Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

28 results
Image document

Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

Suaad Alarifi , Stephen Wolthusen
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.73-85, ⟨10.1007/978-3-662-44885-4_6⟩
Conference papers hal-01404188v1
Image document

A Session Subtyping Tool

Lorenzo Bacchiani , Mario Bravetti , Julien Lange , Gianluigi Zavattaro
COORDINATION 2021 - 23rd IFIP WG 6.1 International Conference Coordination Models and Languages, Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, Jun 2021, Valletta / Virtual, Malta. pp.90-105, ⟨10.1007/978-3-030-78142-2_6⟩
Conference papers hal-03340750v1
Image document

Firewall Mechanism in a User Centric Smart Card Ownership Model

Raja Naeem Akram , Konstantinos Markantonakis , Keith Mayes
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.118-132, ⟨10.1007/978-3-642-12510-2_9⟩
Conference papers hal-01056096v1
Image document

Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper

Julia A. Meister , Raja Naeem Akram , Konstantinos Markantonakis
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.129-144, ⟨10.1007/978-3-030-20074-9_10⟩
Conference papers hal-02294604v1
Image document

Malicious MPLS Policy Engine Reconnaissance

Abdulrahman Al-Mutairi , Stephen Wolthusen
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.3-18, ⟨10.1007/978-3-662-44885-4_1⟩
Conference papers hal-01404180v1
Image document

Forensic Tracking and Mobility Prediction in Vehicular Networks

Saif Al-Kuwari , Stephen Wolthusen
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.303-317, ⟨10.1007/978-3-642-33962-2_21⟩
Conference papers hal-01523712v1
Image document

Password Generators: Old Ideas and New

Fatma Al Maqbali , Chris J. Mitchell
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.245-253, ⟨10.1007/978-3-319-45931-8_16⟩
Conference papers hal-01639616v1
Image document

Chatbots at Work: A Taxonomy of the Use of Chatbots in the Workplace

Lorentsa Gkinko , Amany Elbanna
20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.29-39, ⟨10.1007/978-3-030-85447-8_3⟩
Conference papers hal-03648121v1
Image document

A Secure and Trusted Channel Protocol for UAVs Fleets

Raja Naeem Akram , Konstantinos Markantonakis , Keith Mayes , Pierre-François Bonnefoi , Amina Cherif , et al.
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers hal-01875525v1
Image document

Chief Digital Officers as Protagonists in Digital Transformation

Jostein Engesmo , Niki Panteli
18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.730-737, ⟨10.1007/978-3-030-29374-1_59⟩
Conference papers hal-02510143v1
Image document

AI in the Workplace: Exploring Chatbot Use and Users’ Emotions

Lorentsa Gkinko , Amany Elbanna
20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.18-28, ⟨10.1007/978-3-030-85447-8_2⟩
Conference papers hal-03648127v1

Recent Trends in Algebraic Development Techniques

José Fiadeiro , Ionuț Țuțu
Springer International Publishing, LNCS-11563, 2019, Lecture Notes in Computer Science, 978-3-030-23219-1. ⟨10.1007/978-3-030-23220-7⟩
Books hal-02364573v1
Image document

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

Carlton Shepherd , Raja Naeem Akram , Konstantinos Markantonakis
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.75-92, ⟨10.1007/978-3-319-93524-9_5⟩
Conference papers hal-01875526v1
Image document

Learning Automata with Side-Effects

Gerco Van Heerdt , Matteo Sammartino , Alexandra Silva
15th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2020, Dublin, Ireland. pp.68-89, ⟨10.1007/978-3-030-57201-3_5⟩
Conference papers hal-03232354v1

Information Security: Theory and Practice

Lorenzo Cavallaro , Dieter Gollmann
Springer, LNCS-7886, 2013, Lecture Notes in Computer Science, 978-3-642-38529-2. ⟨10.1007/978-3-642-38530-8⟩
Books hal-01485939v1
Image document

Learning to Lead Online Collaborations: Insights from Student-Based Global Virtual Teams Between UK and Norway

Niki Panteli , Tor Atle Hjeltnes , Knut Arne Strand
18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.785-796, ⟨10.1007/978-3-030-29374-1_64⟩
Conference papers hal-02510107v1
Image document

A Timed Component Algebra for Services

Benoît Delahaye , José Luiz Fiadeiro , Axel Legay , Antónia Lopes
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.242-257, ⟨10.1007/978-3-642-38592-6_17⟩
Conference papers hal-01515250v1
Image document

Tracing the Man in the Middle in Monoidal Categories

Dusko Pavlovic
11th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Mar 2012, Tallinn, Estonia. pp.191-217, ⟨10.1007/978-3-642-32784-1_11⟩
Conference papers hal-01539882v1
Image document

CAN Bus Risk Analysis Revisit

Hafizah Mansor , Konstantinos Markantonakis , Keith Mayes
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.170-179, ⟨10.1007/978-3-662-43826-8_13⟩
Conference papers hal-01400939v1
Image document

Philanthropy on the Blockchain

Danushka Jayasinghe , Sheila Cobourne , Konstantinos Markantonakis , Raja Naeem Akram , Keith Mayes
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers hal-01875527v1
Image document

Remote Credential Management with Mutual Attestation for Trusted Execution Environments

Carlton Shepherd , Raja Naeem Akram , Konstantinos Markantonakis
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.157-173, ⟨10.1007/978-3-030-20074-9_12⟩
Conference papers hal-02294612v1
Image document

Website Credential Storage and Two-Factor Web Authentication with a Java SIM

Jonathan Hart , Konstantinos Markantonakis , Keith Mayes
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.229-236, ⟨10.1007/978-3-642-12368-9_17⟩
Conference papers hal-01056084v1
Image document

A Multi-level Analysis of Mistrust/Trust Formation in Algorithmic Grading

Stephen Jackson , Niki Panteli
20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.737-743, ⟨10.1007/978-3-030-85447-8_61⟩
Conference papers hal-03648163v1
Image document

Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

Jason Crampton , James Sellwood
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers hal-01633675v1
Image document

Linear Depth Integer-Wise Homomorphic Division

Hiroki Okada , Carlos Cid , Seira Hidano , Shinsaku Kiyomoto
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.91-106, ⟨10.1007/978-3-030-20074-9_8⟩
Conference papers hal-02294597v1
Image document

Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

Mahmood Hussain Shah , Raza Muhammad , Nisreen Ameen
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers hal-03222876v1
Image document

Conformance-Based Doping Detection for Cyber-Physical Systems

Rayna Dimitrova , Maciej Gazda , Mohammad Reza Mousavi , Sebastian Biewer , Holger Hermanns
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.59-77, ⟨10.1007/978-3-030-50086-3_4⟩
Conference papers hal-03283236v1

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

Pierangela Samarati , Michael Tunstall , Joachim Posegga , Konstantinos Markantonakis , Damien Sauveron
Springer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books hal-01550529v1