Filter your results
- 89
- 5
- 89
- 5
- 94
- 5
- 2
- 5
- 3
- 13
- 3
- 8
- 10
- 8
- 8
- 15
- 7
- 5
- 7
- 94
- 13
- 6
- 6
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Entertainment Computing and Serious GamesSpringer International Publishing, LNCS-11863, 2019, Lecture Notes in Computer Science, 978-3-030-34643-0. ⟨10.1007/978-3-030-34644-7⟩
Books
hal-03652053v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Digital Twin – Integrating Cloud Services into Communication Protocols16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.283-292, ⟨10.1007/978-3-030-42250-9_27⟩
Conference papers
hal-04444761v1
|
||
|
Energy Implications in the Single-Vendor Single-Buyer Integrated Production Inventory Model19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.57-64, ⟨10.1007/978-3-642-40352-1_8⟩
Conference papers
hal-01472312v1
|
||
|
A Multistep Extrapolated S-Parameter Model for Arbitrary On-Chip Interconnect Structures17th International Conference on Very Large Scale Integration (VLSISOC), Oct 2009, Florianópolis, Brazil. pp.156-180, ⟨10.1007/978-3-642-23120-9_9⟩
Conference papers
hal-01569366v1
|
||
|
Modeling Non-deterministic C Code with Active Objects8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.213-227, ⟨10.1007/978-3-030-31517-7_15⟩
Conference papers
hal-03769132v1
|
||
|
Evaluation of the Offensive Approach in Information Security Education25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.203-214, ⟨10.1007/978-3-642-15257-3_18⟩
Conference papers
hal-01054517v1
|
||
|
Usable Privacy for Mobile Sensing Applications8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.92-107, ⟨10.1007/978-3-662-43826-8_7⟩
Conference papers
hal-01400922v1
|
||
|
Slow TCAM Exhaustion DDoS Attack32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.17-31, ⟨10.1007/978-3-319-58469-0_2⟩
Conference papers
hal-01649013v1
|
||
|
Towards Distributed Reactive Programming15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.226-235, ⟨10.1007/978-3-642-38493-6_16⟩
Conference papers
hal-01486029v1
|
||
|
Enforcing Usage Constraints on Credentials for Web Applications30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.112-125, ⟨10.1007/978-3-319-18467-8_8⟩
Conference papers
hal-01345100v1
|
||
|
Hardware and Software Implementations of Prim’s Algorithm for Efficient Minimum Spanning Tree Computation4th International Embedded Systems Symposium (IESS), Jun 2013, Paderborn, Germany. pp.151-158, ⟨10.1007/978-3-642-38853-8_14⟩
Conference papers
hal-01466669v1
|
||
|
Detecting Computer Worms in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers
hal-01481505v1
|
||
|
May-Happen-in-Parallel Based Deadlock Analysis for Concurrent Objects15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.273-288, ⟨10.1007/978-3-642-38592-6_19⟩
Conference papers
hal-01515247v1
|
||
|
Teaching Phishing-Security: Which Way is Best?31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.135-149, ⟨10.1007/978-3-319-33630-5_10⟩
Conference papers
hal-01369549v1
|
||
|
Hybrid Learning Factories for Lean Education: Approach and Morphology for Competency-Oriented Design of Suitable Virtual Reality Learning Environments7th European Lean Educator Conference (ELEC), Oct 2021, Trondheim, Norway. pp.60-67, ⟨10.1007/978-3-030-92934-3_7⟩
Conference papers
hal-03771939v1
|
||
|
Software CompositionSpringer, LNCS-8088, 2013, Lecture Notes in Computer Science, 978-3-642-39613-7. ⟨10.1007/978-3-642-39614-4⟩
Books
hal-01492781v1
|
||
|
VLSI-SoC: An Enduring Tradition25th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2017, Abu Dhabi, United Arab Emirates. pp.240-255, ⟨10.1007/978-3-030-15663-3_12⟩
Conference papers
hal-02319785v1
|
||
|
Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime FunctionInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.250-256, ⟨10.1007/978-3-319-10975-6_19⟩
Conference papers
hal-01404000v1
|
||
|
Future Trends in Game Authoring Tools11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.536-541, ⟨10.1007/978-3-642-33542-6_70⟩
Conference papers
hal-01556141v1
|
||
|
Attribute-Based Encryption with Break-Glass4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers
hal-01056083v1
|
||
|
Motion-Structural Analysis of Systems Using Digital Twins16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.243-249, ⟨10.1007/978-3-030-42250-9_23⟩
Conference papers
hal-04444750v1
|
||
|
ICT Systems Security and Privacy ProtectionSpringer, AICT-471, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-33629-9. ⟨10.1007/978-3-319-33630-5⟩
Books
hal-01369602v1
|
||
|
Towards a Framework for Benchmarking Privacy-ABC Technologies29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.197-204, ⟨10.1007/978-3-642-55415-5_16⟩
Conference papers
hal-01370365v1
|
||
|
HardIDX: Practical and Secure Index with SGX31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.386-408, ⟨10.1007/978-3-319-61176-1_22⟩
Conference papers
hal-01684366v1
|
||
|
Robust Hash Algorithms for Text14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers
hal-01492815v1
|
||
|
Formal Techniques for Distributed Objects, Components, and SystemsSpringer International Publishing, LNCS-12719, 2021, Lecture Notes in Computer Science, 978-3-030-78088-3. ⟨10.1007/978-3-030-78089-0⟩
Books
hal-03740268v1
|
||
|
Virtual Validation of Automotive Measurement Services Based on JT (ISO 14306:2012)12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.505-515, ⟨10.1007/978-3-319-33111-9_46⟩
Conference papers
hal-01377477v1
|
||
|
On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.86-101, ⟨10.1007/978-3-642-14282-6_7⟩
Conference papers
hal-00687179v1
|
||
|
Optimal Parameters for XMSSMT1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers
hal-01506577v1
|