Filter your results
- 14
- 14
- 14
- 1
- 1
- 3
- 3
- 3
- 1
- 2
- 14
- 1
- 1
- 8
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
PPM: Privacy Policy Manager for Personalized Services1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.377-392
Conference papers
hal-01506558v1
|
||
|
Distribution Visualization for User Behavior Analysis on LTE Network28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.249-255, ⟨10.1007/978-3-319-47443-4_18⟩
Conference papers
hal-01643720v1
|
||
|
On Gender Specific Perception of Data Sharing in Japan31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.150-160, ⟨10.1007/978-3-319-33630-5_11⟩
Conference papers
hal-01369550v1
|
||
|
VIGraph – A Framework for Verifiable Information11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.12-20, ⟨10.1007/978-3-319-59171-1_2⟩
Conference papers
hal-01651163v1
|
||
|
Linear Depth Integer-Wise Homomorphic Division12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.91-106, ⟨10.1007/978-3-030-20074-9_8⟩
Conference papers
hal-02294597v1
|
||
|
PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring FunctionsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.211-225, ⟨10.1007/978-3-319-10975-6_16⟩
Conference papers
hal-01403997v1
|
||
|
Editing Training Sets from Imbalanced Data Using Fuzzy-Rough Sets11th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2015), Sep 2015, Bayonne, France. pp.115-129, ⟨10.1007/978-3-319-23868-5_9⟩
Conference papers
hal-01385349v1
|
||
|
A Privacy Risk Model for Trajectory Data8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.125-140, ⟨10.1007/978-3-662-43813-8_9⟩
Conference papers
hal-01381683v1
|
||
|
A Pre-processing Composition for Secret Key Recovery on Android Smartphone8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.76-91, ⟨10.1007/978-3-662-43826-8_6⟩
Conference papers
hal-01400921v1
|
||
|
Privacy Preservation of User History Graph6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.87-96, ⟨10.1007/978-3-642-30955-7_9⟩
Conference papers
hal-01534302v1
|
||
|
Security-and-Privacy-Related Issues on IT Systems During DisastersInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.445-459, ⟨10.1007/978-3-642-32498-7_33⟩
Conference papers
hal-01542466v1
|
||
|
Lightweight Practical Private One-Way Anonymous Messaging9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.76-91, ⟨10.1007/978-3-319-18491-3_6⟩
Conference papers
hal-01416208v1
|
||
|
A Model for Personalised Perception of Policies10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.52-62, ⟨10.1007/978-3-319-41354-9_4⟩
Conference papers
hal-01438348v1
|
||
|
A Practical Evaluation Method of Network Traffic Load for Capacity Planning27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.263-268, ⟨10.1007/978-3-319-25945-1_18⟩
Conference papers
hal-01470153v1
|