Filter your results
- 50
- 3
- 50
- 3
- 53
- 5
- 3
- 2
- 8
- 2
- 2
- 4
- 7
- 12
- 6
- 3
- 4
- 53
- 9
- 6
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
53 results
|
|
sorted by
|
|
Comparison of cyber attacks on services in the clearnet and darknet17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.39-61, ⟨10.1007/978-3-030-88381-2_3⟩
Conference papers
hal-03764381v1
|
||
|
Adaptive User-Centered SecurityInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers
hal-01403988v1
|
||
|
Weaving Aspects and Business Processes through Model Transformation3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.47-61, ⟨10.1007/978-3-662-44879-3_4⟩
Conference papers
hal-01318272v1
|
||
|
Towards a Mobility-Supporting Incentive Scheme for Peer-to-Peer Content Distribution7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.88-91, ⟨10.1007/978-3-642-38998-6_11⟩
Conference papers
hal-01489957v1
|
||
|
Modeling Non-deterministic C Code with Active Objects8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.213-227, ⟨10.1007/978-3-030-31517-7_15⟩
Conference papers
hal-03769132v1
|
||
|
Incentivise Me: Smartphone-Based Mobility Detection for Pervasive Games1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.470-476, ⟨10.1007/978-3-030-34644-7_48⟩
Conference papers
hal-03652020v1
|
||
|
A Smart Card Implementation of the McEliece PKC4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers
hal-01056067v1
|
||
|
Robust Hash Algorithms for Text14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers
hal-01492815v1
|
||
|
Entertainment Computing and Serious GamesSpringer International Publishing, LNCS-11863, 2019, Lecture Notes in Computer Science, 978-3-030-34643-0. ⟨10.1007/978-3-030-34644-7⟩
Books
hal-03652053v1
|
||
|
Testing Conformance in Multi-component Enterprise Application Management8th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2020, Heraklion, Crete, Greece. pp.3-18, ⟨10.1007/978-3-030-44769-4_1⟩
Conference papers
hal-03203225v1
|
||
|
Towards Distributed Reactive Programming15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.226-235, ⟨10.1007/978-3-642-38493-6_16⟩
Conference papers
hal-01486029v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.38-41, ⟨10.1007/978-3-642-30633-4_5⟩
Conference papers
hal-01529798v1
|
||
|
Quality Adaptation in P2P Video Streaming Based on Objective QoE Metrics11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.1-14, ⟨10.1007/978-3-642-30054-7_1⟩
Conference papers
hal-01531951v1
|
||
|
A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers
hal-01806063v1
|
||
|
In-Situ Occlusion Resolution for Hybrid Tabletop Environments15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.278-295, ⟨10.1007/978-3-319-22698-9_18⟩
Conference papers
hal-01609416v1
|
||
|
Towards an Adaptive Publish/Subscribe Approach Supporting Transitions7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.84-87, ⟨10.1007/978-3-642-38998-6_10⟩
Conference papers
hal-01489956v1
|
||
|
A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.16-29, ⟨10.1007/978-3-319-39814-3_2⟩
Conference papers
hal-01632731v1
|
||
|
How Current Android Malware Seeks to Evade Automated Code Analysis9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers
hal-01442542v1
|
||
|
Formal Techniques for Distributed Objects, Components, and SystemsSpringer International Publishing, LNCS-12719, 2021, Lecture Notes in Computer Science, 978-3-030-78088-3. ⟨10.1007/978-3-030-78089-0⟩
Books
hal-03740268v1
|
||
|
Type Reconstruction Algorithms for Deadlock-Free and Lock-Free Linear π-Calculi17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.83-98, ⟨10.1007/978-3-319-19282-6_6⟩
Conference papers
hal-01774941v1
|
||
|
Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.128-132, ⟨10.1007/978-3-662-43862-6_16⟩
Conference papers
hal-01401299v1
|
||
|
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers
hal-01506559v1
|
||
|
Modeling the German Legal Latitude Principles5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers
hal-01491259v1
|
||
|
Securing Transactions with the eIDAS Protocols10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.3-18, ⟨10.1007/978-3-319-45931-8_1⟩
Conference papers
hal-01639614v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
Future Trends in Game Authoring Tools11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.536-541, ⟨10.1007/978-3-642-33542-6_70⟩
Conference papers
hal-01556141v1
|
||
|
Evaluation of Dispatcher Requirements on Automated Customer Feedback in Public Transport15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.537-541, ⟨10.1007/978-3-319-22723-8_56⟩
Conference papers
hal-01610819v1
|
||
|
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers
hal-01573294v1
|
||
|
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.519-538, ⟨10.1007/978-3-030-29381-9_32⟩
Conference papers
hal-02544556v1
|
- 1
- 2