Filter your results
- 28
- 1
- 28
- 1
- 29
- 7
- 1
- 2
- 2
- 2
- 2
- 3
- 6
- 2
- 3
- 1
- 5
- 1
- 29
- 7
- 22
- 98
- 78
- 75
- 65
- 59
- 51
- 49
- 47
- 43
- 42
- 40
- 40
- 38
- 35
- 33
- 33
- 33
- 31
- 29
- 29
- 29
- 29
- 28
- 28
- 27
- 26
- 25
- 25
- 25
- 23
- 23
- 22
- 21
- 21
- 21
- 21
- 20
- 20
- 20
- 20
- 19
- 19
- 19
- 18
- 18
- 18
- 17
- 17
- 17
- 17
- 17
- 16
- 16
- 16
- 15
- 15
- 15
- 15
- 15
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 14
- 13
- 13
- 13
- 13
- 13
- 13
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 12
- 11
- 11
- 11
- 11
- 11
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 10
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 9
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
29 results
|
|
sorted by
|
|
Embedded Eavesdropping on Java Card27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.37-48, ⟨10.1007/978-3-642-30436-1_4⟩
Conference papers
hal-00706186v1
|
||
|
ObjectivAIze: Measuring Performance and Biases in Augmented Business Decision Systems18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.300-320, ⟨10.1007/978-3-030-85613-7_22⟩
Conference papers
hal-04292393v1
|
||
|
Characterisation of an Electronic Booking System in the National Health Service: A Semiotic Perspective17th International Conference on Informatics and Semiotics in Organisations (ICISO), Aug 2016, Campinas, Brazil. pp.219-228, ⟨10.1007/978-3-319-42102-5_25⟩
Conference papers
hal-01646563v1
|
||
|
Finding Objects Faster in Dense Environments using a Projection Augmented Robotic ArmINTERACT'15: IFIP International Conference on Human-Computer Interaction, Sep 2015, Bamberg, Germany. pp.221-238, ⟨10.1007/978-3-319-22698-9_15⟩
Conference papers
hal-01447396v1
|
||
|
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers
hal-02294599v1
|
||
|
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Conference papers
hal-01573296v1
|
||
|
General Knowledge Representation and Sharing for Disaster Management5th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Dec 2020, Sofia, Bulgaria. pp.116-131, ⟨10.1007/978-3-030-81469-4_10⟩
Conference papers
hal-03450395v2
|
||
|
A Preliminary Study on Information Sharing Practice Between Police and Private Security Companies in the United Arab Emirates17th International Conference on Informatics and Semiotics in Organisations (ICISO), Aug 2016, Campinas, Brazil. pp.231-233
Conference papers
hal-01646606v1
|
||
|
Norm-Based Abduction Process (NAP) in Developing Information Architecture18th International Conference on Informatics and Semiotics in Organisations (ICISO), Jul 2018, Reading, United Kingdom. pp.33-42, ⟨10.1007/978-3-319-94541-5_4⟩
Conference papers
hal-01920740v1
|
||
|
Making Sense of Non-compliance: A Semiotic Approach17th International Conference on Informatics and Semiotics in Organisations (ICISO), Aug 2016, Campinas, Brazil. pp.97-106, ⟨10.1007/978-3-319-42102-5_11⟩
Conference papers
hal-01646569v1
|
||
|
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers
hal-01633672v1
|
||
|
Hybrid and Optical Packet Switching Supporting Different Service Classes in Data Center Network23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.516-527, ⟨10.1007/978-3-030-38085-4_44⟩
Conference papers
hal-03200694v1
|
||
|
Information-Theoretic Analysis of Human Performance for Command Selection16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.515-524, ⟨10.1007/978-3-319-67687-6_35⟩
Conference papers
hal-01643924v1
|
||
|
Formal Methods for Railway Disasters Prevention2nd International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2017, Sofia, Bulgaria. pp.161-176, ⟨10.1007/978-3-030-18293-9_14⟩
Conference papers
hal-02280313v1
|
||
|
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.29-41, ⟨10.1007/978-3-662-43862-6_3⟩
Conference papers
hal-01401284v1
|
||
|
3D Simulation to Validate Autonomous Intervention Systems Architecture for Disaster Management4th International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2019, Kyiv, Ukraine. pp.196-211, ⟨10.1007/978-3-030-48939-7_17⟩
Conference papers
hal-03374239v1
|
||
|
Attacks on Java Card 3.0 Combining Fault and Logical AttacksSmart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010, Apr 2010, Passau, Germany. pp.148-163, ⟨10.1007/978-3-642-12510-2_11⟩
Conference papers
hal-00692165v1
|
||
|
Grab 'n' Drop: User Configurable Toolglasses16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.315-334, ⟨10.1007/978-3-319-67687-6_21⟩
Conference papers
hal-01693001v1
|
||
|
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.010th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers
hal-00692172v1
|
||
|
Toward a Source Detection of Botclouds: A PCA-Based Approach8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.105-117, ⟨10.1007/978-3-662-43862-6_13⟩
Conference papers
hal-01401295v1
|
||
|
The Role of Actors in the Adoption of Emerging ICT in SMEs: An Actor Network Theory Analysis17th International Conference on Informatics and Semiotics in Organisations (ICISO), Aug 2016, Campinas, Brazil. pp.234-236
Conference papers
hal-01646610v1
|
||
|
Chaotic Time Series for Copper’s Price Forecast18th International Conference on Informatics and Semiotics in Organisations (ICISO), Jul 2018, Reading, United Kingdom. pp.278-288, ⟨10.1007/978-3-319-94541-5_28⟩
Conference papers
hal-01920732v1
|
||
|
Laugh When You’re Winning9th International Summer Workshop on Multimodal Interfaces (eNTERFACE), Jul 2013, Lisbon, Portugal. pp.50-79, ⟨10.1007/978-3-642-55143-7_3⟩
Conference papers
hal-01350739v1
|
||
|
Privacy in digital identity systems: models, assessment and user adoption14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers
hal-01283997v1
|
||
|
U-Note: Capture the Class and Access it EverywhereProceedings of the IFIP Conference on Human-Computer Interaction (Interact 2011), Sep 2011, Lisbonne, Portugal. pp.643-660, ⟨10.1007/978-3-642-23774-4_50⟩
Conference papers
hal-00671380v1
|
||
|
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers
hal-00692171v1
|
||
|
Socially Aware Organisations and Technologies. Impact and ChallengesSpringer International Publishing, AICT-477, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-42101-8. ⟨10.1007/978-3-319-42102-5⟩
Books
hal-01646552v1
|
||
|
One Fitts’ Law, Two Metrics16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.525-533, ⟨10.1007/978-3-319-67687-6_36⟩
Conference papers
hal-01717202v1
|
||
|
Leakage Squeezing Countermeasure against High-Order Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers
hal-01573295v1
|