Search dblp for Publications

export results for "toc:db/conf/wistp/wistp2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wistp/AlpcanBS10,
  author       = {Tansu Alpcan and
                  Christian Bauckhage and
                  Aubrey{-}Derrick Schmidt},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_3},
  doi          = {10.1007/978-3-642-12368-9\_3},
  timestamp    = {Fri, 27 Mar 2020 08:56:51 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/AlpcanBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BackesC10,
  author       = {Werner Backes and
                  Jared Cordasco},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {MoteAODV - An {AODV} Implementation for TinyOS 2.0},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_11},
  doi          = {10.1007/978-3-642-12368-9\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BackesC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BraunMW10,
  author       = {Michael Braun and
                  Ulrike Meyer and
                  Susanne Wetzel},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Efficient Mutual Authentication for Multi-domain {RFID} Systems Using
                  Distributed Signatures},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_9},
  doi          = {10.1007/978-3-642-12368-9\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BraunMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BruckerPW10,
  author       = {Achim D. Brucker and
                  Helmut Petritsch and
                  Stefan G. Weber},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Attribute-Based Encryption with Break-Glass},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {237--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_18},
  doi          = {10.1007/978-3-642-12368-9\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BruckerPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CattaneoFPV10,
  author       = {Giuseppe Cattaneo and
                  Pompeo Faruolo and
                  Vincenzo Palazzo and
                  Ivan Visconti},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Proxy Smart Card Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_15},
  doi          = {10.1007/978-3-642-12368-9\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CattaneoFPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CatuognoG10,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {On the Security of a Two-Factor Authentication Scheme},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {245--252},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_19},
  doi          = {10.1007/978-3-642-12368-9\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/CatuognoG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Delgado-MohatarSBF10,
  author       = {Oscar Delgado{-}Mohatar and
                  Jos{\'{e}} M. Sierra and
                  Ljiljana Brankovic and
                  Amparo F{\'{u}}ster{-}Sabater},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {An Energy-Efficient Symmetric Cryptography Based Authentication Scheme
                  for Wireless Sensor Networks},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {332--339},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_27},
  doi          = {10.1007/978-3-642-12368-9\_27},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Delgado-MohatarSBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DragoniGM10,
  author       = {Nicola Dragoni and
                  Olga Gadyatskaya and
                  Fabio Massacci},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Can We Support Applications' Evolution in Multi-application Smart
                  Cards by Security-by-Contract?},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {221--228},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_16},
  doi          = {10.1007/978-3-642-12368-9\_16},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/DragoniGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GarciaO10,
  author       = {Sergio S{\'{a}}nchez Garc{\'{\i}}a and
                  Ana G{\'{o}}mez Oliva},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Improvements of pan-European {IDM} Architecture to Enable Identity
                  Delegation Based on {X.509} Proxy Certificates and {SAML}},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_13},
  doi          = {10.1007/978-3-642-12368-9\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GarciaO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GerguriMRS10,
  author       = {Shkodran Gerguri and
                  V{\'{a}}clav Maty{\'{a}}s Jr. and
                  Zdenek R{\'{\i}}ha and
                  Ludek Smol{\'{\i}}k},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Random Number Generation Based on Fingerprints},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {170--182},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_12},
  doi          = {10.1007/978-3-642-12368-9\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GerguriMRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GuindeZ10,
  author       = {Nitesh B. Guinde and
                  Sotirios G. Ziavras},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Novel FPGA-Based Signature Matching for Deep Packet Inspection},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {261--276},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_21},
  doi          = {10.1007/978-3-642-12368-9\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GuindeZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HartMM10,
  author       = {Jonathan Hart and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Website Credential Storage and Two-Factor Web Authentication with
                  a Java {SIM}},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {229--236},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_17},
  doi          = {10.1007/978-3-642-12368-9\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HartMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HoepmanJ10,
  author       = {Jaap{-}Henk Hoepman and
                  Rieks Joosten},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Practical Schemes for Privacy and Security Enhanced {RFID}},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_10},
  doi          = {10.1007/978-3-642-12368-9\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HoepmanJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KaindaFR10,
  author       = {Ronald Kainda and
                  Ivan Flechais and
                  A. W. Roscoe},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Secure and Usable Out-Of-Band Channels for \emph{Ad Hoc} Mobile Device
                  Interactions},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {308--315},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_24},
  doi          = {10.1007/978-3-642-12368-9\_24},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KaindaFR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KuntzeRF10,
  author       = {Nicolai Kuntze and
                  Carsten Rudolph and
                  Andreas Fuchs},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Trust in Peer-to-Peer Content Distribution Protocols},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {76--89},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_6},
