Filter your results
- 549
- 23
- 548
- 1
- 549
- 177
- 549
- 549
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Efficient and Generalized Decentralized Monitoring of Regular Languages34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.66-83, ⟨10.1007/978-3-662-43613-4_5⟩
Conference papers
hal-00972559v1
|
||
|
Metrics for Differential Privacy in Concurrent Systems34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Conference papers
hal-00879140v2
|
||
|
One-Time Biometrics for Online Banking and Electronic Payment AuthenticationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers
hal-01076676v1
|
||
|
Behave: Behavioral Cache for Web Content4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.89-103, ⟨10.1007/978-3-662-43352-2_8⟩
Conference papers
hal-01079976v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
A Study of RPL DODAG Version Attacks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.92-104, ⟨10.1007/978-3-662-43862-6_12⟩
Conference papers
hal-01090993v1
|
||
|
Outsourcing Mobile Security in the Cloud8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.69-73, ⟨10.1007/978-3-662-43862-6_9⟩
Conference papers
hal-01092239v1
|
||
|
Higher-Order Languages: Bisimulation and Coinductive Equivalences (Extended Abstract)Coalgebraic Methods in Computer Science, Apr 2014, Grenoble, France. pp.3 - 9, ⟨10.1007/978-3-662-44124-4_1⟩
Conference papers
hal-01092815v1
|
||
|
A Model-Based Certification Framework for the EnergyBus Standard34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.84-99, ⟨10.1007/978-3-662-43613-4_6⟩
Conference papers
hal-01098360v1
|
||
|
LINC: A Compact Yet Powerful Coordination EnvironmentCoordination Models and Languages : 16th IFIP WG 6.1 International Conference, COORDINATION 2014, Held as Part of the 9th International Federated Conferences on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014, Proceedings, Jun 2014, Berlin, Germany. pp.83-98, ⟨10.1007/978-3-662-43376-8_6⟩
Conference papers
hal-01274824v1
|
||
|
Integrity Assurance for Outsourced Databases without DBMS Modification28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.1-16, ⟨10.1007/978-3-662-43936-4_1⟩
Conference papers
hal-01284838v1
|
||
|
Optimizing Integrity Checks for Join Queries in the Cloud28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers
hal-01284840v1
|
||
|
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers
hal-01284842v1
|
||
|
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.82-97, ⟨10.1007/978-3-662-43936-4_6⟩
Conference papers
hal-01284843v1
|
||
|
Data Leakage Quantification28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.98-113, ⟨10.1007/978-3-662-43936-4_7⟩
Conference papers
hal-01284845v1
|
||
|
Toward Software Diversity in Heterogeneous Networked Systems28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.114-129, ⟨10.1007/978-3-662-43936-4_8⟩
Conference papers
hal-01284848v1
|
||
|
Design Patterns for Multiple Stakeholders in Social Computing28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.163-178, ⟨10.1007/978-3-662-43936-4_11⟩
Conference papers
hal-01284852v1
|
||
|
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers
hal-01284854v1
|
||
|
Dynamic Workflow Adjustment with Security Constraints28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers
hal-01284857v1
|
||
|
Consistent Query Plan Generation in Secure Cooperative Data Access28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers
hal-01284858v1
|
||
|
Hunting the Unknown28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers
hal-01284860v1
|
||
|
Mining Attribute-Based Access Control Policies from Logs28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩
Conference papers
hal-01284862v1
|
||
|
Attribute-Aware Relationship-Based Access Control for Online Social Networks28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.292-306, ⟨10.1007/978-3-662-43936-4_19⟩
Conference papers
hal-01284863v1
|
||
|
Randomly Partitioned Encryption for Cloud Databases28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.307-323, ⟨10.1007/978-3-662-43936-4_20⟩
Conference papers
hal-01284865v1
|
||
|
Towards Secure Cloud Database with Fine-Grained Access Control28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.324-338, ⟨10.1007/978-3-662-43936-4_21⟩
Conference papers
hal-01284867v1
|
||
|
Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.339-355, ⟨10.1007/978-3-662-43936-4_22⟩
Conference papers
hal-01284868v1
|
||
|
LPM: Layered Policy Management for Software-Defined Networks28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.356-363, ⟨10.1007/978-3-662-43936-4_23⟩
Conference papers
hal-01284871v1
|
||
|
On Minimizing the Size of Encrypted Databases28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.364-372, ⟨10.1007/978-3-662-43936-4_24⟩
Conference papers
hal-01284872v1
|
||
|
Efficient and Enhanced Solutions for Content Sharing in DRM Systems28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers
hal-01284873v1
|
||
|
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.382-389, ⟨10.1007/978-3-662-43936-4_26⟩
Conference papers
hal-01284874v1
|