Search dblp for Publications

export results for "toc:db/conf/wistp/wistp2007.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wistp/AtallahC07,
  author       = {Eve Atallah and
                  Serge Chaumette},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {A Smart Card Based Distributed Identity Management Infrastructure
                  for Mobile Ad Hoc Networks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_1},
  doi          = {10.1007/978-3-540-72354-7\_1},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AtallahC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BambergerWS07,
  author       = {Walter Bamberger and
                  Oliver Welter and
                  Stephan Spitz},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {175--188},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_15},
  doi          = {10.1007/978-3-540-72354-7\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BambergerWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BekaraL07,
  author       = {Chakib Bekara and
                  Maryline Laurent{-}Maknavicius},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {A New Resilient Key Management Protocol for Wireless Sensor Networks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_2},
  doi          = {10.1007/978-3-540-72354-7\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BekaraL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BoscherNP07,
  author       = {Arnaud Boscher and
                  Robert Naciri and
                  Emmanuel Prouff},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {{CRT} {RSA} Algorithm Protected Against Fault Attacks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_19},
  doi          = {10.1007/978-3-540-72354-7\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BoscherNP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/EaglesMM07,
  author       = {Kevin Eagles and
                  Constantinos Markantonakis and
                  Keith Mayes},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {A Comparative Analysis of Common Threats, Vulnerabilities, Attacks
                  and Countermeasures Within Smart Card and Wireless Sensor Network
                  Node Technologies},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {161--174},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_14},
  doi          = {10.1007/978-3-540-72354-7\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/EaglesMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/FournelMU07,
  author       = {Nicolas Fournel and
                  Marine Minier and
                  St{\'{e}}phane Ub{\'{e}}da},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {202--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_17},
  doi          = {10.1007/978-3-540-72354-7\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/FournelMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GhindiciGS07,
  author       = {Dorina Ghindici and
                  Gilles Grimaud and
                  Isabelle Simplot{-}Ryl},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {An Information Flow Verifier for Small Embedded Systems},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {189--201},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_16},
  doi          = {10.1007/978-3-540-72354-7\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GhindiciGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HengYK07,
  author       = {Swee{-}Huay Heng and
                  Wun{-}She Yap and
                  Khoongming Khoo},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Linkability of Some Blind Signature Schemes},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {80--89},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_7},
  doi          = {10.1007/978-3-540-72354-7\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HengYK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KasperCP07,
  author       = {Timo Kasper and
                  Dario Carluccio and
                  Christof Paar},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {An Embedded System for Practical Security Analysis of Contactless
                  Smartcards},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {150--160},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_13},
  doi          = {10.1007/978-3-540-72354-7\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KasperCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KimKRHKL07,
  author       = {HeeSeok Kim and
                  Tae Hyun Kim and
                  Jeong Choon Ryoo and
                  Dong{-}Guk Han and
                  Howon Kim and
                  Jongin Lim},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Enhanced Doubling Attacks on Signed-All-Bits Set Recoding},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {39--52},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_4},
  doi          = {10.1007/978-3-540-72354-7\_4},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/KimKRHKL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KimQ07,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Fault Attacks for {CRT} Based {RSA:} New Attacks, New Results, and
                  New Countermeasures},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {215--228},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_18},
  doi          = {10.1007/978-3-540-72354-7\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KimQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ParadinasCB07,
  author       = {Pierre Paradinas and
                  Julien Cordry and
                  Samia Bouzefrane},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Performance Evaluation of Java Card Bytecodes},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {127--137},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_11},
  doi          = {10.1007/978-3-540-72354-7\_11},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ParadinasCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SantiagoV07,
  author       = {Judson Santiago and
                  Laurent Vigneron},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Optimistic Non-repudiation Protocol Analysis},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {90--101},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_8},
  doi          = {10.1007/978-3-540-72354-7\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SantiagoV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SevincSB07,
  author       = {Paul E. Sevin{\c{c}} and
                  Mario Strasser and
                  David A. Basin},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Securing the Distribution and Storage of Secrets with Trusted Platform
                  Modules},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {53--66},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_5},
  doi          = {10.1007/978-3-540-72354-7\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SevincSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SorboGP07,
  author       = {Aniello Del Sorbo and
                  Clemente Galdi and
                  Giuseppe Persiano},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Distributed Certified Information Access for Mobile Devices},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {67--79},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_6},
  doi          = {10.1007/978-3-540-72354-7\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SorboGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TunstallB07,
  author       = {Michael Tunstall and
                  Olivier Beno{\^{\i}}t},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Efficient Use of Random Delays in Embedded Software},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {27--38},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_3},
  doi          = {10.1007/978-3-540-72354-7\_3},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/TunstallB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/VaterPL07,
  author       = {Frank Vater and
                  Steffen Peter and
                  Peter Langend{\"{o}}rfer},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Combinatorial Logic Circuitry as Means to Protect Low Cost Devices
                  Against Side Channel Attacks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {244--253},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_20},
  doi          = {10.1007/978-3-540-72354-7\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/VaterPL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/VermoenWG07,
  author       = {Dennis Vermoen and
                  Marc F. Witteman and
                  Georgi Gaydadjiev},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Reverse Engineering Java Card Applets Using Power Analysis},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {138--149},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_12},
  doi          = {10.1007/978-3-540-72354-7\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/VermoenWG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YapHG07,
  author       = {Wun{-}She Yap and
                  Swee{-}Huay Heng and
                  Bok{-}Min Goi},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptanalysis of Some Proxy Signature Schemes Without Certificates},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_10},
  doi          = {10.1007/978-3-540-72354-7\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YapHG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YoonLY07,
  author       = {Eun{-}Jun Yoon and
                  Wan{-}Soo Lee and
                  Kee{-}Young Yoo},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Secure Remote User Authentication Scheme Using Bilinear Pairings},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {102--114},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_9},
  doi          = {10.1007/978-3-540-72354-7\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YoonLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2007,
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7},
  doi          = {10.1007/978-3-540-72354-7},
  isbn         = {978-3-540-72353-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}