Filter your results
- 24
- 24
- 24
- 2
- 3
- 1
- 1
- 2
- 2
- 5
- 1
- 1
- 6
- 24
- 2
- 1
- 1
- 1
- 1
- 1
- 7
- 5
- 5
- 4
- 4
- 4
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.90-102, ⟨10.1007/978-3-642-15257-3_9⟩
Conference papers
hal-01054578v1
|
||
|
Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate NetworksThird IFIP TC6 International Conference on Wireless Communications and Information Technology in Developing Countries (WCITD) / IFIP TC 6 International Network of the Future Conference (NF) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.158-169, ⟨10.1007/978-3-642-15476-8_16⟩
Conference papers
hal-01054748v1
|
||
|
Trust in Peer-to-Peer Content Distribution Protocols4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.76-89, ⟨10.1007/978-3-642-12368-9_6⟩
Conference papers
hal-01056065v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Privacy in Distributed Commercial Applications9th IFIP TC9 International Conference on Human Choice and Computers (HCC) / 1st IFIP TC11 International Conference on Critical Information Infrastructure Protection (CIP) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.214-224, ⟨10.1007/978-3-642-15479-9_21⟩
Conference papers
hal-01058263v1
|
||
|
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.630-644, ⟨10.1007/978-3-319-18467-8_42⟩
Conference papers
hal-01345154v1
|
||
|
Advanced Remote Firmware Upgrades Using TPM 2.031st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.276-289, ⟨10.1007/978-3-319-33630-5_19⟩
Conference papers
hal-01369561v1
|
||
|
Using Approximate Matching to Reduce the Volume of Digital Data10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.149-163, ⟨10.1007/978-3-662-44952-3_11⟩
Conference papers
hal-01393769v1
|
||
|
Data Corpora for Digital Forensics Education and Research10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.309-325, ⟨10.1007/978-3-662-44952-3_21⟩
Conference papers
hal-01393787v1
|
||
|
How Current Android Malware Seeks to Evade Automated Code Analysis9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers
hal-01442542v1
|
||
|
Automating Video File Carving and Content Identification9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.195-212, ⟨10.1007/978-3-642-41148-9_14⟩
Conference papers
hal-01460607v1
|
||
|
Hash-Based File Content Identification Using Distributed Systems9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.119-134, ⟨10.1007/978-3-642-41148-9_8⟩
Conference papers
hal-01460625v1
|
||
|
Preserving Confidentiality in Component Compositions12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.33-48, ⟨10.1007/978-3-642-39614-4_3⟩
Conference papers
hal-01492775v1
|
||
|
Robust Hash Algorithms for Text14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers
hal-01492815v1
|
||
|
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.95-104, ⟨10.1007/978-3-642-40779-6_7⟩
Conference papers
hal-01492836v1
|
||
|
On the Creation of Reliable Digital Evidence8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.3-17, ⟨10.1007/978-3-642-33962-2_1⟩
Conference papers
hal-01523718v1
|
||
|
Detecting Fraud Using Modified Benford Analysis7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.129-141, ⟨10.1007/978-3-642-24212-0_10⟩
Conference papers
hal-01569557v1
|
||
|
A Formal Notion of Trust - Enabling Reasoning about Security Properties4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.200-215, ⟨10.1007/978-3-642-13446-3_14⟩
Conference papers
hal-01061328v1
|
||
|
Runtime Firmware Product Lines Using TPM2.032th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.248-261, ⟨10.1007/978-3-319-58469-0_17⟩
Conference papers
hal-01649005v1
|
||
|
Decision Support for Mobile App Selection via Automated Privacy Assessment14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.292-307, ⟨10.1007/978-3-030-42504-3_19⟩
Conference papers
hal-03378976v1
|
||
|
Secure Attestation of Virtualized Environments35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.203-216, ⟨10.1007/978-3-030-58201-2_14⟩
Conference papers
hal-03440811v1
|
||
|
A Novel Approach for Generating Synthetic Datasets for Digital Forensics16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.73-93, ⟨10.1007/978-3-030-56223-6_5⟩
Conference papers
hal-03657236v1
|
||
|
Privacy-Preserving IDS for In-Vehicle Networks with Local Differential Privacy15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.58-77, ⟨10.1007/978-3-030-72465-8_4⟩
Conference papers
hal-03703761v1
|
||
|
Comparison of cyber attacks on services in the clearnet and darknet17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.39-61, ⟨10.1007/978-3-030-88381-2_3⟩
Conference papers
hal-03764381v1
|