researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2024
Filter by Tag
[+]
OR
AND
NOT
1
algebra
Java
Meta-Environment
analysis
architecture
certification
context-aware
contracts
data-flow
database
design
e-science
mobile
open-source
protocol
reverse engineering
rule-based
security
source-to-source
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Charalampos Manifavas
Clemente Galdi
Frank Piessens
Hoang Nga Nguyen
Ioannis Papaefstathiou
Jean-Luc Danger
Joachim Posegga
Johann Großschädl
Keith Mayes
Khoongming Khoo
Konstantinos Fysarakis
Konstantinos Markantonakis
Konstantinos Rantos
Michael Tunstall
Raja Naeem Akram
Samia Bouzefrane 0001
Shinsaku Kiyomoto
Siraj A. Shaikh
Stefan Tillich
Sylvain Guilley
Filter by Top terms
[+]
OR
AND
NOT
1
11.2
analysis
attacks
authentication
ifip
information
international
mobile
networks
privacy
proceedings
protocol
secure
security
smart
systems
theory
using
wg
wistp
WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP)
Editions
Publications
Viewing Publication 1 - 100 from 246
2024
Information Security Theory and Practice - 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 - March 1, 2024, Proceedings
Samia Bouzefrane 0001
,
Damien Sauveron
, editors,
Volume 14625 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Privacy Preserving Federated Learning: A Novel Approach for Combining Differential Privacy and Homomorphic Encryption
Rezak Aziz
,
Soumya Banerjee 0002
,
Samia Bouzefrane 0001
.
WISTP 2024
:
162-177
[doi]
A Bitcoin-Based Digital Identity Model for the Internet of Things
Youakim Badr
,
Xiaoyang Zhu
,
Samia Saad-Bouzefrane
,
Soumya Banerjee 0002
.
WISTP 2024
:
128-145
[doi]
Top Cyber Threats: The Rise of Ransomware
Amir Djenna
,
Mohamed Belaoued
,
Nourdine Lifa
.
WISTP 2024
:
80-95
[doi]
A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog
Ahmed Elmarkez
,
Soraya Mesli-Kesraoui
,
Flávio Oquendo
,
Pascal Berruet
,
Djamal Kesraoui
.
WISTP 2024
:
64-79
[doi]
SPAWN: Seamless Proximity-Based Authentication by Utilizing the Existent WiFi Environment
Philipp Jakubeit
,
Andreas Peter
,
Maarten van Steen
.
WISTP 2024
:
1-16
[doi]
Towards Interconnected Quantum Networks: A Requirements Analysis
Swantje Kastrup
,
Nils gentschen Felde
.
WISTP 2024
:
49-63
[doi]
Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture
Hussein Kazem
,
Nour El Madhoun
,
Samia Bouzefrane 0001
,
Pierrick Conord
.
WISTP 2024
:
111-127
[doi]
Combining Cryptography and Discrete-Event Systems to Study Sensor and Actuator Cyberattacks
Ahmed Khoumsi
,
Mohammed Erradi
,
Fahd Adni
.
WISTP 2024
:
33-48
[doi]
MQfilTTr: Strengthening Smart Home Privacy Through MQTT Traffic Manipulation
Henrich C. Pöhls
,
Sven Gebauer
,
Fabian Scharnböck
,
Korbinian Spielvogel
,
Joachim Posegga
.
WISTP 2024
:
17-32
[doi]
Towards a Time-Dependent Approach for User Privacy Expression and Enforcement
Nouredine Tamani
.
WISTP 2024
:
146-161
[doi]
Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions
Pranav Unni
,
Saumya Banerjee
,
Samia Bouzefrane 0001
.
WISTP 2024
:
96-110
[doi]
Distributed Backdoor Attacks in Federated Learning Generated by DynamicTriggers
Jian Wang
,
Hong Shen
,
Xuehua Liu
,
Hua Zhou
,
Yuli Li
.
