Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
hal_authIdPerson_i : 993476
Image document

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter

Dongjin Choi , Ilsun You , Pankoo Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers hal-01480180v1
Image document

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution

Bo Liu , Bo Liu , Baokang Zhao , Dingjie Zou , Chunqing Wu , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.453-458, ⟨10.1007/978-3-642-36818-9_50⟩
Conference papers hal-01480204v1
Image document

Trustworthy Opportunistic Access to the Internet of Services

Alessandro Armando , Aniello Castiglione , Gabriele Costa , Ugo Fiore , Alessio Merlo , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers hal-01480255v1