Filter your results
- 4
- 4
- 4
- 1
- 2
- 1
- 1
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.179-194, ⟨10.1007/978-3-642-39256-6_12⟩
Conference papers
hal-01490704v1
|
||
|
Verifiable Hierarchical Key Assignment Schemes35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.357-376, ⟨10.1007/978-3-030-81242-3_21⟩
Conference papers
hal-03677042v1
|
||
|
Multi-party Private Set Operations with an External Decider35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.117-135, ⟨10.1007/978-3-030-81242-3_7⟩
Conference papers
hal-03677026v1
|
||
|
AQoPA: Automated Quality of Protection Analysis Framework for Complex Systems14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.475-486, ⟨10.1007/978-3-319-24369-6_39⟩
Conference papers
hal-01444489v1
|