Sign in
WISTP
2007
2011
2016
2020
2007
2020
Keyphrases
Publications
volume 12024, 2020
Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings
WISTP
12024 (2020)
2019
Simon Landry
,
Yanis Linge
,
Emmanuel Prouff
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations.
WISTP
(2019)
Teppei Sato
,
Mitsuyoshi Imamura
,
Kazumasa Omote
Threat Analysis of Poisoning Attack Against Ethereum Blockchain.
WISTP
(2019)
Eva Gagliardi
,
Olivier Levillain
Analysis of QUIC Session Establishment and Its Implementations.
WISTP
(2019)
Jeremy W. Bryans
,
Lin Shen Liew
,
Hoang Nga Nguyen
,
Giedre Sabaliauskaite
,
Siraj A. Shaikh
,
Fengjun Zhou
A Template-Based Method for the Generation of Attack Trees.
WISTP
(2019)
Hardik Gajera
,
Matthieu Giraud
,
David Gérault
,
Manik Lal Das
,
Pascal Lafourcade
Verifiable and Private Oblivious Polynomial Evaluation.
WISTP
(2019)
Hafsa Assidi
,
El Mamoun Souidi
Strong Designated Verifier Signature Based on the Rank Metric.
WISTP
(2019)
Gaëlle Candel
,
Rémi Géraud-Stewart
,
David Naccache
How to Compartment Secrets.
WISTP
(2019)
Nada El Kassem
,
Luís Fiolhais
,
Paulo Martins
,
Liqun Chen
,
Leonel Sousa
A Lattice-Based Enhanced Privacy ID.
WISTP
(2019)
Nicolas Dejon
,
Davide Caputo
,
Luca Verderame
,
Alessandro Armando
,
Alessio Merlo
Automated Security Analysis of IoT Software Updates.
WISTP
(2019)
Michal Piskozub
,
Riccardo Spolaor
,
Ivan Martinovic
CompactFlow: A Hybrid Binary Format for Network Flow Data.
WISTP
(2019)
Thomas Trouchkine
,
Guillaume Bouffard
,
Jessy Clédière
Fault Injection Characterization on Modern CPUs.
WISTP
(2019)
Philipp Jakubeit
,
Albert Dercksen
,
Andreas Peter
SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities.
WISTP
(2019)
Diana Maimut
,
George Teseleanu
A Generic View on the Unified Zero-Knowledge Protocol and Its Applications.
WISTP
(2019)
Tidiane Sylla
,
Mohamed Aymen Chalouf
,
Francine Krief
,
Karim Samaké
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things.
WISTP
(2019)
Hao Cheng
,
Daniel Dinu
,
Johann Großschädl
,
Peter B. Rønne
,
Peter Y. A. Ryan
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things.
WISTP
(2019)
volume 11469, 2019
Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers
WISTP
11469 (2019)
2018
Bruno Bogaz Zarpelão
,
Rodrigo Sanches Miani
,
Muttukrishnan Rajarajan
Detection of Bitcoin-Based Botnets Using a One-Class Classifier.
WISTP
(2018)
Hiroki Okada
,
Carlos Cid
,
Seira Hidano
,
Shinsaku Kiyomoto
Linear Depth Integer-Wise Homomorphic Division.
WISTP
(2018)
Juan D. Parra Rodriguez
A Generic Lightweight and Scalable Access Control Framework for IoT Gateways.
WISTP
(2018)
Mohamed Sami Rakha
,
Fahim T. Imam
,
Thomas R. Dean
Generating a Real-Time Constraint Engine for Network Protocols.
WISTP
(2018)
Carlton Shepherd
,
Raja Naeem Akram
,
Konstantinos Markantonakis
Remote Credential Management with Mutual Attestation for Trusted Execution Environments.
WISTP
(2018)
Sankalp Ghatpande
,
Johann Großschädl
,
Zhe Liu
A Family of Lightweight Twisted Edwards Curves for the Internet of Things.
