Filter your results
- 6
- 2
- 6
- 2
- 8
- 1
- 1
- 2
- 2
- 2
- 1
- 8
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
8 results
|
|
sorted by
|
|
Veracity, Plausibility, and Reputation6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.20-28, ⟨10.1007/978-3-642-30955-7_3⟩
Conference papers
hal-01534317v1
|
||
|
Rescuing Wireless Sensor Networks Security from Science FictionInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.192-206, ⟨10.1007/978-3-642-23041-7_19⟩
Conference papers
hal-01587848v1
|
||
|
Smart Card Research and Advanced ApplicationsSpringer, LNCS-6035, 2010, Lecture Notes in Computer Science, 978-3-642-12509-6. ⟨10.1007/978-3-642-12510-2⟩
Books
hal-01550563v1
|
||
|
Automatic Handover Decision in Content Centric Networking18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.286-297, ⟨10.1007/978-3-642-32808-4_26⟩
Conference papers
hal-01543141v1
|
||
|
Formal Analysis of CWA 14890-110th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.314-335, ⟨10.1007/978-3-642-27257-8_20⟩
Conference papers
hal-01596294v1
|
||
Information Security: Theory and PracticeSpringer, LNCS-7886, 2013, Lecture Notes in Computer Science, 978-3-642-38529-2. ⟨10.1007/978-3-642-38530-8⟩
Books
hal-01485939v1
|
|||
|
Reusable Components for Lightweight Mechanisation of Programming Languages12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.1-16, ⟨10.1007/978-3-642-39614-4_1⟩
Conference papers
hal-01492773v1
|
||
|
Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.153-173, ⟨10.1007/978-3-030-49669-2_9⟩
Conference papers
hal-03243622v1
|