| Time measurement threatens privacy-friendly RFID authentication protocols G Avoine, I Coisel, T Martin International workshop on radio frequency identification: Security and …, 2010 | 67 | 2010 |
| A survey exploring open source Intelligence for smarter password cracking A Kanta, I Coisel, M Scanlon Forensic Science International: Digital Investigation 35, 301075, 2020 | 60 | 2020 |
| A new multimodal approach for password strength estimation—Part I: Theory and algorithms J Galbally, I Coisel, I Sanchez IEEE Transactions on Information Forensics and Security 12 (12), 2829-2844, 2016 | 58 | 2016 |
| Untangling RFID privacy models I Coisel, T Martin Journal of Computer Networks and Communications 2013 (1), 710275, 2013 | 54 | 2013 |
| Privacy-preserving RFID systems: Model and constructions S Canard, I Coisel, J Etrog, M Girault Cryptology EPrint Archive, 2010 | 50 | 2010 |
| Data synchronization in privacy-preserving RFID authentication schemes S Canard | 42 | 2008 |
| How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts A Kanta, S Coray, I Coisel, M Scanlon Forensic Science International: Digital Investigation 37, 301186, 2021 | 39 | 2021 |
| New results for the practical use of range proofs S Canard, I Coisel, A Jambert, J Traoré European Public Key Infrastructure Workshop, 47-64, 2013 | 37 | 2013 |
| Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities A Malatras, I Sanchez, L Beslay, I Coisel, I Vakalis, G D'Acquisto, ... Computer Law & Security Review 33 (4), 458-469, 2017 | 29 | 2017 |
| A new multimodal approach for password strength estimation—Part II: Experimental evaluation J Galbally, I Coisel, I Sanchez IEEE Transactions on Information Forensics and Security 12 (12), 2845-2860, 2017 | 24 | 2017 |
| A novel dictionary generation methodology for contextual-based password cracking A Kanta, I Coisel, M Scanlon IEEE Access 10, 59178-59188, 2022 | 22 | 2022 |
| Technical recommendations for improving security of email communications A Malatras, I Coisel, I Sanchez 2016 39th International Convention on Information and Communication …, 2016 | 21 | 2016 |
| Method for authenticating an entity by a verifier S Canard, I Coisel, M Girault US Patent 8,522,027, 2013 | 18 | 2013 |
| Smarter password guessing techniques leveraging contextual information and OSINT A Kanta, I Coisel, M Scanlon 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 16 | 2020 |
| Untraceability model for RFID G Avoine, I Coisel, T Martin IEEE transactions on mobile computing 13 (10), 2397-2405, 2013 | 16 | 2013 |
| Group signatures are suitable for constrained devices S Canard, I Coisel, G De Meulenaer, O Pereira International Conference on Information Security and Cryptology, 133-150, 2010 | 14 | 2010 |
| Security of privacy-preserving RFID systems S Canard, I Coisel, M Girault 2010 IEEE International Conference on RFID-Technology and Applications, 269-274, 2010 | 14 | 2010 |
| PCWQ: A framework for evaluating password cracking wordlist quality A Kanta, I Coisel, M Scanlon International Conference on Digital Forensics and Cyber Crime, 159-175, 2021 | 13 | 2021 |
| Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries A Kanta, I Coisel, M Scanlon Forensic Science International: Digital Investigation 44, 301507, 2023 | 12 | 2023 |
| A probabilistic framework for improved password strength metrics J Galbally, I Coisel, I Sanchez 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 12 | 2014 |