Filter your results
- 89
- 5
- 89
- 5
- 94
- 5
- 2
- 5
- 3
- 13
- 3
- 8
- 10
- 8
- 8
- 15
- 7
- 5
- 7
- 94
- 13
- 6
- 6
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers
hal-01806063v1
|
||
|
A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.16-29, ⟨10.1007/978-3-319-39814-3_2⟩
Conference papers
hal-01632731v1
|
||
|
A Lifting-Based Discrete Wavelet Transform and Discrete Wavelet Packet Processor with Support for Higher Order Wavelet Filters19th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), Oct 2008, Rhodes Island, India. pp.154-173, ⟨10.1007/978-3-642-12267-5_9⟩
Conference papers
hal-01054539v1
|
||
|
A Multistep Extrapolated S-Parameter Model for Arbitrary On-Chip Interconnect Structures17th International Conference on Very Large Scale Integration (VLSISOC), Oct 2009, Florianópolis, Brazil. pp.156-180, ⟨10.1007/978-3-642-23120-9_9⟩
Conference papers
hal-01569366v1
|
||
|
A Novel Approach for Generating Synthetic Datasets for Digital Forensics16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.73-93, ⟨10.1007/978-3-030-56223-6_5⟩
Conference papers
hal-03657236v1
|
||
|
A Review, Focused on Data Transfer Standards, of the Uncertainty Representation in the Digital Twin Context16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.24-33, ⟨10.1007/978-3-030-42250-9_3⟩
Conference papers
hal-04444734v1
|
||
|
A Smart Card Implementation of the McEliece PKC4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers
hal-01056067v1
|
||
|
Adaptive User-Centered SecurityInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers
hal-01403988v1
|
||
|
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers
hal-01573294v1
|
||
|
An Efficient Lattice-Based Secret Sharing Construction6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.160-168, ⟨10.1007/978-3-642-30955-7_14⟩
Conference papers
hal-01534304v1
|
||
|
An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.323-338, ⟨10.1007/978-3-319-99828-2_23⟩
Conference papers
hal-02023728v1
|
||
|
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.513-527, ⟨10.1007/978-3-319-18467-8_34⟩
Conference papers
hal-01345142v1
|
||
|
Attribute-Based Encryption with Break-Glass4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers
hal-01056083v1
|
||
|
Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.38-41, ⟨10.1007/978-3-642-30633-4_5⟩
Conference papers
hal-01529798v1
|
||
|
Can code polymorphism limit information leakage?5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers
hal-01110259v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
Coercion-Resistant Proxy Voting31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.3-16, ⟨10.1007/978-3-319-33630-5_1⟩
Conference papers
hal-01369533v1
|
||
|
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.519-538, ⟨10.1007/978-3-030-29381-9_32⟩
Conference papers
hal-02544556v1
|
||
|
Comparison of cyber attacks on services in the clearnet and darknet17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.39-61, ⟨10.1007/978-3-030-88381-2_3⟩
Conference papers
hal-03764381v1
|
||
|
Constructing Constraint-Preserving Interaction Schemes in Adhesive Categories24th International Workshop on Algebraic Development Techniques (WADT), Jul 2018, Egham, United Kingdom. pp.139-153, ⟨10.1007/978-3-030-23220-7_8⟩
Conference papers
hal-02364576v1
|
||
|
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers
hal-01506559v1
|
||
|
Detecting Computer Worms in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers
hal-01481505v1
|
||
|
Development of a Smart Assembly Data Model14th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2017, Seville, Spain. pp.655-666, ⟨10.1007/978-3-319-72905-3_58⟩
Conference papers
hal-01764193v1
|
||
|
Development of a Valuation Method for IoT-Platforms16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.293-301, ⟨10.1007/978-3-030-42250-9_28⟩
Conference papers
hal-04444741v1
|
||
|
Digital Twin – Integrating Cloud Services into Communication Protocols16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.283-292, ⟨10.1007/978-3-030-42250-9_27⟩
Conference papers
hal-04444761v1
|
||
|
Digital Twin Requirements in the Context of Industry 4.015th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2018, Turin, Italy. pp.204-214, ⟨10.1007/978-3-030-01614-2_19⟩
Conference papers
hal-02075585v1
|
||
|
Effects of End-to-end Latency on User Experience and Performance in Immersive Virtual Reality Applications1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.57-69, ⟨10.1007/978-3-030-34644-7_5⟩
Conference papers
hal-03652010v1
|
||
|
Election-Dependent Security Evaluation of Internet Voting Schemes32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.371-382, ⟨10.1007/978-3-319-58469-0_25⟩
Conference papers
hal-01648992v1
|
||
|
Energy Implications in the Single-Vendor Single-Buyer Integrated Production Inventory Model19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.57-64, ⟨10.1007/978-3-642-40352-1_8⟩
Conference papers
hal-01472312v1
|
||
|
Enforcing Usage Constraints on Credentials for Web Applications30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.112-125, ⟨10.1007/978-3-319-18467-8_8⟩
Conference papers
hal-01345100v1
|