Filter your results
- 27
- 27
- 27
- 1
- 1
- 1
- 2
- 3
- 3
- 1
- 4
- 3
- 1
- 2
- 6
- 1
- 27
- 16
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
27 results
|
|
sorted by
|
|
Flow Management at Multi-Gbps: Tradeoffs and Lessons Learned6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.1-14, ⟨10.1007/978-3-642-54999-1_1⟩
Conference papers
hal-01396466v1
|
||
|
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers
hal-00692171v1
|
||
|
One Fitts’ Law, Two Metrics16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.525-533, ⟨10.1007/978-3-319-67687-6_36⟩
Conference papers
hal-01717202v1
|
||
|
Peeking through the BitTorrent Seedbox Hosting Ecosystem6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.115-126, ⟨10.1007/978-3-642-54999-1_10⟩
Conference papers
hal-01396477v1
|
||
|
Leakage Squeezing Countermeasure against High-Order Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers
hal-01573295v1
|
||
|
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.010th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers
hal-00692172v1
|
||
|
FIRE: fault injection for reverse engineering5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.280-293, ⟨10.1007/978-3-642-21040-2_20⟩
Conference papers
hal-00690868v1
|
||
|
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.109-128, ⟨10.1007/978-3-030-20074-9_9⟩
Conference papers
hal-02294610v1
|
||
|
General Knowledge Representation and Sharing for Disaster Management5th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Dec 2020, Sofia, Bulgaria. pp.116-131, ⟨10.1007/978-3-030-81469-4_10⟩
Conference papers
hal-03450395v2
|
||
|
Finding Objects Faster in Dense Environments using a Projection Augmented Robotic ArmINTERACT'15: IFIP International Conference on Human-Computer Interaction, Sep 2015, Bamberg, Germany. pp.221-238, ⟨10.1007/978-3-319-22698-9_15⟩
Conference papers
hal-01447396v1
|
||
|
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers
hal-02294599v1
|
||
|
3D Simulation to Validate Autonomous Intervention Systems Architecture for Disaster Management4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.196-211, ⟨10.1007/978-3-030-48939-7_17⟩
Conference papers
hal-03374239v1
|
||
|
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.169-178, ⟨10.1007/978-3-642-30955-7_15⟩
Conference papers
hal-01534305v1
|
||
|
Privacy in digital identity systems: models, assessment and user adoption14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers
hal-01283997v1
|
||
|
Beyond Rhetoric to Poetics in IT Invention14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.267-279, ⟨10.1007/978-3-642-40477-1_17⟩
Conference papers
hal-01504889v1
|
||
|
U-Note: Capture the Class and Access it EverywhereProceedings of the IFIP Conference on Human-Computer Interaction (Interact 2011), Sep 2011, Lisbonne, Portugal. pp.643-660, ⟨10.1007/978-3-642-23774-4_50⟩
Conference papers
hal-00671380v1
|
||
|
Glass+Skin: An Empirical Evaluation of the Added Value of Finger Identification to Basic Single-Touch Interaction on Touch Screens15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.55-71, ⟨10.1007/978-3-319-22723-8_5⟩
Conference papers
hal-01202852v1
|
||
|
Formal Methods for Safe Design of Autonomous Systems Dedicated to Risk Management1st International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Nov 2016, Sofia, Bulgaria. pp.61-76, ⟨10.1007/978-3-319-68486-4_6⟩
Conference papers
hal-03213130v1
|
||
|
Hybrid and Optical Packet Switching Supporting Different Service Classes in Data Center Network23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.516-527, ⟨10.1007/978-3-030-38085-4_44⟩
Conference papers
hal-03200694v1
|
||
|
Aggregation of Statistical Data from Passive Probes: Techniques and Best Practices6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.38-50, ⟨10.1007/978-3-642-54999-1_4⟩
Conference papers
hal-01396470v1
|
||
|
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers
hal-01633672v1
|
||
|
Formal Methods for Railway Disasters Prevention2nd International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2017, Sofia, Bulgaria. pp.161-176, ⟨10.1007/978-3-030-18293-9_14⟩
Conference papers
hal-02280313v1
|
||
|
Inter-Domain Route Diversity for the InternetNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.63-71, ⟨10.1007/978-3-642-30039-4_8⟩
Conference papers
hal-01533588v1
|
||
|
Zen and the Art of Network Troubleshooting: A Hands on Experimental Study7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.31-45, ⟨10.1007/978-3-319-17172-2_3⟩
Conference papers
hal-01411178v1
|
||
|
Information-Theoretic Analysis of Human Performance for Command Selection16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.515-524, ⟨10.1007/978-3-319-67687-6_35⟩
Conference papers
hal-01643924v1
|
||
|
Attacks on Java Card 3.0 Combining Fault and Logical AttacksSmart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010, Apr 2010, Passau, Germany. pp.148-163, ⟨10.1007/978-3-642-12510-2_11⟩
Conference papers
hal-00692165v1
|
||
|
End-to-End Adaptive Framework for Multimedia Information Retrieval9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.197-206, ⟨10.1007/978-3-642-21560-5_17⟩
Conference papers
hal-01583629v1
|