Filter your results
- 19
- 17
- 1
- 1
- 19
- 1
- 1
- 1
- 4
- 1
- 3
- 1
- 2
- 2
- 2
- 1
- 19
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 7
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Evaluating the Privacy Implications of Frequent Itemset Disclosure32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.506-519, ⟨10.1007/978-3-319-58469-0_34⟩
Conference papers
hal-01649007v1
|
||
|
Secure and Efficient k-NN Queries32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.155-170, ⟨10.1007/978-3-319-58469-0_11⟩
Conference papers
hal-01649018v1
|
||
|
Enabling the Deployment of ABAC Policies in RBAC Systems32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.51-68, ⟨10.1007/978-3-319-95729-6_4⟩
Conference papers
hal-01954419v1
|
||
|
Toward Mining of Temporal Roles27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers
hal-01490718v1
|
||
|
Privacy-Preserving Subgraph Discovery26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.161-176, ⟨10.1007/978-3-642-31540-4_13⟩
Conference papers
hal-01534763v1
|
||
|
Role Mining in the Presence of Noise24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.97-112, ⟨10.1007/978-3-642-13739-6_7⟩
Conference papers
hal-01056666v1
|
||
|
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers
hal-01284854v1
|
||
|
Migrating from DAC to RBAC29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.69-84, ⟨10.1007/978-3-319-20810-7_5⟩
Conference papers
hal-01745820v1
|
||
|
Information Security and Privacy – Challenges and OutlookAdvancing Research in Information and Communication Technology, AICT-600, pp.383-401, 2021, ⟨10.1007/978-3-030-81701-5_16⟩
Book sections
hal-03325978v1
|
||
|
Data and Applications Security and Privacy XXXIVSpringer International Publishing, LNCS-12122, 2020, Lecture Notes in Computer Science, 978-3-030-49668-5. ⟨10.1007/978-3-030-49669-2⟩
Books
hal-03243621v1
|
||
|
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.281-295, ⟨10.1007/978-3-319-58469-0_19⟩
Conference papers
hal-01649012v1
|
||
|
Enhancing the Security of Image CAPTCHAs Through Noise Addition30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.354-368, ⟨10.1007/978-3-319-18467-8_24⟩
Conference papers
hal-01345127v1
|
||
|
Lightweight Practical Private One-Way Anonymous Messaging9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.76-91, ⟨10.1007/978-3-319-18491-3_6⟩
Conference papers
hal-01416208v1
|
||
|
Efficient Distributed Linear Programming with Limited Disclosure23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers
hal-01586592v1
|
||
|
Preventing Unauthorized Data Flows31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.41-62, ⟨10.1007/978-3-319-61176-1_3⟩
Conference papers
hal-01684345v1
|
||
|
Analysis of TRBAC with Dynamic Temporal Role Hierarchies27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.297-304, ⟨10.1007/978-3-642-39256-6_22⟩
Conference papers
hal-01490714v1
|
||
|
An Optimization Model for the Extended Role Mining Problem23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers
hal-01586595v1
|
||
|
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.17-35, ⟨10.1007/978-3-642-29852-3_2⟩
Conference papers
hal-01517652v1
|
||
|
Deciphering Text from Touchscreen Key Taps30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers
hal-01633681v1
|