Search - IFIP Open Digital Library Access content directly

Filter your results

47 results
Structure: Internal structure identifier : 366875
Image document

Dynamics in Delegation and Revocation Schemes: A Logical Approach

Guillaume Aucher , Steve Barker , Guido Boella , Valerio Genovese , Leendert van Der Torre
23th Data and Applications Security (DBSec), Jul 2011, Richmond, United States. pp.90-105, ⟨10.1007/978-3-642-22348-8_9⟩
Conference papers inria-00593654v2
Image document

A Logic of Privacy

Steve Barker , Valerio Genovese
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.17-32, ⟨10.1007/978-3-642-13739-6_2⟩
Conference papers hal-01056671v1
Image document

An Offline Dictionary Attack Against zkPAKE Protocol

José Becerra , Peter Ryan , Petra Šala , Marjan Škrobot
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.81-90, ⟨10.1007/978-3-030-22312-0_6⟩
Conference papers hal-03744290v1
Image document

Efficient Architecture-Level Configuration of Large-Scale Embedded Software Systems

Razieh Behjati , Shiva Nejati
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.110-126, ⟨10.1007/978-3-319-24644-4_8⟩
Conference papers hal-01446633v1
Image document

A Socio-technical Understanding of TLS Certificate Validation

Giampaolo Bella , Rosario Giustolisi , Gabriele Lenzini
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.281-288, ⟨10.1007/978-3-642-38323-6_23⟩
Conference papers hal-01468204v1
Image document

A Secure Exam Protocol Without Trusted Parties

Giampaolo Bella , Rosario Giustolisi , Gabriele Lenzini , Peter A. Ryan
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.495-509, ⟨10.1007/978-3-319-18467-8_33⟩
Conference papers hal-01345141v1
Image document

Analysis of Multi-path Onion Routing-Based Anonymization Networks

Wladimir de La Cadena , Daniel Kaiser , Asya Mitseva , Andriy Panchenko , Thomas Engel
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.240-258, ⟨10.1007/978-3-030-22479-0_13⟩
Conference papers hal-02384590v1
Image document

Developing Innovative Live Video-to-Video Communications for Smarter European Cities

Ioannis P. Chochliouros , Ioannis M. Stephanakis , Anastasia S. Spiliopoulou , Evangelos Sfakianakis , Latif Ladid
8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.279-289, ⟨10.1007/978-3-642-33412-2_29⟩
Conference papers hal-01523054v1
Image document

(Semi-) Pervasive Gaming Educational and Entertainment Facilities via Interactive Video-to-Video Communication over the Internet, for Museum Exhibits

Ioannis P. Chochliouros , Rod Mccall , Andrei Popleteev , Tigran Avanesov , Tomas Kamarauskas , et al.
9th Artificial Intelligence Applications and Innovations (AIAI), Sep 2013, Paphos, Greece. pp.474-485, ⟨10.1007/978-3-642-41142-7_48⟩
Conference papers hal-01459681v1
Image document

Testbeds for the Implementation of 5G in the European Union: The Innovative Case of the 5G-DRIVE Project

Ioannis P. Chochliouros , Anastasia S. Spiliopoulou , Alexandros Kostopoulos , Eirini Vasilaki , Uwe Herzog , et al.
15th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2019, Hersonissos, Greece. pp.78-92, ⟨10.1007/978-3-030-19909-8_7⟩
Conference papers hal-02363836v1
Image document

Enhanced Mobile Broadband as Enabler for 5G: Actions from the Framework of the 5G-DRIVE Project

Ioannis P. Chochliouros , Na Yi , Anastasia S. Spiliopoulou , Alexandros Kostopoulos , Nathan Gomes , et al.
15th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2019, Hersonissos, Greece. pp.31-45, ⟨10.1007/978-3-030-19909-8_3⟩
Conference papers hal-02363853v1
Image document

The Hubs: Design Insights for Walking Meeting Technology

Ida Damen , Steven Vos , Carine Lallemand
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.610-629, ⟨10.1007/978-3-030-85610-6_35⟩
Conference papers hal-04215504v1
Image document

50 Ways to Break RFID Privacy

Ton Van Deursen
6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.192-205, ⟨10.1007/978-3-642-20769-3_16⟩
Conference papers hal-01559457v1
Image document

Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study

Marlon Fraile , Margaret Ford , Olga Gadyatskaya , Rajesh Kumar , Mariëlle Stoelinga , et al.
9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.326-334, ⟨10.1007/978-3-319-48393-1_24⟩
Conference papers hal-01653513v1
Image document

