Time measurement threatens privacy-friendly RFID authentication protocols G Avoine, I Coisel, T Martin International workshop on radio frequency identification: Security and …, 2010 | 58 | 2010 |
Untangling RFID privacy models I Coisel, T Martin Journal of Computer Networks and Communications 2013, 2013 | 54 | 2013 |
Privacy-preserving RFID systems: Model and constructions S Canard, I Coisel, J Etrog, M Girault Cryptology EPrint Archive, 2010 | 45 | 2010 |
Data synchronization in privacy-preserving RFID authentication schemes S Canard, I Coisel Conference on RFID Security, 2008 | 41 | 2008 |
A new multimodal approach for password strength estimation—Part I: Theory and algorithms J Galbally, I Coisel, I Sanchez IEEE Transactions on Information Forensics and Security 12 (12), 2829-2844, 2016 | 38 | 2016 |
New results for the practical use of range proofs S Canard, I Coisel, A Jambert, J Traoré European Public Key Infrastructure Workshop, 47-64, 2013 | 30 | 2013 |
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities A Malatras, I Sanchez, L Beslay, I Coisel, I Vakalis, G D'Acquisto, ... computer law & security review 33 (4), 458-469, 2017 | 17 | 2017 |
Untraceability model for RFID G Avoine, I Coisel, T Martin IEEE transactions on mobile computing 13 (10), 2397-2405, 2013 | 17 | 2013 |
A new multimodal approach for password strength estimation—Part II: Experimental Evaluation J Galbally, I Coisel, I Sanchez IEEE Transactions on Information Forensics and Security 12 (12), 2845-2860, 2017 | 15 | 2017 |
A survey exploring open source Intelligence for smarter password cracking A Kanta, I Coisel, M Scanlon Forensic Science International: Digital Investigation 35, 301075, 2020 | 14 | 2020 |
Group signatures are suitable for constrained devices S Canard, I Coisel, GD Meulenaer, O Pereira International Conference on Information Security and Cryptology, 133-150, 2010 | 14 | 2010 |
Security of privacy-preserving RFID systems S Canard, I Coisel, M Girault 2010 IEEE International Conference on RFID-Technology and Applications, 269-274, 2010 | 14 | 2010 |
Technical recommendations for improving security of email communications A Malatras, I Coisel, I Sanchez 2016 39th International Convention on Information and Communication …, 2016 | 13 | 2016 |
Toward generic method for server-aided cryptography S Canard, I Coisel, J Devigne, C Gallais, T Peters, O Sanders International Conference on Information and Communications Security, 373-392, 2013 | 12 | 2013 |
Method for authenticating an entity by a verifier S Canard, I Coisel, M Girault US Patent 8,522,027, 2013 | 12 | 2013 |
Method for authenticating an entity by a verifier S Canard, I Coisel, M Girault US Patent 8,522,027, 2013 | 12 | 2013 |
Complex zero-knowledge proofs of knowledge are easy to use S Canard, I Coisel, J Traoré International Conference on Provable Security, 122-137, 2007 | 12 | 2007 |
Method of authenticating a radio tag by a radio reader S Canard, I Coisel US Patent 8,593,259, 2013 | 11 | 2013 |
Method of authenticating a radio tag by a radio reader S Canard, I Coisel US Patent 8,593,259, 2013 | 11 | 2013 |
A privacy-restoring mechanism for offline RFID systems G Avoine, I Coisel, T Martin Proceedings of the fifth ACM Conference on Security and Privacy in Wireless …, 2012 | 9 | 2012 |