Search - IFIP Open Digital Library Access content directly

Filter your results

10 results
Structure: Internal structure identifier : 300723
publicationDateY_i : 2016

Trust Management X

Sheikh Mahbub Habib , Julita Vassileva , Sjouke Mauw , Max Mühlhäuser
Springer, AICT-473, 2016, Trust Management X, 978-3-319-41353-2. ⟨10.1007/978-3-319-41354-9⟩
Books hal-01438367v1
Image document

TORPEDO: TOoltip-poweRed Phishing Email DetectiOn

Melanie Volkamer , Karen Renaud , Benjamin Reinheimer
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.161-175, ⟨10.1007/978-3-319-33630-5_12⟩
Conference papers hal-01369551v1
Image document

Coercion-Resistant Proxy Voting

Oksana Kulyk , Stephan Neumann , Karola Marky , Jurlind Budurushi , Melanie Volkamer
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.3-16, ⟨10.1007/978-3-319-33630-5_1⟩
Conference papers hal-01369533v1
Image document

Integrated Smart Energy System Based on Production-Oriented Consumption

Ivan Popov , Alexander Krylatov , Victor Zakharov
17th Working Conference on Virtual Enterprises (PRO-VE), Oct 2016, Porto, Portugal. pp.265-273, ⟨10.1007/978-3-319-45390-3_23⟩
Conference papers hal-01614581v1
Image document

A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds

Björn Richerzhagen , Alexander Wagener , Nils Richerzhagen , Rhaban Hark , Ralf Steinmetz
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.16-29, ⟨10.1007/978-3-319-39814-3_2⟩
Conference papers hal-01632731v1
Image document

Securing Transactions with the eIDAS Protocols

Frank Morgner , Paul Bastian , Marc Fischlin
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.3-18, ⟨10.1007/978-3-319-45931-8_1⟩
Conference papers hal-01639614v1
Image document

Teaching Phishing-Security: Which Way is Best?

Simon Stockhardt , Benjamin Reinheimer , Melanie Volkamer , Peter Mayer , Alexandra Kunz , et al.
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.135-149, ⟨10.1007/978-3-319-33630-5_10⟩
Conference papers hal-01369549v1

ICT Systems Security and Privacy Protection

Jaap-Henk Hoepman , Stefan Katzenbeisser
Springer, AICT-471, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-33629-9. ⟨10.1007/978-3-319-33630-5⟩
Books hal-01369602v1
Image document

Virtual Validation of Automotive Measurement Services Based on JT (ISO 14306:2012)

Andreas Faath , Alexander Christ , Reiner Anderl , Frank Braunroth
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.505-515, ⟨10.1007/978-3-319-33111-9_46⟩
Conference papers hal-01377477v1
Image document

Integrated Component Data Model Based on UML for Smart Components Lifecycle Management: A Conceptual Approach

Luiz S. Durão , Helge Eichhorn , Reiner Anderl , Klaus Schützer , Eduardo De Senzi Zancul
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.13-22, ⟨10.1007/978-3-319-33111-9_2⟩
Conference papers hal-01377424v1