Search - IFIP Open Digital Library Access content directly

Filter your results

119 results
Image document

A Study on Advanced Persistent Threats

Ping Chen , Lieven Desmet , Christophe Huygens
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.63-72, ⟨10.1007/978-3-662-44885-4_5⟩
Conference papers hal-01404186v1
Image document

A Categorical Approach to Secure Compilation

Stelios Tsampas , Andreas Nuyts , Dominique Devriese , Frank Piessens
15th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2020, Dublin, Ireland. pp.155-179, ⟨10.1007/978-3-030-57201-3_9⟩
Conference papers hal-03232345v1
Image document

A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning

Koen Decroix , Milica Milutinovic , Bart De Decker , Vincent Naessens
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.163-170, ⟨10.1007/978-3-642-24712-5_14⟩
Conference papers hal-01596195v1
Image document

Performance Analysis of Accumulator-based Revocation Mechanisms

Jorn Lapon , Markulf Kohlweiss , Bart Decker , Vincent Naessens
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.289-301, ⟨10.1007/978-3-642-15257-3_26⟩
Conference papers hal-01054508v1
Image document

A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications

Stefan Walraven , Eddy Truyen , Wouter Joosen
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.370-389, ⟨10.1007/978-3-642-25821-3_19⟩
Conference papers hal-01597768v1
Image document

A Smart Card Based Solution for User-Centric Identity Management

Jan Vossaert , Pieter Verhaeghe , Bart De Decker , Vincent Naessens
6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.164-177, ⟨10.1007/978-3-642-20769-3_14⟩
Conference papers hal-01559463v1
Image document

Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers

Tim Van Hamme , Davy Preuveneers , Wouter Joosen
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.473-485, ⟨10.1007/978-3-319-61176-1_26⟩
Conference papers hal-01684348v1
Image document

Serene: Self-Reliant Client-Side Protection against Session Fixation

Philippe De Ryck , Nick Nikiforakis , Lieven Desmet , Frank Piessens , Wouter Joosen
12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.59-72, ⟨10.1007/978-3-642-30823-9_5⟩
Conference papers hal-01527644v1
Image document

Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm

Niels Bouten , Anna Hristoskova , Femke Ongenae , Jelle Nelis , Filip De Turck
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.2-13, ⟨10.1007/978-3-642-30633-4_2⟩
Conference papers hal-01529786v1
Image document

A Modular Test Platform for Evaluation of Security Protocols in NFC Applications

Geoffrey Ottoy , Jeroen Martens , Nick Saeys , Bart Preneel , Lieven De Strycker , et al.
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.171-177, ⟨10.1007/978-3-642-24712-5_15⟩
Conference papers hal-01596204v1
Image document

PriMan : A Privacy-Preserving Identity Framework

Kristof Verslype , Pieter Verhaeghe , Jorn Lapon , Vincent Naessens , Bart Decker
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.327-334, ⟨10.1007/978-3-642-13739-6_24⟩
Conference papers hal-01056676v1
Image document

ROAC: A Role-Oriented Access Control Model

Nezar Nassr , Eric Steegmans
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.113-127, ⟨10.1007/978-3-642-30955-7_11⟩
Conference papers hal-01534310v1
Image document

The ‘Relay Ideation’ Technique: Moving from Problem Understanding to Problem Solving in the Design Process

Karin Slegers , Pieter Duysburgh , An Jacobs
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.651-658, ⟨10.1007/978-3-642-40498-6_57⟩
Conference papers hal-01510503v1
Image document

A Digital Game to Learn About Open Data

Davide Di Staso , Fernando Kleiman , Joep Crompvoets , Marijn Janssen
20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.153-164, ⟨10.1007/978-3-030-84789-0_11⟩
Conference papers hal-04175090v1
Image document

Efficient Large-Scale Machine Learning Techniques for Rapid Motif Discovery in Energy Data Streams

K. K. Lykothanasi , S. Sioutas , K. Tsichlas
18th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2022, Hersonissos, Greece. pp.331-342, ⟨10.1007/978-3-031-08333-4_27⟩
Conference papers hal-04317195v1

Coordination Models and Languages

Dave Clarke , Gul Agha
Springer, LNCS-6116, 2010, Lecture Notes in Computer Science, 978-3-642-13413-5. ⟨10.1007/978-3-642-13414-2⟩
Books hal-01555333v1
Image document

