Search - IFIP Open Digital Library Access content directly

Filter your results

33 results
Structure: Internal structure identifier : 300732
Image document

VLSI-SoC: Technology Advancement on SoC Design

Victor Grimblatt , Chip Hong Chang , Ricardo Reis , Anupam Chattopadhyay , Andrea Calimera
Springer Nature Switzerland, AICT-661, 2022, IFIP Advances in Information and Communication Technology, 978-3-031-16817-8. ⟨10.1007/978-3-031-16818-5⟩
Books hal-04419569v1
Image document

Early Warning Systems for Cyber Defence

Harsha Kalutarage , Siraj Shaikh , Bu-Sung Lee , Chonho Lee , Yeo Chai Kiat
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.29-42, ⟨10.1007/978-3-319-39028-4_3⟩
Conference papers hal-01445791v1
Image document

An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory

Yuan Liu , Jie Zhang , Qin Li
6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.209-216, ⟨10.1007/978-3-642-29852-3_15⟩
Conference papers hal-01517662v1
Image document

EPISOSE: An Epistemology-Based Social Search Framework for Exploratory Information Seeking

Yuqing Mao , Haifeng Shen , Chengzheng Sun
Second IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.211-222, ⟨10.1007/978-3-642-15231-3_21⟩
Conference papers hal-01055480v1
Image document

Investigating Sociability and Affective Responses of Elderly Users through Digitally-Mediated Exercises: A Case of the Nintendo Wii

Yin-Leng Theng , Pei Foon Teo , Phuong Huynh Truc
Second IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.152-162, ⟨10.1007/978-3-642-15231-3_16⟩
Conference papers hal-01055485v1
Image document

SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences

Chien-Ning Chen , Jheng-Hong Tu , Sung-Ming Yen
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.222-235
Conference papers hal-01506557v1
Image document

A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment

Shuo Chen , Rongxing Lu , Jie Zhang
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.21-37, ⟨10.1007/978-3-319-59171-1_3⟩
Conference papers hal-01651154v1
Image document

An Analysis of Accountability Concepts for Open Development

Caitlin Bentley
14th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2017, Yogyakarta, Indonesia. pp.793-802, ⟨10.1007/978-3-319-59111-7_64⟩
Conference papers hal-01650096v1
Image document

Recurrent Self-evolving Takagi–Sugeno–Kan Fuzzy Neural Network (RST-FNN) Based Type-2 Diabetic Modeling

Quah En Zhe , Arif Ahmed Sekh , Chai Quek , Dilip K. Prasad
4th International Conference on Intelligence Science (ICIS), Feb 2021, Durgapur, India. pp.125-136, ⟨10.1007/978-3-030-74826-5_11⟩
Conference papers hal-03741726v1
Image document

From Display Calculi to Deep Nested Sequent Calculi: Formalised for Full Intuitionistic Linear Logic

Jeremy E. Dawson , Ranald Clouston , Rajeev Goré , Alwen Tiu
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.250-264, ⟨10.1007/978-3-662-44602-7_20⟩
Conference papers hal-01402048v1
Image document

Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces

Jie Zhang , Robin Cohen , Kate Larson
4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.216-231, ⟨10.1007/978-3-642-13446-3_15⟩
Conference papers hal-01061329v1
Image document

ReRAM Based In-Memory Computation of Single Bit Error Correcting BCH Code

Yaswanth Tavva , Debjyoti Bhattacharjee , Anupam Chattopadhyay , Swagata Mandal
26th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2018, Verona, Italy. pp.128-146, ⟨10.1007/978-3-030-23425-6_7⟩
Conference papers hal-02321764v1
Image document

Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks

Huanhuan Zhang , Chang Xu , Jie Zhang
8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.77-92, ⟨10.1007/978-3-662-43813-8_6⟩
Conference papers hal-01381680v1
Image document

A 1.8-V 3.6-mW 2.4-GHz Fully Integrated CMOS Frequency Synthesizer for the IEEE 802.15.4

Manthena Vamshi Krishna , Xuan Jie , Anh Manh Do , Chirn Chye Boon , Kiat Seng Yeo , et al.
18th International Conference on Very Large Scale Integration (VLSISOC), Sep 2010, Madrid, Spain. pp.69-99, ⟨10.1007/978-3-642-28566-0_4⟩
Conference papers hal-01516000v1
Image document

