Filter your results
- 13
- 10
- 12
- 10
- 1
- 23
- 1
- 2
- 4
- 2
- 2
- 2
- 3
- 6
- 1
- 23
- 8
- 1
- 10
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.34-52, ⟨10.1007/978-3-642-37282-7_4⟩
Conference papers
hal-01470502v1
|
||
|
The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT ReplicationInternational Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.112-125, ⟨10.1007/978-3-319-39028-4_9⟩
Conference papers
hal-01445797v1
|
||
|
Fair Private Set Intersection with a Semi-trusted Arbiter27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers
hal-01490721v1
|
||
|
Contrail: Enabling Decentralized Social Networks on Smartphones12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.41-60, ⟨10.1007/978-3-642-25821-3_3⟩
Conference papers
hal-01597767v1
|
||
|
Future Challenges in Security and Privacy for Academia and IndustrySpringer, AICT-354, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-21424-0⟩
Books
hal-01567585v1
|
||
|
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩
Conference papers
hal-01567599v1
|
||
|
Facing Complexity in Systems Management4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.1-1, ⟨10.1007/978-3-642-13986-4_1⟩
Conference papers
hal-01056636v1
|
||
Privacy and Identity Management for the Future Internet in the Age of GlobalisationSpringer, AICT-457, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7
Books
hal-01431602v1
|
|||
Open Problems in Network SecuritySpringer, LNCS-7039, 2012, Lecture Notes in Computer Science, 978-3-642-27584-5. ⟨10.1007/978-3-642-27585-2⟩
Books
hal-01481511v1
|
|||
|
Towards a Compiler for Business-IT Systems3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.1-19, ⟨10.1007/978-3-642-22386-0_1⟩
Conference papers
hal-01572538v1
|
||
|
Privacy and Identity Management. Time for a Revolution?Springer International Publishing, AICT-476, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9⟩
Books
hal-01619751v1
|
||
|
Open Research Problems in Network SecuritySpringer, LNCS-6555, 2011, Lecture Notes in Computer Science, 978-3-642-19227-2. ⟨10.1007/978-3-642-19228-9⟩
Books
hal-01581329v1
|
||
Open Problems in Network SecurityINETSEC-2017, 2017, Open Problems in Network Security
Books
hal-01666537v1
|
|||
|
Concepts Around Privacy-Preserving Attribute-Based CredentialsMarit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.53-63, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_4⟩
Book sections
hal-01276046v1
|
||
|
Privacy and Identity Management. Facing up to Next StepsSpringer International Publishing, AICT-498, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-55782-3. ⟨10.1007/978-3-319-55783-0⟩
Books
hal-01629159v1
|
||
|
Open Problems in Network SecuritySpringer, LNCS-9591, 2016, Open Problems in Network Security, 978-3-319-39027-7. ⟨10.1007/978-3-319-39028-4⟩
Books
hal-01445799v1
|
||
Distributed Applications and Interoperable SystemsSpringer International Publishing, LNCS-10320, 2017, Lecture Notes in Computer Science, 978-3-319-59664-8. ⟨10.1007/978-3-319-59665-5⟩
Books
hal-01800116v1
|
|||
|
Data-Minimizing Authentication Goes Mobile13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers
hal-01540904v1
|
||
|
Identity Management: State of the Art, Challenges and Perspectives14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.45-62, ⟨10.1007/978-3-030-42504-3_4⟩
Conference papers
hal-03378952v1
|
||
|
Scalable High Resolution Traffic Heatmaps: Coherent Queue Visualization for Datacenters6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.26-37, ⟨10.1007/978-3-642-54999-1_3⟩
Conference papers
hal-01396469v1
|
||
|
Privacy and Identity Management for LifeSpringer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books
hal-01517673v1
|
||
|
A Software Architecture for Transportation Planning and Monitoring in a Collaborative Network16th Working Conference on Virtual Enterprises (PROVE), Oct 2015, Albi, France. pp.277-284, ⟨10.1007/978-3-319-24141-8_25⟩
Conference papers
hal-01437896v1
|
||
|
A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.471-490, ⟨10.1007/978-3-642-25821-3_24⟩
Conference papers
hal-01597761v1
|