Search - IFIP Open Digital Library Access content directly

Filter your results

31 results
Structure: Internal structure identifier : 106219
Image document

Early DDoS Detection Based on Data Mining Techniques

Konstantinos Xylogiannopoulos , Panagiotis Karampelas , Reda Alhajj
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.190-199, ⟨10.1007/978-3-662-43826-8_15⟩
Conference papers hal-01400941v1
Image document

Helping Hands: Designing Video Games with Interpersonal Touch Interaction

Cody Watts , Ehud Sharlin , Peter Woytiuk
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.55-66, ⟨10.1007/978-3-642-15399-0_6⟩
Conference papers hal-01055591v1
Image document

User Experience Guidelines for Designing HMD Extended Reality Applications

Steven Vi , Tiago Silva , Frank Maurer
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.319-341, ⟨10.1007/978-3-030-29390-1_18⟩
Conference papers hal-02877668v1
Image document

MovemenTable: The Design of Moving Interactive Tabletops

Kazuki Takashima , Yusuke Asari , Hitomi Yokoyama , Ehud Sharlin , Yoshifumi Kitamura
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.296-314, ⟨10.1007/978-3-319-22698-9_19⟩
Conference papers hal-01609419v1
Image document

Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection

Somayeh Taheri , Md Morshedul Islam , Reihaneh Safavi-Naini
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.474-490, ⟨10.1007/978-3-319-58469-0_32⟩
Conference papers hal-01649016v1
Image document

ReservoirBench: An Interactive Educational Reservoir Engineering Workbench

Sowmya Somanath , Allan Rocha , Hamidreza Hamdi , Ehud Sharlin , Mario Costa Sousa
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.340-348, ⟨10.1007/978-3-319-22701-6_26⟩
Conference papers hal-01599642v1
Image document

CipherCard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks on Common Touchscreen Devices

Teddy Seyed , Xing-Dong Yang , Anthony Tang , Saul Greenberg , Jiawei Gu , et al.
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.436-454, ⟨10.1007/978-3-319-22668-2_34⟩
Conference papers hal-01599857v1
Image document

Privacy-Preserving Implicit Authentication

Nashad Ahmed Safa , Reihaneh Safavi-Naini , Siamak F. Shahandashti
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.471-484, ⟨10.1007/978-3-642-55415-5_40⟩
Conference papers hal-01370405v1
Image document

Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems

Jason Reeves , Ashwin Ramaswamy , Michael Locasto , Sergey Bratus , Sean Smith
5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.31-46, ⟨10.1007/978-3-642-24864-1_3⟩
Conference papers hal-01571779v1
Image document

Stateless RD Network Services

Maxim Podlesny , Sergey Gorinsky
9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.135-147, ⟨10.1007/978-3-642-12963-6_11⟩
Conference papers hal-01056317v1
Image document

Design Patterns for Multiple Stakeholders in Social Computing

Pooya Mehregan , Philip L. Fong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.163-178, ⟨10.1007/978-3-662-43936-4_11⟩
Conference papers hal-01284852v1
Image document

The Continuous Interaction Space: Interaction Techniques Unifying Touch and Gesture on and above a Digital Surface

Nicolai Marquardt , Ricardo Jota , Saul Greenberg , Joaquim A. Jorge
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.461-476, ⟨10.1007/978-3-642-23765-2_32⟩
Conference papers hal-01591803v1
Image document

EXCITE: EXploring Collaborative Interaction in Tracked Environments

Nicolai Marquardt , Frederico Schardong , Anthony Tang
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.89-97, ⟨10.1007/978-3-319-22668-2_8⟩
Conference papers hal-01599900v1
Image document

Social Media Use During Emergency Response – Insights from Emergency Professionals

Mahshid Marbouti , Frank Maurer
15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.557-566, ⟨10.1007/978-3-319-45234-0_49⟩
Conference papers hal-01702151v1
Image document

Ambient Interference Effects in Wi-Fi Networks

Aniket Mahanti , Niklas Carlsson , Carey Williamson , Martin Arlitt
9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.160-173, ⟨10.1007/978-3-642-12963-6_13⟩
Conference papers hal-01056315v1
Image document

