Filter your results
- 3
- 1
- 3
- 3
- 3
- 3
- 2
- 1
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Inference Leakage Detection for Authorization Policies over RDF Data29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers
hal-01745813v1
|
||
|
A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.411-424
Conference papers
hal-01728801v1
|
||
|
PerformLTE: A Testbed for LTE Testing in the Future Internet13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.46-59, ⟨10.1007/978-3-319-22572-2_4⟩
Conference papers
hal-01728791v1
|