Filter your results
- 26
- 25
- 1
- 26
- 1
- 1
- 2
- 2
- 1
- 2
- 2
- 2
- 7
- 4
- 4
- 26
- 7
- 4
- 4
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 4
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Privacy and Identity ManagementSpringer International Publishing, AICT-619, 2021, IFIP Advances in Information and Communication Technology, 978-3-030-72464-1. ⟨10.1007/978-3-030-72465-8⟩
Books
hal-03703756v1
|
||
|
Don’t Put the Cart Before the Horse – Effective Incident Handling Under GDPR and NIS Directive15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.3-17, ⟨10.1007/978-3-030-72465-8_1⟩
Conference papers
hal-03703760v1
|
||
|
Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.177-189, ⟨10.1007/978-3-030-42504-3_12⟩
Conference papers
hal-03378966v1
|
||
|
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.103-119, ⟨10.1007/978-3-030-41702-4_7⟩
Conference papers
hal-03173904v1
|
||
|
A Family of Lightweight Twisted Edwards Curves for the Internet of Things12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.193-206, ⟨10.1007/978-3-030-20074-9_14⟩
Conference papers
hal-02294608v1
|
||
|
Lifecycle Management in the Smart City Context: Smart Parking Use-Case13th IFIP International Conference on Product Lifecycle Management (PLM 2016), Jul 2016, Columbia, SC, United States. pp.631-641, ⟨10.1007/978-3-319-54660-5_56⟩
Conference papers
hal-01531772v1
|
||
|
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.19-34, ⟨10.1007/978-3-319-41483-6_2⟩
Conference papers
hal-01633679v1
|
||
|
Exploring IoT Protocols Through the Information-Centric Networking's Lens9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.56-60, ⟨10.1007/978-3-319-20034-7_6⟩
Conference papers
hal-01251165v1
|
||
|
Attack Trees with Sequential Conjunction30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.339-353, ⟨10.1007/978-3-319-18467-8_23⟩
Conference papers
hal-01197256v1
|
||
|
Transformation Systems with Incremental Negative Application Conditions21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.127-142, ⟨10.1007/978-3-642-37635-1_8⟩
Conference papers
hal-01485982v1
|
||
|
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.269-287
Conference papers
hal-01506574v1
|
||
|
Semantic Exploration of DNS11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.370-384, ⟨10.1007/978-3-642-30045-5_28⟩
Conference papers
hal-00712849v1
|
||
|
Pervasive Gaming as a Potential Solution to Traffic Congestion: New Challenges Regarding Ethics, Privacy and Trust11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.586-593, ⟨10.1007/978-3-642-33542-6_78⟩
Conference papers
hal-01556169v1
|
||
|
Instant Degradation of Anonymity in Low-Latency Anonymisation Systems6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.98-108, ⟨10.1007/978-3-642-30633-4_12⟩
Conference papers
hal-01529794v1
|
||
|
Large Scale DNS Analysis6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.151-154, ⟨10.1007/978-3-642-30633-4_20⟩
Conference papers
hal-01529799v1
|
||
|
Detecting Stealthy Backdoors with Association Rule Mining11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.161-171, ⟨10.1007/978-3-642-30054-7_13⟩
Conference papers
hal-01531956v1
|
||
|
Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.122-125, ⟨10.1007/978-3-642-30633-4_16⟩
Conference papers
hal-01529787v1
|
||
|
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.189-207, ⟨10.1007/978-3-642-30955-7_17⟩
Conference papers
hal-01534311v1
|
||
|
Cleaning Your House First: Shifting the Paradigm on How to Secure Networks5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.1-12, ⟨10.1007/978-3-642-21484-4_1⟩
Conference papers
inria-00613607v1
|
||
|
Machine Learning Approach for IP-Flow Record Anomaly Detection10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.28-39, ⟨10.1007/978-3-642-20757-0_3⟩
Conference papers
inria-00613602v1
|
||
|
BotTrack: Tracking Botnets Using NetFlow and PageRank10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.1-14, ⟨10.1007/978-3-642-20757-0_1⟩
Conference papers
inria-00613597v1
|
||
|
Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.82-97, ⟨10.1007/978-3-642-22200-9_9⟩
Conference papers
hal-01568681v1
|
||
|
Secure Delegation of Elliptic-Curve Pairing9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.24-35, ⟨10.1007/978-3-642-12510-2_3⟩
Conference papers
hal-01056101v1
|
||
|
An Autonomic Testing Framework for IPv6 Configuration Protocols4th International Conference on Autonomous Infrastructure, Management and Security - AIMS 2010, University of Zurich, Jun 2010, Zurich, Switzerland. pp.65-76, ⟨10.1007/978-3-642-13986-4_7⟩
Conference papers
inria-00546171v1
|
||
|
Click or Strike: Realistic versus Standard Game Controls in Violent Video Games and Their Effects on Aggression9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.171-182, ⟨10.1007/978-3-642-15399-0_16⟩
Conference papers
hal-01055645v1
|
||
|
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases22nd IFIP WG 6.1 International Conference on Testing Software and Systems (ICTSS), Nov 2010, Natal, Brazil. pp.250-265, ⟨10.1007/978-3-642-16573-3_18⟩
Conference papers
inria-00555069v2
|