Filter your results
- 110
- 8
- 1
- 104
- 8
- 7
- 119
- 19
- 1
- 13
- 6
- 8
- 3
- 6
- 5
- 13
- 10
- 10
- 22
- 15
- 7
- 119
- 16
- 7
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 13
- 10
- 9
- 8
- 7
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Interactive Interaction Constraints15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.211-225, ⟨10.1007/978-3-642-38493-6_15⟩
Conference papers
hal-01486028v1
|
||
|
A Secure Perceptual Hash Algorithm for Image Content Authentication12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.108-121, ⟨10.1007/978-3-642-24712-5_9⟩
Conference papers
hal-01596205v1
|
||
|
HyperForce: Hypervisor-enForced Execution of Security-Critical Code27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.126-137, ⟨10.1007/978-3-642-30436-1_11⟩
Conference papers
hal-01518236v1
|
||
|
Commercial Home Assistance (eHealth) ServicesInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.28-42, ⟨10.1007/978-3-642-27585-2_3⟩
Conference papers
hal-01481504v1
|
||
|
Domain Modelling in Bloom: Deciphering How We Teach It10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.3-17, ⟨10.1007/978-3-319-70241-4_1⟩
Conference papers
hal-01765258v1
|
||
|
Analysis of Revocation Strategies for Anonymous Idemix Credentials12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers
hal-01596188v1
|
||
|
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.53-69, ⟨10.1007/978-3-319-45931-8_4⟩
Conference papers
hal-01639618v1
|
||
|
PA Meets IS Research: Analysing Failure of Intergovernmental Information Systems via IS Adoption and Success Models13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.72-83, ⟨10.1007/978-3-662-44426-9_6⟩
Conference papers
hal-01401726v1
|
||
|
Annotation Inference for Separation Logic Based Verifiers13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik,, Iceland. pp.319-333, ⟨10.1007/978-3-642-21461-5_21⟩
Conference papers
hal-01583323v1
|
||
|
Behind the Scenes of Coproduction of Smart Mobility: Evidence from a Public Values’ Perspective18th International Conference on Electronic Government (EGOV), Sep 2019, San Benedetto del Tronto, Italy. pp.338-352, ⟨10.1007/978-3-030-27325-5_26⟩
Conference papers
hal-02445806v1
|
||
|
Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.177-189, ⟨10.1007/978-3-030-42504-3_12⟩
Conference papers
hal-03378966v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-6109, 2010, Lecture Notes in Computer Science, 978-3-642-13240-7. ⟨10.1007/978-3-642-13241-4⟩
Books
hal-01555320v1
|
||
|
Assessing the Adoption Level of Agile Development Within Software Product Lines: The AgiPL-AM Model12th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2019, Luxembourg, Luxembourg. pp.134-148, ⟨10.1007/978-3-030-35151-9_9⟩
Conference papers
hal-03231348v1
|
||
|
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.350-369, ⟨10.1007/978-3-642-25821-3_18⟩
Conference papers
hal-01597755v1
|
||
|
Coordination Models and LanguagesSpringer International Publishing, LNCS-9037, 2015, Lecture Notes in Computer Science, 978-3-319-19281-9. ⟨10.1007/978-3-319-19282-6⟩
Books
hal-01774946v1
|
||
|
Decision Tree Analysis for Estimating the Costs and Benefits of Disclosing Data18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.205-217, ⟨10.1007/978-3-030-29374-1_17⟩
Conference papers
hal-02510106v1
|
||
|
3D Nanofabric: Layout Challenges and Solutions for Ultra-scaled Logic Designs28th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2020, Salt Lake City, UT, United States. pp.279-300, ⟨10.1007/978-3-030-81641-4_13⟩
Conference papers
hal-03759735v1
|
||
|
Noninterference via Symbolic Execution14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.152-168, ⟨10.1007/978-3-642-30793-5_10⟩
Conference papers
hal-01528732v1
|
||
|
A Generic Solution for Agile Run-Time Inspection Middleware12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.451-470, ⟨10.1007/978-3-642-25821-3_23⟩
Conference papers
hal-01597758v1
|
||
|
RAM: Rapid Alignment Method10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.266-282, ