Search - IFIP Open Digital Library Access content directly

Filter your results

62 results
Structure: Internal structure identifier : 300856
Image document

Safe Equivalences for Security Properties

Mário S. Alvim , Miguel E. Andrés , Catuscia Palamidessi , Peter van Rossum
6th IFIP International Conference on Theoretical Computer Science (TCS 2010), Sep 2010, Brisbane, Australia. pp.55-70, ⟨10.1007/978-3-642-15240-5_5⟩
Conference papers inria-00479674v2
Image document

A Security Analysis of OpenID

Bart Delft , Martijn Oostdijk
Second IFIP WG 11.6 Working Conference on Policies and Reseach Management (IDMAN), Nov 2010, Oslo, Norway. pp.73-84, ⟨10.1007/978-3-642-17303-5_6⟩
Conference papers hal-01054399v1
Image document

Convexity, Duality and Effects

Bart Jacobs
6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.1-19, ⟨10.1007/978-3-642-15240-5_1⟩
Conference papers hal-01054454v1
Image document

Privacy Enhanced Fraud Resistant Road Pricing

Jaap-Henk Hoepman , George Huitema
9th IFIP TC9 International Conference on Human Choice and Computers (HCC) / 1st IFIP TC11 International Conference on Critical Information Infrastructure Protection (CIP) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.202-213, ⟨10.1007/978-3-642-15479-9_20⟩
Conference papers hal-01054794v1
Image document

Modeling Privacy for Off-Line RFID Systems

Flavio D. Garcia , Peter Rossum
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.194-208, ⟨10.1007/978-3-642-12510-2_14⟩
Conference papers hal-01056106v1
Image document

Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

Lejla Batina , Jaap-Henk Hoepman , Bart Jacobs , Wojciech Mostowski , Pim Vullers
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.209-222, ⟨10.1007/978-3-642-12510-2_15⟩
Conference papers hal-01056105v1
Image document

Practical Schemes for Privacy and Security Enhanced RFID

Jaap-Henk Hoepman , Rieks Joosten
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.138-153, ⟨10.1007/978-3-642-12368-9_10⟩
Conference papers hal-01059139v1
Image document

Extending UPPAAL for the Modeling and Verification of Dynamic Real-Time Systems

Abdeldjalil Boudjadar , Frits Vaandrager , Jean-Paul Bodeveix , M Filali
5th International Conference on Fundamentals of Software Engineering (FSEN 2013), Apr 2013, Tehran, Iran. pp.111-132, ⟨10.1007/978-3-642-40213-5_8⟩
Conference papers hal-01231765v1
Image document

Entropy and Attack Models in Information Flow

Mário S. Alvim , Miguel E. Andrés , Catuscia Palamidessi
6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.53-54, ⟨10.1007/978-3-642-15240-5_4⟩
Conference papers hal-00548212v1
Image document

Two of the Grand Changes through Computer and Network Technology

Bart Jacobs
Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.1-11, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_1⟩
Book sections hal-01276043v1
Image document

Mobile Devices to the Identity Rescue

Gergely Alpár , Maarten H. Everts
Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.237-247, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_19⟩
Book sections hal-01276079v1

Privacy and Identity Management for Emerging Services and Technologies

Marit Hansen , Jaap-Henk Hoepman , Ronald Leenes , Diane Whitehouse
Springer, IFIP Advances in Information and Communication Technology (TUTORIAL) (AICT-421), 2014, 978-3-642-55137-6. ⟨10.1007/978-3-642-55137-6⟩
Books hal-01276094v1
Image document

Capturing Design Rationales in Enterprise Architecture: A Case Study

Georgios Plataniotis , Sybren De Kinderen , Henderik A. Proper
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.133-147, ⟨10.1007/978-3-662-45501-2_10⟩
Conference papers hal-01282061v1
Image document

