Filter your results
- 815
- 27
- 815
- 814
- 104
- 15
- 12
- 788
- 815
- 9
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Selective Disclosure on Encrypted Documents23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.255-262, ⟨10.1007/978-3-642-22348-8_21⟩
Conference papers
hal-01586575v1
|
||
|
Accurate Accident Reconstruction in VANET23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.271-279, ⟨10.1007/978-3-642-22348-8_23⟩
Conference papers
hal-01586576v1
|
||
|
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.263-270, ⟨10.1007/978-3-642-22348-8_22⟩
Conference papers
hal-01586577v1
|
||
|
An Index Structure for Private Data Outsourcing23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.247-254, ⟨10.1007/978-3-642-22348-8_20⟩
Conference papers
hal-01586578v1
|
||
|
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers
hal-01586579v1
|
||
|
Privacy-Preserving Data Mining: A Game-Theoretic Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.186-200, ⟨10.1007/978-3-642-22348-8_15⟩
Conference papers
hal-01586580v1
|
||
|
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.280-292, ⟨10.1007/978-3-642-22348-8_24⟩
Conference papers
hal-01586581v1
|
||
|
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.217-230, ⟨10.1007/978-3-642-22348-8_17⟩
Conference papers
hal-01586582v1
|
||
|
Cooperative Data Access in Multi-cloud Environments23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.14-28, ⟨10.1007/978-3-642-22348-8_4⟩
Conference papers
hal-01586583v1
|
||
|
N-Gram Based Secure Similar Document Detection23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers
hal-01586584v1
|
||
|
History-Dependent Inference Control of Queries by Dynamic Policy Adaption23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.106-121, ⟨10.1007/978-3-642-22348-8_10⟩
Conference papers
hal-01586585v1
|
||
|
Re-designing the Web’s Access Control System23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers
hal-01586586v1
|
||
|
A Robust Remote User Authentication Scheme against Smart Card Security Breach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers
hal-01586587v1
|
||
|
Query Processing in Private Data Outsourcing Using Anonymization23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.138-153, ⟨10.1007/978-3-642-22348-8_12⟩
Conference papers
hal-01586588v1
|
||
|
Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.44-59, ⟨10.1007/978-3-642-22348-8_6⟩
Conference papers
hal-01586589v1
|
||
|
Preserving Privacy in Structural Neuroimages23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.301-308, ⟨10.1007/978-3-642-22348-8_26⟩
Conference papers
hal-01586590v1
|
||
|
Information Flow Containment: A Practical Basis for Malware Defense23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.1-3, ⟨10.1007/978-3-642-22348-8_1⟩
Conference papers
hal-01586591v1
|
||
|
Efficient Distributed Linear Programming with Limited Disclosure23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers
hal-01586592v1
|
||
|
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.293-300, ⟨10.1007/978-3-642-22348-8_25⟩
Conference papers
hal-01586593v1
|
||
|
Private Database Search with Sublinear Query Time23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.154-169, ⟨10.1007/978-3-642-22348-8_13⟩
Conference papers
hal-01586594v1
|
||
|
An Optimization Model for the Extended Role Mining Problem23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers
hal-01586595v1
|
||
|
Mobility in Collaborative Alert Systems: Building Trust through ReputationInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.251-262, ⟨10.1007/978-3-642-23041-7_24⟩
Conference papers
hal-01587832v1
|
||
|
Energy-Aware Hardware Implementation of Network CodingInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.137-144, ⟨10.1007/978-3-642-23041-7_14⟩
Conference papers
hal-01587833v1
|
||
|
Techno-Economic Evaluation of Cognitive Radio in a Factory ScenarioInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.52-61, ⟨10.1007/978-3-642-23041-7_6⟩
Conference papers
hal-01587834v1
|
||
|
Decoding Algorithms for Random Linear Network CodesInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.129-136, ⟨10.1007/978-3-642-23041-7_13⟩
Conference papers
hal-01587835v1
|
||
|
Towards a Cooperative Intrusion Detection System for Cognitive Radio NetworksInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.231-242, ⟨10.1007/978-3-642-23041-7_22⟩
Conference papers
hal-01587836v1
|
||
|
Low-Power Low-Rate Goes Long-Range: The Case for Secure and Cooperative Machine-to-Machine CommunicationsInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.219-230, ⟨10.1007/978-3-642-23041-7_21⟩
Conference papers
hal-01587837v1
|
||
|
Analyzing Local Strategies for Energy-Efficient NetworkingInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.291-300, ⟨10.1007/978-3-642-23041-7_28⟩
Conference papers
hal-01587838v1
|
||
|
Short and Efficient Certificate-Based SignatureInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.167-178, ⟨10.1007/978-3-642-23041-7_17⟩
Conference papers
hal-01587839v1
|
||
|
Realizing the Broker Based Dynamic Spectrum Allocation through LTE Virtualization and Uniform AuctioningInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.85-97, ⟨10.1007/978-3-642-23041-7_9⟩
Conference papers
hal-01587840v1
|