Search - IFIP Open Digital Library Access content directly

Filter your results

94 results
Structure: Internal structure identifier : 300723
Image document

A Lifting-Based Discrete Wavelet Transform and Discrete Wavelet Packet Processor with Support for Higher Order Wavelet Filters

Andre Guntoro , Manfred Glesner
19th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), Oct 2008, Rhodes Island, India. pp.154-173, ⟨10.1007/978-3-642-12267-5_9⟩
Conference papers hal-01054539v1
Image document

A Smart Card Implementation of the McEliece PKC

Falko Strenzke
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers hal-01056067v1
Image document

On Efficient Models for Model Checking Message-Passing Distributed Protocols

Péter Bokor , Marco Serafini , Neeraj Suri
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.216-223, ⟨10.1007/978-3-642-13464-7_17⟩
Conference papers hal-01055152v1
Image document

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Ulrich Rührmair , Stefan Katzenbeisser , Martin Steinebach , Sascha Zmudzinski
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers hal-01056366v1
Image document

Evaluation of the Offensive Approach in Information Security Education

Martin Mink , Rainer Greifeneder
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.203-214, ⟨10.1007/978-3-642-15257-3_18⟩
Conference papers hal-01054517v1
Image document

Attribute-Based Encryption with Break-Glass

Achim D. Brucker , Helmut Petritsch , Stefan G. Weber
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers hal-01056083v1
Image document

On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network

Leucio Antonio Cutillo , Refik Molva , Thorsten Strufe
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.86-101, ⟨10.1007/978-3-642-14282-6_7⟩
Conference papers hal-00687179v1
Image document

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

Mark Manulis , Bertram Poettering
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers hal-01573294v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Extending LSCs for Behavioral Signature Modeling

Sven Patzina , Lars Patzina , Andy Schürr
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.293-304, ⟨10.1007/978-3-642-21424-0_24⟩
Conference papers hal-01567608v1
Image document

Twin Clouds: Secure Cloud Computing with Low Latency

Sven Bugiel , Stefan Nürnberger , Ahmad-Reza Sadeghi , Thomas Schneider
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.32-44, ⟨10.1007/978-3-642-24712-5_3⟩
Conference papers hal-01596191v1
Image document

A Multistep Extrapolated S-Parameter Model for Arbitrary On-Chip Interconnect Structures

Petru B. Bacinschi , Manfred Glesner
17th International Conference on Very Large Scale Integration (VLSISOC), Oct 2009, Florianópolis, Brazil. pp.156-180, ⟨10.1007/978-3-642-23120-9_9⟩
Conference papers hal-01569366v1
Image document

Integrating Indicators of Trustworthiness into Reputation-Based Trust Models

Sascha Hauke , Florian Volk , Sheikh Mahbub Habib , Max Mühlhäuser
6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.158-173, ⟨10.1007/978-3-642-29852-3_11⟩
Conference papers hal-01517646v1
Image document

An Efficient Lattice-Based Secret Sharing Construction

Rachid El Bansarkhani , Mohammed Meziani
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.160-168, ⟨10.1007/978-3-642-30955-7_14⟩
Conference papers hal-01534304v1
Image document

Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions

Julius Rückert , David Hausheer
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.38-41, ⟨10.1007/978-3-642-30633-4_5⟩
Conference papers hal-01529798v1
Image document

Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications

Delphine Christin , Pablo Sánchez López , Andreas Reinhardt , Matthias Hollick , Michaela Kauer
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.71-86, ⟨10.1007/978-3-642-30955-7_8⟩
Conference papers hal-01534318v1
Image document

Quality Adaptation in P2P Video Streaming Based on Objective QoE Metrics

Julius Rückert , Osama Abboud , Thomas Zinner , Ralf Steinmetz , David Hausheer
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.1-14, ⟨10.1007/978-3-642-30054-7_1⟩
Conference papers hal-01531951v1
Image document

Detecting Computer Worms in the Cloud

Sebastian Biedermann , Stefan Katzenbeisser
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers hal-01481505v1
Image document

Future Trends in Game Authoring Tools

Florian Mehm , Christian Reuter , Stefan Göbel , Ralf Steinmetz
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.536-541, ⟨10.1007/978-3-642-33542-6_70⟩
Conference papers hal-01556141v1
Image document

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

Wolfgang Boehmer
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers hal-01506570v1
Image document

Modeling the German Legal Latitude Principles

Stephan Neumann , Anna Kahlert , Maria Henning , Philipp Richter , Hugo Jonker , et al.
5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers hal-01491259v1
Image document

Reducing the Time Required for Hashing Operations

Frank Breitinger , Kaloyan Petrov
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers hal-01460624v1
Image document

Towards a Mobility-Supporting Incentive Scheme for Peer-to-Peer Content Distribution

Matthias Wichtlhuber , David Hausheer
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.88-91, ⟨10.1007/978-3-642-38998-6_11⟩
Conference papers hal-01489957v1
Image document

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

Xuyun Nie , Albrecht Petzoldt , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers hal-01506559v1
Image document

Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review

Hani Alzaid , Manal Alfaraj , Sebastian Ries , Audun Jøsang , Muneera Albabtain , et al.
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.66-82, ⟨10.1007/978-3-642-38323-6_5⟩
Conference papers hal-01468184v1
Image document

Towards an Adaptive Publish/Subscribe Approach Supporting Transitions

Björn Richerzhagen , Ralf Steinmetz
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.84-87, ⟨10.1007/978-3-642-38998-6_10⟩
Conference papers hal-01489956v1
Image document

Energy Implications in the Single-Vendor Single-Buyer Integrated Production Inventory Model

Simone Zanoni , Laura Bettoni , Christoph H. Glock
19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.57-64, ⟨10.1007/978-3-642-40352-1_8⟩
Conference papers hal-01472312v1
Image document

Towards Distributed Reactive Programming

Guido Salvaneschi , Joscha Drechsler , Mira Mezini
15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.226-235, ⟨10.1007/978-3-642-38493-6_16⟩
Conference papers hal-01486029v1
Image document

Hardware and Software Implementations of Prim’s Algorithm for Efficient Minimum Spanning Tree Computation

Artur Mariano , Dongwook Lee , Andreas Gerstlauer , Derek Chiou
4th International Embedded Systems Symposium (IESS), Jun 2013, Paderborn, Germany. pp.151-158, ⟨10.1007/978-3-642-38853-8_14⟩
Conference papers hal-01466669v1
Image document

May-Happen-in-Parallel Based Deadlock Analysis for Concurrent Objects

Antonio E. Flores-Montoya , Elvira Albert , Samir Genaim
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.273-288, ⟨10.1007/978-3-642-38592-6_19⟩
Conference papers hal-01515247v1