Search - IFIP Open Digital Library Access content directly

Filter your results

28 results
Structure: Internal structure identifier : 98761
Image document

A Trusted UI for the Mobile Web

Bastian Braun , Johannes Koestler , Joachim Posegga , Martin Johns
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.127-141, ⟨10.1007/978-3-642-55415-5_11⟩
Conference papers hal-01370360v1
Image document

Emergence of Global Speed Patterns in a Traffic Scenario

Richard Holzer , Hermann De Meer , Cristina Beltran Ruiz
7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.39-53, ⟨10.1007/978-3-642-54140-7_4⟩
Conference papers hal-01291492v1
Image document

Information Security and Privacy – Challenges and Outlook

Steven Furnell , Paul Haskell-Dowland , Manish Agrawal , Richard Baskerville , Anirban Basu , et al.
Advancing Research in Information and Communication Technology, AICT-600, pp.383-401, 2021, ⟨10.1007/978-3-030-81701-5_16⟩
Book sections hal-03325978v1
Image document

Network Federation for Inter-cloud Operations

Johannes Köstler , Sven Gebauer , Hans P. Reiser
21th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2021, Valletta, Malta. pp.21-37, ⟨10.1007/978-3-030-78198-9_2⟩
Conference papers hal-03384865v1
Image document

Mapping of Self-organization Properties and Non-functional Requirements in Smart Grids

Sebastian Lehnhoff , Sebastian Rohjans , Richard Holzer , Florian Niedermeier , Hermann De Meer
7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.163-168, ⟨10.1007/978-3-642-54140-7_16⟩
Conference papers hal-01291514v1
Image document

Novelty-Aware Attack Recognition - Intrusion Detection with Organic Computing Techniques

Dominik Fisch , Ferdinand Kastl , Bernhard Sick
7th IFIP TC 10 Working Conference on Distributed, Parallel and Biologically Inspired Systems (DIPES) / 3rd IFIP TC 10 International Conference on Biologically-Inspired Collaborative Computing (BICC) / Held as Part of World Computer Congress (WCC) , Sep 2010, Brisbane, Australia. pp.242-253, ⟨10.1007/978-3-642-15234-4_24⟩
Conference papers hal-01054495v1
Image document

Towards Authenticity and Privacy Preserving Accountable Workflows

David Derler , Christian Hanser , Henrich C. Pöhls , Daniel Slamanig
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.170-186, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_12⟩
Book sections hal-01619735v1

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

Pierangela Samarati , Michael Tunstall , Joachim Posegga , Konstantinos Markantonakis , Damien Sauveron
Springer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books hal-01550529v1
Image document

Dual Camera Magic Lens for Handheld AR Sketching

Klen Čopič Pucihar , Jens Grubert , Matjaž Kljun
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.523-527, ⟨10.1007/978-3-319-22723-8_53⟩
Conference papers hal-01610773v1

Formal Techniques for Distributed Systems

Dirk Beyer , Michele Boreale
Springer, LNCS-7892, 2013, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-38592-6⟩
Books hal-01515249v1
Image document

When Your Browser Becomes the Paper Boy

Juan D. Parra Rodriguez , Eduard Brehm , Joachim Posegga
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.94-107, ⟨10.1007/978-3-319-99828-2_7⟩
Conference papers hal-02023747v1
Image document

Demand Response by Decentralized Device Control Based on Voltage Level

Wilfried Elmenreich , Stefan Schuster
7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.186-189, ⟨10.1007/978-3-642-54140-7_20⟩
Conference papers hal-01291520v1
Image document

Towards Hypervisor Support for Enhancing the Performance of Virtual Machine Introspection

Benjamin Taubmann , Hans P. Reiser
20th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2020, Valletta, Malta. pp.41-54, ⟨10.1007/978-3-030-50323-9_3⟩
Conference papers hal-03223259v1

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems

Ioannis Askoxylakis , Henrich C. Pöhls , Joachim Posegga
Springer, LNCS-7322, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-30955-7⟩
Books hal-01534316v1
Image document

Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications

Bastian Braun , Caspar Gries , Benedikt Petschkuhn , Joachim Posegga
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.264-277, ⟨10.1007/978-3-642-55415-5_22⟩
Conference papers hal-01370372v1
Image document

Modeling Wireless Sensor Networks Using Finite-Source Retrial Queues with Unreliable Orbit

Patrick Wüchner , János Sztrik , Hermann De Meer
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.73-86, ⟨10.1007/978-3-642-25575-5_7⟩
Conference papers hal-01586895v1
Image document

On Joint Representation Learning of Network Structure and Document Content

Jörg Schlötterer , Christin Seifert , Michael Granitzer
1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.237-251, ⟨10.1007/978-3-319-66808-6_16⟩
Conference papers hal-01677137v1
Image document

LiveCloudInspector: Towards Integrated IaaS Forensics in the Cloud

Julian Zach , Hans P. Reiser
15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.207-220, ⟨10.1007/978-3-319-19129-4_17⟩
Conference papers hal-01775040v1

Distributed Applications and Interoperable Systems

Lydia Y. Chen , Hans Reiser
Springer International Publishing, LNCS-10320, 2017, Lecture Notes in Computer Science, 978-3-319-59664-8. ⟨10.1007/978-3-319-59665-5⟩
Books hal-01800116v1
Image document

An Empirical Evaluation of Search Algorithms for App Testing

Leon Sell , Michael Auer , Christoph Frädrich , Michael Gruber , Philemon Werli , et al.
31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.123-139, ⟨10.1007/978-3-030-31280-0_8⟩
Conference papers hal-02526338v1
Image document

Malleable Signatures for Resource Constrained Platforms

Henrich C. Pöhls , Stefan Peters , Kai Samelin , Joachim Posegga , Hermann De Meer
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.18-33, ⟨10.1007/978-3-642-38530-8_2⟩
Conference papers hal-01485931v1
Image document

Network Forensics for Cloud Computing

Tobias Gebhardt , Hans P. Reiser
13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.29-42, ⟨10.1007/978-3-642-38541-4_3⟩
Conference papers hal-01489462v1
Image document

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android

Daniel Schreckling , Joachim Posegga , Johannes Köstler , Matthias Schaff
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.208-223, ⟨10.1007/978-3-642-30955-7_18⟩
Conference papers hal-01534306v1
Image document

FITCH: Supporting Adaptive Replicated Services in the Cloud

Vinicius V. Cogo , André Nogueira , João Sousa , Marcelo Pasin , Hans P. Reiser , et al.
13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.15-28, ⟨10.1007/978-3-642-38541-4_2⟩
Conference papers hal-01489461v1
Image document

Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity

Henrich C. Pöhls
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.136-150, ⟨10.1007/978-3-642-38323-6_10⟩
Conference papers hal-01468199v1
Image document

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

Daniel Schreckling , Stephan Huber , Focke Höhne , Joachim Posegga
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.50-65, ⟨10.1007/978-3-642-38530-8_4⟩
Conference papers hal-01485933v1
Image document

Sliced Path Prefixes: An Effective Method to Enable Refinement Selection

Dirk Beyer , Stefan Löwe , Philipp Wendler
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.228-243, ⟨10.1007/978-3-319-19195-9_15⟩
Conference papers hal-01767324v1
Image document

WebBFT: Byzantine Fault Tolerance for Resilient Interactive Web Applications

Christian Berger , Hans P. Reiser
18th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2018, Madrid, Spain. pp.1-17, ⟨10.1007/978-3-319-93767-0_1⟩
Conference papers hal-01824640v1