The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gildas Avoine: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gildas Avoine, Serge Vaudenay
    Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:74-85 [Conf]
  2. Gildas Avoine
    Privacy Issues in RFID Banknotes Protection Schemes. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:33-48 [Conf]
  3. Claude Castelluccia, Gildas Avoine
    Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:289-299 [Conf]
  4. Gildas Avoine, Felix C. Gärtner, Rachid Guerraoui, Marko Vukolic
    Gracefully Degrading Fair Exchange with Security Modules. [Citation Graph (0, 0)][DBLP]
    EDCC, 2005, pp:55-71 [Conf]
  5. Gildas Avoine
    Fraud Within Asymmetric Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:1-15 [Conf]
  6. Gildas Avoine, Philippe Oechslin
    RFID Traceability: A Multilayer Problem. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:125-140 [Conf]
  7. Gildas Avoine, Pascal Junod, Philippe Oechslin
    Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:183-196 [Conf]
  8. Gildas Avoine, Jean Monnerat, Thomas Peyrin
    Advances in Alternative Non-adjacent Form Representations. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:260-274 [Conf]
  9. Gildas Avoine, Philippe Oechslin
    A Scalable and Provably Secure Hash-Based RFID Protocol. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2005, pp:110-114 [Conf]
  10. Gildas Avoine, Etienne Dysli, Philippe Oechslin
    Reducing Time Complexity in RFID Systems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:291-306 [Conf]
  11. Gildas Avoine, Serge Vaudenay
    Optimal Fair Exchange with Guardian Angels. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:188-202 [Conf]
  12. Gildas Avoine, Serge Vaudenay
    How to safely close a discussion. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2007, v:102, n:4, pp:138-142 [Journal]

  13. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. [Citation Graph (, )][DBLP]


  14. ePassport: Securing International Contacts with Contactless Chips. [Citation Graph (, )][DBLP]


  15. The Swiss-Knife RFID Distance Bounding Protocol. [Citation Graph (, )][DBLP]


  16. RFID Distance Bounding Multistate Enhancement. [Citation Graph (, )][DBLP]


  17. An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. [Citation Graph (, )][DBLP]


  18. When Compromised Readers Meet RFID. [Citation Graph (, )][DBLP]


  19. Group-Based Private Authentication. [Citation Graph (, )][DBLP]


  20. The Future Security Challenges in RFID. [Citation Graph (, )][DBLP]


  21. An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks [Citation Graph (, )][DBLP]


Search in 0.107secs, Finished in 0.108secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002