Search - IFIP Open Digital Library Access content directly

Filter your results

59 results
Sub-domain level 1 : info.info-cr
Image document

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Guillaume Barbu , Guillaume Duc , Philippe Hoogvorst
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers hal-00692171v1
Image document

Novel lightweight signcryption-based key distribution mechanisms for MIKEY

Kim Thuat Nguyen , Nouha Ouahla , Maryline Laurent
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Conference papers hal-01391308v1
Image document

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Tidiane Sylla , Mohamed Aymen Chalouf , Francine Krief , Karim Samaké
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
Conference papers hal-02496273v1
Image document

Proximity-Based Trust Inference for Mobile Social Networking

Amir Seyedi , Rachid Saadi , Valérie Issarny
Trust Management V, Jun 2011, Copenhagen, Denmark. pp.253-264, ⟨10.1007/978-3-642-22200-9_20⟩
Conference papers inria-00617630v1
Image document

Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings

Paul Lajoie-Mazenc , Emmanuelle Anceaume , Gilles Guette , Thomas Sirvent , Valérie Viet Triem Tong
9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩
Conference papers hal-01131975v2
Image document

How to Teach the Undecidability of Malware Detection Problem and Halting Problem

Matthieu Journault , Pascal Lafourcade , Malika More , Rémy Poulain , Léo Robert
WISE13: The 13th World Conference on Information Security Education, May 2020, Maribor, Slovenia
Conference papers hal-02559585v1

When Clocks Fail: On Critical Paths and Clock Faults

Michel Agoyan , Jean-Max Dutertre , David Naccache , Bruno Robisson , Assia Tria
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers emse-00505344v1
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

Embedded Eavesdropping on Java Card

Guillaume Barbu , Christophe Giraud , Vincent Guerin
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.37-48, ⟨10.1007/978-3-642-30436-1_4⟩
Conference papers hal-00706186v1
Image document

Composing Trust Models towards Interoperable Trust Management

Rachid Saadi , Mohammad Ashiqur Rahaman, , Valérie Issarny , Alessandra Toninelli
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.51-66, ⟨10.1007/978-3-642-22200-9_7⟩
Conference papers inria-00617629v1
Image document

Automated classification of C&C connections through malware URL clustering

Nizar Kheir , Gregory Blanc , Hervé Debar , Joaquin Garcia-Alfaro , Dingqi Yang
2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Conference papers hal-01255089v1
Image document

Handling Stateful Firewall Anomalies

Frédéric Cuppens , Nora Cuppens-Boulahia , Joaquin Garcia Alfaro , Tarik Moataz , Xavier Rimasson
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers hal-00737170v1
Image document

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

Hao Jiang , Ahmed Bouabdallah
WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers hal-01802720v1
Image document

Using Task Descriptions with Explicit Representation of Allocation of Functions, Authority and Responsibility to Design and Assess Automation

Elodie Bouzekri , Alexandre Canny , Célia Martinie , Philippe Palanque , Christine Gris
5th IFIP Working Conference on Human Work Interaction Design (HWID), Aug 2018, Espoo, Finland. pp.36-56, ⟨10.1007/978-3-030-05297-3_3⟩
Conference papers hal-02089260v1
Image document

Enhanced Task Modelling for Systematic Identification and Explicit Representation of Human Errors

Racim Fahssi , Célia Martinie , Philippe Palanque
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.192-212, ⟨10.1007/978-3-319-22723-8_16⟩
Conference papers hal-01387758v1
Image document

Deep System Knowledge Required: Revisiting UCD Contribution in the Design of Complex Command and Control Systems

Elodie Bouzekri , Alexandre Canny , Célia Martinie , Philippe Palanque , Christine Gris
17th IFIP Conference on Human-Computer Interaction (INTERACT 2019), Sep 2019, Paphos, Cyprus. pp.699-720, ⟨10.1007/978-3-030-29381-9_42⟩
Conference papers hal-02435352v1
Image document

Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers

Etienne Tehrani , Jean-Luc Danger , Tarik Graba
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers hal-02294599v1
Image document

Output-sensitive Information flow analysis

Cristian Ene , Laurent Mounier , Marie-Laure Potet
39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.93-110, ⟨10.1007/978-3-030-21759-4_6⟩
Conference papers hal-02303984v1
Image document

One-Time Biometrics for Online Banking and Electronic Payment Authentication

Aude Plateaux , Patrick Lacharme , Christophe Rosenberger , Audun Jøsang
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers hal-01076676v1
Image document

Performance of Password Guessing Enumerators Under Cracking Conditions

Mathieu Valois , Patrick Lacharme , Jean-Marie Le Bars
ICT Systems Security and Privacy Protection - IFIP SEC, Gurpreet Dhillon, Jun 2019, Lisbonne, Portugal. pp.67-80, ⟨10.1007/978-3-030-22312-0_5⟩
Conference papers hal-02060091v1
Image document

Dynamics in Delegation and Revocation Schemes: A Logical Approach

Guillaume Aucher , Steve Barker , Guido Boella , Valerio Genovese , Leendert van Der Torre
23th Data and Applications Security (DBSec), Jul 2011, Richmond, United States. pp.90-105, ⟨10.1007/978-3-642-22348-8_9⟩
Conference papers inria-00593654v2
Image document

Software Defined Networking Reactive Stateful Firewall

Salah Eddine S. E. Zerkane , Philippe Le Parc , Frederic Cuppens , David Espes
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers hal-01333445v1
Image document

Distributed Random Process for a Large-Scale Peer-to-Peer Lottery

Stéphane Grumbach , Robert Riemann
17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.34-48, ⟨10.1007/978-3-319-59665-5_3⟩
Conference papers hal-01583824v1

GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation

Radu Ciucanu , Pascal Lafourcade
34th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (also known as DBSEC), Jun 2020, Conférence online, Germany. pp.347-366, ⟨10.1007/978-3-030-49669-2_20⟩
Conference papers hal-02544920v1

Information Security Theory and Practice: Securing the Internet of Things

David Naccache , Damien Sauveron
David Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books hal-01098408v1
Image document

Sanitization of Call Detail Records via Differentially-Private Bloom Filters

Mohammad Alaggan , Sébastien Gambs , Stan Matwin , Mohammed Tuhin
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.223-230, ⟨10.1007/978-3-319-20810-7_15⟩
Conference papers hal-01745827v1
Image document

Removing Problems in Rule-Based Policies

Zheng Cheng , Jean-Claude Royer , Massimo Tisi
SEC 2019 : ICT Systems Security and Privacy Protection, Jun 2019, Lisbon, Portugal. pp.120-133, ⟨10.1007/978-3-030-22312-0_9⟩
Conference papers hal-02169342v1
Image document

Extending UPPAAL for the Modeling and Verification of Dynamic Real-Time Systems

Abdeldjalil Boudjadar , Frits Vaandrager , Jean-Paul Bodeveix , M Filali
5th International Conference on Fundamentals of Software Engineering (FSEN 2013), Apr 2013, Tehran, Iran. pp.111-132, ⟨10.1007/978-3-642-40213-5_8⟩
Conference papers hal-01231765v1
Image document

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation

Mohamed Sabt , Mohammed Achemlal , Abdelmadjid Bouabdallah
30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.557-570, ⟨10.1007/978-3-319-18467-8_37⟩
Conference papers hal-01246353v1

Managing Secure Inter-slice Communication in 5G Network Slice Chains

Luis Suárez , David Espes , Frédéric Cuppens , Cao-Thanh Phan , Philippe Bertin , et al.
Managing Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections hal-02876588v1