Filter your results
- 10
- 1
- 10
- 1
- 11
- 8
- 1
- 1
- 3
- 5
- 1
- 11
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
11 results
|
|
sorted by
|
|
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers
hal-01480196v1
|
||
|
Provably Secure and Subliminal-Free Variant of Schnorr Signature1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers
hal-01480197v1
|
||
|
BAAP: A Behavioral Animation Authoring Platform for Emotion Driven 3D Virtual Characters9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.350-357, ⟨10.1007/978-3-642-15399-0_37⟩
Conference papers
hal-01055625v1
|
||
|
A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.551-562, ⟨10.1007/978-3-319-19578-0_45⟩
Conference papers
hal-01789937v1
|
||
|
UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers
hal-01480185v1
|
||
|
CSP-Based General Detection Model of Network Covert Storage Channels1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers
hal-01480205v1
|
||
|
Attribute-Based Fine-Grained Access Control with User Revocation2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.586-595, ⟨10.1007/978-3-642-55032-4_60⟩
Conference papers
hal-01397274v1
|
||
|
An Effective Cloud-Based Active Defense System against Malicious Codes2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.690-695, ⟨10.1007/978-3-642-55032-4_71⟩
Conference papers
hal-01397288v1
|
||
|
Network and Parallel ComputingSpringer International Publishing, LNCS-9966, 2016, Lecture Notes in Computer Science, 978-3-319-47098-6. ⟨10.1007/978-3-319-47099-3⟩
Books
hal-01648008v1
|
||
|
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.612-621, ⟨10.1007/978-3-642-55032-4_63⟩
Conference papers
hal-01397277v1
|
||
|
Secure and Verifiable Outsourcing of Sequence Comparisons1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.243-252, ⟨10.1007/978-3-642-36818-9_25⟩
Conference papers
hal-01480179v1
|