Filter your results
- 4
- 4
- 4
- 1
- 2
- 2
- 3
- 2
- 5
- 1
- 2
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Are 128 Bits Long Keys Possible in Watermarking?13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Conference papers
hal-01540890v1
|
||
|
Document authentication using 2D codes: Maximizing the decoding performance using statistical inference13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.39-54, ⟨10.1007/978-3-642-32805-3_4⟩
Conference papers
hal-00728161v1
|
||
|
Quantifying Object- and Command-oriented Interaction15th Human-Computer Interaction (INTERACT), IFIP, Sep 2015, Bamberg, Germany. pp.231-239, ⟨10.1007/978-3-319-22723-8_18⟩
Conference papers
hal-01252527v1
|
||
|
Characterizing the Influence of Motion Parameters on Performance when Acquiring Moving Targets15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.148-155, ⟨10.1007/978-3-319-22723-8_12⟩
Conference papers
hal-01207511v1
|