Filter your results
- 38
- 37
- 1
- 37
- 1
- 1
- 2
- 7
- 5
- 8
- 9
- 3
- 4
- 38
- 38
- 25
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
DynaSoRe: Efficient In-Memory Store for Social Applications14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.425-444, ⟨10.1007/978-3-642-45065-5_22⟩
Conference papers
hal-00932468v1
|
||
|
Attack Trees with Sequential Conjunction30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.339-353, ⟨10.1007/978-3-319-18467-8_23⟩
Conference papers
hal-01197256v1
|
||
|
Towards Decentralised Workflow Scheduling via a Rule-Driven Shared Space13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.187-192, ⟨10.1007/978-3-642-38541-4_16⟩
Conference papers
hal-01489457v1
|
||
|
Quantitative Modal Transition Systems21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.50-58, ⟨10.1007/978-3-642-37635-1_3⟩
Conference papers
hal-01485977v1
|
||
|
Practical and Privacy-Preserving TEE Migration9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
Conference papers
hal-01183508v1
|
||
|
User and System Cross-Learning of Gesture Commands on Pen-Based Devices14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.337-355, ⟨10.1007/978-3-642-40480-1_21⟩
Conference papers
hal-00881020v2
|
||
|
Runtime Code Polymorphism as a Protection Against Side Channel Attacks10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.136-152, ⟨10.1007/978-3-319-45931-8_9⟩
Conference papers
emse-01372223v1
|
||
|
Program Transformation for Non-interference Verification on Programs with Pointers28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.231-244, ⟨10.1007/978-3-642-39218-4_18⟩
Conference papers
hal-00814671v2
|
- 1
- 2