Filter your results
- 22
- 3
- 18
- 4
- 3
- 25
- 1
- 1
- 1
- 2
- 3
- 3
- 5
- 3
- 1
- 5
- 25
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Bayesian Classifiers in Intrusion Detection Systems2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.379-391, ⟨10.1007/978-3-030-45778-5_26⟩
Conference papers
hal-03266456v1
|
||
|
Network Traffic Analysis and QoE Evaluation for Video Progressive Download Service: Netflix13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.239-246, ⟨10.1007/978-3-319-22572-2_17⟩
Conference papers
hal-01728819v1
|
||
|
Information Security and Privacy – Challenges and OutlookAdvancing Research in Information and Communication Technology, AICT-600, pp.383-401, 2021, ⟨10.1007/978-3-030-81701-5_16⟩
Book sections
hal-03325978v1
|
||
|
A4Cloud Workshop: Accountability in the CloudDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.61-78, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_5⟩
Book sections
hal-01619741v1
|
||
|
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.453-472, ⟨10.1007/978-3-319-61176-1_25⟩
Conference papers
hal-01684370v1
|
||
|
Dual Flow Interaction: Scene Flow and Data Flow, Dual Interaction in Art Installations13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.503-506, ⟨10.1007/978-3-642-23768-3_68⟩
Conference papers
hal-01597030v1
|
||
|
Towards a Cooperative Intrusion Detection System for Cognitive Radio NetworksInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.231-242, ⟨10.1007/978-3-642-23041-7_22⟩
Conference papers
hal-01587836v1
|
||
|
Query Privacy in Sensing-as-a-Service Platforms32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.141-154, ⟨10.1007/978-3-319-58469-0_10⟩
Conference papers
hal-01648989v1
|
||
|
Policy Languages and Their Suitability for Trust Negotiation32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.69-84, ⟨10.1007/978-3-319-95729-6_5⟩
Conference papers
hal-01954417v1
|
||
|
Link-Layer Based Anycast Routing for a Dynamic and Distributed Portal Selection in Wireless Mesh Networks9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.374-385, ⟨10.1007/978-3-642-21560-5_31⟩
Conference papers
hal-01583642v1
|
||
|
Tools for Cloud Accountability: A4Cloud TutorialJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.219-236, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_15⟩
Book sections
hal-01431581v1
|
||
|
Benchmark Generator for Software Testers12th Engineering Applications of Neural Networks (EANN 2011) and 7th Artificial Intelligence Applications and Innovations (AIAI), Sep 2011, Corfu, Greece. pp.378-388, ⟨10.1007/978-3-642-23960-1_45⟩
Conference papers
hal-01571497v1
|
||
|
A Multivalued Recurrent Neural Network for the Quadratic Assignment Problem12th Engineering Applications of Neural Networks (EANN 2011) and 7th Artificial Intelligence Applications and Innovations (AIAI), Sep 2011, Corfu, Greece. pp.132-140, ⟨10.1007/978-3-642-23960-1_17⟩
Conference papers
hal-01571459v1
|
||
|
Towards Trust-Aware and Self-adaptive Systems7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.255-262, ⟨10.1007/978-3-642-38323-6_20⟩
Conference papers
hal-01468178v1
|
||
|
A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision ChainsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.187-204, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_13⟩
Book sections
hal-01619749v1
|
||
|
AntWMNet – A Hybrid Routing Algorithm for Wireless Mesh Networks Based on Ant Colony Optimisation13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.108-121, ⟨10.1007/978-3-319-22572-2_8⟩
Conference papers
hal-01728793v1
|
||
|
Wired/Wireless Internet CommunicationsSpringer International Publishing, LNCS-9071, 2015, Lecture Notes in Computer Science, 978-3-319-22571-5. ⟨10.1007/978-3-319-22572-2⟩
Books
hal-01728798v1
|
||
|
Trust Management VIISpringer, AICT-401, 2013, IFIP Advances in Information and Communication Technology, 978-3-642-38322-9. ⟨10.1007/978-3-642-38323-6⟩
Books
hal-01468338v1
|
||
|
Mobility Beamforming Prediction and a Round Robin Scheduling in a Directional MAC for MANET11th IFIP Wireless and Mobile Networking Conference (WMNC 2018), Sep 2018, Prague, Czech Republic. pp.25-31
Conference papers
hal-01995162v1
|
||
|
Verifying Timed BPMN Processes Using Maude19th International Conference on Coordination Languages and Models (COORDINATION), Jun 2017, Neuchâtel, Switzerland. pp.219-236, ⟨10.1007/978-3-319-59746-1_12⟩
Conference papers
hal-01538104v1
|
||
|
HIDE_DHCP: Covert Communications through Network Configuration Messages27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.162-173, ⟨10.1007/978-3-642-30436-1_14⟩
Conference papers
hal-01518255v1
|
||
|
Behaviour Protection in Modular Rule-Based System Specifications21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.24-49, ⟨10.1007/978-3-642-37635-1_2⟩
Conference papers
hal-01485976v1
|
||
|
PerformLTE: A Testbed for LTE Testing in the Future Internet13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.46-59, ⟨10.1007/978-3-319-22572-2_4⟩
Conference papers
hal-01728791v1
|
||
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-9895, 2016, Lecture Notes in Computer Science, 978-3-319-45930-1. ⟨10.1007/978-3-319-45931-8⟩
Books
hal-01639612v1
|
||
|
GDI as an Alternative Guiding Interaction Style for Occasional Users17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.75-96, ⟨10.1007/978-3-030-29390-1_5⟩
Conference papers
hal-02877652v1
|