Joaquin Garcia-Alfaro
|
Books And Theses
Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems,
Emerging Trends in Cybersecurity Applications 2023
Emerging Trends in Cybersecurity Applications 2023
Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks,
Advanced Research in Data Privacy 2015
Advanced Research in Data Privacy 2015
Articles
SHIELD : assessing security-by-design in federated data spaces using attack graphs,
The 40th ACM/SIGAPP Symposium On Applied Computing ( SAC) 2025, Catania, Italy
The 40th ACM/SIGAPP Symposium On Applied Computing ( SAC) 2025, Catania, Italy
Training on social media cybersecurity skills in the healthcare context,
2024 13th International Conference on Communications, Circuits and Systems (ICCCAS) 2024, Stavanger, Norway
2024 13th International Conference on Communications, Circuits and Systems (ICCCAS) 2024, Stavanger, Norway
Platelet : pioneering security and privacy compliant simulation for intelligent transportation systems and V2X Platelet : Un simulateur pionnier conforme aux exigences de sécurité et de vie privée pour les systèmes de transport intelligents (C-ITS) et des communications V2X,
The 22nd IEEE International Symposium on Network Computing and Applications (NCA 2024) 2024, CEUB, Bertinoro (FC), Italy
The 22nd IEEE International Symposium on Network Computing and Applications (NCA 2024) 2024, CEUB, Bertinoro (FC), Italy
ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks,
Journal of information security and applications 2023
Journal of information security and applications 2023
Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms,
ESORICS Workshops 2023
ESORICS Workshops 2023
Capacity Requirements in Networks of Quantum Repeaters and Terminals,
QCE 2020, Denver (online), United States
QCE 2020, Denver (online), United States
Cyber-Resilience Evaluation of Cyber-Physical Systems,
NCA 2020, Cambridge, MA (online), United States
NCA 2020, Cambridge, MA (online), United States
LockDown: Balance Availability Attack Against Lightning Network Channels,
Financial Cryptography 2020
Financial Cryptography 2020
Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks,
GLOBECOM Workshops 2019, Waikoloa, United States
GLOBECOM Workshops 2019, Waikoloa, United States
Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles,
GLOBECOM Workshops 2019, Waikoloa, United States
GLOBECOM Workshops 2019, Waikoloa, United States
Reflective Attenuation of Cyber-Physical Attacks,
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019, Luxembourg, Luxembourg
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019, Luxembourg, Luxembourg
On the Difficulty of Hiding the Balance of Lightning Network Channels,
AsiaCCS 2019, Auckland, New Zealand
AsiaCCS 2019, Auckland, New Zealand
A study on mitigation techniques for SCADA-driven cyber-physical systems,
FPS 2018: 11th International Symposium on Foundations & Practice of Security 2018, Montreal, Canada
FPS 2018: 11th International Symposium on Foundations & Practice of Security 2018, Montreal, Canada
The implementation of GNU radio blocks for decoding long-lasting frames in mobile underwater acoustic communications,
GRCON 2018: 8th Annual GNU Radio Conference 2018, Henderson, United States
GRCON 2018: 8th Annual GNU Radio Conference 2018, Henderson, United States
GNU radio blocks for long-lasting frames in mobile underwater acoustic communications,
French GNU Radio days 2018 2018, Lyon, France
French GNU Radio days 2018 2018, Lyon, France
Lifelogging Protection Scheme for Internet-Based Personal Assistants,
DPM/CBT@ESORICS 2018, Barcelona, Spain
DPM/CBT@ESORICS 2018, Barcelona, Spain
Learning to Communicate Underwater: An Exploration of Limited Mobility Agents,
WUWNet 2017, Halifax, Ns, Canada
WUWNet 2017, Halifax, Ns, Canada
Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric,
FPS 2017, Nancy, France
FPS 2017, Nancy, France
The sound of communication in underwater acoustic sensor networks,
ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks 2017, Niagara Falls, Canada
ADHOCNETS 2017 : 9th International Conference on Ad Hoc Networks 2017, Niagara Falls, Canada
Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band,
ADHOCNETS 2017, Niagara Falls, Canada
ADHOCNETS 2017, Niagara Falls, Canada
Security of Cyber-Physical Systems. From Theory to Testbeds and Validation,
CoRR 2017, Heraklion, Greece
CoRR 2017, Heraklion, Greece
An n-sided polygonal model to calculate the impact of cyber security events,
CoRR 2017, Roscoff, France
CoRR 2017, Roscoff, France
Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms,
TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2016, Tianjin, China
TRUSTCOM 2016 : 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2016, Tianjin, China
Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks,
NordSec 2016, Oulu, Finland
NordSec 2016, Oulu, Finland
