Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

5 results
Image document

A Longitudinal Study of BGP MOAS Prefixes

Quentin Jacquemart , Guillaume Urvoy-Keller , Ernst Biersack
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.127-138, ⟨10.1007/978-3-642-54999-1_11⟩
Conference papers hal-01396480v1
Image document

HiPoLDS: A Security Policy Language for Distributed Systems

Matteo Dell’amico , Gabriel Serme , Muhammad Sabir Idrees , Anderson Santana de Olivera , Yves Roudier
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.97-112, ⟨10.1007/978-3-642-30955-7_10⟩
Conference papers hal-01534303v1
Image document

EFD: An efficient low-overhead scheduler

Jinbang Chen , Martin Heusse , Guillaume Urvoy-Keller
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.150-163, ⟨10.1007/978-3-642-20798-3_12⟩
Conference papers hal-00930973v1
Image document

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks

Johann Schlamp , Ralph Holz , Oliver Gasser , Andreas Korsten , Quentin Jacquemart , et al.
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.173-187, ⟨10.1007/978-3-319-17172-2_12⟩
Conference papers hal-01411193v1
Image document

Breaking and Fixing the Security Proof of Garbled Bloom Filters

Cédric Van Rompay , Melek Önen
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.263-277, ⟨10.1007/978-3-319-95729-6_17⟩
Conference papers hal-01954406v1