Filter your results
- 110
- 8
- 1
- 104
- 8
- 7
- 119
- 19
- 1
- 13
- 6
- 8
- 3
- 6
- 5
- 13
- 10
- 10
- 22
- 15
- 7
- 119
- 16
- 7
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 13
- 10
- 9
- 8
- 7
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Performance Analysis of Accumulator-based Revocation Mechanisms25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.289-301, ⟨10.1007/978-3-642-15257-3_26⟩
Conference papers
hal-01054508v1
|
||
|
Heap-Dependent Expressions in Separation LogicJoint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.170-185, ⟨10.1007/978-3-642-13464-7_14⟩
Conference papers
hal-01055155v1
|
||
|
Efficient and Effective Buffer Overflow Protection on ARM Processors4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.1-16, ⟨10.1007/978-3-642-12368-9_1⟩
Conference papers
hal-01056081v1
|
||
|
PriMan : A Privacy-Preserving Identity Framework24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.327-334, ⟨10.1007/978-3-642-13739-6_24⟩
Conference papers
hal-01056676v1
|
||
|
Dynamic Composition of Cross-Organizational Features in Distributed Software Systems10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.183-197, ⟨10.1007/978-3-642-13645-0_14⟩
Conference papers
hal-01061086v1
|
||
|
An Advanced, Privacy-Friendly Loyalty SystemMarit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.128-138, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_10⟩
Book sections
hal-01276066v1
|
||
|
A Look into Business Process Modeling Guidelines through the Lens of the Technology Acceptance Model7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.73-86, ⟨10.1007/978-3-662-45501-2_6⟩
Conference papers
hal-01281990v1
|
||
|
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.194-208, ⟨10.1007/978-3-319-33630-5_14⟩
Conference papers
hal-01369553v1
|
||
|
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.323-336, ⟨10.1007/978-3-319-33630-5_22⟩
Conference papers
hal-01369566v1
|
||
|
PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.403-416, ⟨10.1007/978-3-642-55415-5_34⟩
Conference papers
hal-01370388v1
|
||
|
Trusted Computing to Increase Security and Privacy in eID Authentication29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.485-492, ⟨10.1007/978-3-642-55415-5_41⟩
Conference papers
hal-01370406v1
|
||
|
A Framework for Production System Design: Insights from Industrial ExperienceIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.76-82, ⟨10.1007/978-3-662-44733-8_10⟩
Conference papers
hal-01387150v1
|
||
|
PA Meets IS Research: Analysing Failure of Intergovernmental Information Systems via IS Adoption and Success Models13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.72-83, ⟨10.1007/978-3-662-44426-9_6⟩
Conference papers
hal-01401726v1
|
||
|
Secure Storage on Android with Context-Aware Access Control15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.46-59, ⟨10.1007/978-3-662-44885-4_4⟩
Conference papers
hal-01404184v1
|
||
|
A Study on Advanced Persistent Threats15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.63-72, ⟨10.1007/978-3-662-44885-4_5⟩
Conference papers
hal-01404186v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-8735, 2014, Lecture Notes in Computer Science, 978-3-662-44884-7. ⟨10.1007/978-3-662-44885-4⟩
Books
hal-01404210v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.209-221, ⟨10.1007/978-3-319-22479-4_16⟩
Conference papers
hal-01412272v1
|
||
|
Learning HCI and InfoVis in the Open8th Workshop on Human-Computer Interaction and Visualization (HCIV), Sep 2011, Lisbon, Portugal. pp.8-16, ⟨10.1007/978-3-642-54894-9_2⟩
Conference papers
hal-01414648v1
|
||
|
Lightweight Practical Private One-Way Anonymous Messaging9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.76-91, ⟨10.1007/978-3-319-18491-3_6⟩
Conference papers
hal-01416208v1
|
||
|
Privacy by Design – The Case of Automated Border ControlJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.139-152, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_10⟩
Book sections
hal-01431568v1
|
||
|
A Survey on Multimodal Biometrics and the Protection of Their TemplatesJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.169-184, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_12⟩
Book sections
hal-01431575v1
|
||
|
Testing a Selection of BPMN Tools for Their Support of Modelling Guidelines8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.111-125, ⟨10.1007/978-3-319-25897-3_8⟩
Conference papers
hal-01442301v1
|
||
|
Secure Resource Sharing for Embedded Protected Module Architectures9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers
hal-01442554v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders (Part 2)14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.386-397, ⟨10.1007/978-3-319-25013-7_31⟩
Conference papers
hal-01448056v1
|
||
|
Privacy-Friendly Checking of Remote Token Blacklists3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.18-33, ⟨10.1007/978-3-642-37282-7_3⟩
Conference papers
hal-01470501v1
|
||
|
Commercial Home Assistance (eHealth) ServicesInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.28-42, ⟨10.1007/978-3-642-27585-2_3⟩
Conference papers
hal-01481504v1
|
||
|
A Financial Perspective on Improving ICT Service Delivery: A Case at the Belgian Railways6th Conference on Research and Practical Issues in Enterprise Information Systems (CONFENIS), Sep 2012, Ghent, Belgium. pp.174-181, ⟨10.1007/978-3-642-36611-6_14⟩
Conference papers
hal-01484677v1
|
||
|
Measuring the Impact of Suspension on the Process Enactment Environment during Process Evolution6th Conference on Research and Practical Issues in Enterprise Information Systems (CONFENIS), Sep 2012, Ghent, Belgium. pp.75-89, ⟨10.1007/978-3-642-36611-6_6⟩
Conference papers
hal-01484692v1
|
||
|
Interactive Interaction Constraints15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.211-225, ⟨10.1007/978-3-642-38493-6_15⟩
Conference papers
hal-01486028v1
|
||
|
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.113-127, ⟨10.1007/978-3-642-39614-4_8⟩
Conference papers
hal-01492780v1
|