Filter your results
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 1
- 4
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
FSquaDRA: Fast Detection of Repackaged Applications28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers
hal-01285035v1
|
||
|
Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers
hal-01059143v1
|
||
|
Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.326-334, ⟨10.1007/978-3-319-48393-1_24⟩
Conference papers
hal-01653513v1
|
||
|
Security-by-Contract for the OSGi Platform27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.364-375, ⟨10.1007/978-3-642-30436-1_30⟩
Conference papers
hal-01518231v1
|