Time measurement threatens privacy-friendly RFID authentication protocols G Avoine, I Coisel, T Martin Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010 | 60 | 2010 |
Untangling RFID privacy models I Coisel, T Martin Journal of Computer Networks and Communications 2013, 2013 | 55 | 2013 |
Privacy-preserving RFID systems: Model and constructions S Canard, I Coisel, J Etrog, M Girault Cryptology EPrint Archive, 2010 | 48 | 2010 |
A new multimodal approach for password strength estimation—Part I: Theory and algorithms J Galbally, I Coisel, I Sanchez IEEE Transactions on Information Forensics and Security 12 (12), 2829-2844, 2016 | 45 | 2016 |
Data synchronization in privacy-preserving RFID authentication schemes S Canard, I Coisel Conference on RFID Security, 2008 | 42 | 2008 |
New results for the practical use of range proofs S Canard, I Coisel, A Jambert, J Traoré Public Key Infrastructures, Services and Applications: 10th European …, 2014 | 33 | 2014 |
A survey exploring open source Intelligence for smarter password cracking A Kanta, I Coisel, M Scanlon Forensic Science International: Digital Investigation 35, 301075, 2020 | 28 | 2020 |
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities A Malatras, I Sanchez, L Beslay, I Coisel, I Vakalis, G D'Acquisto, ... computer law & security review 33 (4), 458-469, 2017 | 22 | 2017 |
A new multimodal approach for password strength estimation—Part II: Experimental evaluation J Galbally, I Coisel, I Sanchez IEEE Transactions on Information Forensics and Security 12 (12), 2845-2860, 2017 | 17 | 2017 |
Technical recommendations for improving security of email communications A Malatras, I Coisel, I Sanchez 2016 39th International Convention on Information and Communication …, 2016 | 17 | 2016 |
Untraceability model for RFID G Avoine, I Coisel, T Martin IEEE transactions on mobile computing 13 (10), 2397-2405, 2013 | 17 | 2013 |
Method for authenticating an entity by a verifier S Canard, I Coisel, M Girault US Patent 8,522,027, 2013 | 17 | 2013 |
Method for authenticating an entity by a verifier S Canard, I Coisel, M Girault US Patent 8,522,027, 2013 | 17 | 2013 |
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts A Kanta, S Coray, I Coisel, M Scanlon Forensic Science International: Digital Investigation 37, 301186, 2021 | 14 | 2021 |
Group signatures are suitable for constrained devices S Canard, I Coisel, G De Meulenaer, O Pereira Information Security and Cryptology-ICISC 2010: 13th International …, 2011 | 14 | 2011 |
Security of privacy-preserving RFID systems S Canard, I Coisel, M Girault 2010 IEEE International Conference on RFID-Technology and Applications, 269-274, 2010 | 14 | 2010 |
Toward generic method for server-aided cryptography S Canard, I Coisel, J Devigne, C Gallais, T Peters, O Sanders Information and Communications Security: 15th International Conference …, 2013 | 12 | 2013 |
Complex zero-knowledge proofs of knowledge are easy to use S Canard, I Coisel, J Traoré Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007 | 12 | 2007 |
Method of authenticating a radio tag by a radio reader S Canard, I Coisel US Patent 8,593,259, 2013 | 11 | 2013 |
Method of authenticating a radio tag by a radio reader S Canard, I Coisel US Patent 8,593,259, 2013 | 11 | 2013 |