Search - IFIP Open Digital Library Access content directly

Filter your results

119 results
Structure: Internal structure identifier : 300656
Image document

Performance Analysis of Accumulator-based Revocation Mechanisms

Jorn Lapon , Markulf Kohlweiss , Bart Decker , Vincent Naessens
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.289-301, ⟨10.1007/978-3-642-15257-3_26⟩
Conference papers hal-01054508v1
Image document

Heap-Dependent Expressions in Separation Logic

Jan Smans , Bart Jacobs , Frank Piessens
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.170-185, ⟨10.1007/978-3-642-13464-7_14⟩
Conference papers hal-01055155v1
Image document

Efficient and Effective Buffer Overflow Protection on ARM Processors

Raoul Strackx , Yves Younan , Pieter Philippaerts , Frank Piessens
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.1-16, ⟨10.1007/978-3-642-12368-9_1⟩
Conference papers hal-01056081v1
Image document

PriMan : A Privacy-Preserving Identity Framework

Kristof Verslype , Pieter Verhaeghe , Jorn Lapon , Vincent Naessens , Bart Decker
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.327-334, ⟨10.1007/978-3-642-13739-6_24⟩
Conference papers hal-01056676v1
Image document

Dynamic Composition of Cross-Organizational Features in Distributed Software Systems

Stefan Walraven , Bert Lagaisse , Eddy Truyen , Wouter Joosen
10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.183-197, ⟨10.1007/978-3-642-13645-0_14⟩
Conference papers hal-01061086v1
Image document

An Advanced, Privacy-Friendly Loyalty System

Milica Milutinovic , Italo Dacosta , Andreas Put , Bart De Decker
Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.128-138, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_10⟩
Book sections hal-01276066v1
Image document

A Look into Business Process Modeling Guidelines through the Lens of the Technology Acceptance Model

Isel Moreno-Montes de Oca , Monique Snoeck , Gladys Casas-Cardoso
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.73-86, ⟨10.1007/978-3-662-45501-2_6⟩
Conference papers hal-01281990v1
Image document

Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence

Iraklis Symeonidis , Fatemeh Shirazi , Gergely Biczók , Cristina Pérez-Solà , Bart Preneel
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.194-208, ⟨10.1007/978-3-319-33630-5_14⟩
Conference papers hal-01369553v1
Image document

Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware

Ping Chen , Christophe Huygens , Lieven Desmet , Wouter Joosen
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.323-336, ⟨10.1007/978-3-319-33630-5_22⟩
Conference papers hal-01369566v1
Image document

PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications

Andreas Put , Italo Dacosta , Milica Milutinovic , Bart De Decker
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.403-416, ⟨10.1007/978-3-642-55415-5_34⟩
Conference papers hal-01370388v1
Image document

Trusted Computing to Increase Security and Privacy in eID Authentication

Jan Vossaert , Jorn Lapon , Bart De Decker , Vincent Naessens
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.485-492, ⟨10.1007/978-3-642-55415-5_41⟩
Conference papers hal-01370406v1
Image document

A Framework for Production System Design: Insights from Industrial Experience

Nico J. Vandaele , Catherine J. Decouttere
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.76-82, ⟨10.1007/978-3-662-44733-8_10⟩
Conference papers hal-01387150v1
Image document

PA Meets IS Research: Analysing Failure of Intergovernmental Information Systems via IS Adoption and Success Models

Lies Van Cauter , Monique Snoeck , Joep Crompvoets
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.72-83, ⟨10.1007/978-3-662-44426-9_6⟩
Conference papers hal-01401726v1
Image document

Secure Storage on Android with Context-Aware Access Control

Faysal Boukayoua , Jorn Lapon , Bart De Decker , Vincent Naessens
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.46-59, ⟨10.1007/978-3-662-44885-4_4⟩
Conference papers hal-01404184v1
Image document

A Study on Advanced Persistent Threats

Ping Chen , Lieven Desmet , Christophe Huygens
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.63-72, ⟨10.1007/978-3-662-44885-4_5⟩
Conference papers hal-01404186v1

