Filter your results
- 316
- 2
- 2
- 317
- 3
- 320
- 83
- 1
- 123
- 26
- 19
- 27
- 19
- 15
- 23
- 15
- 20
- 38
- 43
- 36
- 48
- 17
- 320
- 5
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Ransomware Steals Your Phone. Formal Methods Rescue It36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.212-221, ⟨10.1007/978-3-319-39570-8_14⟩
Conference papers
hal-01432919v1
|
||
|
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi DiagramsInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.141-157, ⟨10.1007/978-3-319-45507-5_10⟩
Conference papers
hal-01635003v1
|
||
|
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.308-315, ⟨10.1007/978-3-642-12368-9_24⟩
Conference papers
hal-01056076v1
|
||
|
Improving Computer Security Dialogs13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.18-35, ⟨10.1007/978-3-642-23768-3_2⟩
Conference papers
hal-01596947v1
|
||
|
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.16-25, ⟨10.1007/978-3-642-32805-3_2⟩
Conference papers
hal-01540894v1
|
||
|
Using Model Driven Security Approaches in Web Application Development2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers
hal-01397248v1
|
||
|
A Trust-Based Defensive System Model for Cloud Computing8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.146-159, ⟨10.1007/978-3-642-24403-2_12⟩
Conference papers
hal-01593026v1
|
||
|
From MDM to DB2: A Case Study of Security Enforcement Migration26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers
hal-01534771v1
|
||
|
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers
hal-01551363v1
|
||
|
Multi-domain DDoS Mitigation Based on Blockchains11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.185-190, ⟨10.1007/978-3-319-60774-0_19⟩
Conference papers
hal-01806051v1
|
||
|
P3S: A Privacy Preserving Publish-Subscribe Middleware13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.476-495, ⟨10.1007/978-3-642-35170-9_24⟩
Conference papers
hal-01555554v1
|
||
|
Netflow-Based Malware Detection and Data Visualisation System16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.652-660, ⟨10.1007/978-3-319-59105-6_56⟩
Conference papers
hal-01656262v1
|
||
|
Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.442-459, ⟨10.1007/978-3-642-40477-1_27⟩
Conference papers
hal-01504900v1
|
||
|
Impact of Perceived Connectivity on Intention to Use Social Media: Modelling the Moderation Effects of Perceived Risk and Security15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.219-227, ⟨10.1007/978-3-319-45234-0_20⟩
Conference papers
hal-01702181v1
|
||
Urban Agriculture: A Growing Field of Research14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.785
Conference papers
hal-01514071v1
|
|||
|
Econometric Feedback for Runtime Risk Management in VoIP Architectures5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.26-37, ⟨10.1007/978-3-642-21484-4_3⟩
Conference papers
hal-00747274v1
|
||
|
Security and privacy issues related to quick response codes17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.255-267, ⟨10.1007/978-3-030-88381-2_13⟩
Conference papers
hal-03764371v1
|
||
|
Towards Safety and Security-Related Testing of Crisis Management Solutions5th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Dec 2020, Sofia, Bulgaria. pp.216-234, ⟨10.1007/978-3-030-81469-4_18⟩
Conference papers
hal-03761639v1
|
||
|
Building Resilient Community Through Plant Back Better Initiative – Guiding Principles and Best Practices4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.85-106, ⟨10.1007/978-3-030-48939-7_9⟩
Conference papers
hal-03374248v1
|
||
|
Usable Privacy and Security in Personal Health Records13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.36-43, ⟨10.1007/978-3-642-23768-3_3⟩
Conference papers
hal-01596945v1
|
||
|
That’s My DNA: Detecting Malicious Tampering of Synthesized DNA33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.61-80, ⟨10.1007/978-3-030-22479-0_4⟩
Conference papers
hal-02384604v1
|
||
|
IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.148-160, ⟨10.1007/978-3-642-40552-5_14⟩
Conference papers
hal-01497012v1
|
||
|
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.121-139, ⟨10.1007/978-3-030-22479-0_7⟩
Conference papers
hal-02384600v1
|
||
|
Integrity of Electronic Patient Records10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.378-391, ⟨10.1007/978-3-642-22878-0_32⟩
Conference papers
hal-01589094v1
|
||
|
Worst- and Average-Case Privacy Breaches in Randomization Mechanisms7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.72-86, ⟨10.1007/978-3-642-33475-7_6⟩
Conference papers
hal-01556211v1
|
||
|
Influences of Mixed Reality and Human Cognition on Picture Passwords: An Eye Tracking Study17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.304-313, ⟨10.1007/978-3-030-29384-0_19⟩
Conference papers
hal-02544573v1
|
||
|
Cloud-Based Privacy Aware Preference Aggregation Service1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.208-223
Conference papers
hal-01506784v1
|
||
|
Flow-Based Detection of DNS Tunnels7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers
hal-01489962v1
|
||
|
Efficiency of Secure Network Coding Schemes13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.145-159, ⟨10.1007/978-3-642-32805-3_12⟩
Conference papers
hal-01540886v1
|
||
|
Requirements for an eModeration System in Private Schools in South Africa19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.557-568, ⟨10.1007/978-3-030-44999-5_46⟩
Conference papers
hal-03222835v1
|