Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

815 results
Deposit type : Fulltext
Image document

Selective Disclosure on Encrypted Documents

Hao Lei , Dengguo Feng
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.255-262, ⟨10.1007/978-3-642-22348-8_21⟩
Conference papers hal-01586575v1
Image document

Accurate Accident Reconstruction in VANET

Yuliya Kopylova , Csilla Farkas , Wenyuan Xu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.271-279, ⟨10.1007/978-3-642-22348-8_23⟩
Conference papers hal-01586576v1
Image document

A New Leakage-Resilient IBE Scheme in the Relative Leakage Model

Yu Chen , Song Luo , Zhong Chen
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.263-270, ⟨10.1007/978-3-642-22348-8_22⟩
Conference papers hal-01586577v1
Image document

An Index Structure for Private Data Outsourcing

Aaron Steele , Keith B. Frikken
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.247-254, ⟨10.1007/978-3-642-22348-8_20⟩
Conference papers hal-01586578v1
Image document

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity

Florian Kerschbaum
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers hal-01586579v1
Image document

Privacy-Preserving Data Mining: A Game-Theoretic Approach

Atsuko Miyaji , Mohammad Shahriar Rahman
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.186-200, ⟨10.1007/978-3-642-22348-8_15⟩
Conference papers hal-01586580v1
Image document

Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning

Varun Dutt , Young-Suk Ahn , Cleotilde Gonzalez
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.280-292, ⟨10.1007/978-3-642-22348-8_24⟩
Conference papers hal-01586581v1
Image document

Verifiable Secret Sharing with Comprehensive and Efficient Public Verification

Kun Peng
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.217-230, ⟨10.1007/978-3-642-22348-8_17⟩
Conference papers hal-01586582v1
Image document

Cooperative Data Access in Multi-cloud Environments

Meixing Le , Krishna Kant , Sushil Jajodia
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.14-28, ⟨10.1007/978-3-642-22348-8_4⟩
Conference papers hal-01586583v1
Image document

N-Gram Based Secure Similar Document Detection

Wei Jiang , Bharath K. Samanthula
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers hal-01586584v1
Image document

History-Dependent Inference Control of Queries by Dynamic Policy Adaption

Joachim Biskup
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.106-121, ⟨10.1007/978-3-642-22348-8_10⟩
Conference papers hal-01586585v1
Image document

Re-designing the Web’s Access Control System

Wenliang Du , Xi Tan , Tongbo Luo , Karthick Jayaraman , Zutao Zhu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers hal-01586586v1
Image document

A Robust Remote User Authentication Scheme against Smart Card Security Breach

Chun-Ta Li , Cheng-Chi Lee , Chen-Ju Liu , Chin-Wen Lee
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers hal-01586587v1
Image document

Query Processing in Private Data Outsourcing Using Anonymization

Ahmet Erhan Nergiz , Chris Clifton
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.138-153, ⟨10.1007/978-3-642-22348-8_12⟩
Conference papers hal-01586588v1
Image document

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach

Valentina Ciriani , Sabrina De Capitani Di Vimercati , Sara Foresti , Giovanni Livraga , Pierangela Samarati
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.44-59, ⟨10.1007/978-3-642-22348-8_6⟩
Conference papers hal-01586589v1
Image document

Preserving Privacy in Structural Neuroimages

Nakeisha Schimke , Mary Kuehler , John Hale
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.301-308, ⟨10.1007/978-3-642-22348-8_26⟩
Conference papers hal-01586590v1
Image document

Information Flow Containment: A Practical Basis for Malware Defense

R. Sekar
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.1-3, ⟨10.1007/978-3-642-22348-8_1⟩
Conference papers hal-01586591v1
Image document

Efficient Distributed Linear Programming with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers hal-01586592v1
Image document

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC

Solomon Berhe , Steven Demurjian , Swapna Gokhale , Jaime Pavlich-Mariscal , Rishi Saripalle
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.293-300, ⟨10.1007/978-3-642-22348-8_25⟩
Conference papers hal-01586593v1
Image document

Private Database Search with Sublinear Query Time

Keith B. Frikken , Boyang Li
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.154-169, ⟨10.1007/978-3-642-22348-8_13⟩
Conference papers hal-01586594v1
Image document

An Optimization Model for the Extended Role Mining Problem

Emre Uzun , Vijayalakshmi Atluri , Haibing Lu , Jaideep Vaidya
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers hal-01586595v1
Image document

Mobility in Collaborative Alert Systems: Building Trust through Reputation

Manuel Gil Pérez , Félix Gómez Mármol , Gregorio Martínez Pérez , Antonio F. Gómez Skarmeta
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.251-262, ⟨10.1007/978-3-642-23041-7_24⟩
Conference papers hal-01587832v1
Image document

Energy-Aware Hardware Implementation of Network Coding

Georgios Angelopoulos , Muriel Médard , Anantha P. Chandrakasan
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.137-144, ⟨10.1007/978-3-642-23041-7_14⟩
Conference papers hal-01587833v1
Image document

Techno-Economic Evaluation of Cognitive Radio in a Factory Scenario

Matthias Barrie , Lieven Tytgat , Vânia Gonçalves , Opher Yaron , Ingrid Moerman , et al.
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.52-61, ⟨10.1007/978-3-642-23041-7_6⟩
Conference papers hal-01587834v1
Image document

Decoding Algorithms for Random Linear Network Codes

Janus Heide , Morten V. Pedersen , Frank Fitzek
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.129-136, ⟨10.1007/978-3-642-23041-7_13⟩
Conference papers hal-01587835v1
Image document

Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks

Olga León , Rodrigo Román , Juan Hernández-Serrano
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.231-242, ⟨10.1007/978-3-642-23041-7_22⟩
Conference papers hal-01587836v1
Image document

Low-Power Low-Rate Goes Long-Range: The Case for Secure and Cooperative Machine-to-Machine Communications

Andrea Bartoli , Mischa Dohler , Juan Hernández-Serrano , Apostolos Kountouris , Dominique Barthel
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.219-230, ⟨10.1007/978-3-642-23041-7_21⟩
Conference papers hal-01587837v1
Image document

Analyzing Local Strategies for Energy-Efficient Networking

Sergio Ricciardi , Davide Careglio , Ugo Fiore , Francesco Palmieri , Germán Santos-Boada , et al.
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.291-300, ⟨10.1007/978-3-642-23041-7_28⟩
Conference papers hal-01587838v1
Image document

Short and Efficient Certificate-Based Signature

Joseph K. Liu , Feng Bao , Jianying Zhou
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.167-178, ⟨10.1007/978-3-642-23041-7_17⟩
Conference papers hal-01587839v1
Image document

Realizing the Broker Based Dynamic Spectrum Allocation through LTE Virtualization and Uniform Auctioning

Yasir Zaki , Manzoor Ahmed Khan , Liang Zhao , Carmelita Görg
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.85-97, ⟨10.1007/978-3-642-23041-7_9⟩
Conference papers hal-01587840v1