Filter your results
- 21
- 21
- 21
- 2
- 4
- 2
- 1
- 2
- 1
- 2
- 4
- 2
- 2
- 1
- 21
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Deciphering Text from Touchscreen Key Taps30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers
hal-01633681v1
|
||
|
Liner Ship Freight Revenue and Fleet Deployment for Single ServiceIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.123-131, ⟨10.1007/978-3-030-85902-2_14⟩
Conference papers
hal-04117645v1
|
||
|
Digitization of Real-Time Predictive Maintenance for High Speed Machine EquipmentIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.132-140, ⟨10.1007/978-3-030-85902-2_15⟩
Conference papers
hal-04117702v1
|
||
|
Migrating from DAC to RBAC29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.69-84, ⟨10.1007/978-3-319-20810-7_5⟩
Conference papers
hal-01745820v1
|
||
|
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.224-233, ⟨10.1007/978-3-642-21040-2_15⟩
Conference papers
hal-01573310v1
|
||
|
Smart Integration of Blockchain in Air Cargo Handling for Profit MaximizationIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.107-114, ⟨10.1007/978-3-030-85902-2_12⟩
Conference papers
hal-04117650v1
|
||
|
Enabling the Deployment of ABAC Policies in RBAC Systems32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.51-68, ⟨10.1007/978-3-319-95729-6_4⟩
Conference papers
hal-01954419v1
|
||
|
Toward Mining of Temporal Roles27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers
hal-01490718v1
|
||
|
Role Mining under Role-Usage Cardinality Constraint27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.150-161, ⟨10.1007/978-3-642-30436-1_13⟩
Conference papers
hal-01518246v1
|
||
|
Application of Secondary Information for Misbehavior Detection in VANETs9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.385-396, ⟨10.1007/978-3-642-12963-6_31⟩
Conference papers
hal-01059125v1
|
||
|
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers
hal-01480209v1
|
||
|
Remedy: Network-Aware Steady State VM Management for Data Centers11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.190-204, ⟨10.1007/978-3-642-30045-5_15⟩
Conference papers
hal-01531120v1
|
||
|
Employees’ Acceptance of AI Integrated CRM System: Development of a Conceptual ModelInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.679-687, ⟨10.1007/978-3-030-64861-9_59⟩
Conference papers
hal-03744794v1
|
||
|
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.281-295, ⟨10.1007/978-3-319-58469-0_19⟩
Conference papers
hal-01649012v1
|
||
|
Enhancing the Security of Image CAPTCHAs Through Noise Addition30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.354-368, ⟨10.1007/978-3-319-18467-8_24⟩
Conference papers
hal-01345127v1
|
||
|
Virtualized Controller Placement for Multi-domain Optical Transport Networks23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.39-50, ⟨10.1007/978-3-030-38085-4_4⟩
Conference papers
hal-03200672v1
|
||
|
Preventing Unauthorized Data Flows31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.41-62, ⟨10.1007/978-3-319-61176-1_3⟩
Conference papers
hal-01684345v1
|
||
|
Modelling Critical Success Factors for the Implementation of Industry 4.0 in Indian Manufacturing MSMEsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.89-97, ⟨10.1007/978-3-030-85902-2_10⟩
Conference papers
hal-04117689v1
|
||
|
Assessing the Effects of a Soft Cut-Off in the Twitter Social Network10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.288-300, ⟨10.1007/978-3-642-20798-3_22⟩
Conference papers
hal-01597983v1
|
||
|
Analysis of TRBAC with Dynamic Temporal Role Hierarchies27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.297-304, ⟨10.1007/978-3-642-39256-6_22⟩
Conference papers
hal-01490714v1
|
||
|
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.66-81, ⟨10.1007/978-3-642-40779-6_5⟩
Conference papers
hal-01492834v1
|