Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

12 results
Image document

The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication

Marko Vukolić
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.112-125, ⟨10.1007/978-3-319-39028-4_9⟩
Conference papers hal-01445797v1
Image document

A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds

Anil Kurmus , Moitrayee Gupta , Roman Pletka , Christian Cachin , Robert Haas
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.471-490, ⟨10.1007/978-3-642-25821-3_24⟩
Conference papers hal-01597761v1

Open Problems in Network Security

Jan Camenisch , Dogan Kesdogan
Springer, LNCS-7039, 2012, Lecture Notes in Computer Science, 978-3-642-27584-5. ⟨10.1007/978-3-642-27585-2⟩
Books hal-01481511v1
Image document

Towards a Compiler for Business-IT Systems

Jana Koehler , Thomas Gschwind , Jochen Küster , Hagen Völzer , Olaf Zimmermann
3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.1-19, ⟨10.1007/978-3-642-22386-0_1⟩
Conference papers hal-01572538v1

Open Problems in Network Security

Jan Camenisch , Doğan Kesdoğan
Springer, LNCS-9591, 2016, Open Problems in Network Security, 978-3-319-39027-7. ⟨10.1007/978-3-319-39028-4⟩
Books hal-01445799v1

Distributed Applications and Interoperable Systems

Lydia Y. Chen , Hans Reiser
Springer International Publishing, LNCS-10320, 2017, Lecture Notes in Computer Science, 978-3-319-59664-8. ⟨10.1007/978-3-319-59665-5⟩
Books hal-01800116v1
Image document

Data-Minimizing Authentication Goes Mobile

Patrik Bichsel , Jan Camenisch , Bart De Decker , Jorn Lapon , Vincent Naessens , et al.
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers hal-01540904v1

Open Research Problems in Network Security

Jan Camenisch , Valentin Kisimov , Maria Dubovitskaya
Springer, LNCS-6555, 2011, Lecture Notes in Computer Science, 978-3-642-19227-2. ⟨10.1007/978-3-642-19228-9⟩
Books hal-01581329v1
Image document

Scalable High Resolution Traffic Heatmaps: Coherent Queue Visualization for Datacenters

Andreea Anghel , Robert Birke , Mitch Gusat
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.26-37, ⟨10.1007/978-3-642-54999-1_3⟩
Conference papers hal-01396469v1
Image document

Contrail: Enabling Decentralized Social Networks on Smartphones

Patrick Stuedi , Iqbal Mohomed , Mahesh Balakrishnan , Z. Morley Mao , Venugopalan Ramasubramanian , et al.
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.41-60, ⟨10.1007/978-3-642-25821-3_3⟩
Conference papers hal-01597767v1
Image document

Facing Complexity in Systems Management

Metin Feridun
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.1-1, ⟨10.1007/978-3-642-13986-4_1⟩
Conference papers hal-01056636v1
Image document

Fair Private Set Intersection with a Semi-trusted Arbiter

Changyu Dong , Liqun Chen , Jan Camenisch , Giovanni Russello
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers hal-01490721v1