Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

45 results
Image document

A “Strength of Decision Tree Equivalence”-Taxonomy and Its Impact on Test Suite Reduction

Hermann Felbinger , Ingo Pill , Franz Wotawa
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.197-212, ⟨10.1007/978-3-319-67549-7_12⟩
Conference papers hal-01678986v1
Image document

Anonymous Client Authentication for Transport Layer Security

Kurt Dietrich
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.268-280, ⟨10.1007/978-3-642-13241-4_24⟩
Conference papers hal-01056373v1
Image document

Performance Comparison of Two Search-Based Testing Strategies for ADAS System Validation

Florian Klück , Martin Zimmermann , Franz Wotawa , Mihai Nica
31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.140-156, ⟨10.1007/978-3-030-31280-0_9⟩
Conference papers hal-02526346v1
Image document

AI for Localizing Faults in Spreadsheets

Birgit Hofer , Iulia Nica , Franz Wotawa
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.71-87, ⟨10.1007/978-3-319-67549-7_5⟩
Conference papers hal-01678961v1
Image document

Plan It! Automated Security Testing Based on Planning

Franz Wotawa , Josip Bozic
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.48-62, ⟨10.1007/978-3-662-44857-1_4⟩
Conference papers hal-01405274v1
Image document

Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones

Andreas Holzinger , Peter Treitler , Wolfgang Slany
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.176-189, ⟨10.1007/978-3-642-32498-7_14⟩
Conference papers hal-01542428v1
Image document

Cross-Border Legal Identity Management

Bernd Zwattendorfer , Arne Tauber , Klaus Stranacher , Peter Reichstädter
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers hal-01543589v1
Image document

Explainable AI: the new 42?

Randy Goebel , Ajay Chander , Katharina Holzinger , Freddy Lecue , Zeynep Akata , et al.
2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.295-303, ⟨10.1007/978-3-319-99740-7_21⟩
Conference papers hal-01934928v1
Image document

Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves

Gerwin Gsenger , Christian Hanser
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.155-167
Conference papers hal-01506564v1
Image document

Side-Channel Leakage across Borders

Jörn-Marc Schmidt , Thomas Plos , Mario Kirschbaum , Michael Hutter , Marcel Medwed , et al.
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.36-48, ⟨10.1007/978-3-642-12510-2_4⟩
Conference papers hal-01056100v1
Image document

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms

Kurt Dietrich , Johannes Winter , Granit Luzhnica , Siegfried Podesser
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.45-58, ⟨10.1007/978-3-642-24712-5_4⟩
Conference papers hal-01596194v1
Image document

Evaluating Experiences in Different Virtual Reality Setups

Volker Settgast , Johanna Pirker , Stefan Lontschar , Stefan Maggale , Christian Gütl
15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.115-125, ⟨10.1007/978-3-319-46100-7_10⟩
Conference papers hal-01640299v1
Image document

Checking Response-Time Properties of Web-Service Applications Under Stochastic User Profiles

Richard Schumi , Priska Lang , Bernhard K. Aichernig , Willibald Krenn , Rupert Schlick
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.293-310, ⟨10.1007/978-3-319-67549-7_18⟩
Conference papers hal-01678972v1
Image document

Towards More Practical Time-Driven Cache Attacks

Raphael Spreitzer , Benoît Gérard
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.24-39, ⟨10.1007/978-3-662-43826-8_3⟩
Conference papers hal-01400918v1
Image document

The Shortest Path Game: Complexity and Algorithms

Andreas Darmann , Ulrich Pferschy , Joachim Schauer
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.39-53, ⟨10.1007/978-3-662-44602-7_4⟩
Conference papers hal-01402026v1
Image document

Implementation and Evaluation of an SCA-Resistant Embedded Processor

Stefan Tillich , Mario Kirschbaum , Alexander Szekely
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.151-165, ⟨10.1007/978-3-642-27257-8_10⟩
Conference papers hal-01596304v1
Image document

Novel Insights on Cross Project Fault Prediction Applied to Automotive Software

Harald Altinger , Steffen Herbold , Jens Grabowski , Franz Wotawa
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.141-157, ⟨10.1007/978-3-319-25945-1_9⟩
Conference papers hal-01470161v1
Image document

A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards

Michael Lackner , Reinhard Berlach , Wolfgang Raschke , Reinhold Weiss , Christian Steger
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.82-97, ⟨10.1007/978-3-642-38530-8_6⟩
Conference papers hal-01485935v1
Image document

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines

Michael Hutter , Martin Feldhofer , Johannes Wolkerstorfer
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers hal-01573313v1
Image document

Evaluating 16-Bit Processors for Elliptic Curve Cryptography

Erich Wenger , Mario Werner
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.166-181, ⟨10.1007/978-3-642-27257-8_11⟩
Conference papers hal-01596311v1
Image document

Insights into Learning Competence Through Probabilistic Graphical Models

Anna Saranti , Behnam Taraghi , Martin Ebner , Andreas Holzinger
3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.250-271, ⟨10.1007/978-3-030-29726-8_16⟩
Conference papers hal-02520054v1
Image document

Increasing Learning Motivation: An Empirical Study of VR Effects on the Vocational Training of Bank Clerks

Michael D. Kickmeier-Rust , Philipp Hann , Michael Leitner
1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.111-118, ⟨10.1007/978-3-030-34644-7_9⟩
Conference papers hal-03652040v1
Image document

A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption

Bernd Zwattendorfer , Daniel Slamanig , Klaus Stranacher , Felix Hörandner
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.92-103, ⟨10.1007/978-3-662-44885-4_8⟩
Conference papers hal-01404190v1
Image document

Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach

Rui Abreu , Simon Ausserlechner , Birgit Hofer , Franz Wotawa
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.124-140, ⟨10.1007/978-3-319-25945-1_8⟩
Conference papers hal-01470160v1

Machine Learning and Knowledge Extraction

Andreas Holzinger , Peter Kieseberg , a Min Tjoa , Edgar Weippl
Springer International Publishing, LNCS-11015, 2018, Lecture Notes in Computer Science, 978-3-319-99739-1. ⟨10.1007/978-3-319-99740-7⟩
Books hal-02060052v1
Image document

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves

Christian Hanser , Christian Wagner
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers hal-01506561v1
Image document

Trigger Alarm: A Smart NFC Sniffer for High-Precision Measurements

Martin Erb , Christian Steger , Martin Troyer , Josef Preishuber-Pflügl
32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.186-200, ⟨10.1007/978-3-030-64881-7_12⟩
Conference papers hal-03239810v1
Image document

Property-Based Testing for Parameter Learning of Probabilistic Graphical Models

Anna Saranti , Behnam Taraghi , Martin Ebner , Andreas Holzinger
4th International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2020, Dublin, Ireland. pp.499-515, ⟨10.1007/978-3-030-57321-8_28⟩
Conference papers hal-03414744v1
Image document

Extracting Semantic Knowledge from Twitter

Peter Teufl , Stefan Kraxberger
3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.48-59, ⟨10.1007/978-3-642-23333-3_5⟩
Conference papers hal-01589383v1
Image document

Navigational User Interface Elements on the Left Side: Intuition of Designers or Experimental Evidence?

Andreas Holzinger , Reinhold Scherer , Martina Ziefle
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.162-177, ⟨10.1007/978-3-642-23771-3_13⟩
Conference papers hal-01590864v1