Filter your results
- 12
- 1
- 1
- 13
- 1
- 13
- 1
- 1
- 3
- 1
- 1
- 2
- 1
- 1
- 4
- 14
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
14 results
|
|
sorted by
|
|
Secure Delegation of Elliptic-Curve Pairing9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.24-35, ⟨10.1007/978-3-642-12510-2_3⟩
Conference papers
hal-01056101v1
|
||
|
The Polynomial Composition Problem in (ℤ/nℤ)[X]9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.1-12, ⟨10.1007/978-3-642-12510-2_1⟩
Conference papers
hal-01056103v1
|
||
|
Can code polymorphism limit information leakage?5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers
hal-01110259v1
|
||
|
On the Complexity of the Upper r-Tolerant Edge Cover Problem3rd International Conference on Topics in Theoretical Computer Science (TTCS), Jul 2020, Tehran, Iran. pp.32-47, ⟨10.1007/978-3-030-57852-7_3⟩
Conference papers
hal-03165379v1
|
||
|
When Clocks Fail: On Critical Paths and Clock Faults9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers
emse-00505344v1
|
||
|
How to Compartment Secrets13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.3-11, ⟨10.1007/978-3-030-41702-4_1⟩
Conference papers
hal-03173906v1
|
||
|
Information Security Theory and Practice: Securing the Internet of ThingsDavid Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books
hal-01098408v1
|
||
|
Efficient Algorithms for the max k -vertex cover Problem7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.295-309, ⟨10.1007/978-3-642-33475-7_21⟩
Conference papers
hal-01511883v1
|
||
|
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.109-128, ⟨10.1007/978-3-030-20074-9_9⟩
Conference papers
hal-02294610v1
|
||
|
ObjectivAIze: Measuring Performance and Biases in Augmented Business Decision Systems18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.300-320, ⟨10.1007/978-3-030-85613-7_22⟩
Conference papers
hal-04292393v1
|
||
|
The MINWii Project : Renarcissization of Patients Suffering from Alzheimer's Disease Through Video Game-Based Music Therapy9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.79-90, ⟨10.1007/978-3-642-15399-0_8⟩
Conference papers
hal-00831340v1
|
||
|
Designing Collaborative Co-Located Interaction for an Artistic InstallationINTERACT 2017: 16th IFIP TC 13 International Conference, Sep 2017, Mumbai, India. pp.223-231, ⟨10.1007/978-3-319-67744-6_15⟩
Conference papers
hal-01596000v1
|
||
|
Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.123-138, ⟨10.1007/978-3-030-41702-4_8⟩
Conference papers
hal-03138010v1
|
||
|
The Lazy Matroid Problem8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.66-77, ⟨10.1007/978-3-662-44602-7_6⟩
Conference papers
hal-01402029v1
|