Filter your results
- 2
- 1
- 2
- 1
- 3
- 1
- 1
- 1
- 3
- 1
- 3
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.453-472, ⟨10.1007/978-3-319-61176-1_25⟩
Conference papers
hal-01684370v1
|
||
|
Policy Languages and Their Suitability for Trust Negotiation32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.69-84, ⟨10.1007/978-3-319-95729-6_5⟩
Conference papers
hal-01954417v1
|
||
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-9895, 2016, Lecture Notes in Computer Science, 978-3-319-45930-1. ⟨10.1007/978-3-319-45931-8⟩
Books
hal-01639612v1
|