Filter your results
- 8
- 8
- 8
- 7
- 1
- 16
- 1
- 1
- 2
- 1
- 1
- 2
- 3
- 2
- 3
- 16
- 4
- 2
- 1
- 1
- 5
- 10
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.34-52, ⟨10.1007/978-3-642-37282-7_4⟩
Conference papers
hal-01470502v1
|
||
|
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.286-298, ⟨10.1007/978-3-030-22312-0_20⟩
Conference papers
hal-03744308v1
|
||
Privacy and Identity Management for the Future Internet in the Age of GlobalisationSpringer, AICT-457, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7
Books
hal-01431602v1
|
|||
Open Problems in Network SecuritySpringer, LNCS-7039, 2012, Lecture Notes in Computer Science, 978-3-642-27584-5. ⟨10.1007/978-3-642-27585-2⟩
Books
hal-01481511v1
|
|||
|
Privacy and Identity Management. Time for a Revolution?Springer International Publishing, AICT-476, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9⟩
Books
hal-01619751v1
|
||
|
Future Challenges in Security and Privacy for Academia and IndustrySpringer, AICT-354, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-21424-0⟩
Books
hal-01567585v1
|
||
|
Fair Private Set Intersection with a Semi-trusted Arbiter27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers
hal-01490721v1
|
||
|
Concepts Around Privacy-Preserving Attribute-Based CredentialsMarit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.53-63, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_4⟩
Book sections
hal-01276046v1
|
||
|
Open Research Problems in Network SecuritySpringer, LNCS-6555, 2011, Lecture Notes in Computer Science, 978-3-642-19227-2. ⟨10.1007/978-3-642-19228-9⟩
Books
hal-01581329v1
|
||
Open Problems in Network SecurityINETSEC-2017, 2017, Open Problems in Network Security
Books
hal-01666537v1
|
|||
|
Mixing Identities with EaseSecond IFIP WG 11.6 Working Conference on Policies and Reseach Management (IDMAN), Nov 2010, Oslo, Norway. pp.1-17, ⟨10.1007/978-3-642-17303-5_1⟩
Conference papers
hal-01054404v1
|
||
|
Open Problems in Network SecuritySpringer, LNCS-9591, 2016, Open Problems in Network Security, 978-3-319-39027-7. ⟨10.1007/978-3-319-39028-4⟩
Books
hal-01445799v1
|
||
|
Data-Minimizing Authentication Goes Mobile13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers
hal-01540904v1
|
||
|
Saving On-Line Privacy5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.34-47, ⟨10.1007/978-3-642-14282-6_3⟩
Conference papers
hal-01061059v1
|
||
|
Privacy and Identity Management for LifeSpringer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books
hal-01517673v1
|
||
|
Privacy-Friendly Incentives and Their Application to WikipediaSecond IFIP WG 11.6 Working Conference on Policies and Reseach Management (IDMAN), Nov 2010, Oslo, Norway. pp.113-129, ⟨10.1007/978-3-642-17303-5_9⟩
Conference papers
hal-01054396v1
|