Filter your results
- 4
- 4
- 4
- 4
- 1
- 4
- 5
- 10
- 7
- 6
- 11
- 9
- 4
- 4
- 5
- 9
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.307-320, ⟨10.1007/978-3-642-55415-5_25⟩
Conference papers
hal-01370377v1
|
||
|
Simulation of Acoustic Wave Propagation in Anisotropic Media Using Dynamic Programming Technique26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.36-51, ⟨10.1007/978-3-662-45504-3_5⟩
Conference papers
hal-01286451v1
|
||
|
Verifying Security Policies Using Host Attributes34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers
hal-01398013v1
|
||
|
Model-Based Detection of CSRF29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.30-43, ⟨10.1007/978-3-642-55415-5_3⟩
Conference papers
hal-01370351v1
|