Filter your results
- 66
- 6
- 1
- 67
- 6
- 73
- 9
- 5
- 3
- 6
- 1
- 2
- 1
- 9
- 5
- 7
- 14
- 14
- 6
- 73
- 12
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
73 results
|
“I Really Don’t Know What ‘Thumbs Up’ Means”: Algorithmic Experience in Movie Recommender Algorithms17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.521-541, ⟨10.1007/978-3-030-29387-1_30⟩
Conference papers
hal-02553857v1
|
||
|
A Categorical Approach to Secure Compilation15th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2020, Dublin, Ireland. pp.155-179, ⟨10.1007/978-3-030-57201-3_9⟩
Conference papers
hal-03232345v1
|
||
|
A Digital Game to Learn About Open Data20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.153-164, ⟨10.1007/978-3-030-84789-0_11⟩
Conference papers
hal-04175090v1
|
||
|
A Fuzzy Multi-criteria Decision Making Approach for Analyzing the Risks and Benefits of Opening Data17th Conference on e-Business, e-Services and e-Society (I3E), Oct 2018, Kuwait City, Kuwait. pp.397-412, ⟨10.1007/978-3-030-02131-3_36⟩
Conference papers
hal-02274163v1
|
||
|
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.163-170, ⟨10.1007/978-3-642-24712-5_14⟩
Conference papers
hal-01596195v1
|
||
|
A Generic Solution for Agile Run-Time Inspection Middleware12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.451-470, ⟨10.1007/978-3-642-25821-3_23⟩
Conference papers
hal-01597758v1
|
||
|
A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.370-389, ⟨10.1007/978-3-642-25821-3_19⟩
Conference papers
hal-01597768v1
|
||
|
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.171-177, ⟨10.1007/978-3-642-24712-5_15⟩
Conference papers
hal-01596204v1
|
||
|
A Secure Perceptual Hash Algorithm for Image Content Authentication12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.108-121, ⟨10.1007/978-3-642-24712-5_9⟩
Conference papers
hal-01596205v1
|
||
|
A Study on Advanced Persistent Threats15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.63-72, ⟨10.1007/978-3-662-44885-4_5⟩
Conference papers
hal-01404186v1
|
||
|
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.53-69, ⟨10.1007/978-3-319-45931-8_4⟩
Conference papers
hal-01639618v1
|
||
|
Analysis of Revocation Strategies for Anonymous Idemix Credentials12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers
hal-01596188v1
|
||
|
Annotation Inference for Separation Logic Based Verifiers13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik,, Iceland. pp.319-333, ⟨10.1007/978-3-642-21461-5_21⟩
Conference papers
hal-01583323v1
|
||
|
Behind the Scenes of Coproduction of Smart Mobility: Evidence from a Public Values’ Perspective18th International Conference on Electronic Government (EGOV), Sep 2019, San Benedetto del Tronto, Italy. pp.338-352, ⟨10.1007/978-3-030-27325-5_26⟩
Conference papers
hal-02445806v1
|
||
|
Benefits and Trade-Offs of Different Model Representations in Decision Support Systems for Non-expert Users17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.576-597, ⟨10.1007/978-3-030-29384-0_35⟩
Conference papers
hal-02544619v1
|
||
|
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.113-127, ⟨10.1007/978-3-642-39614-4_8⟩
Conference papers
hal-01492780v1
|
||
|
Client-Side Biometric Verification Based on Trusted Computing14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.34-49, ⟨10.1007/978-3-642-40779-6_3⟩
Conference papers
hal-01492832v1
|
||
|
Commercial Home Assistance (eHealth) ServicesInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.28-42, ⟨10.1007/978-3-642-27585-2_3⟩
Conference papers
hal-01481504v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-6109, 2010, Lecture Notes in Computer Science, 978-3-642-13240-7. ⟨10.1007/978-3-642-13241-4⟩
Books
hal-01555320v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-8735, 2014, Lecture Notes in Computer Science, 978-3-662-44884-7. ⟨10.1007/978-3-662-44885-4⟩
Books
hal-01404210v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7394, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32805-3⟩
Books
hal-01540895v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7025, 2011, Lecture Notes in Computer Science, 978-3-642-24711-8. ⟨10.1007/978-3-642-24712-5⟩
Books
hal-01596212v1
|
||
|
Comparative Feedback in the Street: Exposing Residential Energy Consumption on House Façades13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.470-488, ⟨10.1007/978-3-642-23774-4_39⟩
Conference papers
hal-01590574v1
|
||
|
Coordination Models and LanguagesSpringer International Publishing, LNCS-9037, 2015, Lecture Notes in Computer Science, 978-3-319-19281-9. ⟨10.1007/978-3-319-19282-6⟩
Books
hal-01774946v1
|
||
|
Coordination Models and LanguagesSpringer, LNCS-6116, 2010, Lecture Notes in Computer Science, 978-3-642-13413-5. ⟨10.1007/978-3-642-13414-2⟩
Books
hal-01555333v1
|
||
|
Data-Minimizing Authentication Goes Mobile13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers
hal-01540904v1
|
||
|
Decision Tree Analysis for Estimating the Costs and Benefits of Disclosing Data18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.205-217, ⟨10.1007/978-3-030-29374-1_17⟩
Conference papers
hal-02510106v1
|
||
|
Dedicated Hardware for Attribute-Based Credential Verification14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.50-65, ⟨10.1007/978-3-642-40779-6_4⟩
Conference papers
hal-01492833v1
|
||
|
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.350-369, ⟨10.1007/978-3-642-25821-3_18⟩
Conference papers
hal-01597755v1
|
||
|
Designing with Dementia: Guidelines for Participatory Design together with Persons with Dementia14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.649-666, ⟨10.1007/978-3-642-40483-2_46⟩
Conference papers
hal-01497469v1
|