Search - IFIP Open Digital Library Access content directly

Filter your results

23 results
Structure: Internal structure identifier : 302429
Image document

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication

Jan Camenisch , Maria Dubovitskaya , Anja Lehmann , Gregory Neven , Christian Paquin , et al.
3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.34-52, ⟨10.1007/978-3-642-37282-7_4⟩
Conference papers hal-01470502v1
Image document

The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication

Marko Vukolić
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.112-125, ⟨10.1007/978-3-319-39028-4_9⟩
Conference papers hal-01445797v1
Image document

Fair Private Set Intersection with a Semi-trusted Arbiter

Changyu Dong , Liqun Chen , Jan Camenisch , Giovanni Russello
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers hal-01490721v1
Image document

Contrail: Enabling Decentralized Social Networks on Smartphones

Patrick Stuedi , Iqbal Mohomed , Mahesh Balakrishnan , Z. Morley Mao , Venugopalan Ramasubramanian , et al.
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.41-60, ⟨10.1007/978-3-642-25821-3_3⟩
Conference papers hal-01597767v1

Future Challenges in Security and Privacy for Academia and Industry

Jan Camenisch , Simone Fischer-Hübner , Yuko Murayama , Armand Portmann , Carlos Rieder
Springer, AICT-354, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-21424-0⟩
Books hal-01567585v1
Image document

From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?

Alessandro Armando , Roberto Carbone , Luca Compagna , Jorge Cuellar , Giancarlo Pellegrino , et al.
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩
Conference papers hal-01567599v1
Image document

Facing Complexity in Systems Management

Metin Feridun
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.1-1, ⟨10.1007/978-3-642-13986-4_1⟩
Conference papers hal-01056636v1

Privacy and Identity Management for the Future Internet in the Age of Globalisation

Jan Camenisch , Simone Fischer-Hübner , Marit Hansen
Springer, AICT-457, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7
Books hal-01431602v1

Open Problems in Network Security

Jan Camenisch , Dogan Kesdogan
Springer, LNCS-7039, 2012, Lecture Notes in Computer Science, 978-3-642-27584-5. ⟨10.1007/978-3-642-27585-2⟩
Books hal-01481511v1
Image document

Towards a Compiler for Business-IT Systems

Jana Koehler , Thomas Gschwind , Jochen Küster , Hagen Völzer , Olaf Zimmermann
3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.1-19, ⟨10.1007/978-3-642-22386-0_1⟩
Conference papers hal-01572538v1

Privacy and Identity Management. Time for a Revolution?

David Aspinall , Jan Camenisch , Marit Hansen , Simone Fischer-Hübner , Charles Raab
Springer International Publishing, AICT-476, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9⟩
Books hal-01619751v1

Open Research Problems in Network Security

Jan Camenisch , Valentin Kisimov , Maria Dubovitskaya
Springer, LNCS-6555, 2011, Lecture Notes in Computer Science, 978-3-642-19227-2. ⟨10.1007/978-3-642-19228-9⟩
Books hal-01581329v1

Open Problems in Network Security

Jan Camenisch , Dogan Kesdogan
INETSEC-2017, 2017, Open Problems in Network Security
Books hal-01666537v1
Image document

Concepts Around Privacy-Preserving Attribute-Based Credentials

Jan Camenisch
Marit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.53-63, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_4⟩
Book sections hal-01276046v1

Privacy and Identity Management. Facing up to Next Steps

Anja Lehmann , Diane Whitehouse , Simone Fischer-Hübner , Lothar Fritsch , Charles Raab
Springer International Publishing, AICT-498, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-55782-3. ⟨10.1007/978-3-319-55783-0⟩
Books hal-01629159v1

Open Problems in Network Security

Jan Camenisch , Doğan Kesdoğan
Springer, LNCS-9591, 2016, Open Problems in Network Security, 978-3-319-39027-7. ⟨10.1007/978-3-319-39028-4⟩
Books hal-01445799v1

Distributed Applications and Interoperable Systems

Lydia Y. Chen , Hans Reiser
Springer International Publishing, LNCS-10320, 2017, Lecture Notes in Computer Science, 978-3-319-59664-8. ⟨10.1007/978-3-319-59665-5⟩
Books hal-01800116v1
Image document

Data-Minimizing Authentication Goes Mobile

Patrik Bichsel , Jan Camenisch , Bart De Decker , Jorn Lapon , Vincent Naessens , et al.
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers hal-01540904v1
Image document

Identity Management: State of the Art, Challenges and Perspectives

Tore Kasper Frederiksen , Julia Hesse , Anja Lehmann , Rafael Torres Moreno
14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.45-62, ⟨10.1007/978-3-030-42504-3_4⟩
Conference papers hal-03378952v1
Image document

Scalable High Resolution Traffic Heatmaps: Coherent Queue Visualization for Datacenters

Andreea Anghel , Robert Birke , Mitch Gusat
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.26-37, ⟨10.1007/978-3-642-54999-1_3⟩
Conference papers hal-01396469v1

Privacy and Identity Management for Life

Jan Camenisch , Bruno Crispo , Simone Fischer-Hübner , Ronald Leenes , Giovanni Russello
Springer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books hal-01517673v1
Image document

A Software Architecture for Transportation Planning and Monitoring in a Collaborative Network

Anne Baumgrass , Remco Dijkman , Paul Grefen , Shaya Pourmirza , Hagen Völzer , et al.
16th Working Conference on Virtual Enterprises (PROVE), Oct 2015, Albi, France. pp.277-284, ⟨10.1007/978-3-319-24141-8_25⟩
Conference papers hal-01437896v1
Image document

A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds

Anil Kurmus , Moitrayee Gupta , Roman Pletka , Christian Cachin , Robert Haas
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.471-490, ⟨10.1007/978-3-642-25821-3_24⟩
Conference papers hal-01597761v1