Filter your results
- 60
- 2
- 55
- 4
- 3
- 62
- 16
- 1
- 1
- 4
- 1
- 3
- 2
- 8
- 3
- 14
- 6
- 6
- 5
- 8
- 62
- 9
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 6
- 5
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Privacy and Identity Management for Emerging Services and TechnologiesSpringer, IFIP Advances in Information and Communication Technology (TUTORIAL) (AICT-421), 2014, 978-3-642-55137-6. ⟨10.1007/978-3-642-55137-6⟩
Books
hal-01276094v1
|
||
|
Two of the Grand Changes through Computer and Network TechnologyMarit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.1-11, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_1⟩
Book sections
hal-01276043v1
|
||
|
Privacy Design Strategies29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.446-459, ⟨10.1007/978-3-642-55415-5_38⟩
Conference papers
hal-01370395v1
|
||
|
S-box, SET, Match: A Toolbox for S-box Analysis8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.140-149, ⟨10.1007/978-3-662-43826-8_10⟩
Conference papers
hal-01400936v1
|
||
|
Termination Analysis for Graph Transformation Systems8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.179-194, ⟨10.1007/978-3-662-44602-7_15⟩
Conference papers
hal-01402041v1
|
||
|
Lifting Adjunctions to Coalgebras to (Re)Discover Automata Constructions12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.168-188, ⟨10.1007/978-3-662-44124-4_10⟩
Conference papers
hal-01408759v1
|
||
|
The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.107-120, ⟨10.1007/978-3-642-37282-7_11⟩
Conference papers
hal-01470495v1
|
||
|
A Qualitative Research Approach to Obtain Insight in Business Process Modelling Methods in Practice6th The Practice of Entrprise Modeling (PoEM), Nov 2013, Riga, Latvia. pp.161-175, ⟨10.1007/978-3-642-41641-5_12⟩
Conference papers
hal-01474781v1
|
||
|
Coalgebraic Methods in Computer ScienceSpringer International Publishing, LNCS-12094, 2020, Lecture Notes in Computer Science, 978-3-030-57200-6. ⟨10.1007/978-3-030-57201-3⟩
Books
hal-03232344v1
|
||
|
Agile Service Development: A Rule-Based Method Engineering Approach4th Working Conference on Method Engineering (ME), Apr 2011, Lisbon, Portugal. pp.184-189, ⟨10.1007/978-3-642-19997-4_17⟩
Conference papers
hal-01562893v1
|
||
|
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.261-273, ⟨10.1007/978-3-642-31668-5_20⟩
Conference papers
hal-01517599v1
|
||
|
Trace Semantics via Determinization11th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Mar 2012, Tallinn, Estonia. pp.109-129, ⟨10.1007/978-3-642-32784-1_7⟩
Conference papers
hal-01539887v1
|
||
|
Mobile Devices to the Identity RescueMarit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.237-247, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_19⟩
Book sections
hal-01276079v1
|
||
|
Dijkstra Monads in Monadic Computation12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.135-150, ⟨10.1007/978-3-662-44124-4_8⟩
Conference papers
hal-01408757v1
|
||
|
On Linkability and Malleability in Self-blindable Credentials9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.203-218, ⟨10.1007/978-3-319-24018-3_13⟩
Conference papers
hal-01442543v1
|
||
|
Vitalizing Semiotics17th International Conference on Informatics and Semiotics in Organisations (ICISO), Aug 2016, Campinas, Brazil. pp.25-34, ⟨10.1007/978-3-319-42102-5_3⟩
Conference papers
hal-01646560v1
|
||
|
Towards Enterprise-Grade Tool Support for DEMO13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.90-105, ⟨10.1007/978-3-030-63479-7_7⟩
Conference papers
hal-03434641v1
|
||
|
Asking Questions about Asking Questions in Collaborative Enterprise Modelling5th Working Conference on the Practice of Enterprise Modeling (PoEM), Nov 2012, Rostock, Germany. pp.16-30, ⟨10.1007/978-3-642-34549-4_2⟩
Conference papers
hal-01484386v1
|
||
|
A Semiotic Approach to Integrative Negotiation15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.1-10, ⟨10.1007/978-3-642-55355-4_1⟩
Conference papers
hal-01350903v1
|
||
|
ICT Systems Security and Privacy ProtectionSpringer, AICT-471, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-33629-9. ⟨10.1007/978-3-319-33630-5⟩
Books
hal-01369602v1
|
||
|
Affine Monads and Side-Effect-Freeness13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.53-72, ⟨10.1007/978-3-319-40370-0_5⟩
Conference papers
hal-01446033v1
|
||
|
Towards Practical Attribute-Based Identity Management: The IRMA Trajectory3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.1-3, ⟨10.1007/978-3-642-37282-7_1⟩
Conference papers
hal-01470499v1
|
||
|
Scheduling Games for Concurrent Systems18th International Conference on Coordination Languages and Models (COORDINATION), Jun 2016, Heraklion, Greece. pp.84-100, ⟨10.1007/978-3-319-39519-7_6⟩
Conference papers
hal-01631719v1
|
||
|
Scaffolding Stakeholder-Centric Enterprise Model Articulation9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.133-147, ⟨10.1007/978-3-319-48393-1_10⟩
Conference papers
hal-01653512v1
|
||
|
Privacy Enhanced Fraud Resistant Road Pricing9th IFIP TC9 International Conference on Human Choice and Computers (HCC) / 1st IFIP TC11 International Conference on Critical Information Infrastructure Protection (CIP) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.202-213, ⟨10.1007/978-3-642-15479-9_20⟩
Conference papers
hal-01054794v1
|
||
|
Modeling Privacy for Off-Line RFID Systems9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.194-208, ⟨10.1007/978-3-642-12510-2_14⟩
Conference papers
hal-01056106v1
|
||
|
A Semiotic Approach to Critical Reasoning16th International Conference on Informatics and Semiotics in Organisations (ICISO), Mar 2015, Toulouse, France. pp.10-19, ⟨10.1007/978-3-319-16274-4_2⟩
Conference papers
hal-01324956v1
|
||
|
Reflections on Using an Architecture Model for Matching Existing Applications to a Radical Business Requirements Change: A Case Study11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.383-393, ⟨10.1007/978-3-030-02302-7_25⟩
Conference papers
hal-02156475v1
|
||
|
Steps and Traces14th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2018, Thessaloniki, Greece. pp.122-143, ⟨10.1007/978-3-030-00389-0_8⟩
Conference papers
hal-02044644v1
|
||
|
Towards a Coalgebraic Chomsky Hierarchy8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.265-280, ⟨10.1007/978-3-662-44602-7_21⟩
Conference papers
hal-01402071v1
|