Search - IFIP Open Digital Library Access content directly

Filter your results

35 results
Structure: Internal structure identifier : 302612
Image document

Why We Trust Dynamic Consent to Deliver on Privacy

Arianna Schuler Scott , Michael Goldsmith , Harriet Teare , Helena Webb , Sadie Creese
13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.28-38, ⟨10.1007/978-3-030-33716-2_3⟩
Conference papers hal-03182615v1
Image document

Relating Structure and Power: Comonadic Semantics for Computational Resources

Samson Abramsky , Nihil Shah
14th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2018, Thessaloniki, Greece. pp.1-5, ⟨10.1007/978-3-030-00389-0_1⟩
Conference papers hal-02044639v1
Image document

EMPower: Detecting Malicious Power Line Networks from EM Emissions

Richard Baker , Ivan Martinovic
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.108-121, ⟨10.1007/978-3-319-99828-2_8⟩
Conference papers hal-02023733v1
Image document

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

Ronald Kainda , Ivan Flechais , A. W. Roscoe
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.308-315, ⟨10.1007/978-3-642-12368-9_24⟩
Conference papers hal-01056076v1
Image document

From Lawvere to Brandenburger-Keisler: Interactive Forms of Diagonalization and Self-reference

Samson Abramsky , Jonathan Zvesper
11th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Mar 2012, Tallinn, Estonia. pp.1-19, ⟨10.1007/978-3-642-32784-1_1⟩
Conference papers hal-01539890v1
Image document

The Reputation Lag Attack

Sean Sirur , Tim Muller
13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.39-56, ⟨10.1007/978-3-030-33716-2_4⟩
Conference papers hal-03182604v1
Image document

Theoretical Foundations for the Study of Social Innovation in the Public Sector

Thomas M. Vogl
12th International Conference on Electronic Participation (ePart), Aug 2020, Linköping, Sweden. pp.54-65, ⟨10.1007/978-3-030-58141-1_5⟩
Conference papers hal-03201959v1
Image document

Right-Hand Side Dependent Bounds for GMRES Applied to Ill-Posed Problems

Jennifer Pestana
26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.230-236, ⟨10.1007/978-3-662-45504-3_22⟩
Conference papers hal-01286418v1
Image document

Efficient Smoothers for All-at-once Multigrid Methods for Poisson and Stokes Control Problems

Stefan Takacs
26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.337-347, ⟨10.1007/978-3-662-45504-3_33⟩
Conference papers hal-01286444v1
Image document

A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK

Elmarie Kritzinger , Maria Bada , Jason Nurse
10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.110-120, ⟨10.1007/978-3-319-58553-6_10⟩
Conference papers hal-01690963v1
Image document

On the Design and Development of webinos: A Distributed Mobile Application Middleware

John Lyle , Shamal Faily , Ivan Fléchais , André Paul , Ayşe Göker , et al.
12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.140-147, ⟨10.1007/978-3-642-30823-9_12⟩
Conference papers hal-01527646v1
Image document

Algorithmics

Richard Bird , Jeremy Gibbons , Ralf Hinze , Peter Höfner , Johan Jeuring , et al.
Advancing Research in Information and Communication Technology, AICT-600, pp.59-98, 2021, ⟨10.1007/978-3-030-81701-5_3⟩
Book sections hal-03325977v1
Image document

Knowledge Representation in Virtual Teams: A Perspective Approach for Synthetic Worlds

Giacomo Fiumara , Dario Maggiorini , Alessandro Provetti , Laura A. Ripamonti
11th IFIP WG 5.5 Working Conference on Virtual Enterprises (PRO-VE), Oct 2010, Saint-Etienne, France. pp.619-625, ⟨10.1007/978-3-642-15961-9_74⟩
Conference papers hal-01055938v1
Image document

On Partial Order Semantics for SAT/SMT-Based Symbolic Encodings of Weak Memory Concurrency

Alex Horn , Daniel Kroening
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.19-34, ⟨10.1007/978-3-319-19195-9_2⟩
Conference papers hal-01767325v1
Image document

