Filter your results
- 12
- 12
- 12
- 1
- 1
- 2
- 1
- 2
- 3
- 2
- 12
- 4
- 3
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Comparing Local and Central Differential Privacy Using Membership Inference Attacks35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.22-42, ⟨10.1007/978-3-030-81242-3_2⟩
Conference papers
hal-03677033v1
|
||
|
Non-interactive Private Decision Tree Evaluation34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.174-194, ⟨10.1007/978-3-030-49669-2_10⟩
Conference papers
hal-03243640v1
|
||
|
Privacy-Preserving Outlier Detection for Data Streams31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.225-238, ⟨10.1007/978-3-319-61176-1_12⟩
Conference papers
hal-01684375v1
|
||
|
HardIDX: Practical and Secure Index with SGX31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.386-408, ⟨10.1007/978-3-319-61176-1_22⟩
Conference papers
hal-01684366v1
|
||
|
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers
hal-01586579v1
|
||
|
Detecting Collusive Fraud in Enterprise Resource Planning Systems7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.143-153, ⟨10.1007/978-3-642-24212-0_11⟩
Conference papers
hal-01569559v1
|
||
|
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩
Conference papers
hal-01567599v1
|
||
|
HiPoLDS: A Security Policy Language for Distributed Systems6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.97-112, ⟨10.1007/978-3-642-30955-7_10⟩
Conference papers
hal-01534303v1
|
||
|
Towards the Definition of Domain Concepts and Knowledge through the Application of the User Story Mapping Method9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.58-69, ⟨10.1007/978-3-642-35758-9_6⟩
Conference papers
hal-01526136v1
|
||
|
A Trusted UI for the Mobile Web29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.127-141, ⟨10.1007/978-3-642-55415-5_11⟩
Conference papers
hal-01370360v1
|
||
|
Attribute-Based Encryption with Break-Glass4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers
hal-01056083v1
|
||
|
Fraud Detection in ERP Systems Using Scenario Matching25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.112-123, ⟨10.1007/978-3-642-15257-3_11⟩
Conference papers
hal-01054523v1
|