Follow
Iwen Coisel
Iwen Coisel
Verified email at jrc.ec.europa.eu
Title
Cited by
Cited by
Year
Time measurement threatens privacy-friendly RFID authentication protocols
G Avoine, I Coisel, T Martin
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
622010
Untangling RFID privacy models
I Coisel, T Martin
Journal of Computer Networks and Communications 2013, 2013
542013
Privacy-preserving RFID systems: Model and constructions
S Canard, I Coisel, J Etrog, M Girault
Cryptology EPrint Archive, 2010
472010
A new multimodal approach for password strength estimation—Part I: Theory and algorithms
J Galbally, I Coisel, I Sanchez
IEEE Transactions on Information Forensics and Security 12 (12), 2829-2844, 2016
462016
Data synchronization in privacy-preserving RFID authentication schemes
S Canard, I Coisel
Conference on RFID Security, 2008
422008
A survey exploring open source Intelligence for smarter password cracking
A Kanta, I Coisel, M Scanlon
Forensic Science International: Digital Investigation 35, 301075, 2020
372020
New results for the practical use of range proofs
S Canard, I Coisel, A Jambert, J Traoré
Public Key Infrastructures, Services and Applications: 10th European …, 2014
342014
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities
A Malatras, I Sanchez, L Beslay, I Coisel, I Vakalis, G D'Acquisto, ...
Computer Law & Security Review 33 (4), 458-469, 2017
242017
Technical recommendations for improving security of email communications
A Malatras, I Coisel, I Sanchez
2016 39th International Convention on Information and Communication …, 2016
192016
A new multimodal approach for password strength estimation—Part II: Experimental evaluation
J Galbally, I Coisel, I Sanchez
IEEE Transactions on Information Forensics and Security 12 (12), 2845-2860, 2017
182017
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts
A Kanta, S Coray, I Coisel, M Scanlon
Forensic Science International: Digital Investigation 37, 301186, 2021
172021
Untraceability model for RFID
G Avoine, I Coisel, T Martin
IEEE transactions on mobile computing 13 (10), 2397-2405, 2013
172013
Method for authenticating an entity by a verifier
S Canard, I Coisel, M Girault
US Patent 8,522,027, 2013
172013
Method for authenticating an entity by a verifier
S Canard, I Coisel, M Girault
US Patent 8,522,027, 2013
172013
Group signatures are suitable for constrained devices
S Canard, I Coisel, G De Meulenaer, O Pereira
Information Security and Cryptology-ICISC 2010: 13th International …, 2011
142011
Security of privacy-preserving RFID systems
S Canard, I Coisel, M Girault
2010 IEEE International Conference on RFID-Technology and Applications, 269-274, 2010
142010
Smarter password guessing techniques leveraging contextual information and OSINT
A Kanta, I Coisel, M Scanlon
2020 International Conference on Cyber Security and Protection of Digital …, 2020
132020
Toward generic method for server-aided cryptography
S Canard, I Coisel, J Devigne, C Gallais, T Peters, O Sanders
Information and Communications Security: 15th International Conference …, 2013
122013
Complex zero-knowledge proofs of knowledge are easy to use
S Canard, I Coisel, J Traoré
Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007
122007
Method of authenticating a radio tag by a radio reader
S Canard, I Coisel
US Patent 8,593,259, 2013
112013
The system can't perform the operation now. Try again later.
Articles 1–20