Search - IFIP Open Digital Library Access content directly

Filter your results

94 results
Structure: Internal structure identifier : 300723
Image document

A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts

Bruno Rodrigues , Thomas Bocek , Andri Lareida , David Hausheer , Sina Rafati , et al.
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers hal-01806063v1
Image document

A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds

Björn Richerzhagen , Alexander Wagener , Nils Richerzhagen , Rhaban Hark , Ralf Steinmetz
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.16-29, ⟨10.1007/978-3-319-39814-3_2⟩
Conference papers hal-01632731v1
Image document

A Lifting-Based Discrete Wavelet Transform and Discrete Wavelet Packet Processor with Support for Higher Order Wavelet Filters

Andre Guntoro , Manfred Glesner
19th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), Oct 2008, Rhodes Island, India. pp.154-173, ⟨10.1007/978-3-642-12267-5_9⟩
Conference papers hal-01054539v1
Image document

A Multistep Extrapolated S-Parameter Model for Arbitrary On-Chip Interconnect Structures

Petru B. Bacinschi , Manfred Glesner
17th International Conference on Very Large Scale Integration (VLSISOC), Oct 2009, Florianópolis, Brazil. pp.156-180, ⟨10.1007/978-3-642-23120-9_9⟩
Conference papers hal-01569366v1
Image document

A Novel Approach for Generating Synthetic Datasets for Digital Forensics

Thomas Göbel , Thomas Schäfer , Julien Hachenberger , Jan Türr , Harald Baier
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.73-93, ⟨10.1007/978-3-030-56223-6_5⟩
Conference papers hal-03657236v1
Image document

A Review, Focused on Data Transfer Standards, of the Uncertainty Representation in the Digital Twin Context

José Ríos , Georg Staudter , Moritz Weber , Reiner Anderl
16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.24-33, ⟨10.1007/978-3-030-42250-9_3⟩
Conference papers hal-04444734v1
Image document

A Smart Card Implementation of the McEliece PKC

Falko Strenzke
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers hal-01056067v1
Image document

Adaptive User-Centered Security

Sven Wohlgemuth
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers hal-01403988v1
Image document

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

Mark Manulis , Bertram Poettering
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers hal-01573294v1
Image document

An Efficient Lattice-Based Secret Sharing Construction

Rachid El Bansarkhani , Mohammed Meziani
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.160-168, ⟨10.1007/978-3-642-30955-7_14⟩
Conference papers hal-01534304v1
Image document

An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior

Yuri Gil Dantas , Richard Gay , Tobias Hamann , Heiko Mantel , Johannes Schickel
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.323-338, ⟨10.1007/978-3-319-99828-2_23⟩
Conference papers hal-02023728v1
Image document

ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis

Li Li , Alexandre Bartel , Tegawendé F. Bissyandé , Jacques Klein , Yves Le Traon
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.513-527, ⟨10.1007/978-3-319-18467-8_34⟩
Conference papers hal-01345142v1
Image document

Attribute-Based Encryption with Break-Glass

Achim D. Brucker , Helmut Petritsch , Stefan G. Weber
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers hal-01056083v1
Image document

Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions

Julius Rückert , David Hausheer
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.38-41, ⟨10.1007/978-3-642-30633-4_5⟩
Conference papers hal-01529798v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

Coercion-Resistant Proxy Voting

Oksana Kulyk , Stephan Neumann , Karola Marky , Jurlind Budurushi , Melanie Volkamer
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.3-16, ⟨10.1007/978-3-319-33630-5_1⟩
Conference papers hal-01369533v1
Image document

Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations

Oksana Kulyk , Jan Henzel , Karen Renaud , Melanie Volkamer
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.519-538, ⟨10.1007/978-3-030-29381-9_32⟩
Conference papers hal-02544556v1
Image document

Comparison of cyber attacks on services in the clearnet and darknet

York Yannikos , Quang Anh Dang , Martin Steinebach
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.39-61, ⟨10.1007/978-3-030-88381-2_3⟩
Conference papers hal-03764381v1
Image document

Constructing Constraint-Preserving Interaction Schemes in Adhesive Categories

Jens Kosiol , Lars Fritsche , Nebras Nassar , Andy Schürr , Gabriele Taentzer
24th International Workshop on Algebraic Development Techniques (WADT), Jul 2018, Egham, United Kingdom. pp.139-153, ⟨10.1007/978-3-030-23220-7_8⟩
Conference papers hal-02364576v1
Image document

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

Xuyun Nie , Albrecht Petzoldt , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers hal-01506559v1
Image document

Detecting Computer Worms in the Cloud

Sebastian Biedermann , Stefan Katzenbeisser
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.43-54, ⟨10.1007/978-3-642-27585-2_4⟩
Conference papers hal-01481505v1
Image document

Development of a Smart Assembly Data Model

Luiz Durão , Sebastian Haag , Reiner Anderl , Klaus Schützer , Eduardo Zancul
14th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2017, Seville, Spain. pp.655-666, ⟨10.1007/978-3-319-72905-3_58⟩
Conference papers hal-01764193v1
Image document

Development of a Valuation Method for IoT-Platforms

Stefan Kugler , Cordula Czwick , Reiner Anderl
16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.293-301, ⟨10.1007/978-3-030-42250-9_28⟩
Conference papers hal-04444741v1
Image document

Digital Twin – Integrating Cloud Services into Communication Protocols

Thomas Dasbach , Eduardo De Zancul , Klaus Schützer , Reiner Anderl
16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.283-292, ⟨10.1007/978-3-030-42250-9_27⟩
Conference papers hal-04444761v1
Image document

Digital Twin Requirements in the Context of Industry 4.0

Luiz Durão , Sebastian Haag , Reiner Anderl , Klaus Schützer , Eduardo Zancul
15th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2018, Turin, Italy. pp.204-214, ⟨10.1007/978-3-030-01614-2_19⟩
Conference papers hal-02075585v1
Image document

Effects of End-to-end Latency on User Experience and Performance in Immersive Virtual Reality Applications

Polona Caserman , Michelle Martinussen , Stefan Göbel
1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.57-69, ⟨10.1007/978-3-030-34644-7_5⟩
Conference papers hal-03652010v1
Image document

Election-Dependent Security Evaluation of Internet Voting Schemes

Stephan Neumann , Manuel Noll , Melanie Volkamer
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.371-382, ⟨10.1007/978-3-319-58469-0_25⟩
Conference papers hal-01648992v1
Image document

Energy Implications in the Single-Vendor Single-Buyer Integrated Production Inventory Model

Simone Zanoni , Laura Bettoni , Christoph H. Glock
19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.57-64, ⟨10.1007/978-3-642-40352-1_8⟩
Conference papers hal-01472312v1
Image document

Enforcing Usage Constraints on Credentials for Web Applications

Jinwei Hu , Heiko Mantel , Sebastian Ruhleder
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.112-125, ⟨10.1007/978-3-319-18467-8_8⟩
Conference papers hal-01345100v1