Search

Your search keyword '"Cédric Lauradoux"' showing total 27 results

Search Constraints

Start Over You searched for: Author "Cédric Lauradoux" Remove constraint Author: "Cédric Lauradoux" Topic business.industry Remove constraint Topic: business.industry
27 results on '"Cédric Lauradoux"'

Search Results

1. Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?

2. The Pitfalls of Hashing for Privacy

3. Security of Distance-Bounding: A Survey

4. Duck Attack on Accountable Distributed Systems

5. Ephemeral: Lightweight Pseudonyms for 6LowPAN Mac Addresses

6. Energy efficient authentication strategies for network coding

7. Preserving Privacy in secured ZigBee Wireless Sensor Networks

8. Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform Distributions

9. A Survey of Alerting Websites: Risks and Solutions

10. A Privacy Analysis of Google and Yandex Safe Browsing

11. CryptoPage : Support matériel pour cryptoprocessus

12. Private Password Auditing

13. The entropy of wireless statistics

14. Analysing the privacy policies of Wi-Fi trackers

15. Distributed Key Certification Using Accumulators for Wireless Sensor Networks

16. Towards stronger jamming model: Application to TH-UWB radio

17. Overflow of Fountain Codes in Multi-hop Wireless Sensor Networks

18. Flooding attacks against network coding and countermeasures

19. Authentication planning for XOR network coding

20. How Secret-sharing can Defeat Terrorist Fraud

21. Distance Bounding Protocols on TH-UWB Radios

22. Energy Friendly Integrity for Network Coding in Wireless Sensor Networks

23. When Compromised Readers Meet RFID

24. X-FCSR - a new software oriented stream cipher based upon FCSRs

25. SYND: a Fast Code-Based Stream Cipher with a Security Reduction

26. Performances of Cryptographic Accumulators

27. Hardware Implementation of the GPS authentication

Catalog

Books, media, physical & digital resources