Filter your results
- 19
- 1
- 18
- 2
- 20
- 2
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 3
- 1
- 2
- 1
- 20
- 2
- 1
- 1
- 1
- 1
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
20 results
|
|
sorted by
|
|
Deciphering Text from Touchscreen Key Taps30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers
hal-01633681v1
|
||
|
Analysis of TRBAC with Dynamic Temporal Role Hierarchies27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.297-304, ⟨10.1007/978-3-642-39256-6_22⟩
Conference papers
hal-01490714v1
|
||
|
An Anti-jamming Strategy When it Is Unknown Which Receivers Will Face with Smart InterferenceInternational Conference on Wired/Wireless Internet Communication (WWIC), Jun 2018, Boston, MA, United States. pp.195-206, ⟨10.1007/978-3-030-02931-9_16⟩
Conference papers
hal-02269717v1
|
||
|
An Optimization Model for the Extended Role Mining Problem23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers
hal-01586595v1
|
||
|
Role Mining in the Presence of Noise24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.97-112, ⟨10.1007/978-3-642-13739-6_7⟩
Conference papers
hal-01056666v1
|
||
|
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers
hal-01284854v1
|
||
|
Migrating from DAC to RBAC29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.69-84, ⟨10.1007/978-3-319-20810-7_5⟩
Conference papers
hal-01745820v1
|
||
|
Enabling the Deployment of ABAC Policies in RBAC Systems32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.51-68, ⟨10.1007/978-3-319-95729-6_4⟩
Conference papers
hal-01954419v1
|
||
|
Bargaining over Fair Channel Sharing Between Wi-Fi and LTE-U Networks15th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2017, St. Petersburg, Russia. pp.3-15, ⟨10.1007/978-3-319-61382-6_1⟩
Conference papers
hal-01675421v1
|
||
|
Toward Mining of Temporal Roles27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers
hal-01490718v1
|
||
|
Towards User-Oriented RBAC Model27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers
hal-01490719v1
|
||
|
Data and Applications Security and Privacy XXVIIISpringer, Lecture Notes in Computer Science (LNCS-8566), 2014, 978-3-662-45501-2. ⟨10.1007/978-3-662-43936-4⟩
Books
hal-01285073v1
|
||
|
An Analytic Framework for Open Government Policy Design Processes5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.203-214, ⟨10.1007/978-3-319-44421-5_16⟩
Conference papers
hal-01636457v1
|
||
|
Public Accountability ICT Support: A Detailed Account of Public Accountability Process and Tasks14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.105-117, ⟨10.1007/978-3-319-22479-4_8⟩
Conference papers
hal-01412240v1
|
||
|
“Please Connect Me to a Specialist”: Scrutinising ‘Recipient Design’ in Interaction with an Artificial Conversational Agent18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.155-176, ⟨10.1007/978-3-030-85610-6_10⟩
Conference papers
hal-04215505v1
|
||
|
Data and Applications Security and Privacy XXXIVSpringer International Publishing, LNCS-12122, 2020, Lecture Notes in Computer Science, 978-3-030-49668-5. ⟨10.1007/978-3-030-49669-2⟩
Books
hal-03243621v1
|
||
|
Efficient Distributed Linear Programming with Limited Disclosure23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers
hal-01586592v1
|
||
|
Preventing Unauthorized Data Flows31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.41-62, ⟨10.1007/978-3-319-61176-1_3⟩
Conference papers
hal-01684345v1
|
||
|
Proportional Fair Information Freshness Under Jamming17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.91-102, ⟨10.1007/978-3-030-30523-9_8⟩
Conference papers
hal-02881744v1
|
||
|
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.169-178, ⟨10.1007/978-3-642-30955-7_15⟩
Conference papers
hal-01534305v1
|