Search results for: Jean-Pierre Hubaux
Lecture Notes in Computer Science > Privacy Enhancing Technologies > Ninth Privacy Enhancing Technologies Symposium > 216-234
Lecture Notes in Computer Science > Decision and Game Theory for Security > Network Security and Botnets > 149-167
Lecture Notes in Computer Science > Decision and Game Theory for Security > Privacy and Anonymity > 38-57
Lecture Notes in Computer Science > Decision and Game Theory for Security > Security and Trust in Social Networks > 163-181
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Security and Privacy in Communication Networks > Wireless Network Security III > 350-372
Pervasive and Mobile Computing > 2016 > 25 > C > 125-142
2015 IEEE Symposium on Security and Privacy > 447 - 462
IEEE Transactions on Dependable and Secure Computing > 2014 > 11 > 3 > 266 - 279
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 7 > 1141 - 1156
IEEE Transactions on Mobile Computing > 2014 > 13 > 11 > 2445 - 2457
GeoInformatica > 2014 > 18 > 1 > 165-191
2013 IEEE Global Communications Conference (GLOBECOM) > 2723 - 2729
IEEE Transactions on Dependable and Secure Computing > 2013 > 10 > 6 > 355 - 367