Search - IFIP Open Digital Library Access content directly

Filter your results

23 results
Structure: Internal structure identifier : 452406

Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication

Claudio A. Ardagna , Jianying Zhou
Springer, LNCS-6633, 2011, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-21040-2⟩
Books hal-01573289v1
Image document

A Secure RFID Ticket System for Public Transport

Kun Peng , Feng Bao
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.350-357, ⟨10.1007/978-3-642-13739-6_27⟩
Conference papers hal-01056673v1
Image document

Enhanced Dictionary Based Rainbow Table

Vrizlynn Thing , Hwei-Ming Ying
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.513-524, ⟨10.1007/978-3-642-30436-1_42⟩
Conference papers hal-01518235v1
Image document

Investigating Feedback for Two-Handed Exploration of Digital Maps Without Vision

Sandra Bardot , Marcos Serrano , Simon Perrault , Shengdong Zhao , Christophe Jouffrais
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.305-324, ⟨10.1007/978-3-030-29381-9_19⟩
Conference papers hal-02544543v1
Image document

Verifiable Secret Sharing with Comprehensive and Efficient Public Verification

Kun Peng
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.217-230, ⟨10.1007/978-3-642-22348-8_17⟩
Conference papers hal-01586582v1
Image document

Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach

Xin Kang , Yongdong Wu
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.537-542, ⟨10.1007/978-3-642-30436-1_45⟩
Conference papers hal-01518215v1
Image document

On the Design and Evaluation of Nippon Paint Color Visualizer Application – A Case Study

Kuldeep Kulshreshtha , Andreea I. Niculescu , Bimlesh Wadhwa
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.372-376, ⟨10.1007/978-3-319-68059-0_33⟩
Conference papers hal-01679803v1
Image document

Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation

Vrizlynn L. Thing , Zheng-Leong Chua
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.217-230, ⟨10.1007/978-3-642-39218-4_17⟩
Conference papers hal-01463829v1
Image document

Enhancing the Security of On-line Transactions with CAPTCHA Keyboard

Yongdong Wu , Zhigang Zhao
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.531-536, ⟨10.1007/978-3-642-30436-1_44⟩
Conference papers hal-01518212v1
Image document

No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption

Zhuo Wei , Xuhua Ding , Robert Huijie Deng , Yongdong Wu
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.72-86, ⟨10.1007/978-3-642-32805-3_6⟩
Conference papers hal-01540901v1
Image document

Towards User-Oriented RBAC Model

Haibing Lu , Yuan Hong , Yanjiang Yang , Lian Duan , Nazia Badar
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers hal-01490719v1
Image document

Passive Network-Awareness for Dynamic Resource-Constrained Networks

Agoston Petz , Taesoo Jun , Nirmalya Roy , Chien-Liang Fok , Christine Julien
11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.106-121, ⟨10.1007/978-3-642-21387-8_9⟩
Conference papers hal-01583584v1
Image document

Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection

Wee-Yong Lim , Amit Sachan , Vrizlynn Thing
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.3-16, ⟨10.1007/978-3-662-44952-3_1⟩
Conference papers hal-01393754v1
Image document

Designing Humour in Human Computer Interaction (HUMIC 2017)

Andreea I. Niculescu , Alessandro Valitutti , Rafael E. Banchs
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.527-530
Conference papers hal-01680339v1
Image document

Dynamic Workflow Adjustment with Security Constraints

Haibing Lu , Yuan Hong , Yanjiang Yang , Yi Fang , Lian Duan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers hal-01284857v1
Image document

Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation

Wenjuan Li , Lijun Jiang , Weizhi Meng , Lam-For Kwok
10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.146-153, ⟨10.1007/978-3-319-41354-9_11⟩
Conference papers hal-01438341v1
Image document

Virtual Expansion of Rainbow Tables

Vrizlynn Thing
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.243-256, ⟨10.1007/978-3-642-15506-2_17⟩
Conference papers hal-01060622v1
Image document

Designing IDA - An Intelligent Driver Assistant for Smart City Parking in Singapore

Andreea I. Niculescu , Mei Quin Lim , Seno A. Wibowo , Kheng Hui Yeo , Boon Pang Lim , et al.
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.510-513, ⟨10.1007/978-3-319-22723-8_50⟩
Conference papers hal-01610825v1
Image document

Multiplicative Homomorphic E-Auction with Formally Provable Security

Kun Peng , Matt Henricksen
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.1-17, ⟨10.1007/978-3-642-38530-8_1⟩
Conference papers hal-01485930v1
Image document

Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network

Kun Peng
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.351-360, ⟨10.1007/978-3-642-21040-2_25⟩
Conference papers hal-01573300v1
Image document

Short and Efficient Certificate-Based Signature

Joseph K. Liu , Feng Bao , Jianying Zhou
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.167-178, ⟨10.1007/978-3-642-23041-7_17⟩
Conference papers hal-01587839v1
Image document

Sustainable Pseudo-random Number Generator

Huafei Zhu , Wee-Siong Ng , See-Kiong Ng
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.139-147, ⟨10.1007/978-3-642-39218-4_11⟩
Conference papers hal-01463823v1

Trust Management VIII

Jianying Zhou , Nurit Gal-Oz , Jie Zhang , Ehud Gudes
Springer, AICT-430, 2014, IFIP Advances in Information and Communication Technology, 978-3-662-43812-1. ⟨10.1007/978-3-662-43813-8⟩
Books hal-01381694v1