WISTP C

13 papers

YearTitle / Authors
2009A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.
Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz
2009Algebraic Attacks on RFID Protocols.
Ton van Deursen, Sasa Radomirovic
2009Anti-counterfeiting Using Memory Spots.
Helen Balinsky, Edward McDonnell, Liqun Chen, Keith A. Harrison
2009Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.
Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich
2009Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings
Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater
2009Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks.
J. A. M. Naranjo, Juan Antonio López-Ramos, Leocadio G. Casado
2009Measurement Analysis When Benchmarking Java Card Platforms.
Pierre Paradinas, Julien Cordry, Samia Bouzefrane
2009On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
2009On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks.
Olivier Heen, Gilles Guette, Thomas Genet
2009PKIX Certificate Status in Hybrid MANETs.
Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau
2009Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card.
Hendrik Tews, Bart Jacobs
2009Privacy-Aware Location Database Service for Granular Queries.
Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima
2009Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure.
Keith M. Martin, Maura B. Paterson