Filter your results
- 53
- 5
- 1
- 57
- 1
- 1
- 59
- 2
- 2
- 5
- 14
- 2
- 2
- 4
- 8
- 2
- 4
- 3
- 9
- 4
- 59
- 11
- 8
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 6
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers
hal-00692171v1
|
||
|
Novel lightweight signcryption-based key distribution mechanisms for MIKEY10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Conference papers
hal-01391308v1
|
||
|
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
Conference papers
hal-02496273v1
|
||
|
Proximity-Based Trust Inference for Mobile Social NetworkingTrust Management V, Jun 2011, Copenhagen, Denmark. pp.253-264, ⟨10.1007/978-3-642-22200-9_20⟩
Conference papers
inria-00617630v1
|
||
|
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩
Conference papers
hal-01131975v2
|
||
|
How to Teach the Undecidability of Malware Detection Problem and Halting ProblemWISE13: The 13th World Conference on Information Security Education, May 2020, Maribor, Slovenia
Conference papers
hal-02559585v1
|
||
|
When Clocks Fail: On Critical Paths and Clock Faults9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers
emse-00505344v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
Embedded Eavesdropping on Java Card27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.37-48, ⟨10.1007/978-3-642-30436-1_4⟩
Conference papers
hal-00706186v1
|
||
|
Composing Trust Models towards Interoperable Trust Management5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.51-66, ⟨10.1007/978-3-642-22200-9_7⟩
Conference papers
inria-00617629v1
|
||
|
Automated classification of C&C connections through malware URL clustering 2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Conference papers
hal-01255089v1
|
||
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
Using Task Descriptions with Explicit Representation of Allocation of Functions, Authority and Responsibility to Design and Assess Automation5th IFIP Working Conference on Human Work Interaction Design (HWID), Aug 2018, Espoo, Finland. pp.36-56, ⟨10.1007/978-3-030-05297-3_3⟩
Conference papers
hal-02089260v1
|
||
|
Enhanced Task Modelling for Systematic Identification and Explicit Representation of Human Errors15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.192-212, ⟨10.1007/978-3-319-22723-8_16⟩
Conference papers
hal-01387758v1
|
||
|
Deep System Knowledge Required: Revisiting UCD Contribution in the Design of Complex Command and Control Systems17th IFIP Conference on Human-Computer Interaction (INTERACT 2019), Sep 2019, Paphos, Cyprus. pp.699-720, ⟨10.1007/978-3-030-29381-9_42⟩
Conference papers
hal-02435352v1
|
||
|
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers
hal-02294599v1
|
||
|
Output-sensitive Information flow analysis39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.93-110, ⟨10.1007/978-3-030-21759-4_6⟩
Conference papers
hal-02303984v1
|
||
|
One-Time Biometrics for Online Banking and Electronic Payment AuthenticationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers
hal-01076676v1
|
||
|
Performance of Password Guessing Enumerators Under Cracking ConditionsICT Systems Security and Privacy Protection - IFIP SEC, Gurpreet Dhillon, Jun 2019, Lisbonne, Portugal. pp.67-80, ⟨10.1007/978-3-030-22312-0_5⟩
Conference papers
hal-02060091v1
|
||
|
Dynamics in Delegation and Revocation Schemes: A Logical Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, United States. pp.90-105, ⟨10.1007/978-3-642-22348-8_9⟩
Conference papers
inria-00593654v2
|
||
|
Software Defined Networking Reactive Stateful Firewall31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers
hal-01333445v1
|
||
|
Distributed Random Process for a Large-Scale Peer-to-Peer Lottery17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.34-48, ⟨10.1007/978-3-319-59665-5_3⟩
Conference papers
hal-01583824v1
|
||
|
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation34th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (also known as DBSEC), Jun 2020, Conférence online, Germany. pp.347-366, ⟨10.1007/978-3-030-49669-2_20⟩
Conference papers
hal-02544920v1
|
||
|
Information Security Theory and Practice: Securing the Internet of ThingsDavid Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books
hal-01098408v1
|
||
|
Sanitization of Call Detail Records via Differentially-Private Bloom Filters29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.223-230, ⟨10.1007/978-3-319-20810-7_15⟩
Conference papers
hal-01745827v1
|
||
|
Removing Problems in Rule-Based PoliciesSEC 2019 : ICT Systems Security and Privacy Protection, Jun 2019, Lisbon, Portugal. pp.120-133, ⟨10.1007/978-3-030-22312-0_9⟩
Conference papers
hal-02169342v1
|
||
|
Extending UPPAAL for the Modeling and Verification of Dynamic Real-Time Systems5th International Conference on Fundamentals of Software Engineering (FSEN 2013), Apr 2013, Tehran, Iran. pp.111-132, ⟨10.1007/978-3-642-40213-5_8⟩
Conference papers
hal-01231765v1
|
||
|
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.557-570, ⟨10.1007/978-3-319-18467-8_37⟩
Conference papers
hal-01246353v1
|
||
|
Managing Secure Inter-slice Communication in 5G Network Slice ChainsManaging Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections
hal-02876588v1
|
- 1
- 2