Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Koeune, François"'
Autor:
Leroy, Damien, Detal, Gregory, Cathalo, Julien, Manulis, Mark, Koeune, François, Bonaventure, Olivier
Publikováno v:
In Computer Networks 2011 55(7):1614-1630
Autor:
Rochet, Florentin, Efthymiadis, Kyriakos, Koeune, François, Pereira, Olivier, The World Wide Web Conference (WWW 2019)
Publikováno v:
WWW
We present a seamless challenge-response authentication protocol which leverages on the variations of html5 canvas rendering made by the software and hardware stacks. After a training phase that leads to feature extraction with deep learning techniqu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d0929b4b53042fa3c2dd2ece36226d3a
https://hdl.handle.net/2078.1/219011
https://hdl.handle.net/2078.1/219011
Autor:
Berti, Francesco, Koeune, François, Pereira, Olivier, Peters, Thomas, Standaert, François-Xavier, 2018 Asia Conference on Computer and Communications Security (AsiaCCS 2018)
Publikováno v:
Asia-CCS 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security-ASIACCS 18
Proceedings of the 2018 on Asia Conference on Computer and Communications Security-ASIACCS '18
AsiaCCS
Proceedings of the 2018 on Asia Conference on Computer and Communications Security-ASIACCS 18
Proceedings of the 2018 on Asia Conference on Computer and Communications Security-ASIACCS '18
AsiaCCS
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment of authenticated encryption (AE) schemes. They aim at mitigating the impact of implementation flaws due to side-channel leakages and misused randomness
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e1ea8a45720e952c09f1e6748ab42031
https://hdl.handle.net/2078.1/199233
https://hdl.handle.net/2078.1/199233
Autor:
Balasch, Josep, Ege, Baris, Eisenbarth, Thomas, Gérard, Benoît, Zheng, Gong, Güneysu, Tim, Heyse, Stefan, Kerckhof, Stéphanie, Koeune, François, Plos, Thomas, Pöppelmann, Thomas, Regazzoni, Francesco, Standaert, François-Xavier, Van Assche, Gilles, Van Keer, Ronny, van Oldeneel tot Oldenzeel, Loïc, von Maurich, Ingo, 11th International Conference CARDIS 2012
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783642372872
CARDIS
CARDIS
The pervasive diffusion of electronic devices in security and privacy sensitive applications has boosted research in cryptography. In this context, the study of lightweight algorithms has been a very active direction over the last years. In general,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::578c341e6c2ce7007ae7079d688b8237
https://doi.org/10.1007/978-3-642-37288-9_11
https://doi.org/10.1007/978-3-642-37288-9_11
Autor:
Eisenbarth, Thomas, Gong, Zheng, Güneysu, Tim, Heyse, Stefan, Indesteege, Sebastiaan, Kerckhof, Stéphanie, Koeune, François, Nad, Topmislav, Plos, Thomas, Regazzoni, Francesco, Standaert, François-Xavier, van Oldeneel tot Oldenzeel, Loïc, 5th International Conference on Cryptology in Africa (AFRICACRYPT 2012)
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2012 ISBN: 9783642314094
AFRICACRYPT
AFRICACRYPT
The design of lightweight block ciphers has been a very active research topic over the last years. However, the lack of comparative source codes generally makes it hard to evaluate the extent to which different ciphers actually reach their low-cost g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8afdf87ede8106c6db5cf0aaf29adbd2
https://hdl.handle.net/2078.1/115581
https://hdl.handle.net/2078.1/115581
Autor:
Durvaux, François, Gérard², Benoît, Kerckhof, Stéphanie, Koeune, François, Standaert, François-Xavier, 13th International Workshop on Information Security Applications (WISA 2012)
Publikováno v:
Information Security Applications ISBN: 9783642354151
WISA
WISA
Intellectual property right violations are an important problem for integrated system designers. We propose a new solution for mitigating such violations, denoted as soft physical hash functions. It combines previously introduced ideas of soft hash f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::70d56ac8238e7b64609099c97fe40634
https://doi.org/10.1007/978-3-642-35416-8_15
https://doi.org/10.1007/978-3-642-35416-8_15
Autor:
Shariati, Saloomeh, Koeune, François, Standaert, François-Xavier, Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference (CMS 2012)
Publikováno v:
Lecture Notes in Computer Science, Vol. 7394, p. 26-38 (09/2012)
Lecture Notes in Computer Science
13th International Conference on Communications and Multimedia Security (CMS)
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.26-38, ⟨10.1007/978-3-642-32805-3_3⟩
Communications and Multimedia Security ISBN: 9783642328046
Communications and Multimedia Security
Lecture Notes in Computer Science
13th International Conference on Communications and Multimedia Security (CMS)
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.26-38, ⟨10.1007/978-3-642-32805-3_3⟩
Communications and Multimedia Security ISBN: 9783642328046
Communications and Multimedia Security
Part 1: Research Papers; International audience; Physically Unclonable Functions are a promising tool to protect against counterfeiting attacks. Yet, as with any security system, it is important to embed them in a sound protocol, ensuring that no une
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1c116c0d094a7e6ae2365271040b1f31
https://hdl.handle.net/2078.1/115647
https://hdl.handle.net/2078.1/115647
Publikováno v:
STANDAERT, F-X, KOEUNE, F, Dumortier, F & Rouvroy, A 2010, ' Carte MoBIB : un bon exemple de mauvaise mise en œuvre ', Bruxelles en mouvements, Numéro 140, p. 9-13 .
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4291::53225b3e462121e014a8c9334439a398
https://pure.unamur.be/ws/files/55029587/6557.pdf
https://pure.unamur.be/ws/files/55029587/6557.pdf
Autor:
Robert, Romain, de Villenfagne, Florence, Jost, Julien, Dinant, Jean-Marc, MANULIS, Mark, LEROY, Damien, KOEUNE, François, BONAVENTURE, Olivier, QUISQUATER, Jean-Jacques, Ker, Caroline, Poullet, Yves
Publikováno v:
Robert, R, de Villenfagne, F, Jost, J, Dinant, J-M, MANULIS, M, LEROY, D, KOEUNE, F, BONAVENTURE, O, QUISQUATER, J-J, Ker, C & Poullet, Y 2008, ' Wifi roaming : legal implications and security constraints ', International Journal of Law and Information Technology, vol. 16, no. 3, pp. 205-241 .
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4291::df08e2ae3aa3a172841911c2132b281c
https://pure.unamur.be/ws/files/55059288/5924.pdf
https://pure.unamur.be/ws/files/55059288/5924.pdf
Autor:
Dobraunig, Christoph, Koeune, François, Mangard, Stefan, Mendel, Florian, Standaert, François-Xavier
Publikováno v:
Smart Card Research & Advanced Applications (9783319312705); 2016, p225-241, 17p