Search - IFIP Open Digital Library Access content directly

Filter your results

119 results
Image document

A Study on Advanced Persistent Threats

Ping Chen , Lieven Desmet , Christophe Huygens
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.63-72, ⟨10.1007/978-3-662-44885-4_5⟩
Conference papers hal-01404186v1
Image document

A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning

Koen Decroix , Milica Milutinovic , Bart De Decker , Vincent Naessens
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.163-170, ⟨10.1007/978-3-642-24712-5_14⟩
Conference papers hal-01596195v1
Image document

Performance Analysis of Accumulator-based Revocation Mechanisms

Jorn Lapon , Markulf Kohlweiss , Bart Decker , Vincent Naessens
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.289-301, ⟨10.1007/978-3-642-15257-3_26⟩
Conference papers hal-01054508v1
Image document

A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications

Stefan Walraven , Eddy Truyen , Wouter Joosen
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.370-389, ⟨10.1007/978-3-642-25821-3_19⟩
Conference papers hal-01597768v1
Image document

A Smart Card Based Solution for User-Centric Identity Management

Jan Vossaert , Pieter Verhaeghe , Bart De Decker , Vincent Naessens
6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.164-177, ⟨10.1007/978-3-642-20769-3_14⟩
Conference papers hal-01559463v1
Image document

Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers

Tim Van Hamme , Davy Preuveneers , Wouter Joosen
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.473-485, ⟨10.1007/978-3-319-61176-1_26⟩
Conference papers hal-01684348v1
Image document

Serene: Self-Reliant Client-Side Protection against Session Fixation

Philippe De Ryck , Nick Nikiforakis , Lieven Desmet , Frank Piessens , Wouter Joosen
12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.59-72, ⟨10.1007/978-3-642-30823-9_5⟩
Conference papers hal-01527644v1
Image document

Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm

Niels Bouten , Anna Hristoskova , Femke Ongenae , Jelle Nelis , Filip De Turck
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.2-13, ⟨10.1007/978-3-642-30633-4_2⟩
Conference papers hal-01529786v1
Image document

A Modular Test Platform for Evaluation of Security Protocols in NFC Applications

Geoffrey Ottoy , Jeroen Martens , Nick Saeys , Bart Preneel , Lieven De Strycker , et al.
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.171-177, ⟨10.1007/978-3-642-24712-5_15⟩
Conference papers hal-01596204v1
Image document

PriMan : A Privacy-Preserving Identity Framework

Kristof Verslype , Pieter Verhaeghe , Jorn Lapon , Vincent Naessens , Bart Decker
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.327-334, ⟨10.1007/978-3-642-13739-6_24⟩
Conference papers hal-01056676v1
Image document

ROAC: A Role-Oriented Access Control Model

Nezar Nassr , Eric Steegmans
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.113-127, ⟨10.1007/978-3-642-30955-7_11⟩
Conference papers hal-01534310v1
Image document

The ‘Relay Ideation’ Technique: Moving from Problem Understanding to Problem Solving in the Design Process

Karin Slegers , Pieter Duysburgh , An Jacobs
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.651-658, ⟨10.1007/978-3-642-40498-6_57⟩
Conference papers hal-01510503v1
Image document

Efficient Large-Scale Machine Learning Techniques for Rapid Motif Discovery in Energy Data Streams

K. K. Lykothanasi , S. Sioutas , K. Tsichlas
18th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2022, Hersonissos, Greece. pp.331-342, ⟨10.1007/978-3-031-08333-4_27⟩
Conference papers hal-04317195v1
Image document

A Digital Game to Learn About Open Data

Davide Di Staso , Fernando Kleiman , Joep Crompvoets , Marijn Janssen
20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.153-164, ⟨10.1007/978-3-030-84789-0_11⟩
Conference papers hal-04175090v1
Image document

A Categorical Approach to Secure Compilation

Stelios Tsampas , Andreas Nuyts , Dominique Devriese , Frank Piessens
15th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2020, Dublin, Ireland. pp.155-179, ⟨10.1007/978-3-030-57201-3_9⟩
Conference papers hal-03232345v1
Image document

Identity-Theft Through e-Government Services – Government to Pay the Bill?

