Filter your results
- 22
- 2
- 20
- 2
- 1
- 1
- 24
- 3
- 1
- 1
- 3
- 1
- 2
- 1
- 5
- 1
- 3
- 6
- 24
- 3
- 3
- 3
- 1
- 1
- 1
- 1
- 1
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.235-248, ⟨10.1007/978-3-642-30436-1_20⟩
Conference papers
hal-01518230v1
|
||
|
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.205-219, ⟨10.1007/978-3-642-55415-5_17⟩
Conference papers
hal-01370367v1
|
||
|
Avalanche! Reanimating Multiple Roles in Child Computer Interaction Design14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.666-673, ⟨10.1007/978-3-642-40477-1_45⟩
Conference papers
hal-01504920v1
|
||
|
Model Order Reduction for Networks of ODE and PDE Systems25th System Modeling and Optimization (CSMO), Sep 2011, Berlin, Germany. pp.92-101, ⟨10.1007/978-3-642-36062-6_10⟩
Conference papers
hal-01347527v1
|
||
|
Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.162-175, ⟨10.1007/978-3-642-39218-4_13⟩
Conference papers
hal-01463825v1
|
||
|
Context-Based Probabilistic Scene InterpretationThird IFIP TC12 International Conference on Artificial Intelligence (AI) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.155-164, ⟨10.1007/978-3-642-15286-3_15⟩
Conference papers
hal-01054597v1
|
||
|
Actual Paradigms of Distributed Software Development: Services and Self Organization10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society (I3E), Nov 2010, Buenos Aires, Argentina. pp.4-4, ⟨10.1007/978-3-642-16283-1_4⟩
Conference papers
hal-01055007v1
|
||
|
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.349-352, ⟨10.1007/978-3-642-20769-3_28⟩
Conference papers
hal-01559466v1
|
||
|
Structured Context Prediction: A Generic Approach10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.84-97, ⟨10.1007/978-3-642-13645-0_7⟩
Conference papers
hal-01061629v1
|
||
|
Modeling the Transformation of Application Landscapes6th The Practice of Entrprise Modeling (PoEM), Nov 2013, Riga, Latvia. pp.101-113, ⟨10.1007/978-3-642-41641-5_8⟩
Conference papers
hal-01474758v1
|
||
|
Instances over Algorithms: A Different Approach to Business Process Modeling4th Practice of Enterprise Modeling (PoEM), Nov 2011, Oslo, Norway. pp.25-37, ⟨10.1007/978-3-642-24849-8_3⟩
Conference papers
hal-01572387v1
|
||
|
Trends of Privacy and Surveillance in the Information Society9th IFIP TC9 International Conference on Human Choice and Computers (HCC) / 1st IFIP TC11 International Conference on Critical Information Infrastructure Protection (CIP) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.178-179, ⟨10.1007/978-3-642-15479-9_17⟩
Conference papers
hal-01054796v1
|
||
|
EGES PrefaceMarijn Janssen; Winfried Lamersdorf; Jan Pries-Heje; Michael Rosemann. E-Government, E-Services and Global Processes, Sep 2010, Brisbanne, Austria. pp.3-4, 2010
Documents associated with scientific events
hal-01061394v1
|
||
|
Reconciling Practice and Rigour in Ontology-Based Heterogeneous Information Systems Construction11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.205-220, ⟨10.1007/978-3-030-02302-7_13⟩
Conference papers
hal-02156454v1
|
||
|
Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.245-259, ⟨10.1007/978-3-319-99828-2_18⟩
Conference papers
hal-02023744v1
|
||
|
Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet?International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.82-94, ⟨10.1007/978-3-319-39028-4_7⟩
Conference papers
hal-01445796v1
|
||
|
Automatically Proving Purpose Limitation in Software Architectures34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.345-358, ⟨10.1007/978-3-030-22312-0_24⟩
Conference papers
hal-03744307v1
|
||
|
Anonymity Online – Current Solutions and ChallengesMarit Hansen; Eleni Kosta; Igor Nai-Fovino; Simone Fischer-Hübner. Privacy and Identity Management. The Smart Revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, AICT-526, Springer International Publishing, pp.38-55, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-92924-8. ⟨10.1007/978-3-319-92925-5_4⟩
Book sections
hal-01883626v1
|
||
|
Post Disaster Resilient Networks: Design Guidelines for Rescue OperationsInternational Workshop on Open Problems in Network Security (iNetSec), May 2017, Rome, Italy. pp.10-19
Conference papers
hal-01684183v1
|
||
E-Government, E-Services and Global ProcessesSpringer, AICT-334, 2010, IFIP Advances in Information and Communication Technology, 978-3-642-15345-7
Books
hal-01556109v1
|
|||
|
An Extensible Framework for Dynamic Market-Based Service Selection and Business Process Execution11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.150-164, ⟨10.1007/978-3-642-21387-8_12⟩
Conference papers
hal-01583570v1
|
||
|
Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.153-173, ⟨10.1007/978-3-030-49669-2_9⟩
Conference papers
hal-03243622v1
|
||
|
Catching Inside Attackers: Balancing Forensic Detectability and Privacy of EmployeesInternational Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.43-55, ⟨10.1007/978-3-319-39028-4_4⟩
Conference papers
hal-01445792v1
|
||
Collaborative, Trusted and Privacy-Aware e/m-ServicesSpringer, AICT-399, 2013, IFIP Advances in Information and Communication Technology, 978-3-642-37436-4. ⟨10.1007/978-3-642-37437-1⟩
Books
hal-01470570v1
|