Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

457 results
Keywords : Security
Keywords : Privacy
Image document

Ransomware Steals Your Phone. Formal Methods Rescue It

Francesco Mercaldo , Vittoria Nardone , Antonella Santone , Corrado Aaron Visaggio
36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.212-221, ⟨10.1007/978-3-319-39570-8_14⟩
Conference papers hal-01432919v1
Image document

Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams

Maxim Kolomeets , Andrey Chechulin , Igor Kotenko
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.141-157, ⟨10.1007/978-3-319-45507-5_10⟩
Conference papers hal-01635003v1
Image document

A Threat to Friendship Privacy in Facebook

Francesco Buccafurri , Gianluca Lax , Serena Nicolazzo , Antonino Nocera
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.96-105, ⟨10.1007/978-3-319-45507-5_7⟩
Conference papers hal-01635021v1
Image document

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

Ronald Kainda , Ivan Flechais , A. W. Roscoe
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.308-315, ⟨10.1007/978-3-642-12368-9_24⟩
Conference papers hal-01056076v1
Image document

Improving Computer Security Dialogs

Cristian Bravo-Lillo , Lorrie Faith Cranor , Julie Downs , Saranga Komanduri , Manya Sleeper
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.18-35, ⟨10.1007/978-3-642-23768-3_2⟩
Conference papers hal-01596947v1
Image document

Privacy-Preserving Environment Monitoring in Networks of Mobile Devices

Lorenzo Bergamini , Luca Becchetti , Andrea Vitaletti
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.179-191, ⟨10.1007/978-3-642-23041-7_18⟩
Conference papers hal-01587843v1
Image document

Privacy Concern and Trust in Using Social Network Sites: A Comparison between French and Chinese Users

Li Chen , Ho Keung Tsoi
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.234-241, ⟨10.1007/978-3-642-23765-2_16⟩
Conference papers hal-01591822v1
Image document

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries

Karl Kümmel , Tobias Scheidat , Claus Vielhauer , Jana Dittmann
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.16-25, ⟨10.1007/978-3-642-32805-3_2⟩
Conference papers hal-01540894v1
Image document

Multiparty Authorization Framework for Data Sharing in Online Social Networks

Hongxin Hu , Gail-Joon Ahn
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers hal-01586571v1
Image document

DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things

Na Shi , Bo Tang , Ravi Sandhu , Qi Li
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.278-290, ⟨10.1007/978-3-030-81242-3_16⟩
Conference papers hal-03677043v1
Image document

A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption

Bernd Zwattendorfer , Daniel Slamanig , Klaus Stranacher , Felix Hörandner
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.92-103, ⟨10.1007/978-3-662-44885-4_8⟩
Conference papers hal-01404190v1
Image document

Using Model Driven Security Approaches in Web Application Development

Christoph Hochreiner , Zhendong Ma , Peter Kieseberg , Sebastian Schrittwieser , Edgar Weippl
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers hal-01397248v1
Image document

A Trust-Based Defensive System Model for Cloud Computing

Qian Zhou , Jiong Yu , Feiran Yu
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.146-159, ⟨10.1007/978-3-642-24403-2_12⟩
Conference papers hal-01593026v1
Image document

Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization Mechanism

Fumiyuki Kato , Yang Cao , Masatoshi Yoshikawa
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.43-60, ⟨10.1007/978-3-030-81242-3_3⟩
Conference papers hal-03677038v1
Image document

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu , Lingyu Wang
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers hal-01284854v1
Image document

Decentralized Bootstrap for Social Overlay Networks

Rodolphe Marques , André Zúquete
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.140-143, ⟨10.1007/978-3-662-44885-4_13⟩
Conference papers hal-01404205v1
Image document

From MDM to DB2: A Case Study of Security Enforcement Migration

Nikolay Yakovets , Jarek Gryz , Stephanie Hazlewood , Paul Van Run
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers hal-01534771v1
Image document

Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme

Hae-Jung Kim , Eun-Jun Yoon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers hal-01551363v1
Image document

Multi-domain DDoS Mitigation Based on Blockchains

Bruno Rodrigues , Thomas Bocek , Burkhard Stiller
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.185-190, ⟨10.1007/978-3-319-60774-0_19⟩
Conference papers hal-01806051v1
Image document

P3S: A Privacy Preserving Publish-Subscribe Middleware

Partha Pal , Greg Lauer , Joud Khoury , Nick Hoff , Joe Loyall
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.476-495, ⟨10.1007/978-3-642-35170-9_24⟩
Conference papers hal-01555554v1
Image document

Netflow-Based Malware Detection and Data Visualisation System

Rafał Kozik , Robert Młodzikowski , Michał Choraś
16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.652-660, ⟨10.1007/978-3-319-59105-6_56⟩
Conference papers hal-01656262v1
Image document

Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms

Marios Belk , Christos Fidas , Panagiotis Germanakos , George Samaras
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.442-459, ⟨10.1007/978-3-642-40477-1_27⟩
Conference papers hal-01504900v1
Image document

Protecting Third Party Privacy in Digital Forensic Investigations

Wynand Van Staden
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.19-31, ⟨10.1007/978-3-642-41148-9_2⟩
Conference papers hal-01460618v1
Image document

Impact of Perceived Connectivity on Intention to Use Social Media: Modelling the Moderation Effects of Perceived Risk and Security

Samuel Fosso Wamba , Shahriar Akter
15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.219-227, ⟨10.1007/978-3-319-45234-0_20⟩
Conference papers hal-01702181v1

Urban Agriculture: A Growing Field of Research

Peter Lyle , Jaz Jaz Hee-Jeong Choi , Shaun Lawson , Christopher Lueg , Alan Chamberlain , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.785
Conference papers hal-01514071v1
Image document

Econometric Feedback for Runtime Risk Management in VoIP Architectures

Oussema Dabbebi , Badonnel Rémi , Festor Olivier
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.26-37, ⟨10.1007/978-3-642-21484-4_3⟩
Conference papers hal-00747274v1
Image document

Readability of Privacy Policies

Barbara Krumay , Jennifer Klar
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.388-399, ⟨10.1007/978-3-030-49669-2_22⟩
Conference papers hal-03243632v1
Image document

Security and privacy issues related to quick response codes

Pulkit Garg , Saheb Chhabra , Gaurav Gupta , Garima Gupta , Monika Gupta
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.255-267, ⟨10.1007/978-3-030-88381-2_13⟩
Conference papers hal-03764371v1
Image document

Towards Safety and Security-Related Testing of Crisis Management Solutions

Todor Tagarev , Petya Ivanova , Laurent Dubost , Cyril Dangerville
5th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Dec 2020, Sofia, Bulgaria. pp.216-234, ⟨10.1007/978-3-030-81469-4_18⟩
Conference papers hal-03761639v1
Image document

Building Resilient Community Through Plant Back Better Initiative – Guiding Principles and Best Practices

Yanling Lee , Wei-Sen Li , Yi-Ching Liu , Ke-Hui Chen , Chi-Ling Chang , et al.
4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.85-106, ⟨10.1007/978-3-030-48939-7_9⟩
Conference papers hal-03374248v1