Search - IFIP Open Digital Library Access content directly

Filter your results

6 results
Structure: Internal structure identifier : 98761
publicationDateY_i : 2013

Formal Techniques for Distributed Systems

Dirk Beyer , Michele Boreale
Springer, LNCS-7892, 2013, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-38592-6⟩
Books hal-01515249v1
Image document

Malleable Signatures for Resource Constrained Platforms

Henrich C. Pöhls , Stefan Peters , Kai Samelin , Joachim Posegga , Hermann De Meer
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.18-33, ⟨10.1007/978-3-642-38530-8_2⟩
Conference papers hal-01485931v1
Image document

Network Forensics for Cloud Computing

Tobias Gebhardt , Hans P. Reiser
13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.29-42, ⟨10.1007/978-3-642-38541-4_3⟩
Conference papers hal-01489462v1
Image document

FITCH: Supporting Adaptive Replicated Services in the Cloud

Vinicius V. Cogo , André Nogueira , João Sousa , Marcelo Pasin , Hans P. Reiser , et al.
13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.15-28, ⟨10.1007/978-3-642-38541-4_2⟩
Conference papers hal-01489461v1
Image document

Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity

Henrich C. Pöhls
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.136-150, ⟨10.1007/978-3-642-38323-6_10⟩
Conference papers hal-01468199v1
Image document

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

Daniel Schreckling , Stephan Huber , Focke Höhne , Joachim Posegga
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.50-65, ⟨10.1007/978-3-642-38530-8_4⟩
Conference papers hal-01485933v1