Filter your results
- 7
- 7
- 7
- 1
- 1
- 2
- 1
- 2
- 7
- 1
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
7 results
|
|
sorted by
|
|
Efficient Distributed Linear Programming with Limited Disclosure23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers
hal-01586592v1
|
||
|
An Optimization Model for the Extended Role Mining Problem23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers
hal-01586595v1
|
||
|
Deciphering Text from Touchscreen Key Taps30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers
hal-01633681v1
|
||
|
“Please Connect Me to a Specialist”: Scrutinising ‘Recipient Design’ in Interaction with an Artificial Conversational Agent18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.155-176, ⟨10.1007/978-3-030-85610-6_10⟩
Conference papers
hal-04215505v1
|
||
|
Toward Mining of Temporal Roles27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers
hal-01490718v1
|
||
|
Towards User-Oriented RBAC Model27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers
hal-01490719v1
|
||
|
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.169-178, ⟨10.1007/978-3-642-30955-7_15⟩
Conference papers
hal-01534305v1
|