Filter your results
- 5
- 5
- 5
- 1
- 1
- 2
- 1
- 5
- 4
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers
hal-01875521v1
|
||
|
Bringing Complex Event Processing into Multitree Modelling of Sensors16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.196-210, ⟨10.1007/978-3-319-39577-7_16⟩
Conference papers
hal-01434795v1
|
||
|
Network Functions Virtualization Access Control as a Service34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.100-117, ⟨10.1007/978-3-030-49669-2_6⟩
Conference papers
hal-03243624v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
Adaptive Guard Time for Energy-Efficient IEEE 802.15.4 TSCH Networks17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.66-77, ⟨10.1007/978-3-030-30523-9_2⟩
Conference papers
hal-02458546v1
|