Filter your results
- 89
- 5
- 89
- 5
- 94
- 5
- 2
- 5
- 3
- 13
- 3
- 8
- 10
- 8
- 8
- 15
- 7
- 5
- 7
- 94
- 13
- 6
- 6
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
A Lifting-Based Discrete Wavelet Transform and Discrete Wavelet Packet Processor with Support for Higher Order Wavelet Filters19th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), Oct 2008, Rhodes Island, India. pp.154-173, ⟨10.1007/978-3-642-12267-5_9⟩
Conference papers
hal-01054539v1
|
||
|
A Smart Card Implementation of the McEliece PKC4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers
hal-01056067v1
|
||
|
On Efficient Models for Model Checking Message-Passing Distributed ProtocolsJoint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.216-223, ⟨10.1007/978-3-642-13464-7_17⟩
Conference papers
hal-01055152v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Evaluation of the Offensive Approach in Information Security Education25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.203-214, ⟨10.1007/978-3-642-15257-3_18⟩
Conference papers
hal-01054517v1
|
||
|
Attribute-Based Encryption with Break-Glass4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers
hal-01056083v1
|
||
|
On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.86-101, ⟨10.1007/978-3-642-14282-6_7⟩
Conference papers
hal-00687179v1
|
||
|
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers
hal-01573294v1
|
||
|
Can code polymorphism limit information leakage?5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers
hal-01110259v1
|
||
|
Extending LSCs for Behavioral Signature Modeling26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.293-304, ⟨10.1007/978-3-642-21424-0_24⟩
Conference papers
hal-01567608v1
|
||
|
Twin Clouds: Secure Cloud Computing with Low Latency12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.32-44, ⟨10.1007/978-3-642-24712-5_3⟩
Conference papers
hal-01596191v1
|
||
|
A Multistep Extrapolated S-Parameter Model for Arbitrary On-Chip Interconnect Structures17th International Conference on Very Large Scale Integration (VLSISOC), Oct 2009, Florianópolis, Brazil. pp.156-180, ⟨10.1007/978-3-642-23120-9_9⟩
Conference papers
hal-01569366v1
|
||
|
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.158-173, ⟨10.1007/978-3-642-29852-3_11⟩
Conference papers
hal-01517646v1
|
||
|
An Efficient Lattice-Based Secret Sharing Construction6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.160-168, ⟨10.1007/978-3-642-30955-7_14⟩
Conference papers
hal-01534304v1
|
||
|
Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.38-41, ⟨10.1007/978-3-642-30633-4_5⟩
Conference papers
hal-01529798v1
|
||
|
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.71-86, ⟨10.1007/978-3-642-30955-7_8⟩
Conference papers
hal-01534318v1
|
||
|
Quality Adaptation in P2P Video Streaming Based on Objective QoE Metrics11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.1-14, ⟨10.1007/978-3-642-30054-7_1⟩
Conference papers
hal-01531951v1
|
||
|
Detecting Computer Worms in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers
hal-01481505v1
|
||
|
Future Trends in Game Authoring Tools11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.536-541, ⟨10.1007/978-3-642-33542-6_70⟩
Conference papers
hal-01556141v1
|
||
|
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers
hal-01506570v1
|
||
|
Modeling the German Legal Latitude Principles5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers
hal-01491259v1
|
||
|
Reducing the Time Required for Hashing Operations9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers
hal-01460624v1
|
||
|
Towards a Mobility-Supporting Incentive Scheme for Peer-to-Peer Content Distribution7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.88-91, ⟨10.1007/978-3-642-38998-6_11⟩
Conference papers
hal-01489957v1
|
||
|
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers
hal-01506559v1
|
||
|
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.66-82, ⟨10.1007/978-3-642-38323-6_5⟩
Conference papers
hal-01468184v1
|
||
|
Towards an Adaptive Publish/Subscribe Approach Supporting Transitions7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.84-87, ⟨10.1007/978-3-642-38998-6_10⟩
Conference papers
hal-01489956v1
|
||
|
Energy Implications in the Single-Vendor Single-Buyer Integrated Production Inventory Model19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.57-64, ⟨10.1007/978-3-642-40352-1_8⟩
Conference papers
hal-01472312v1
|
||
|
Towards Distributed Reactive Programming15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.226-235, ⟨10.1007/978-3-642-38493-6_16⟩
Conference papers
hal-01486029v1
|
||
|
Hardware and Software Implementations of Prim’s Algorithm for Efficient Minimum Spanning Tree Computation4th International Embedded Systems Symposium (IESS), Jun 2013, Paderborn, Germany. pp.151-158, ⟨10.1007/978-3-642-38853-8_14⟩
Conference papers
hal-01466669v1
|
||
|
May-Happen-in-Parallel Based Deadlock Analysis for Concurrent Objects15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.273-288, ⟨10.1007/978-3-642-38592-6_19⟩
Conference papers
hal-01515247v1
|