Filter your results
- 13
- 13
- 1
- 13
- 2
- 1
- 2
- 1
- 2
- 2
- 2
- 3
- 13
- 6
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Multi-agent Model for Polarization Under Confirmation Bias in Social Networks41th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2021, Valletta, Malta. pp.22-41, ⟨10.1007/978-3-030-78089-0_2⟩
Conference papers
hal-03740263v1
|
||
|
Voting for bugs in Firefox: a voice for Mom and Dad?6th International IFIP WG 2.13 Conference on Open Source Systems,(OSS), May 2010, Notre Dame, United States. pp.73-84, ⟨10.1007/978-3-642-13244-5_6⟩
Conference papers
hal-00549769v1
|
||
|
Entropy and Attack Models in Information Flow6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.53-54, ⟨10.1007/978-3-642-15240-5_4⟩
Conference papers
hal-00548212v1
|
||
|
Zen and the Art of Network Troubleshooting: A Hands on Experimental Study7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.31-45, ⟨10.1007/978-3-319-17172-2_3⟩
Conference papers
hal-01411178v1
|
||
|
Safe Equivalences for Security Properties6th IFIP International Conference on Theoretical Computer Science (TCS 2010), Sep 2010, Brisbane, Australia. pp.55-70, ⟨10.1007/978-3-642-15240-5_5⟩
Conference papers
inria-00479674v2
|
||
|
Implementing Open Call-by-Value7th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2017, Teheran, Iran. pp.1-19, ⟨10.1007/978-3-319-68972-2_1⟩
Conference papers
hal-01675365v1
|
||
|
Metrics for Differential Privacy in Concurrent Systems34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Conference papers
hal-00879140v2
|
||
|
A Formal Security Model of a Smart Card Web Server10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.34-49, ⟨10.1007/978-3-642-27257-8_3⟩
Conference papers
hal-01596309v1
|
||
|
A Labelled Semantics for Soft Concurrent Constraint Programming17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.133-149, ⟨10.1007/978-3-319-19282-6_9⟩
Conference papers
hal-01149227v1
|
||
|
A Trustless Privacy-Preserving Reputation System31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.398-411, ⟨10.1007/978-3-319-33630-5_27⟩
Conference papers
hal-01369572v1
|
||
|
Self-reported Verifiable Reputation with Rater Privacy11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.180-195, ⟨10.1007/978-3-319-59171-1_14⟩
Conference papers
hal-01651161v1
|
||
|
Peeking through the BitTorrent Seedbox Hosting Ecosystem6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.115-126, ⟨10.1007/978-3-642-54999-1_10⟩
Conference papers
hal-01396477v1
|
||
|
Something of a Potemkin Village? Acid2 and Mozilla’s Efforts to Comply with HTML49th Open Source Software (OSS), Oct 2011, Salvador, Brazil. pp.320-324, ⟨10.1007/978-3-642-24418-6_25⟩
Conference papers
hal-01570760v1
|