Communications publiées lors de congrès ou colloques nationaux et internationaux (34)

  1. 13. Youssef, M. A., Goossens, J., & Markowitch, O. (2013). Authentification et intégrité des données dans les ordonnancements temps réel. Actes de l'École Temps Réel (8 ed., pp. 146-149) ETR(Août 2013: Toulouse, France).
  2. 14. Markowitch, O., & Nakahara, J. (2013). Confusion and diffusion of large S-boxes. Western European Workshop on Research in Cryptology (pp. 73-79).
  3. 15. Markowitch, O., & Nakahara, J. (2013). Distinguishing attacks on single-pass modes of operation. Western European Workshop on Research in Cryptology (pp. 85-91).
  4. 16. Qachri, N., Lafitte, F., & Markowitch, O. (2013). Authenticated Key Agreement in Wireless Networks with Automated Key Management. In Proceedings of the 6th International Conference on Security of Information and Networks (pp. 62-69). (SIN '13). ACM. doi:10.1145/2523514.2523527
  5. 17. Lafitte, F., Markowitch, O., & Van Heule, D. (2013). SAT Based Analysis of LTE Stream Cipher ZUC. In Proceedings of the 6th International Conference on Security of Information and Networks (pp. 110-116). (SIN '13). ACM. doi:10.1145/2523514.2523533
  6. 18. Lerman, L., Markowitch, O., Nakahara Jr, J. J., et al. (2012). Key Management as a Service. In P. P. Samarati (Ed.), International Conference on Security and Cryptography (SECRYPT): International joint Conference on E-business and Telecommunications (ICETE) (pp. 276-281) Rome, Italy: SciTe Press Digital Library.
  7. 19. Qachri, N., Lafitte, F., & Markowitch, O. (2011). A new generic protocol for authentication and key agreement in lightweight systems. Ecrypt Workshop on lightweight cryptography (pp. 192-210).
  8. 20. Qachri, N., & Markowitch, O. (2011). Threat modelling of the security architectures of various wireless technologies. Symposium on Information Theory in the Benelux (pp. 146-153).
  9. 21. Markowitch, O., Lerman, L., & Bontempi, G. (2011). Side channel attack: an approach based on machine learning. In Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Security Design (pp. 29-41) Schindler and Huss.
  10. 22. Dossogne, J., & Markowitch, O. (2010). Online banking and man in the browser attacks , survey of the belgian situation. Symposium on information theory in the Benelux (pp. 19-26).
  11. 23. Dossogne, J., & Markowitch, O. (2010). E-voting: Individual verifiability of public boards made more achievable. Symposium on information theory in the Benelux (pp. 5-10).
  12. 24. Cao, Z., & Markowitch, O. (2009). Security Analysis of One Quantum Digital Signature Scheme. In Sixth International Conference on Information Technology (ITNG '09) (pp. 1574-1576) IEEE.

  13. << Précédent 1 2 3 4 5 6 7 8 9 10 11 12 Suivant >>