Filter your results
- 25
- 3
- 25
- 3
- 28
- 4
- 3
- 6
- 3
- 2
- 3
- 2
- 2
- 3
- 28
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 5
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
28 results
|
|
sorted by
|
|
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.73-85, ⟨10.1007/978-3-662-44885-4_6⟩
Conference papers
hal-01404188v1
|
||
|
A Session Subtyping ToolCOORDINATION 2021 - 23rd IFIP WG 6.1 International Conference Coordination Models and Languages, Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, Jun 2021, Valletta / Virtual, Malta. pp.90-105, ⟨10.1007/978-3-030-78142-2_6⟩
Conference papers
hal-03340750v1
|
||
|
Firewall Mechanism in a User Centric Smart Card Ownership Model9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.118-132, ⟨10.1007/978-3-642-12510-2_9⟩
Conference papers
hal-01056096v1
|
||
|
Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.129-144, ⟨10.1007/978-3-030-20074-9_10⟩
Conference papers
hal-02294604v1
|
||
|
Malicious MPLS Policy Engine Reconnaissance15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.3-18, ⟨10.1007/978-3-662-44885-4_1⟩
Conference papers
hal-01404180v1
|
||
|
Forensic Tracking and Mobility Prediction in Vehicular Networks8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.303-317, ⟨10.1007/978-3-642-33962-2_21⟩
Conference papers
hal-01523712v1
|
||
|
Password Generators: Old Ideas and New10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.245-253, ⟨10.1007/978-3-319-45931-8_16⟩
Conference papers
hal-01639616v1
|
||
|
Chatbots at Work: A Taxonomy of the Use of Chatbots in the Workplace20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.29-39, ⟨10.1007/978-3-030-85447-8_3⟩
Conference papers
hal-03648121v1
|
||
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
Chief Digital Officers as Protagonists in Digital Transformation18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.730-737, ⟨10.1007/978-3-030-29374-1_59⟩
Conference papers
hal-02510143v1
|
||
|
AI in the Workplace: Exploring Chatbot Use and Users’ Emotions20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.18-28, ⟨10.1007/978-3-030-85447-8_2⟩
Conference papers
hal-03648127v1
|
||
|
Recent Trends in Algebraic Development TechniquesSpringer International Publishing, LNCS-11563, 2019, Lecture Notes in Computer Science, 978-3-030-23219-1. ⟨10.1007/978-3-030-23220-7⟩
Books
hal-02364573v1
|
||
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.75-92, ⟨10.1007/978-3-319-93524-9_5⟩
Conference papers
hal-01875526v1
|
||
|
Learning Automata with Side-Effects15th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2020, Dublin, Ireland. pp.68-89, ⟨10.1007/978-3-030-57201-3_5⟩
Conference papers
hal-03232354v1
|
||
Information Security: Theory and PracticeSpringer, LNCS-7886, 2013, Lecture Notes in Computer Science, 978-3-642-38529-2. ⟨10.1007/978-3-642-38530-8⟩
Books
hal-01485939v1
|
|||
|
Learning to Lead Online Collaborations: Insights from Student-Based Global Virtual Teams Between UK and Norway18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.785-796, ⟨10.1007/978-3-030-29374-1_64⟩
Conference papers
hal-02510107v1
|
||
|
A Timed Component Algebra for Services15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.242-257, ⟨10.1007/978-3-642-38592-6_17⟩
Conference papers
hal-01515250v1
|
||
|
Tracing the Man in the Middle in Monoidal Categories11th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Mar 2012, Tallinn, Estonia. pp.191-217, ⟨10.1007/978-3-642-32784-1_11⟩
Conference papers
hal-01539882v1
|
||
|
CAN Bus Risk Analysis Revisit8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.170-179, ⟨10.1007/978-3-662-43826-8_13⟩
Conference papers
hal-01400939v1
|
||
|
Philanthropy on the Blockchain11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers
hal-01875527v1
|
||
|
Remote Credential Management with Mutual Attestation for Trusted Execution Environments12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.157-173, ⟨10.1007/978-3-030-20074-9_12⟩
Conference papers
hal-02294612v1
|
||
|
Website Credential Storage and Two-Factor Web Authentication with a Java SIM4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.229-236, ⟨10.1007/978-3-642-12368-9_17⟩
Conference papers
hal-01056084v1
|
||
|
A Multi-level Analysis of Mistrust/Trust Formation in Algorithmic Grading20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.737-743, ⟨10.1007/978-3-030-85447-8_61⟩
Conference papers
hal-03648163v1
|
||
|
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers
hal-01633675v1
|
||
|
Linear Depth Integer-Wise Homomorphic Division12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.91-106, ⟨10.1007/978-3-030-20074-9_8⟩
Conference papers
hal-02294597v1
|
||
|
Cybersecurity Readiness of E-tail Organisations: A Technical Perspective19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers
hal-03222876v1
|
||
|
Conformance-Based Doping Detection for Cyber-Physical Systems40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.59-77, ⟨10.1007/978-3-030-50086-3_4⟩
Conference papers
hal-03283236v1
|
||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart DevicesSpringer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books
hal-01550529v1
|