/IliaOT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LacknerBRWS13, author = {Michael Lackner and Reinhard Berlach and Wolfgang Raschke and Reinhold Weiss and Christian Steger}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {82--97}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_6}, doi = {10.1007/978-3-642-38530-8\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LacknerBRWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MoriyamaOM13, author = {Daisuke Moriyama and Miyako Ohkubo and Shin'ichiro Matsuo}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {A Forward Privacy Model for {RFID} Authentication Protocols}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {98--111}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_7}, doi = {10.1007/978-3-642-38530-8\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MoriyamaOM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PengH13, author = {Kun Peng and Matt Henricksen}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {Multiplicative Homomorphic E-Auction with Formally Provable Security}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {1--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_1}, doi = {10.1007/978-3-642-38530-8\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PengH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PohlsPSPM13, author = {Henrich Christopher P{\"{o}}hls and Stefan Peters and Kai Samelin and Joachim Posegga and Hermann de Meer}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {Malleable Signatures for Resource Constrained Platforms}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {18--33}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_2}, doi = {10.1007/978-3-642-38530-8\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PohlsPSPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SchrecklingHHP13, author = {Daniel Schreckling and Stephan Huber and Focke H{\"{o}}hne and Joachim Posegga}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {{URANOS:} User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {50--65}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_4}, doi = {10.1007/978-3-642-38530-8\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SchrecklingHHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2013, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8}, doi = {10.1007/978-3-642-38530-8}, isbn = {978-3-642-38529-2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AgtenNSGP12, author = {Pieter Agten and Nick Nikiforakis and Raoul Strackx and Willem De Groef and Frank Piessens}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Recent Developments in Low-Level Software Security}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_1}, doi = {10.1007/978-3-642-30955-7\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/AgtenNSGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BansarkhaniM12, author = {Rachid El Bansarkhani and Mohammed Meziani}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {An Efficient Lattice-Based Secret Sharing Construction}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {160--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_14}, doi = {10.1007/978-3-642-30955-7\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BansarkhaniM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BohliLS12, author = {Jens{-}Matthias Bohli and Wenting Li and Jan Seedorf}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Assisting Server for Secure Multi-Party Computation}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {144--159}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_13}, doi = {10.1007/978-3-642-30955-7\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BohliLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CastroPSBN12, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Another Fallen Hash-Based {RFID} Authentication Protocol}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {29--37}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_4}, doi = {10.1007/978-3-642-30955-7\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CastroPSBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChristinLRHK12, author = {Delphine Christin and Pablo S{\'{a}}nchez L{\'{o}}pez and Andreas Reinhardt and Matthias Hollick and Michaela Kauer}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {71--86}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_8}, doi = {10.1007/978-3-642-30955-7\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ChristinLRHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DellAmicoSIOR12, author = {Matteo Dell'Amico and Gabriel Serme and Muhammad Sabir Idrees and Anderson Santana de Oliveira and Yves Roudier}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {HiPoLDS: {A} Security Policy Language for Distributed Systems}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {97--112}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_10}, doi = {10.1007/978-3-642-30955-7\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DellAmicoSIOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GaneshR12, author = {Chaya Ganesh and C. Pandu Rangan}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Optimal Parameters for Efficient Two-Party Computation Protocols}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {128--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_12}, doi = {10.1007/978-3-642-30955-7\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GaneshR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Gollmann12, author = {Dieter Gollmann}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Veracity, Plausibility, and Reputation}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {20--28}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_3}, doi = {10.1007/978-3-642-30955-7\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Gollmann12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GrossschadlPT12, author = {Johann Gro{\ss}sch{\"{a}}dl and Dan Page and Stefan Tillich}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {189--207}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_17}, doi = {10.1007/978-3-642-30955-7\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GrossschadlPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KarakocDH12, author = {Ferhat Karako{\c{c}} and H{\"{u}}seyin Demirci and A. Emre Harmanci}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Impossible Differential Cryptanalysis of Reduced-Round LBlock}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {179--188}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_16}, doi = {10.1007/978-3-642-30955-7\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/KarakocDH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Kearney12, author = {Paul Kearney}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Towards a {C2I} Platform for Combating the Cyber-Threat}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {17--19}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_2}, doi = {10.1007/978-3-642-30955-7\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Kearney12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Privacy Preservation of User History Graph}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {87--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_9}, doi = {10.1007/978-3-642-30955-7\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LiuX12, author = {Fanbao Liu and Tao Xie}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {How to Break {EAP-MD5}}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {49--57}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_6}, doi = {10.1007/978-3-642-30955-7\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LiuX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NassrS12, author = {Nezar Nassr and Eric Steegmans}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {{ROAC:} {A} Role-Oriented Access Control Model}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {113--127}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_11}, doi = {10.1007/978-3-642-30955-7\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NassrS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SchrecklingPKS12, author = {Daniel Schreckling and Joachim Posegga and Johannes K{\"{o}}stler and Matthias Schaff}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {208--223}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_18}, doi = {10.1007/978-3-642-30955-7\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SchrecklingPKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SouissiDMGMD12, author = {Youssef Souissi and Nicolas Debande and Sami Mekki and Sylvain Guilley and Ali Maalaoui and Jean{-}Luc Danger}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {169--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_15}, doi = {10.1007/978-3-642-30955-7\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SouissiDMGMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/VenkateshN12, author = {G. Kirubavathi Venkatesh and R. Anitha Nadarajan}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {{HTTP} Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {38--48}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_5}, doi = {10.1007/978-3-642-30955-7\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/VenkateshN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ZhouJXW12, author = {Jian Zhou and Jiwu Jing and Ji Xiang and Lei Wang}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Privacy Preserving Social Network Publication on Bipartite Graphs}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {58--70}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_7}, doi = {10.1007/978-3-642-30955-7\_7}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ZhouJXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2012, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7}, doi = {10.1007/978-3-642-30955-7}, isbn = {978-3-642-30954-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AmarilliMNPRT11, author = {Antoine Amarilli and Sascha M{\"{u}}ller and David Naccache and Dan Page and Pablo Rauzy and Michael Tunstall}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Can Code Polymorphism Limit Information Leakage?}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {1--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_1}, doi = {10.1007/978-3-642-21040-2\_1}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/AmarilliMNPRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BangdaoR11, author = {Chen Bangdao and A. W. Roscoe}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Mobile Electronic Identity: Securing Payment on Mobile Phones}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {22--37}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_2}, doi = {10.1007/978-3-642-21040-2\_2}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BangdaoR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BarenghiPT11, author = {Alessandro Barenghi and Gerardo Pelosi and Yannick Teglia}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Information Leakage Discovery Techniques to Enhance Secure Chip Design}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {128--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_9}, doi = {10.1007/978-3-642-21040-2\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/BarenghiPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChenMT11, author = {Chunhua Chen and Chris J. Mitchell and Shaohua Tang}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {{SSL/TLS} Session-Aware User Authentication Using a {GAA} Bootstrapped Key}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {54--68}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_4}, doi = {10.1007/978-3-642-21040-2\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ChenMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChoyZKHP11, author = {Jiali Choy and Aileen Zhang and Khoongming Khoo and Matt Henricksen and Axel Poschmann}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {{AES} Variants Secure against Related-Key Differential and Boomerang Attacks}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {191--207}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_13}, doi = {10.1007/978-3-642-21040-2\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ChoyZKHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DArco11, author = {Paolo D'Arco}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {An Almost-Optimal Forward-Private {RFID} Mutual Authentication Protocol with Tag Control}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {69--84}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_5}, doi = {10.1007/978-3-642-21040-2\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DArco11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GolebiewskiMZZ11, author = {Zbigniew Golebiewski and Krzysztof Majcher and Filip Zag{\'{o}}rski and Marcin Zawada}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Practical Attacks on {HB} and {HB+} Protocols}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {244--253}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_17}, doi = {10.1007/978-3-642-21040-2\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GolebiewskiMZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GongM11, author = {Zheng Gong and Marc X. Makkes}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Hardware Trojan Side-Channels Based on Physical