Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

27 results
Image document

Flow Management at Multi-Gbps: Tradeoffs and Lessons Learned

Georges Nassopulos , Dario Rossi , Francesco Gringoli , Lorenzo Nava , Maurizio Dusi , et al.
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.1-14, ⟨10.1007/978-3-642-54999-1_1⟩
Conference papers hal-01396466v1
Image document

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Guillaume Barbu , Guillaume Duc , Philippe Hoogvorst
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers hal-00692171v1
Image document

One Fitts’ Law, Two Metrics

Julien Gori , Olivier Rioul , Yves Guiard , Michel Beaudouin-Lafon
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.525-533, ⟨10.1007/978-3-319-67687-6_36⟩
Conference papers hal-01717202v1
Image document

Peeking through the BitTorrent Seedbox Hosting Ecosystem

Dario Rossi , Guilhem Pujol , Xiao Wang , Fabien Mathieu
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.115-126, ⟨10.1007/978-3-642-54999-1_10⟩
Conference papers hal-01396477v1
Image document

Leakage Squeezing Countermeasure against High-Order Attacks

Houssem Maghrebi , Sylvain Guilley , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers hal-01573295v1
Image document

Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0

Guillaume Barbu , Hugues Thiebeauld
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers hal-00692172v1
Image document

FIRE: fault injection for reverse engineering

Manuel San Pedro , Mate Soos , Sylvain Guilley
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.280-293, ⟨10.1007/978-3-642-21040-2_20⟩
Conference papers hal-00690868v1
Image document

Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection

Moulay Abdelaziz Elaabid , Khaled Karray , Jean-Luc Danger , Sylvain Guilley
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.109-128, ⟨10.1007/978-3-030-20074-9_9⟩
Conference papers hal-02294610v1
Image document

General Knowledge Representation and Sharing for Disaster Management

Philippe Martin , Tullio Tanzi
5th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Dec 2020, Sofia, Bulgaria. pp.116-131, ⟨10.1007/978-3-030-81469-4_10⟩
Conference papers hal-03450395v2
Image document

Finding Objects Faster in Dense Environments using a Projection Augmented Robotic Arm

Hind Gacem , Gilles Bailly , James R Eagan , Eric Lecolinet
INTERACT'15: IFIP International Conference on Human-Computer Interaction, Sep 2015, Bamberg, Germany. pp.221-238, ⟨10.1007/978-3-319-22698-9_15⟩
Conference papers hal-01447396v1
Image document

Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers

Etienne Tehrani , Jean-Luc Danger , Tarik Graba
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers hal-02294599v1
Image document

3D Simulation to Validate Autonomous Intervention Systems Architecture for Disaster Management

Tullio Tanzi , Matteo Bertolino
4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.196-211, ⟨10.1007/978-3-030-48939-7_17⟩
Conference papers hal-03374239v1
Image document

On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems

Youssef Souissi , Nicolas Debande , Sami Mekki , Sylvain Guilley , Ali Maalaoui , et al.
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.169-178, ⟨10.1007/978-3-642-30955-7_15⟩
Conference papers hal-01534305v1
Image document

Privacy in digital identity systems: models, assessment and user adoption

Armen Khatchatourov , Maryline Laurent , Claire Levallois-Barth
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers hal-01283997v1
Image document

Beyond Rhetoric to Poetics in IT Invention

Annie Gentes , Ted Selker
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.267-279, ⟨10.1007/978-3-642-40477-1_17⟩
Conference papers hal-01504889v1
Image document

U-Note: Capture the Class and Access it Everywhere

Sylvain Malacria , Thomas Pietrzak , Aurélien Tabard , Éric Lecolinet
Proceedings of the IFIP Conference on Human-Computer Interaction (Interact 2011), Sep 2011, Lisbonne, Portugal. pp.643-660, ⟨10.1007/978-3-642-23774-4_50⟩
Conference papers hal-00671380v1
Image document

Glass+Skin: An Empirical Evaluation of the Added Value of Finger Identification to Basic Single-Touch Interaction on Touch Screens

Quentin Roy , Yves Guiard , Gilles Bailly , Éric Lecolinet , Olivier Rioul , et al.
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.55-71, ⟨10.1007/978-3-319-22723-8_5⟩
Conference papers hal-01202852v1
Image document

Formal Methods for Safe Design of Autonomous Systems Dedicated to Risk Management

Sophie Coudert , Tullio Tanzi
1st International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Nov 2016, Sofia, Bulgaria. pp.61-76, ⟨10.1007/978-3-319-68486-4_6⟩
Conference papers hal-03213130v1
Image document

Hybrid and Optical Packet Switching Supporting Different Service Classes in Data Center Network

Artur Minakhmetov , Cédric Ware , Luigi Iannone
23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.516-527, ⟨10.1007/978-3-030-38085-4_44⟩
Conference papers hal-03200694v1
Image document

Aggregation of Statistical Data from Passive Probes: Techniques and Best Practices

Silvia Colabrese , D. Rossi , Marco Mellia
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.38-50, ⟨10.1007/978-3-642-54999-1_4⟩
Conference papers hal-01396470v1
Image document

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems

Julien Bringer , Hervé Chabanne , Daniel Le Métayer , Roch Lescuyer
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers hal-01633672v1
Image document

Formal Methods for Railway Disasters Prevention

Lilia Belabed , Tullio Tanzi , Sophie Coudert
2nd International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2017, Sofia, Bulgaria. pp.161-176, ⟨10.1007/978-3-030-18293-9_14⟩
Conference papers hal-02280313v1
Image document

Inter-Domain Route Diversity for the Internet

Xavier Misseri , Ivan Gojmerac , Jean-Louis Rougier
Networking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.63-71, ⟨10.1007/978-3-642-30039-4_8⟩
Conference papers hal-01533588v1
Image document

Zen and the Art of Network Troubleshooting: A Hands on Experimental Study

François Espinet , Diana Joumblatt , Dario Rossi
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.31-45, ⟨10.1007/978-3-319-17172-2_3⟩
Conference papers hal-01411178v1
Image document

Information-Theoretic Analysis of Human Performance for Command Selection

Wanyu Liu , Olivier Rioul , Michel Beaudouin-Lafon , Yves Guiard
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.515-524, ⟨10.1007/978-3-319-67687-6_35⟩
Conference papers hal-01643924v1
Image document

Attacks on Java Card 3.0 Combining Fault and Logical Attacks

Guillaume Barbu , Hugues Thiebeauld , Vincent Guerin
Smart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010, Apr 2010, Passau, Germany. pp.148-163, ⟨10.1007/978-3-642-12510-2_11⟩
Conference papers hal-00692165v1
Image document

End-to-End Adaptive Framework for Multimedia Information Retrieval

Maria Sokhn , Elena Mugellini , Omar Abou Khaled , Ahmed Serhrouchni
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.197-206, ⟨10.1007/978-3-642-21560-5_17⟩
Conference papers hal-01583629v1