WISTP 2024
:
178-193
[doi]
2020
Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings
Maryline Laurent
,
Thanassis Giannetsos
, editors,
Volume 12024 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
2019
Strong Designated Verifier Signature Based on the Rank Metric
Hafsa Assidi
,
El Mamoun Souidi
.
WISTP 2020
:
85-102
[doi]
Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers
Olivier Blazy
,
Chan Yeob Yeun
, editors,
Volume 11469 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
A Template-Based Method for the Generation of Attack Trees
Jeremy W. Bryans
,
Lin Shen Liew
,
Hoang Nga Nguyen
,
Giedre Sabaliauskaite
,
Siraj A. Shaikh
,
Fengjun Zhou
.
WISTP 2020
:
155-165
[doi]
How to Compartment Secrets
Gaëlle Candel
,
Rémi Géraud-Stewart
,
David Naccache
.
WISTP 2020
:
3-11
[doi]
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things
Hao Cheng
,
Daniel Dinu
,
Johann Großschädl
,
Peter B. Rønne
,
Peter Y. A. Ryan
.
WISTP 2020
:
103-119
[doi]
Automated Security Analysis of IoT Software Updates
Nicolas Dejon
,
Davide Caputo
,
Luca Verderame
,
Alessandro Armando
,
Alessio Merlo
.
WISTP 2020
:
223-239
[doi]
Analysis of QUIC Session Establishment and Its Implementations
Eva Gagliardi
,
Olivier Levillain
.
WISTP 2020
:
169-184
[doi]
Verifiable and Private Oblivious Polynomial Evaluation
Hardik Gajera
,
Matthieu Giraud
,
David Gérault
,
Manik Lal Das
,
Pascal Lafourcade 0001
.
WISTP 2020
:
49-65
[doi]
SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities
Philipp Jakubeit
,
Albert Dercksen
,
Andreas Peter
.
WISTP 2020
:
202-219
[doi]
A Lattice-Based Enhanced Privacy ID
Nada El Kassem
,
Luís Fiolhais
,
Paulo Martins 0002
,
Liqun Chen
,
Leonel Sousa
.
WISTP 2020
:
15-31
[doi]
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations
Simon Landry
,
Yanis Linge
,
Emmanuel Prouff
.
WISTP 2020
:
66-84
[doi]
A Generic View on the Unified Zero-Knowledge Protocol and Its Applications
Diana Maimut
,
George Teseleanu
.
WISTP 2020
:
32-46
[doi]
CompactFlow: A Hybrid Binary Format for Network Flow Data
Michal Piskozub
,
Riccardo Spolaor
,
Ivan Martinovic
.
WISTP 2020
:
185-201
[doi]
Threat Analysis of Poisoning Attack Against Ethereum Blockchain
Teppei Sato
,
Mitsuyoshi Imamura
,
Kazumasa Omote
.
WISTP 2020
:
139-154
[doi]
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
Tidiane Sylla
,
Mohamed Aymen Chalouf
,
Francine Krief
,
Karim Samaké
.
WISTP 2020
:
240-252
[doi]
Fault Injection Characterization on Modern CPUs
Thomas Trouchkine
,
Guillaume Bouffard
,
Jessy Clédière
.
WISTP 2020
:
123-138
[doi]
2018
Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings
Gerhard P. Hancke 0002
,
Ernesto Damiani
, editors,
Volume 10741 of
Lecture Notes in Computer Science
, Springer,
2018.
[doi]
Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation
Louis Cianciullo
,
Hossein Ghodosi
.
WISTP 2019
:
78-90
[doi]
On the Non-repudiation of Isogeny Based Signature Scheme
Soo-Kyung Eom
,
Hyang-Sook Lee
,
Seongan Lim
.
WISTP 2019
:
63-77
[doi]
A Family of Lightweight Twisted Edwards Curves for the Internet of Things
Sankalp Ghatpande
,
Johann Großschädl
,
Zhe Liu
.
WISTP 2019
:
193-206
[doi]
Blockchain and the GDPR: A Data Protection Authority Point of View
Amandine Jambert
.