A Fuzzy Multi-criteria Decision Making Approach for Analyzing the Risks and Benefits of Opening Data

Ahmad Luthfi , Zeenat Rehena , Marijn Janssen , Joep Crompvoets
17th Conference on e-Business, e-Services and e-Society (I3E), Oct 2018, Kuwait City, Kuwait. pp.397-412, ⟨10.1007/978-3-030-02131-3_36⟩
Conference papers hal-02274163v1
Image document

Secure Resource Sharing for Embedded Protected Module Architectures

Jo Van Bulck , Job Noorman , Jan Tobias Mühlberg , Frank Piessens
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers hal-01442554v1
Image document

Dedicated Hardware for Attribute-Based Credential Verification

Geoffrey Ottoy , Jorn Lapon , Vincent Naessens , Bart Preneel , Lieven De Strycker
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.50-65, ⟨10.1007/978-3-642-40779-6_4⟩
Conference papers hal-01492833v1
Image document

Stress Out: Translating Real-World Stressors into Audio-Visual Stress Cues in VR for Police Training

Quynh Nguyen , Emma Jaspaert , Markus Murtinger , Helmut Schrom-Feiertag , Sebastian Egger-Lampl , et al.
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.551-561, ⟨10.1007/978-3-030-85616-8_32⟩
Conference papers hal-04196885v1
Image document

An Integrated Enterprise Modeling Framework Using the RUP/UML Business Use-Case Model and BPMN

Yves Wautelet , Stephan Poelmans
10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.299-315, ⟨10.1007/978-3-319-70241-4_20⟩
Conference papers hal-01765257v1

Communications and Multimedia Security

David W. Chadwick , Bart De Decker
Springer, LNCS-7394, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32805-3⟩
Books hal-01540895v1

Communications and Multimedia Security

Bart De Decker , André Zúquete
Springer, LNCS-8735, 2014, Lecture Notes in Computer Science, 978-3-662-44884-7. ⟨10.1007/978-3-662-44885-4⟩
Books hal-01404210v1
Image document

Benefits and Trade-Offs of Different Model Representations in Decision Support Systems for Non-expert Users

Francisco Gutiérrez , Xavier Ochoa , Karsten Seipp , Tom Broos , Katrien Verbert
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.576-597, ⟨10.1007/978-3-030-29384-0_35⟩
Conference papers hal-02544619v1

The Practice of Enterprise Modeling

Geert Poels , Frederik Gailly , Estefania Serral Asensio , Monique Snoeck
Springer International Publishing, LNBIP-305, 2017, Lecture Notes in Business Information Processing, 978-3-319-70240-7. ⟨10.1007/978-3-319-70241-4⟩
Books hal-01765245v1
Image document

Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System

Milica Milutinovic , Vincent Naessens , Bart De Decker
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.555-560, ⟨10.1007/978-3-642-30436-1_48⟩
Conference papers hal-01518223v1
Image document

Privacy Preserving Mechanisms for a Pervasive eHealth System

Milica Milutinovic , Koen Decroix , Vincent Naessens , Bart De Decker
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.221-231, ⟨10.1007/978-3-642-31668-5_17⟩
Conference papers hal-01517608v1
Image document

A Look into Business Process Modeling Guidelines through the Lens of the Technology Acceptance Model

Isel Moreno-Montes de Oca , Monique Snoeck , Gladys Casas-Cardoso
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.73-86, ⟨10.1007/978-3-662-45501-2_6⟩
Conference papers hal-01281990v1
Image document

Integrating Risk Representation at Strategic Level for IT Service Governance: A Comprehensive Framework

Aghakhani Ghazaleh , Yves Wautelet , Manuel Kolp , Samedi Heng
13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.307-322, ⟨10.1007/978-3-030-63479-7_21⟩
Conference papers hal-03434646v1
Image document

Explore Data, Enjoy Yourself - KUbism, A Playful Approach to Data Exploration

Bruno Cardoso , Neil Cohn , Frederik Truyen , Koenraad Brosens
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.43-64, ⟨10.1007/978-3-030-85613-7_4⟩
Conference papers hal-04292377v1