Filter your results
- 5
- 5
- 5
- 1
- 1
- 1
- 2
- 1
- 5
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
DROAllocator: A Dynamic Resource-Aware Operator Allocation Framework in Distributed Streaming Processing17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.349-360, ⟨10.1007/978-3-030-79478-1_30⟩
Conference papers
hal-03768731v1
|
||
|
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers
hal-01506559v1
|
||
|
Improving Virtualization Security by Splitting Hypervisor into Smaller Components26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.298-313, ⟨10.1007/978-3-642-31540-4_23⟩
Conference papers
hal-01534758v1
|
||
|
Selective Disclosure on Encrypted Documents23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.255-262, ⟨10.1007/978-3-642-22348-8_21⟩
Conference papers
hal-01586575v1
|
||
|
Privacy Preserving Social Network Publication on Bipartite Graphs6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.58-70, ⟨10.1007/978-3-642-30955-7_7⟩
Conference papers
hal-01534307v1
|