Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

5 results
Deposit type : Fulltext
labStructName_s : Department of Computer Science
labStructName_s : Microsoft Research [Cambridge]
Image document

Analysis of Revocation Strategies for Anonymous Idemix Credentials

Jorn Lapon , Markulf Kohlweiss , Bart De Decker , Vincent Naessens
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers hal-01596188v1
Image document

Memory-Side Acceleration for XML Parsing

Jie Tang , Shaoshan Liu , Zhimin Gu , Chen Liu , Jean-Luc Gaudiot
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.277-292, ⟨10.1007/978-3-642-24403-2_22⟩
Conference papers hal-01593022v1
Image document

Urban-X: A Self-organizing Cognitive Wireless Mesh Network for Dense City Environments

Luciano Bononi , Wooseong Kim , Andreas J. Kassler , Marco Di Felice , Mario Gerla
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.398-409, ⟨10.1007/978-3-642-21560-5_33⟩
Conference papers hal-01583638v1
Image document

Dynamics in Delegation and Revocation Schemes: A Logical Approach

Guillaume Aucher , Steve Barker , Guido Boella , Valerio Genovese , Leendert van Der Torre
23th Data and Applications Security (DBSec), Jul 2011, Richmond, United States. pp.90-105, ⟨10.1007/978-3-642-22348-8_9⟩
Conference papers inria-00593654v2
Image document

Preemptive Performance Monitoring of a Large Network of Wi-Fi Hotspots: An Artificial Immune System

Pheeha Machaka , Antoine Bagula
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.494-504, ⟨10.1007/978-3-642-21560-5_41⟩
Conference papers hal-01583663v1