Jessica Schroers , Pagona Tsormpatzoudi
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.253-264, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_17⟩
Book sections hal-01619729v1
Image document

Privacy-Preserving Scheduling Mechanism for eHealth Systems

Milica Milutinovic , Vincent Naessens , Bart De Decker
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers hal-01540885v1
Image document

Improving the Debate: Interface Elements that Enhance Civility and Relevance in Online News Comments

Emilie Bossens , Elias Storms , David Geerts
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.433-450, ⟨10.1007/978-3-030-85610-6_25⟩
Conference papers hal-04215483v1
Image document

Designing Privacy-Enhancing Mobile Applications

Koen Decroix , Bart De Decker , Vincent Naessens
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.157-170, ⟨10.1007/978-3-642-31668-5_12⟩
Conference papers hal-01517593v1
Image document

Secure Negotiation for Manual Authentication Protocols

Milica Milutinovic , Roel Peeters , Bart De Decker
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.214-221, ⟨10.1007/978-3-642-24712-5_20⟩
Conference papers hal-01596202v1
Image document

Designing with Dementia: Guidelines for Participatory Design together with Persons with Dementia

Niels Hendriks , Frederik Truyen , Erik Duval
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.649-666, ⟨10.1007/978-3-642-40483-2_46⟩
Conference papers hal-01497469v1
Image document

Subobject Transactional Memory

Marko Van Dooren , Dave Clarke
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.44-58, ⟨10.1007/978-3-642-30829-1_4⟩
Conference papers hal-01529600v1
Image document

Open About the Open-Rate?

Shirin Kalantari
15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.187-205, ⟨10.1007/978-3-030-72465-8_11⟩
Conference papers hal-03703758v1
Image document

Evaluating the Impact of User Stories Quality on the Ability to Understand and Structure Requirements

Yves Wautelet , Dries Gielis , Stephan Poelmans , Samedi Heng
12th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2019, Luxembourg, Luxembourg. pp.3-19, ⟨10.1007/978-3-030-35151-9_1⟩
Conference papers hal-03231362v1
Image document

Understanding Actor Roles in Inter-organizational Digital Public Services

Stijn Wouters , Marijn Janssen , Joep Crompvoets
20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.43-58, ⟨10.1007/978-3-030-84789-0_4⟩
Conference papers hal-04175105v1
Image document

3D Nanofabric: Layout Challenges and Solutions for Ultra-scaled Logic Designs

Edouard Giacomin , Juergen Boemmels , Julien Ryckaert , Francky Catthoor , Pierre-Emmanuel Gaillardon
28th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2020, Salt Lake City, UT, United States. pp.279-300, ⟨10.1007/978-3-030-81641-4_13⟩
Conference papers hal-03759735v1
Image document

Noninterference via Symbolic Execution

Dimiter Milushev , Wim Beck , Dave Clarke
14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.152-168, ⟨10.1007/978-3-642-30793-5_10⟩
Conference papers hal-01528732v1
Image document

A Generic Solution for Agile Run-Time Inspection Middleware

Wouter De Borger , Bert Lagaisse , Wouter Joosen
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.451-470, ⟨10.1007/978-3-642-25821-3_23⟩
Conference papers hal-01597758v1
Image document

RAM: Rapid Alignment Method

Ruben A. Muijrers , Jasper Woudenberg , Lejla Batina
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.266-282, ⟨10.1007/978-3-642-27257-8_17⟩
Conference papers hal-01596293v1
Image document

Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice

Fatih Gey , Stefan Walraven , Dimitri Van Landuyt , Wouter Joosen
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.113-127, ⟨10.1007/978-3-642-39614-4_8⟩
Conference papers hal-01492780v1