Expanded versions of papers presented at the 4th and 5th Nordic Workshops on Dependability and Security (NODES ‘10 and NODES ‘11).
- Lightweight MAC-spoof detection exploiting received signal power and median filtering
- Structured intuition: a new methodology to analyse authentication protocols
- High-level algorithms and data structures requirements for security-by-contract on Java cards
- Deriving a mode logic using failure modes and effects analysis
No comments:
Post a Comment