Selection of Mitigation Actions Based on Financial and Operational Impact Assessments,
ARES 2016, Salzburg, Austria
ARES 2016, Salzburg, Austria
Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks,
ARES 2016, Salzbourg, Austria
ARES 2016, Salzbourg, Austria
CACEV: A Cost and Carbon Emission-Efficient Virtual Machine Placement Method for Green Distributed Clouds,
SCC 2016, San Francisco, United States
SCC 2016, San Francisco, United States
Automated classification of C&C connections through malware URL clustering,
2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection 2015, Hamburg, Germany
2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection 2015, Hamburg, Germany
Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics,
SECRYPT 2015, Colmar, France
SECRYPT 2015, Colmar, France
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks,
SecureComm 2015, Dallas, TX, United States
SecureComm 2015, Dallas, TX, United States
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats,
NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security 2015, Paris, France
NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security 2015, Paris, France
Location-free link state routing for underwater acoustic sensor networks,
CCECE 2015, Halifax, Canada
CCECE 2015, Halifax, Canada
Simulation of underwater communications with a colored noise approximation and mobility,
CCECE 2015, Halifax, Canada
CCECE 2015, Halifax, Canada
NACER: A Network-Aware Cost-Efficient Resource Allocation Method for Processing-Intensive Tasks in Distributed Clouds,
NCA 2015, Cambridge, Ma, United States
NCA 2015, Cambridge, Ma, United States
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems,
SEC 2015, Hamburg, Germany
SEC 2015, Hamburg, Germany
Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment,
BADGERS@ESORICS 2014, Wroclaw, Poland
BADGERS@ESORICS 2014, Wroclaw, Poland
On the adaptation of physical-layer failure detection mechanisms to handle attacks against SCADA systems,
Digital trust : 1st Symposium on Digital Trust in Auvergne 2014, Clermont-Ferrand, France
Digital trust : 1st Symposium on Digital Trust in Auvergne 2014, Clermont-Ferrand, France
A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model,
ICC 2014, Sidney, Australia
ICC 2014, Sidney, Australia
Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks,
ADHOC-NOW 2014, Benidorm, Spain
ADHOC-NOW 2014, Benidorm, Spain
Simulaciones software para el estudio de amenazas contra sistemas SCADA,
RECSI 2014 : XIII Reunión Española sobre Criptología y Seguridad de la Información 2014, Alicante, Spain
RECSI 2014 : XIII Reunión Española sobre Criptología y Seguridad de la Información 2014, Alicante, Spain
The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model,
VTC Fall 2014, Vancouver, Canada
VTC Fall 2014, Vancouver, Canada
Attribute-Based Mining Process for the Organization-Based Access Control Model,
TrustCom/ISPA/IUCC 2013, Melbourne, Australia
TrustCom/ISPA/IUCC 2013, Melbourne, Australia
Real-time malicious fast-flux detection using DNS and bot related features,
PST 2013, Tarragona, Spain
PST 2013, Tarragona, Spain
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies,
NordSec 2013, Ilulissat, Greenland
NordSec 2013, Ilulissat, Greenland
A new analytic model for the cognitive radio jump-stay algorithm,
Wireless Days 2013, Valencia, Spain
Wireless Days 2013, Valencia, Spain
Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model,
FPS 2013, La Rochelle, France
FPS 2013, La Rochelle, France
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags,
Financial Cryptography Workshops 2010
Financial Cryptography Workshops 2010
Journal articles
Software vulnerability detection under poisoning attacks using CNN-based image processing,
Int. J. Inf. Sec. 2025
Int. J. Inf. Sec. 2025
Anonymous certification for E-assessment opinion polls,
Journal of Ambient Intelligence and Humanized Computing 2023
Journal of Ambient Intelligence and Humanized Computing 2023
Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications,
Trans. Emerg. Telecommun. Technol. 2019
Trans. Emerg. Telecommun. Technol. 2019
Doppler effect in the acoustic ultra low frequency band for wireless underwater networks,
Mobile Networks and Applications 2018
Mobile Networks and Applications 2018
Integration of an adaptive trust-based e-assessment system into virtual learning environments - The TeSLA project experience,
Internet technology letters 2018
Internet technology letters 2018
Introduction to the special section on critical systems modelling and security (third edition),
Computers and Electrical Engineering 2018
Computers and Electrical Engineering 2018
Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems,
Transactions on emerging telecommunications technologies 2018
Transactions on emerging telecommunications technologies 2018
Dynamic risk management response system to handle cyber threats,
