Conferences in DBLP
WLC Preface. [Citation Graph (, )][DBLP ] Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. [Citation Graph (, )][DBLP ] Lighten Encryption Schemes for Secure and Private RFID Systems. [Citation Graph (, )][DBLP ] Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. [Citation Graph (, )][DBLP ] A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. [Citation Graph (, )][DBLP ] Reliable Food Traceability Using RFID Tagging. [Citation Graph (, )][DBLP ] Lightweight Cryptography and DPA Countermeasures: A Survey. [Citation Graph (, )][DBLP ] Securing the Use of RFID-Enabled Banknotes. [Citation Graph (, )][DBLP ] Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. [Citation Graph (, )][DBLP ] RLCPS Preface. [Citation Graph (, )][DBLP ] SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. [Citation Graph (, )][DBLP ] A Secure and Privacy-Preserving Targeted Ad-System. [Citation Graph (, )][DBLP ] Cryptographic Cloud Storage. [Citation Graph (, )][DBLP ] Extending IPsec for Efficient Remote Attestation. [Citation Graph (, )][DBLP ] Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions. [Citation Graph (, )][DBLP ] How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. [Citation Graph (, )][DBLP ] WECSR Preface. [Citation Graph (, )][DBLP ] Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals. [Citation Graph (, )][DBLP ] A Case Study on Measuring Statistical Data in the Tor Anonymity Network. [Citation Graph (, )][DBLP ] A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets. [Citation Graph (, )][DBLP ] Ethical Proactive Threat Research. [Citation Graph (, )][DBLP ] A Framework for Understanding and Applying Ethical Principles in Network and Security Research. [Citation Graph (, )][DBLP ] Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects. [Citation Graph (, )][DBLP ] Ethical Guidelines for Computer Security Researchers: "Be Reasonable". [Citation Graph (, )][DBLP ]