Filter your results
- 53
- 5
- 1
- 57
- 1
- 1
- 59
- 2
- 2
- 5
- 14
- 2
- 2
- 4
- 8
- 2
- 4
- 3
- 9
- 4
- 59
- 11
- 8
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 6
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
When Clocks Fail: On Critical Paths and Clock Faults9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers
emse-00505344v1
|
||
|
Ex-SDF: an extended service dependency framework for intrusion impact assessment25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩
Conference papers
hal-00565624v1
|
||
Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposalCMC 2010 : 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, May 2010, Linz, Austria. pp.154 - 165
Conference papers
hal-00565730v1
|
|||
|
Composing Trust Models towards Interoperable Trust Management5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.51-66, ⟨10.1007/978-3-642-22200-9_7⟩
Conference papers
inria-00617629v1
|
||
|
Proximity-Based Trust Inference for Mobile Social NetworkingTrust Management V, Jun 2011, Copenhagen, Denmark. pp.253-264, ⟨10.1007/978-3-642-22200-9_20⟩
Conference papers
inria-00617630v1
|
||
|
Detecting illegal system calls using a data-oriented detection model26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
Conference papers
hal-00657971v1
|
||
|
Attacks on Java Card 3.0 Combining Fault and Logical AttacksSmart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010, Apr 2010, Passau, Germany. pp.148-163, ⟨10.1007/978-3-642-12510-2_11⟩
Conference papers
hal-00692165v1
|
||
|
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers
hal-00692171v1
|
||
|
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.010th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers
hal-00692172v1
|
||
|
Embedded Eavesdropping on Java Card27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.37-48, ⟨10.1007/978-3-642-30436-1_4⟩
Conference papers
hal-00706186v1
|
||
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
|
Privacy Protection for Smartphones: An Ontology-Based Firewall5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.371-380, ⟨10.1007/978-3-642-21040-2_27⟩
Conference papers
hal-00801738v1
|
||
|
Dynamics in Delegation and Revocation Schemes: A Logical Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, United States. pp.90-105, ⟨10.1007/978-3-642-22348-8_9⟩
Conference papers
inria-00593654v2
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
One-Time Biometrics for Online Banking and Electronic Payment AuthenticationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers
hal-01076676v1
|
||
|
Can code polymorphism limit information leakage?5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers
hal-01110259v1
|
||
|
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩
Conference papers
hal-01131975v2
|
||
|
Extending UPPAAL for the Modeling and Verification of Dynamic Real-Time Systems5th International Conference on Fundamentals of Software Engineering (FSEN 2013), Apr 2013, Tehran, Iran. pp.111-132, ⟨10.1007/978-3-642-40213-5_8⟩
Conference papers
hal-01231765v1
|
||
|
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.557-570, ⟨10.1007/978-3-319-18467-8_37⟩
Conference papers
hal-01246353v1
|
||
|
Software Defined Networking Reactive Stateful Firewall31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers
hal-01333445v1
|
||
|
Usability aspects of the inside-in approach for ancillary search tasks on the web15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.211-230, ⟨10.1007/978-3-319-22668-2_18⟩
Conference papers
hal-01343048v1
|
||
|
Automated classification of C&C connections through malware URL clustering 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Conference papers
hal-01255089v1
|
||
|
Electromagnetic Transmission of Intellectual Property Data to Protect FPGA Designs23th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2015, Daejeon, South Korea. pp.150 - 169, ⟨10.1007/978-3-319-46097-0_8⟩
Conference papers
hal-01382963v1
|
||
|
Enhanced Task Modelling for Systematic Identification and Explicit Representation of Human Errors15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.192-212, ⟨10.1007/978-3-319-22723-8_16⟩
Conference papers
hal-01387758v1
|
||
|
Novel lightweight signcryption-based key distribution mechanisms for MIKEY10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Conference papers
hal-01391308v1
|
||
|
Information Security Theory and Practice: Securing the Internet of ThingsDavid Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books
hal-01098408v1
|
||
|
Trust Driven Strategies for Privacy by Design9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.60-75, ⟨10.1007/978-3-319-18491-3_5⟩
Conference papers
hal-01262365v1
|
||
|
Practical and Privacy-Preserving TEE Migration9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
Conference papers
hal-01183508v1
|
||
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers
hal-01213982v1
|
||
|
Evaluating User Experience for Interactive Television: Towards the Development of a Domain-Specific User Experience Questionnaire14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.642-659, ⟨10.1007/978-3-642-40480-1_45⟩
Conference papers
hal-01223180v2
|
- 1
- 2