Filter your results
- 27
- 27
- 27
- 27
- 16
- 688
- 27
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
WHERE – Physical Entries to the Internet16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.45-52, ⟨10.1007/978-3-319-92081-8_5⟩
Conference papers
hal-01821415v1
|
||
|
Issues of Culture in Designing for Accessibility16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.55-67, ⟨10.1007/978-3-319-92081-8_6⟩
Conference papers
hal-01821414v1
|
||
|
Tailored, Multimodal and Opportune Interactions on a Wearable Sport Coach: The WE-nner Framework16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.24-32, ⟨10.1007/978-3-319-92081-8_3⟩
Conference papers
hal-01821423v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.140-152, ⟨10.1007/978-3-319-93524-9_9⟩
Conference papers
hal-01875520v1
|
||
|
QBP Notation for Explicit Representation of Properties, Their Refinement and Their Potential Conflicts: Application to Interactive Systems16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.91-105, ⟨10.1007/978-3-319-92081-8_9⟩
Conference papers
hal-01821411v1
|
||
|
Rethinking Wearables in the Realm of Architecture16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.16-23, ⟨10.1007/978-3-319-92081-8_2⟩
Conference papers
hal-01821409v1
|
||
|
Design for Cultural Heritage – Developing Understanding in Teaching and Practice16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.3-15, ⟨10.1007/978-3-319-92081-8_1⟩
Conference papers
hal-01821421v1
|
||
|
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.113-129, ⟨10.1007/978-3-319-93524-9_7⟩
Conference papers
hal-01875515v1
|
||
|
Socio-technical HCI for Ethical Value Exchange16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.148-159, ⟨10.1007/978-3-319-92081-8_15⟩
Conference papers
hal-01821413v1
|
||
|
A More Efficient 1–Checkable Secure Outsourcing Algorithm for Bilinear Maps11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.155-164, ⟨10.1007/978-3-319-93524-9_10⟩
Conference papers
hal-01875517v1
|
||
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
Declarative Interaction Towards Evolutionary User Interface Prototyping16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.83-90, ⟨10.1007/978-3-319-92081-8_8⟩
Conference papers
hal-01821422v1
|
||
|
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.41-55, ⟨10.1007/978-3-319-93524-9_3⟩
Conference papers
hal-01875518v1
|
||
|
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough?11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.177-188, ⟨10.1007/978-3-319-93524-9_12⟩
Conference papers
hal-01875523v1
|
||
|
The Evolution of Visual Art: From Painting to Interaction Design16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.33-44, ⟨10.1007/978-3-319-92081-8_4⟩
Conference papers
hal-01821426v1
|
||
|
Philanthropy on the Blockchain11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.25-38, ⟨10.1007/978-3-319-93524-9_2⟩
Conference papers
hal-01875527v1
|
||
|
Reflections on System Properties Valued by End Users in Designing End-User Development Systems16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.106-113, ⟨10.1007/978-3-319-92081-8_10⟩
Conference papers
hal-01821412v1
|
||
|
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers
hal-01875521v1
|
||
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.75-92, ⟨10.1007/978-3-319-93524-9_5⟩
Conference papers
hal-01875526v1
|
||
|
Looking for “the Big Picture” on a Small Screen: A Note on Overview Support in Cooperative Work16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.133-139, ⟨10.1007/978-3-319-92081-8_13⟩
Conference papers
hal-01821425v1
|
||
|
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.165-176, ⟨10.1007/978-3-319-93524-9_11⟩
Conference papers
hal-01875519v1
|
||
|
Examination of a New Defense Mechanism: Honeywords11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.130-139, ⟨10.1007/978-3-319-93524-9_8⟩
Conference papers
hal-01875522v1
|
||
|
Socio-technical Design of an App for Migrants Rescue Operations16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.140-147, ⟨10.1007/978-3-319-92081-8_14⟩
Conference papers
hal-01821417v1
|
||
|
Conflict, Costs and Trade-Offs in User Interface Design16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.71-82, ⟨10.1007/978-3-319-92081-8_7⟩
Conference papers
hal-01821427v1
|
||
|
Similarity as a Design Driver for User Interfaces of Dependable Critical Systems16th IFIP Conference on Human-Computer Interaction (INTERACT 2017), Sep 2017, Bombay, India. pp.114-122, ⟨10.1007/978-3-319-92081-8_11⟩
Conference papers
hal-01821420v1
|
||
|
Value Creation and Delivery in Agile Software Development: Overcoming Stakeholder Conflicts16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.123-129, ⟨10.1007/978-3-319-92081-8_12⟩
Conference papers
hal-01821416v1
|