Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

9 results
Image document

AES Variants Secure against Related-Key Differential and Boomerang Attacks

Jiali Choy , Aileen Zhang , Khoongming Khoo , Matt Henricksen , Axel Poschmann
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers hal-01573307v1
Image document

Learning-Based Compositional Parameter Synthesis for Event-Recording Automata

Etienne André , Shang-Wei Lin
37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.17-32, ⟨10.1007/978-3-319-60225-7_2⟩
Conference papers hal-01658415v1
Image document

From Display Calculi to Deep Nested Sequent Calculi: Formalised for Full Intuitionistic Linear Logic

Jeremy E. Dawson , Ranald Clouston , Rajeev Goré , Alwen Tiu
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.250-264, ⟨10.1007/978-3-662-44602-7_20⟩
Conference papers hal-01402048v1
Image document

Assets Dependencies Model in Information Security Risk Management

Jakub Breier , Frank Schindler
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.405-412, ⟨10.1007/978-3-642-55032-4_40⟩
Conference papers hal-01397241v1
Image document

Early Warning Systems for Cyber Defence

Harsha Kalutarage , Siraj Shaikh , Bu-Sung Lee , Chonho Lee , Yeo Chai Kiat
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.29-42, ⟨10.1007/978-3-319-39028-4_3⟩
Conference papers hal-01445791v1
Image document

SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences

Chien-Ning Chen , Jheng-Hong Tu , Sung-Ming Yen
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.222-235
Conference papers hal-01506557v1
Image document

Differential Fault Attack on LEA

Dirmanto Jap , Jakub Breier
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.265-274, ⟨10.1007/978-3-319-24315-3_27⟩
Conference papers hal-01466228v1
Image document

Real-Time Caustics in Dynamic Scenes with Multiple Directional Lights

Budianto Tandianus , Henry Johan , Hock Soon Seah
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.308-316, ⟨10.1007/978-3-642-15399-0_32⟩
Conference papers hal-01055629v1
Image document

Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model

Yang Chen , Junzhe Zhang , Chai Kiat Yeo
2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.1-14, ⟨10.1007/978-3-030-45778-5_1⟩
Conference papers hal-03266470v1