Filter your results
- 5
- 5
- 5
- 2
- 3
- 5
- 1
- 1
- 1
- 1
- 5
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
Philanthropy on the Blockchain11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers
hal-01875527v1
|
||
|
Remote Credential Management with Mutual Attestation for Trusted Execution Environments12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.157-173, ⟨10.1007/978-3-030-20074-9_12⟩
Conference papers
hal-02294612v1
|
||
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.75-92, ⟨10.1007/978-3-319-93524-9_5⟩
Conference papers
hal-01875526v1
|
||
|
Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.129-144, ⟨10.1007/978-3-030-20074-9_10⟩
Conference papers
hal-02294604v1
|