Filter your results
- 5
- 5
- 5
- 1
- 1
- 3
- 5
- 1
- 4
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.90-102, ⟨10.1007/978-3-642-15257-3_9⟩
Conference papers
hal-01054578v1
|
||
|
Privacy in Distributed Commercial Applications9th IFIP TC9 International Conference on Human Choice and Computers (HCC) / 1st IFIP TC11 International Conference on Critical Information Infrastructure Protection (CIP) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.214-224, ⟨10.1007/978-3-642-15479-9_21⟩
Conference papers
hal-01058263v1
|
||
|
On the Creation of Reliable Digital Evidence8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.3-17, ⟨10.1007/978-3-642-33962-2_1⟩
Conference papers
hal-01523718v1
|
||
|
Trust in Peer-to-Peer Content Distribution Protocols4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.76-89, ⟨10.1007/978-3-642-12368-9_6⟩
Conference papers
hal-01056065v1
|
||
|
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.630-644, ⟨10.1007/978-3-319-18467-8_42⟩
Conference papers
hal-01345154v1
|