Filter your results
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
4 results
|
|
sorted by
|
|
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.325-336, ⟨10.1007/978-3-319-61176-1_18⟩
Conference papers
hal-01684354v1
|
||
|
Weaving Aspects and Business Processes through Model Transformation3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.47-61, ⟨10.1007/978-3-662-44879-3_4⟩
Conference papers
hal-01318272v1
|
||
|
Optimal Re-encryption Strategy for Joins in Encrypted Databases27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.195-210, ⟨10.1007/978-3-642-39256-6_13⟩
Conference papers
hal-01490705v1
|
||
|
Acceptance and Speed of Animations in Business Software13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.438-441, ⟨10.1007/978-3-642-23768-3_52⟩
Conference papers
hal-01596987v1
|