Filter your results
- 3
- 3
- 3
- 2
- 1
- 3
- 3
- 2
- 2
- 1
|
|
sorted by
|
|
On the Modelling of the Computer Security Impact on the Reputation Systems2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.526-531, ⟨10.1007/978-3-642-55032-4_54⟩
Conference papers
hal-01397344v1
|
||
|
Motivation-Based Risk Analysis Process for IT Systems2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.446-455, ⟨10.1007/978-3-642-55032-4_45⟩
Conference papers
hal-01397337v1
|
||
|
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.261-270, ⟨10.1007/978-3-642-36818-9_27⟩
Conference papers
hal-01480233v1
|