Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

9 results
Image document

Views and Transactional Storage for Large Graphs

Michael M. Lee , Indrajit Roy , Alvin Auyoung , Vanish Talwar , K. R. Jayaram , et al.
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.287-306, ⟨10.1007/978-3-642-45065-5_15⟩
Conference papers hal-01480781v1
Image document

Privacy Management in Global Organisations

Siani Pearson
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.217-237, ⟨10.1007/978-3-642-32805-3_23⟩
Conference papers hal-01540892v1
Image document

Efficient Prevention of Credit Card Leakage from Enterprise Networks

Matthew Hall , Reinoud Koornstra , Miranda Mowbray
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.238-240, ⟨10.1007/978-3-642-24712-5_23⟩
Conference papers hal-01596206v1
Image document

Fair Private Set Intersection with a Semi-trusted Arbiter

Changyu Dong , Liqun Chen , Jan Camenisch , Giovanni Russello
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers hal-01490721v1
Image document

UTTOS: A Tool for Testing UEFI Code in OS Environment

Eder Gomes , Paulo Amora , Elvis M. Teixeira , Antonio Lima , Felipe T. Brito , et al.
28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.218-224, ⟨10.1007/978-3-319-47443-4_14⟩
Conference papers hal-01643726v1
Image document

On the Design and Implementation of an Efficient DAA Scheme

Liqun Chen , Dan Page , Nigel P. Smart
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.223-237, ⟨10.1007/978-3-642-12510-2_16⟩
Conference papers hal-01056104v1
Image document

Privacy Respecting Targeted Advertising for Social Networks

Christian Kahl , Stephen Crane , Markus Tschersich , Kai Rannenberg
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers hal-01573299v1
Image document

Elastic Remote Methods

K. R. Jayaram
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.143-162, ⟨10.1007/978-3-642-45065-5_8⟩
Conference papers hal-01480795v1
Image document

Comparison of Phone-Based Distal Pointing Techniques for Point-Select Tasks

Mohit Jain , Andy Cockburn , Sriganesh Madhvanath
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.714-721, ⟨10.1007/978-3-642-40480-1_49⟩
Conference papers hal-01501814v1