Filter your results
- 4
- 4
- 4
- 2
- 1
- 1
- 4
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
4 results
|
|
sorted by
|
|
Secure and Authenticated Access to LLN Resources Through Policy Constraints9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.271-280, ⟨10.1007/978-3-319-24018-3_18⟩
Conference papers
hal-01442549v1
|
||
|
WSACd - A Usable Access Control Framework for Smart Home Devices9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.120-133, ⟨10.1007/978-3-319-24018-3_8⟩
Conference papers
hal-01442557v1
|
||
|
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.155-162, ⟨10.1007/978-3-642-24712-5_13⟩
Conference papers
hal-01596183v1
|
||
|
Policy-Based Access Control for Body Sensor Networks8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.150-159, ⟨10.1007/978-3-662-43826-8_11⟩
Conference papers
hal-01400937v1
|