Filter your results
- 66
- 6
- 1
- 67
- 6
- 73
- 9
- 5
- 3
- 6
- 1
- 2
- 1
- 9
- 5
- 7
- 14
- 14
- 6
- 73
- 12
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
73 results
|
Heap-Dependent Expressions in Separation LogicJoint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.170-185, ⟨10.1007/978-3-642-13464-7_14⟩
Conference papers
hal-01055155v1
|
||
|
Efficient and Effective Buffer Overflow Protection on ARM Processors4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.1-16, ⟨10.1007/978-3-642-12368-9_1⟩
Conference papers
hal-01056081v1
|
||
|
PriMan : A Privacy-Preserving Identity Framework24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.327-334, ⟨10.1007/978-3-642-13739-6_24⟩
Conference papers
hal-01056676v1
|
||
|
Dynamic Composition of Cross-Organizational Features in Distributed Software Systems10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.183-197, ⟨10.1007/978-3-642-13645-0_14⟩
Conference papers
hal-01061086v1
|
||
|
PA Meets IS Research: Analysing Failure of Intergovernmental Information Systems via IS Adoption and Success Models13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.72-83, ⟨10.1007/978-3-662-44426-9_6⟩
Conference papers
hal-01401726v1
|
||
|
Secure Storage on Android with Context-Aware Access Control15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.46-59, ⟨10.1007/978-3-662-44885-4_4⟩
Conference papers
hal-01404184v1
|
||
|
A Study on Advanced Persistent Threats15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.63-72, ⟨10.1007/978-3-662-44885-4_5⟩
Conference papers
hal-01404186v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-8735, 2014, Lecture Notes in Computer Science, 978-3-662-44884-7. ⟨10.1007/978-3-662-44885-4⟩
Books
hal-01404210v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.209-221, ⟨10.1007/978-3-319-22479-4_16⟩
Conference papers
hal-01412272v1
|
||
|
Learning HCI and InfoVis in the Open8th Workshop on Human-Computer Interaction and Visualization (HCIV), Sep 2011, Lisbon, Portugal. pp.8-16, ⟨10.1007/978-3-642-54894-9_2⟩
Conference papers
hal-01414648v1
|
||
|
Secure Resource Sharing for Embedded Protected Module Architectures9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers
hal-01442554v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders (Part 2)14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.386-397, ⟨10.1007/978-3-319-25013-7_31⟩
Conference papers
hal-01448056v1
|
||
|
Commercial Home Assistance (eHealth) ServicesInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.28-42, ⟨10.1007/978-3-642-27585-2_3⟩
Conference papers
hal-01481504v1
|
||
|
Interactive Interaction Constraints15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.211-225, ⟨10.1007/978-3-642-38493-6_15⟩
Conference papers
hal-01486028v1
|
||
|
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.113-127, ⟨10.1007/978-3-642-39614-4_8⟩
Conference papers
hal-01492780v1
|
||
|
Client-Side Biometric Verification Based on Trusted Computing14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.34-49, ⟨10.1007/978-3-642-40779-6_3⟩
Conference papers
hal-01492832v1
|
||
|
Dedicated Hardware for Attribute-Based Credential Verification14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.50-65, ⟨10.1007/978-3-642-40779-6_4⟩
Conference papers
hal-01492833v1
|
||
|
Designing with Dementia: Guidelines for Participatory Design together with Persons with Dementia14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.649-666, ⟨10.1007/978-3-642-40483-2_46⟩
Conference papers
hal-01497469v1
|
||
|
The ‘Relay Ideation’ Technique: Moving from Problem Understanding to Problem Solving in the Design Process14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.651-658, ⟨10.1007/978-3-642-40498-6_57⟩
Conference papers
hal-01510503v1
|
||
Participatory Design for Persons with Cognitive or Sensory Impairments14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.781
Conference papers
hal-01513885v1
|
|||
|
FAMoS: A Flexible Active Monitoring Service for Wireless Sensor Networks12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.104-117, ⟨10.1007/978-3-642-30823-9_9⟩
Conference papers
hal-01527640v1
|
||
|
Flexub: Dynamic Subscriptions for Publish/Subscribe Systems in MANETs12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.132-139, ⟨10.1007/978-3-642-30823-9_11⟩
Conference papers
hal-01527643v1
|
||
|
Serene: Self-Reliant Client-Side Protection against Session Fixation12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.59-72, ⟨10.1007/978-3-642-30823-9_5⟩
Conference papers
hal-01527644v1
|
||
|
Noninterference via Symbolic Execution14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.152-168, ⟨10.1007/978-3-642-30793-5_10⟩
Conference papers
hal-01528732v1
|
||
|
Secure Multi-Execution through Static Program Transformation14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.186-202, ⟨10.1007/978-3-642-30793-5_12⟩
Conference papers
hal-01528736v1
|
||
|
Partial Connector Colouring14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.59-73, ⟨10.1007/978-3-642-30829-1_5⟩
Conference papers
hal-01529589v1
|
||
|
Subobject Transactional Memory14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.44-58, ⟨10.1007/978-3-642-30829-1_4⟩
Conference papers
hal-01529600v1
|
||
|
Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.2-13, ⟨10.1007/978-3-642-30633-4_2⟩
Conference papers
hal-01529786v1
|
||
|
Recent Developments in Low-Level Software Security6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.1-16, ⟨10.1007/978-3-642-30955-7_1⟩
Conference papers
hal-01534300v1
|
||
|
ROAC: A Role-Oriented Access Control Model6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.113-127, ⟨10.1007/978-3-642-30955-7_11⟩
Conference papers
hal-01534310v1
|