1
0
0
(1 - 14 von 16
)
Information security theory and practice : security of mobile and...
searchworks.stanford.edu
Stanford Libraries' official online search tool for books, media, journals, databases, government documents and more.
Information Security Theory and Practice: Security and Privacy of...
books.google.be
This volume constitutes the refereed proceedings of the 5th IFIP WG International Workshop on Information Security Theory and Practices: Security and...
Information Security Theory and Practices: Security and Privacy of...
books.google.de
... Rekleitis Carl Gebhardt Peipei Shi Dimitris Geneiatakis Ton van Deursen Simon Hoerder Pim Vullers Hugo Jonker Artsiom Yautsiukhin Ioanna Kantzavelou.
Information Security Theory and Practice: Security and ...
books.google.ca
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder, Marcin Wójcik, Stefan Tillich, and Daniel Page ...
Progress in Cryptology - LATINCRYPT 2010: First International...
books.google.be
This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in...
LNCS Information Security Theory and Practice: Security of...
ifip.hal.science
Michael Lackner, Reinhard Berlach, Wolfgang Raschke, Reinhold Weiss, Christian Steger, A Forward Privacy Model for RFID Authentication Protocols Daisuke Moriyama, Miyako Ohkubo, Shin'ichiro Matsuo, On Secure Embedded Token Design Simon Hoerder, Kimmo Järvinen, Daniel Page,
On Secure Embedded Token Design - researchr publication
researchr.org
Simon Hoerder, Kimmo Järvinen, Daniel Page. On Secure Embedded Token Design. In Lorenzo Cavallaro, Dieter Gollmann, editors, Information Security ...
An Evaluation of Hash Functions on a Archive ouverte HAL
hal.archives-ouvertes.fr
von S Hoerder · · Zitiert von: 5 — Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page. An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. von S Hoerder · · Zitiert von: 1 — Simon Hoerder, Kimmo Järvinen, Daniel Page. On Secure Embedded Token Design. 7th International Workshop on Information Security THeory and Practice (WISTP), ... › ha...
Bristol Cryptography Group - Bristol CS - PDF Free Download
pingpdf.com
Group Overview. The Cryptography and Information Security Group conduct research into cryptography, the underlying hard ...
Light-weight primitive, feather-weight security: a cryptanalytic...
research-information.bris.ac.uk
Light-weight primitive, feather-weight security: a cryptanalytic knock-out. Valentina Banciu, Simon Hoerder, Daniel Page · Cryptography and Information Security.
On Secure Embedded Token Design - Hal-Inria
hal.inria.fr
Simon Hoerder, Kimmo Järvinen, Daniel Page. On Secure Embedded Token Design. 7th International Workshop on Information Security THeory and Practice (WISTP), ... › hal
Side-channel attacks on the McEliece and Niederreiter public-key ...
research-information.bris.ac.uk
Roberto Maria Avanzi, Simon Hoerder, Daniel Page, Mike Tunstall. Cryptography and Information Security. Research output: Contribution to journal › Article ... › ...
Workshop in Information Security Theory and Practice 2011
dl.ifip.org
Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page A Comparison of Post-Processing Techniques for Biased Random Number Generators.
Alle Infos zum Namen "Simon Hoerder"
Verwandte Suchanfragen zu Simon Hoerder
Marcin Wójcik Bart Preneel Roberto Avanzi | Stefan Tillich Alec Ross Martin Goldack | Werner Hoerder |
Personen Vorname "Simon" (30003) Name "Hoerder" (20) |
sortiert nach Relevanz / Datum