Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Cyrille Wiedling"'
Publikováno v:
ACM Transactions on Privacy and Security
ACM Transactions on Privacy and Security, 2022, 25 (2), pp.39
ACM Transactions on Privacy and Security, 2022, 25 (2), pp.39
International audience; The rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing. .. Due to their security concerns, new sec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::433465a00f50b50543c76b3c5c32b2c9
https://inria.hal.science/hal-02965322v2/document
https://inria.hal.science/hal-02965322v2/document
Publikováno v:
ESORICS
ESORICS, pp.383-403, 2019, ⟨10.1007/978-3-030-29959-0_19⟩
Computer Security-{ESORICS} 2019-24th European Symposium on Research in Computer Security
Computer Security-{ESORICS} 2019-24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg
Computer Security-2019-24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg
Lecture Notes in Computer Science ISBN: 9783030299583
ESORICS (1)
ESORICS, pp.383-403, 2019, ⟨10.1007/978-3-030-29959-0_19⟩
Computer Security-{ESORICS} 2019-24th European Symposium on Research in Computer Security
Computer Security-{ESORICS} 2019-24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg
Computer Security-2019-24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg
Lecture Notes in Computer Science ISBN: 9783030299583
ESORICS (1)
Distance-bounding protocols aim at preventing several kinds of attacks, amongst which terrorist fraud, where a far away malicious prover colludes with an attacker to authenticate once, without giving him any advantage for future authentication. In th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9f48b512f25afbedffab41182a838b9c
https://hal.archives-ouvertes.fr/hal-02390221
https://hal.archives-ouvertes.fr/hal-02390221
Publikováno v:
4th Conference on Principles of Security and Trust (POST)
4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom
Lecture Notes in Computer Science ISBN: 9783662466650
POST
4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom
Lecture Notes in Computer Science ISBN: 9783662466650
POST
International audience; E-voting protocols aim at achieving a wide range of sophisticated security properties and, consequently, commonly employ advanced cryptographic primitives. This makes their design as well as rigorous analysis quite challenging
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::57ea076a7eb3b8f8ce69372db1e72dcb
https://hal.inria.fr/hal-01103545/document
https://hal.inria.fr/hal-01103545/document
Publikováno v:
VoteID'13-4th International Conference on e-Voting and Identity-2013
VoteID'13-4th International Conference on e-Voting and Identity-2013, Jul 2013, Guildford, United Kingdom. pp.109-126, ⟨10.1007/978-3-642-39185-9_7⟩
E-Voting and Identify ISBN: 9783642391842
VOTE-ID
Lecture Notes in Computer Science
VoteID'13-4th International Conference on e-Voting and Identity-2013, Jul 2013, Guildford, United Kingdom. pp.109-126, ⟨10.1007/978-3-642-39185-9_7⟩
E-Voting and Identify ISBN: 9783642391842
VOTE-ID
Lecture Notes in Computer Science
International audience; We study a simple electronic boardroom voting system. While most existing systems rely on opaque electronic devices, a scientific committee of a research institute (the CNRS Section 07) has recently proposed an alternative sys
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0869dedcd952949a915233a471662daf
https://inria.hal.science/hal-00881011
https://inria.hal.science/hal-00881011
Publikováno v:
19th ACM Conference on Computer and Communications Security (CCS'12)
19th ACM Conference on Computer and Communications Security (CCS'12), Oct 2012, Raleigh, United States
[Research Report] RR-7949, INRIA. 2012, pp.41
ACM Conference on Computer and Communications Security
19th ACM Conference on Computer and Communications Security (CCS'12), Oct 2012, Raleigh, United States
[Research Report] RR-7949, INRIA. 2012, pp.41
ACM Conference on Computer and Communications Security
While extensive research addresses the problem of establishing session keys through cryptographic protocols, relatively little work has appeared addressing the problem of revocation and update of long term keys. We present an API for symmetric key ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::95154e6640f09592e23e005f3da2eecc
https://hal.inria.fr/hal-00732902
https://hal.inria.fr/hal-00732902
Autor:
Véronique Cortier, Cyrille Wiedling
Publikováno v:
[Research Report] RR-7781, INRIA. 2011
Journal of Computer Security
Journal of Computer Security, 2017, ⟨10.3233/JCS-15777⟩
1st International Conference on Principles of Security and Trust (POST'12)
1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. pp.109--128, ⟨10.1007/978-3-642-28641-4_7⟩
Journal of Computer Security, IOS Press, 2017, ⟨10.3233/JCS-15777⟩
Lecture Notes in Computer Science
Lecture Notes in Computer Science ISBN: 9783642286407
POST
Journal of Computer Security
Journal of Computer Security, 2017, ⟨10.3233/JCS-15777⟩
1st International Conference on Principles of Security and Trust (POST'12)
1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. pp.109--128, ⟨10.1007/978-3-642-28641-4_7⟩
Journal of Computer Security, IOS Press, 2017, ⟨10.3233/JCS-15777⟩
Lecture Notes in Computer Science
Lecture Notes in Computer Science ISBN: 9783642286407
POST
International audience; Norway used e-voting in its last political election both in September 2011 and September 2013, with more than 28,000 voters using the e-voting option in 2011, and 70,000 in 2013. While some other countries use a black-box, pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3d2df7b37dab1c62efe45447611fbb4e
https://inria.hal.science/inria-00636115
https://inria.hal.science/inria-00636115