|
Conferences in DBLP
(wistp) 2007 (conf/wistp/2007)
- Eve Atallah, Serge Chaumette
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:1-13 [Conf]
- Chakib Bekara, Maryline Laurent-Maknavicius
A New Resilient Key Management Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:14-26 [Conf]
- Michael Tunstall, Olivier Benoit
Efficient Use of Random Delays in Embedded Software. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:27-38 [Conf]
- HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:39-52 [Conf]
- Paul E. Sevinç, Mario Strasser, David A. Basin
Securing the Distribution and Storage of Secrets with Trusted Platform Modules. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:53-66 [Conf]
- Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano
Distributed Certified Information Access for Mobile Devices. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:67-79 [Conf]
- Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
Linkability of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:80-89 [Conf]
- Judson Santiago, Laurent Vigneron
Optimistic Non-repudiation Protocol Analysis. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:90-101 [Conf]
- Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
Secure Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:102-114 [Conf]
- Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:115-126 [Conf]
- Pierre Paradinas, Julien Cordry, Samia Bouzefrane
Performance Evaluation of Java Card Bytecodes. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:127-137 [Conf]
- Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjiev
Reverse Engineering Java Card Applets Using Power Analysis. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:138-149 [Conf]
- Timo Kasper, Dario Carluccio, Christof Paar
An Embedded System for Practical Security Analysis of Contactless Smartcards. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:150-160 [Conf]
- Kevin Eagles, Constantinos Markantonakis, Keith Mayes
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:161-174 [Conf]
- Walter Bamberger, Oliver Welter, Stephan Spitz
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:175-188 [Conf]
- Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl
An Information Flow Verifier for Small Embedded Systems. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:189-201 [Conf]
- Nicolas Fournel, Marine Minier, Stéphane Ubéda
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:202-214 [Conf]
- Chong Hee Kim, Jean-Jacques Quisquater
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:215-228 [Conf]
- Arnaud Boscher, Robert Naciri, Emmanuel Prouff
CRT RSA Algorithm Protected Against Fault Attacks. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:229-243 [Conf]
- Frank Vater, Steffen Peter, Peter Langendörfer
Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:244-253 [Conf]
|