Search dblp for Publications

export results for "toc:db/conf/wistp/wistp2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wistp/AkramK14,
  author       = {Raja Naeem Akram and
                  Ryan K. L. Ko},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {End-to-End Secure and Privacy Preserving Mobile Chat Application},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {124--139},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_9},
  doi          = {10.1007/978-3-662-43826-8\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/AkramK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BarbuG14,
  author       = {Guillaume Barbu and
                  Christophe Giraud},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {New Countermeasures against Fault and Software Type Confusion Attacks
                  on Java Cards},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {57--75},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_5},
  doi          = {10.1007/978-3-662-43826-8\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BarbuG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BogdanovEJKMW14,
  author       = {Dan Bogdanov and
                  Keita Emura and
                  Roman Jagom{\"{a}}gis and
                  Akira Kanaoka and
                  Shin'ichiro Matsuo and
                  Jan Willemson},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Secure Genetic Algorithm for the Subset Cover Problem and Its Application
                  to Privacy Protection},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {108--123},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_8},
  doi          = {10.1007/978-3-662-43826-8\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BogdanovEJKMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BringerCCGM14,
  author       = {Julien Bringer and
                  Claude Carlet and
                  Herv{\'{e}} Chabanne and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation
                  Paradigm in a Code, with Builtin Protection against Side-Channel and
                  Fault Attacks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_4},
  doi          = {10.1007/978-3-662-43826-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ChristinEH14,
  author       = {Delphine Christin and
                  Franziska Engelmann and
                  Matthias Hollick},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Usable Privacy for Mobile Sensing Applications},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {92--107},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_7},
  doi          = {10.1007/978-3-662-43826-8\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ChristinEH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/IgnatenkoP14,
  author       = {Tanya Ignatenko and
                  Milan Petkovic},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {{AU2EU:} Privacy-Preserving Matching of {DNA} Sequences},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {180--189},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_14},
  doi          = {10.1007/978-3-662-43826-8\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/IgnatenkoP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KangKJY14,
  author       = {Ju{-}Sung Kang and
                  Nayoung Kim and
                  Wangho Ju and
                  Okyeon Yi},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Security Analysis of Key Expansion Functions Using Pseudorandom
                  Permutations},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {10--23},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_2},
  doi          = {10.1007/978-3-662-43826-8\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KangKJY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KasperOP14,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Sweet Dreams and Nightmares: Security in the Internet of Things},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_1},
  doi          = {10.1007/978-3-662-43826-8\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KasperOP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ManifavasFRKP14,
  author       = {Charalampos Manifavas and
                  Konstantinos Fysarakis and
                  Konstantinos Rantos and
                  Konstantinos Kagiambakis and
                  Ioannis Papaefstathiou},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Policy-Based Access Control for Body Sensor Networks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {150--159},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_11},
  doi          = {10.1007/978-3-662-43826-8\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ManifavasFRKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MansorMM14,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {{CAN} Bus Risk Analysis Revisit},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {170--179},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_13},
  doi          = {10.1007/978-3-662-43826-8\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/MansorMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14,
  author       = {Yuto Nakano and
                  Youssef Souissi and
                  Robert Nguyen and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_6},
  doi          = {10.1007/978-3-662-43826-8\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PicekBJEG14,
  author       = {Stjepan Picek and
                  Lejla Batina and
                  Domagoj Jakobovic and
                  Baris Ege and
                  Marin Golub},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {S-box, SET, Match: {A} Toolbox for S-box Analysis},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {140--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_10},
  doi          = {10.1007/978-3-662-43826-8\_10},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PicekBJEG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SpreitzerG14,
  author       = {Raphael Spreitzer and
                  Beno{\^{\i}}t G{\'{e}}rard},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Towards More Practical Time-Driven Cache Attacks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {24--39},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_3},
  doi          = {10.1007/978-3-662-43826-8\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SpreitzerG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/XylogiannopoulosKA14,
  author       = {Konstantinos F. Xylogiannopoulos and
                  Panagiotis Karampelas and
                  Reda Alhajj},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Early DDoS Detection Based on Data Mining Techniques},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {190--199},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_15},
  doi          = {10.1007/978-3-662-43826-8\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/XylogiannopoulosKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ZuqueteGT14,
  author       = {Andr{\'{e}} Z{\'{u}}quete and
                  Helder Gomes and
                  Claudio Teixeira},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Personal Identification in the Web Using Electronic Identity Cards
                  and a Personal Identity Provider},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {160--169},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_12},
  doi          = {10.1007/978-3-662-43826-8\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ZuqueteGT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2014,
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8},
  doi          = {10.1007/978-3-662-43826-8},
  isbn         = {978-3-662-43825-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics