


default search action
13th WISTP 2019: Paris, France
- Maryline Laurent
, Thanassis Giannetsos
:
Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings. Lecture Notes in Computer Science 12024, Springer 2020, ISBN 978-3-030-41701-7 - Gaëlle Candel, Rémi Géraud-Stewart
, David Naccache:
How to Compartment Secrets. 3-11
Authentication
- Nada El Kassem
, Luís Fiolhais, Paulo Martins, Liqun Chen
, Leonel Sousa
:
A Lattice-Based Enhanced Privacy ID. 15-31 - Diana Maimut
, George Teseleanu
:
A Generic View on the Unified Zero-Knowledge Protocol and Its Applications. 32-46
Cryptography
- Hardik Gajera, Matthieu Giraud, David Gérault, Manik Lal Das, Pascal Lafourcade
:
Verifiable and Private Oblivious Polynomial Evaluation. 49-65 - Simon Landry
, Yanis Linge
, Emmanuel Prouff
:
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations. 66-84 - Hafsa Assidi, El Mamoun Souidi
:
Strong Designated Verifier Signature Based on the Rank Metric. 85-102 - Hao Cheng, Daniel Dinu, Johann Großschädl, Peter B. Rønne
, Peter Y. A. Ryan:
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things. 103-119
Threats
- Thomas Trouchkine, Guillaume Bouffard
, Jessy Clédière
:
Fault Injection Characterization on Modern CPUs. 123-138 - Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote:
Threat Analysis of Poisoning Attack Against Ethereum Blockchain. 139-154 - Jeremy W. Bryans
, Lin Shen Liew, Hoang Nga Nguyen
, Giedre Sabaliauskaite
, Siraj A. Shaikh
, Fengjun Zhou:
A Template-Based Method for the Generation of Attack Trees. 155-165
Cybersecurity
- Eva Gagliardi, Olivier Levillain
:
Analysis of QUIC Session Establishment and Its Implementations. 169-184 - Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
CompactFlow: A Hybrid Binary Format for Network Flow Data. 185-201 - Philipp Jakubeit, Albert Dercksen, Andreas Peter:
SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities. 202-219
Internet of Things
- Nicolas Dejon
, Davide Caputo
, Luca Verderame
, Alessandro Armando
, Alessio Merlo
:
Automated Security Analysis of IoT Software Updates. 223-239 - Tidiane Sylla
, Mohamed Aymen Chalouf
, Francine Krief
, Karim Samaké:
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things. 240-252

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.