Filter your results
- 84
- 3
- 3
- 85
- 4
- 1
- 90
- 4
- 1
- 1
- 3
- 9
- 13
- 5
- 9
- 5
- 8
- 8
- 7
- 6
- 10
- 7
- 90
- 28
- 21
- 13
- 13
- 6
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 8
- 6
- 5
- 5
- 5
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Runtime Code Polymorphism as a Protection Against Side Channel Attacks10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.136-152, ⟨10.1007/978-3-319-45931-8_9⟩
Conference papers
emse-01372223v1
|
||
|
Characterizing Bufferbloat and its Impact at End-hosts6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.51-64, ⟨10.1007/978-3-642-54999-1_5⟩
Conference papers
hal-01097476v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|
||
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers
hal-01213982v1
|
||
Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposalCMC 2010 : 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, May 2010, Linz, Austria. pp.154 - 165
Conference papers
hal-00565730v1
|
|||
|
Network Traffic Classification Using Machine Learning for Software Defined Networks2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.28-39, ⟨10.1007/978-3-030-45778-5_3⟩
Conference papers
hal-03266452v1
|
||
|
Privacy in digital identity systems: models, assessment and user adoption14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers
hal-01283997v1
|
||
|
U-Note: Capture the Class and Access it EverywhereProceedings of the IFIP Conference on Human-Computer Interaction (Interact 2011), Sep 2011, Lisbonne, Portugal. pp.643-660, ⟨10.1007/978-3-642-23774-4_50⟩
Conference papers
hal-00671380v1
|
||
|
Guiding testers' hands in monitoring tools : application of testing approaches on SIP27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.105-123, ⟨10.1007/978-3-319-25945-1_7⟩
Conference papers
hal-01263247v1
|
||
|
Can technology be leveraged for bridging the rural-urban divide?I3E 2020 : The 19th IFIP Conference on e-Business, e-Services and e-Society, Apr 2020, Skukuza, Kruger National Park, South Africa. pp.301-306, ⟨10.1007/978-3-030-45002-1_25⟩
Conference papers
hal-03102283v1
|
||
|
A transversal alignment between measurements and enterprise architecture for early verification of telecom service design19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.245-256, ⟨10.1007/978-3-642-40552-5_22⟩
Conference papers
hal-00859979v1
|
||
|
Analysis of QUIC session establishment and its implementations13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩
Conference papers
hal-02468596v1
|
||
|
E-government trends in the Web 2.0 era and the open innovation perspective : an exploratory field studyIFIP EGOV 2011 : 10th International Conference on Electronic Government, Aug 2011, Delft, Netherlands. pp.210-222, ⟨10.1007/978-3-642-22878-0_18⟩
Conference papers
hal-01589072v1
|
||
|
fQuery: SPARQL Query Rewriting to Enforce Data ConfidentialityDBSEC 2010 : 24th annual IFIP WG 11.3 working conference on data and applications security and privacy XXIV, Jun 2010, Roma, Italy. pp.146-161, ⟨10.1007/978-3-642-13739-6_10⟩
Conference papers
hal-01056741v1
|
||
|
Grab 'n' Drop: User Configurable Toolglasses16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.315-334, ⟨10.1007/978-3-319-67687-6_21⟩
Conference papers
hal-01693001v1
|
||
|
Boosting transactional memory with stricter serializability20th International Conference on Coordination Languages and Models (COORDINATION), Jun 2018, Madrid, Spain. pp.231-251, ⟨10.1007/978-3-319-92408-3_11⟩
Conference papers
hal-01821500v1
|
||
|
A Model for a Multi-level Disassembly System Under Random Disassembly Lead TimesAPMS 2021: IFIP International Conference on Advances in Production Management Systems, IFIP WG 5.7 International Conference, Sep 2021, Nantes, France. pp.39-47, ⟨10.1007/978-3-030-85874-2_5⟩
Conference papers
hal-03852879v1
|
||
|
Attacks on Java Card 3.0 Combining Fault and Logical AttacksSmart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010, Apr 2010, Passau, Germany. pp.148-163, ⟨10.1007/978-3-642-12510-2_11⟩
Conference papers
hal-00692165v1
|
||
|
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers
hal-01875521v1
|
||
|
Remote Collaboration, Decision Support, and On-Demand Medical Image Analysis for Acute Stroke Care4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.214-225
Conference papers
hal-01757577v1
|
||
|
Testing Software and SystemsSpringer International Publishing, LNCS-9976, pp.257, 2016, Lecture Notes in Computer Science, Lecture notes in computer science, 978-3-319-47442-7. ⟨10.1007/978-3-319-47443-4⟩
Books
hal-01643721v1
|
||
|
A quality of experience based approach for wireless mesh networks9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova I La Geltrú, Spain. pp.162-173, ⟨10.1007/978-3-642-21560-5_14⟩
Conference papers
hal-01301638v1
|
||
|
Industrial IoT security monitoring and test on Fed4Fire+ platformsICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.270-278, ⟨10.1007/978-3-030-31280-0_17⟩
Conference papers
hal-02526342v1
|
||
|
ObjectivAIze: Measuring Performance and Biases in Augmented Business Decision Systems18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.300-320, ⟨10.1007/978-3-030-85613-7_22⟩
Conference papers
hal-04292393v1
|
||
|
Finding Objects Faster in Dense Environments using a Projection Augmented Robotic ArmINTERACT'15: IFIP International Conference on Human-Computer Interaction, Sep 2015, Bamberg, Germany. pp.221-238, ⟨10.1007/978-3-319-22698-9_15⟩
Conference papers
hal-01447396v1
|
||
|
Network Functions Virtualization Access Control as a Service34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.100-117, ⟨10.1007/978-3-030-49669-2_6⟩
Conference papers
hal-03243624v1
|
||
|
A Timed Component Algebra for Services15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.242-257, ⟨10.1007/978-3-642-38592-6_17⟩
Conference papers
hal-01515250v1
|
||
|
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.274-281, ⟨10.1007/978-3-642-39256-6_19⟩
Conference papers
hal-01159831v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
The Generation of a Situation Model, in Real-Time, as a Support to Crisis ManagementITDRR 2016 - 1st International Conference on Information Technology in Disaster Risk Reduction, IFIP, Nov 2016, Sofia, Bulgaria. pp.198-213, ⟨10.1007/978-3-319-68486-4_16⟩
Conference papers
hal-03213133v1
|