WorldCat Identities

Quisquater, J.-J (Jean-Jacques) 1945-

Overview
Works: 46 works in 153 publications in 2 languages and 2,343 library holdings
Genres: Conference proceedings 
Roles: Author, Editor, Other, Translator, Creator
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by J.-J Quisquater
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings by J.-J Quisquater( Book )
22 editions published between 2000 and 2001 in English and held by 358 WorldCat member libraries worldwide
This volume constitutes the thoroughly refereed post-proceedings of the Third International Conference on Smart Card Research and Advanced Applications, CARDIS'98, held in Louvain-la-Neuve, Belgium in September 1998. The 35 revised full papers presented were carefully reviewed and updated for inclusion in this book. All current aspects of smart card research and applications development are addressed, in particular: Java cards, electronic commerce, efficiency, security (including cryptographic algorithms, cryptographic protocols, and authentication), and architecture
Advances in cryptology--EUROCRYPT '89 : Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989 : proceedings by J.-J Quisquater( Book )
17 editions published between 1990 and 2001 in English and German and held by 345 WorldCat member libraries worldwide
"This volume contains the proceedings of the Eurocrypt '89 conference, a workshop on theory and applications of cryptographic techniques. The International Association for Cryptologic Research (IACR) organizes two conferences each year, one in Europe and one in the United States. Eurocrypt '89 was the seventh European conference. The volume includes revised versions of nearly all the contributions presented at the conference, including shortened versions of the talks given at the special rump session for recent results. Recent outbreaks of viruses, worms and computer fraud together with progress in telecommunications, computer networks and automated banking have considerably increased the interest in data security techniques, where cryptography is generaly considered to be the most important tool. In this area of data security, where high stakes are at risk, up-to-date information is crucial. This book is organized into sections on public-key cryptosystems, theory, zero-knowledge protocols, applications, signature and untraceability, cryptanalysis, sharing and authentication schemes, sequences, algorithms, old problems, and impromptu talks."--Publisher's website
Computer security, ESORICS 98 : 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998 : proceedings by J.-J Quisquater( Book )
15 editions published in 1998 in English and held by 336 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads
Advances in cryptology, EUROCRYPT '95 : International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995 : proceedings by Louis C Guillou( Book )
11 editions published between 1995 and 2001 in English and held by 297 WorldCat member libraries worldwide
This volume constitutes the proceedings of EUROCRYPT '95, the 1995 International Workshop on the Theory and Application of Cryptographic Techniques, held in Saint-Malo, France in May 1995 under the sponsorship of the International Association for Cryptologic Research (IACR). The volume contains revised versions of the 33 papers selected from a total of 113 submissions. All current aspects of cryptologic research and advanced applications are addressed; there are sections on cryptanalysis, signatures, computational number theory, cryptographic protocols, secret sharing, electronic cash, shift registers and Boolean functions, authentication codes, new schemes, complexity aspects, and implementation aspects
Computer security, ESORICS 92 : Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992 : proceedings by Y Deswarte( Book )
12 editions published in 1992 in English and held by 293 WorldCat member libraries worldwide
"This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes."--PUBLISHER'S WEBSITE
Cryptographic hardware and embedded systems--CHES 2004 : 6th international workshop, Cambridge, MA, USA, August 11-13, 2004 : proceedings by Marc Joye( Book )
9 editions published in 2004 in English and held by 273 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in Cambridge, MA, USA in August 2004. The 32 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on side channels, modular multiplication, low resources, implementation aspects, collision attacks, fault attacks, hardware implementation, and authentication and signatures
Smart card research and advanced applications VI IFIP 18th World Computer Congress : TC8/WG8.8 & TC11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS) 22-27 August 2004 Toulouse, France by CARDIS( )
5 editions published in 2004 in English and held by 179 WorldCat member libraries worldwide
