Filter your results
- 3
- 1
- 3
- 3
- 3
- 3
- 2
- 1
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Inference Leakage Detection for Authorization Policies over RDF Data29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers
hal-01745813v1
|
||
|
A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.411-424
Conference papers
hal-01728801v1
|
||
|
Games, from Engaging to Understanding: A Perspective from a Museum of Computing Machinery14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.439-444, ⟨10.1007/978-3-319-24589-8_37⟩
Conference papers
hal-01758467v1
|