Filter your results
- 46
- 1
- 45
- 1
- 1
- 47
- 6
- 6
- 4
- 4
- 4
- 2
- 6
- 4
- 3
- 4
- 5
- 2
- 3
- 47
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
(Semi-) Pervasive Gaming Educational and Entertainment Facilities via Interactive Video-to-Video Communication over the Internet, for Museum Exhibits9th Artificial Intelligence Applications and Innovations (AIAI), Sep 2013, Paphos, Greece. pp.474-485, ⟨10.1007/978-3-642-41142-7_48⟩
Conference papers
hal-01459681v1
|
||
|
50 Ways to Break RFID Privacy6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.192-205, ⟨10.1007/978-3-642-20769-3_16⟩
Conference papers
hal-01559457v1
|
||
|
A Logic of Privacy24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.17-32, ⟨10.1007/978-3-642-13739-6_2⟩
Conference papers
hal-01056671v1
|
||
|
A Secure Exam Protocol Without Trusted Parties30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.495-509, ⟨10.1007/978-3-319-18467-8_33⟩
Conference papers
hal-01345141v1
|
||
|
A Socio-technical Understanding of TLS Certificate Validation7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.281-288, ⟨10.1007/978-3-642-38323-6_23⟩
Conference papers
hal-01468204v1
|
||
|
An Offline Dictionary Attack Against zkPAKE Protocol34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.81-90, ⟨10.1007/978-3-030-22312-0_6⟩
Conference papers
hal-03744290v1
|
||
|
Analysis of Multi-path Onion Routing-Based Anonymization Networks33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.240-258, ⟨10.1007/978-3-030-22479-0_13⟩
Conference papers
hal-02384590v1
|
||
|
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.513-527, ⟨10.1007/978-3-319-18467-8_34⟩
Conference papers
hal-01345142v1
|
||
|
Building Lifecycle Management System for Enhanced Closed Loop Collaboration13th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2016, Columbia, SC, United States. pp.423-432, ⟨10.1007/978-3-319-54660-5_38⟩
Conference papers
hal-01699680v1
|
||
|
Capturing Design Rationales in Enterprise Architecture: A Case Study7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.133-147, ⟨10.1007/978-3-662-45501-2_10⟩
Conference papers
hal-01282061v1
|
||
|
Cloud Computing ContractsAnja Lehmann; Diane Whitehouse; Simone Fischer-Hübner; Lothar Fritsch; Charles Raab. Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, AICT-498, Springer International Publishing, pp.182-198, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-55782-3. ⟨10.1007/978-3-319-55783-0_13⟩
Book sections
hal-01629162v1
|
||
|
Counteracting Active Attacks in Social Network Graphs30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers
hal-01633668v1
|
||
|
CPMap: Design of Click-Points Map-Based Graphical Password Authentication33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.18-32, ⟨10.1007/978-3-319-99828-2_2⟩
Conference papers
hal-02023732v1
|
||
|
Detection of Fluid Level in Bores for Batch Size One Assembly Automation Using Convolutional Neural NetworkIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.86-93, ⟨10.1007/978-3-030-85906-0_10⟩
Conference papers
hal-04022155v1
|
||
|
Developing Innovative Live Video-to-Video Communications for Smarter European Cities8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.279-289, ⟨10.1007/978-3-642-33412-2_29⟩
Conference papers
hal-01523054v1
|
||
|
Differentially Private Neighborhood-Based Recommender Systems32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.459-473, ⟨10.1007/978-3-319-58469-0_31⟩
Conference papers
hal-01649022v1
|
||
|
Dynamics in Delegation and Revocation Schemes: A Logical Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, United States. pp.90-105, ⟨10.1007/978-3-642-22348-8_9⟩
Conference papers
inria-00593654v2
|
||
|
Efficient Architecture-Level Configuration of Large-Scale Embedded Software Systems6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.110-126, ⟨10.1007/978-3-319-24644-4_8⟩
Conference papers
hal-01446633v1
|
||
|
Enhanced Mobile Broadband as Enabler for 5G: Actions from the Framework of the 5G-DRIVE Project15th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2019, Hersonissos, Greece. pp.31-45, ⟨10.1007/978-3-030-19909-8_3⟩
Conference papers
hal-02363853v1
|
||
|
Enterprise Coherence with GEA – A 15 year Co-evolution of Practice and Theory14th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2021, Riga, Latvia. pp.3-18, ⟨10.1007/978-3-030-91279-6_1⟩
Conference papers
hal-04323846v1
|
||
|
Enterprise Modelling in the Age of Digital Transformation11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.257-273, ⟨10.1007/978-3-030-02302-7_16⟩
Conference papers
hal-02156472v1
|
||
|
Examination of a New Defense Mechanism: Honeywords11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.130-139, ⟨10.1007/978-3-319-93524-9_8⟩
Conference papers
hal-01875522v1
|
||
|
FSquaDRA: Fast Detection of Repackaged Applications28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers
hal-01285035v1
|
||
|
Kill or Spare – Moral Decision-Making in Video Games20th International Conference on Entertainment Computing (ICEC), Nov 2021, Coimbra, Portugal. pp.88-99, ⟨10.1007/978-3-030-89394-1_7⟩
Conference papers
hal-04144381v1
|
||
|
Logics for Security and Privacy26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.1-7, ⟨10.1007/978-3-642-31540-4_1⟩
Conference papers
hal-01534776v1
|
||
|
Mind the Gap Gender and Computer Science Conferences13th IFIP International Conference on Human Choice and Computers (HCC13), Sep 2018, Poznan, Poland. pp.232-249, ⟨10.1007/978-3-319-99605-9_17⟩
Conference papers
hal-02001958v1
|
||
|
Mining NetFlow Records for Critical Network Activities4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.135-146, ⟨10.1007/978-3-642-13986-4_20⟩
Conference papers
hal-01056635v1
|
||
|
Modeling the German Legal Latitude Principles5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers
hal-01491259v1
|
||
|
On Beta Models with Trust Chains7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.49-65, ⟨10.1007/978-3-642-38323-6_4⟩
Conference papers
hal-01468207v1
|
||
|
On Domain Modelling and Requisite Variety13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.186-196, ⟨10.1007/978-3-030-63479-7_13⟩
Conference papers
hal-03434642v1
|
- 1
- 2