WISTP 2019
:
3-6
[doi]
Bringing Kleptography to Real-World TLS
Adam Janovsky
,
Jan Krhovjak
,
Vashek Matyas
.
WISTP 2019
:
15-27
[doi]
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection
Khaled Karray
,
Jean-Luc Danger
,
Sylvain Guilley
,
Moulay Abdelaziz Elaabid
.
WISTP 2019
:
109-128
[doi]
Cybersecurity Behaviour: A Conceptual Taxonomy
Thulani Mashiane
,
Elmarie Kritzinger
.
WISTP 2019
:
147-156
[doi]
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper
Julia A. Meister
,
Raja Naeem Akram
,
Konstantinos Markantonakis
.
WISTP 2019
:
129-144
[doi]
Linear Depth Integer-Wise Homomorphic Division
Hiroki Okada
,
Carlos Cid
,
Seira Hidano
,
Shinsaku Kiyomoto
.
WISTP 2019
:
91-106
[doi]
Generating a Real-Time Constraint Engine for Network Protocols
Mohamed Sami Rakha
,
Fahim T. Imam
,
Thomas R. Dean
.
WISTP 2019
:
44-60
[doi]
A Generic Lightweight and Scalable Access Control Framework for IoT Gateways
Juan D. Parra Rodriguez
.
WISTP 2019
:
207-222
[doi]
Remote Credential Management with Mutual Attestation for Trusted Execution Environments
Carlton Shepherd
,
Raja Naeem Akram
,
Konstantinos Markantonakis
.
WISTP 2019
:
157-173
[doi]
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers
Etienne Tehrani
,
Jean-Luc Danger
,
Tarik Graba
.
WISTP 2019
:
28-43
[doi]
Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk)
Damien Vergnaud
.
WISTP 2019
:
7-11
[doi]
Detection of Bitcoin-Based Botnets Using a One-Class Classifier
Bruno Bogaz Zarpelão
,
Rodrigo Sanches Miani
,
Muttukrishnan Rajarajan
.
WISTP 2019
:
174-189
[doi]
2017
A Secure and Trusted Channel Protocol for UAVs Fleets
Raja Naeem Akram
,
Konstantinos Markantonakis
,
Keith Mayes
,
Pierre-François Bonnefoi
,
Amina Cherif
,
Damien Sauveron
,
Serge Chaumette
.
WISTP 2018
:
3-24
[doi]
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip
Sebanjila Kevin Bukasa
,
Ronan Lashermes
,
Hélène Le Bouder
,
Jean-Louis Lanet
,
Axel Legay
.
WISTP 2018
:
93-109
[doi]
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications
Madeline Cheah
,
Hoang Nga Nguyen
,
Jeremy Bryans
,
Siraj A. Shaikh
.
WISTP 2018
:
113-129
[doi]
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons
Pau Conejero-Alberola
,
M. Francisca Hinarejos
,
Josep Lluís Ferrer-Gomila
.
WISTP 2018
:
165-176
[doi]
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database
Shujie Cui
,
Ming Zhang
,
Muhammad Rizwan Asghar
,
Giovanni Russello
.
WISTP 2018
:
41-55
[doi]
Examination of a New Defense Mechanism: Honeywords
Ziya Alper Genç
,
Süleyman Kardas
,
Mehmet Sabir Kiraz
.
WISTP 2018
:
130-139
[doi]
Philanthropy on the Blockchain
Danushka Jayasinghe
,
Sheila Cobourne
,
Konstantinos Markantonakis
,
Raja Naeem Akram
,
Keith Mayes
.
WISTP 2018
:
25-38
[doi]
JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language
Hao Jiang
,
Ahmed Bouabdallah
.
WISTP 2018
:
56-72
[doi]
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?
Nektaria Kaloudi
,
Aikaterini Mitrokotsa
.
WISTP 2018
:
177-188
[doi]
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics
Yonas Leguesse
,
Mark Vella
,
Joshua Ellul
.
WISTP 2018
:
140-152
[doi]
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
Carlton Shepherd
,
Raja Naeem Akram
,
Konstantinos Markantonakis
.
