Search - IFIP Open Digital Library Access content directly

Filter your results

59 results
Sub-domain level 1 : info.info-cr

When Clocks Fail: On Critical Paths and Clock Faults

Michel Agoyan , Jean-Max Dutertre , David Naccache , Bruno Robisson , Assia Tria
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers emse-00505344v1

Ex-SDF: an extended service dependency framework for intrusion impact assessment

Nizar Kheir , Nora Cuppens-Bouhlahia , Frédéric Cuppens , Hervé Debar
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩
Conference papers hal-00565624v1

Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposal

Patrick Battistello , Cyril Delétré
CMC 2010 : 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, May 2010, Linz, Austria. pp.154 - 165
Conference papers hal-00565730v1
Image document

Composing Trust Models towards Interoperable Trust Management

Rachid Saadi , Mohammad Ashiqur Rahaman, , Valérie Issarny , Alessandra Toninelli
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.51-66, ⟨10.1007/978-3-642-22200-9_7⟩
Conference papers inria-00617629v1
Image document

Proximity-Based Trust Inference for Mobile Social Networking

Amir Seyedi , Rachid Saadi , Valérie Issarny
Trust Management V, Jun 2011, Copenhagen, Denmark. pp.253-264, ⟨10.1007/978-3-642-22200-9_20⟩
Conference papers inria-00617630v1
Image document

Detecting illegal system calls using a data-oriented detection model

Jonathan-Christofer Demay , Frédéric Majorczyk , Eric Totel , Frédéric Tronel
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
Conference papers hal-00657971v1
Image document

Attacks on Java Card 3.0 Combining Fault and Logical Attacks

Guillaume Barbu , Hugues Thiebeauld , Vincent Guerin
Smart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010, Apr 2010, Passau, Germany. pp.148-163, ⟨10.1007/978-3-642-12510-2_11⟩
Conference papers hal-00692165v1
Image document

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Guillaume Barbu , Guillaume Duc , Philippe Hoogvorst
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers hal-00692171v1
Image document

Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0

Guillaume Barbu , Hugues Thiebeauld
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers hal-00692172v1
Image document

Embedded Eavesdropping on Java Card

Guillaume Barbu , Christophe Giraud , Vincent Guerin
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.37-48, ⟨10.1007/978-3-642-30436-1_4⟩
Conference papers hal-00706186v1
Image document

Handling Stateful Firewall Anomalies

Frédéric Cuppens , Nora Cuppens-Boulahia , Joaquin Garcia Alfaro , Tarik Moataz , Xavier Rimasson
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers hal-00737170v1
Image document

Privacy Protection for Smartphones: An Ontology-Based Firewall

Johanne Vincent , Christine Porquet , Maroua Borsali , Harold Leboulanger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.371-380, ⟨10.1007/978-3-642-21040-2_27⟩
Conference papers hal-00801738v1
Image document

Dynamics in Delegation and Revocation Schemes: A Logical Approach

Guillaume Aucher , Steve Barker , Guido Boella , Valerio Genovese , Leendert van Der Torre
23th Data and Applications Security (DBSec), Jul 2011, Richmond, United States. pp.90-105, ⟨10.1007/978-3-642-22348-8_9⟩
Conference papers inria-00593654v2
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

One-Time Biometrics for Online Banking and Electronic Payment Authentication

Aude Plateaux , Patrick Lacharme , Christophe Rosenberger , Audun Jøsang
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers hal-01076676v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings

Paul Lajoie-Mazenc , Emmanuelle Anceaume , Gilles Guette , Thomas Sirvent , Valérie Viet Triem Tong
9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩
Conference papers hal-01131975v2
Image document

Extending UPPAAL for the Modeling and Verification of Dynamic Real-Time Systems

Abdeldjalil Boudjadar , Frits Vaandrager , Jean-Paul Bodeveix , M Filali
5th International Conference on Fundamentals of Software Engineering (FSEN 2013), Apr 2013, Tehran, Iran. pp.111-132, ⟨10.1007/978-3-642-40213-5_8⟩
Conference papers hal-01231765v1
Image document

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation

Mohamed Sabt , Mohammed Achemlal , Abdelmadjid Bouabdallah
30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.557-570, ⟨10.1007/978-3-319-18467-8_37⟩
Conference papers hal-01246353v1
Image document

Software Defined Networking Reactive Stateful Firewall

Salah Eddine S. E. Zerkane , Philippe Le Parc , Frederic Cuppens , David Espes
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers hal-01333445v1
Image document

Usability aspects of the inside-in approach for ancillary search tasks on the web

Marco Winckler , Ricardo Cava , Eric Barboni , Philippe Palanque , Carla Freitas
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.211-230, ⟨10.1007/978-3-319-22668-2_18⟩
Conference papers hal-01343048v1
Image document

Automated classification of C&C connections through malware URL clustering

Nizar Kheir , Gregory Blanc , Hervé Debar , Joaquin Garcia-Alfaro , Dingqi Yang
2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Conference papers hal-01255089v1
Image document

Electromagnetic Transmission of Intellectual Property Data to Protect FPGA Designs

Lilian Bossuet , Pierre Bayon , Viktor Fischer
23th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2015, Daejeon, South Korea. pp.150 - 169, ⟨10.1007/978-3-319-46097-0_8⟩
Conference papers hal-01382963v1
Image document

Enhanced Task Modelling for Systematic Identification and Explicit Representation of Human Errors

Racim Fahssi , Célia Martinie , Philippe Palanque
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.192-212, ⟨10.1007/978-3-319-22723-8_16⟩
Conference papers hal-01387758v1
Image document

Novel lightweight signcryption-based key distribution mechanisms for MIKEY

Kim Thuat Nguyen , Nouha Ouahla , Maryline Laurent
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Conference papers hal-01391308v1

Information Security Theory and Practice: Securing the Internet of Things

David Naccache , Damien Sauveron
David Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books hal-01098408v1
Image document

Trust Driven Strategies for Privacy by Design

Thibaud Antignac , Daniel Le Métayer
9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.60-75, ⟨10.1007/978-3-319-18491-3_5⟩
Conference papers hal-01262365v1
Image document

Practical and Privacy-Preserving TEE Migration

Ghada Arfaoui , Jean-François Lalande , Saïd Gharout , Jacques Traoré
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
Conference papers hal-01183508v1
Image document

Confidentiality-Preserving Query Execution of Fragmented Outsourced Data

Anis Bkakria , Frédéric Cuppens , Nora Cuppens-Bouhlahia , José M. Fernandez
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers hal-01213982v1
Image document

Evaluating User Experience for Interactive Television: Towards the Development of a Domain-Specific User Experience Questionnaire

Regina Bernhaupt , Michael Pirker
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.642-659, ⟨10.1007/978-3-642-40480-1_45⟩
Conference papers hal-01223180v2