Future Generation Computer Systems 2018
Future Generation Computer Systems 2018
On the use of watermark-based schemes to detect cyber-physical attacks,
EURASIP Journal on Information Security 2017
EURASIP Journal on Information Security 2017
Selection of Pareto-efficient response plans based on financial and operational assessments,
EURASIP Journal on Information Security 2017
EURASIP Journal on Information Security 2017
A polytope-based approach to measure the impact of events against critical infrastructures,
Journal of Computer and System Sciences 2017
Journal of Computer and System Sciences 2017
Reputation trust mechanism under the organizational-based access control model,
Security and communication networks 2016
Security and communication networks 2016
Channel selection using a multiple radio model,
Journal of Network and Computer Applications (JNCA) 2016
Journal of Network and Computer Applications (JNCA) 2016
Introduction to the special section on critical systems modelling and security,
Computers and Electrical Engineering 2015
Computers and Electrical Engineering 2015
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index,
Computers and Electrical Engineering 2015
Computers and Electrical Engineering 2015
On the similarity of commercial EPC Gen2 pseudorandom number generators,
Transactions on emerging telecommunications technologies 2014
Transactions on emerging telecommunications technologies 2014
Searching for a black hole in interconnected networks using mobile agents and tokens,
Journal of Parallel and Distributed Computing 2014
Journal of Parallel and Distributed Computing 2014
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems,
J. Netw. Comput. Appl. 2014
J. Netw. Comput. Appl. 2014
Semantic analysis of role mining results and shadowed roles detection,
Information Security Technical Report 2013
Information Security Technical Report 2013
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs,
Journal of Network and Computer Applications (JNCA) 2013
Journal of Network and Computer Applications (JNCA) 2013
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks,
Ad Hoc Sens. Wirel. Networks 2012
Ad Hoc Sens. Wirel. Networks 2012
Transaction-based authentication and key agreement protocol for inter-domain VoIP,
J. Netw. Comput. Appl. 2012
J. Netw. Comput. Appl. 2012
Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes,
Ann. des Télécommunications 2011
Ann. des Télécommunications 2011
Improved flooding of broadcast messages using extended multipoint relaying,
J. Netw. Comput. Appl. 2011
J. Netw. Comput. Appl. 2011
A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags,
Wirel. Pers. Commun. 2011
Wirel. Pers. Commun. 2011
Complete analysis of configuration rules to guarantee reliable network security policies,
Int. J. Inf. Sec. 2008
Int. J. Inf. Sec. 2008
Editorships
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I,
['ESORICS Workshops', 'Lecture Notes in Computer Science'] 2024
['ESORICS Workshops', 'Lecture Notes in Computer Science'] 2024
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I,
['ESORICS', 'Lecture Notes in Computer Science'] 2024
['ESORICS', 'Lecture Notes in Computer Science'] 2024
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II,
['ESORICS', 'Lecture Notes in Computer Science'] 2024
['ESORICS', 'Lecture Notes in Computer Science'] 2024
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III,
['ESORICS', 'Lecture Notes in Computer Science'] 2024
['ESORICS', 'Lecture Notes in Computer Science'] 2024
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV,
['ESORICS', 'Lecture Notes in Computer Science'] 2024
['ESORICS', 'Lecture Notes in Computer Science'] 2024
Foundations and Practice of Security - 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I,
['FPS', 'Lecture Notes in Computer Science'] 2024
['FPS', 'Lecture Notes in Computer Science'] 2024
Foundations and Practice of Security - 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part II,
['FPS', 'Lecture Notes in Computer Science'] 2024
['FPS', 'Lecture Notes in Computer Science'] 2024
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers,
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2023
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2023
Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2023
['FPS', 'Lecture Notes in Computer Science'] 2023
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers,
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2022
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2022
Foundations and Practice of Security - 14th International Symposium, FPS 2021, Paris, France, December 7-10, 2021, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2022
['FPS', 'Lecture Notes in Computer Science'] 2022
Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers,
['CRiSIS', 'Lecture Notes in Computer Science'] 2021
