Filter your results
- 19
- 1
- 19
- 1
- 20
- 1
- 1
- 1
- 1
- 2
- 7
- 2
- 3
- 2
- 20
- 1
- 1
- 1
- 1
- 1
- 6
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.63-83, ⟨10.1007/978-3-030-81242-3_4⟩
Conference papers
hal-03677024v1
|
||
|
Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.203-214, ⟨10.1007/978-3-030-56223-6_11⟩
Conference papers
hal-03657233v1
|
||
|
The Effects of Fixed-Strategy Agents on Local Convention Emergence in Multi-agent Systems10th International Conference on Intelligent Information Processing (IIP), Oct 2018, Nanning, China. pp.99-108, ⟨10.1007/978-3-030-00828-4_11⟩
Conference papers
hal-02197792v1
|
||
|
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.185-204, ⟨10.1007/978-3-319-61176-1_10⟩
Conference papers
hal-01684371v1
|
||
|
Profiling Flash Mob Organizers in Web Discussion Forums12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.281-293, ⟨10.1007/978-3-319-46279-0_14⟩
Conference papers
hal-01758678v1
|
||
|
Forensic Analysis of a Siemens Programmable Logic Controller10th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2016, Arlington, VA, United States. pp.117-130, ⟨10.1007/978-3-319-48737-3_7⟩
Conference papers
hal-01614856v1
|
||
|
A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.115-128, ⟨10.1007/978-3-319-24123-4_7⟩
Conference papers
hal-01449073v1
|
||
|
Dynamic Programming-Based Lifetime Reliability Optimization in Networks-on-Chip22th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC 2014), Oct 2014, Playa del Carmen, Mexico. pp.1-20, ⟨10.1007/978-3-319-25279-7_1⟩
Conference papers
hal-01383724v1
|
||
|
An Empirical Study on Android for Saving Non-shared Data on Public Storage30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.542-556, ⟨10.1007/978-3-319-18467-8_36⟩
Conference papers
hal-01345145v1
|
||
|
PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.97-113, ⟨10.1007/978-3-319-24123-4_6⟩
Conference papers
hal-01449072v1
|
||
|
AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.61-76, ⟨10.1007/978-3-319-24123-4_4⟩
Conference papers
hal-01449071v1
|
||
|
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.215-231, ⟨10.1007/978-3-319-24123-4_13⟩
Conference papers
hal-01449060v1
|
||
|
A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.251-267, ⟨10.1007/978-3-319-24123-4_15⟩
Conference papers
hal-01449062v1
|
||
|
Perfect Pipelining for Streaming Large File in Peer-to-Peer Networks8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.27-38, ⟨10.1007/978-3-662-44602-7_3⟩
Conference papers
hal-01402025v1
|
||
|
Optimal Design of Remote Center Compliance Devices of Rotational Symmetry7th International Precision Assembly Seminar (IPAS), Feb 2014, Chamonix, France. pp.161-169, ⟨10.1007/978-3-662-45586-9_20⟩
Conference papers
hal-01260756v1
|
||
|
Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.172-183, ⟨10.1007/978-3-642-30054-7_14⟩
Conference papers
hal-01531970v1
|
||
|
VLSI-SoC: Advanced Research for Systems on ChipSpringer, AICT-379, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-32770-4. ⟨10.1007/978-3-642-32770-4⟩
Books
hal-01519769v1
|
||
|
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.129-142, ⟨10.1007/978-3-642-33962-2_9⟩
Conference papers
hal-01523716v1
|
||
|
Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.81-100, ⟨10.1007/978-3-642-25821-3_5⟩
Conference papers
hal-01597754v1
|
||
|
A Matrix-Analytic Solution for Randomized Load Balancing Models with PH Service TimesPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.240-253, ⟨10.1007/978-3-642-25575-5_20⟩
Conference papers
hal-01586888v1
|