Search - IFIP Open Digital Library Access content directly

Filter your results

119 results
Structure: Internal structure identifier : 300656
Image document

Using a Smartphone to Access Personalized Web Services on a Workstation

Faysal Boukayoua , Jan Vossaert , Bart De Decker , Vincent Naessens
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.144-156, ⟨10.1007/978-3-642-31668-5_11⟩
Conference papers hal-01517605v1
Image document

Understanding Actor Roles in Inter-organizational Digital Public Services

Stijn Wouters , Marijn Janssen , Joep Crompvoets
20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.43-58, ⟨10.1007/978-3-030-84789-0_4⟩
Conference papers hal-04175105v1
Image document

Trusted Computing to Increase Security and Privacy in eID Authentication

Jan Vossaert , Jorn Lapon , Bart De Decker , Vincent Naessens
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.485-492, ⟨10.1007/978-3-642-55415-5_41⟩
Conference papers hal-01370406v1
Image document

Towards a Framework for Open Data Publishers: A Comparison Study Between Sweden and Belgium

Jonathan Crusoe , Anthony Simonofski , Antoine Clarinval
19th International Conference on Electronic Government (EGOV), Aug 2020, Linköping, Sweden. pp.262-274, ⟨10.1007/978-3-030-57599-1_20⟩
Conference papers hal-03282788v1

The Practice of Enterprise Modeling

Geert Poels , Frederik Gailly , Estefania Serral Asensio , Monique Snoeck
Springer International Publishing, LNBIP-305, 2017, Lecture Notes in Business Information Processing, 978-3-319-70240-7. ⟨10.1007/978-3-319-70241-4⟩
Books hal-01765245v1

The Practice of Enterprise Modeling

Estefanía Serral , Janis Stirna , Jolita Ralyté , Jānis Grabis
Springer International Publishing, LNBIP-432, 2021, Lecture Notes in Business Information Processing, 978-3-030-91278-9. ⟨10.1007/978-3-030-91279-6⟩
Books hal-04323866v1
Image document

The ‘Relay Ideation’ Technique: Moving from Problem Understanding to Problem Solving in the Design Process

Karin Slegers , Pieter Duysburgh , An Jacobs
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.651-658, ⟨10.1007/978-3-642-40498-6_57⟩
Conference papers hal-01510503v1
Image document

Testing a Selection of BPMN Tools for Their Support of Modelling Guidelines

Monique Snoeck , Isel De Oca , Tom Haegemans , Bjorn Scheldeman , Tom Hoste
8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.111-125, ⟨10.1007/978-3-319-25897-3_8⟩
Conference papers hal-01442301v1
Image document

Subobject Transactional Memory

Marko Van Dooren , Dave Clarke
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.44-58, ⟨10.1007/978-3-642-30829-1_4⟩
Conference papers hal-01529600v1
Image document

Strong Customer Authentication in Online Payments Under GDPR and PSD2: A Case of Cumulative Application

Danaja Fabcic
15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.78-95, ⟨10.1007/978-3-030-72465-8_5⟩
Conference papers hal-03703763v1
Image document

Stress Out: Translating Real-World Stressors into Audio-Visual Stress Cues in VR for Police Training

Quynh Nguyen , Emma Jaspaert , Markus Murtinger , Helmut Schrom-Feiertag , Sebastian Egger-Lampl , et al.
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.551-561, ⟨10.1007/978-3-030-85616-8_32⟩
Conference papers hal-04196885v1
Image document

Serene: Self-Reliant Client-Side Protection against Session Fixation

Philippe De Ryck , Nick Nikiforakis , Lieven Desmet , Frank Piessens , Wouter Joosen
12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.59-72, ⟨10.1007/978-3-642-30823-9_5⟩
Conference papers hal-01527644v1
Image document

Secure Storage on Android with Context-Aware Access Control

Faysal Boukayoua , Jorn Lapon , Bart De Decker , Vincent Naessens
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.46-59, ⟨10.1007/978-3-662-44885-4_4⟩
Conference papers hal-01404184v1
Image document

