Search - IFIP Open Digital Library Access content directly

Filter your results

94 results
Structure: Internal structure identifier : 300723
Image document

Verification of Smart Contract Business Logic

Wolfgang Ahrendt , Richard Bubel , Joshua Ellul , Gordon J. Pace , Raúl Pardo , et al.
8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.228-243, ⟨10.1007/978-3-030-31517-7_16⟩
Conference papers hal-03769118v1
Image document

Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review

Hani Alzaid , Manal Alfaraj , Sebastian Ries , Audun Jøsang , Muneera Albabtain , et al.
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.66-82, ⟨10.1007/978-3-642-38323-6_5⟩
Conference papers hal-01468184v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Unsupervised Multi-sensor Anomaly Localization with Explainable AI

Mina Ameli , Viktor Pfanschilling , Anar Amirli , Wolfgang Maaß , Kristian Kersting
18th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2022, Hersonissos, Greece. pp.507-519, ⟨10.1007/978-3-031-08333-4_41⟩
Conference papers hal-04317155v1
Image document

A Multistep Extrapolated S-Parameter Model for Arbitrary On-Chip Interconnect Structures

Petru B. Bacinschi , Manfred Glesner
17th International Conference on Very Large Scale Integration (VLSISOC), Oct 2009, Florianópolis, Brazil. pp.156-180, ⟨10.1007/978-3-642-23120-9_9⟩
Conference papers hal-01569366v1
Image document

An Efficient Lattice-Based Secret Sharing Construction

Rachid El Bansarkhani , Mohammed Meziani
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.160-168, ⟨10.1007/978-3-642-30955-7_14⟩
Conference papers hal-01534304v1
Image document

Detecting Computer Worms in the Cloud

Sebastian Biedermann , Stefan Katzenbeisser
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers hal-01481505v1

Software Composition

Walter Binder , Eric Bodden , Welf Löwe
Springer, LNCS-8088, 2013, Lecture Notes in Computer Science, 978-3-642-39613-7. ⟨10.1007/978-3-642-39614-4⟩
Books hal-01492781v1
Image document

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

Wolfgang Boehmer
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers hal-01506570v1
Image document

Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function

Wolfgang Boehmer
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.250-256, ⟨10.1007/978-3-319-10975-6_19⟩
Conference papers hal-01404000v1
Image document

On Efficient Models for Model Checking Message-Passing Distributed Protocols

Péter Bokor , Marco Serafini , Neeraj Suri
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.216-223, ⟨10.1007/978-3-642-13464-7_17⟩
Conference papers hal-01055152v1
Image document

HardIDX: Practical and Secure Index with SGX

Ferdinand Brasser , Florian Hahn , Florian Kerschbaum , Ahmad-Reza Sadeghi , Benny Fuhry , et al.
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.386-408, ⟨10.1007/978-3-319-61176-1_22⟩
Conference papers hal-01684366v1
Image document

Reducing the Time Required for Hashing Operations

Frank Breitinger , Kaloyan Petrov
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers hal-01460624v1
Image document

Using Approximate Matching to Reduce the Volume of Digital Data

Frank Breitinger , Christian Winter , York Yannikos , Tobias Fink , Michael Seefried
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.149-163, ⟨10.1007/978-3-662-44952-3_11⟩
Conference papers hal-01393769v1
Image document

Similarity Hashing Based on Levenshtein Distances

Frank Breitinger , Georg Ziroff , Steffen Lange , Harald Baier
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.133-147, ⟨10.1007/978-3-662-44952-3_10⟩
Conference papers hal-01393767v1
Image document

Attribute-Based Encryption with Break-Glass

Achim D. Brucker , Helmut Petritsch , Stefan G. Weber
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers hal-01056083v1
Image document

Twin Clouds: Secure Cloud Computing with Low Latency

Sven Bugiel , Stefan Nürnberger , Ahmad-Reza Sadeghi , Thomas Schneider
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.32-44, ⟨10.1007/978-3-642-24712-5_3⟩
Conference papers hal-01596191v1
Image document

