Filter your results
- 31
- 30
- 1
- 31
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 3
- 1
- 2
- 8
- 6
- 31
- 3
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Advanced Technology and Social Media Influence on Research, Industry and Community6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.1-9, ⟨10.1007/978-3-319-89743-1_1⟩
Conference papers
hal-01913884v1
|
||
|
Multicast in Multi-channel Wireless Mesh Networks9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.148-159, ⟨10.1007/978-3-642-12963-6_12⟩
Conference papers
hal-01056316v1
|
||
|
Data and Applications Security and Privacy XXXVSpringer International Publishing, LNCS-12840, 2021, Lecture Notes in Computer Science, 978-3-030-81241-6. ⟨10.1007/978-3-030-81242-3⟩
Books
hal-03677022v1
|
||
|
Toward Efficient On-Demand Streaming with BitTorrent9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.53-66, ⟨10.1007/978-3-642-12963-6_5⟩
Conference papers
hal-01056300v1
|
||
|
Using Torrent Inflation to Efficiently Serve the Long Tail in Peer-Assisted Content Delivery Systems9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.1-14, ⟨10.1007/978-3-642-12963-6_1⟩
Conference papers
hal-01056308v1
|
||
|
ToCoPlay: Graphical Multi-touch Interaction for Composing and Playing Music13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.306-322, ⟨10.1007/978-3-642-23765-2_22⟩
Conference papers
hal-01591798v1
|
||
|
Strategyproof Mechanisms for Content Delivery via Layered Multicast10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.82-96, ⟨10.1007/978-3-642-20798-3_7⟩
Conference papers
hal-01597964v1
|
||
|
Opportunities for Proxemic Interactions in Ubicomp (Keynote)13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.3-10, ⟨10.1007/978-3-642-23774-4_3⟩
Conference papers
hal-01590563v1
|
||
|
Designing Snakey: A Tangible User Interface Supporting Well Path Planning13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.45-53, ⟨10.1007/978-3-642-23765-2_4⟩
Conference papers
hal-01591831v1
|
||
|
The Unadorned Desk: Exploiting the Physical Space around a Display as an Input Canvas14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.140-158, ⟨10.1007/978-3-642-40483-2_10⟩
Conference papers
hal-01497432v1
|
||
|
Fuzzy Vault for Behavioral Authentication System35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.295-310, ⟨10.1007/978-3-030-58201-2_20⟩
Conference papers
hal-03440844v1
|
||
|
Privacy Consensus in Anonymization Systems via Game Theory26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.74-89, ⟨10.1007/978-3-642-31540-4_6⟩
Conference papers
hal-01534775v1
|
||
|
Are They Making Our Privates Public? – Emerging Risks of Governmental Open Data Initiatives7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.1-13, ⟨10.1007/978-3-642-31668-5_1⟩
Conference papers
hal-01517598v1
|
||
|
Oops - We Didn’t Mean to Do That! – How Unintended Consequences Can Hijack Good Privacy and Security Policies6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.108-119, ⟨10.1007/978-3-642-20769-3_9⟩
Conference papers
hal-01559474v1
|
||
|
Emotive Expression through the Movement of Interactive Robotic Vehicles13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.91-99, ⟨10.1007/978-3-642-23765-2_7⟩
Conference papers
hal-01591835v1
|
||
|
Secure Obfuscation of Authoring Style9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.88-103, ⟨10.1007/978-3-319-24018-3_6⟩
Conference papers
hal-01442555v1
|
||
|
Ambient Interference Effects in Wi-Fi Networks9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.160-173, ⟨10.1007/978-3-642-12963-6_13⟩
Conference papers
hal-01056315v1
|
||
|
Social Media Use During Emergency Response – Insights from Emergency Professionals15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.557-566, ⟨10.1007/978-3-319-45234-0_49⟩
Conference papers
hal-01702151v1
|
||
|
The Continuous Interaction Space: Interaction Techniques Unifying Touch and Gesture on and above a Digital Surface13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.461-476, ⟨10.1007/978-3-642-23765-2_32⟩
Conference papers
hal-01591803v1
|
||
|
EXCITE: EXploring Collaborative Interaction in Tracked Environments15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.89-97, ⟨10.1007/978-3-319-22668-2_8⟩
Conference papers
hal-01599900v1
|
||
|
Design Patterns for Multiple Stakeholders in Social Computing28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.163-178, ⟨10.1007/978-3-662-43936-4_11⟩
Conference papers
hal-01284852v1
|
||
|
Stateless RD Network Services9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.135-147, ⟨10.1007/978-3-642-12963-6_11⟩
Conference papers
hal-01056317v1
|
||
|
Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.31-46, ⟨10.1007/978-3-642-24864-1_3⟩
Conference papers
hal-01571779v1
|
||
|
Privacy-Preserving Implicit Authentication29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.471-484, ⟨10.1007/978-3-642-55415-5_40⟩
Conference papers
hal-01370405v1
|
||
|
CipherCard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks on Common Touchscreen Devices15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.436-454, ⟨10.1007/978-3-319-22668-2_34⟩
Conference papers
hal-01599857v1
|
||
|
ReservoirBench: An Interactive Educational Reservoir Engineering Workbench15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.340-348, ⟨10.1007/978-3-319-22701-6_26⟩
Conference papers
hal-01599642v1
|
||
|
Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.474-490, ⟨10.1007/978-3-319-58469-0_32⟩
Conference papers
hal-01649016v1
|
||
|
MovemenTable: The Design of Moving Interactive Tabletops15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.296-314, ⟨10.1007/978-3-319-22698-9_19⟩
Conference papers
hal-01609419v1
|
||
|
User Experience Guidelines for Designing HMD Extended Reality Applications17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.319-341, ⟨10.1007/978-3-030-29390-1_18⟩
Conference papers
hal-02877668v1
|
||
|
Helping Hands: Designing Video Games with Interpersonal Touch Interaction9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.55-66, ⟨10.1007/978-3-642-15399-0_6⟩
Conference papers
hal-01055591v1
|
- 1
- 2