Follow
Iwen Coisel
Iwen Coisel
Verified email at jrc.ec.europa.eu
Title
Cited by
Cited by
Year
Time measurement threatens privacy-friendly RFID authentication protocols
G Avoine, I Coisel, T Martin
International workshop on radio frequency identification: Security and …, 2010
582010
Untangling RFID privacy models
I Coisel, T Martin
Journal of Computer Networks and Communications 2013, 2013
542013
Privacy-preserving RFID systems: Model and constructions
S Canard, I Coisel, J Etrog, M Girault
Cryptology EPrint Archive, 2010
452010
Data synchronization in privacy-preserving RFID authentication schemes
S Canard, I Coisel
Conference on RFID Security, 2008
412008
A new multimodal approach for password strength estimation—Part I: Theory and algorithms
J Galbally, I Coisel, I Sanchez
IEEE Transactions on Information Forensics and Security 12 (12), 2829-2844, 2016
382016
New results for the practical use of range proofs
S Canard, I Coisel, A Jambert, J Traoré
European Public Key Infrastructure Workshop, 47-64, 2013
302013
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities
A Malatras, I Sanchez, L Beslay, I Coisel, I Vakalis, G D'Acquisto, ...
computer law & security review 33 (4), 458-469, 2017
172017
Untraceability model for RFID
G Avoine, I Coisel, T Martin
IEEE transactions on mobile computing 13 (10), 2397-2405, 2013
172013
A new multimodal approach for password strength estimation—Part II: Experimental Evaluation
J Galbally, I Coisel, I Sanchez
IEEE Transactions on Information Forensics and Security 12 (12), 2845-2860, 2017
152017
A survey exploring open source Intelligence for smarter password cracking
A Kanta, I Coisel, M Scanlon
Forensic Science International: Digital Investigation 35, 301075, 2020
142020
Group signatures are suitable for constrained devices
S Canard, I Coisel, GD Meulenaer, O Pereira
International Conference on Information Security and Cryptology, 133-150, 2010
142010
Security of privacy-preserving RFID systems
S Canard, I Coisel, M Girault
2010 IEEE International Conference on RFID-Technology and Applications, 269-274, 2010
142010
Technical recommendations for improving security of email communications
A Malatras, I Coisel, I Sanchez
2016 39th International Convention on Information and Communication …, 2016
132016
Toward generic method for server-aided cryptography
S Canard, I Coisel, J Devigne, C Gallais, T Peters, O Sanders
International Conference on Information and Communications Security, 373-392, 2013
122013
Method for authenticating an entity by a verifier
S Canard, I Coisel, M Girault
US Patent 8,522,027, 2013
122013
Method for authenticating an entity by a verifier
S Canard, I Coisel, M Girault
US Patent 8,522,027, 2013
122013
Complex zero-knowledge proofs of knowledge are easy to use
S Canard, I Coisel, J Traoré
International Conference on Provable Security, 122-137, 2007
122007
Method of authenticating a radio tag by a radio reader
S Canard, I Coisel
US Patent 8,593,259, 2013
112013
Method of authenticating a radio tag by a radio reader
S Canard, I Coisel
US Patent 8,593,259, 2013
112013
A privacy-restoring mechanism for offline RFID systems
G Avoine, I Coisel, T Martin
Proceedings of the fifth ACM Conference on Security and Privacy in Wireless …, 2012
92012
The system can't perform the operation now. Try again later.
Articles 1–20