Filter your results
- 53
- 5
- 1
- 57
- 1
- 1
- 59
- 2
- 2
- 5
- 14
- 2
- 2
- 4
- 8
- 2
- 4
- 3
- 9
- 4
- 59
- 11
- 8
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 6
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021), IFIP : International Federation for Information Processing, Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
Conference papers
hal-03345757v1
|
||
|
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.338-356, ⟨10.1007/978-3-030-81242-3_20⟩
Conference papers
hal-03463902v1
|
||
|
SoK: Cryptography for Neural NetworksIFIP 2019, IFIP Summer School on Privacy and Identity Management, Aug 2019, Brugg Windisch, Switzerland. ⟨10.1007/978-3-030-42504-3_5⟩
Conference papers
hal-03151115v1
|
||
|
Derivation of Heard-Of Predicates From Elementary Behavioral PatternsInternational Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2020), Jun 2020, Online, France. pp.133-149, ⟨10.1007/978-3-030-50086-3_8⟩
Conference papers
hal-02947787v1
|
||
|
Managing Secure Inter-slice Communication in 5G Network Slice ChainsManaging Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections
hal-02876588v1
|
||
|
Towards a Hierarchical Deep Learning Approach for Intrusion DetectionInternational Conference on Machine Learning for Networking (MLN), 2019, Paris, France. ⟨10.1007/978-3-030-45778-5_2⟩
Conference papers
hal-02560294v1
|
||
|
How to Teach the Undecidability of Malware Detection Problem and Halting ProblemWISE13: The 13th World Conference on Information Security Education, May 2020, Maribor, Slovenia
Conference papers
hal-02559585v1
|
||
|
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation34th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (also known as DBSEC), Jun 2020, Conférence online, Germany. pp.347-366, ⟨10.1007/978-3-030-49669-2_20⟩
Conference papers
hal-02544920v1
|
||
|
Verifiable and Private Oblivious Polynomial Evaluation13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.49-65, ⟨10.1007/978-3-030-41702-4_4⟩
Conference papers
hal-02412789v1
|
||
|
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
Conference papers
hal-02496273v1
|
||
|
Analysis of QUIC session establishment and its implementations13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩
Conference papers
hal-02468596v1
|
||
|
Deep System Knowledge Required: Revisiting UCD Contribution in the Design of Complex Command and Control Systems17th IFIP Conference on Human-Computer Interaction (INTERACT 2019), Sep 2019, Paphos, Cyprus. pp.699-720, ⟨10.1007/978-3-030-29381-9_42⟩
Conference papers
hal-02435352v1
|
||
|
An Efficient and Scalable Intrusion Detection System on Logs of Distributed ApplicationsSEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection, Jun 2019, Lisbonne, Portugal. pp.49-63, ⟨10.1007/978-3-030-22312-0_4⟩
Conference papers
hal-02409487v1
|
||
|
Output-sensitive Information flow analysis39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.93-110, ⟨10.1007/978-3-030-21759-4_6⟩
Conference papers
hal-02303984v1
|
||
|
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers
hal-02294599v1
|
||
|
Removing Problems in Rule-Based PoliciesSEC 2019 : ICT Systems Security and Privacy Protection, Jun 2019, Lisbon, Portugal. pp.120-133, ⟨10.1007/978-3-030-22312-0_9⟩
Conference papers
hal-02169342v1
|
||
|
Light Cryptography12th World Conference on Information Security Education WISE 2019, IFIP Working Group 11.8,, Jun 2019, Lisbonne, Portugal. pp.89-101, ⟨10.1007/978-3-030-23451-5_7⟩
Conference papers
hal-02145833v1
|
||
|
Rationalizing the Need of Architecture-Driven Testing of Interactive Systems7th International Working Conference on Human-Centered Software Engineering (HCSE 2018), Sep 2018, Sophia Antipolis, France. pp.164-186, ⟨10.1007/978-3-030-05909-5_10⟩
Conference papers
hal-02089262v1
|
||
|
Using Task Descriptions with Explicit Representation of Allocation of Functions, Authority and Responsibility to Design and Assess Automation5th IFIP Working Conference on Human Work Interaction Design (HWID), Aug 2018, Espoo, Finland. pp.36-56, ⟨10.1007/978-3-030-05297-3_3⟩
Conference papers
hal-02089260v1
|
||
|
Enriching Task Models with Usability and User Experience Evaluation Data7th International Conference on Human-Centred Software Engineering (HCSE 2018), Sep 2018, Sophia Antipolis, France. pp.146-163, ⟨10.1007/978-3-030-05909-5_9⟩
Conference papers
hal-02089252v1
|
||
|
Performance of Password Guessing Enumerators Under Cracking ConditionsICT Systems Security and Privacy Protection - IFIP SEC, Gurpreet Dhillon, Jun 2019, Lisbonne, Portugal. pp.67-80, ⟨10.1007/978-3-030-22312-0_5⟩
Conference papers
hal-02060091v1
|
||
|
Blockchain-Based Auditing of Transparent Log Servers32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.21-37, ⟨10.1007/978-3-319-95729-6_2⟩
Conference papers
hal-01917636v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
Sanitization of Call Detail Records via Differentially-Private Bloom Filters29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.223-230, ⟨10.1007/978-3-319-20810-7_15⟩
Conference papers
hal-01745827v1
|
||
|
Complementary Tools and Techniques for Supporting Fitness-for-Purpose of Interactive Critical Systems6th International Conference on Human-Centred Software Engineering (HCSE 2016) / 8th International Conference on Human Error, Safety (HESSD 2016) and System Development (HESSD), Aug 2016, Stockholm, Sweden. pp.181-202, ⟨10.1007/978-3-319-44902-9_12⟩
Conference papers
hal-02603527v2
|
||
|
Distributed Random Process for a Large-Scale Peer-to-Peer Lottery17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.34-48, ⟨10.1007/978-3-319-59665-5_3⟩
Conference papers
hal-01583824v1
|
||
|
Secure and Trustable Distributed Aggregation based on Kademlia32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.171-185, ⟨10.1007/978-3-319-58469-0_12⟩
Conference papers
hal-01529326v2
|
||
|
Delegation of Obligations and Responsibility26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.197-209, ⟨10.1007/978-3-642-21424-0_16⟩
Conference papers
hal-00606018v1
|
||
|
Reconstruction attack through classifier analysis26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.274-281, ⟨10.1007/978-3-642-31540-4_21⟩
Conference papers
hal-00736945v1
|
||
|
Evaluating User Experience for Interactive Television: Towards the Development of a Domain-Specific User Experience Questionnaire14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.642-659, ⟨10.1007/978-3-642-40480-1_45⟩
Conference papers
hal-01223180v2
|
- 1
- 2