Filter your results
- 55
- 3
- 2
- 56
- 2
- 2
- 59
- 2
- 1
- 1
- 1
- 5
- 9
- 8
- 12
- 11
- 5
- 8
- 60
- 38
- 26
- 17
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 10
- 9
- 5
- 5
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩
Conference papers
hal-01131975v2
|
||
|
Linking Telecom Service High-level Abstract Models to Simulators based on Model Transformations: The IMS Case Study18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.100-111, ⟨10.1007/978-3-642-32808-4_10⟩
Conference papers
hal-00739604v1
|
||
|
Improving Mozilla's In-App Payment PlatformOSS 2014 : 10th IFIP WG 2.13 International Conference on Open Source Systems : Open Source Software: Mobile Open Source Technologies, May 2014, San Jose, Costa Rica. pp.103 - 106, ⟨10.1007/978-3-642-55128-4_13⟩
Conference papers
hal-01162737v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Mignon: A Fast Decentralized Content Consumption Estimation in Large-Scale Distributed Systems16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Greece. pp.32-46, ⟨10.1007/978-3-319-39577-7_3⟩
Conference papers
hal-01301230v1
|
||
|
Graph-Theoretic Roots of Value Network Quantification19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.282-286, ⟨10.1007/978-3-642-40552-5_26⟩
Conference papers
hal-01497023v1
|
||
|
Translation Validation for Synchronous Data-Flow Specification in the SIGNAL Compiler35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.66-80, ⟨10.1007/978-3-319-19195-9_5⟩
Conference papers
hal-01767328v1
|
||
|
The Gossple Anonymous Social NetworkACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.191-211, ⟨10.1007/978-3-642-16955-7_10⟩
Conference papers
inria-00515693v2
|
||
|
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.105-118, ⟨10.1007/978-3-319-33630-5_8⟩
Conference papers
hal-01369546v1
|
||
|
Software Defined Networking Reactive Stateful Firewall31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers
hal-01333445v1
|
||
|
Privacy Preserving Record Matching Using Automated Semi-trusted Broker29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.103-118, ⟨10.1007/978-3-319-20810-7_7⟩
Conference papers
hal-01745819v1
|
||
|
Disappointments and Delights, Fears and Hopes induced by a few decades in Performance EvaluationPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.1-9, ⟨10.1007/978-3-642-25575-5_1⟩
Conference papers
hal-00789638v1
|
||
|
Heterogeneous Resource Selection for Arbitrary HPC Applications in the Cloud15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.108-123, ⟨10.1007/978-3-319-19129-4_9⟩
Conference papers
hal-01159024v1
|
||
|
Behave: Behavioral Cache for Web Content4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.89-103, ⟨10.1007/978-3-662-43352-2_8⟩
Conference papers
hal-01079976v1
|
||
|
DOMINO – An Efficient Algorithm for Policy Definition and Processing in Distributed Environments Based on Atomic Data Structures19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.257-269, ⟨10.1007/978-3-642-40552-5_23⟩
Conference papers
hal-01497021v1
|
||
|
Synchronous Interface Theories and Time Triggered Scheduling14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.203-218, ⟨10.1007/978-3-642-30793-5_13⟩
Conference papers
hal-01087992v1
|
||
|
Firewall Policies Provisioning Through SDN in the Cloud31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.293-310, ⟨10.1007/978-3-319-61176-1_16⟩
Conference papers
hal-01684362v1
|
||
|
On the problem of revenue sharing in multi-domain federations11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.252-264, ⟨10.1007/978-3-642-30054-7_20⟩
Conference papers
hal-00725646v1
|
||
|
Managing Secure Inter-slice Communication in 5G Network Slice ChainsManaging Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections
hal-02876588v1
|
||
|
Ex-SDF: an extended service dependency framework for intrusion impact assessment25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩
Conference papers
hal-00565624v1
|
||
|
Extending Signatures of ReputationHansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_13⟩
Book sections
hal-00997133v1
|
||
|
Dissemination of reconfiguration policies on mesh networks12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.16-30, ⟨10.1007/978-3-642-30823-9_2⟩
Conference papers
hal-00688707v1
|
||
|
Cheap and Cheerful: Trading Speed and Quality for Scalable Social Recommenders15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), IFIP, Jun 2015, Grenoble, France. pp.138-151, ⟨10.1007/978-3-319-19129-4_11⟩
Conference papers
hal-01170757v1
|
||
|
Similitude: Decentralised Adaptation in Large-Scale P2P Recommenders15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.51-65, ⟨10.1007/978-3-319-19129-4_5⟩
Conference papers
hal-01138365v2
|
||
|
Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.87-102, ⟨10.1007/978-3-642-34691-0_8⟩
Conference papers
hal-01482413v1
|
||
|
Failure Analysis and Modeling in Large Multi-site Infrastructures13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.127-140, ⟨10.1007/978-3-642-38541-4_10⟩
Conference papers
hal-01489451v1
|
||
|
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.274-281, ⟨10.1007/978-3-642-39256-6_19⟩
Conference papers
hal-01159831v1
|
||
|
Handling Stateful Firewall Anomalies27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers
hal-00737170v1
|
||
ICT Systems Security and Privacy ProtectionSpringer, AICT-428, 2014, IFIP Advances in Information and Communication Technology, 978-3-642-55414-8. ⟨10.1007/978-3-642-55415-5⟩
Books
hal-01370409v1
|
|||
|
MPSoC Architecture-Aware Automatic NoC Topology DesignIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.470-480, ⟨10.1007/978-3-642-15672-4_40⟩
Conference papers
hal-01054961v1
|
- 1
- 2