WISTP 2018
:
75-92
[doi]
A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps
Öznur Kalkar
,
Mehmet Sabir Kiraz
,
Isa Sertkaya
,
Osmanbey Uzunkol
.
WISTP 2018
:
155-164
[doi]
2016
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks
Leila Bahri
,
Barbara Carminati
,
Elena Ferrari
,
William Lucia
.
WISTP 2016
:
171-186
[doi]
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks
Guillaume Barbu
,
Alberto Battistello
.
WISTP 2016
:
153-168
[doi]
Delegating Biometric Authentication with the Sumcheck Protocol
Hervé Chabanne
,
Julien Keuffer
,
Roch Lescuyer
.
WISTP 2016
:
236-244
[doi]
Combining Third Party Components Securely in Automotive Systems
Madeline Cheah
,
Siraj A. Shaikh
,
Jeremy Bryans
,
Hoang Nga Nguyen
.
WISTP 2016
:
262-269
[doi]
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data
Ling Chen
,
Ting Yu
,
Rada Chirkova
.
WISTP 2016
:
187-203
[doi]
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
Damien Couroussé
,
Thierno Barry
,
Bruno Robisson
,
Philippe Jaillon
,
Olivier Potin
,
Jean-Louis Lanet
.
WISTP 2016
:
136-152
[doi]
Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
Sara Foresti
,
Javier Lopez
, editors,
Volume 9895 of
Lecture Notes in Computer Science
, Springer,
2016.
[doi]
Password Generators: Old Ideas and New
Fatma Al Maqbali
,
Chris J. Mitchell
.
WISTP 2016
:
245-253
[doi]
Securing Transactions with the eIDAS Protocols
Frank Morgner
,
Paul Bastian
,
Marc Fischlin
.
WISTP 2016
:
3-18
[doi]
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures
Jan Tobias Mühlberg
,
Sara Cleemput
,
Mustafa A. Mustafa
,
Jo Van Bulck
,
Bart Preneel
,
Frank Piessens
.
WISTP 2016
:
53-69
[doi]
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY
Kim Thuat Nguyen
,
Nouha Oualha
,
Maryline Laurent
.
WISTP 2016
:
19-34
[doi]
Provable Network Activity for Protecting Users Against False Accusation
Panagiotis Papadopoulos
,
Elias Athanasopoulos
,
Eleni Kosta
,
George Siganos
,
Angelos D. Keromytis
,
Evangelos P. Markatos
.
WISTP 2016
:
254-261
[doi]
Towards Automatic Risk Analysis and Mitigation of Software Applications
Leonardo Regano
,
Daniele Canavese
,
Cataldo Basile
,
Alessio Viticchié
,
Antonio Lioy
.
WISTP 2016
:
120-135
[doi]
Attacking and Defending Dynamic Analysis System-Calls Based IDS
Ishai Rosenberg
,
Ehud Gudes
.
WISTP 2016
:
103-119
[doi]
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment
Ahmad Sabouri
.
WISTP 2016
:
223-235
[doi]
Fault-Channel Watermarks
Peter Samarin
,
Alexander Skripnik
,
Kerstin Lemke-Rust
.
WISTP 2016
:
204-219
[doi]
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms
Vlasta Stavova
,
Vashek Matyas
,
Mike Just
.
WISTP 2016
:
35-50
[doi]
An HMM-Based Anomaly Detection Approach for SCADA Systems
Kyriakos Stefanidis
,
Artemios G. Voyiatzis
.
WISTP 2016
:
85-99
[doi]
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments
Vassilios Vassilakis
,
Emmanouil Panaousis
,
Haralambos Mouratidis
.
WISTP 2016
:
70-84
[doi]
2015
Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
Raja Naeem Akram
,
Sushil Jajodia
, editors,
Volume 9311 of
Lecture Notes in Computer Science
, Springer,
2015.
[doi]
Practical and Privacy-Preserving TEE Migration
Ghada Arfaoui
,
Saïd Gharout
,
Jean-François Lalande
,
Jacques Traoré
.
