Search - IFIP Open Digital Library Access content directly

Filter your results

94 results
Structure: Internal structure identifier : 300723

Entertainment Computing and Serious Games

Erik Spek , Stefan Göbel , Ellen Yi-Luen Do , Esteban Clua , Jannicke Baalsrud Hauge
Springer International Publishing, LNCS-11863, 2019, Lecture Notes in Computer Science, 978-3-030-34643-0. ⟨10.1007/978-3-030-34644-7⟩
Books hal-03652053v1
Image document

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Ulrich Rührmair , Stefan Katzenbeisser , Martin Steinebach , Sascha Zmudzinski
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers hal-01056366v1
Image document

Digital Twin – Integrating Cloud Services into Communication Protocols

Thomas Dasbach , Eduardo De Zancul , Klaus Schützer , Reiner Anderl
16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.283-292, ⟨10.1007/978-3-030-42250-9_27⟩
Conference papers hal-04444761v1
Image document

Energy Implications in the Single-Vendor Single-Buyer Integrated Production Inventory Model

Simone Zanoni , Laura Bettoni , Christoph H. Glock
19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.57-64, ⟨10.1007/978-3-642-40352-1_8⟩
Conference papers hal-01472312v1
Image document

A Multistep Extrapolated S-Parameter Model for Arbitrary On-Chip Interconnect Structures

Petru B. Bacinschi , Manfred Glesner
17th International Conference on Very Large Scale Integration (VLSISOC), Oct 2009, Florianópolis, Brazil. pp.156-180, ⟨10.1007/978-3-642-23120-9_9⟩
Conference papers hal-01569366v1
Image document

Modeling Non-deterministic C Code with Active Objects

Nathan Wasser , Asmae Heydari Tabar , Reiner Hahnle
8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.213-227, ⟨10.1007/978-3-030-31517-7_15⟩
Conference papers hal-03769132v1
Image document

Evaluation of the Offensive Approach in Information Security Education

Martin Mink , Rainer Greifeneder
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.203-214, ⟨10.1007/978-3-642-15257-3_18⟩
Conference papers hal-01054517v1
Image document

Usable Privacy for Mobile Sensing Applications

Delphine Christin , Franziska Engelmann , Matthias Hollick
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.92-107, ⟨10.1007/978-3-662-43826-8_7⟩
Conference papers hal-01400922v1
Image document

Slow TCAM Exhaustion DDoS Attack

Túlio A. Pascoal , Yuri G. Dantas , Iguatemi E. Fonseca , Vivek Nigam
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.17-31, ⟨10.1007/978-3-319-58469-0_2⟩
Conference papers hal-01649013v1
Image document

Towards Distributed Reactive Programming

Guido Salvaneschi , Joscha Drechsler , Mira Mezini
15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.226-235, ⟨10.1007/978-3-642-38493-6_16⟩
Conference papers hal-01486029v1
Image document

Enforcing Usage Constraints on Credentials for Web Applications

Jinwei Hu , Heiko Mantel , Sebastian Ruhleder
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.112-125, ⟨10.1007/978-3-319-18467-8_8⟩
Conference papers hal-01345100v1
Image document

Hardware and Software Implementations of Prim’s Algorithm for Efficient Minimum Spanning Tree Computation

Artur Mariano , Dongwook Lee , Andreas Gerstlauer , Derek Chiou
4th International Embedded Systems Symposium (IESS), Jun 2013, Paderborn, Germany. pp.151-158, ⟨10.1007/978-3-642-38853-8_14⟩
Conference papers hal-01466669v1
Image document

Detecting Computer Worms in the Cloud

Sebastian Biedermann , Stefan Katzenbeisser
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers hal-01481505v1
Image document

May-Happen-in-Parallel Based Deadlock Analysis for Concurrent Objects

Antonio E. Flores-Montoya , Elvira Albert , Samir Genaim
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.273-288, ⟨10.1007/978-3-642-38592-6_19⟩
Conference papers hal-01515247v1
Image document

Teaching Phishing-Security: Which Way is Best?

