Filter your results
- 4
- 1
- 4
- 4
- 4
- 4
- 3
- 1
- 5
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
4 results
|
|
sorted by
|
|
Provable Network Activity for Protecting Users Against False Accusation10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.254-261, ⟨10.1007/978-3-319-45931-8_17⟩
Conference papers
hal-01639610v1
|
||
|
Subsumption Reasoning for QoS-Based Service Matchmaking5th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2016, Vienna, Austria. pp.87-101, ⟨10.1007/978-3-319-44482-6_6⟩
Conference papers
hal-01638592v1
|
||
|
Towards Combined Functional and Non-functional Semantic Service Discovery5th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2016, Vienna, Austria. pp.102-117, ⟨10.1007/978-3-319-44482-6_7⟩
Conference papers
hal-01638595v1
|
||
|
Novel lightweight signcryption-based key distribution mechanisms for MIKEY10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Conference papers
hal-01391308v1
|