WorldCat Identities

Quisquater, J.-J (Jean-Jacques) 1945-

Overview
Works: 38 works in 204 publications in 3 languages and 2,873 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Author, 958, Other, Opponent, Translator
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by J.-J Quisquater
Advances in cryptology--EUROCRYPT '89 : Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989 : proceedings by J.-J Quisquater( Book )

25 editions published between 1990 and 2001 in English and German and held by 294 WorldCat member libraries worldwide

"This volume contains the proceedings of the Eurocrypt '89 conference, a workshop on theory and applications of cryptographic techniques. The International Association for Cryptologic Research (IACR) organizes two conferences each year, one in Europe and one in the United States. Eurocrypt '89 was the seventh European conference. The volume includes revised versions of nearly all the contributions presented at the conference, including shortened versions of the talks given at the special rump session for recent results. Recent outbreaks of viruses, worms and computer fraud together with progress in telecommunications, computer networks and automated banking have considerably increased the interest in data security techniques, where cryptography is generaly considered to be the most important tool. In this area of data security, where high stakes are at risk, up-to-date information is crucial. This book is organized into sections on public-key cryptosystems, theory, zero-knowledge protocols, applications, signature and untraceability, cryptanalysis, sharing and authentication schemes, sequences, algorithms, old problems, and impromptu talks."--Publisher's website
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings by J.-J Quisquater( Book )

27 editions published between 2000 and 2001 in English and held by 274 WorldCat member libraries worldwide

This volume constitutes the thoroughly refereed post-proceedings of the Third International Conference on Smart Card Research and Advanced Applications, CARDIS'98, held in Louvain-la-Neuve, Belgium in September 1998. The 35 revised full papers presented were carefully reviewed and updated for inclusion in this book. All current aspects of smart card research and applications development are addressed, in particular: Java cards, electronic commerce, efficiency, security (including cryptographic algorithms, cryptographic protocols, and authentication), and architecture
Computer security, ESORICS 98 : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998 : proceedings by J.-J Quisquater( Book )

20 editions published in 1998 in English and German and held by 242 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads
Advances in cryptology, EUROCRYPT '95 : International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 : proceedings by Louis C Guillou( Book )

22 editions published between 1995 and 2001 in English and held by 224 WorldCat member libraries worldwide

This volume constitutes the proceedings of EUROCRYPT '95, the 1995 International Workshop on the Theory and Application of Cryptographic Techniques, held in Saint-Malo, France in May 1995 under the sponsorship of the International Association for Cryptologic Research (IACR). The volume contains revised versions of the 33 papers selected from a total of 113 submissions. All current aspects of cryptologic research and advanced applications are addressed; there are sections on cryptanalysis, signatures, computational number theory, cryptographic protocols, secret sharing, electronic cash, shift registers and Boolean functions, authentication codes, new schemes, complexity aspects, and implementation aspects
Computer security : ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings by Dieter Gollmann( Book )

13 editions published between 1992 and 2007 in English and held by 202 WorldCat member libraries worldwide

"This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes."--PUBLISHER'S WEBSITE
Cryptographic hardware and embedded systems--CHES 2004 : 6th international workshop, Cambridge, MA, USA, August 11-13, 2004 : proceedings by Marc Joye( Book )

19 editions published in 2004 in English and held by 178 WorldCat member libraries worldwide

These are the proceedings of CHES 2004, the 6th Workshop on Cryptographic Hardware and Embedded Systems. For the ?rst time, the CHES Workshop was sponsored by the International Association for Cryptologic Research (IACR). This year, the number of submissions reached a new record. One hundred and twenty-?ve papers were submitted, of which 32 were selected for presen- tion. Each submitted paper was reviewed by at least 3 members of the program committee. We are very grateful to the program committee for their hard and e?cientworkinassemblingtheprogram.Wearealsogratefultothe108external referees who helped in the review process in their area of expertise. In addition to the submitted contributions, the program included three - vited talks, by Neil Gershenfeld (Center for Bits and Atoms, MIT) about “Ph- ical Information Security”, by Isaac Chuang (Medialab, MIT) about “Quantum Cryptography”, and by Paul Kocher (Cryptography Research) about “Phy- cal Attacks”. It also included a rump session, chaired by Christof Paar, which featured informal talks on recent results. Asinthepreviousyears,theworkshopfocusedonallaspectsofcryptographic hardware and embedded system security. We sincerely hope that the CHES Workshop series will remain a premium forum for intellectual exchange in this area
Smart card research and advanced applications VI : IFIP 18th World Computer Congress : TC8/WG8.8 & TC11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS) 22-27 August 2004 Toulouse, France by J.-J Quisquater( Book )

10 editions published in 2004 in English and held by 62 WorldCat member libraries worldwide

Smart Card Research and Advanced Applications VI Edited by Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kalam In the Information Society, the smart card, or smart device with its processing power and link to its owner, will be the potential human representation or delegate in Ambient Intelligence (Pervasive Computing), where every appliance or computer will be connected, and where control and trust of the personal environment will be the next decade challenge. Smart card research is of increasing importance as the need for information security grows rapidly. Smart cards will play a very large role in ID management in secure systems. In many computer science areas, smart cards introduce new dimensions and opportunities. Disciplines like hardware design, operating systems, modeling systems, cryptography and distributed systems find new areas of applications or issues; smart cards also create new challenges for these domains. CARDIS, the IFIP Conference on Smart Card Research and Advanced Applications, gathers researchers and technologists who are focused in all aspects of the design, development, deployment, validation and application of smart cards or smart personal devices. This volume contains the 20 papers that have been selected by the CARDIS Program Committee for presentation at the 6th International Conference on Smart Card Research and Advanced Applications (CARDIS 2004), which was held in conjunction with the IFIP 18th World Computer Congress in Toulouse, France in August 2004 and sponsored by the International Federation for Information Processing (IFIP). With 20% of the papers coming from Asia, 20% from America, and 60% from Europe, the competition was particularly severe this year, with only 20 papers selected out of 45 very good submissions. Smart Card Research and Advanced Applications VI presents the latest advances in smart card research and applications, and will be essential reading for developers of smart cards and smart card applications, as well as for computer science researchers in computer architecture, computer security, and cryptography
Computer Security -- ESORICS 92 Second European Symposium on Research in Computer Security Toulouse, France, November 23-25, 1992 Proceedings by Yves Deswarte( )

