Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

53 results
Image document

A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts

Bruno Rodrigues , Thomas Bocek , Andri Lareida , David Hausheer , Sina Rafati , et al.
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers hal-01806063v1
Image document

Adaptive User-Centered Security

Sven Wohlgemuth
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers hal-01403988v1
Image document

In-Situ Occlusion Resolution for Hybrid Tabletop Environments

Jan Riemann , Mohammadreza Khalilbeigi , Max Mühlhäuser
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.278-295, ⟨10.1007/978-3-319-22698-9_18⟩
Conference papers hal-01609416v1
Image document

Towards an Adaptive Publish/Subscribe Approach Supporting Transitions

Björn Richerzhagen , Ralf Steinmetz
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.84-87, ⟨10.1007/978-3-642-38998-6_10⟩
Conference papers hal-01489956v1
Image document

Similarity Hashing Based on Levenshtein Distances

Frank Breitinger , Georg Ziroff , Steffen Lange , Harald Baier
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.133-147, ⟨10.1007/978-3-662-44952-3_10⟩
Conference papers hal-01393767v1
Image document

Verification of Smart Contract Business Logic

Wolfgang Ahrendt , Richard Bubel , Joshua Ellul , Gordon J. Pace , Raúl Pardo , et al.
8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.228-243, ⟨10.1007/978-3-030-31517-7_16⟩
Conference papers hal-03769118v1
Image document

Quality Adaptation in P2P Video Streaming Based on Objective QoE Metrics

Julius Rückert , Osama Abboud , Thomas Zinner , Ralf Steinmetz , David Hausheer
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.1-14, ⟨10.1007/978-3-642-30054-7_1⟩
Conference papers hal-01531951v1
Image document

A Novel Approach for Generating Synthetic Datasets for Digital Forensics

Thomas Göbel , Thomas Schäfer , Julien Hachenberger , Jan Türr , Harald Baier
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.73-93, ⟨10.1007/978-3-030-56223-6_5⟩
Conference papers hal-03657236v1
Image document

Using Approximate Matching to Reduce the Volume of Digital Data

Frank Breitinger , Christian Winter , York Yannikos , Tobias Fink , Michael Seefried
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.149-163, ⟨10.1007/978-3-662-44952-3_11⟩
Conference papers hal-01393769v1
Image document

How Current Android Malware Seeks to Evade Automated Code Analysis

Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers hal-01442542v1
Image document

Reducing the Time Required for Hashing Operations

Frank Breitinger , Kaloyan Petrov
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers hal-01460624v1
Image document

Evaluation of Dispatcher Requirements on Automated Customer Feedback in Public Transport

Cindy Mayas , Stephan Hörold , Anselmo Stelzer , Frank Englert , Heidi Krömker
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.537-541, ⟨10.1007/978-3-319-22723-8_56⟩
Conference papers hal-01610819v1
Image document

Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations

Oksana Kulyk , Jan Henzel , Karen Renaud , Melanie Volkamer
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.519-538, ⟨10.1007/978-3-030-29381-9_32⟩
Conference papers hal-02544556v1
Image document

Type Reconstruction Algorithms for Deadlock-Free and Lock-Free Linear π-Calculi

Luca Padovani , Tzu-Chun Chen , Andrea Tosatto
17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.83-98, ⟨10.1007/978-3-319-19282-6_6⟩
Conference papers hal-01774941v1
Image document

On Efficient Models for Model Checking Message-Passing Distributed Protocols

Péter Bokor , Marco Serafini , Neeraj Suri
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.216-223, ⟨10.1007/978-3-642-13464-7_17⟩
Conference papers hal-01055152v1
Image document

Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions

Julius Rückert , David Hausheer
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.38-41, ⟨10.1007/978-3-642-30633-4_5⟩
Conference papers hal-01529798v1
Image document

Towards a Mobility-Supporting Incentive Scheme for Peer-to-Peer Content Distribution

Matthias Wichtlhuber , David Hausheer
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.88-91, ⟨10.1007/978-3-642-38998-6_11⟩
Conference papers hal-01489957v1
Image document

Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications

Delphine Christin , Pablo Sánchez López , Andreas Reinhardt , Matthias Hollick , Michaela Kauer
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.71-86, ⟨10.1007/978-3-642-30955-7_8⟩
Conference papers hal-01534318v1
Image document

Testing Conformance in Multi-component Enterprise Application Management

Jacopo Soldani , Lars Luthmann , Malte Lochau , Antonio Brogi
8th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2020, Heraklion, Crete, Greece. pp.3-18, ⟨10.1007/978-3-030-44769-4_1⟩
Conference papers hal-03203225v1
Image document

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

Xuyun Nie , Albrecht Petzoldt , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers hal-01506559v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Robust Hash Algorithms for Text

Martin Steinebach , Peter Klöckner , Nils Reimers , Dominik Wienand , Patrick Wolf
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers hal-01492815v1

Formal Techniques for Distributed Objects, Components, and Systems

Kirstin Peters , Tim A.C. Willemse
Springer International Publishing, LNCS-12719, 2021, Lecture Notes in Computer Science, 978-3-030-78088-3. ⟨10.1007/978-3-030-78089-0⟩
Books hal-03740268v1
Image document

Optimal Parameters for XMSSMT

Andreas Hülsing , Lea Rausch , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers hal-01506577v1
Image document

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

Mark Manulis , Bertram Poettering
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers hal-01573294v1
Image document

Evaluation of network traffic analysis using approximate matching algorithms

Thomas Göbel , Frieder Uhlig , Harald Baier
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.89-108, ⟨10.1007/978-3-030-88381-2_5⟩
Conference papers hal-03764372v1
Image document

A Smart Card Implementation of the McEliece PKC

Falko Strenzke
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers hal-01056067v1
Image document

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

Wolfgang Boehmer
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers hal-01506570v1
Image document

Incentivise Me: Smartphone-Based Mobility Detection for Pervasive Games

Thomas Tregel , Felix Leber , Stefan Göbel
1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.470-476, ⟨10.1007/978-3-030-34644-7_48⟩
Conference papers hal-03652020v1
Image document

Towards Distributed Reactive Programming

Guido Salvaneschi , Joscha Drechsler , Mira Mezini
15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.226-235, ⟨10.1007/978-3-642-38493-6_16⟩
Conference papers hal-01486029v1