Learn to Spot Phishing URLs with the Android NoPhish App

Gamze Canova , Melanie Volkamer , Clemens Bergmann , Roland Borza , Benjamin Reinheimer , et al.
9th IFIP World Conference on Information Security Education (WISE), May 2015, Hamburg, Germany. pp.87-100, ⟨10.1007/978-3-319-18500-2_8⟩
Conference papers hal-01334293v1
Image document

Effects of End-to-end Latency on User Experience and Performance in Immersive Virtual Reality Applications

Polona Caserman , Michelle Martinussen , Stefan Göbel
1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.57-69, ⟨10.1007/978-3-030-34644-7_5⟩
Conference papers hal-03652010v1
Image document

Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications

Delphine Christin , Pablo Sánchez López , Andreas Reinhardt , Matthias Hollick , Michaela Kauer
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.71-86, ⟨10.1007/978-3-642-30955-7_8⟩
Conference papers hal-01534318v1
Image document

Usable Privacy for Mobile Sensing Applications

Delphine Christin , Franziska Engelmann , Matthias Hollick
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.92-107, ⟨10.1007/978-3-662-43826-8_7⟩
Conference papers hal-01400922v1
Image document

On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network

Leucio Antonio Cutillo , Refik Molva , Thorsten Strufe
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.86-101, ⟨10.1007/978-3-642-14282-6_7⟩
Conference papers hal-00687179v1
Image document

An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior

Yuri Gil Dantas , Richard Gay , Tobias Hamann , Heiko Mantel , Johannes Schickel
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.323-338, ⟨10.1007/978-3-319-99828-2_23⟩
Conference papers hal-02023728v1
Image document

Sequencing Through a Global Decision Instance Based on a Neural Network

Thomas Dasbach , Johannes Olbort , Felix Wenk , Reiner Ander
18th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2021, Curitiba, Brazil. pp.334-344, ⟨10.1007/978-3-030-94335-6_24⟩
Conference papers hal-04186143v1
Image document

Digital Twin – Integrating Cloud Services into Communication Protocols

Thomas Dasbach , Eduardo De Zancul , Klaus Schützer , Reiner Anderl
16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.283-292, ⟨10.1007/978-3-030-42250-9_27⟩
Conference papers hal-04444761v1
Image document

Exploit Generation for Information Flow Leaks in Object-Oriented Programs

Quoc Huy Do , Richard Bubel , Reiner Hähnle
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.401-415, ⟨10.1007/978-3-319-18467-8_27⟩
Conference papers hal-01345131v1
Image document

Integrated Component Data Model Based on UML for Smart Components Lifecycle Management: A Conceptual Approach

Luiz S. Durão , Helge Eichhorn , Reiner Anderl , Klaus Schützer , Eduardo De Senzi Zancul
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.13-22, ⟨10.1007/978-3-319-33111-9_2⟩
Conference papers hal-01377424v1
Image document

Digital Twin Requirements in the Context of Industry 4.0

Luiz Durão , Sebastian Haag , Reiner Anderl , Klaus Schützer , Eduardo Zancul
15th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2018, Turin, Italy. pp.204-214, ⟨10.1007/978-3-030-01614-2_19⟩
Conference papers hal-02075585v1
Image document

Development of a Smart Assembly Data Model

Luiz Durão , Sebastian Haag , Reiner Anderl , Klaus Schützer , Eduardo Zancul
14th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2017, Seville, Spain. pp.655-666, ⟨10.1007/978-3-319-72905-3_58⟩
Conference papers hal-01764193v1
Image document

Virtual Validation of Automotive Measurement Services Based on JT (ISO 14306:2012)

Andreas Faath , Alexander Christ , Reiner Anderl , Frank Braunroth
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.505-515, ⟨10.1007/978-3-319-33111-9_46⟩
Conference papers hal-01377477v1