Filter your results
- 5
- 5
- 5
- 1
- 1
- 1
- 2
- 5
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
Re-designing the Web’s Access Control System23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers
hal-01586586v1
|
||
|
An Analysis of (Non-)Use Practices and Decisions of Internet of Things17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.3-24, ⟨10.1007/978-3-030-29390-1_1⟩
Conference papers
hal-02890926v1
|
||
|
A Confucian Look at Internet Censorship in China16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.377-398, ⟨10.1007/978-3-319-67744-6_25⟩
Conference papers
hal-01676171v1
|
||
|
Enforcing Request Integrity in Web Applications24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.225-240, ⟨10.1007/978-3-642-13739-6_15⟩
Conference papers
hal-01056686v1
|
||
|
Understanding Privacy Risk of Publishing Decision Trees24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.33-48, ⟨10.1007/978-3-642-13739-6_3⟩
Conference papers
hal-01056670v1
|