Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wistp/wistp2010.bht:"
@inproceedings{DBLP:conf/wistp/AlpcanBS10, author = {Tansu Alpcan and Christian Bauckhage and Aubrey{-}Derrick Schmidt}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {31--46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_3}, doi = {10.1007/978-3-642-12368-9\_3}, timestamp = {Fri, 27 Mar 2020 08:56:51 +0100}, biburl = {https://dblp.org/rec/conf/wistp/AlpcanBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BackesC10, author = {Werner Backes and Jared Cordasco}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {MoteAODV - An {AODV} Implementation for TinyOS 2.0}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {154--169}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_11}, doi = {10.1007/978-3-642-12368-9\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BackesC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BraunMW10, author = {Michael Braun and Ulrike Meyer and Susanne Wetzel}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Efficient Mutual Authentication for Multi-domain {RFID} Systems Using Distributed Signatures}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {122--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_9}, doi = {10.1007/978-3-642-12368-9\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BraunMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BruckerPW10, author = {Achim D. Brucker and Helmut Petritsch and Stefan G. Weber}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Attribute-Based Encryption with Break-Glass}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {237--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_18}, doi = {10.1007/978-3-642-12368-9\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BruckerPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CattaneoFPV10, author = {Giuseppe Cattaneo and Pompeo Faruolo and Vincenzo Palazzo and Ivan Visconti}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Proxy Smart Card Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {213--220}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_15}, doi = {10.1007/978-3-642-12368-9\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CattaneoFPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CatuognoG10, author = {Luigi Catuogno and Clemente Galdi}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {On the Security of a Two-Factor Authentication Scheme}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {245--252}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_19}, doi = {10.1007/978-3-642-12368-9\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CatuognoG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Delgado-MohatarSBF10, author = {Oscar Delgado{-}Mohatar and Jos{\'{e}} M. Sierra and Ljiljana Brankovic and Amparo F{\'{u}}ster{-}Sabater}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {332--339}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_27}, doi = {10.1007/978-3-642-12368-9\_27}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Delgado-MohatarSBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DragoniGM10, author = {Nicola Dragoni and Olga Gadyatskaya and Fabio Massacci}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {221--228}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_16}, doi = {10.1007/978-3-642-12368-9\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/DragoniGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GarciaO10, author = {Sergio S{\'{a}}nchez Garc{\'{\i}}a and Ana G{\'{o}}mez Oliva}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Improvements of pan-European {IDM} Architecture to Enable Identity Delegation Based on {X.509} Proxy Certificates and {SAML}}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {183--198}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_13}, doi = {10.1007/978-3-642-12368-9\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GarciaO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GerguriMRS10, author = {Shkodran Gerguri and V{\'{a}}clav Maty{\'{a}}s Jr. and Zdenek R{\'{\i}}ha and Ludek Smol{\'{\i}}k}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Random Number Generation Based on Fingerprints}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {170--182}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_12}, doi = {10.1007/978-3-642-12368-9\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GerguriMRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GuindeZ10, author = {Nitesh B. Guinde and Sotirios G. Ziavras}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Novel FPGA-Based Signature Matching for Deep Packet Inspection}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {261--276}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_21}, doi = {10.1007/978-3-642-12368-9\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GuindeZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HartMM10, author = {Jonathan Hart and Konstantinos Markantonakis and Keith Mayes}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Website Credential Storage and Two-Factor Web Authentication with a Java {SIM}}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {229--236}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_17}, doi = {10.1007/978-3-642-12368-9\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HartMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HoepmanJ10, author = {Jaap{-}Henk Hoepman and Rieks Joosten}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Practical Schemes for Privacy and Security Enhanced {RFID}}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {138--153}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_10}, doi = {10.1007/978-3-642-12368-9\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HoepmanJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KaindaFR10, author = {Ronald Kainda and Ivan Flechais and A. W. Roscoe}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Secure and Usable Out-Of-Band Channels for \emph{Ad Hoc} Mobile Device Interactions}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {308--315}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_24}, doi = {10.1007/978-3-642-12368-9\_24}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KaindaFR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KuntzeRF10, author = {Nicolai Kuntze and Carsten Rudolph and Andreas Fuchs}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Trust in Peer-to-Peer Content Distribution Protocols}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {76--89}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_6}, doi = {10.1007/978-3-642-12368-9\_6}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KuntzeRF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LiWYY10, author = {Huiyun Li and Keke Wu and Fengqi Yu and Hai Yuan}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Evaluation Metrics of Physical Non-invasive Security}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {60--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_5}, doi = {10.1007/978-3-642-12368-9\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LiWYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LoinigSWH10, author = {Johannes Loinig and Christian Steger and Reinhold Weiss and Ernst Haselsteiner}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {316--323}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_25}, doi = {10.1007/978-3-642-12368-9\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LoinigSWH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Novotny10, author = {Mari{\'{a}}n Novotn{\'{y}}}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Design and Analysis of a Generalized Canvas Protocol}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {106--121}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_8}, doi = {10.1007/978-3-642-12368-9\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Novotny10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RaddumNH10, author = {H{\aa}vard Raddum and Lars Hopland Nest{\aa}s and Kjell J{\o}rgen Hole}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Security Analysis of Mobile Phones Used as {OTP} Generators}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {324--331}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_26}, doi = {10.1007/978-3-642-12368-9\_26}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RaddumNH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Rossnagel10, author = {Heiko Rossnagel}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {The Market Failure of Anonymity Services}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {340--354}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_28}, doi = {10.1007/978-3-642-12368-9\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Rossnagel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RuhrmairCSLSC10, author = {Ulrich R{\"{u}}hrmair and Qingqing Chen and Martin Stutzmann and Paolo Lugli and Ulf Schlichtmann and Gy{\"{o}}rgy Csaba}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Towards Electrical, Integrated Implementations of {SIMPL} Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {277--292}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_22}, doi = {10.1007/978-3-642-12368-9\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/RuhrmairCSLSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Ruiz-AgundezPB10, author = {Igor Ruiz{-}Agundez and Yoseba K. Penya and Pablo Garc{\'{\i}}a Bringas}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Fraud Detection for Voice over {IP} Services on Next-Generation Networks}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {199--212}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_14}, doi = {10.1007/978-3-642-12368-9\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/Ruiz-AgundezPB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RusselloS10, author = {Giovanni Russello and Enrico Scalavino}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {355--367}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_29}, doi = {10.1007/978-3-642-12368-9\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RusselloS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Sarier10, author = {Neyire Deniz Sarier}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Generic Constructions of Biometric Identity Based Encryption Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {90--105}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_7}, doi = {10.1007/978-3-642-12368-9\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Sarier10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/StrackxYPP10, author = {Raoul Strackx and Yves Younan and Pieter Philippaerts and Frank Piessens}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Efficient and Effective Buffer Overflow Protection on {ARM} Processors}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {1--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_1}, doi = {10.1007/978-3-642-12368-9\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/StrackxYPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Strenzke10, author = {Falko Strenzke}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {A Smart Card Implementation of the McEliece {PKC}}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {47--59}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_4}, doi = {10.1007/978-3-642-12368-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Strenzke10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Venelli10, author = {Alexandre Venelli}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {17--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_2}, doi = {10.1007/978-3-642-12368-9\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/Venelli10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/YamamotoIY10, author = {Dai Yamamoto and Kouichi Itoh and Jun Yajima}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {A Very Compact Hardware Implementation of the {KASUMI} Block Cipher}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {293--307}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_23}, doi = {10.1007/978-3-642-12368-9\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/YamamotoIY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/YaseenP10, author = {Qussai Yaseen and Brajendra Panda}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Predicting and Preventing Insider Threat in Relational Database Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {368--383}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_30}, doi = {10.1007/978-3-642-12368-9\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/YaseenP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ZhengO10, author = {Xianghan Zheng and Vladimir A. Oleshchuk}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {The Design of Secure and Efficient {P2PSIP} Communication Systems}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {253--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_20}, doi = {10.1007/978-3-642-12368-9\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ZhengO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2010, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9}, doi = {10.1007/978-3-642-12368-9}, isbn = {978-3-642-12367-2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.