Iwen Coisel

Orcid: 0000-0001-6571-8441

According to our database1, Iwen Coisel authored at least 25 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries.
Forensic Sci. Int. Digit. Investig., March, 2023

2022
A Novel Dictionary Generation Methodology for Contextual-Based Password Cracking.
IEEE Access, 2022

2021
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts.
Digit. Investig., 2021

2020
A survey exploring open source Intelligence for smarter password cracking.
Digit. Investig., 2020

Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
Improved Forensic Recovery of PKZIP Stream Cipher Passwords.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2017
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation.
IEEE Trans. Inf. Forensics Secur., 2017

A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms.
IEEE Trans. Inf. Forensics Secur., 2017

Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities.
Comput. Law Secur. Rev., 2017

Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2016
Improved cryptanalysis of the DECT standard cipher.
J. Cryptogr. Eng., 2016

Technical recommendations for improving security of email communications.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

2015
Physical attacks against the lack of perfect forward secrecy in DECT encrypted communications and possible countermeasures.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Untraceability Model for RFID.
IEEE Trans. Mob. Comput., 2014

Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

A probabilistic framework for improved password strength metrics.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
Untangling RFID Privacy Models.
J. Comput. Networks Commun., 2013

Toward Generic Method for Server-Aided Cryptography.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

New Results for the Practical Use of Range Proofs.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012
A privacy-restoring mechanism for offline RFID systems.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

2010
Privacy-Preserving RFID Systems: Model and Constructions.
IACR Cryptol. ePrint Arch., 2010

Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Group Signatures are Suitable for Constrained Devices.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Lighten Encryption Schemes for Secure and Private RFID Systems.
Proceedings of the Financial Cryptography and Data Security, 2010

2007
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use.
Proceedings of the Provable Security, 2007


  Loading...