1 edition published in 1992 in English and held by 29 WorldCat member libraries worldwide

Cryptographic Hardware and Embedded Systems - CHES 2004 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings by Marc Joye( )

1 edition published in 2004 in English and held by 27 WorldCat member libraries worldwide

Simulation based analysis of E2E voting systems( )

1 edition published in 2008 in English and held by 16 WorldCat member libraries worldwide

The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday( Book )

8 editions published in 2016 in English and held by 8 WorldCat member libraries worldwide

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn@0394@03C3s 80th birthday. The title of this books leans on the title of a serious history of cryptology named @0394@03C6The Cryptographers@0394@03C7, written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology @0394@03BC past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols
Quality in the access to information by José L. Abad Peiro( Book )

3 editions published in 1998 in English and held by 7 WorldCat member libraries worldwide

Abstract: "In this paper we define access-control properties and metrics that are useful in evaluating the risk of using alternative authorization systems. We define a formal notation to express access-control models, and apply it to a subset of the most representative ones. This notation is used to evaluate analytically a set of properties on authorization systems, e.g., lower bounds of the minimum amount of information required to control access to information sources, performance of access-control schemes, and quality-of-access meaurements. We define possible threats to access-control services, and describe how these attacks reflect the quality of an access function. We discuss the classical concept of suitability in the definition of access rights, claiming that it could be considered too conservative under certain circumstances of attacks. Finally, we prove that it is possible to evaluate analytically certain measurements of the performance and effectiveness of particular access-control models in specific threatening environments, rather than simply to rely on empirical results that are difficult to compare. These measurements provide an idea of the quality of an access-control model, at least comparatively."
Some new compound graphs by C Delorme( Book )

3 editions published in 1986 in English and held by 6 WorldCat member libraries worldwide

Two notes on graphs and security by C Delorme( Book )

2 editions published in 1986 in English and held by 5 WorldCat member libraries worldwide

SOFSEM 2015: theory and practice of computer science : 41th International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24 - 29, 2015 : proceedings by Giuseppe F Italiano( Book )

7 editions published in 2015 in English and held by 4 WorldCat member libraries worldwide

This book constitutes the proceedings of the 41st International Conference on Current Trends in Theory and Practice of Computer Science held in Pec pod Sněžkou, Czech Republic, during January 24-29, 2015. The book features 8 invited talks and 42 regular papers which were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections named: foundations of computer science; software and Web engineering; data, information, and knowledge engineering; and cryptography, security, and verification
Structures d'interconnexion constructions et applications by J.-J Quisquater( Book )

3 editions published in 1987 in French and held by 4 WorldCat member libraries worldwide

This thesis deals with interconnection networks of logical circuits or processors, or communication networks. Several important properties are investigated. These networks can be modeled by graphs with given degree and diameter. An important problem is to build such graphs with a maximum of nodes. Several new constructions are given for simple or bipartite graphs: Some of these constructions are compounds of graphs such that the obtained graph has good diameter and degree. The problem is studied for an important family of graphs: The Cayley graphs of finite symmetric groups. For a given group we have to find a generating set of given cardinality yielding a diameter as small as possible. We exhibit a construction showing that the diameter can be about the logarithm of the order of the group, with logarithm basis the cardinality of the generating set. Some properties are related to the security of networks: E.g., we look at a family of graphs where the secret key exchanges are easy and another family where it is possible to protect the traffic. Finally, the geometric regularity of interconnection structures are related to their universality, that is the possibility to represent all discrete functions of discrete variables. Such realizations are described for linear structures, called cascades, and rectangular structures
Strategies for interconnection networks : some methods from graph theory by J.-C Bermond( Book )

2 editions published in 1985 in English and held by 4 WorldCat member libraries worldwide

Information security theory and practices : smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings by Damien Sauveron( Book )

3 editions published in 2007 in English and held by 1 WorldCat member library worldwide

With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers. Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so
Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings by A. J Menezes( )

1 edition published in 2007 in English and held by 0 WorldCat member libraries worldwide

Annotation
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.70 (from 0.40 for Smart card ... to 0.95 for Structures ...)

Advances in cryptology--EUROCRYPT '89 : Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989 : proceedingsAdvances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
Alternative Names
Jean-Jacques Quisquater Belgian crytographer

Jean-Jacques Quisquater cryptograaf uit België

Quisquater, J.-J.

Quisquater, Jean-Jacques

Quisquater, Jean-Jacques 1945-

Languages
English (172)

German (3)

French (3)

Covers
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedingsComputer security, ESORICS 98 : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998 : proceedingsComputer security : ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedingsCryptographic hardware and embedded systems--CHES 2004 : 6th international workshop, Cambridge, MA, USA, August 11-13, 2004 : proceedingsSmart card research and advanced applications VI : IFIP 18th World Computer Congress : TC8/WG8.8 & TC11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS) 22-27 August 2004 Toulouse, FranceInformation Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, ProceedingsAdvances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings