Search results for: Gildas Avoine
Lecture Notes in Computer Science > Cryptology and Network Security > Wireless and Sensor Network Security I > 119-133
IEEE Transactions on Mobile Computing > 2016 > 15 > 9 > 2317 - 2332
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Hardware Oriented Mechanisms > 125-140
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Efficient Representations > 260-274
Lecture Notes in Computer Science > Information Security and Privacy > Trust and Secret Sharing > 74-85
Lecture Notes in Computer Science > Radio Frequency Identification: Security and Privacy Issues > Session 5 > 239-257
Lecture Notes in Computer Science > Selected Areas in Cryptography > Protocols for RFID Tags > 291-306
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Privacy > 33-48
Lecture Notes in Computer Science > Information Security Applications > Secure Software, Hardware, and Systems I > 188-202
Lecture Notes in Computer Science > Dependable Computing - EDCC 5 > Session 1A: Distributed Algorithms > 55-71
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Lightweight Cryptology > 290-307
Lecture Notes in Computer Science > Radio Frequency Identification: Security and Privacy Issues > Session 5 > 220-238
Lecture Notes in Computer Science > Radio Frequency Identification: Security and Privacy Issues > Session 3 > 138-157
Lecture Notes in Computer Science > Smart Card Research and Advanced Applications > RFID Security > 289-299
Lecture Notes in Computer Science > Radio Frequency Identification: Security and Privacy Issues > Session 1 > 50-64
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Threat and Attacks > 1-15
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Privacy and Digital Rights > 98-115
Lecture Notes in Computer Science > Information Security > Identity Management and Authentication > 250-261
Lecture Notes in Computer Science > Radio Frequency Identification: Security and Privacy Issues > Session 2 > 103-122