Filter your results
- 5
- 5
- 5
- 5
- 10
- 2
- 11
- 5
- 3
- 2
- 2
- 4
- 6
- 5
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.325-336, ⟨10.1007/978-3-319-61176-1_18⟩
Conference papers
hal-01684354v1
|
||
|
Most Complex Non-returning Regular Languages19th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2017, Milano, Italy. pp.89-101, ⟨10.1007/978-3-319-60252-3_7⟩
Conference papers
hal-01656998v1
|
||
|
Assessing Code Authorship: The Case of the Linux Kernel13th IFIP International Conference on Open Source Systems (OSS), May 2017, Buenos Aires, Argentina. pp.151-163, ⟨10.1007/978-3-319-57735-7_15⟩
Conference papers
hal-01776321v1
|
||
|
Privacy-Preserving Outlier Detection for Data Streams31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.225-238, ⟨10.1007/978-3-319-61176-1_12⟩
Conference papers
hal-01684375v1
|
||
|
HardIDX: Practical and Secure Index with SGX31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.386-408, ⟨10.1007/978-3-319-61176-1_22⟩
Conference papers
hal-01684366v1
|