Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wistp/wistp2014.bht:"
@inproceedings{DBLP:conf/wistp/AkramK14, author = {Raja Naeem Akram and Ryan K. L. Ko}, editor = {David Naccache and Damien Sauveron}, title = {End-to-End Secure and Privacy Preserving Mobile Chat Application}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {124--139}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_9}, doi = {10.1007/978-3-662-43826-8\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/AkramK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BarbuG14, author = {Guillaume Barbu and Christophe Giraud}, editor = {David Naccache and Damien Sauveron}, title = {New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {57--75}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_5}, doi = {10.1007/978-3-662-43826-8\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BarbuG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BogdanovEJKMW14, author = {Dan Bogdanov and Keita Emura and Roman Jagom{\"{a}}gis and Akira Kanaoka and Shin'ichiro Matsuo and Jan Willemson}, editor = {David Naccache and Damien Sauveron}, title = {A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {108--123}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_8}, doi = {10.1007/978-3-662-43826-8\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BogdanovEJKMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BringerCCGM14, author = {Julien Bringer and Claude Carlet and Herv{\'{e}} Chabanne and Sylvain Guilley and Houssem Maghrebi}, editor = {David Naccache and Damien Sauveron}, title = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {40--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_4}, doi = {10.1007/978-3-662-43826-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ChristinEH14, author = {Delphine Christin and Franziska Engelmann and Matthias Hollick}, editor = {David Naccache and Damien Sauveron}, title = {Usable Privacy for Mobile Sensing Applications}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {92--107}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_7}, doi = {10.1007/978-3-662-43826-8\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ChristinEH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/IgnatenkoP14, author = {Tanya Ignatenko and Milan Petkovic}, editor = {David Naccache and Damien Sauveron}, title = {{AU2EU:} Privacy-Preserving Matching of {DNA} Sequences}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {180--189}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_14}, doi = {10.1007/978-3-662-43826-8\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/IgnatenkoP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KangKJY14, author = {Ju{-}Sung Kang and Nayoung Kim and Wangho Ju and Okyeon Yi}, editor = {David Naccache and Damien Sauveron}, title = {A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {10--23}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_2}, doi = {10.1007/978-3-662-43826-8\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KangKJY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KasperOP14, author = {Timo Kasper and David F. Oswald and Christof Paar}, editor = {David Naccache and Damien Sauveron}, title = {Sweet Dreams and Nightmares: Security in the Internet of Things}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {1--9}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_1}, doi = {10.1007/978-3-662-43826-8\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KasperOP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ManifavasFRKP14, author = {Charalampos Manifavas and Konstantinos Fysarakis and Konstantinos Rantos and Konstantinos Kagiambakis and Ioannis Papaefstathiou}, editor = {David Naccache and Damien Sauveron}, title = {Policy-Based Access Control for Body Sensor Networks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {150--159}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_11}, doi = {10.1007/978-3-662-43826-8\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ManifavasFRKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MansorMM14, author = {Hafizah Mansor and Konstantinos Markantonakis and Keith Mayes}, editor = {David Naccache and Damien Sauveron}, title = {{CAN} Bus Risk Analysis Revisit}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {170--179}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_13}, doi = {10.1007/978-3-662-43826-8\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/MansorMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14, author = {Yuto Nakano and Youssef Souissi and Robert Nguyen and Laurent Sauvage and Jean{-}Luc Danger and Sylvain Guilley and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {David Naccache and Damien Sauveron}, title = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {76--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_6}, doi = {10.1007/978-3-662-43826-8\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PicekBJEG14, author = {Stjepan Picek and Lejla Batina and Domagoj Jakobovic and Baris Ege and Marin Golub}, editor = {David Naccache and Damien Sauveron}, title = {S-box, SET, Match: {A} Toolbox for S-box Analysis}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {140--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_10}, doi = {10.1007/978-3-662-43826-8\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PicekBJEG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SpreitzerG14, author = {Raphael Spreitzer and Beno{\^{\i}}t G{\'{e}}rard}, editor = {David Naccache and Damien Sauveron}, title = {Towards More Practical Time-Driven Cache Attacks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {24--39}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_3}, doi = {10.1007/978-3-662-43826-8\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SpreitzerG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/XylogiannopoulosKA14, author = {Konstantinos F. Xylogiannopoulos and Panagiotis Karampelas and Reda Alhajj}, editor = {David Naccache and Damien Sauveron}, title = {Early DDoS Detection Based on Data Mining Techniques}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {190--199}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_15}, doi = {10.1007/978-3-662-43826-8\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/XylogiannopoulosKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ZuqueteGT14, author = {Andr{\'{e}} Z{\'{u}}quete and Helder Gomes and Claudio Teixeira}, editor = {David Naccache and Damien Sauveron}, title = {Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {160--169}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_12}, doi = {10.1007/978-3-662-43826-8\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ZuqueteGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2014, editor = {David Naccache and Damien Sauveron}, title = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8}, doi = {10.1007/978-3-662-43826-8}, isbn = {978-3-662-43825-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.