A Semiotic Approach to Critical Reasoning

Janos J. Sarbo , Jessica H. Yang
16th International Conference on Informatics and Semiotics in Organisations (ICISO), Mar 2015, Toulouse, France. pp.10-19, ⟨10.1007/978-3-319-16274-4_2⟩
Conference papers hal-01324956v1
Image document

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers

Wouter Lueks , Gergely Alpár , Jaap- Henk Hoepman , Pim Vullers
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.463-478, ⟨10.1007/978-3-319-18467-8_31⟩
Conference papers hal-01345136v1
Image document

A Semiotic Approach to Integrative Negotiation

Janos J. Sarbo
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.1-10, ⟨10.1007/978-3-642-55355-4_1⟩
Conference papers hal-01350903v1
Image document

Quality of Service in the Long Tail: Narratives and the Exploitation of Soft Metadata

Auke Van Breemen
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.22-31, ⟨10.1007/978-3-642-55355-4_3⟩
Conference papers hal-01350907v1

ICT Systems Security and Privacy Protection

Jaap-Henk Hoepman , Stefan Katzenbeisser
Springer, AICT-471, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-33629-9. ⟨10.1007/978-3-319-33630-5⟩
Books hal-01369602v1
Image document

Privacy Design Strategies

Jaap-Henk Hoepman
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.446-459, ⟨10.1007/978-3-642-55415-5_38⟩
Conference papers hal-01370395v1
Image document

S-box, SET, Match: A Toolbox for S-box Analysis

Stjepan Picek , Lejla Batina , Domagoj Jakobović , Bariş Ege , Marin Golub
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.140-149, ⟨10.1007/978-3-662-43826-8_10⟩
Conference papers hal-01400936v1
Image document

Termination Analysis for Graph Transformation Systems

H. Sander Bruggink , Barbara König , Hans Zantema
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.179-194, ⟨10.1007/978-3-662-44602-7_15⟩
Conference papers hal-01402041v1
Image document

Towards a Coalgebraic Chomsky Hierarchy

Sergey Goncharov , Stefan Milius , Alexandra Silva
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.265-280, ⟨10.1007/978-3-662-44602-7_21⟩
Conference papers hal-01402071v1
Image document

Strong Completeness for Iteration-Free Coalgebraic Dynamic Logics

Helle Hvid Hansen , Clemens Kupke , Raul Andres Leal
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.281-295, ⟨10.1007/978-3-662-44602-7_22⟩
Conference papers hal-01402072v1
Image document

How to Kill Epsilons with a Dagger

Filippo Bonchi , Stefan Milius , Alexandra Silva , Fabio Zanasi
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.53-74, ⟨10.1007/978-3-662-44124-4_4⟩
Conference papers hal-01408752v1
Image document

Dijkstra Monads in Monadic Computation

Bart Jacobs
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.135-150, ⟨10.1007/978-3-662-44124-4_8⟩
Conference papers hal-01408757v1
Image document

Lifting Adjunctions to Coalgebras to (Re)Discover Automata Constructions

Henning Kerstan , Barbara König , Bram Westerbaan
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.168-188, ⟨10.1007/978-3-662-44124-4_10⟩
Conference papers hal-01408759v1
Image document

Branching Bisimulation Games

David De Frutos Escrig , Jeroen A. Keiren , Tim C. Willemse
36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.142-157, ⟨10.1007/978-3-319-39570-8_10⟩
Conference papers hal-01432915v1
Image document

On Linkability and Malleability in Self-blindable Credentials

Jaap-Henk Hoepman , Wouter Lueks , Sietse Ringers
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.203-218, ⟨10.1007/978-3-319-24018-3_13⟩
Conference papers hal-01442543v1
Image document

Lawvere Categories as Composed PROPs

Filippo Bonchi , Pawel Sobocinski , Fabio Zanasi
13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.11-32, ⟨10.1007/978-3-319-40370-0_3⟩
Conference papers hal-01446031v1
Image document

Affine Monads and Side-Effect-Freeness

Bart Jacobs
13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.53-72, ⟨10.1007/978-3-319-40370-0_5⟩
Conference papers hal-01446033v1