Secure Resource Sharing for Embedded Protected Module Architectures

Jo Van Bulck , Job Noorman , Jan Tobias Mühlberg , Frank Piessens
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers hal-01442554v1
Image document

Secure Negotiation for Manual Authentication Protocols

Milica Milutinovic , Roel Peeters , Bart De Decker
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.214-221, ⟨10.1007/978-3-642-24712-5_20⟩
Conference papers hal-01596202v1
Image document

Secure Multi-Execution through Static Program Transformation

Gilles Barthe , Juan Manuel Crespo , Dominique Devriese , Frank Piessens , Exequiel Rivas
14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.186-202, ⟨10.1007/978-3-642-30793-5_12⟩
Conference papers hal-01528736v1
Image document

ROAC: A Role-Oriented Access Control Model

Nezar Nassr , Eric Steegmans
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.113-127, ⟨10.1007/978-3-642-30955-7_11⟩
Conference papers hal-01534310v1
Image document

Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders (Part 2)

Lies Van Cauter , Monique Snoeck , Joep Crompvoets
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.386-397, ⟨10.1007/978-3-319-25013-7_31⟩
Conference papers hal-01448056v1
Image document

Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders

Lies Van Cauter , Monique Snoeck , Joep Crompvoets
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.209-221, ⟨10.1007/978-3-319-22479-4_16⟩
Conference papers hal-01412272v1
Image document

Reciprocity in Rapid Ethnography

Pieter Duysburgh , Karin Slegers
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.292-299, ⟨10.1007/978-3-319-22668-2_23⟩
Conference papers hal-01599854v1
Image document

Recent Developments in Low-Level Software Security

Pieter Agten , Nick Nikiforakis , Raoul Strackx , Willem De Groef , Frank Piessens
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.1-16, ⟨10.1007/978-3-642-30955-7_1⟩
Conference papers hal-01534300v1
Image document

RAM: Rapid Alignment Method

Ruben A. Muijrers , Jasper Woudenberg , Lejla Batina
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.266-282, ⟨10.1007/978-3-642-27257-8_17⟩
Conference papers hal-01596293v1
Image document

Radon Transform-Based Secure Image Hashing

Dung Q. Nguyen , Li Weng , Bart Preneel
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.186-193, ⟨10.1007/978-3-642-24712-5_17⟩
Conference papers hal-01596211v1
Image document

Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions

Jo Vermeulen , Kris Luyten , Karin Coninx , Nicolai Marquardt , Jon Bird
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.264-281, ⟨10.1007/978-3-319-22723-8_22⟩
Conference papers hal-01610802v1
Image document

Privacy-Preserving Scheduling Mechanism for eHealth Systems

Milica Milutinovic , Vincent Naessens , Bart De Decker
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers hal-01540885v1
Image document

Privacy-Preserving Public Transport Ticketing System

Milica Milutinovic , Koen Decroix , Vincent Naessens , Bart De Decker
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.135-150, ⟨10.1007/978-3-319-20810-7_9⟩
Conference papers hal-01745821v1
Image document

Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System

Milica Milutinovic , Vincent Naessens , Bart De Decker
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.555-560, ⟨10.1007/978-3-642-30436-1_48⟩
Conference papers hal-01518223v1
Image document

Privacy-Friendly Checking of Remote Token Blacklists

Roel Peeters , Andreas Pashalidis
3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.18-33, ⟨10.1007/978-3-642-37282-7_3⟩
Conference papers hal-01470501v1
Image document

Privacy Preserving Mechanisms for a Pervasive eHealth System

Milica Milutinovic , Koen Decroix , Vincent Naessens , Bart De Decker
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.221-231, ⟨10.1007/978-3-642-31668-5_17⟩
Conference papers hal-01517608v1
Image document

Privacy by Design – The Case of Automated Border Control

Pagona Tsormpatzoudi , Diana Dimitrova , Jessica Schroers , Els Kindt
Jan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.139-152, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_10⟩
Book sections hal-01431568v1