Filter your results
- 22
- 1
- 22
- 1
- 22
- 1
- 3
- 4
- 3
- 1
- 1
- 1
- 1
- 3
- 4
- 1
- 1
- 23
- 7
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Static Single Information Form for Abstract Compilation7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.10-27, ⟨10.1007/978-3-642-33475-7_2⟩
Conference papers
hal-01556212v1
|
||
|
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.121-139, ⟨10.1007/978-3-030-22479-0_7⟩
Conference papers
hal-02384600v1
|
||
|
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.325-337, ⟨10.1007/978-3-030-81242-3_19⟩
Conference papers
hal-03677036v1
|
||
|
Closed-Loop Manufacturing for Aerospace Industry: An Integrated PLM-MOM Solution to Support the Wing Box Assembly ProcessIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2019, Austin, TX, United States. pp.423-430, ⟨10.1007/978-3-030-29996-5_49⟩
Conference papers
hal-02460457v1
|
||
|
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.68-79, ⟨10.1007/978-3-642-21424-0_6⟩
Conference papers
hal-01567599v1
|
||
|
Coupling MPC and DP Methods for an Efficient Solution of Optimal Control Problems27th IFIP Conference on System Modeling and Optimization (CSMO), Jun 2015, Sophia Antipolis, France. pp.68-77, ⟨10.1007/978-3-319-55795-3_5⟩
Conference papers
hal-01626904v1
|
||
|
Automated Security Analysis of IoT Software Updates13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.223-239, ⟨10.1007/978-3-030-41702-4_14⟩
Conference papers
hal-03173903v1
|
||
|
Push-Down Automata with Gap-Order Constraints5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.199-216, ⟨10.1007/978-3-642-40213-5_13⟩
Conference papers
hal-01514667v1
|
||
|
An Empirical Evaluation of the Android Security Framework28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.176-189, ⟨10.1007/978-3-642-39218-4_14⟩
Conference papers
hal-01463826v1
|
||
|
Supporting Decision Making in Disasters: The DiMas Tool2nd International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2017, Sofia, Bulgaria. pp.25-35, ⟨10.1007/978-3-030-18293-9_4⟩
Conference papers
hal-02280322v1
|
||
|
Formal Techniques for Distributed SystemsSpringer, LNCS-6117, 2010, Lecture Notes in Computer Science, 978-3-642-13463-0. ⟨10.1007/978-3-642-13464-7⟩
Books
hal-01555338v1
|
||
|
Deconfined Global Types for Asynchronous Sessions23th International Conference on Coordination Languages and Models (COORDINATION), Jun 2021, Valletta, Malta. pp.41-60, ⟨10.1007/978-3-030-78142-2_3⟩
Conference papers
hal-03387838v1
|
||
|
Verification of Ad Hoc Networks with Node and Communication Failures 14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.235-250
Conference papers
hal-00909367v1
|
||
|
Laugh When You’re Winning9th International Summer Workshop on Multimodal Interfaces (eNTERFACE), Jul 2013, Lisbon, Portugal. pp.50-79, ⟨10.1007/978-3-642-55143-7_3⟩
Conference papers
hal-01350739v1
|
||
|
Asynchronous Global Types in Co-logic Programming23th International Conference on Coordination Languages and Models (COORDINATION), Jun 2021, Valletta, Malta. pp.134-146, ⟨10.1007/978-3-030-78142-2_9⟩
Conference papers
hal-03387826v1
|
||
|
Enabling Next-Generation Cyber Ranges with Mobile Security Components32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.150-165, ⟨10.1007/978-3-030-64881-7_10⟩
Conference papers
hal-03239813v1
|
||
|
APPregator: A Large-Scale Platform for Mobile Security Analysis32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.73-88, ⟨10.1007/978-3-030-64881-7_5⟩
Conference papers
hal-03239815v1
|
||
|
Trustworthy Opportunistic Access to the Internet of Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers
hal-01480255v1
|
||
|
Tool-Assisted Risk Analysis for Data Protection Impact Assessment14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.308-324, ⟨10.1007/978-3-030-42504-3_20⟩
Conference papers
hal-03378957v1
|
||
|
Automated and Efficient Analysis of Role-Based Access Control with Attributes26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.25-40, ⟨10.1007/978-3-642-31540-4_3⟩
Conference papers
hal-01534765v1
|
||
|
RiskInDroid: Machine Learning-Based Risk Analysis on Android32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.538-552, ⟨10.1007/978-3-319-58469-0_36⟩
Conference papers
hal-01648990v1
|
||
|
Tutorial: Service-Oriented Architecture (SOA) Development for Serious Games14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.578-580, ⟨10.1007/978-3-319-24589-8_61⟩
Conference papers
hal-01758448v1
|
||
|
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.13-24, ⟨10.1007/978-3-642-30436-1_2⟩
Conference papers
hal-01518240v1
|