Filter your results
- 453
- 2
- 2
- 454
- 3
- 457
- 100
- 1
- 123
- 93
- 32
- 35
- 30
- 25
- 34
- 27
- 32
- 50
- 57
- 50
- 66
- 19
- 457
- 8
- 6
- 4
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Ransomware Steals Your Phone. Formal Methods Rescue It36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.212-221, ⟨10.1007/978-3-319-39570-8_14⟩
Conference papers
hal-01432919v1
|
||
|
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi DiagramsInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.141-157, ⟨10.1007/978-3-319-45507-5_10⟩
Conference papers
hal-01635003v1
|
||
|
A Threat to Friendship Privacy in FacebookInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.96-105, ⟨10.1007/978-3-319-45507-5_7⟩
Conference papers
hal-01635021v1
|
||
|
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.308-315, ⟨10.1007/978-3-642-12368-9_24⟩
Conference papers
hal-01056076v1
|
||
|
Improving Computer Security Dialogs13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.18-35, ⟨10.1007/978-3-642-23768-3_2⟩
Conference papers
hal-01596947v1
|
||
|
Privacy-Preserving Environment Monitoring in Networks of Mobile DevicesInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.179-191, ⟨10.1007/978-3-642-23041-7_18⟩
Conference papers
hal-01587843v1
|
||
|
Privacy Concern and Trust in Using Social Network Sites: A Comparison between French and Chinese Users13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.234-241, ⟨10.1007/978-3-642-23765-2_16⟩
Conference papers
hal-01591822v1
|
||
|
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.16-25, ⟨10.1007/978-3-642-32805-3_2⟩
Conference papers
hal-01540894v1
|
||
|
Multiparty Authorization Framework for Data Sharing in Online Social Networks23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers
hal-01586571v1
|
||
|
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.278-290, ⟨10.1007/978-3-030-81242-3_16⟩
Conference papers
hal-03677043v1
|
||
|
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.92-103, ⟨10.1007/978-3-662-44885-4_8⟩
Conference papers
hal-01404190v1
|
||
|
Using Model Driven Security Approaches in Web Application Development2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers
hal-01397248v1
|
||
|
A Trust-Based Defensive System Model for Cloud Computing8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.146-159, ⟨10.1007/978-3-642-24403-2_12⟩
Conference papers
hal-01593026v1
|
||
|
Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization Mechanism35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.43-60, ⟨10.1007/978-3-030-81242-3_3⟩
Conference papers
hal-03677038v1
|
||
|
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers
hal-01284854v1
|
||
|
Decentralized Bootstrap for Social Overlay Networks15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.140-143, ⟨10.1007/978-3-662-44885-4_13⟩
Conference papers
hal-01404205v1
|
||
|
From MDM to DB2: A Case Study of Security Enforcement Migration26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers
hal-01534771v1
|
||
|
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers
hal-01551363v1
|
||
|
Multi-domain DDoS Mitigation Based on Blockchains11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.185-190, ⟨10.1007/978-3-319-60774-0_19⟩
Conference papers
hal-01806051v1
|
||
|
P3S: A Privacy Preserving Publish-Subscribe Middleware13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.476-495, ⟨10.1007/978-3-642-35170-9_24⟩
Conference papers
hal-01555554v1
|
||
|
Netflow-Based Malware Detection and Data Visualisation System16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.652-660, ⟨10.1007/978-3-319-59105-6_56⟩
Conference papers
hal-01656262v1
|
||
|
Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.442-459, ⟨10.1007/978-3-642-40477-1_27⟩
Conference papers
hal-01504900v1
|
||
|
Protecting Third Party Privacy in Digital Forensic Investigations9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.19-31, ⟨10.1007/978-3-642-41148-9_2⟩
Conference papers
hal-01460618v1
|
||
|
Impact of Perceived Connectivity on Intention to Use Social Media: Modelling the Moderation Effects of Perceived Risk and Security15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.219-227, ⟨10.1007/978-3-319-45234-0_20⟩
Conference papers
hal-01702181v1
|
||
Urban Agriculture: A Growing Field of Research14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.785
Conference papers
hal-01514071v1
|
|||
|
Econometric Feedback for Runtime Risk Management in VoIP Architectures5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.26-37, ⟨10.1007/978-3-642-21484-4_3⟩
Conference papers
hal-00747274v1
|
||
|
Readability of Privacy Policies34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.388-399, ⟨10.1007/978-3-030-49669-2_22⟩
Conference papers
hal-03243632v1
|
||
|
Security and privacy issues related to quick response codes17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.255-267, ⟨10.1007/978-3-030-88381-2_13⟩
Conference papers
hal-03764371v1
|
||
|
Towards Safety and Security-Related Testing of Crisis Management Solutions5th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Dec 2020, Sofia, Bulgaria. pp.216-234, ⟨10.1007/978-3-030-81469-4_18⟩
Conference papers
hal-03761639v1
|
||
|
Building Resilient Community Through Plant Back Better Initiative – Guiding Principles and Best Practices4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.85-106, ⟨10.1007/978-3-030-48939-7_9⟩
Conference papers
hal-03374248v1
|