  doi          = {10.1007/978-3-642-12368-9\_6},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KuntzeRF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LiWYY10,
  author       = {Huiyun Li and
                  Keke Wu and
                  Fengqi Yu and
                  Hai Yuan},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Evaluation Metrics of Physical Non-invasive Security},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {60--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_5},
  doi          = {10.1007/978-3-642-12368-9\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LiWYY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LoinigSWH10,
  author       = {Johannes Loinig and
                  Christian Steger and
                  Reinhold Weiss and
                  Ernst Haselsteiner},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Identification and Verification of Security Relevant Functions in
                  Embedded Systems Based on Source Code Annotations and Assertions},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {316--323},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_25},
  doi          = {10.1007/978-3-642-12368-9\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LoinigSWH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Novotny10,
  author       = {Mari{\'{a}}n Novotn{\'{y}}},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Design and Analysis of a Generalized Canvas Protocol},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {106--121},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_8},
  doi          = {10.1007/978-3-642-12368-9\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Novotny10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RaddumNH10,
  author       = {H{\aa}vard Raddum and
                  Lars Hopland Nest{\aa}s and
                  Kjell J{\o}rgen Hole},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Security Analysis of Mobile Phones Used as {OTP} Generators},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {324--331},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_26},
  doi          = {10.1007/978-3-642-12368-9\_26},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RaddumNH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Rossnagel10,
  author       = {Heiko Rossnagel},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {The Market Failure of Anonymity Services},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_28},
  doi          = {10.1007/978-3-642-12368-9\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Rossnagel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RuhrmairCSLSC10,
  author       = {Ulrich R{\"{u}}hrmair and
                  Qingqing Chen and
                  Martin Stutzmann and
                  Paolo Lugli and
                  Ulf Schlichtmann and
                  Gy{\"{o}}rgy Csaba},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Towards Electrical, Integrated Implementations of {SIMPL} Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_22},
  doi          = {10.1007/978-3-642-12368-9\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/RuhrmairCSLSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Ruiz-AgundezPB10,
  author       = {Igor Ruiz{-}Agundez and
                  Yoseba K. Penya and
                  Pablo Garc{\'{\i}}a Bringas},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Fraud Detection for Voice over {IP} Services on Next-Generation Networks},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {199--212},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_14},
  doi          = {10.1007/978-3-642-12368-9\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/Ruiz-AgundezPB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RusselloS10,
  author       = {Giovanni Russello and
                  Enrico Scalavino},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {355--367},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_29},
  doi          = {10.1007/978-3-642-12368-9\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RusselloS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Sarier10,
  author       = {Neyire Deniz Sarier},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Generic Constructions of Biometric Identity Based Encryption Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {90--105},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_7},
  doi          = {10.1007/978-3-642-12368-9\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Sarier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/StrackxYPP10,
  author       = {Raoul Strackx and
                  Yves Younan and
                  Pieter Philippaerts and
                  Frank Piessens},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Efficient and Effective Buffer Overflow Protection on {ARM} Processors},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_1},
  doi          = {10.1007/978-3-642-12368-9\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/StrackxYPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Strenzke10,
  author       = {Falko Strenzke},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A Smart Card Implementation of the McEliece {PKC}},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_4},
  doi          = {10.1007/978-3-642-12368-9\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Strenzke10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Venelli10,
  author       = {Alexandre Venelli},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Efficient Entropy Estimation for Mutual Information Analysis Using
                  B-Splines},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {17--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_2},
  doi          = {10.1007/978-3-642-12368-9\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/Venelli10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YamamotoIY10,
  author       = {Dai Yamamoto and
                  Kouichi Itoh and
                  Jun Yajima},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A Very Compact Hardware Implementation of the {KASUMI} Block Cipher},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_23},
  doi          = {10.1007/978-3-642-12368-9\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YamamotoIY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YaseenP10,
  author       = {Qussai Yaseen and
                  Brajendra Panda},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Predicting and Preventing Insider Threat in Relational Database Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {368--383},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_30},
  doi          = {10.1007/978-3-642-12368-9\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YaseenP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ZhengO10,
  author       = {Xianghan Zheng and
                  Vladimir A. Oleshchuk},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {The Design of Secure and Efficient {P2PSIP} Communication Systems},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {253--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_20},
  doi          = {10.1007/978-3-642-12368-9\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ZhengO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2010,
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9},
  doi          = {10.1007/978-3-642-12368-9},
  isbn         = {978-3-642-12367-2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics