Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

320 results
Keywords : Security
Image document

Ransomware Steals Your Phone. Formal Methods Rescue It

Francesco Mercaldo , Vittoria Nardone , Antonella Santone , Corrado Aaron Visaggio
36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.212-221, ⟨10.1007/978-3-319-39570-8_14⟩
Conference papers hal-01432919v1
Image document

Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams

Maxim Kolomeets , Andrey Chechulin , Igor Kotenko
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.141-157, ⟨10.1007/978-3-319-45507-5_10⟩
Conference papers hal-01635003v1
Image document

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

Ronald Kainda , Ivan Flechais , A. W. Roscoe
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.308-315, ⟨10.1007/978-3-642-12368-9_24⟩
Conference papers hal-01056076v1
Image document

Improving Computer Security Dialogs

Cristian Bravo-Lillo , Lorrie Faith Cranor , Julie Downs , Saranga Komanduri , Manya Sleeper
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.18-35, ⟨10.1007/978-3-642-23768-3_2⟩
Conference papers hal-01596947v1
Image document

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries

Karl Kümmel , Tobias Scheidat , Claus Vielhauer , Jana Dittmann
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.16-25, ⟨10.1007/978-3-642-32805-3_2⟩
Conference papers hal-01540894v1
Image document

Using Model Driven Security Approaches in Web Application Development

Christoph Hochreiner , Zhendong Ma , Peter Kieseberg , Sebastian Schrittwieser , Edgar Weippl
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers hal-01397248v1
Image document

A Trust-Based Defensive System Model for Cloud Computing

Qian Zhou , Jiong Yu , Feiran Yu
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.146-159, ⟨10.1007/978-3-642-24403-2_12⟩
Conference papers hal-01593026v1
Image document

From MDM to DB2: A Case Study of Security Enforcement Migration

Nikolay Yakovets , Jarek Gryz , Stephanie Hazlewood , Paul Van Run
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers hal-01534771v1
Image document

Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme

Hae-Jung Kim , Eun-Jun Yoon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers hal-01551363v1
Image document

Multi-domain DDoS Mitigation Based on Blockchains

Bruno Rodrigues , Thomas Bocek , Burkhard Stiller
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.185-190, ⟨10.1007/978-3-319-60774-0_19⟩
Conference papers hal-01806051v1
Image document

P3S: A Privacy Preserving Publish-Subscribe Middleware

Partha Pal , Greg Lauer , Joud Khoury , Nick Hoff , Joe Loyall
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.476-495, ⟨10.1007/978-3-642-35170-9_24⟩
Conference papers hal-01555554v1
Image document

Netflow-Based Malware Detection and Data Visualisation System

Rafał Kozik , Robert Młodzikowski , Michał Choraś
16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.652-660, ⟨10.1007/978-3-319-59105-6_56⟩
Conference papers hal-01656262v1
Image document

Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms

Marios Belk , Christos Fidas , Panagiotis Germanakos , George Samaras
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.442-459, ⟨10.1007/978-3-642-40477-1_27⟩
Conference papers hal-01504900v1
Image document

Impact of Perceived Connectivity on Intention to Use Social Media: Modelling the Moderation Effects of Perceived Risk and Security

Samuel Fosso Wamba , Shahriar Akter
15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.219-227, ⟨10.1007/978-3-319-45234-0_20⟩
Conference papers hal-01702181v1

Urban Agriculture: A Growing Field of Research

Peter Lyle , Jaz Jaz Hee-Jeong Choi , Shaun Lawson , Christopher Lueg , Alan Chamberlain , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.785
Conference papers hal-01514071v1
Image document

Econometric Feedback for Runtime Risk Management in VoIP Architectures

Oussema Dabbebi , Badonnel Rémi , Festor Olivier
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.26-37, ⟨10.1007/978-3-642-21484-4_3⟩
Conference papers hal-00747274v1
Image document

Security and privacy issues related to quick response codes

Pulkit Garg , Saheb Chhabra , Gaurav Gupta , Garima Gupta , Monika Gupta
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.255-267, ⟨10.1007/978-3-030-88381-2_13⟩
Conference papers hal-03764371v1
Image document

Towards Safety and Security-Related Testing of Crisis Management Solutions

Todor Tagarev , Petya Ivanova , Laurent Dubost , Cyril Dangerville
5th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Dec 2020, Sofia, Bulgaria. pp.216-234, ⟨10.1007/978-3-030-81469-4_18⟩
Conference papers hal-03761639v1
Image document

Building Resilient Community Through Plant Back Better Initiative – Guiding Principles and Best Practices

Yanling Lee , Wei-Sen Li , Yi-Ching Liu , Ke-Hui Chen , Chi-Ling Chang , et al.
4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.85-106, ⟨10.1007/978-3-030-48939-7_9⟩
Conference papers hal-03374248v1
Image document

Usable Privacy and Security in Personal Health Records

Inma Carrión , Jose L. Fernández-Alemán , Ambrosio Toval
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.36-43, ⟨10.1007/978-3-642-23768-3_3⟩
Conference papers hal-01596945v1
Image document

That’s My DNA: Detecting Malicious Tampering of Synthesized DNA

Diptendu Mohan Kar , Indrajit Ray
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.61-80, ⟨10.1007/978-3-030-22479-0_4⟩
Conference papers hal-02384604v1
Image document

IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices

Florent Fourcot , Laurent Toutain , Stefan Köpsell , Frédéric Cuppens , Nora Cuppens-Boulahia
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.148-160, ⟨10.1007/978-3-642-40552-5_14⟩
Conference papers hal-01497012v1
Image document

Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps

Davide Caputo , Luca Verderame , Simone Aonzo , Alessio Merlo
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.121-139, ⟨10.1007/978-3-030-22479-0_7⟩
Conference papers hal-02384600v1
Image document

Integrity of Electronic Patient Records

Joris Hulstijn , Jan van Der Jagt , Pieter Heijboer
10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.378-391, ⟨10.1007/978-3-642-22878-0_32⟩
Conference papers hal-01589094v1
Image document

Worst- and Average-Case Privacy Breaches in Randomization Mechanisms

Michele Boreale , Michela Paolini
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.72-86, ⟨10.1007/978-3-642-33475-7_6⟩
Conference papers hal-01556211v1
Image document

Influences of Mixed Reality and Human Cognition on Picture Passwords: An Eye Tracking Study

Christos Fidas , Marios Belk , George Hadjidemetriou , Andreas Pitsillides
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.304-313, ⟨10.1007/978-3-030-29384-0_19⟩
Conference papers hal-02544573v1
Image document

Cloud-Based Privacy Aware Preference Aggregation Service

Sourya Joyee De , Asim K. Pal
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.208-223
Conference papers hal-01506784v1
Image document

Flow-Based Detection of DNS Tunnels

Wendy Ellens , Piotr Żuraniewski , Anna Sperotto , Harm Schotanus , Michel Mandjes , et al.
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers hal-01489962v1
Image document

Efficiency of Secure Network Coding Schemes

Elke Franz , Stefan Pfennig , André Fischer
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.145-159, ⟨10.1007/978-3-642-32805-3_12⟩
Conference papers hal-01540886v1
Image document

Requirements for an eModeration System in Private Schools in South Africa

Vanitha Rajamany , Corné J. Staden , Judy Biljon
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.557-568, ⟨10.1007/978-3-030-44999-5_46⟩
Conference papers hal-03222835v1