Unclonable Functions}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {294--303}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_21}, doi = {10.1007/978-3-642-21040-2\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GongM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GouglidisM11, author = {Antonios Gouglidis and Ioannis Mavridis}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {38--53}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_3}, doi = {10.1007/978-3-642-21040-2\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GouglidisM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GuilleyKLD11, author = {Sylvain Guilley and Karim Khalfallah and Victor Lomn{\'{e}} and Jean{-}Luc Danger}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Formal Framework for the Evaluation of Waveform Resynchronization Algorithms}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {100--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_7}, doi = {10.1007/978-3-642-21040-2\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GuilleyKLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HabibiAA11, author = {Mohammad Hassan Habibi and Mahdi R. Alaghband and Mohammad Reza Aref}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Attacks on a Lightweight Mutual Authentication Protocol under {EPC} {C-1} {G-2} Standard}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {254--263}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_18}, doi = {10.1007/978-3-642-21040-2\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HabibiAA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HoerderWTP11, author = {Simon Hoerder and Marcin W{\'{o}}jcik and Stefan Tillich and Daniel Page}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {160--174}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_11}, doi = {10.1007/978-3-642-21040-2\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HoerderWTP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HuaS11, author = {Jingyu Hua and Kouichi Sakurai}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {A SMS-Based Mobile Botnet Using Flooding Algorithm}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {264--279}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_19}, doi = {10.1007/978-3-642-21040-2\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HuaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HutterFW11, author = {Michael Hutter and Martin Feldhofer and Johannes Wolkerstorfer}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {A Cryptographic Processor for Low-Resource Devices: Canning {ECDSA} and {AES} Like Sardines}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {144--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_10}, doi = {10.1007/978-3-642-21040-2\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HutterFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KahlCTR11, author = {Christian Kahl and Stephen Crane and Markus Tschersich and Kai Rannenberg}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Privacy Respecting Targeted Advertising for Social Networks}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {361--370}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_26}, doi = {10.1007/978-3-642-21040-2\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KahlCTR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KrautsevichMY11, author = {Leanid Krautsevich and Fabio Martinelli and Artsiom Yautsiukhin}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Formal Analysis of Security Metrics and Risk}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {304--319}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_22}, doi = {10.1007/978-3-642-21040-2\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KrautsevichMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KwokECZKT11, author = {Siew{-}Hwee Kwok and Yen{-}Ling Ee and Guanhan Chew and Kanghong Zheng and Khoongming Khoo and Chik How Tan}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {A Comparison of Post-Processing Techniques for Biased Random Number Generators}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {175--190}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_12}, doi = {10.1007/978-3-642-21040-2\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KwokECZKT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LundinL11, author = {Reine Lundin and Stefan Lindskog}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Entropy of Selectively Encrypted Strings}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {234--243}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_16}, doi = {10.1007/978-3-642-21040-2\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LundinL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MaghrebiGD11, author = {Houssem Maghrebi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Leakage Squeezing Countermeasure against High-Order Attacks}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {208--223}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_14}, doi = {10.1007/978-3-642-21040-2\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MaghrebiGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ManulisP11, author = {Mark Manulis and Bertram Poettering}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Affiliation-Hiding Authentication with Minimal Bandwidth Consumption}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {85--99}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_6}, doi = {10.1007/978-3-642-21040-2\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ManulisP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MousionisVH11, author = {Savvas Mousionis and Alex Vakaloudis and Constantinos S. Hilas}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {381--389}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_28}, doi = {10.1007/978-3-642-21040-2\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MousionisVH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Noack11, author = {Andreas Noack}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Trust Agreement in Wireless Mesh Networks}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {336--350}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_24}, doi = {10.1007/978-3-642-21040-2\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Noack11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NtouskasPP11, author = {Theodoros Ntouskas and Giorgos Pentafronimos and Spyridon Papastergiou}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {{STORM} - Collaborative Security Management Environment}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {320--335}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_23}, doi = {10.1007/978-3-642-21040-2\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NtouskasPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PedroSG11, author = {Manuel San Pedro and Mate Soos and Sylvain Guilley}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {{FIRE:} Fault Injection for Reverse Engineering}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {280--293}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_20}, doi = {10.1007/978-3-642-21040-2\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PedroSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Peng11, author = {Kun Peng}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {351--360}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_25}, doi = {10.1007/978-3-642-21040-2\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SakemiITY11, author = {Yumi Sakemi and Tetsuya Izu and Masahiko Takenaka and Masaya Yasuda}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Solving {DLP} with Auxiliary Input over an Elliptic Curve Used in TinyTate Library}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {116--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_8}, doi = {10.1007/978-3-642-21040-2\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SakemiITY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TunstallMA11, author = {Michael Tunstall and Debdeep Mukhopadhyay and Subidh Ali}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {224--233}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_15}, doi = {10.1007/978-3-642-21040-2\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/TunstallMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/VincentPBL11, author = {Johann Vincent and Christine Porquet and Maroua Borsali and Harold Leboulanger}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Privacy Protection for Smartphones: An Ontology-Based Firewall}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {371--380}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_27}, doi = {10.1007/978-3-642-21040-2\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/VincentPBL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2011, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2}, doi = {10.1007/978-3-642-21040-2}, isbn = {978-3-642-21039-6}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AlpcanBS10, author = {Tansu Alpcan and Christian Bauckhage and Aubrey{-}Derrick Schmidt}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {31--46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_3}, doi = {10.1007/978-3-642-12368-9\_3}, timestamp = {Fri, 27 Mar 2020 08:56:51 +0100}, biburl = {https://dblp.org/rec/conf/wistp/AlpcanBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BackesC10, author = {Werner Backes and Jared Cordasco}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {MoteAODV - An {AODV} Implementation for TinyOS 2.0}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {154--169}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_11}, doi = {10.1007/978-3-642-12368-9\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BackesC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BraunMW10, author = {Michael Braun and Ulrike Meyer and Susanne Wetzel}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Efficient Mutual Authentication for Multi-domain {RFID} Systems Using Distributed Signatures}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {122--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_9}, doi = {10.1007/978-3-642-12368-9\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BraunMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BruckerPW10, author = {Achim D. Brucker and Helmut Petritsch and Stefan G. Weber}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Attribute-Based Encryption with Break-Glass}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {237--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_18}, doi = {10.1007/978-3-642-12368-9\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BruckerPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CattaneoFPV10, author = {Giuseppe Cattaneo and Pompeo Faruolo and Vincenzo Palazzo and Ivan Visconti}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Proxy Smart Card Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {213--220}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_15}, doi = {10.1007/978-3-642-12368-9\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CattaneoFPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CatuognoG10, author = {Luigi Catuogno and Clemente Galdi}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {On the Security of a Two-Factor Authentication Scheme}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {245--252}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_19}, doi = {10.1007/978-3-642-12368-9\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CatuognoG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Delgado-MohatarSBF10, author = {Oscar Delgado{-}Mohatar and Jos{\'{e}} M. Sierra and Ljiljana Brankovic and Amparo F{\'{u}}ster{-}Sabater}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {332--339}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_27}, doi = {10.1007/978-3-642-12368-9\_27}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Delgado-MohatarSBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DragoniGM10, author = {Nicola Dragoni and Olga Gadyatskaya and Fabio Massacci}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {221--228}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_16}, doi = {10.1007/978-3-642-12368-9\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/DragoniGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GarciaO10, author = {Sergio S{\'{a}}nchez Garc{\'{\i}}a and Ana G{\'{o}}mez Oliva}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Improvements of pan-European {IDM} Architecture to Enable Identity Delegation Based on {X.509} Proxy Certificates and {SAML}}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {183--198}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_13}, doi = {10.1007/978-3-642-12368-9\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GarciaO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GerguriMRS10, author = {Shkodran Gerguri and V{\'{a}}clav Maty{\'{a}}s Jr. and Zdenek R{\'{\i}}ha and Ludek Smol{\'{\i}}k}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Random Number Generation Based on Fingerprints}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {170--182}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_12}, doi = {10.1007/978-3-642-12368-9\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GerguriMRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GuindeZ10, author = {Nitesh B. Guinde and Sotirios