Filter your results
- 5
- 1
- 5
- 1
- 6
- 6
- 2
- 1
- 1
- 2
- 2
- 1
- 3
- 5
- 2
- 1
- 2
- 6
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Formal Techniques for Distributed SystemsSpringer, LNCS-7892, 2013, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-38592-6⟩
Books
hal-01515249v1
|
||
|
Malleable Signatures for Resource Constrained Platforms7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.18-33, ⟨10.1007/978-3-642-38530-8_2⟩
Conference papers
hal-01485931v1
|
||
|
Network Forensics for Cloud Computing13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.29-42, ⟨10.1007/978-3-642-38541-4_3⟩
Conference papers
hal-01489462v1
|
||
|
FITCH: Supporting Adaptive Replicated Services in the Cloud13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.15-28, ⟨10.1007/978-3-642-38541-4_2⟩
Conference papers
hal-01489461v1
|
||
|
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.136-150, ⟨10.1007/978-3-642-38323-6_10⟩
Conference papers
hal-01468199v1
|
||
|
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.50-65, ⟨10.1007/978-3-642-38530-8_4⟩
Conference papers
hal-01485933v1
|