Filter your results
- 14
- 14
- 14
- 1
- 14
- 2
- 5
- 2
- 2
- 4
- 8
- 2
- 4
- 3
- 9
- 4
- 14
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Using Task Descriptions with Explicit Representation of Allocation of Functions, Authority and Responsibility to Design and Assess Automation5th IFIP Working Conference on Human Work Interaction Design (HWID), Aug 2018, Espoo, Finland. pp.36-56, ⟨10.1007/978-3-030-05297-3_3⟩
Conference papers
hal-02089260v1
|
||
|
Deep System Knowledge Required: Revisiting UCD Contribution in the Design of Complex Command and Control Systems17th IFIP Conference on Human-Computer Interaction (INTERACT 2019), Sep 2019, Paphos, Cyprus. pp.699-720, ⟨10.1007/978-3-030-29381-9_42⟩
Conference papers
hal-02435352v1
|
||
|
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers
hal-02294599v1
|
||
|
Output-sensitive Information flow analysis39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.93-110, ⟨10.1007/978-3-030-21759-4_6⟩
Conference papers
hal-02303984v1
|
||
|
Performance of Password Guessing Enumerators Under Cracking ConditionsICT Systems Security and Privacy Protection - IFIP SEC, Gurpreet Dhillon, Jun 2019, Lisbonne, Portugal. pp.67-80, ⟨10.1007/978-3-030-22312-0_5⟩
Conference papers
hal-02060091v1
|
||
|
Removing Problems in Rule-Based PoliciesSEC 2019 : ICT Systems Security and Privacy Protection, Jun 2019, Lisbon, Portugal. pp.120-133, ⟨10.1007/978-3-030-22312-0_9⟩
Conference papers
hal-02169342v1
|
||
|
Enriching Task Models with Usability and User Experience Evaluation Data7th International Conference on Human-Centred Software Engineering (HCSE 2018), Sep 2018, Sophia Antipolis, France. pp.146-163, ⟨10.1007/978-3-030-05909-5_9⟩
Conference papers
hal-02089252v1
|
||
|
Analysis of QUIC session establishment and its implementations13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩
Conference papers
hal-02468596v1
|
||
|
An Efficient and Scalable Intrusion Detection System on Logs of Distributed ApplicationsSEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection, Jun 2019, Lisbonne, Portugal. pp.49-63, ⟨10.1007/978-3-030-22312-0_4⟩
Conference papers
hal-02409487v1
|
||
|
Verifiable and Private Oblivious Polynomial Evaluation13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.49-65, ⟨10.1007/978-3-030-41702-4_4⟩
Conference papers
hal-02412789v1
|
||
|
Light Cryptography12th World Conference on Information Security Education WISE 2019, IFIP Working Group 11.8,, Jun 2019, Lisbonne, Portugal. pp.89-101, ⟨10.1007/978-3-030-23451-5_7⟩
Conference papers
hal-02145833v1
|
||
|
SoK: Cryptography for Neural NetworksIFIP 2019, IFIP Summer School on Privacy and Identity Management, Aug 2019, Brugg Windisch, Switzerland. ⟨10.1007/978-3-030-42504-3_5⟩
Conference papers
hal-03151115v1
|
||
|
Rationalizing the Need of Architecture-Driven Testing of Interactive Systems7th International Working Conference on Human-Centered Software Engineering (HCSE 2018), Sep 2018, Sophia Antipolis, France. pp.164-186, ⟨10.1007/978-3-030-05909-5_10⟩
Conference papers
hal-02089262v1
|
||
|
Towards a Hierarchical Deep Learning Approach for Intrusion DetectionInternational Conference on Machine Learning for Networking (MLN), 2019, Paris, France. ⟨10.1007/978-3-030-45778-5_2⟩
Conference papers
hal-02560294v1
|