


default search action
8. WISTP 2014: Heraklion, Greece
- David Naccache, Damien Sauveron:

Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings. Lecture Notes in Computer Science 8501, Springer 2014, ISBN 978-3-662-43825-1
Invited Paper
- Timo Kasper, David F. Oswald

, Christof Paar:
Sweet Dreams and Nightmares: Security in the Internet of Things. 1-9
Cryptography and Cryptanalysis
- Ju-Sung Kang, Nayoung Kim, Wangho Ju, Okyeon Yi:

A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations. 10-23 - Raphael Spreitzer

, Benoît Gérard:
Towards More Practical Time-Driven Cache Attacks. 24-39 - Julien Bringer, Claude Carlet, Hervé Chabanne

, Sylvain Guilley, Houssem Maghrebi:
Orthogonal Direct Sum Masking - A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks. 40-56
Smart Cards and Embedded Devices
- Guillaume Barbu, Christophe Giraud

:
New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards. 57-75 - Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake:

A Pre-processing Composition for Secret Key Recovery on Android Smartphone. 76-91
Privacy
- Delphine Christin

, Franziska Engelmann, Matthias Hollick:
Usable Privacy for Mobile Sensing Applications. 92-107 - Dan Bogdanov

, Keita Emura
, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo, Jan Willemson:
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection. 108-123 - Raja Naeem Akram

, Ryan K. L. Ko
:
End-to-End Secure and Privacy Preserving Mobile Chat Application. 124-139
Short Papers
- Stjepan Picek, Lejla Batina, Domagoj Jakobovic

, Baris Ege, Marin Golub:
S-box, SET, Match: A Toolbox for S-box Analysis. 140-149 - Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou:

Policy-Based Access Control for Body Sensor Networks. 150-159 - André Zúquete

, Helder Gomes
, Claudio Teixeira
:
Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider. 160-169 - Hafizah Mansor

, Konstantinos Markantonakis
, Keith Mayes:
CAN Bus Risk Analysis Revisit. 170-179 - Tanya Ignatenko, Milan Petkovic:

AU2EU: Privacy-Preserving Matching of DNA Sequences. 180-189 - Konstantinos F. Xylogiannopoulos

, Panagiotis Karampelas
, Reda Alhajj:
Early DDoS Detection Based on Data Mining Techniques. 190-199

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














