Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : Department of Mathematics
labStructName_s : Laboratoire de Haute Sécurité
Image document

Using Critical Incidents in Workshops to Inform eHealth Design

Christiane Grünloh , Jean D. Hallewell Haslwanter , Bridget Kane , Eunji Lee , Thomas Lind , et al.
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.364-373, ⟨10.1007/978-3-319-67744-6_24⟩
Conference papers hal-01676170v1
Image document

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip

Sebanjila Kevin Bukasa , Ronan Lashermes , Hélène Le Bouder , Jean-Louis Lanet , Axel Legay
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers hal-01875521v1
Image document

Dealing with Conflicting User Interface Properties in User-Centered Development Processes

Marco Winckler , Marta Larusdottir , Kati Kuusinen , Cristian Bogdan , Philippe Palanque
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.521-523
Conference papers hal-01680275v1