Filter your results
- 5
- 4
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Hunting the Unknown28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers
hal-01284860v1
|
||
|
Predicate-Tree Based Pretty Good Privacy of Data13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.192-194, ⟨10.1007/978-3-642-32805-3_16⟩
Conference papers
hal-01540891v1
|
||
|
Information Security Theory and PracticeSpringer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books
hal-03173895v1
|
||
|
Real-Time System for Assessing the Information Security of Computer Networks1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.123-133, ⟨10.1007/978-3-642-19228-9_11⟩
Conference papers
hal-01581341v1
|
||
|
Multi-party Private Set Operations with an External Decider35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.117-135, ⟨10.1007/978-3-030-81242-3_7⟩
Conference papers
hal-03677026v1
|