关注
Iwen Coisel
Iwen Coisel
在 jrc.ec.europa.eu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Time measurement threatens privacy-friendly RFID authentication protocols
G Avoine, I Coisel, T Martin
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
632010
Untangling RFID privacy models
I Coisel, T Martin
Journal of Computer Networks and Communications 2013 (1), 710275, 2013
542013
A new multimodal approach for password strength estimation—Part I: Theory and algorithms
J Galbally, I Coisel, I Sanchez
IEEE Transactions on Information Forensics and Security 12 (12), 2829-2844, 2016
482016
Privacy-preserving RFID systems: Model and constructions
S Canard, I Coisel, J Etrog, M Girault
Cryptology EPrint Archive, 2010
472010
A survey exploring open source Intelligence for smarter password cracking
A Kanta, I Coisel, M Scanlon
Forensic Science International: Digital Investigation 35, 301075, 2020
422020
Data synchronization in privacy-preserving RFID authentication schemes
S Canard, I Coisel
Conference on RFID Security, 2008
422008
New results for the practical use of range proofs
S Canard, I Coisel, A Jambert, J Traoré
Public Key Infrastructures, Services and Applications: 10th European …, 2014
342014
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities
A Malatras, I Sanchez, L Beslay, I Coisel, I Vakalis, G D'Acquisto, ...
Computer Law & Security Review 33 (4), 458-469, 2017
242017
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts
A Kanta, S Coray, I Coisel, M Scanlon
Forensic Science International: Digital Investigation 37, 301186, 2021
232021
A new multimodal approach for password strength estimation—Part II: Experimental evaluation
J Galbally, I Coisel, I Sanchez
IEEE Transactions on Information Forensics and Security 12 (12), 2845-2860, 2017
192017
Technical recommendations for improving security of email communications
A Malatras, I Coisel, I Sanchez
2016 39th International Convention on Information and Communication …, 2016
192016
Method for authenticating an entity by a verifier
S Canard, I Coisel, M Girault
US Patent 8,522,027, 2013
182013
Untraceability model for RFID
G Avoine, I Coisel, T Martin
IEEE transactions on mobile computing 13 (10), 2397-2405, 2013
172013
Smarter password guessing techniques leveraging contextual information and OSINT
A Kanta, I Coisel, M Scanlon
2020 International Conference on Cyber Security and Protection of Digital …, 2020
142020
Group signatures are suitable for constrained devices
S Canard, I Coisel, G De Meulenaer, O Pereira
Information Security and Cryptology-ICISC 2010: 13th International …, 2011
142011
Security of privacy-preserving RFID systems
S Canard, I Coisel, M Girault
2010 IEEE International Conference on RFID-Technology and Applications, 269-274, 2010
142010
A novel dictionary generation methodology for contextual-based password cracking
A Kanta, I Coisel, M Scanlon
IEEE Access 10, 59178-59188, 2022
132022
Toward generic method for server-aided cryptography
S Canard, I Coisel, J Devigne, C Gallais, T Peters, O Sanders
Information and Communications Security: 15th International Conference …, 2013
122013
Complex zero-knowledge proofs of knowledge are easy to use
S Canard, I Coisel, J Traoré
Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007
122007
A probabilistic framework for improved password strength metrics
J Galbally, I Coisel, I Sanchez
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
112014
系统目前无法执行此操作,请稍后再试。
文章 1–20