Simon Stockhardt , Benjamin Reinheimer , Melanie Volkamer , Peter Mayer , Alexandra Kunz , et al.
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.135-149, ⟨10.1007/978-3-319-33630-5_10⟩
Conference papers hal-01369549v1
Image document

Hybrid Learning Factories for Lean Education: Approach and Morphology for Competency-Oriented Design of Suitable Virtual Reality Learning Environments

Thomas Riemann , Antonio Kreß , Liane Klassen , Joachim Metternich
7th European Lean Educator Conference (ELEC), Oct 2021, Trondheim, Norway. pp.60-67, ⟨10.1007/978-3-030-92934-3_7⟩
Conference papers hal-03771939v1

Software Composition

Walter Binder , Eric Bodden , Welf Löwe
Springer, LNCS-8088, 2013, Lecture Notes in Computer Science, 978-3-642-39613-7. ⟨10.1007/978-3-642-39614-4⟩
Books hal-01492781v1
Image document

VLSI-SoC: An Enduring Tradition

Ricardo Reis , Manfred Glesner
25th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2017, Abu Dhabi, United Arab Emirates. pp.240-255, ⟨10.1007/978-3-030-15663-3_12⟩
Conference papers hal-02319785v1
Image document

Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function

Wolfgang Boehmer
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.250-256, ⟨10.1007/978-3-319-10975-6_19⟩
Conference papers hal-01404000v1
Image document

Future Trends in Game Authoring Tools

Florian Mehm , Christian Reuter , Stefan Göbel , Ralf Steinmetz
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.536-541, ⟨10.1007/978-3-642-33542-6_70⟩
Conference papers hal-01556141v1
Image document

Attribute-Based Encryption with Break-Glass

Achim D. Brucker , Helmut Petritsch , Stefan G. Weber
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers hal-01056083v1
Image document

Motion-Structural Analysis of Systems Using Digital Twins

Sebastian Haag , Reiner Anderl , Klaus Schützer , Eduardo Zancul
16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.243-249, ⟨10.1007/978-3-030-42250-9_23⟩
Conference papers hal-04444750v1

ICT Systems Security and Privacy Protection

Jaap-Henk Hoepman , Stefan Katzenbeisser
Springer, AICT-471, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-33629-9. ⟨10.1007/978-3-319-33630-5⟩
Books hal-01369602v1
Image document

Towards a Framework for Benchmarking Privacy-ABC Technologies

Fatbardh Veseli , Tsvetoslava Vateva-Gurova , Ioannis Krontiris , Kai Rannenberg , Neeraj Suri
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.197-204, ⟨10.1007/978-3-642-55415-5_16⟩
Conference papers hal-01370365v1
Image document

HardIDX: Practical and Secure Index with SGX

Ferdinand Brasser , Florian Hahn , Florian Kerschbaum , Ahmad-Reza Sadeghi , Benny Fuhry , et al.
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.386-408, ⟨10.1007/978-3-319-61176-1_22⟩
Conference papers hal-01684366v1
Image document

Robust Hash Algorithms for Text

Martin Steinebach , Peter Klöckner , Nils Reimers , Dominik Wienand , Patrick Wolf
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers hal-01492815v1

Formal Techniques for Distributed Objects, Components, and Systems

Kirstin Peters , Tim A.C. Willemse
Springer International Publishing, LNCS-12719, 2021, Lecture Notes in Computer Science, 978-3-030-78088-3. ⟨10.1007/978-3-030-78089-0⟩
Books hal-03740268v1
Image document

Virtual Validation of Automotive Measurement Services Based on JT (ISO 14306:2012)

Andreas Faath , Alexander Christ , Reiner Anderl , Frank Braunroth
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.505-515, ⟨10.1007/978-3-319-33111-9_46⟩
Conference papers hal-01377477v1
Image document

On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network

Leucio Antonio Cutillo , Refik Molva , Thorsten Strufe
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.86-101, ⟨10.1007/978-3-642-14282-6_7⟩
Conference papers hal-00687179v1
Image document

Optimal Parameters for XMSSMT

Andreas Hülsing , Lea Rausch , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers hal-01506577v1