Communications and Multimedia Security

Bart De Decker , André Zúquete
Springer, LNCS-8735, 2014, Lecture Notes in Computer Science, 978-3-662-44884-7. ⟨10.1007/978-3-662-44885-4⟩
Books hal-01404210v1
Image document

Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders

Lies Van Cauter , Monique Snoeck , Joep Crompvoets
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.209-221, ⟨10.1007/978-3-319-22479-4_16⟩
Conference papers hal-01412272v1
Image document

Learning HCI and InfoVis in the Open

Erik Duval , Gonzalo Parra , Jose Luis Santos , Sam Agten , Sven Charleer , et al.
8th Workshop on Human-Computer Interaction and Visualization (HCIV), Sep 2011, Lisbon, Portugal. pp.8-16, ⟨10.1007/978-3-642-54894-9_2⟩
Conference papers hal-01414648v1
Image document

Lightweight Practical Private One-Way Anonymous Messaging

Anirban Basu , Juan Camilo Corena , Jaideep Vaidya , Jon Crowcroft , Shinsaku Kiyomoto , et al.
9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.76-91, ⟨10.1007/978-3-319-18491-3_6⟩
Conference papers hal-01416208v1
Image document

Privacy by Design – The Case of Automated Border Control

Pagona Tsormpatzoudi , Diana Dimitrova , Jessica Schroers , Els Kindt
Jan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.139-152, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_10⟩
Book sections hal-01431568v1
Image document

A Survey on Multimodal Biometrics and the Protection of Their Templates

Christina-Angeliki Toli , Bart Preneel
Jan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.169-184, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_12⟩
Book sections hal-01431575v1
Image document

Testing a Selection of BPMN Tools for Their Support of Modelling Guidelines

Monique Snoeck , Isel De Oca , Tom Haegemans , Bjorn Scheldeman , Tom Hoste
8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.111-125, ⟨10.1007/978-3-319-25897-3_8⟩
Conference papers hal-01442301v1
Image document

Secure Resource Sharing for Embedded Protected Module Architectures

Jo Van Bulck , Job Noorman , Jan Tobias Mühlberg , Frank Piessens
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers hal-01442554v1
Image document

Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders (Part 2)

Lies Van Cauter , Monique Snoeck , Joep Crompvoets
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.386-397, ⟨10.1007/978-3-319-25013-7_31⟩
Conference papers hal-01448056v1
Image document

Privacy-Friendly Checking of Remote Token Blacklists

Roel Peeters , Andreas Pashalidis
3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.18-33, ⟨10.1007/978-3-642-37282-7_3⟩
Conference papers hal-01470501v1
Image document

Commercial Home Assistance (eHealth) Services

Milica Milutinovic , Koen Decroix , Vincent Naessens , Bart De Decker
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.28-42, ⟨10.1007/978-3-642-27585-2_3⟩
Conference papers hal-01481504v1
Image document

A Financial Perspective on Improving ICT Service Delivery: A Case at the Belgian Railways

Luc Lutin , Stijn Viaene , Nathalie Demeere , Olivier Jolyon
6th Conference on Research and Practical Issues in Enterprise Information Systems (CONFENIS), Sep 2012, Ghent, Belgium. pp.174-181, ⟨10.1007/978-3-642-36611-6_14⟩
Conference papers hal-01484677v1
Image document

Measuring the Impact of Suspension on the Process Enactment Environment during Process Evolution

Pieter Hens , Monique Snoeck , Manu De Backer
6th Conference on Research and Practical Issues in Enterprise Information Systems (CONFENIS), Sep 2012, Ghent, Belgium. pp.75-89, ⟨10.1007/978-3-642-36611-6_6⟩
Conference papers hal-01484692v1
Image document

Interactive Interaction Constraints

José Proença , Dave Clarke
15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.211-225, ⟨10.1007/978-3-642-38493-6_15⟩
Conference papers hal-01486028v1
Image document

Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice

Fatih Gey , Stefan Walraven , Dimitri Van Landuyt , Wouter Joosen
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.113-127, ⟨10.1007/978-3-642-39614-4_8⟩
Conference papers hal-01492780v1