Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

2 results
Deposit type : Fulltext
labStructName_s : SAP Research [Karlsruhe]
labStructName_s : Norwegian Information Security Laboratory
Image document

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity

Florian Kerschbaum
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers hal-01586579v1
Image document

Identifying Malware Using Cross-Evidence Correlation

Anders Flaglien , Katrin Franke , Andre Arnes
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.169-182, ⟨10.1007/978-3-642-24212-0_13⟩
Conference papers hal-01569545v1