WISTP 2015
:
153-168
[doi]
Secure Resource Sharing for Embedded Protected Module Architectures
Jo Van Bulck
,
Job Noorman
,
Jan Tobias Mühlberg
,
Frank Piessens
.
WISTP 2015
:
71-87
[doi]
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols
Alejandro Calleja
,
Pedro Peris-Lopez
,
Juan E. Tapiador
.
WISTP 2015
:
36-51
[doi]
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
Tassos Dimitriou
,
Ioannis Krontiris
.
WISTP 2015
:
20-35
[doi]
WSACd - A Usable Access Control Framework for Smart Home Devices
Konstantinos Fysarakis
,
Charalampos Konstantourakis
,
Konstantinos Rantos
,
Charalampos Manifavas
,
Ioannis Papaefstathiou
.
WISTP 2015
:
120-133
[doi]
Lightweight Password Hashing Scheme for Embedded Systems
George Hatzivasilis
,
Ioannis Papaefstathiou
,
Charalampos Manifavas
,
Ioannis G. Askoxylakis
.
WISTP 2015
:
260-270
[doi]
On Linkability and Malleability in Self-blindable Credentials
Jaap-Henk Hoepman
,
Wouter Lueks
,
Sietse Ringers
.
WISTP 2015
:
203-218
[doi]
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
Qiao Hu
,
Lavinia Mihaela Dinca
,
Gerhard P. Hancke
.
WISTP 2015
:
219-234
[doi]
Attack Tree Generation by Policy Invalidation
Marieta Georgieva Ivanova
,
Christian W. Probst
,
René Rydhof Hansen
,
Florian Kammüller
.
WISTP 2015
:
249-259
[doi]
Normalizing Security Events with a Hierarchical Knowledge Base
David Jaeger
,
Amir Azodi
,
Feng Cheng 0002
,
Christoph Meinel
.
WISTP 2015
:
237-248
[doi]
Randomizing the Montgomery Powering Ladder
Duc-Phong Le
,
Chik-How Tan
,
Michael Tunstall
.
WISTP 2015
:
169-184
[doi]
DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption
Miguel Morales-Sandoval
,
Arturo Diaz-Perez
.
WISTP 2015
:
104-119
[doi]
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques
Masoud Narouei
,
Hassan Takabi
.
WISTP 2015
:
137-152
[doi]
On Secrecy Amplification Protocols
Radim Ostádal
,
Petr Svenda
,
Vashek Matyás
.
WISTP 2015
:
3-19
[doi]
Secure and Authenticated Access to LLN Resources Through Policy Constraints
Konstantinos Rantos
,
Konstantinos Fysarakis
,
Othonas Sultatos
,
Ioannis G. Askoxylakis
.
WISTP 2015
:
271-280
[doi]
How Current Android Malware Seeks to Evade Automated Code Analysis
Siegfried Rasthofer
,
Irfan Asrar
,
Stephan Huber
,
Eric Bodden
.
WISTP 2015
:
187-202
[doi]
Private Minutia-Based Fingerprint Matching
Neyire Deniz Sarier
.
WISTP 2015
:
52-67
[doi]
Secure Obfuscation of Authoring Style
Hoi Le Thi
,
Reihaneh Safavi-Naini
,
Asadullah Al Galib
.
WISTP 2015
:
88-103
[doi]
2014
CAN Bus Risk Analysis Revisit
Hafizah Mansor
,
Kostas F. Markantonakis
,
Keith Mayes
.
WISTP 2014
:
170-179
[doi]
Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings
David Naccache
,
Damien Sauveron
, editors,
Volume 8501 of
Lecture Notes in Computer Science
, Springer,
2014.
[doi]
Towards More Practical Time-Driven Cache Attacks
Raphael Spreitzer
,
Benoît Gérard
.
WISTP 2014
:
24-39
[doi]
Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider
André Zúquete
,
Helder Gomes
,
Claudio Teixeira
.
WISTP 2014
:
160-169
[doi]
Sign in
or
sign up
to see more results.