Search - IFIP Open Digital Library Access content directly

Filter your results

26 results
Structure: Internal structure identifier : 104741
Image document

Semantic Exploration of DNS

Samuel Marchal , Jérôme François , Cynthia Wagner , Thomas Engel
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.370-384, ⟨10.1007/978-3-642-30045-5_28⟩
Conference papers hal-00712849v1
Image document

Click or Strike: Realistic versus Standard Game Controls in Violent Video Games and Their Effects on Aggression

André Melzer , Ingmar Derks , Jens Heydekorn , Georges Steffgen
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.171-182, ⟨10.1007/978-3-642-15399-0_16⟩
Conference papers hal-01055645v1
Image document

An Autonomic Testing Framework for IPv6 Configuration Protocols

Sheila Becker , Humberto Abdelnur , Radu State , Thomas Engel
4th International Conference on Autonomous Infrastructure, Management and Security - AIMS 2010, University of Zurich, Jun 2010, Zurich, Switzerland. pp.65-76, ⟨10.1007/978-3-642-13986-4_7⟩
Conference papers inria-00546171v1
Image document

Secure Delegation of Elliptic-Curve Pairing

Benoît Chevallier-Mames , Jean-Sébastien Coron , Noel Mccullagh , David Naccache , Michael Scott
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.24-35, ⟨10.1007/978-3-642-12510-2_3⟩
Conference papers hal-01056101v1
Image document

Instant Degradation of Anonymity in Low-Latency Anonymisation Systems

Thorsten Ries , Radu State , Thomas Engel
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.98-108, ⟨10.1007/978-3-642-30633-4_12⟩
Conference papers hal-01529794v1
Image document

Large Scale DNS Analysis

Samuel Marchal , Thomas Engel
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.151-154, ⟨10.1007/978-3-642-30633-4_20⟩
Conference papers hal-01529799v1
Image document

Privacy and Identity Management

Michael Friedewald , Stefan Schiffner , Stephan Krenn
Springer International Publishing, AICT-619, 2021, IFIP Advances in Information and Communication Technology, 978-3-030-72464-1. ⟨10.1007/978-3-030-72465-8⟩
Books hal-03703756v1
Image document

BotTrack: Tracking Botnets Using NetFlow and PageRank

Jérôme François , Shaonan Wang , Radu State , Thomas Engel
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.1-14, ⟨10.1007/978-3-642-20757-0_1⟩
Conference papers inria-00613597v1
Image document

Machine Learning Approach for IP-Flow Record Anomaly Detection

Cynthia Wagner , Jérôme François , Radu State , Thomas Engel
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.28-39, ⟨10.1007/978-3-642-20757-0_3⟩
Conference papers inria-00613602v1
Image document

Lifecycle Management in the Smart City Context: Smart Parking Use-Case

Ahmed Hefnawy , Mohammed Taha Elhariri Essamlali , Abdelaziz Bouras , Chantal Cherifi , Jérémy Robert , et al.
13th IFIP International Conference on Product Lifecycle Management (PLM 2016), Jul 2016, Columbia, SC, United States. pp.631-641, ⟨10.1007/978-3-319-54660-5_56⟩
Conference papers hal-01531772v1
Image document

The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem

Christof Ferreira Torres , Rolando Trujillo-Rasua
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.19-34, ⟨10.1007/978-3-319-41483-6_2⟩
Conference papers hal-01633679v1
Image document

Exploring IoT Protocols Through the Information-Centric Networking's Lens

Salvatore Signorello , Radu State , Olivier Festor
9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.56-60, ⟨10.1007/978-3-319-20034-7_6⟩
Conference papers hal-01251165v1
Image document

Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information

Georgios Pitsilis , Xiangliang Zhang , Wei Wang
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.82-97, ⟨10.1007/978-3-642-22200-9_9⟩
Conference papers hal-01568681v1
Image document

Don’t Put the Cart Before the Horse – Effective Incident Handling Under GDPR and NIS Directive

Sandra Schmitz-Berndt , Stefan Schiffner
15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.3-17, ⟨10.1007/978-3-030-72465-8_1⟩
Conference papers hal-03703760v1
Image document

A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things

Hao Cheng , Daniel Dinu , Johann Grossschädl , Peter B. Rønne , Peter Ryan
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.103-119, ⟨10.1007/978-3-030-41702-4_7⟩
Conference papers hal-03173904v1
Image document

Detecting Stealthy Backdoors with Association Rule Mining

Stefan Hommes , Radu State , Thomas Engel
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.161-171, ⟨10.1007/978-3-642-30054-7_13⟩
Conference papers hal-01531956v1
Image document

Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project

Thomas Schaberreiter , Sébastien Varrette , Pascal Bouvry , Juha Röning , Djamel Khadraoui
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.269-287
Conference papers hal-01506574v1
Image document

Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases

Romain Delamare , Freddy Munoz , Benoit Baudry , Yves Traon
22nd IFIP WG 6.1 International Conference on Testing Software and Systems (ICTSS), Nov 2010, Natal, Brazil. pp.250-265, ⟨10.1007/978-3-642-16573-3_18⟩
Conference papers inria-00555069v2
Image document

Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function

Cynthia Wagner , Thomas Engel
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.122-125, ⟨10.1007/978-3-642-30633-4_16⟩
Conference papers hal-01529787v1
Image document

Cleaning Your House First: Shifting the Paradigm on How to Secure Networks

Jérôme François , Giovane César Moreira Moura , Aiko Pras
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.1-12, ⟨10.1007/978-3-642-21484-4_1⟩
Conference papers inria-00613607v1
Image document

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

Johann Grossschädl , Dan Page , Stefan Tillich
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.189-207, ⟨10.1007/978-3-642-30955-7_17⟩
Conference papers hal-01534311v1
Image document

Attack Trees with Sequential Conjunction

Barbara Kordy , Ravi Jhawar , Sjouke Mauw , Sasa Radomirovic , Roland Trujillo-Rasua
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.339-353, ⟨10.1007/978-3-319-18467-8_23⟩
Conference papers hal-01197256v1
Image document

Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software

Oğuz Özgür Karadeniz , Stefan Schiffner
14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.177-189, ⟨10.1007/978-3-030-42504-3_12⟩
Conference papers hal-03378966v1
Image document

A Family of Lightweight Twisted Edwards Curves for the Internet of Things

Sankalp Ghatpande , Johann Grossschädl , Zhe Liu
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.193-206, ⟨10.1007/978-3-030-20074-9_14⟩
Conference papers hal-02294608v1
Image document

Transformation Systems with Incremental Negative Application Conditions

Andrea Corradini , Reiko Heckel , Frank Hermann , Susann Gottmann , Nico Nachtigall
21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.127-142, ⟨10.1007/978-3-642-37635-1_8⟩
Conference papers hal-01485982v1
Image document

Pervasive Gaming as a Potential Solution to Traffic Congestion: New Challenges Regarding Ethics, Privacy and Trust

Vincent Koenig , Franziska Boehm , Rod Mccall
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.586-593, ⟨10.1007/978-3-642-33542-6_78⟩
Conference papers hal-01556169v1