The SCEAS System
Navigation Menu

Conferences in DBLP

(wistp)
2007 (conf/wistp/2007)

  1. Eve Atallah, Serge Chaumette
    A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:1-13 [Conf]
  2. Chakib Bekara, Maryline Laurent-Maknavicius
    A New Resilient Key Management Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:14-26 [Conf]
  3. Michael Tunstall, Olivier Benoit
    Efficient Use of Random Delays in Embedded Software. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:27-38 [Conf]
  4. HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim
    Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:39-52 [Conf]
  5. Paul E. Sevinç, Mario Strasser, David A. Basin
    Securing the Distribution and Storage of Secrets with Trusted Platform Modules. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:53-66 [Conf]
  6. Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano
    Distributed Certified Information Access for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:67-79 [Conf]
  7. Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
    Linkability of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:80-89 [Conf]
  8. Judson Santiago, Laurent Vigneron
    Optimistic Non-repudiation Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:90-101 [Conf]
  9. Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
    Secure Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:102-114 [Conf]
  10. Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
    Cryptanalysis of Some Proxy Signature Schemes Without Certificates. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:115-126 [Conf]
  11. Pierre Paradinas, Julien Cordry, Samia Bouzefrane
    Performance Evaluation of Java Card Bytecodes. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:127-137 [Conf]
  12. Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjiev
    Reverse Engineering Java Card Applets Using Power Analysis. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:138-149 [Conf]
  13. Timo Kasper, Dario Carluccio, Christof Paar
    An Embedded System for Practical Security Analysis of Contactless Smartcards. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:150-160 [Conf]
  14. Kevin Eagles, Constantinos Markantonakis, Keith Mayes
    A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:161-174 [Conf]
  15. Walter Bamberger, Oliver Welter, Stephan Spitz
    Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:175-188 [Conf]
  16. Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl
    An Information Flow Verifier for Small Embedded Systems. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:189-201 [Conf]
  17. Nicolas Fournel, Marine Minier, Stéphane Ubéda
    Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:202-214 [Conf]
  18. Chong Hee Kim, Jean-Jacques Quisquater
    Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:215-228 [Conf]
  19. Arnaud Boscher, Robert Naciri, Emmanuel Prouff
    CRT RSA Algorithm Protected Against Fault Attacks. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:229-243 [Conf]
  20. Frank Vater, Steffen Peter, Peter Langendörfer
    Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:244-253 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002