Filter your results
- 21
- 21
- 21
- 1
- 1
- 2
- 2
- 2
- 3
- 1
- 3
- 2
- 5
- 1
- 21
- 21
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
21 results
|
|
sorted by
|
|
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.010th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers
hal-00692172v1
|
||
|
Toward a Source Detection of Botclouds: A PCA-Based Approach8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.105-117, ⟨10.1007/978-3-662-43862-6_13⟩
Conference papers
hal-01401295v1
|
||
|
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers
hal-01633672v1
|
||
|
Hybrid and Optical Packet Switching Supporting Different Service Classes in Data Center Network23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.516-527, ⟨10.1007/978-3-030-38085-4_44⟩
Conference papers
hal-03200694v1
|
||
|
Information-Theoretic Analysis of Human Performance for Command Selection16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.515-524, ⟨10.1007/978-3-319-67687-6_35⟩
Conference papers
hal-01643924v1
|
||
|
Formal Methods for Railway Disasters Prevention2nd International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2017, Sofia, Bulgaria. pp.161-176, ⟨10.1007/978-3-030-18293-9_14⟩
Conference papers
hal-02280313v1
|
||
|
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers
hal-00692171v1
|
||
|
Leakage Squeezing Countermeasure against High-Order Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers
hal-01573295v1
|
||
|
One Fitts’ Law, Two Metrics16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.525-533, ⟨10.1007/978-3-319-67687-6_36⟩
Conference papers
hal-01717202v1
|
||
|
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.29-41, ⟨10.1007/978-3-662-43862-6_3⟩
Conference papers
hal-01401284v1
|
||
|
3D Simulation to Validate Autonomous Intervention Systems Architecture for Disaster Management4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.196-211, ⟨10.1007/978-3-030-48939-7_17⟩
Conference papers
hal-03374239v1
|
||
|
ObjectivAIze: Measuring Performance and Biases in Augmented Business Decision Systems18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.300-320, ⟨10.1007/978-3-030-85613-7_22⟩
Conference papers
hal-04292393v1
|
||
|
Finding Objects Faster in Dense Environments using a Projection Augmented Robotic ArmINTERACT'15: IFIP International Conference on Human-Computer Interaction, Sep 2015, Bamberg, Germany. pp.221-238, ⟨10.1007/978-3-319-22698-9_15⟩
Conference papers
hal-01447396v1
|
||
|
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers
hal-02294599v1
|
||
|
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Conference papers
hal-01573296v1
|
||
|
General Knowledge Representation and Sharing for Disaster Management5th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Dec 2020, Sofia, Bulgaria. pp.116-131, ⟨10.1007/978-3-030-81469-4_10⟩
Conference papers
hal-03450395v2
|
||
|
Grab 'n' Drop: User Configurable Toolglasses16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.315-334, ⟨10.1007/978-3-319-67687-6_21⟩
Conference papers
hal-01693001v1
|
||
|
Attacks on Java Card 3.0 Combining Fault and Logical AttacksSmart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010, Apr 2010, Passau, Germany. pp.148-163, ⟨10.1007/978-3-642-12510-2_11⟩
Conference papers
hal-00692165v1
|
||
|
Privacy in digital identity systems: models, assessment and user adoption14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers
hal-01283997v1
|
||
|
U-Note: Capture the Class and Access it EverywhereProceedings of the IFIP Conference on Human-Computer Interaction (Interact 2011), Sep 2011, Lisbonne, Portugal. pp.643-660, ⟨10.1007/978-3-642-23774-4_50⟩
Conference papers
hal-00671380v1
|
||
|
Glass+Skin: An Empirical Evaluation of the Added Value of Finger Identification to Basic Single-Touch Interaction on Touch Screens15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.55-71, ⟨10.1007/978-3-319-22723-8_5⟩
Conference papers
hal-01202852v1
|