['CRiSIS', 'Lecture Notes in Computer Science'] 2021
Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2021
['FPS', 'Lecture Notes in Computer Science'] 2021
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I,
['SecureComm', 'Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering'] 2021
['SecureComm', 'Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering'] 2021
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II,
['SecureComm', 'Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering'] 2021
['SecureComm', 'Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering'] 2021
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers,
['CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS', 'Lecture Notes in Computer Science'] 2020
['CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS', 'Lecture Notes in Computer Science'] 2020
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers,
['IOSec/MSTEC/FINSEC@ESORICS', 'Lecture Notes in Computer Science'] 2020
['IOSec/MSTEC/FINSEC@ESORICS', 'Lecture Notes in Computer Science'] 2020
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers,
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2020
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2020
Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2020
['FPS', 'Lecture Notes in Computer Science'] 2020
Security and Safety Interplay of Intelligent Software Systems - ESORICS 2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers,
['ISSA/CSITS@ESORICS', 'Lecture Notes in Computer Science'] 2019
['ISSA/CSITS@ESORICS', 'Lecture Notes in Computer Science'] 2019
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings,
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2019
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2019
Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2019
['FPS', 'Lecture Notes in Computer Science'] 2019
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings,
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2018
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2018
Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers,
Lecture Notes in Computer Science 2018, Nancy, France
Lecture Notes in Computer Science 2018, Nancy, France
Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers,
['CRiSIS', 'Lecture Notes in Computer Science'] 2018
['CRiSIS', 'Lecture Notes in Computer Science'] 2018
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2017
['FPS', 'Lecture Notes in Computer Science'] 2017
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings,
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2017
['DPM/CBT@ESORICS', 'Lecture Notes in Computer Science'] 2017
Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings,
['RAID', 'Lecture Notes in Computer Science'] 2016
['RAID', 'Lecture Notes in Computer Science'] 2016
Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers,
['DPM/QASA@ESORICS', 'Lecture Notes in Computer Science'] 2016
['DPM/QASA@ESORICS', 'Lecture Notes in Computer Science'] 2016
Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2016
['FPS', 'Lecture Notes in Computer Science'] 2016
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers,
['DPM/SETOP/QASA', 'Lecture Notes in Computer Science'] 2015
['DPM/SETOP/QASA', 'Lecture Notes in Computer Science'] 2015
Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2015
['FPS', 'Lecture Notes in Computer Science'] 2015
Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2014
['FPS', 'Lecture Notes in Computer Science'] 2014
Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers,
['DPM/SETOP', 'Lecture Notes in Computer Science'] 2014
['DPM/SETOP', 'Lecture Notes in Computer Science'] 2014
Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2013
['FPS', 'Lecture Notes in Computer Science'] 2013
Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings,
['DBSec', 'Lecture Notes in Computer Science'] 2012
['DBSec', 'Lecture Notes in Computer Science'] 2012
Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers,
['DPM/SETOP', 'Lecture Notes in Computer Science'] 2012
['DPM/SETOP', 'Lecture Notes in Computer Science'] 2012
Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers,
['FPS', 'Lecture Notes in Computer Science'] 2012
['FPS', 'Lecture Notes in Computer Science'] 2012
Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers,
['DPM/SETOP', 'Lecture Notes in Computer Science'] 2011
['DPM/SETOP', 'Lecture Notes in Computer Science'] 2011
Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers,
['DPM/SETOP', 'Lecture Notes in Computer Science'] 2010
['DPM/SETOP', 'Lecture Notes in Computer Science'] 2010
Miscs
Foundations and Practice of Security: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022, Revised Selected Papers,
Lecture Notes in Computer Science 2023
Lecture Notes in Computer Science 2023
Generated using
minifold
and minifold-lincs
at 2025-03-31 17:01.