Filter your results
- 50
- 3
- 50
- 3
- 53
- 5
- 3
- 2
- 8
- 2
- 2
- 4
- 7
- 12
- 6
- 3
- 4
- 53
- 9
- 6
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
53 results
|
|
sorted by
|
|
Verification of Smart Contract Business Logic8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.228-243, ⟨10.1007/978-3-030-31517-7_16⟩
Conference papers
hal-03769118v1
|
||
|
Can code polymorphism limit information leakage?5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers
hal-01110259v1
|
||
|
An Efficient Lattice-Based Secret Sharing Construction6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.160-168, ⟨10.1007/978-3-642-30955-7_14⟩
Conference papers
hal-01534304v1
|
||
|
Detecting Computer Worms in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers
hal-01481505v1
|
||
|
Software CompositionSpringer, LNCS-8088, 2013, Lecture Notes in Computer Science, 978-3-642-39613-7. ⟨10.1007/978-3-642-39614-4⟩
Books
hal-01492781v1
|
||
|
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers
hal-01506570v1
|
||
|
Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime FunctionInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.250-256, ⟨10.1007/978-3-319-10975-6_19⟩
Conference papers
hal-01404000v1
|
||
|
On Efficient Models for Model Checking Message-Passing Distributed ProtocolsJoint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.216-223, ⟨10.1007/978-3-642-13464-7_17⟩
Conference papers
hal-01055152v1
|
||
|
HardIDX: Practical and Secure Index with SGX31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.386-408, ⟨10.1007/978-3-319-61176-1_22⟩
Conference papers
hal-01684366v1
|
||
|
Similarity Hashing Based on Levenshtein Distances10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.133-147, ⟨10.1007/978-3-662-44952-3_10⟩
Conference papers
hal-01393767v1
|
||
|
Using Approximate Matching to Reduce the Volume of Digital Data10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.149-163, ⟨10.1007/978-3-662-44952-3_11⟩
Conference papers
hal-01393769v1
|
||
|
Reducing the Time Required for Hashing Operations9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers
hal-01460624v1
|
||
|
Attribute-Based Encryption with Break-Glass4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers
hal-01056083v1
|
||
|
Twin Clouds: Secure Cloud Computing with Low Latency12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.32-44, ⟨10.1007/978-3-642-24712-5_3⟩
Conference papers
hal-01596191v1
|
||
|
Effects of End-to-end Latency on User Experience and Performance in Immersive Virtual Reality Applications1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.57-69, ⟨10.1007/978-3-030-34644-7_5⟩
Conference papers
hal-03652010v1
|
||
|
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.71-86, ⟨10.1007/978-3-642-30955-7_8⟩
Conference papers
hal-01534318v1
|
||
|
Usable Privacy for Mobile Sensing Applications8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.92-107, ⟨10.1007/978-3-662-43826-8_7⟩
Conference papers
hal-01400922v1
|
||
|
May-Happen-in-Parallel Based Deadlock Analysis for Concurrent Objects15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.273-288, ⟨10.1007/978-3-642-38592-6_19⟩
Conference papers
hal-01515247v1
|
||
|
PDPuzzleTable: A Leap Motion Exergame for Dual-Tasking Rehabilitation in Parkinson’s Disease. Design and Study Protocol1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.402-406, ⟨10.1007/978-3-030-34644-7_35⟩
Conference papers
hal-03652033v1
|
||
|
Evaluation of network traffic analysis using approximate matching algorithms17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.89-108, ⟨10.1007/978-3-030-88381-2_5⟩
Conference papers
hal-03764372v1
|
||
|
A Novel Approach for Generating Synthetic Datasets for Digital Forensics16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.73-93, ⟨10.1007/978-3-030-56223-6_5⟩
Conference papers
hal-03657236v1
|
||
|
Optimal Parameters for XMSSMT1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers
hal-01506577v1
|
||
|
Constructing Constraint-Preserving Interaction Schemes in Adhesive Categories24th International Workshop on Algebraic Development Techniques (WADT), Jul 2018, Egham, United Kingdom. pp.139-153, ⟨10.1007/978-3-030-23220-7_8⟩
Conference papers
hal-02364576v1
|
||
|
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.519-538, ⟨10.1007/978-3-030-29381-9_32⟩
Conference papers
hal-02544556v1
|
||
|
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers
hal-01573294v1
|
||
|
Evaluation of Dispatcher Requirements on Automated Customer Feedback in Public Transport15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.537-541, ⟨10.1007/978-3-319-22723-8_56⟩
Conference papers
hal-01610819v1
|
||
|
Future Trends in Game Authoring Tools11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.536-541, ⟨10.1007/978-3-642-33542-6_70⟩
Conference papers
hal-01556141v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
Securing Transactions with the eIDAS Protocols10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.3-18, ⟨10.1007/978-3-319-45931-8_1⟩
Conference papers
hal-01639614v1
|
||
|
Modeling the German Legal Latitude Principles5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers
hal-01491259v1
|
- 1
- 2