Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

22 results
hal_authIdPerson_i : 993476
hal_authIdPerson_i : 993471
Image document

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution

Bo Liu , Baokang Zhao , Chunqing Wu , Wanrong Yu , Ilsun You
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.282-285, ⟨10.1007/978-3-319-24315-3_29⟩
Conference papers hal-01466229v1
Image document

Using Model Driven Security Approaches in Web Application Development

Christoph Hochreiner , Zhendong Ma , Peter Kieseberg , Sebastian Schrittwieser , Edgar Weippl
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers hal-01397248v1

Availability, Reliability, and Security in Information Systems

Stephanie Teufel , Tjoa A Min , Ilsun You , Edgar Weippl
Stephanie Teufel; Tjoa A Min; IlsunYou; EdgarWeippl. Springer, LNCS-8708, 2014, Lecture Notes in Computer Science, 978-3-319-10974-9. ⟨10.1007/978-3-319-10975-6⟩
Books hal-01404011v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-11015, 2018, Lecture Notes in Computer Science, 978-3-319-99739-1. ⟨10.1007/978-3-319-99740-7⟩
Books hal-02060052v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-11713, 2019, Lecture Notes in Computer Science, 978-3-030-29725-1. ⟨10.1007/978-3-030-29726-8⟩
Books hal-02520036v1
Image document

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter

Dongjin Choi , Ilsun You , Pankoo Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers hal-01480180v1

Availability, Reliability and Security for Business, Enterprise and Health Information Systems

A Min Tjoa , Gerald Quirchmayr , Ilsun You , Lida Xu
Springer, LNCS-6908, 2011, Lecture Notes in Computer Science, 978-3-642-23299-2. ⟨10.1007/978-3-642-23300-5⟩
Books hal-01590383v1
Image document

PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks

Shimon Machida , Adrian Dabrowski , Edgar Weippl , Isao Echizen
16th Conference on e-Business, e-Services and e-Society (I3E), Nov 2017, Delhi, India. pp.261-275, ⟨10.1007/978-3-319-68557-1_24⟩
Conference papers hal-01768504v1
Image document

USBlock: Blocking USB-Based Keypress Injection Attacks

Sebastian Neuner , Artemios G. Voyiatzis , Spiros Fotopoulos , Collin Mulliner , Edgar R. Weippl
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.278-295, ⟨10.1007/978-3-319-95729-6_18⟩
Conference papers hal-01954405v1

Availability, Reliability, and Security in Information Systems

Francesco Buccafurri , Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-9817, 2016, Lecture Notes in Computer Science, 978-3-319-45506-8. ⟨10.1007/978-3-319-45507-5⟩
Books hal-01635010v1
Image document

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution

Bo Liu , Bo Liu , Baokang Zhao , Dingjie Zou , Chunqing Wu , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers hal-01480204v1
Image document

Extended Spatio-temporal Relations between Moving and Non-moving Objects

Chang Choi , Junho Choi , Juhyun Shin , Ilsun You , Pankoo Kim
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.243-254, ⟨10.1007/978-3-642-23300-5_19⟩
Conference papers hal-01590387v1
Image document

Mobile Malware Threats and Defenses for Homeland Security

Seung-Hyun Seo , Kangbin Yim , Ilsun You
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.516-524, ⟨10.1007/978-3-642-32498-7_39⟩
Conference papers hal-01542454v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-10410, 2017, Lecture Notes in Computer Science, 978-3-319-66807-9. ⟨10.1007/978-3-319-66808-6⟩
Books hal-01677131v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-12279, 2020, Lecture Notes in Computer Science, 978-3-030-57320-1. ⟨10.1007/978-3-030-57321-8⟩
Books hal-03414737v1

Multidisciplinary Research and Practice for Information Systems

Gerald Quirchmayr , Josef Basl , Ilsun You , Lida Xu , Edgar Weippl
Springer, LNCS-7465, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32498-7⟩
Books hal-01542459v1
Image document

A Design of Web Log Integration Framework Using NoSQL

Huijin Jeong , Junho Choi , Chang Choi , Ilsun You , Pankoo Kim
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.438-445, ⟨10.1007/978-3-642-55032-4_44⟩
Conference papers hal-01397250v1
Image document

A Secure Distributed Video Surveillance System Based on Portable Devices

Pietro Albano , Andrea Bruno , Bruno Carpentieri , Aniello Castiglione , Arcangelo Castiglione , et al.
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.403-415, ⟨10.1007/978-3-642-32498-7_30⟩
Conference papers hal-01542458v1
Image document

IT Issues on Homeland Security and Defense

Kangbin Yim , Ilsun You
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.374-385, ⟨10.1007/978-3-642-23300-5_29⟩
Conference papers hal-01590403v1

Information and Communication Technology

Khabib Mustofa , Erich J. Neuhold , A Min Tjoa , Edgar Weippl , Ilsun You
Springer, LNCS-7804, 2013, Lecture Notes in Computer Science, 978-3-642-36817-2. ⟨10.1007/978-3-642-36818-9⟩
Books hal-01480217v1
Image document

Trustworthy Opportunistic Access to the Internet of Services

Alessandro Armando , Aniello Castiglione , Gabriele Costa , Ugo Fiore , Alessio Merlo , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers hal-01480255v1

Information and Communication Technology

. Linawati , Made Sudiana Mahendra , Erich J. Neuhold , A Min Tjoa , Ilsun You
Springer, LNCS-8407, 2014, Information and Communication Technology, 978-3-642-55031-7. ⟨10.1007/978-3-642-55032-4⟩
Books hal-01397345v1