Examination of a New Defense Mechanism: Honeywords

Ziya Alper Genç , Süleyman Kardaş , Mehmet Sabir Kiraz
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.130-139, ⟨10.1007/978-3-319-93524-9_8⟩
Conference papers hal-01875522v1

Trust Management X

Sheikh Mahbub Habib , Julita Vassileva , Sjouke Mauw , Max Mühlhäuser
Springer, AICT-473, 2016, Trust Management X, 978-3-319-41353-2. ⟨10.1007/978-3-319-41354-9⟩
Books hal-01438367v1
Image document

Mind the Gap Gender and Computer Science Conferences

Sytze Van Herck , Antonio Maria Fiscarelli
13th IFIP International Conference on Human Choice and Computers (HCC13), Sep 2018, Poznan, Poland. pp.232-249, ⟨10.1007/978-3-319-99605-9_17⟩
Conference papers hal-02001958v1
Image document

Kill or Spare – Moral Decision-Making in Video Games

Elisabeth Holl , André Melzer
20th International Conference on Entertainment Computing (ICEC), Nov 2021, Coimbra, Portugal. pp.88-99, ⟨10.1007/978-3-030-89394-1_7⟩
Conference papers hal-04144381v1
Image document

Strategic Noninterference

Wojciech Jamroga , Masoud Tabatabaei
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.67-81, ⟨10.1007/978-3-319-18467-8_5⟩
Conference papers hal-01345096v1
Image document

Towards Extending the Validation Possibilities of ADOxx with Alloy

Sybren De Kinderen , Qin Ma , Monika Kaczmarek-Hess
13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.138-152, ⟨10.1007/978-3-030-63479-7_10⟩
Conference papers hal-03434656v1
Image document

Towards Meta Model Provenance: A Goal-Driven Approach to Document the Provenance of Meta Models

Sybren De Kinderen , Monika Kaczmarek-Hess , Qin Ma , Iván S. Razo-Zapata
10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.49-64, ⟨10.1007/978-3-319-70241-4_4⟩
Conference papers hal-01765255v1
Image document

Pervasive Gaming as a Potential Solution to Traffic Congestion: New Challenges Regarding Ethics, Privacy and Trust

Vincent Koenig , Franziska Boehm , Rod Mccall
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.586-593, ⟨10.1007/978-3-642-33542-6_78⟩
Conference papers hal-01556169v1
Image document

Building Lifecycle Management System for Enhanced Closed Loop Collaboration

Sylvain Kubler , Andrea Buda , Jérémy Robert , Kary Främling , Yves Le Traon
13th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2016, Columbia, SC, United States. pp.423-432, ⟨10.1007/978-3-319-54660-5_38⟩
Conference papers hal-01699680v1
Image document

The Impact of IPv6 on Video-to-Video and Mobile Video Communications

Latif Ladid , Ioannis P. Chochliouros
8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.322-331, ⟨10.1007/978-3-642-33412-2_33⟩
Conference papers hal-01523038v1
Image document

ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis

Li Li , Alexandre Bartel , Tegawendé F. Bissyandé , Jacques Klein , Yves Le Traon
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.513-527, ⟨10.1007/978-3-319-18467-8_34⟩
Conference papers hal-01345142v1
Image document

Validation and Verification in Domain-Specific Modeling Method Engineering

Qin Ma , Monika Kaczmarek-Hess , Sybren De Kinderen
14th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2021, Riga, Latvia. pp.119-133, ⟨10.1007/978-3-030-91279-6_9⟩
Conference papers hal-04323856v1
Image document

Counteracting Active Attacks in Social Network Graphs

Sjouke Mauw , Rolando Trujillo-Rasua , Bochuan Xuan
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers hal-01633668v1
Image document

Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming

Rod Mccall , Lynne Baillie , Franziska Boehm , Mike Just
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.584-585, ⟨10.1007/978-3-642-33542-6_77⟩
Conference papers hal-01556150v1
Image document

CPMap: Design of Click-Points Map-Based Graphical Password Authentication

Weizhi Meng , Fei Fei , Lijun Jiang , Zhe Liu , Chunhua Su , et al.
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.18-32, ⟨10.1007/978-3-319-99828-2_2⟩
Conference papers hal-02023732v1
Image document

Raya: A Tangible Exercise Buddy Reminding Oneself of the Commitment to Exercise

Daphne Menheere , Alynne De Haan , Steven Vos , Carine Lallemand
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.471-475, ⟨10.1007/978-3-030-85607-6_60⟩
Conference papers hal-04291185v1