Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

4 results
Deposit type : Fulltext
labStructName_s : Microsoft Research [Cambridge]
labStructName_s : Groupe de Recherche en Informatique, Image et Instrumentation de Caen
Image document

Analysis of Revocation Strategies for Anonymous Idemix Credentials

Jorn Lapon , Markulf Kohlweiss , Bart De Decker , Vincent Naessens
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers hal-01596188v1
Image document

Impact of Dynamics on Situated and Global Aggregation Schemes

Rafik Makhloufi , Guillaume Doyen , Grégory Bonnet , Dominique Gaïti
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.148-159, ⟨10.1007/978-3-642-21484-4_17⟩
Conference papers hal-00951994v1
Image document

Memory-Side Acceleration for XML Parsing

Jie Tang , Shaoshan Liu , Zhimin Gu , Chen Liu , Jean-Luc Gaudiot
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.277-292, ⟨10.1007/978-3-642-24403-2_22⟩
Conference papers hal-01593022v1
Image document

Privacy Protection for Smartphones: An Ontology-Based Firewall

Johanne Vincent , Christine Porquet , Maroua Borsali , Harold Leboulanger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.371-380, ⟨10.1007/978-3-642-21040-2_27⟩
Conference papers hal-00801738v1