Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

815 results
Deposit type : Fulltext
Image document

Memory-Efficient Fault Countermeasures

Marc Joye , Mohamed Karroumi
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.84-101, ⟨10.1007/978-3-642-27257-8_6⟩
Conference papers hal-01596299v1
Image document

Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

Marcel Medwed , Christoph Petit , Francesco Regazzoni , Mathieu Renauld , François-Xavier Standaert
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.115-132, ⟨10.1007/978-3-642-27257-8_8⟩
Conference papers hal-01596308v1
Image document

Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites

Ronald E. Leenes
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.254-254, ⟨10.1007/978-3-642-24712-5_28⟩
Conference papers hal-01596190v1
Image document

Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature

Ronny Merkel , Jana Dittmann , Claus Vielhauer
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.59-71, ⟨10.1007/978-3-642-24712-5_5⟩
Conference papers hal-01596193v1
Image document

Open Government Data: A Stage Model

Evangelos Kalampokis , Efthimios Tambouris , Konstantinos Tarabanis
10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.235-246, ⟨10.1007/978-3-642-22878-0_20⟩
Conference papers hal-01589083v1
Image document

A Scenario-Based Approach towards Open Collaboration for Policy Modelling

Melanie Bicking , Maria A. Wimmer
10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.223-234, ⟨10.1007/978-3-642-22878-0_19⟩
Conference papers hal-01589095v1
Image document

Multiparty Authorization Framework for Data Sharing in Online Social Networks

Hongxin Hu , Gail-Joon Ahn
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers hal-01586571v1
Image document

Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces

Fan Yang , Tomoyuki Aotani , Hidehiko Masuhara , Flemming Nielson , Hanne Riis Nielson
13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.202-218, ⟨10.1007/978-3-642-21464-6_14⟩
Conference papers hal-01582991v1
Image document

Scaling Microblogging Services with Divergent Traffic Demands

Tianyin Xu , Yang Chen , Lei Jiao , Ben Y. Zhao , Pan Hui , et al.
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.20-40, ⟨10.1007/978-3-642-25821-3_2⟩
Conference papers hal-01597765v1
Image document

Dynamic Software Birthmark for Java Based on Heap Memory Analysis

Patrick Chan , Lucas Hui , S. M. Yiu
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩
Conference papers hal-01596200v1
Image document

Can Persona Facilitate Ideation? A Comparative Study on Effects of Personas in Brainstorming

Xiantao Chen , Ying Liu , Ning Liu , Xiaojie Wang
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.491-494, ⟨10.1007/978-3-642-23768-3_65⟩
Conference papers hal-01596896v1
Image document

Verbal Use Case Specifications for Informal Requirements Elicitation

Eliezer Kantorowitz
7th Workshop on Human-Computer Interaction and Visualization (HCIV), Aug 2011, Rostock, Germany. pp.165-174, ⟨10.1007/978-3-642-54894-9_12⟩
Conference papers hal-01414703v1
Image document

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines

Michael Hutter , Martin Feldhofer , Johannes Wolkerstorfer
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers hal-01573313v1
Image document

Evaluating 16-Bit Processors for Elliptic Curve Cryptography

Erich Wenger , Mario Werner
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.166-181, ⟨10.1007/978-3-642-27257-8_11⟩
Conference papers hal-01596311v1
Image document

The Problem of Sensing Unused Cellular Spectrum

Daniel Willkomm , Sridhar Machiraju , Jean Bolot , Adam Wolisz
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.198-212, ⟨10.1007/978-3-642-20798-3_15⟩
Conference papers hal-01597965v1
Image document

Web Accessibility Requirements for Media Players

María González , Lourdes Moreno , Paloma Martinez , Ana Iglesias
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.669-674, ⟨10.1007/978-3-642-23768-3_109⟩
Conference papers hal-01596976v1
Image document

HTML 5 Support for an Accessible User-Video-Interaction on the Web

Lourdes Moreno , Paloma Martinez , Ana Iglesias , María Gonzalez
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.535-539, ⟨10.1007/978-3-642-23768-3_76⟩
Conference papers hal-01596986v1
Image document

Balancing by PREFLEX: Congestion Aware Traffic Engineering

João Taveira Araújo , Richard Clegg , Imad Grandi , Miguel Rio , George Pavlou
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.135-149, ⟨10.1007/978-3-642-20798-3_11⟩
Conference papers hal-01597978v1
Image document

A Novel Chaining Approach to Indirect Control Transfer Instructions

Wei Chen , Zhiying Wang , Qiang Dou , Yongwen Wang
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.309-320, ⟨10.1007/978-3-642-23300-5_24⟩
Conference papers hal-01590412v1
Image document

Design Opportunities for Supporting Treatment of People Living with HIV / AIDS in India

Anirudha Joshi , Mandar Rane , Debjani Roy , Shweta Sali , Neha Bharshankar , et al.
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.315-332, ⟨10.1007/978-3-642-23771-3_24⟩
Conference papers hal-01590862v1
Image document

A Trust-Based Defensive System Model for Cloud Computing

Qian Zhou , Jiong Yu , Feiran Yu
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.146-159, ⟨10.1007/978-3-642-24403-2_12⟩
Conference papers hal-01593026v1
Image document

Speaking to See: A Feasibility Study of Voice-Assisted Visual Search

Victor Kaptelinin , Herje Wåhlen
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.444-451, ⟨10.1007/978-3-642-23774-4_37⟩
Conference papers hal-01590557v1
Image document

Interoperability, Enterprise Architectures, and IT Governance in Government

Hans Jochen Scholl , Herbert Kubicek , Ralf Cimander
10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.345-354, ⟨10.1007/978-3-642-22878-0_29⟩
Conference papers hal-01589076v1
Image document

Online Games and Family Ties: Influences of Social Networking Game on Family Relationship

Jing Wen , Yong Ming Kow , Yunan Chen
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.250-264, ⟨10.1007/978-3-642-23765-2_18⟩
Conference papers hal-01591813v1
Image document

Computing and Information Technology Challenges for 21st Century Financial Market Regulators

Theresa A. Pardo , Djoko Sigit Sayogo , Donna S. Canestraro
10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.198-209, ⟨10.1007/978-3-642-22878-0_17⟩
Conference papers hal-01589093v1
Image document

Impact of Queueing Delay Estimation Error on Equilibrium and Its Stability

Corentin Briat , Emre A. Yavuz , Gunnar Karlsson
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.356-367, ⟨10.1007/978-3-642-20798-3_27⟩
Conference papers hal-01597988v1
Image document

Connecting eGovernment to Real Government - The Failure of the UN eParticipation Index

Åke Grönlund
10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.26-37, ⟨10.1007/978-3-642-22878-0_3⟩
Conference papers hal-01589085v1
Image document

MAC Layer Support for Delay Tolerant Video Transport in Disruptive MANETs

Morten Lindeberg , Stein Kristiansen , Vera Goebel , Thomas Plagemann
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.106-119, ⟨10.1007/978-3-642-20757-0_9⟩
Conference papers hal-01583420v1
Image document

Motif-Based Attack Detection in Network Communication Graphs

Krzysztof Juszczyszyn , Grzegorz Kołaczek
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.206-213, ⟨10.1007/978-3-642-24712-5_19⟩
Conference papers hal-01596210v1
Image document

Fast Key Recovery Attack on ARMADILLO1 and Variants

Pouyan Sepehrdad , Petr Sušil , Serge Vaudenay
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.133-150, ⟨10.1007/978-3-642-27257-8_9⟩
Conference papers hal-01596306v1