Communications publiées lors de congrès ou colloques nationaux et internationaux (34)

  1. 1. Sharma, G., Verstraeten, D., Saraswat, V., Dricot, J.-M., & Markowitch, O. (2021). Anonymous Fair Auction on Blockchain. 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)(19-21 April 2021: Paris) doi:10.1109/NTMS49979.2021.9432664
  2. 2. Ellinidou, S., Sharma, G., Markowitch, O., Gogniat, G., & Dricot, J.-M. (2020). A novel Network-on-Chip security algorithm for tolerating Byzantine faults. In 2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT): Vol. 1 (pp. 1-6) IEEE.
  3. 3. Ellinidou, S., Sharma, G., Markowitch, O., Dricot, J.-M., & Gogniat, G. (2020). Towards NoC Protection of HT-Greyhole Attack. In International Conference on Algorithms and Architectures for Parallel Processing: Vol. 12454 (pp. 309-323) Springer, Cham.
  4. 4. Spasic, B., Markowitch, O., & Thiran, P. (2020). SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor Networks. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (pp. 363-371) SCITEPRESS – Science and Technology Publications.
  5. 5. Sharma, G., Ellinidou, S., Vanspouwen, T., Rigas, T., Dricot, J.-M., & Markowitch, O. (2019). Identity-based TLS for cloud of chips. Proc. of the 5th International Conference on Information Systems Security and Privacy, ICISSP (23-25 February, 2019: Prague, Czech Republic)
  6. 6. Sharma, N., Sahu, R. A., Saraswat, V., Sharma, G., Kuchta, V., & Markowitch, O. (2018). Strong Designated Verifier Signcryption Scheme. ProvSec Workshop, Jeju, Rep. of Korea ProvSec Workshop
  7. 7. Gerard, F., Kuchta, V., Sahu, R. A., Sharma, G., & Markowitch, O. (2018). Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage. International Conference on Security and Cryptography SECRYPT 2018
  8. 8. Ellinidou, S., Sharma, G., Dricot, J.-M., & Markowitch, O. (2018). A SDN solution for system-on-chip world. Proc. of the Fifth International Conference on Software Defined Systems, SDS (23-26 April, 2018: Barcelona, Spain) doi:10.1109/SDS.2018.8370416
  9. 9. Lerman, L., Veshchikov, N., Picek, S., & Markowitch, O. (2017). On the Construction of Side-Channel Attack Resilient S-boxes. In Constructive Side-Channel Analysis and Secure Design 2017: Vol. 10348 (pp. 102-119). (Lecture Notes in Computer Science). Springer.
  10. 10. Lerman, L., Markowitch, O., & Veshchikov, N. (2016). Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks. In Proceedings of the IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST 2016) (pp. 1-6) IEEE Press.
  11. 11. Sisiaridis, D., Carcillo, F., & Markowitch, O. (2016). A Framework for Threat Detection in Communication Systems. In Proceedings of the 20th ACM Panhellenic Conference on Informatics (pp. 1-6) ACM Press.
  12. 12. Markowitch, O., & Nakahara, J. (2014). Attacks on single-pass confidentiality modes of operation. 14th Symposium in information and computational systems security (pp. 84-99) (2014-11-03).

  13. << Précédent 1 2 3 4 5 6 7 8 9 10 11 12 Suivant >>