Iwen Coisel
Orcid: 0000-0001-6571-8441
According to our database1,
Iwen Coisel
authored at least 27 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
1
1
1
1
1
3
1
1
1
1
1
1
1
1
1
1
2
2
1
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A comprehensive evaluation on the benefits of context based password cracking for digital forensics.
J. Inf. Secur. Appl., 2024
2023
Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries.
Forensic Sci. Int. Digit. Investig., March, 2023
2022
IEEE Access, 2022
2021
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts.
Digit. Investig., 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
2020
Digit. Investig., 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2017
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation.
IEEE Trans. Inf. Forensics Secur., 2017
A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms.
IEEE Trans. Inf. Forensics Secur., 2017
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities.
Comput. Law Secur. Rev., 2017
Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process.
Proceedings of the International Carnahan Conference on Security Technology, 2017
2016
Proceedings of the 39th International Convention on Information and Communication Technology, 2016
2015
Physical attacks against the lack of perfect forward secrecy in DECT encrypted communications and possible countermeasures.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
2014
Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
2007
Proceedings of the Provable Security, 2007