Iwen Coisel
Iwen Coisel
Verified email at jrc.ec.europa.eu
Title
Cited by
Cited by
Year
Time measurement threatens privacy-friendly RFID authentication protocols
G Avoine, I Coisel, T Martin
International workshop on radio frequency identification: Security and …, 2010
572010
Untangling RFID privacy models
I Coisel, T Martin
Journal of Computer Networks and Communications 2013, 2013
522013
Privacy-Preserving RFID Systems: Model and Constructions.
S Canard, I Coisel, J Etrog, M Girault
IACR Cryptol. ePrint Arch. 2010, 405, 2010
432010
Data synchronization in privacy-preserving RFID authentication schemes
S Canard, I Coisel
Conference on RFID Security, 2008
392008
A new multimodal approach for password strength estimation—Part I: Theory and algorithms
J Galbally, I Coisel, I Sanchez
IEEE Transactions on Information Forensics and Security 12 (12), 2829-2844, 2016
252016
New results for the practical use of range proofs
S Canard, I Coisel, A Jambert, J Traoré
European Public Key Infrastructure Workshop, 47-64, 2013
222013
Untraceability model for RFID
G Avoine, I Coisel, T Martin
IEEE transactions on mobile computing 13 (10), 2397-2405, 2013
162013
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities
A Malatras, I Sanchez, L Beslay, I Coisel, I Vakalis, G D'Acquisto, ...
Computer Law & Security Review 33 (4), 458-469, 2017
142017
Group signatures are suitable for constrained devices
S Canard, I Coisel, G De Meulenaer, O Pereira
International Conference on Information Security and Cryptology, 133-150, 2010
142010
Security of privacy-preserving RFID systems
S Canard, I Coisel, M Girault
2010 IEEE International Conference on RFID-Technology and Applications, 269-274, 2010
142010
Toward generic method for server-aided cryptography
S Canard, I Coisel, J Devigne, C Gallais, T Peters, O Sanders
International Conference on Information and Communications Security, 373-392, 2013
122013
Complex zero-knowledge proofs of knowledge are easy to use
S Canard, I Coisel, J Traoré
International Conference on Provable Security, 122-137, 2007
122007
Technical recommendations for improving security of email communications
A Malatras, I Coisel, I Sanchez
2016 39th International Convention on Information and Communication …, 2016
112016
Method of authenticating a radio tag by a radio reader
S Canard, I Coisel
US Patent 8,593,259, 2013
112013
Method of authenticating a radio tag by a radio reader
S Canard, I Coisel
US Patent 8,593,259, 2013
112013
Method for authenticating an entity by a verifier
S Canard, I Coisel, M Girault
US Patent 8,522,027, 2013
92013
Method for authenticating an entity by a verifier
S Canard, I Coisel, M Girault
US Patent 8,522,027, 2013
92013
A privacy-restoring mechanism for offline RFID systems
G Avoine, I Coisel, T Martin
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
92012
A new multimodal approach for password strength estimation—Part II: Experimental Evaluation
J Galbally, I Coisel, I Sanchez
IEEE Transactions on Information Forensics and Security 12 (12), 2845-2860, 2017
82017
A probabilistic framework for improved password strength metrics
J Galbally, I Coisel, I Sanchez
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20