Assets Dependencies Model in Information Security Risk Management

Jakub Breier , Frank Schindler
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.405-412, ⟨10.1007/978-3-642-55032-4_40⟩
Conference papers hal-01397241v1
Image document

Initial Segment Complexities of Randomness Notions

Rupert Hölzl , Thorsten Kräling , Frank Stephan , Guohua Wu
6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.259-270, ⟨10.1007/978-3-642-15240-5_19⟩
Conference papers hal-01054455v1
Image document

Robustness of Trust Models and Combinations for Handling Unfair Ratings

Lizi Zhang , Siwei Jiang , Jie Zhang , Wee Keong Ng
6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.36-51, ⟨10.1007/978-3-642-29852-3_3⟩
Conference papers hal-01517650v1
Image document

On Robustness of Trust Systems

Tim Muller , Yang Liu , Sjouke Mauw , Jie Zhang
8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.44-60, ⟨10.1007/978-3-662-43813-8_4⟩
Conference papers hal-01381678v1
Image document

AES Variants Secure against Related-Key Differential and Boomerang Attacks

Jiali Choy , Aileen Zhang , Khoongming Khoo , Matt Henricksen , Axel Poschmann
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers hal-01573307v1
Image document

A 1-V CMOS Ultralow-Power Receiver Front End for the IEEE 802.15.4 Standard Using Tuned Passive Mixer Output Pole

Aaron Do , Chirn Chye Boon , Manthena Vamshi Krishna , Anh Manh Do , Kiat Seng Yeo
18th International Conference on Very Large Scale Integration (VLSISOC), Sep 2010, Madrid, Spain. pp.1-21, ⟨10.1007/978-3-642-28566-0_1⟩
Conference papers hal-01515991v1
Image document

Supporting Productive Integration of Web 2.0-Mediated Collaboration

Mun Fie Tsoi
IFIP TC 3 International Conference on Key Competencies in the Knowledge Society (KCKS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.401-411, ⟨10.1007/978-3-642-15378-5_39⟩
Conference papers hal-01054681v1
Image document

Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware

Kai Cheng , Dongliang Fang , Chuan Qin , Huizhao Wang , Yaowen Zheng , et al.
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2021, Oslo, Norway. pp.83-99, ⟨10.1007/978-3-030-78120-0_6⟩
Conference papers hal-03746053v1
Image document

Limitations on Robust Ratings and Predictions

Tim Muller , Yang Liu , Jie Zhang
10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.113-126, ⟨10.1007/978-3-319-41354-9_8⟩
Conference papers hal-01438352v1

Intelligent Information Processing XI

Zhongzhi Shi , Jean-Daniel Zucker , Bo An
Springer International Publishing, AICT-643, 2022, IFIP Advances in Information and Communication Technology, 978-3-031-03947-8. ⟨10.1007/978-3-031-03948-5⟩
Books hal-04178714v1
Image document

Differential Fault Attack on LEA

Dirmanto Jap , Jakub Breier
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.265-274, ⟨10.1007/978-3-319-24315-3_27⟩
Conference papers hal-01466228v1
Image document

From Microsoft Word 2003 to Microsoft Word 2007: Design Heuristics, Design Flaws and Lessons Learnt

Yin-Leng Theng , Eng Kiat Ting , Xuehong Tao
Second IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.289-292, ⟨10.1007/978-3-642-15231-3_32⟩
Conference papers hal-01055470v1
Image document

Exploring the Influence of Cultural Diversity in Collaborative Design Teams: Preliminary Findings

Vivian Hsueh-Hua Chen , Henry Been-Lirn Duh
Second IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.246-254, ⟨10.1007/978-3-642-15231-3_24⟩
Conference papers hal-01055477v1
Image document

Real-Time Caustics in Dynamic Scenes with Multiple Directional Lights

Budianto Tandianus , Henry Johan , Hock Soon Seah
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.308-316, ⟨10.1007/978-3-642-15399-0_32⟩
Conference papers hal-01055629v1
Image document

Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model

Yang Chen , Junzhe Zhang , Chai Kiat Yeo
2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.1-14, ⟨10.1007/978-3-030-45778-5_1⟩
Conference papers hal-03266470v1
Image document

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic

Mayank Agarwal , Rami Puzis , Jawad Haj-Yahya , Polina Zilberman , Yuval Elovici
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.216-230, ⟨10.1007/978-3-319-99828-2_16⟩
Conference papers hal-02023723v1