Filter your results
- 9
- 1
- 9
- 1
- 10
- 1
- 5
- 4
- 10
- 5
- 1
- 1
- 1
- 1
- 5
- 5
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Dedicated Hardware for Attribute-Based Credential Verification14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.50-65, ⟨10.1007/978-3-642-40779-6_4⟩
Conference papers
hal-01492833v1
|
||
|
Privacy-Preserving Scheduling Mechanism for eHealth Systems13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers
hal-01540885v1
|
||
|
Designing Privacy-Enhancing Mobile Applications7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.157-170, ⟨10.1007/978-3-642-31668-5_12⟩
Conference papers
hal-01517593v1
|
||
|
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.555-560, ⟨10.1007/978-3-642-30436-1_48⟩
Conference papers
hal-01518223v1
|
||
|
Privacy Preserving Mechanisms for a Pervasive eHealth System7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.221-231, ⟨10.1007/978-3-642-31668-5_17⟩
Conference papers
hal-01517608v1
|
||
|
Data-Minimizing Authentication Goes Mobile13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers
hal-01540904v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7025, 2011, Lecture Notes in Computer Science, 978-3-642-24711-8. ⟨10.1007/978-3-642-24712-5⟩
Books
hal-01596212v1
|
||
|
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.163-170, ⟨10.1007/978-3-642-24712-5_14⟩
Conference papers
hal-01596195v1
|
||
|
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.171-177, ⟨10.1007/978-3-642-24712-5_15⟩
Conference papers
hal-01596204v1
|
||
|
Analysis of Revocation Strategies for Anonymous Idemix Credentials12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers
hal-01596188v1
|