Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

5 results
Deposit type : Fulltext
labStructName_s : Center for Advanced Security Research Darmstadt [Darmstadt]
labStructName_s : Department of Information Management
Image document

Modeling the German Legal Latitude Principles

Stephan Neumann , Anna Kahlert , Maria Henning , Philipp Richter , Hugo Jonker , et al.
5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers hal-01491259v1
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

Reducing the Time Required for Hashing Operations

Frank Breitinger , Kaloyan Petrov
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers hal-01460624v1
Image document

A Novel Search Engine to Uncover Potential Victims for APT Investigations

Shun-Te Liu , Yi-Ming Chen , Shiou-Jing Lin
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.405-416, ⟨10.1007/978-3-642-40820-5_34⟩
Conference papers hal-01513755v1
Image document

Robust Hash Algorithms for Text

Martin Steinebach , Peter Klöckner , Nils Reimers , Dominik Wienand , Patrick Wolf
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers hal-01492815v1