Search - IFIP Open Digital Library Access content directly

Filter your results

59 results
Sub-domain level 1 : info.info-cr
Image document

Software Defined Networking Reactive Stateful Firewall

Salah Eddine S. E. Zerkane , Philippe Le Parc , Frederic Cuppens , David Espes
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers hal-01333445v1
Image document

Usability aspects of the inside-in approach for ancillary search tasks on the web

Marco Winckler , Ricardo Cava , Eric Barboni , Philippe Palanque , Carla Freitas
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.211-230, ⟨10.1007/978-3-319-22668-2_18⟩
Conference papers hal-01343048v1
Image document

RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators

Ahmad Samer Wazan , David Chadwick , Rémi Venant , Romain Laborde , Abdelmalek Benzekri
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021), IFIP : International Federation for Information Processing, Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
Conference papers hal-03345757v1
Image document

Privacy Protection for Smartphones: An Ontology-Based Firewall

Johanne Vincent , Christine Porquet , Maroua Borsali , Harold Leboulanger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.371-380, ⟨10.1007/978-3-642-21040-2_27⟩
Conference papers hal-00801738v1
Image document

Performance of Password Guessing Enumerators Under Cracking Conditions

Mathieu Valois , Patrick Lacharme , Jean-Marie Le Bars
ICT Systems Security and Privacy Protection - IFIP SEC, Gurpreet Dhillon, Jun 2019, Lisbonne, Portugal. pp.67-80, ⟨10.1007/978-3-030-22312-0_5⟩
Conference papers hal-02060091v1
Image document

Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers

Etienne Tehrani , Jean-Luc Danger , Tarik Graba
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers hal-02294599v1
Image document

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Tidiane Sylla , Mohamed Aymen Chalouf , Francine Krief , Karim Samaké
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
Conference papers hal-02496273v1

Managing Secure Inter-slice Communication in 5G Network Slice Chains

Luis Suárez , David Espes , Frédéric Cuppens , Cao-Thanh Phan , Philippe Bertin , et al.
Managing Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections hal-02876588v1
Image document

Derivation of Heard-Of Predicates From Elementary Behavioral Patterns

Adam Shimi , Aurélie Hurault , Philippe Quéinnec
International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2020), Jun 2020, Online, France. pp.133-149, ⟨10.1007/978-3-030-50086-3_8⟩
Conference papers hal-02947787v1
Image document

Proximity-Based Trust Inference for Mobile Social Networking

Amir Seyedi , Rachid Saadi , Valérie Issarny
Trust Management V, Jun 2011, Copenhagen, Denmark. pp.253-264, ⟨10.1007/978-3-642-22200-9_20⟩
Conference papers inria-00617630v1
Image document

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation

Mohamed Sabt , Mohammed Achemlal , Abdelmadjid Bouabdallah
30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.557-570, ⟨10.1007/978-3-319-18467-8_37⟩
Conference papers hal-01246353v1
Image document

Composing Trust Models towards Interoperable Trust Management

Rachid Saadi , Mohammad Ashiqur Rahaman, , Valérie Issarny , Alessandra Toninelli
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.51-66, ⟨10.1007/978-3-642-22200-9_7⟩
Conference papers inria-00617629v1
Image document

One-Time Biometrics for Online Banking and Electronic Payment Authentication

Aude Plateaux , Patrick Lacharme , Christophe Rosenberger , Audun Jøsang
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers hal-01076676v1
Image document

Novel lightweight signcryption-based key distribution mechanisms for MIKEY

Kim Thuat Nguyen , Nouha Ouahla , Maryline Laurent
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Conference papers hal-01391308v1
Image document

Blockchain-Based Auditing of Transparent Log Servers

Hoang-Long Nguyen , Jean-Philippe Eisenbarth , Claudia-Lavinia Ignat , Olivier Perrin
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.21-37, ⟨10.1007/978-3-319-95729-6_2⟩
Conference papers hal-01917636v1

Information Security Theory and Practice: Securing the Internet of Things

David Naccache , Damien Sauveron
David Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books hal-01098408v1
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications

David Lanoe , Michel Hurfin , Eric Totel , Carlos Maziero
SEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection, Jun 2019, Lisbonne, Portugal. pp.49-63, ⟨10.1007/978-3-030-22312-0_4⟩
Conference papers hal-02409487v1
Image document

Verifiable and Private Oblivious Polynomial Evaluation

Manik Lal Das , Hardik Gajera , David Gerault , Matthieu Giraud , Pascal Lafourcade
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.49-65, ⟨10.1007/978-3-030-41702-4_4⟩
Conference papers hal-02412789v1
Image document

Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings

Paul Lajoie-Mazenc , Emmanuelle Anceaume , Gilles Guette , Thomas Sirvent , Valérie Viet Triem Tong
9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩
Conference papers hal-01131975v2
Image document

Light Cryptography

Pascal Lafourcade , Takaaki Mizuki , Atsuki Nagao , Kazumasa Shinagawa
12th World Conference on Information Security Education WISE 2019, IFIP Working Group 11.8,, Jun 2019, Lisbonne, Portugal. pp.89-101, ⟨10.1007/978-3-030-23451-5_7⟩
Conference papers hal-02145833v1
Image document

Automated classification of C&C connections through malware URL clustering

Nizar Kheir , Gregory Blanc , Hervé Debar , Joaquin Garcia-Alfaro , Dingqi Yang
2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Conference papers hal-01255089v1

Ex-SDF: an extended service dependency framework for intrusion impact assessment

Nizar Kheir , Nora Cuppens-Bouhlahia , Frédéric Cuppens , Hervé Debar
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩
Conference papers hal-00565624v1
Image document

How to Teach the Undecidability of Malware Detection Problem and Halting Problem

Matthieu Journault , Pascal Lafourcade , Malika More , Rémy Poulain , Léo Robert
WISE13: The 13th World Conference on Information Security Education, May 2020, Maribor, Slovenia
Conference papers hal-02559585v1
Image document

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

Hao Jiang , Ahmed Bouabdallah
WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers hal-01802720v1
Image document

Distributed Random Process for a Large-Scale Peer-to-Peer Lottery

Stéphane Grumbach , Robert Riemann
17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.34-48, ⟨10.1007/978-3-319-59665-5_3⟩
Conference papers hal-01583824v1
Image document

Secure and Trustable Distributed Aggregation based on Kademlia

Stéphane Grumbach , Robert Riemann
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.171-185, ⟨10.1007/978-3-319-58469-0_12⟩
Conference papers hal-01529326v2
Image document

Reconstruction attack through classifier analysis

Sébastien Gambs , Ahmed Gmati , Michel Hurfin
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.274-281, ⟨10.1007/978-3-642-31540-4_21⟩
Conference papers hal-00736945v1
Image document

Analysis of QUIC session establishment and its implementations

Eva Gagliardi , Olivier Levillain
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩
Conference papers hal-02468596v1
Image document

Enhanced Task Modelling for Systematic Identification and Explicit Representation of Human Errors

Racim Fahssi , Célia Martinie , Philippe Palanque
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.192-212, ⟨10.1007/978-3-319-22723-8_16⟩
Conference papers hal-01387758v1