Filter your results
- 3
- 2
- 4
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 5
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
|
Managing Secure Inter-slice Communication in 5G Network Slice ChainsManaging Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections
hal-02876588v1
|
||
|
Ex-SDF: an extended service dependency framework for intrusion impact assessment25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩
Conference papers
hal-00565624v1
|
||
|
Delegation of Obligations and Responsibility26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩
Conference papers
hal-00606018v1
|
||
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers
hal-01213982v1
|