From Panopticon to Fresnel, Dispelling a False Sense of Security

Jon Crowcroft , Ian Brown
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.238-242, ⟨10.1007/978-3-642-32805-3_24⟩
Conference papers hal-01540889v1
Image document

Walking in the Wild – Using an Always-On Smartphone Application to Increase Physical Activity

Tim Harries , Parisa Eslambolchilar , Chris Stride , Ruth Rettie , Simon Walton
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.19-36, ⟨10.1007/978-3-642-40498-6_2⟩
Conference papers hal-01510527v1
Image document

Requirements Sensemaking Using Concept Maps

Shamal Faily , John Lyle , André Paul , Andrea Atzeni , Dieter Blomme , et al.
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.217-232, ⟨10.1007/978-3-642-34347-6_13⟩
Conference papers hal-01556817v1
Image document

Understanding Trustworthy Service Level Agreements: Open Problems and Existing Solutions

Yudhistira Nugraha , Andrew Martin
International Workshop on Open Problems in Network Security (iNetSec), May 2017, Rome, Italy. pp.54-70
Conference papers hal-01684231v1
Image document

Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments

Yudhistira Nugraha , Andrew Martin
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.57-75, ⟨10.1007/978-3-319-59171-1_6⟩
Conference papers hal-01651155v1
Image document

Developing a Strategy for Automated Privacy Testing Suites

Ioannis Agrafiotis , Sadie Creese , Michael Goldsmith
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.32-44, ⟨10.1007/978-3-642-31668-5_3⟩
Conference papers hal-01517596v1
Image document

Wider Research Applications of Dynamic Consent

Arianna Schuler Scott , Michael Goldsmith , Harriet Teare
Eleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.114-120, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_8⟩
Book sections hal-02274548v1
Image document

The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design

Shamal Faily , Ivan Fléchais
Third IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.111-118, ⟨10.1007/978-3-642-16488-0_9⟩
Conference papers hal-01055193v1
Image document

Ritual and Social Evolution: Understanding Social Complexity Through Data

Harvey Whitehouse
2nd International Workshop on Computational History and Data-Driven Humanities (CHDDH), May 2016, Dublin, Ireland. pp.3-14, ⟨10.1007/978-3-319-46224-0_1⟩
Conference papers hal-01616304v1
Image document

Privacy for Peer Profiling in Collective Adaptive Systems

Mark Hartswood , Marina Jirotka , Ronald Chenu-Abente , Alethia Hume , Fausto Giunchiglia , et al.
Jan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.237-252, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_16⟩
Book sections hal-01431584v1
Image document

Distributional Sentence Entailment Using Density Matrices

Esma Balkir , Mehrnoosh Sadrzadeh , Bob Coecke
1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Tehran, Iran. pp.1-22, ⟨10.1007/978-3-319-28678-5_1⟩
Conference papers hal-01446260v1
Image document

A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains

Isaac Agudo , Ali El Kaafarani , David Nuñez , Siani Pearson
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.187-204, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_13⟩
Book sections hal-01619749v1
Image document

CompactFlow: A Hybrid Binary Format for Network Flow Data

Michal Piskozub , Riccardo Spolaor , Ivan Martinovic
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.185-201, ⟨10.1007/978-3-030-41702-4_12⟩
Conference papers hal-03173900v1
Image document

Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation

Ioannis Agrafiotis , Sadie Creese , Michael Goldsmith
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.232-244, ⟨10.1007/978-3-642-31668-5_18⟩
Conference papers hal-01517594v1
Image document

Mobile Electronic Identity: Securing Payment on Mobile Phones

Chen Bangdao , A. W. Roscoe
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.22-37, ⟨10.1007/978-3-642-21040-2_2⟩
Conference papers hal-01573293v1
Image document

SmartSociety: Collaboration Between Humans and Machines, Promises and Perils

Mark Hartswood , Marina Jirotka
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.30-48, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_3⟩
Book sections hal-01619732v1