Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : Faculty of Computer Science [TU Dresden]
labStructName_s : Concordia Institute for Information Systems Engineering
Image document

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

Abdel Alim Kamal , Roger Zahno , Amr M. Youssef
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers hal-01506556v1
Image document

Advanced Approach to Future Service Development

Tetiana Kot , Larisa Globa , Alexander Schill
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.233-244, ⟨10.1007/978-3-642-40552-5_21⟩
Conference papers hal-01497020v1
Image document

IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices

Florent Fourcot , Laurent Toutain , Stefan Köpsell , Frédéric Cuppens , Nora Cuppens-Boulahia
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.148-160, ⟨10.1007/978-3-642-40552-5_14⟩
Conference papers hal-01497012v1