Filter your results
- 5
- 5
- 5
- 1
- 1
- 1
- 2
- 5
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
Dynamic Workflow Adjustment with Security Constraints28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers
hal-01284857v1
|
||
|
Encrypted-Input Obfuscation of Image Classifiers35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.136-156, ⟨10.1007/978-3-030-81242-3_8⟩
Conference papers
hal-03677034v1
|
||
|
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware ApplicationsACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.212-231, ⟨10.1007/978-3-642-16955-7_11⟩
Conference papers
hal-01055282v1
|
||
|
Towards User-Oriented RBAC Model27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers
hal-01490719v1
|
||
|
Novel FPGA-Based Signature Matching for Deep Packet Inspection4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.261-276, ⟨10.1007/978-3-642-12368-9_21⟩
Conference papers
hal-01056079v1
|