WISTP
(2018)
Amandine Jambert
Blockchain and the GDPR: A Data Protection Authority Point of View.
WISTP
(2018)
Etienne Tehrani
,
Jean-Luc Danger
,
Tarik Graba
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers.
WISTP
(2018)
Damien Vergnaud
Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk).
WISTP
(2018)
Julia A. Meister
,
Raja Naeem Akram
,
Konstantinos Markantonakis
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper.
WISTP
(2018)
Adam Janovsky
,
Jan Krhovjak
,
Vashek Matyas
Bringing Kleptography to Real-World TLS.
WISTP
(2018)
Thulani Mashiane
,
Elmarie Kritzinger
Cybersecurity Behaviour: A Conceptual Taxonomy.
WISTP
(2018)
Louis Cianciullo
,
Hossein Ghodosi
Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation.
WISTP
(2018)
Soo-Kyung Eom
,
Hyang-Sook Lee
,
Seongan Lim
On the Non-repudiation of Isogeny Based Signature Scheme.
WISTP
(2018)
Khaled Karray
,
Jean-Luc Danger
,
Sylvain Guilley
,
Moulay Abdelaziz Elaabid
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection.
WISTP
(2018)
volume 10741, 2018
Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings
WISTP
10741 (2018)
2017
Shujie Cui
,
Ming Zhang
,
Muhammad Rizwan Asghar
,
Giovanni Russello
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database.
WISTP
(2017)
Yonas Leguesse
,
Mark Vella
,
Joshua Ellul
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics.
WISTP
(2017)
Sébanjila Kevin Bukasa
,
Ronan Lashermes
,
Hélène Le Bouder
,
Jean-Louis Lanet
,
Axel Legay
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip.
WISTP
(2017)
Hao Jiang
,
Ahmed Bouabdallah
JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language.
WISTP
(2017)
Ziya Alper Genç
,
Süleyman Kardas
,
Mehmet Sabir Kiraz
Examination of a New Defense Mechanism: Honeywords.
WISTP
(2017)
Raja Naeem Akram
,
Konstantinos Markantonakis
,
Keith Mayes
,
Pierre-François Bonnefoi
,
Amina Cherif
,
Damien Sauveron
,
Serge Chaumette
A Secure and Trusted Channel Protocol for UAVs Fleets.
WISTP
(2017)
Öznur Kalkar
,
Mehmet Sabir Kiraz
,
Isa Sertkaya
,
Osmanbey Uzunkol
A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps.
WISTP
(2017)
Pau Conejero-Alberola
,
M. Francisca Hinarejos
,
Josep Lluís Ferrer-Gomila
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons.
WISTP
(2017)
Danushka Jayasinghe
,
Sheila Cobourne
,
Konstantinos Markantonakis
,
Raja Naeem Akram
,
Keith Mayes
Philanthropy on the Blockchain.
WISTP
(2017)
Nektaria Kaloudi
,
Aikaterini Mitrokotsa
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?
WISTP
(2017)
Carlton Shepherd
,
Raja Naeem Akram
,
Konstantinos Markantonakis
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs.
WISTP
(2017)
Madeline Cheah
,
Hoang Nga Nguyen
,
Jeremy W. Bryans
,
Siraj A. Shaikh
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications.
WISTP
(2017)
2016
Panagiotis Papadopoulos
,
Elias Athanasopoulos
,
Eleni Kosta
,
George Siganos
,
Angelos D. Keromytis
,
Evangelos P. Markatos
Provable Network Activity for Protecting Users Against False Accusation.
WISTP
(2016)
Leila Bahri
,
Barbara Carminati
,
Elena Ferrari
,
William Lucia
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks.
WISTP
(2016)
Ahmad Sabouri
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment.
WISTP
(2016)
Hervé Chabanne
,
Julien Keuffer
,
Roch Lescuyer
Delegating Biometric Authentication with the Sumcheck Protocol.
WISTP
(2016)
volume 9895, 2016
Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
WISTP
9895 (2016)