Search

Your search keyword '"Cédric Lauradoux"' showing total 26 results

Search Constraints

Start Over You searched for: Author "Cédric Lauradoux" Remove constraint Author: "Cédric Lauradoux" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
26 results on '"Cédric Lauradoux"'

Search Results

1. <scp>Desire</scp> : Leveraging the Best of Centralized and Decentralized Contact Tracing Systems

2. The Pitfalls of Hashing for Privacy

3. Security Analysis of Subject Access Request Procedures How to authenticate data subjects safely when they request for their data

4. Security of Distance-Bounding: A Survey

5. Duck Attack on Accountable Distributed Systems

6. Decompression Quines and Anti-Viruses

7. Energy efficient authentication strategies for network coding

8. Preserving Privacy in secured ZigBee Wireless Sensor Networks

9. Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform Distributions

10. The Power of Evil Choices in Bloom Filters

11. A Survey of Alerting Websites: Risks and Solutions

12. A Privacy Analysis of Google and Yandex Safe Browsing

13. Analysing the privacy policies of Wi-Fi trackers

14. Overflow of Fountain Codes in Multi-hop Wireless Sensor Networks

15. Authentication planning for XOR network coding

16. A Framework for Analyzing RFID Distance Bounding Protocols

17. Parallel Generation of ℓ-Sequences

18. SOSEMANUK: a fast software-oriented stream cipher

19. Decim v2

20. SYND: a Fast Code-Based Stream Cipher with a Security Reduction

21. Parallel Generation of l-Sequences

22. Performances of Cryptographic Accumulators

23. Hardware Implementation of the GPS authentication

24. Security of Distance−Bounding: A Survey

25. Security of Distance−Bounding: A Survey

26. Security of an UWB-IR Link

Catalog

Books, media, physical & digital resources