G. Ziavras}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Novel FPGA-Based Signature Matching for Deep Packet Inspection}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {261--276}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_21}, doi = {10.1007/978-3-642-12368-9\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GuindeZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HartMM10, author = {Jonathan Hart and Konstantinos Markantonakis and Keith Mayes}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Website Credential Storage and Two-Factor Web Authentication with a Java {SIM}}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {229--236}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_17}, doi = {10.1007/978-3-642-12368-9\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HartMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HoepmanJ10, author = {Jaap{-}Henk Hoepman and Rieks Joosten}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Practical Schemes for Privacy and Security Enhanced {RFID}}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {138--153}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_10}, doi = {10.1007/978-3-642-12368-9\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HoepmanJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KaindaFR10, author = {Ronald Kainda and Ivan Flechais and A. W. Roscoe}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Secure and Usable Out-Of-Band Channels for \emph{Ad Hoc} Mobile Device Interactions}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {308--315}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_24}, doi = {10.1007/978-3-642-12368-9\_24}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KaindaFR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KuntzeRF10, author = {Nicolai Kuntze and Carsten Rudolph and Andreas Fuchs}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Trust in Peer-to-Peer Content Distribution Protocols}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {76--89}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_6}, doi = {10.1007/978-3-642-12368-9\_6}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KuntzeRF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LiWYY10, author = {Huiyun Li and Keke Wu and Fengqi Yu and Hai Yuan}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Evaluation Metrics of Physical Non-invasive Security}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {60--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_5}, doi = {10.1007/978-3-642-12368-9\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LiWYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LoinigSWH10, author = {Johannes Loinig and Christian Steger and Reinhold Weiss and Ernst Haselsteiner}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {316--323}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_25}, doi = {10.1007/978-3-642-12368-9\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LoinigSWH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Novotny10, author = {Mari{\'{a}}n Novotn{\'{y}}}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Design and Analysis of a Generalized Canvas Protocol}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {106--121}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_8}, doi = {10.1007/978-3-642-12368-9\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Novotny10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RaddumNH10, author = {H{\aa}vard Raddum and Lars Hopland Nest{\aa}s and Kjell J{\o}rgen Hole}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Security Analysis of Mobile Phones Used as {OTP} Generators}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {324--331}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_26}, doi = {10.1007/978-3-642-12368-9\_26}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RaddumNH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Rossnagel10, author = {Heiko Rossnagel}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {The Market Failure of Anonymity Services}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {340--354}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_28}, doi = {10.1007/978-3-642-12368-9\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Rossnagel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RuhrmairCSLSC10, author = {Ulrich R{\"{u}}hrmair and Qingqing Chen and Martin Stutzmann and Paolo Lugli and Ulf Schlichtmann and Gy{\"{o}}rgy Csaba}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Towards Electrical, Integrated Implementations of {SIMPL} Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {277--292}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_22}, doi = {10.1007/978-3-642-12368-9\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/RuhrmairCSLSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Ruiz-AgundezPB10, author = {Igor Ruiz{-}Agundez and Yoseba K. Penya and Pablo Garc{\'{\i}}a Bringas}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Fraud Detection for Voice over {IP} Services on Next-Generation Networks}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {199--212}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_14}, doi = {10.1007/978-3-642-12368-9\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/Ruiz-AgundezPB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RusselloS10, author = {Giovanni Russello and Enrico Scalavino}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {355--367}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_29}, doi = {10.1007/978-3-642-12368-9\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RusselloS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Sarier10, author = {Neyire Deniz Sarier}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Generic Constructions of Biometric Identity Based Encryption Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {90--105}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_7}, doi = {10.1007/978-3-642-12368-9\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Sarier10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/StrackxYPP10, author = {Raoul Strackx and Yves Younan and Pieter Philippaerts and Frank Piessens}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Efficient and Effective Buffer Overflow Protection on {ARM} Processors}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {1--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_1}, doi = {10.1007/978-3-642-12368-9\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/StrackxYPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Strenzke10, author = {Falko Strenzke}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {A Smart Card Implementation of the McEliece {PKC}}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {47--59}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_4}, doi = {10.1007/978-3-642-12368-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Strenzke10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Venelli10, author = {Alexandre Venelli}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {17--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_2}, doi = {10.1007/978-3-642-12368-9\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Venelli10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/YamamotoIY10, author = {Dai Yamamoto and Kouichi Itoh and Jun Yajima}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {A Very Compact Hardware Implementation of the {KASUMI} Block Cipher}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {293--307}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_23}, doi = {10.1007/978-3-642-12368-9\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/YamamotoIY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/YaseenP10, author = {Qussai Yaseen and Brajendra Panda}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Predicting and Preventing Insider Threat in Relational Database Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {368--383}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_30}, doi = {10.1007/978-3-642-12368-9\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/YaseenP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ZhengO10, author = {Xianghan Zheng and Vladimir A. Oleshchuk}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {The Design of Secure and Efficient {P2PSIP} Communication Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {253--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_20}, doi = {10.1007/978-3-642-12368-9\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ZhengO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2010, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9}, doi = {10.1007/978-3-642-12368-9}, isbn = {978-3-642-12367-2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BalinskyMCH09, author = {Helen Balinsky and Edward McDonnell and Liqun Chen and Keith A. Harrison}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Anti-counterfeiting Using Memory Spots}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {52--67}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_5}, doi = {10.1007/978-3-642-03944-7\_5}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BalinskyMCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DeursenR09, author = {Ton van Deursen and Sasa Radomirovic}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Algebraic Attacks on {RFID} Protocols}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {38--51}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_4}, doi = {10.1007/978-3-642-03944-7\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DeursenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DottaxGRS09, author = {Emmanuelle Dottax and Christophe Giraud and Matthieu Rivain and Yannick Sierra}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {On Second-Order Fault Analysis Resistance for {CRT-RSA} Implementations}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {68--83}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_6}, doi = {10.1007/978-3-642-03944-7\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DottaxGRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HeenGG09, author = {Olivier Heen and Gilles Guette and Thomas Genet}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {1--11}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_1}, doi = {10.1007/978-3-642-03944-7\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HeenGG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JaimezEMAM09, author = {Marc Jaimez and Oscar Esparza and Jose L. Mu{\~{n}}oz and Juan J. Alins{-}Delgado and Jorge Mata{-}D{\'{\i}}az}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {12--27}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_2}, doi = {10.1007/978-3-642-03944-7\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/JaimezEMAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KiyomotoMF09, author = {Shinsaku Kiyomoto and Keith M. Martin and Kazuhide Fukushima}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Privacy-Aware Location Database Service for Granular Queries}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {28--37}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_3}, doi = {10.1007/978-3-642-03944-7\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KiyomotoMF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LedererMKGST09, author = {Christian Lederer and Roland Mader and Manuel Koschuch and Johann Gro{\ss}sch{\"{a}}dl and Alexander Szekely and Stefan Tillich}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Energy-Efficient Implementation of {ECDH} Key Exchange for Wireless Sensor Networks}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {112--127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_9}, doi = {10.1007/978-3-642-03944-7\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LedererMKGST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MartinP09, author = {Keith M. Martin and Maura B. Paterson}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {143--152}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_11}, doi = {10.1007/978-3-642-03944-7\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MartinP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MunozEGP09, author = {Jose L. Mu{\~{n}}oz and Oscar Esparza and Carlos Ga{\~{n}}{\'{a}}n and Javier Parra{-}Arnau}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {{PKIX} Certificate Status in Hybrid MANETs}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {153--166}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_12}, doi = {10.1007/978-3-642-03944-7\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MunozEGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NaranjoLC09, author = {J. A. M. Naranjo and Juan Antonio L{\'{o}}pez{-}Ramos and Leocadio G. Casado}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {128--142}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_10}, doi = {10.1007/978-3-642-03944-7\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NaranjoLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ParadinasCB09, author = {Pierre Paradinas and Julien Cordry and Samia Bouzefrane}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Measurement Analysis When Benchmarking Java Card Platforms}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {84--94}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_7}, doi = {10.1007/978-3-642-03944-7\_7}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ParadinasCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TewsJ09, author = {Hendrik Tews and Bart Jacobs}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {95--111}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_8}, doi = {10.1007/978-3-642-03944-7\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/TewsJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2009, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7}, doi = {10.1007/978-3-642-03944-7}, isbn = {978-3-642-03943-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AmielF08, author = {Fr{\'{e}}d{\'{e}}ric Amiel and Benoit Feix}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {On the {BRIP} Algorithms Security for {RSA}}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {136--149}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_10}, doi = {10.1007/978-3-540-79966-5\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/AmielF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AnderssonKMP08, author = {Christer Andersson and Markulf Kohlweiss and Leonardo A. Martucci and Andriy Panchenko}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {64--77}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_5}, doi = {10.1007/978-3-540-79966-5\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/AnderssonKMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Bursztein08, author = {Elie Bursztein}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Probabilistic Identification for Hard to Classify Protocol}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {49--63}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_4}, doi = {10.1007/978-3-540-79966-5\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Bursztein08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CatuognoG08, author = {Luigi Catuogno and Clemente Galdi}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {A Graphical {PIN} Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {16--35}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_2}, doi = {10.1007/978-3-540-79966-5\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CatuognoG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DeursenMR08, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Untraceability of {RFID} Protocols}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_1}, doi = {10.1007/978-3-540-79966-5\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DeursenMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GuetteB08, author = {Gilles Guette and Ciar{\'{a}}n Bryce}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {106--116}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_8}, doi = {10.1007/978-3-540-79966-5\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GuetteB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JudgeWKM08, author = {Matthew Judge and Paul D. Williams and Yong Kim and Barry E. Mullins}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {36--48}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_3}, doi = {10.1007/978-3-540-79966-5\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/JudgeWKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PandeyGL08, author = {Navneet Kumar Pandey and S. K. Gupta and Shaveta Leekha}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Algebra for Capability Based Attack Correlation}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {117--135}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_9}, doi = {10.1007/978-3-540-79966-5\_9}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PandeyGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SeedorfM08, author = {Jan Seedorf and Christian Muus}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Availability for DHT-Based Overlay Networks with Unidirectional Routing}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {78--91}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_6}, doi = {10.1007/978-3-540-79966-5\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SeedorfM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TorresICS08, author = {Joaqu{\'{\i}}n Torres M{\'{a}}rquez and Antonio Izquierdo and Mildrey Carbonell and Jos{\'{e}} Mar{\'{\i}}a Sierra}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Network Smart Card Performing {U(SIM)} Functionalities in {AAA} Protocol Architectures}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {92--105}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_7}, doi = {10.1007/978-3-540-79966-5\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/TorresICS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2008, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5}, doi = {10.1007/978-3-540-79966-5}, isbn = {978-3-540-79965-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AtallahC07, author = {Eve Atallah and Serge Chaumette}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {1--13}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_1}, doi = {10.1007/978-3-540-72354-7\_1}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/AtallahC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BambergerWS07, author = {Walter Bamberger and Oliver Welter and Stephan Spitz}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {175--188}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_15}, doi = {10.1007/978-3-540-72354-7\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BambergerWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BekaraL07, author = {Chakib Bekara and Maryline Laurent{-}Maknavicius}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {A New Resilient Key Management Protocol for Wireless Sensor Networks}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {14--26}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_2}, doi = {10.1007/978-3-540-72354-7\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BekaraL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BoscherNP07, author = {Arnaud Boscher and Robert Naciri and Emmanuel Prouff}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {{CRT} {RSA} Algorithm Protected Against Fault Attacks}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {229--243}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_19}, doi = {10.1007/978-3-540-72354-7\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BoscherNP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/EaglesMM07, author = {Kevin Eagles and Constantinos Markantonakis and Keith Mayes}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {161--174}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_14}, doi = {10.1007/978-3-540-72354-7\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/EaglesMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/FournelMU07, author = {Nicolas Fournel