Filter your results
- 6
- 6
- 6
- 6
- 6
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
LPM: Layered Policy Management for Software-Defined Networks28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.356-363, ⟨10.1007/978-3-662-43936-4_23⟩
Conference papers
hal-01284871v1
|
||
|
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers
hal-01284842v1
|
||
|
Who, When, and Where? Location Proof Assertion for Mobile Devices28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.146-162, ⟨10.1007/978-3-662-43936-4_10⟩
Conference papers
hal-01285030v1
|
||
|
Hunting the Unknown28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers
hal-01284860v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Dynamic Workflow Adjustment with Security Constraints28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers
hal-01284857v1
|