Filter your results
- 13
- 13
- 13
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 1
- 2
- 1
- 13
- 1
- 1
- 1
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
13 results
|
|
sorted by
|
|
Virtualized Controller Placement for Multi-domain Optical Transport Networks23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.39-50, ⟨10.1007/978-3-030-38085-4_4⟩
Conference papers
hal-03200672v1
|
||
|
Preventing Unauthorized Data Flows31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.41-62, ⟨10.1007/978-3-319-61176-1_3⟩
Conference papers
hal-01684345v1
|
||
|
Assessing the Effects of a Soft Cut-Off in the Twitter Social Network10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.288-300, ⟨10.1007/978-3-642-20798-3_22⟩
Conference papers
hal-01597983v1
|
||
|
Application of Secondary Information for Misbehavior Detection in VANETs9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.385-396, ⟨10.1007/978-3-642-12963-6_31⟩
Conference papers
hal-01059125v1
|
||
|
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers
hal-01480209v1
|
||
|
Remedy: Network-Aware Steady State VM Management for Data Centers11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.190-204, ⟨10.1007/978-3-642-30045-5_15⟩
Conference papers
hal-01531120v1
|
||
|
Analysis of TRBAC with Dynamic Temporal Role Hierarchies27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.297-304, ⟨10.1007/978-3-642-39256-6_22⟩
Conference papers
hal-01490714v1
|
||
|
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.66-81, ⟨10.1007/978-3-642-40779-6_5⟩
Conference papers
hal-01492834v1
|
||
|
Migrating from DAC to RBAC29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.69-84, ⟨10.1007/978-3-319-20810-7_5⟩
Conference papers
hal-01745820v1
|
||
|
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.224-233, ⟨10.1007/978-3-642-21040-2_15⟩
Conference papers
hal-01573310v1
|
||
|
Enabling the Deployment of ABAC Policies in RBAC Systems32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.51-68, ⟨10.1007/978-3-319-95729-6_4⟩
Conference papers
hal-01954419v1
|
||
|
Toward Mining of Temporal Roles27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers
hal-01490718v1
|
||
|
Deciphering Text from Touchscreen Key Taps30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers
hal-01633681v1
|