Smart Card Research and Advanced Applications VI Edited by Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kalam In the Information Society, the smart card, or smart device with its processing power and link to its owner, will be the potential human representation or delegate in Ambient Intelligence (Pervasive Computing), where every appliance or computer will be connected, and where control and trust of the personal environment will be the next decade challenge. Smart card research is of increasing importance as the need for information security grows rapidly. Smart cards will play a very large role in ID management in secure systems. In many computer science areas, smart cards introduce new dimensions and opportunities. Disciplines like hardware design, operating systems, modeling systems, cryptography and distributed systems find new areas of applications or issues; smart cards also create new challenges for these domains. CARDIS, the IFIP Conference on Smart Card Research and Advanced Applications, gathers researchers and technologists who are focused in all aspects of the design, development, deployment, validation and application of smart cards or smart personal devices. This volume contains the 20 papers that have been selected by the CARDIS Program Committee for presentation at the 6th International Conference on Smart Card Research and Advanced Applications (CARDIS 2004), which was held in conjunction with the IFIP 18th World Computer Congress in Toulouse, France in August 2004 and sponsored by the International Federation for Information Processing (IFIP). With 20% of the papers coming from Asia, 20% from America, and 60% from Europe, the competition was particularly severe this year, with only 20 papers selected out of 45 very good submissions. Smart Card Research and Advanced Applications VI presents the latest advances in smart card research and applications, and will be essential reading for developers of smart cards and smart card applications, as well as for computer science researchers in computer architecture, computer security, and cryptography
Advances in cryptology : proceedings ( )
1 edition published in 1990 in English and held by 30 WorldCat member libraries worldwide
Simulation based analysis of E2E voting systems ( )
2 editions published in 2008 in English and held by 17 WorldCat member libraries worldwide
Cryptographic hardware and embedded systems--CHES 2004 6th international workshop, Cambridge, MA, USA, 2004 : proceedings by CHES 2004( Book )
3 editions published in 2004 in English and held by 15 WorldCat member libraries worldwide
Cryptographic hardware and embedded systems - CHES 2004 6th international workshop, Cambridge, MA, August 11-13, 2004 : proceedings by CHES 2004( Book )
2 editions published in 2004 in English and held by 10 WorldCat member libraries worldwide
Computer security : proceedings ( )
1 edition published in 1998 in English and held by 8 WorldCat member libraries worldwide
Smart card research and applications : third international conference ; proceedings ( Book )
2 editions published in 2000 in English and held by 8 WorldCat member libraries worldwide
Quality in the access to information by José L. Abad Peiro( Book )
3 editions published in 1998 in English and held by 7 WorldCat member libraries worldwide
Abstract: "In this paper we define access-control properties and metrics that are useful in evaluating the risk of using alternative authorization systems. We define a formal notation to express access-control models, and apply it to a subset of the most representative ones. This notation is used to evaluate analytically a set of properties on authorization systems, e.g., lower bounds of the minimum amount of information required to control access to information sources, performance of access-control schemes, and quality-of-access meaurements. We define possible threats to access-control services, and describe how these attacks reflect the quality of an access function. We discuss the classical concept of suitability in the definition of access rights, claiming that it could be considered too conservative under certain circumstances of attacks. Finally, we prove that it is possible to evaluate analytically certain measurements of the performance and effectiveness of particular access-control models in specific threatening environments, rather than simply to rely on empirical results that are difficult to compare. These measurements provide an idea of the quality of an access-control model, at least comparatively."
Advances in cryptology : Workshop on the Theory and Application of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989 : proceedings by 1989, Houthalen) EUROCRYPT (8( Book )
1 edition published in 1990 in English and held by 7 WorldCat member libraries worldwide
Advances in Cryptology - EUROCRYPT '89 by Workshop on the Theory and Application of Cryptographic Techniques( )
2 editions published in 1990 in English and held by 6 WorldCat member libraries worldwide
This volume contains the proceedings of the Eurocrypt '89 conference, a workshop on theory and applications of cryptographic techniques. The International Association for Cryptologic Research (IACR) organizes two conferences each year, one in Europe and one in the United States. Eurocrypt '89 was the seventh European conference. The volume includes revised versions of nearly all the contributions presented at the conference, including shortened versions of the talks given at the special rump session for recent results. Recent outbreaks of viruses, worms and computer fraud together with progress in telecommunications, computer networks and automated banking have considerably increased the interest in data security techniques, where cryptography is generaly considered to be the most important tool. In this area of data security, where high stakes are at risk, up-to-date information is crucial. This book is organized into sections on public-key cryptosystems, theory, zero-knowledge protocols, applications, signature and untraceability, cryptanalysis, sharing and authentication schemes, sequences, algorithms, old problems, and impromptu talks
Two notes on graphs and security by C Delorme( Book )
1 edition published in 1986 in English and held by 4 WorldCat member libraries worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.78 (from 0.30 for Cryptograp ... to 0.97 for Cryptograp ...)
Alternative Names
Quisquater, J.-J.
Quisquater, Jean-Jacques
Quisquater, Jean-Jacques 1945-
Languages
English (119)
German (2)
Covers