WISTP C

29 papers

YearTitle / Authors
2011A Comparison of Post-Processing Techniques for Biased Random Number Generators.
Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan
2011A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines.
Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer
2011A SMS-Based Mobile Botnet Using Flooding Algorithm.
Jingyu Hua, Kouichi Sakurai
2011A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area.
Savvas Mousionis, Alex Vakaloudis, Constantinos S. Hilas
2011AES Variants Secure against Related-Key Differential and Boomerang Attacks.
Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
2011Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.
Mark Manulis, Bertram Poettering
2011An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control.
Paolo D'Arco
2011An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture.
Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page
2011Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard.
Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref
2011Can Code Polymorphism Limit Information Leakage?
Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall
2011Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault.
Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali
2011Entropy of Selectively Encrypted Strings.
Reine Lundin, Stefan Lindskog
2011FIRE: Fault Injection for Reverse Engineering.
Manuel San Pedro, Mate Soos, Sylvain Guilley
2011Formal Analysis of Security Metrics and Risk.
Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin
2011Formal Framework for the Evaluation of Waveform Resynchronization Algorithms.
Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger
2011Hardware Trojan Side-Channels Based on Physical Unclonable Functions.
Zheng Gong, Marc X. Makkes
2011Information Leakage Discovery Techniques to Enhance Secure Chip Design.
Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia
2011Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
Claudio A. Ardagna, Jianying Zhou
2011Leakage Squeezing Countermeasure against High-Order Attacks.
Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger
2011Mobile Electronic Identity: Securing Payment on Mobile Phones.
Chen Bangdao, A. W. Roscoe
2011Practical Attacks on HB and HB+ Protocols.
Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada
2011Privacy Protection for Smartphones: An Ontology-Based Firewall.
Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger
2011Privacy Respecting Targeted Advertising for Social Networks.
Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg
2011Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems.
Antonios Gouglidis, Ioannis Mavridis
2011SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key.
Chunhua Chen, Chris J. Mitchell, Shaohua Tang
2011STORM - Collaborative Security Management Environment.
Theodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou
2011Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network.
Kun Peng
2011Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library.
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
2011Trust Agreement in Wireless Mesh Networks.
Andreas Noack