Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption

Bernd Zwattendorfer , Daniel Slamanig , Klaus Stranacher , Felix Hörandner
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.92-103, ⟨10.1007/978-3-662-44885-4_8⟩
Conference papers hal-01404190v1
Image document

Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider

André Zúquete , Hélder Gomes , Cláudio Teixeira
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.160-169, ⟨10.1007/978-3-662-43826-8_12⟩
Conference papers hal-01400938v1
Image document

Improving Log-Based Fault Diagnosis by Log Classification

Deqing Zou , Hao Qin , Hai Jin , Weizhong Qiang , Zongfen Han , et al.
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.446-458, ⟨10.1007/978-3-662-44917-2_37⟩
Conference papers hal-01403114v1
Image document

A Novel Resource Provisioning Model for DHT-Based Cloud Storage Systems

Jingya Zhou , Wen He
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.257-268, ⟨10.1007/978-3-662-44917-2_22⟩
Conference papers hal-01403091v1
Image document

A Location Privacy Preserving Method Based on Sensitive Diversity for LBS

Changli Zhou , Chunguang Ma , Songtao Yang , Peng Wu , Linlin Liu
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.409-422, ⟨10.1007/978-3-662-44917-2_34⟩
Conference papers hal-01403110v1
Image document

A Pipeline Optimization Model for QKD Post-processing System

Jianyi Zhou , Bo Liu , Baokang Zhao , Bo Liu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.472-481, ⟨10.1007/978-3-642-55032-4_48⟩
Conference papers hal-01397256v1
Image document

FSquaDRA: Fast Detection of Repackaged Applications

Yury Zhauniarovich , Olga Gadyatskaya , Bruno Crispo , Francesco La Spina , Ermanno Moser
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers hal-01285035v1
Image document

Towards a Key Consuming Detection in QKD-VoIP Systems

Guohong Zhao , Wanrong Yu , Baokang Zhao , Chunqing Wu
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.281-285, ⟨10.1007/978-3-319-10975-6_22⟩
Conference papers hal-01404007v1
Image document

A High-Speed Network Content Filtering System

Guohong Zhao , Shuhui Chen , Baokang Zhao , Ilsun You , Jinshu Su , et al.
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.257-269, ⟨10.1007/978-3-319-10975-6_20⟩
Conference papers hal-01404003v1
Image document

Control Protocol and Self-adaptive Mechanism for Live Virtual Machine Migration over XIA

Dalu Zhang , Xiang Jin , Dejiang Zhou , Jianpeng Wang , Jiaqi Zhu
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.357-368, ⟨10.1007/978-3-662-44917-2_30⟩
Conference papers hal-01403105v1
Image document

An Effective Cloud-Based Active Defense System against Malicious Codes

Zhenyu Zhang , Wujun Zhang , Jianfeng Wang , Xiaofeng Chen
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.690-695, ⟨10.1007/978-3-642-55032-4_71⟩
Conference papers hal-01397288v1
Image document

Capacity Region of Wireless Network Coding

Jun Zhang , Shu-Tao Xia
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.534-537, ⟨10.1007/978-3-662-44917-2_46⟩
Conference papers hal-01403133v1
Image document

CFIO2: Overlapping Communications and I/O with Computations Using RDMA Technology

Cheng Zhang , Xiaomeng Huang , Yong Hu , Shizhen Xu , Haohuan Fu , et al.
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.542-545, ⟨10.1007/978-3-662-44917-2_48⟩
Conference papers hal-01403137v1
Image document

The Stochastic Quality Calculus

Kebin Zeng , Flemming Nielson , Hanne Riis Nielson
16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.179-193, ⟨10.1007/978-3-662-43376-8_12⟩
Conference papers hal-01290076v1
Image document

Formal Specification and Verification of CRDTs

Peter Zeller , Annette Bieniusa , Arnd Poetzsch-Heffter
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43613-4_3⟩
Conference papers hal-01398007v1
Image document

