Filter your results
- 13
- 13
- 13
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 2
- 13
- 2
- 1
- 1
- 1
- 4
- 8
- 6
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
On the Identification of Property Based Generalizations in Microdata Anonymization24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.81-96, ⟨10.1007/978-3-642-13739-6_6⟩
Conference papers
hal-01056667v1
|
||
|
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.42-63, ⟨10.1007/978-3-030-49669-2_3⟩
Conference papers
hal-03243641v1
|
||
|
A Distributed Mechanism to Protect Against DDoS Attacks31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.529-540, ⟨10.1007/978-3-319-61176-1_29⟩
Conference papers
hal-01684374v1
|
||
|
A Model for Trust-Based Access Control and Delegation in Mobile Clouds27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers
hal-01490708v1
|
||
|
Privacy Preserving Record Matching Using Automated Semi-trusted Broker29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.103-118, ⟨10.1007/978-3-319-20810-7_7⟩
Conference papers
hal-01745819v1
|
||
|
Adversarial Sampling Attacks Against Phishing Detection33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.83-101, ⟨10.1007/978-3-030-22479-0_5⟩
Conference papers
hal-02384598v1
|
||
|
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.179-193, ⟨10.1007/978-3-319-33630-5_13⟩
Conference papers
hal-01369552v1
|
||
|
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.61-76, ⟨10.1007/978-3-319-41483-6_5⟩
Conference papers
hal-01633680v1
|
||
|
Multilevel Secure Data Stream Processing23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.122-137, ⟨10.1007/978-3-642-22348-8_11⟩
Conference papers
hal-01586572v1
|
||
|
Using Trust-Based Information Aggregation for Predicting Security Level of Systems24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.241-256, ⟨10.1007/978-3-642-13739-6_16⟩
Conference papers
hal-01056685v1
|
||
|
ELITE: zEro Links Identity managemenT systEmDBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers
hal-01159837v1
|
||
|
Stream Processing with Secure Information Flow Constraints29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.311-329, ⟨10.1007/978-3-319-20810-7_22⟩
Conference papers
hal-01745816v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|