Filter your results
- 25
- 25
- 2
- 25
- 3
- 1
- 1
- 2
- 3
- 3
- 3
- 2
- 4
- 3
- 1
- 1
- 1
- 25
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 3
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Knots Maintenance for Optimal Management of Trust Relations8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.189-204, ⟨10.1007/978-3-662-43813-8_13⟩
Conference papers
hal-01381688v1
|
||
|
Let Us Talk to People, Not to Computers": Obstacles for Establishing Relationships and Trust in Social Workers’ Online Communities of Practice5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.80-94, ⟨10.1007/978-3-642-40346-0_8⟩
Conference papers
hal-01491233v1
|
||
|
A Topology Based Flow Model for Computing Domain Reputation29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.277-292, ⟨10.1007/978-3-319-20810-7_20⟩
Conference papers
hal-01745814v1
|
||
|
Simulation Analysis of Sweet Pepper Harvesting OperationsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.441-448, ⟨10.1007/978-3-662-44733-8_55⟩
Conference papers
hal-01387286v1
|
||
|
An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers
hal-03677023v1
|
||
|
Reputation - from Social Perception to Internet Security9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.3-10, ⟨10.1007/978-3-319-18491-3_1⟩
Conference papers
hal-01416199v1
|
||
|
Attacking and Defending Dynamic Analysis System-Calls Based IDS10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.103-119, ⟨10.1007/978-3-319-45931-8_7⟩
Conference papers
hal-01639619v1
|
||
|
Load-Balancing Adaptive Clustering Refinement Algorithm for Wireless Sensor Network Clusters15th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2017, St. Petersburg, Russia. pp.157-173, ⟨10.1007/978-3-319-61382-6_13⟩
Conference papers
hal-01675417v1
|
||
|
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.3-19, ⟨10.1007/978-3-319-61176-1_1⟩
Conference papers
hal-01684347v1
|
||
|
Schemes for Privately Computing Trust and Reputation4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.1-16, ⟨10.1007/978-3-642-13446-3_1⟩
Conference papers
hal-01061315v1
|
||
|
Advanced Flow Models for Computing the Reputation of Internet Domains11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.119-134, ⟨10.1007/978-3-319-59171-1_10⟩
Conference papers
hal-01651160v1
|
||
|
Private and Secure Secret Shared MapReduce (Extended Abstract)30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.151-160, ⟨10.1007/978-3-319-41483-6_11⟩
Conference papers
hal-01633670v1
|
||
|
PUA Detection Based on Bundle Installer Characteristics34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.261-273, ⟨10.1007/978-3-030-49669-2_15⟩
Conference papers
hal-03243639v1
|
||
|
Evaluating Multivariate Visualizations as Multi-objective Decision Aids14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.419-436, ⟨10.1007/978-3-642-40483-2_29⟩
Conference papers
hal-01497451v1
|
||
|
Comparative Evaluation of Node-Link and Sankey Diagrams for the Cyber Security Domain17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.497-518, ⟨10.1007/978-3-030-29381-9_31⟩
Conference papers
hal-02544537v1
|
||
|
A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.19-27, ⟨10.1007/978-3-030-33716-2_2⟩
Conference papers
hal-03182609v1
|
||
|
Identifying Knots of Trust in Virtual Communities5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.67-81, ⟨10.1007/978-3-642-22200-9_8⟩
Conference papers
hal-01568691v1
|
||
|
Code Type Revealing Using Experiments Framework26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.193-206, ⟨10.1007/978-3-642-31540-4_15⟩
Conference papers
hal-01534762v1
|
||
|
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.216-230, ⟨10.1007/978-3-319-99828-2_16⟩
Conference papers
hal-02023723v1
|
||
|
The Effect of the Existence of Defective Items in Assembly OperationsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.449-454, ⟨10.1007/978-3-662-44733-8_56⟩
Conference papers
hal-01387287v1
|
||
|
Transfer Learning for Content-Based Recommender Systems Using Tree Matching1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.387-399
Conference papers
hal-01506793v1
|
||
|
Data Integrity Verification in Column-Oriented NoSQL Databases32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.165-181, ⟨10.1007/978-3-319-95729-6_11⟩
Conference papers
hal-01954409v1
|
||
|
Efficient and Enhanced Solutions for Content Sharing in DRM Systems28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers
hal-01284873v1
|
||
|
Liability Exposure when 3D-Printed Parts Fall from the Sky12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.39-64, ⟨10.1007/978-3-030-04537-1_3⟩
Conference papers
hal-02076297v1
|
||
|
Publishing Differentially Private Medical Events DataInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.219-235, ⟨10.1007/978-3-319-45507-5_15⟩
Conference papers
hal-01635024v1
|