Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

6 results
Deposit type : Fulltext
labStructName_s : Center for Advanced Security Research Darmstadt [Darmstadt]
labStructName_s : Laboratoire d'Intégration des Systèmes et des Technologies
Image document

Modeling the German Legal Latitude Principles

Stephan Neumann , Anna Kahlert , Maria Henning , Philipp Richter , Hugo Jonker , et al.
5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers hal-01491259v1
Image document

TactiPEd: Easy prototyping of tactile patterns

Sabrina Panëels , Margarita Anastassova , Lucie Brunet
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.228-245, ⟨10.1007/978-3-642-40480-1_15⟩
Conference papers hal-01501746v1
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

Reducing the Time Required for Hashing Operations

Frank Breitinger , Kaloyan Petrov
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers hal-01460624v1
Image document

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks

Mohammed Bahria , Alexis Olivereau , Aymen Boudguiga
7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.157-162, ⟨10.1007/978-3-642-54140-7_15⟩
Conference papers hal-01291513v1
Image document

Robust Hash Algorithms for Text

Martin Steinebach , Peter Klöckner , Nils Reimers , Dominik Wienand , Patrick Wolf
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers hal-01492815v1