History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 83 total

Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. (English)
ARES, 139-148(2015)
WorldCat.org
1
Let’s Get Mobile: Secure FOTA for Automotive System. (English)
NSS, 503-510(2015)
WorldCat.org
2
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures. (English)
TrustCom/BigDataSE/ISPA (1), 483-490(2015)
WorldCat.org
3
Authentication based on a changeable biometric using gesture recognition with the Kinect™. (English)
ICB, 38-45(2015)
WorldCat.org
4
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. (English)
ESORICS (2), 541-560(2015)
WorldCat.org
5
Enhancing EMV Online PIN Verification. (English)
TrustCom/BigDataSE/ISPA (1), 808-817(2015)
WorldCat.org
6
CAN bus risk analysis revisit. (English)
Naccache, David (ed.) et al., Information security theory and practice. Securing the internet of things. 8th IFIP WG 11.2 international workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 ‒ July 2, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-43825-1/pbk). Lecture Notes in Computer Science 8501, 170-179 (2014).
WorldCat.org
7
Precise instruction-level side channel profiling of embedded processors. (English)
Huang, Xinyi (ed.) et al., Information security practice and experience. 10th international conference, ISPEC 2014, Fuzhou, China, May 5‒8, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06319-5/pbk). Lecture Notes in Computer Science 8434, 129-143 (2014).
WorldCat.org
8
Secure Improved Cloud-Based RFID Authentication Protocol. (English)
DPM/SETOP/QASA, 147-164(2014)
WorldCat.org
9
Trusted Platform Module for Smart Cards. (English)
NTMS, 1-5(2014)
WorldCat.org
10
Remote E-Voting Using the Smart Card Web Server. (English)
IJSSE 5, N0. 1, 39-60(2014)
WorldCat.org
11
Verifying Software Integrity in Embedded Systems: A Side Channel Approach. (English)
COSADE, 261-280(2014)
WorldCat.org
12
Practical Attacks on Virtual Worlds. (English)
CRiSIS, 180-195(2014)
WorldCat.org
13
Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains. (English)
AINA Workshops, 871-878(2014)
WorldCat.org
14
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. (English)
TrustCom, 422-431(2014)
WorldCat.org
15
Ownership Management in the Context of the Internet of Things. (English)
CyberC, 150-153(2014)
WorldCat.org
16
Remote attestation mechanism for user centric smart cards using pseudorandom number generators. (English)
Qing, Sihan (ed.) et al., Information and communications security. 15th international conference, ICICS 2013, Beijing, China, November 20‒22, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-02725-8/pbk). Lecture Notes in Computer Science 8233, 151-166 (2013).
WorldCat.org
17
Using the smart card web server in secure branchless banking. (English)
Lopez, Javier (ed.) et al., Network and system security. 7th international conference, NSS 2013, Madrid, Spain, June 3‒4, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38630-5/pbk). Lecture Notes in Computer Science 7873, 250-263 (2013).
WorldCat.org
18
Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. (English)
Lecture Notes in Computer Science 8134. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). xviii, 794~p. EUR~101.65 (2013).
WorldCat.org
19
Card-Present Transactions on the Internet Using the Smart Card Web Server. (English)
TrustCom/ISPA/IUCC, 611-619(2013)
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 83 total

Valid XHTML 1.0 Transitional Valid CSS!