Time measurement threatens privacy-friendly RFID authentication protocols G Avoine, I Coisel, T Martin Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010 | 66 | 2010 |
Untangling RFID privacy models I Coisel, T Martin Journal of Computer Networks and Communications 2013 (1), 710275, 2013 | 54 | 2013 |
Privacy-preserving RFID systems: Model and constructions S Canard, I Coisel, J Etrog, M Girault Cryptology EPrint Archive, 2010 | 50 | 2010 |
A survey exploring open source Intelligence for smarter password cracking A Kanta, I Coisel, M Scanlon Forensic Science International: Digital Investigation 35, 301075, 2020 | 48 | 2020 |
A new multimodal approach for password strength estimation—Part I: Theory and algorithms J Galbally, I Coisel, I Sanchez IEEE Transactions on Information Forensics and Security 12 (12), 2829-2844, 2016 | 48 | 2016 |
Data synchronization in privacy-preserving RFID authentication schemes S Canard, I Coisel Conference on RFID Security, 2008 | 42 | 2008 |
New results for the practical use of range proofs S Canard, I Coisel, A Jambert, J Traoré Public Key Infrastructures, Services and Applications: 10th European …, 2014 | 35 | 2014 |
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts A Kanta, S Coray, I Coisel, M Scanlon Forensic Science International: Digital Investigation 37, 301186, 2021 | 25 | 2021 |
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities A Malatras, I Sanchez, L Beslay, I Coisel, I Vakalis, G D'Acquisto, ... Computer Law & Security Review 33 (4), 458-469, 2017 | 24 | 2017 |
A new multimodal approach for password strength estimation—Part II: Experimental evaluation J Galbally, I Coisel, I Sanchez IEEE Transactions on Information Forensics and Security 12 (12), 2845-2860, 2017 | 19 | 2017 |
Technical recommendations for improving security of email communications A Malatras, I Coisel, I Sanchez 2016 39th International Convention on Information and Communication …, 2016 | 19 | 2016 |
Untraceability model for RFID G Avoine, I Coisel, T Martin IEEE transactions on mobile computing 13 (10), 2397-2405, 2013 | 17 | 2013 |
Method for authenticating an entity by a verifier S Canard, I Coisel, M Girault US Patent 8,522,027, 2013 | 17 | 2013 |
A novel dictionary generation methodology for contextual-based password cracking A Kanta, I Coisel, M Scanlon IEEE Access 10, 59178-59188, 2022 | 15 | 2022 |
Smarter password guessing techniques leveraging contextual information and OSINT A Kanta, I Coisel, M Scanlon 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 14 | 2020 |
Group signatures are suitable for constrained devices S Canard, I Coisel, G De Meulenaer, O Pereira Information Security and Cryptology-ICISC 2010: 13th International …, 2011 | 14 | 2011 |
Security of privacy-preserving RFID systems S Canard, I Coisel, M Girault 2010 IEEE International Conference on RFID-Technology and Applications, 269-274, 2010 | 14 | 2010 |
Toward generic method for server-aided cryptography S Canard, I Coisel, J Devigne, C Gallais, T Peters, O Sanders Information and Communications Security: 15th International Conference …, 2013 | 12 | 2013 |
Complex zero-knowledge proofs of knowledge are easy to use S Canard, I Coisel, J Traoré Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007 | 12 | 2007 |
A probabilistic framework for improved password strength metrics J Galbally, I Coisel, I Sanchez 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 11 | 2014 |