Filter your results
- 71
- 2
- 67
- 4
- 2
- 73
- 12
- 1
- 2
- 7
- 9
- 8
- 4
- 7
- 4
- 7
- 8
- 3
- 8
- 6
- 73
- 10
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 10
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Value-Based Core Areas of Trustworthiness in Online Services13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.81-97, ⟨10.1007/978-3-030-33716-2_7⟩
Conference papers
hal-03182614v1
|
||
|
Using Behavioral Indicators to Assess Competences in a Sustainable Manufacturing Learning Scenario19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.582-589, ⟨10.1007/978-3-642-40352-1_73⟩
Conference papers
hal-01472296v1
|
||
|
Usability Reporting with UsabML4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.342-351, ⟨10.1007/978-3-642-34347-6_26⟩
Conference papers
hal-01556829v1
|
||
|
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2021, Oslo, Norway. pp.19-35, ⟨10.1007/978-3-030-78120-0_2⟩
Conference papers
hal-03746047v1
|
||
|
Trigger Alarm: A Smart NFC Sniffer for High-Precision Measurements32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.186-200, ⟨10.1007/978-3-030-64881-7_12⟩
Conference papers
hal-03239810v1
|
||
|
TPL: A Trust Policy Language13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.209-223, ⟨10.1007/978-3-030-33716-2_16⟩
Conference papers
hal-03182603v1
|
||
|
Towards More Practical Time-Driven Cache Attacks8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.24-39, ⟨10.1007/978-3-662-43826-8_3⟩
Conference papers
hal-01400918v1
|
||
|
Towards Authenticity and Privacy Preserving Accountable WorkflowsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.170-186, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_12⟩
Book sections
hal-01619735v1
|
||
|
The Shortest Path Game: Complexity and Algorithms8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.39-53, ⟨10.1007/978-3-662-44602-7_4⟩
Conference papers
hal-01402026v1
|
||
|
Testing TLS Using Combinatorial Methods and Execution Framework29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.162-177, ⟨10.1007/978-3-319-67549-7_10⟩
Conference papers
hal-01678990v1
|
||
|
Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.124-140, ⟨10.1007/978-3-319-25945-1_8⟩
Conference papers
hal-01470160v1
|
||
|
Testing Chatbots Using Metamorphic Relations31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.41-55, ⟨10.1007/978-3-030-31280-0_3⟩
Conference papers
hal-02526355v1
|
||
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and RequirementsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.79-96, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_6⟩
Book sections
hal-01619744v1
|
||
|
Side-Channel Leakage across Borders9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.36-48, ⟨10.1007/978-3-642-12510-2_4⟩
Conference papers
hal-01056100v1
|
||
|
Scaling and Internationalizing an Agile FOSS Project: Lessons Learned11th International Conference on Open Source Systems (OSS), May 2015, Florence, Italy. pp.13-22, ⟨10.1007/978-3-319-17837-0_2⟩
Conference papers
hal-01320155v1
|
||
|
Reconciling Practice and Rigour in Ontology-Based Heterogeneous Information Systems Construction11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.205-220, ⟨10.1007/978-3-030-02302-7_13⟩
Conference papers
hal-02156454v1
|
||
|
Recommender Systems for IoT Enabled m-Health Applications14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2018, Rhodes, Greece. pp.227-237, ⟨10.1007/978-3-319-92016-0_21⟩
Conference papers
hal-01821320v1
|
||
|
Qualified Mobile Server Signature25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.103-111, ⟨10.1007/978-3-642-15257-3_10⟩
Conference papers
hal-01054524v1
|
||
|
Property-Based Testing for Parameter Learning of Probabilistic Graphical Models4th International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2020, Dublin, Ireland. pp.499-515, ⟨10.1007/978-3-030-57321-8_28⟩
Conference papers
hal-03414744v1
|
||
|
Privacy-Preserving Analytics for Data Markets Using MPC15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.226-246, ⟨10.1007/978-3-030-72465-8_13⟩
Conference papers
hal-03703757v1
|
||
|
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers
hal-01284842v1
|
||
|
Plan It! Automated Security Testing Based on Planning26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.48-62, ⟨10.1007/978-3-662-44857-1_4⟩
Conference papers
hal-01405274v1
|
||
|
Performance Comparison of Two Search-Based Testing Strategies for ADAS System Validation31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.140-156, ⟨10.1007/978-3-030-31280-0_9⟩
Conference papers
hal-02526346v1
|
||
|
Opportunities and Challenges of CREDENTIALAnja Lehmann; Diane Whitehouse; Simone Fischer-Hübner; Lothar Fritsch; Charles Raab. Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, AICT-498, Springer International Publishing, pp.76-91, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-55782-3. ⟨10.1007/978-3-319-55783-0_7⟩
Book sections
hal-01629170v1
|
||
|
On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.300-314, ⟨10.1007/978-3-642-39218-4_23⟩
Conference papers
hal-01463834v1
|
||
|
Novel Insights on Cross Project Fault Prediction Applied to Automotive Software27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.141-157, ⟨10.1007/978-3-319-25945-1_9⟩
Conference papers
hal-01470161v1
|
||
|
Navigational User Interface Elements on the Left Side: Intuition of Designers or Experimental Evidence?13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.162-177, ⟨10.1007/978-3-642-23771-3_13⟩
Conference papers
hal-01590864v1
|
||
|
Modular Architecture for Adaptable Signature-Creation Tools12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Conference papers
hal-01490913v1
|
||
|
Model Predictive Control of Temperature and Humidity in Heating, Ventilating and Air Conditioning Systems26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.285-295, ⟨10.1007/978-3-662-45504-3_28⟩
Conference papers
hal-01286437v1
|