Filter your results
- 35
- 29
- 6
- 35
- 2
- 2
- 3
- 3
- 2
- 3
- 6
- 3
- 2
- 1
- 6
- 1
- 3
- 35
- 5
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Why We Trust Dynamic Consent to Deliver on Privacy13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.28-38, ⟨10.1007/978-3-030-33716-2_3⟩
Conference papers
hal-03182615v1
|
||
|
Relating Structure and Power: Comonadic Semantics for Computational Resources14th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2018, Thessaloniki, Greece. pp.1-5, ⟨10.1007/978-3-030-00389-0_1⟩
Conference papers
hal-02044639v1
|
||
|
EMPower: Detecting Malicious Power Line Networks from EM Emissions33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.108-121, ⟨10.1007/978-3-319-99828-2_8⟩
Conference papers
hal-02023733v1
|
||
|
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.308-315, ⟨10.1007/978-3-642-12368-9_24⟩
Conference papers
hal-01056076v1
|
||
|
From Lawvere to Brandenburger-Keisler: Interactive Forms of Diagonalization and Self-reference11th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Mar 2012, Tallinn, Estonia. pp.1-19, ⟨10.1007/978-3-642-32784-1_1⟩
Conference papers
hal-01539890v1
|
||
|
The Reputation Lag Attack13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.39-56, ⟨10.1007/978-3-030-33716-2_4⟩
Conference papers
hal-03182604v1
|
||
|
Theoretical Foundations for the Study of Social Innovation in the Public Sector12th International Conference on Electronic Participation (ePart), Aug 2020, Linköping, Sweden. pp.54-65, ⟨10.1007/978-3-030-58141-1_5⟩
Conference papers
hal-03201959v1
|
||
|
Right-Hand Side Dependent Bounds for GMRES Applied to Ill-Posed Problems26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.230-236, ⟨10.1007/978-3-662-45504-3_22⟩
Conference papers
hal-01286418v1
|
||
|
Efficient Smoothers for All-at-once Multigrid Methods for Poisson and Stokes Control Problems26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.337-347, ⟨10.1007/978-3-662-45504-3_33⟩
Conference papers
hal-01286444v1
|
||
|
A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.110-120, ⟨10.1007/978-3-319-58553-6_10⟩
Conference papers
hal-01690963v1
|
||
|
On the Design and Development of webinos: A Distributed Mobile Application Middleware12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.140-147, ⟨10.1007/978-3-642-30823-9_12⟩
Conference papers
hal-01527646v1
|
||
|
AlgorithmicsAdvancing Research in Information and Communication Technology, AICT-600, pp.59-98, 2021, ⟨10.1007/978-3-030-81701-5_3⟩
Book sections
hal-03325977v1
|
||
|
Knowledge Representation in Virtual Teams: A Perspective Approach for Synthetic Worlds11th IFIP WG 5.5 Working Conference on Virtual Enterprises (PRO-VE), Oct 2010, Saint-Etienne, France. pp.619-625, ⟨10.1007/978-3-642-15961-9_74⟩
Conference papers
hal-01055938v1
|
||
|
On Partial Order Semantics for SAT/SMT-Based Symbolic Encodings of Weak Memory Concurrency35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.19-34, ⟨10.1007/978-3-319-19195-9_2⟩
Conference papers
hal-01767325v1
|
||
|
From Panopticon to Fresnel, Dispelling a False Sense of Security13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.238-242, ⟨10.1007/978-3-642-32805-3_24⟩
Conference papers
hal-01540889v1
|
||
|
Walking in the Wild – Using an Always-On Smartphone Application to Increase Physical Activity14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.19-36, ⟨10.1007/978-3-642-40498-6_2⟩
Conference papers
hal-01510527v1
|
||
|
Requirements Sensemaking Using Concept Maps4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.217-232, ⟨10.1007/978-3-642-34347-6_13⟩
Conference papers
hal-01556817v1
|
||
|
Understanding Trustworthy Service Level Agreements: Open Problems and Existing SolutionsInternational Workshop on Open Problems in Network Security (iNetSec), May 2017, Rome, Italy. pp.54-70
Conference papers
hal-01684231v1
|
||
|
Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.57-75, ⟨10.1007/978-3-319-59171-1_6⟩
Conference papers
hal-01651155v1
|
||
|
Developing a Strategy for Automated Privacy Testing Suites7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.32-44, ⟨10.1007/978-3-642-31668-5_3⟩
Conference papers
hal-01517596v1
|
||
|
Wider Research Applications of Dynamic ConsentEleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.114-120, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_8⟩
Book sections
hal-02274548v1
|
||
|
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System DesignThird IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.111-118, ⟨10.1007/978-3-642-16488-0_9⟩
Conference papers
hal-01055193v1
|
||
|
Ritual and Social Evolution: Understanding Social Complexity Through Data2nd International Workshop on Computational History and Data-Driven Humanities (CHDDH), May 2016, Dublin, Ireland. pp.3-14, ⟨10.1007/978-3-319-46224-0_1⟩
Conference papers
hal-01616304v1
|
||
|
Privacy for Peer Profiling in Collective Adaptive SystemsJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.237-252, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_16⟩
Book sections
hal-01431584v1
|
||
|
Distributional Sentence Entailment Using Density Matrices1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Tehran, Iran. pp.1-22, ⟨10.1007/978-3-319-28678-5_1⟩
Conference papers
hal-01446260v1
|
||
|
A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision ChainsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.187-204, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_13⟩
Book sections
hal-01619749v1
|
||
|
CompactFlow: A Hybrid Binary Format for Network Flow Data13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.185-201, ⟨10.1007/978-3-030-41702-4_12⟩
Conference papers
hal-03173900v1
|
||
|
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.232-244, ⟨10.1007/978-3-642-31668-5_18⟩
Conference papers
hal-01517594v1
|
||
|
Mobile Electronic Identity: Securing Payment on Mobile Phones5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.22-37, ⟨10.1007/978-3-642-21040-2_2⟩
Conference papers
hal-01573293v1
|
||
|
SmartSociety: Collaboration Between Humans and Machines, Promises and PerilsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.30-48, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_3⟩
Book sections
hal-01619732v1
|
- 1
- 2