Filter your results
- 3
- 3
- 3
- 1
- 2
- 3
- 1
- 1
- 1
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
How to Break EAP-MD56th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.49-57, ⟨10.1007/978-3-642-30955-7_6⟩
Conference papers
hal-01534313v1
|
||
|
Efficient Mutation-Analysis Coverage for Constrained Random Verification7th IFIP TC 10 Working Conference on Distributed, Parallel and Biologically Inspired Systems (DIPES) / 3rd IFIP TC 10 International Conference on Biologically-Inspired Collaborative Computing (BICC) / Held as Part of World Computer Congress (WCC) , Sep 2010, Brisbane, Australia. pp.114-124, ⟨10.1007/978-3-642-15234-4_12⟩
Conference papers
hal-01054481v1
|
||
|
Mining Likely Properties of Access Control Policies via Association Rule Mining24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers
hal-01056688v1
|