Chaos Powered Grammatical Evolution

Ivan Zelinka , Petr Šaloun , Roman Senkerik
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.455-464, ⟨10.1007/978-3-662-45237-0_42⟩
Conference papers hal-01405629v1
Image document

Event Pattern Discovery for Cross-Layer Adaptation of Multi-cloud Applications

Chrysostomos Zeginis , Kyriakos Kritikos , Dimitris Plexousakis
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.138-147, ⟨10.1007/978-3-662-44879-3_10⟩
Conference papers hal-01318281v1
Image document

Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus

Carolina Zarate , Simson Garfinkel , Aubin Heffernan , Scott Horras , Kyle Gorak
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.117-132, ⟨10.1007/978-3-662-44952-3_9⟩
Conference papers hal-01393766v1
Image document

Detection of Network Flow Timestamp Reliability

Martin Žádnik , Erik Šabik , Václav Bartoš
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.147-159, ⟨10.1007/978-3-662-43862-6_18⟩
Conference papers hal-01401301v1
Image document

Message Passing Algorithm for the Generalized Assignment Problem

Mindi Yuan , Chong Jiang , Shen Li , Wei Shen , Yannis Pavlidis , et al.
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.423-434, ⟨10.1007/978-3-662-44917-2_35⟩
Conference papers hal-01403111v1
Image document

Scheduling Cloud Platform Managed Live-Migration Operations to Minimize the Makespan

Xiaoyong Yuan , Ying Li , Yanqi Wang , Kewei Sun
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.595-599, ⟨10.1007/978-3-662-44917-2_61⟩
Conference papers hal-01403159v1
Image document

Page Classifier and Placer: A Scheme of Managing Hybrid Caches

Xin Yu , Xuanhua Shi , Hai Jin , Xiaofei Liao , Song Wu , et al.
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.10-22, ⟨10.1007/978-3-662-44917-2_2⟩
Conference papers hal-01403053v1
Image document

Developing Value-Centric Business Models for Mobile Government

Chien-Chih Yu
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.325-336, ⟨10.1007/978-3-662-44426-9_27⟩
Conference papers hal-01401757v1
Image document

Temporal-Based Ranking in Heterogeneous Networks

Chen Yu , Ruidan Li , Dezhong Yao , Feng Lu , Hai Jin
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.23-34, ⟨10.1007/978-3-662-44917-2_3⟩
Conference papers hal-01403054v1
Image document

LDFGB Algorithm for Anomaly Intrusion Detection

Shang-Nan Yin , Zhi-Guo Chen , Sung-Ryul Kim
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.396-404, ⟨10.1007/978-3-642-55032-4_39⟩
Conference papers hal-01397240v1
Image document

Model-Based Development of Adaptive UIs for Multi-channel Self-service Systems

Enes Yigitbas , Holger Fischer , Thomas Kern , Volker Paelke
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.267-274, ⟨10.1007/978-3-662-44811-3_18⟩
Conference papers hal-01405084v1
Image document

Attribute-Based Fine-Grained Access Control with User Revocation

Jun Ye , Wujun Zhang , Shu-Lin Wu , Yuan-Yuan Gao , Jia-Tao Qiu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.586-595, ⟨10.1007/978-3-642-55032-4_60⟩
Conference papers hal-01397274v1
Image document

Efficient Variant of Rainbow without Triangular Matrix Representation

Takanori Yasuda , Tsuyoshi Takagi , Kouichi Sakurai
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.532-541, ⟨10.1007/978-3-642-55032-4_55⟩
Conference papers hal-01397267v1
Image document

Data Corpora for Digital Forensics Education and Research

York Yannikos , Lukas Graner , Martin Steinebach , Christian Winter
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.309-325, ⟨10.1007/978-3-662-44952-3_21⟩
Conference papers hal-01393787v1
Image document

PPMS: A Peer to Peer Metadata Management Strategy for Distributed File Systems

Di Yang , Weigang Wu , Zhansong Li , Jiongyu Yu , Yong Li
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.435-445, ⟨10.1007/978-3-662-44917-2_36⟩
Conference papers hal-01403112v1