Filter your results
- 13
- 13
- 13
- 1
- 1
- 3
- 5
- 2
- 2
- 13
- 13
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.158-173, ⟨10.1007/978-3-642-29852-3_11⟩
Conference papers
hal-01517646v1
|
||
|
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers
hal-01573294v1
|
||
|
Adaptive User-Centered SecurityInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers
hal-01403988v1
|
||
|
Similarity Hashing Based on Levenshtein Distances10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.133-147, ⟨10.1007/978-3-662-44952-3_10⟩
Conference papers
hal-01393767v1
|
||
|
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.66-82, ⟨10.1007/978-3-642-38323-6_5⟩
Conference papers
hal-01468184v1
|
||
|
Using Approximate Matching to Reduce the Volume of Digital Data10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.149-163, ⟨10.1007/978-3-662-44952-3_11⟩
Conference papers
hal-01393769v1
|
||
|
Modeling the German Legal Latitude Principles5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers
hal-01491259v1
|
||
|
An Efficient Lattice-Based Secret Sharing Construction6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.160-168, ⟨10.1007/978-3-642-30955-7_14⟩
Conference papers
hal-01534304v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
Coercion-Resistant Proxy Voting31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.3-16, ⟨10.1007/978-3-319-33630-5_1⟩
Conference papers
hal-01369533v1
|
||
|
Reducing the Time Required for Hashing Operations9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers
hal-01460624v1
|
||
|
Extending LSCs for Behavioral Signature Modeling26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.293-304, ⟨10.1007/978-3-642-21424-0_24⟩
Conference papers
hal-01567608v1
|
||
|
Robust Hash Algorithms for Text14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers
hal-01492815v1
|