Filter your results
- 13
- 13
- 13
- 7
- 3
- 2
- 4
- 1
- 2
- 1
- 13
- 2
- 1
- 1
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
13 results
|
|
sorted by
|
|
Analyzing Brain Waves for Activity Recognition of Learners3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.64-73, ⟨10.1007/978-3-319-24315-3_7⟩
Conference papers
hal-01466252v1
|
||
|
A Data Structure for Efficient Biometric Identification1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.528-533, ⟨10.1007/978-3-642-36818-9_61⟩
Conference papers
hal-01480259v1
|
||
|
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.255-264, ⟨10.1007/978-3-319-24315-3_26⟩
Conference papers
hal-01466227v1
|
||
|
Predictive Input Interface of Mathematical Formulas14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.383-400, ⟨10.1007/978-3-642-40483-2_27⟩
Conference papers
hal-01497449v1
|
||
|
A SMS-Based Mobile Botnet Using Flooding Algorithm5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.264-279, ⟨10.1007/978-3-642-21040-2_19⟩
Conference papers
hal-01573306v1
|
||
|
Strength of Relationship Between Multi-labeled Data and Labels3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.99-108, ⟨10.1007/978-3-319-24315-3_10⟩
Conference papers
hal-01466209v1
|
||
|
Similarity of Transactions for Customer SegmentationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.347-359, ⟨10.1007/978-3-642-32498-7_26⟩
Conference papers
hal-01542433v1
|
||
|
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.271-285, ⟨10.1007/978-3-642-23300-5_21⟩
Conference papers
hal-01590395v1
|
||
|
A Tabletop System Using Infrared Image Recognition for Multi-user Identification14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.55-62, ⟨10.1007/978-3-642-40480-1_4⟩
Conference papers
hal-01501783v1
|
||
|
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.363-372, ⟨10.1007/978-3-642-36818-9_40⟩
Conference papers
hal-01480195v1
|
||
|
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.311-318, ⟨10.1007/978-3-642-13739-6_22⟩
Conference papers
hal-01056678v1
|
||
|
Implementation of Efficient Operations over GF(232) Using Graphics Processing Units2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.602-611, ⟨10.1007/978-3-642-55032-4_62⟩
Conference papers
hal-01397276v1
|
||
|
Efficient Variant of Rainbow without Triangular Matrix Representation2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.532-541, ⟨10.1007/978-3-642-55032-4_55⟩
Conference papers
hal-01397267v1
|