Filter your results
- 3
- 1
- 3
- 1
- 4
- 2
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers
hal-01480180v1
|
||
|
A Real-Time Privacy Amplification Scheme in Quantum Key Distribution1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers
hal-01480204v1
|
||
|
Information and Communication TechnologySpringer, LNCS-7804, 2013, Lecture Notes in Computer Science, 978-3-642-36817-2. ⟨10.1007/978-3-642-36818-9⟩
Books
hal-01480217v1
|
||
|
Trustworthy Opportunistic Access to the Internet of Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers
hal-01480255v1
|