Filter your results
- 3
- 1
- 3
- 3
- 3
- 3
- 2
- 1
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Inference Leakage Detection for Authorization Policies over RDF Data29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers
hal-01745813v1
|
||
|
Similitude: Decentralised Adaptation in Large-Scale P2P Recommenders15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.51-65, ⟨10.1007/978-3-319-19129-4_5⟩
Conference papers
hal-01138365v2
|
||
|
A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.411-424
Conference papers
hal-01728801v1
|