Secure Obfuscation of Authoring Style

Hoi Le , Reihaneh Safavi-Naini , Asadullah Galib
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.88-103, ⟨10.1007/978-3-319-24018-3_6⟩
Conference papers hal-01442555v1
Image document

Emotive Expression through the Movement of Interactive Robotic Vehicles

Eric Kryski , Ehud Sharlin
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.91-99, ⟨10.1007/978-3-642-23765-2_7⟩
Conference papers hal-01591835v1
Image document

Are They Making Our Privates Public? – Emerging Risks of Governmental Open Data Initiatives

Thomas P. Keenan
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.1-13, ⟨10.1007/978-3-642-31668-5_1⟩
Conference papers hal-01517598v1
Image document

Oops - We Didn’t Mean to Do That! – How Unintended Consequences Can Hijack Good Privacy and Security Policies

Thomas P. Keenan
6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.108-119, ⟨10.1007/978-3-642-20769-3_9⟩
Conference papers hal-01559474v1
Image document

Privacy Consensus in Anonymization Systems via Game Theory

Rosa Karimi Adl , Mina Askari , Ken Barker , Reihaneh Safavi-Naini
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.74-89, ⟨10.1007/978-3-642-31540-4_6⟩
Conference papers hal-01534775v1
Image document

Fuzzy Vault for Behavioral Authentication System

Md Morshedul Islam , Reihaneh Safavi-Naini
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.295-310, ⟨10.1007/978-3-030-58201-2_20⟩
Conference papers hal-03440844v1
Image document

The Unadorned Desk: Exploiting the Physical Space around a Display as an Input Canvas

Doris Hausen , Sebastian Boring , Saul Greenberg
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.140-158, ⟨10.1007/978-3-642-40483-2_10⟩
Conference papers hal-01497432v1
Image document

Designing Snakey: A Tangible User Interface Supporting Well Path Planning

John Harris , James Young , Nicole Sultanum , Paul Lapides , Ehud Sharlin , et al.
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.45-53, ⟨10.1007/978-3-642-23765-2_4⟩
Conference papers hal-01591831v1
Image document

Opportunities for Proxemic Interactions in Ubicomp (Keynote)

Saul Greenberg
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.3-10, ⟨10.1007/978-3-642-23774-4_3⟩
Conference papers hal-01590563v1
Image document

Strategyproof Mechanisms for Content Delivery via Layered Multicast

Ajay Gopinathan , Zongpeng Li
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.82-96, ⟨10.1007/978-3-642-20798-3_7⟩
Conference papers hal-01597964v1
Image document

ToCoPlay: Graphical Multi-touch Interaction for Composing and Playing Music

Sheelagh Carpendale , Sean Lynch , Miguel A. Nacenta
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.306-322, ⟨10.1007/978-3-642-23765-2_22⟩
Conference papers hal-01591798v1
Image document

Using Torrent Inflation to Efficiently Serve the Long Tail in Peer-Assisted Content Delivery Systems

Niklas Carlsson , Derek L. Eager , Anirban Mahanti
9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.1-14, ⟨10.1007/978-3-642-12963-6_1⟩
Conference papers hal-01056308v1
Image document

Toward Efficient On-Demand Streaming with BitTorrent

Youmna Borghol , Sebastien Ardon , Niklas Carlsson , Anirban Mahanti
9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.53-66, ⟨10.1007/978-3-642-12963-6_5⟩
Conference papers hal-01056300v1
Image document

Data and Applications Security and Privacy XXXV

Ken Barker , Kambiz Ghazinour
Springer International Publishing, LNCS-12840, 2021, Lecture Notes in Computer Science, 978-3-030-81241-6. ⟨10.1007/978-3-030-81242-3⟩
Books hal-03677022v1
Image document

Multicast in Multi-channel Wireless Mesh Networks

Ouldooz Baghban Karimi , Jiangchuan Liu , Zongpeng Li
9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.148-159, ⟨10.1007/978-3-642-12963-6_12⟩
Conference papers hal-01056316v1