Search - IFIP Open Digital Library Access content directly

Filter your results

9 results
Structure: Internal structure identifier : 244058
Image document

Pathways in Cybersecurity: Translating Theory into Practice

Susanne Wetzel
10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.39-48, ⟨10.1007/978-3-319-58553-6_4⟩
Conference papers hal-01690965v1
Image document

CaPTIF: Comprehensive Performance TestIng Framework

Daniel A. Mayer , Orie Steele , Susanne Wetzel , Ulrike Meyer
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.55-70, ⟨10.1007/978-3-642-34691-0_6⟩
Conference papers hal-01482411v1
Image document

Atmospheric Water Generation (AWG): Performance Model and Economic Analysis

Faraz Moghimi , Hamed Ghoddusi , Bahram Asiabanpour , Mahdi Behroozikhah
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2019, Austin, TX, United States. pp.151-158, ⟨10.1007/978-3-030-29996-5_18⟩
Conference papers hal-02460493v1
Image document

Distributed and Secure Access Control in P2P Databases

Angela Bonifati , Ruilin Liu , Hui (wendy) Wang
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.113-129, ⟨10.1007/978-3-642-13739-6_8⟩
Conference papers hal-01056665v1
Image document

Result Integrity Verification of Outsourced Frequent Itemset Mining

Boxiang Dong , Ruilin Liu , Hui (wendy) Wang
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.258-265, ⟨10.1007/978-3-642-39256-6_17⟩
Conference papers hal-01490709v1
Image document

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures

Michael Braun , Ulrike Meyer , Susanne Wetzel
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.122-137, ⟨10.1007/978-3-642-12368-9_9⟩
Conference papers hal-01056062v1
Image document

Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations

Bo Zhang , Boxiang Dong , Wendy Wang
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.311-324, ⟨10.1007/978-3-319-61176-1_17⟩
Conference papers hal-01684361v1
Image document

Introducing Research into the Undergraduate Curriculum in Cybersecurity

Dimitrios Damopoulos , Susanne Wetzel
12th IFIP World Conference on Information Security Education (WISE), Jun 2019, Lisbon, Portugal. pp.30-42, ⟨10.1007/978-3-030-23451-5_3⟩
Conference papers hal-02365731v1
Image document

MoteAODV - An AODV Implementation for TinyOS 2.0

Werner Backes , Jared Cordasco
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.154-169, ⟨10.1007/978-3-642-12368-9_11⟩
Conference papers hal-01056089v1