Filter your results
- 30
- 30
- 30
- 1
- 4
- 2
- 2
- 3
- 3
- 3
- 3
- 5
- 4
- 1
- 30
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
30 results
|
|
sorted by
|
|
Experience Probes: Immersion and Reflection Between Reality and Virtuality16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.253-262, ⟨10.1007/978-3-319-68059-0_16⟩
Conference papers
hal-01679784v1
|
||
|
Bridging User Context and Design Models to Build Adaptive User Interfaces5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.36-56, ⟨10.1007/978-3-662-44811-3_3⟩
Conference papers
hal-01405064v1
|
||
|
Securing Data Provenance in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.145-160, ⟨10.1007/978-3-642-27585-2_12⟩
Conference papers
hal-01481501v1
|
||
|
Event Handoff Unobservability in WSN1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers
hal-01581330v1
|
||
|
Renegotiation and Recursion in Bitcoin Contracts22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.261-278, ⟨10.1007/978-3-030-50029-0_17⟩
Conference papers
hal-03273996v1
|
||
|
Incremental Analysis of Evolving Administrative Role Based Access Control Policies28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.260-275, ⟨10.1007/978-3-662-43936-4_17⟩
Conference papers
hal-01285032v1
|
||
|
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.201-220, ⟨10.1007/978-3-030-22479-0_11⟩
Conference papers
hal-02384588v1
|
||
|
Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.178-194
Conference papers
hal-01506766v1
|
||
|
Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers
hal-01059143v1
|
||
|
Following Wrong Suggestions: Self-blame in Human and Computer Scenarios17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.542-550, ⟨10.1007/978-3-030-29387-1_31⟩
Conference papers
hal-02553922v1
|
||
|
On the Uplink Performance of TCP in Multi-rate 802.11 WLANs10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.368-378, ⟨10.1007/978-3-642-20798-3_28⟩
Conference papers
hal-01597975v1
|
||
|
Entity-Centric Visualization of Open Data15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.149-166, ⟨10.1007/978-3-319-22698-9_11⟩
Conference papers
hal-01609414v1
|
||
|
FSquaDRA: Fast Detection of Repackaged Applications28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers
hal-01285035v1
|
||
|
On the Realizability of Contracts in Dishonest Systems14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.245-260, ⟨10.1007/978-3-642-30829-1_17⟩
Conference papers
hal-01529594v1
|
||
|
Viability of Magazines for Stimulating Social Interactions in Nursing Homes16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.72-81, ⟨10.1007/978-3-319-67687-6_6⟩
Conference papers
hal-01717198v1
|
||
|
Flexible and Dynamic Consent-CapturingInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.119-131, ⟨10.1007/978-3-642-27585-2_10⟩
Conference papers
hal-01481499v1
|
||
|
GCI 2012 Harnessing Collective Intelligence with Games11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.496-499, ⟨10.1007/978-3-642-33542-6_63⟩
Conference papers
hal-01556170v1
|
||
|
Assessing a Collaborative Application for Comic Strips Composition15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.73-80, ⟨10.1007/978-3-319-22668-2_6⟩
Conference papers
hal-01599852v1
|
||
|
Honesty by Typing15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.305-320, ⟨10.1007/978-3-642-38592-6_21⟩
Conference papers
hal-01515248v1
|
||
|
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.350-369, ⟨10.1007/978-3-642-25821-3_18⟩
Conference papers
hal-01597755v1
|
||
|
A True Concurrent Model of Smart Contracts Executions22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.243-260, ⟨10.1007/978-3-030-50029-0_16⟩
Conference papers
hal-03273986v1
|
||
|
An Approach to Select Cost-Effective Risk Countermeasures27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.266-273, ⟨10.1007/978-3-642-39256-6_18⟩
Conference papers
hal-01490710v1
|
||
|
The Effect of Religious Identity on User Judgment of Website Quality13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.620-623, ⟨10.1007/978-3-642-23768-3_97⟩
Conference papers
hal-01597043v1
|
||
|
Investigating Italian Citizens’ Attitudes Towards Immuni, the Italian Contact Tracing App18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.34-42, ⟨10.1007/978-3-030-85616-8_3⟩
Conference papers
hal-04196886v1
|
||
|
SENSATION: An Authoring Tool to Support Event–State Paradigm in End-User Development18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.373-382, ⟨10.1007/978-3-030-85616-8_22⟩
Conference papers
hal-04196890v1
|
||
|
Real vs Simulated Foveated Rendering to Reduce Visual Discomfort in Virtual Reality18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.177-185, ⟨10.1007/978-3-030-85607-6_12⟩
Conference papers
hal-04291223v1
|
||
|
Stimulating Conversations in Residential Care Through Technology-Mediated Reminiscence16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.62-71, ⟨10.1007/978-3-319-67687-6_5⟩
Conference papers
hal-01717204v1
|
||
|
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.325-337, ⟨10.1007/978-3-030-81242-3_19⟩
Conference papers
hal-03677036v1
|
||
|
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.85-100, ⟨10.1007/978-3-319-20810-7_6⟩
Conference papers
hal-01745831v1
|
||
|
P2P and Cloud: A Marriage of Convenience for Replica Management6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.60-71, ⟨10.1007/978-3-642-28583-7_6⟩
Conference papers
hal-01527531v1
|