Search - IFIP Open Digital Library Access content directly

Filter your results

94 results
Structure: Internal structure identifier : 300723
Image document

Coercion-Resistant Proxy Voting

Oksana Kulyk , Stephan Neumann , Karola Marky , Jurlind Budurushi , Melanie Volkamer
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.3-16, ⟨10.1007/978-3-319-33630-5_1⟩
Conference papers hal-01369533v1
Image document

Integrated Smart Energy System Based on Production-Oriented Consumption

Ivan Popov , Alexander Krylatov , Victor Zakharov
17th Working Conference on Virtual Enterprises (PRO-VE), Oct 2016, Porto, Portugal. pp.265-273, ⟨10.1007/978-3-319-45390-3_23⟩
Conference papers hal-01614581v1
Image document

Reducing the Time Required for Hashing Operations

Frank Breitinger , Kaloyan Petrov
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.101-117, ⟨10.1007/978-3-642-41148-9_7⟩
Conference papers hal-01460624v1
Image document

Exploit Generation for Information Flow Leaks in Object-Oriented Programs

Quoc Huy Do , Richard Bubel , Reiner Hähnle
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.401-415, ⟨10.1007/978-3-319-18467-8_27⟩
Conference papers hal-01345131v1
Image document

Evaluation of Dispatcher Requirements on Automated Customer Feedback in Public Transport

Cindy Mayas , Stephan Hörold , Anselmo Stelzer , Frank Englert , Heidi Krömker
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.537-541, ⟨10.1007/978-3-319-22723-8_56⟩
Conference papers hal-01610819v1
Image document

Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations

Oksana Kulyk , Jan Henzel , Karen Renaud , Melanie Volkamer
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.519-538, ⟨10.1007/978-3-030-29381-9_32⟩
Conference papers hal-02544556v1
Image document

Privacy-Preserving IDS for In-Vehicle Networks with Local Differential Privacy

Michael Kreutzer , Hervais Simo , Peter Franke
15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.58-77, ⟨10.1007/978-3-030-72465-8_4⟩
Conference papers hal-03703761v1
Image document

Type Reconstruction Algorithms for Deadlock-Free and Lock-Free Linear π-Calculi

Luca Padovani , Tzu-Chun Chen , Andrea Tosatto
17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.83-98, ⟨10.1007/978-3-319-19282-6_6⟩
Conference papers hal-01774941v1
Image document

On Efficient Models for Model Checking Message-Passing Distributed Protocols

Péter Bokor , Marco Serafini , Neeraj Suri
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.216-223, ⟨10.1007/978-3-642-13464-7_17⟩
Conference papers hal-01055152v1
Image document

Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions

Julius Rückert , David Hausheer
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.38-41, ⟨10.1007/978-3-642-30633-4_5⟩
Conference papers hal-01529798v1
Image document

Towards a Mobility-Supporting Incentive Scheme for Peer-to-Peer Content Distribution

Matthias Wichtlhuber , David Hausheer
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.88-91, ⟨10.1007/978-3-642-38998-6_11⟩
Conference papers hal-01489957v1
Image document

Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications

Delphine Christin , Pablo Sánchez López , Andreas Reinhardt , Matthias Hollick , Michaela Kauer
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.71-86, ⟨10.1007/978-3-642-30955-7_8⟩
Conference papers hal-01534318v1
Image document

Testing Conformance in Multi-component Enterprise Application Management

Jacopo Soldani , Lars Luthmann , Malte Lochau , Antonio Brogi
8th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2020, Heraklion, Crete, Greece. pp.3-18, ⟨10.1007/978-3-030-44769-4_1⟩
Conference papers hal-03203225v1
Image document

Digital Twin Requirements in the Context of Industry 4.0

Luiz Durão , Sebastian Haag , Reiner Anderl , Klaus Schützer , Eduardo Zancul
15th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2018, Turin, Italy. pp.204-214, ⟨10.1007/978-3-030-01614-2_19⟩
Conference papers hal-02075585v1
Image document

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

Xuyun Nie , Albrecht Petzoldt , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers hal-01506559v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Modeling the German Legal Latitude Principles

Stephan Neumann , Anna Kahlert , Maria Henning , Philipp Richter , Hugo Jonker , et al.
5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers hal-01491259v1
Image document

Constructing Constraint-Preserving Interaction Schemes in Adhesive Categories

Jens Kosiol , Lars Fritsche , Nebras Nassar , Andy Schürr , Gabriele Taentzer
24th International Workshop on Algebraic Development Techniques (WADT), Jul 2018, Egham, United Kingdom. pp.139-153, ⟨10.1007/978-3-030-23220-7_8⟩
Conference papers hal-02364576v1
Image document

Effects of End-to-end Latency on User Experience and Performance in Immersive Virtual Reality Applications

Polona Caserman , Michelle Martinussen , Stefan Göbel
1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.57-69, ⟨10.1007/978-3-030-34644-7_5⟩
Conference papers hal-03652010v1
Image document

Learn to Spot Phishing URLs with the Android NoPhish App

Gamze Canova , Melanie Volkamer , Clemens Bergmann , Roland Borza , Benjamin Reinheimer , et al.
9th IFIP World Conference on Information Security Education (WISE), May 2015, Hamburg, Germany. pp.87-100, ⟨10.1007/978-3-319-18500-2_8⟩
Conference papers hal-01334293v1
Image document

Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

Emmanouil Vasilomanolakis , Sheikh Mahbub Habib , Pavlos Milaszewicz , Rabee Sohail Malik , Max Mühlhäuser
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.94-109, ⟨10.1007/978-3-319-59171-1_8⟩
Conference papers hal-01651159v1
Image document

Psychological Evaluation of Human Choice Behavior in Socio-Technical Systems: A Rational Process Model Approach

Tim Schürmann
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.226-228
Conference papers hal-01651187v1
Image document

Weaving Aspects and Business Processes through Model Transformation

Heiko Witteborg , Anis Charfi , Daniel Colomer Collell , Mira Mezini
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.47-61, ⟨10.1007/978-3-662-44879-3_4⟩
Conference papers hal-01318272v1
Image document

Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery

Leonhard Nobach , David Hausheer
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.128-132, ⟨10.1007/978-3-662-43862-6_16⟩
Conference papers hal-01401299v1
Image document

An Efficient Lattice-Based Secret Sharing Construction

Rachid El Bansarkhani , Mohammed Meziani
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.160-168, ⟨10.1007/978-3-642-30955-7_14⟩
Conference papers hal-01534304v1
Image document

Development of a Smart Assembly Data Model

Luiz Durão , Sebastian Haag , Reiner Anderl , Klaus Schützer , Eduardo Zancul
14th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2017, Seville, Spain. pp.655-666, ⟨10.1007/978-3-319-72905-3_58⟩
Conference papers hal-01764193v1
Image document

Development of a Valuation Method for IoT-Platforms

Stefan Kugler , Cordula Czwick , Reiner Anderl
16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.293-301, ⟨10.1007/978-3-030-42250-9_28⟩
Conference papers hal-04444741v1
Image document

TORPEDO: TOoltip-poweRed Phishing Email DetectiOn

Melanie Volkamer , Karen Renaud , Benjamin Reinheimer
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.161-175, ⟨10.1007/978-3-319-33630-5_12⟩
Conference papers hal-01369551v1
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts

Bruno Rodrigues , Thomas Bocek , Andri Lareida , David Hausheer , Sina Rafati , et al.
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers hal-01806063v1