Filter your results
- 30
- 2
- 1
- 29
- 2
- 2
- 33
- 4
- 2
- 2
- 4
- 3
- 5
- 5
- 5
- 6
- 2
- 1
- 33
- 19
- 14
- 98
- 78
- 75
- 65
- 59
- 51
- 49
- 47
- 43
- 42
- 40
- 40
- 38
- 35
- 33
- 33
- 33
- 31
- 29
- 29
- 29
- 29
- 28
- 28
- 27
- 26
- 25
- 25
- 25
- 23
- 23
- 22
- 22
- 21
- 21
- 21
- 21
- 20
- 20
- 20
- 20
- 19
- 19
- 18
- 18
- 18
- 17
- 17
- 17
- 17
- 17
- 16
- 16
- 16
- 15
- 15
- 15
- 15
- 15
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 13
- 13
- 13
- 13
- 13
- 13
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 11
- 11
- 11
- 11
- 11
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 9
- 8
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
33 results
|
|
sorted by
|
|
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.105-118, ⟨10.1007/978-3-319-33630-5_8⟩
Conference papers
hal-01369546v1
|
||
|
Software Defined Networking Reactive Stateful Firewall31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers
hal-01333445v1
|
||
|
L-Convex Polyominoes Are Recognizable in Real Time by 2D Cellular AutomataAUTOMATA, Jun 2015, Turku, Finland. pp.127-140, ⟨10.1007/978-3-662-47221-7_10⟩
Conference papers
hal-01442468v1
|
||
|
Laser-Induced Fault Effects in Security-Dedicated CircuitsVLSI-SoC: Very Large Scale Integration and System-on-Chip, Oct 2014, Playa del Carmen, Mexico. pp.220-240, ⟨10.1007/978-3-319-25279-7_12⟩
Conference papers
hal-01383737v1
|
||
|
Towards a communication system for people with athetoid cerebral palsyInternational Conference on Human-Computer Interaction - Interact 2013, Sep 2013, Cap Town, South Africa. 8 p
Conference papers
hal-00826041v1
|
||
|
Firewall Policies Provisioning Through SDN in the Cloud31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.293-310, ⟨10.1007/978-3-319-61176-1_16⟩
Conference papers
hal-01684362v1
|
||
|
Adaptation Strategies in Multiprocessors System on ChipVLSI-SoC: Very Large Scale Integration - System-on-Chip, Sep 2010, Madrid, Spain. pp.233-257, ⟨10.1007/978-3-642-28566-0_10⟩
Conference papers
hal-01515993v1
|
||
|
Improving Stress Quality for SoC Using Faster-than-At-Speed Execution of Functional ProgramsVLSI-SoC: System-on-Chip in the Nanoscale Era – Design, Verification and Reliability, Sep 2016, Tallinn, Estonia. pp.130-151, ⟨10.1007/978-3-319-67104-8_7⟩
Conference papers
hal-01675205v1
|
||
|
Managing Secure Inter-slice Communication in 5G Network Slice ChainsManaging Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections
hal-02876588v1
|
||
|
Detection of Side Channel Attacks Based on Data Tainting in Android SystemsSEC 2017 - 32th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2017, Rome, Italy. pp.205-218, ⟨10.1007/978-3-319-58469-0_14⟩
Conference papers
hal-01648994v1
|
||
|
Towards the Automatic Detection of Nutritional Incompatibilities Based on Recipe TitlesCD-MAKE: Cross-Domain Conference for Machine Learning and Knowledge Extraction, Aug 2017, Reggio, Italy. pp.346-366, ⟨10.1007/978-3-319-66808-6_23⟩
Conference papers
hal-01677134v1
|
||
|
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg, Germany. pp.105-112, ⟨10.1007/978-3-642-40779-6_8⟩
Conference papers
lirmm-01379592v1
|
||
|
Kleenks: Linked Data with Applications in Research and Ambient Assisted LivingEunika Mercier-Laurent; Danielle Boulanger. Artificial Intelligence for Knowledge Management, AICT (422), Springer, pp.53-71, 2014, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-54897-0_4⟩
Book sections
lirmm-01001237v1
|
||
|
Constant Acceleration Theorem for Extended von Neumann Neighbourhoods AUTOMATA, Jun 2016, Zurich, Switzerland. pp.149-158, ⟨10.1007/978-3-319-39300-1_12⟩
Conference papers
lirmm-01476307v1
|
||
|
High Performance SoC Design Using Magnetic Logic and MemoryVLSI-SoC: Very Large Scale Integration - System-on-Chip, Oct 2011, Hong Kong, China. pp.10-33, ⟨10.1007/978-3-642-32770-4_2⟩
Conference papers
hal-01519767v1
|
||
|
Linking Telecom Service High-level Abstract Models to Simulators based on Model Transformations: The IMS Case Study18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.100-111, ⟨10.1007/978-3-642-32808-4_10⟩
Conference papers
hal-00739604v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.274-281, ⟨10.1007/978-3-642-39256-6_19⟩
Conference papers
hal-01159831v1
|
||
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
ICT Systems Security and Privacy ProtectionSpringer, AICT-428, 2014, IFIP Advances in Information and Communication Technology, 978-3-642-55414-8. ⟨10.1007/978-3-642-55415-5⟩
Books
hal-01370409v1
|
|||
|
MPSoC Architecture-Aware Automatic NoC Topology DesignIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.470-480, ⟨10.1007/978-3-642-15672-4_40⟩
Conference papers
hal-01054961v1
|
||
|
A transversal alignment between measurements and enterprise architecture for early verification of telecom service design19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.245-256, ⟨10.1007/978-3-642-40552-5_22⟩
Conference papers
hal-00859979v1
|
||
|
Exploiting RDF Open Data Using NoSQL Graph DatabasesAIAI: Artificial Intelligence Applications and Innovations, Sep 2015, Bayonne, France. pp.177-190, ⟨10.1007/978-3-319-23868-5_13⟩
Conference papers
lirmm-01381087v1
|
||
|
fQuery: SPARQL Query Rewriting to Enforce Data ConfidentialityDBSEC 2010 : 24th annual IFIP WG 11.3 working conference on data and applications security and privacy XXIV, Jun 2010, Roma, Italy. pp.146-161, ⟨10.1007/978-3-642-13739-6_10⟩
Conference papers
hal-01056741v1
|
||
|
ELITE: zEro Links Identity managemenT systEmDBSec 2014 : 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.195-210, ⟨10.1007/978-3-662-43936-4_13⟩
Conference papers
hal-01159837v1
|
||
|
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsDBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers
hal-01159841v1
|
||
|
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.218-233, ⟨10.1007/978-3-319-18467-8_15⟩
Conference papers
hal-01152528v1
|
||
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers
hal-01213982v1
|
||
|
Enhancing Electromagnetic Attacks using Spectral Coherence based CartographyVLSI-SoC 2009 - 17th IFIP International Conference on Very Large Scale Integration, Oct 2009, Florianopolis, Brazil. pp.11-16, ⟨10.1109/VLSISOC.2009.6041323⟩
Conference papers
lirmm-00429342v1
|
||
|
DeepRoute: Herding Elephant and Mice Flows with Reinforcement LearningMLN 2019 - 2nd International Conference on Machine Learning for Networking, Dec 2019, Paris, France. pp.296-314, ⟨10.1007/978-3-030-45778-5_20⟩
Conference papers
hal-03266462v1
|
- 1
- 2