Filter your results
- 24
- 4
- 22
- 4
- 2
- 28
- 1
- 2
- 1
- 1
- 2
- 2
- 1
- 3
- 5
- 6
- 2
- 1
- 2
- 28
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Trusted UI for the Mobile Web29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.127-141, ⟨10.1007/978-3-642-55415-5_11⟩
Conference papers
hal-01370360v1
|
||
|
Emergence of Global Speed Patterns in a Traffic Scenario7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.39-53, ⟨10.1007/978-3-642-54140-7_4⟩
Conference papers
hal-01291492v1
|
||
|
Information Security and Privacy – Challenges and OutlookAdvancing Research in Information and Communication Technology, AICT-600, pp.383-401, 2021, ⟨10.1007/978-3-030-81701-5_16⟩
Book sections
hal-03325978v1
|
||
|
Network Federation for Inter-cloud Operations21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2021, Valletta, Malta. pp.21-37, ⟨10.1007/978-3-030-78198-9_2⟩
Conference papers
hal-03384865v1
|
||
|
Mapping of Self-organization Properties and Non-functional Requirements in Smart Grids7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.163-168, ⟨10.1007/978-3-642-54140-7_16⟩
Conference papers
hal-01291514v1
|
||
|
Novelty-Aware Attack Recognition - Intrusion Detection with Organic Computing Techniques7th IFIP TC 10 Working Conference on Distributed, Parallel and Biologically Inspired Systems (DIPES) / 3rd IFIP TC 10 International Conference on Biologically-Inspired Collaborative Computing (BICC) / Held as Part of World Computer Congress (WCC) , Sep 2010, Brisbane, Australia. pp.242-253, ⟨10.1007/978-3-642-15234-4_24⟩
Conference papers
hal-01054495v1
|
||
|
Towards Authenticity and Privacy Preserving Accountable WorkflowsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.170-186, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_12⟩
Book sections
hal-01619735v1
|
||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart DevicesSpringer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books
hal-01550529v1
|
||
|
Dual Camera Magic Lens for Handheld AR Sketching15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.523-527, ⟨10.1007/978-3-319-22723-8_53⟩
Conference papers
hal-01610773v1
|
||
|
Formal Techniques for Distributed SystemsSpringer, LNCS-7892, 2013, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-38592-6⟩
Books
hal-01515249v1
|
||
|
When Your Browser Becomes the Paper Boy33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.94-107, ⟨10.1007/978-3-319-99828-2_7⟩
Conference papers
hal-02023747v1
|
||
|
Demand Response by Decentralized Device Control Based on Voltage Level7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.186-189, ⟨10.1007/978-3-642-54140-7_20⟩
Conference papers
hal-01291520v1
|
||
|
Towards Hypervisor Support for Enhancing the Performance of Virtual Machine Introspection20th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2020, Valletta, Malta. pp.41-54, ⟨10.1007/978-3-030-50323-9_3⟩
Conference papers
hal-03223259v1
|
||
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent EcosystemsSpringer, LNCS-7322, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-30955-7⟩
Books
hal-01534316v1
|
|||
|
Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.264-277, ⟨10.1007/978-3-642-55415-5_22⟩
Conference papers
hal-01370372v1
|
||
|
Modeling Wireless Sensor Networks Using Finite-Source Retrial Queues with Unreliable OrbitPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.73-86, ⟨10.1007/978-3-642-25575-5_7⟩
Conference papers
hal-01586895v1
|
||
|
On Joint Representation Learning of Network Structure and Document Content1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.237-251, ⟨10.1007/978-3-319-66808-6_16⟩
Conference papers
hal-01677137v1
|
||
|
LiveCloudInspector: Towards Integrated IaaS Forensics in the Cloud15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.207-220, ⟨10.1007/978-3-319-19129-4_17⟩
Conference papers
hal-01775040v1
|
||
Distributed Applications and Interoperable SystemsSpringer International Publishing, LNCS-10320, 2017, Lecture Notes in Computer Science, 978-3-319-59664-8. ⟨10.1007/978-3-319-59665-5⟩
Books
hal-01800116v1
|
|||
|
An Empirical Evaluation of Search Algorithms for App Testing31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.123-139, ⟨10.1007/978-3-030-31280-0_8⟩
Conference papers
hal-02526338v1
|
||
|
Malleable Signatures for Resource Constrained Platforms7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.18-33, ⟨10.1007/978-3-642-38530-8_2⟩
Conference papers
hal-01485931v1
|
||
|
Network Forensics for Cloud Computing13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.29-42, ⟨10.1007/978-3-642-38541-4_3⟩
Conference papers
hal-01489462v1
|
||
|
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.208-223, ⟨10.1007/978-3-642-30955-7_18⟩
Conference papers
hal-01534306v1
|
||
|
FITCH: Supporting Adaptive Replicated Services in the Cloud13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.15-28, ⟨10.1007/978-3-642-38541-4_2⟩
Conference papers
hal-01489461v1
|
||
|
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.136-150, ⟨10.1007/978-3-642-38323-6_10⟩
Conference papers
hal-01468199v1
|
||
|
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.50-65, ⟨10.1007/978-3-642-38530-8_4⟩
Conference papers
hal-01485933v1
|
||
|
Sliced Path Prefixes: An Effective Method to Enable Refinement Selection35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.228-243, ⟨10.1007/978-3-319-19195-9_15⟩
Conference papers
hal-01767324v1
|
||
|
WebBFT: Byzantine Fault Tolerance for Resilient Interactive Web Applications18th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2018, Madrid, Spain. pp.1-17, ⟨10.1007/978-3-319-93767-0_1⟩
Conference papers
hal-01824640v1
|