Filter your results
- 4
- 1
- 4
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
Provable Network Activity for Protecting Users Against False Accusation10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.254-261, ⟨10.1007/978-3-319-45931-8_17⟩
Conference papers
hal-01639610v1
|
||
|
Open Data Landscape: A Global Perspective and a Focus on China14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.247-260, ⟨10.1007/978-3-319-25013-7_20⟩
Conference papers
hal-01448044v1
|
||
|
Leveraging Video Viewing Patterns for Optimal Content Placement11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.44-58, ⟨10.1007/978-3-642-30054-7_4⟩
Conference papers
hal-01531961v1
|
||
|
From Protecting a System to Protecting a Global Ecosystem12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.255-255, ⟨10.1007/978-3-642-24712-5_29⟩
Conference papers
hal-01596198v1
|
||
|
NETWORKING 2010Springer, LNCS-6091, 2010, Lecture Notes in Computer Science, 978-3-642-12962-9. ⟨10.1007/978-3-642-12963-6⟩
Books
hal-01555313v1
|