and Marine Minier and St{\'{e}}phane Ub{\'{e}}da}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {202--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_17}, doi = {10.1007/978-3-540-72354-7\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/FournelMU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GhindiciGS07, author = {Dorina Ghindici and Gilles Grimaud and Isabelle Simplot{-}Ryl}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {An Information Flow Verifier for Small Embedded Systems}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {189--201}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_16}, doi = {10.1007/978-3-540-72354-7\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GhindiciGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HengYK07, author = {Swee{-}Huay Heng and Wun{-}She Yap and Khoongming Khoo}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Linkability of Some Blind Signature Schemes}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {80--89}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_7}, doi = {10.1007/978-3-540-72354-7\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HengYK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KasperCP07, author = {Timo Kasper and Dario Carluccio and Christof Paar}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {An Embedded System for Practical Security Analysis of Contactless Smartcards}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {150--160}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_13}, doi = {10.1007/978-3-540-72354-7\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KasperCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KimKRHKL07, author = {HeeSeok Kim and Tae Hyun Kim and Jeong Choon Ryoo and Dong{-}Guk Han and Howon Kim and Jongin Lim}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Enhanced Doubling Attacks on Signed-All-Bits Set Recoding}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {39--52}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_4}, doi = {10.1007/978-3-540-72354-7\_4}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/KimKRHKL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KimQ07, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Fault Attacks for {CRT} Based {RSA:} New Attacks, New Results, and New Countermeasures}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {215--228}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_18}, doi = {10.1007/978-3-540-72354-7\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KimQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ParadinasCB07, author = {Pierre Paradinas and Julien Cordry and Samia Bouzefrane}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Performance Evaluation of Java Card Bytecodes}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {127--137}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_11}, doi = {10.1007/978-3-540-72354-7\_11}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ParadinasCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SantiagoV07, author = {Judson Santiago and Laurent Vigneron}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Optimistic Non-repudiation Protocol Analysis}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {90--101}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_8}, doi = {10.1007/978-3-540-72354-7\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SantiagoV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SevincSB07, author = {Paul E. Sevin{\c{c}} and Mario Strasser and David A. Basin}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Securing the Distribution and Storage of Secrets with Trusted Platform Modules}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {53--66}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_5}, doi = {10.1007/978-3-540-72354-7\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SevincSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SorboGP07, author = {Aniello Del Sorbo and Clemente Galdi and Giuseppe Persiano}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Distributed Certified Information Access for Mobile Devices}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {67--79}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_6}, doi = {10.1007/978-3-540-72354-7\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SorboGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TunstallB07, author = {Michael Tunstall and Olivier Beno{\^{\i}}t}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Efficient Use of Random Delays in Embedded Software}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {27--38}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_3}, doi = {10.1007/978-3-540-72354-7\_3}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/TunstallB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/VaterPL07, author = {Frank Vater and Steffen Peter and Peter Langend{\"{o}}rfer}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {244--253}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_20}, doi = {10.1007/978-3-540-72354-7\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/VaterPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/VermoenWG07, author = {Dennis Vermoen and Marc F. Witteman and Georgi Gaydadjiev}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Reverse Engineering Java Card Applets Using Power Analysis}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {138--149}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_12}, doi = {10.1007/978-3-540-72354-7\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/VermoenWG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/YapHG07, author = {Wun{-}She Yap and Swee{-}Huay Heng and Bok{-}Min Goi}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Cryptanalysis of Some Proxy Signature Schemes Without Certificates}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {115--126}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_10}, doi = {10.1007/978-3-540-72354-7\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/YapHG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/YoonLY07, author = {Eun{-}Jun Yoon and Wan{-}Soo Lee and Kee{-}Young Yoo}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Secure Remote User Authentication Scheme Using Bilinear Pairings}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {102--114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_9}, doi = {10.1007/978-3-540-72354-7\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/YoonLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2007, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7}, doi = {10.1007/978-3-540-72354-7}, isbn = {978-3-540-72353-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.