Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : Groupe de Recherche en Informatique, Image et Instrumentation de Caen
labStructName_s : SAP Research [Karlsruhe]
Image document

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity

Florian Kerschbaum
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers hal-01586579v1
Image document

Privacy Protection for Smartphones: An Ontology-Based Firewall

Johanne Vincent , Christine Porquet , Maroua Borsali , Harold Leboulanger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.371-380, ⟨10.1007/978-3-642-21040-2_27⟩
Conference papers hal-00801738v1
Image document

Impact of Dynamics on Situated and Global Aggregation Schemes

Rafik Makhloufi , Guillaume Doyen , Grégory Bonnet , Dominique Gaïti
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.148-159, ⟨10.1007/978-3-642-21484-4_17⟩
Conference papers hal-00951994v1