Filter your results
- 6
- 6
- 6
- 1
- 2
- 2
- 1
- 6
- 2
- 1
- 2
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩
Conference papers
hal-01567599v1
|
||
|
Automated Security Analysis of IoT Software Updates13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.223-239, ⟨10.1007/978-3-030-41702-4_14⟩
Conference papers
hal-03173903v1
|
||
|
An Empirical Evaluation of the Android Security Framework28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.176-189, ⟨10.1007/978-3-642-39218-4_14⟩
Conference papers
hal-01463826v1
|
||
|
Trustworthy Opportunistic Access to the Internet of Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers
hal-01480255v1
|
||
|
Automated and Efficient Analysis of Role-Based Access Control with Attributes26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.25-40, ⟨10.1007/978-3-642-31540-4_3⟩
Conference papers
hal-01534765v1
|
||
|
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.13-24, ⟨10.1007/978-3-642-30436-1_2⟩
Conference papers
hal-01518240v1
|