Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

2 results
Deposit type : Fulltext
labStructName_s : Laboratoire d'informatique de l'école normale supérieure
labStructName_s : Institut Charles Delaunay
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Impact of Dynamics on Situated and Global Aggregation Schemes

Rafik Makhloufi , Guillaume Doyen , Grégory Bonnet , Dominique Gaïti
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.148-159, ⟨10.1007/978-3-642-21484-4_17⟩
Conference papers hal-00951994v1