Filter your results
- 60
- 2
- 55
- 4
- 3
- 62
- 16
- 1
- 1
- 4
- 1
- 3
- 2
- 8
- 3
- 14
- 6
- 6
- 5
- 8
- 62
- 9
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 6
- 5
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.261-273, ⟨10.1007/978-3-642-31668-5_20⟩
Conference papers
hal-01517599v1
|
||
|
Mobile Devices to the Identity RescueMarit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.237-247, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_19⟩
Book sections
hal-01276079v1
|
||
|
Towards Practical Attribute-Based Identity Management: The IRMA Trajectory3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.1-3, ⟨10.1007/978-3-642-37282-7_1⟩
Conference papers
hal-01470499v1
|
||
|
Entropy and Attack Models in Information Flow6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.53-54, ⟨10.1007/978-3-642-15240-5_4⟩
Conference papers
hal-00548212v1
|
||
|
Safe Equivalences for Security Properties6th IFIP International Conference on Theoretical Computer Science (TCS 2010), Sep 2010, Brisbane, Australia. pp.55-70, ⟨10.1007/978-3-642-15240-5_5⟩
Conference papers
inria-00479674v2
|
||
|
Privacy as Enabler of Innovation14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.3-16, ⟨10.1007/978-3-030-42504-3_1⟩
Conference papers
hal-03378973v1
|
||
|
Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.209-222, ⟨10.1007/978-3-642-12510-2_15⟩
Conference papers
hal-01056105v1
|
||
|
How to Kill Epsilons with a Dagger12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.53-74, ⟨10.1007/978-3-662-44124-4_4⟩
Conference papers
hal-01408752v1
|
||
|
Bisimilarity of Open Terms in Stream GSOS7th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2017, Teheran, Iran. pp.35-50, ⟨10.1007/978-3-319-68972-2_3⟩
Conference papers
hal-01760851v1
|
||
|
Lawvere Categories as Composed PROPs13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.11-32, ⟨10.1007/978-3-319-40370-0_3⟩
Conference papers
hal-01446031v1
|
||
|
n-Complete Test Suites for IOCO29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.91-107, ⟨10.1007/978-3-319-67549-7_6⟩
Conference papers
hal-01678988v1
|
||
|
Extending UPPAAL for the Modeling and Verification of Dynamic Real-Time Systems5th International Conference on Fundamentals of Software Engineering (FSEN 2013), Apr 2013, Tehran, Iran. pp.111-132, ⟨10.1007/978-3-642-40213-5_8⟩
Conference papers
hal-01231765v1
|
||
|
Quality of Service in the Long Tail: Narratives and the Exploitation of Soft Metadata15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.22-31, ⟨10.1007/978-3-642-55355-4_3⟩
Conference papers
hal-01350907v1
|
||
|
Termination Analysis for Graph Transformation Systems8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.179-194, ⟨10.1007/978-3-662-44602-7_15⟩
Conference papers
hal-01402041v1
|
||
|
A Qualitative Research Approach to Obtain Insight in Business Process Modelling Methods in Practice6th The Practice of Entrprise Modeling (PoEM), Nov 2013, Riga, Latvia. pp.161-175, ⟨10.1007/978-3-642-41641-5_12⟩
Conference papers
hal-01474781v1
|
||
|
A Security Analysis of OpenIDSecond IFIP WG 11.6 Working Conference on Policies and Reseach Management (IDMAN), Nov 2010, Oslo, Norway. pp.73-84, ⟨10.1007/978-3-642-17303-5_6⟩
Conference papers
hal-01054399v1
|
||
|
GDPR and the Concept of Risk:Eleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.137-154, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_10⟩
Book sections
hal-02271667v1
|
||
|
Scheduler-Dependent Inter-cell Interference and Its Impact on LTE Uplink Performance at Flow Level9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.285-296, ⟨10.1007/978-3-642-21560-5_24⟩
Conference papers
hal-01583652v1
|
||
|
Scheduling Games for Concurrent Systems18th International Conference on Coordination Languages and Models (COORDINATION), Jun 2016, Heraklion, Greece. pp.84-100, ⟨10.1007/978-3-319-39519-7_6⟩
Conference papers
hal-01631719v1
|
||
|
Branching Bisimulation Games36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.142-157, ⟨10.1007/978-3-319-39570-8_10⟩
Conference papers
hal-01432915v1
|
||
|
Modeling Privacy for Off-Line RFID Systems9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.194-208, ⟨10.1007/978-3-642-12510-2_14⟩
Conference papers
hal-01056106v1
|
||
|
Towards a Coalgebraic Chomsky Hierarchy8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.265-280, ⟨10.1007/978-3-662-44602-7_21⟩
Conference papers
hal-01402071v1
|
||
|
(In)finite Trace Equivalence of Probabilistic Transition Systems14th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2018, Thessaloniki, Greece. pp.100-121, ⟨10.1007/978-3-030-00389-0_7⟩
Conference papers
hal-02044641v1
|
||
|
Report on the Workshop on Assessing the Maturity of Privacy Enhancing TechnologiesDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.97-110, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_7⟩
Book sections
hal-01619747v1
|
||
|
Strong Completeness for Iteration-Free Coalgebraic Dynamic Logics8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.281-295, ⟨10.1007/978-3-662-44602-7_22⟩
Conference papers
hal-01402072v1
|
||
|
Privacy and Identity Management for Emerging Services and TechnologiesSpringer, IFIP Advances in Information and Communication Technology (TUTORIAL) (AICT-421), 2014, 978-3-642-55137-6. ⟨10.1007/978-3-642-55137-6⟩
Books
hal-01276094v1
|
||
|
Mobile Identity Management12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.253-253, ⟨10.1007/978-3-642-24712-5_27⟩
Conference papers
hal-01596192v1
|
||
|
Practical Schemes for Privacy and Security Enhanced RFID4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.138-153, ⟨10.1007/978-3-642-12368-9_10⟩
Conference papers
hal-01059139v1
|
||
|
Privacy Design Strategies29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.446-459, ⟨10.1007/978-3-642-55415-5_38⟩
Conference papers
hal-01370395v1
|
||
|
On Linkability and Malleability in Self-blindable Credentials9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.203-218, ⟨10.1007/978-3-319-24018-3_13⟩
Conference papers
hal-01442543v1
|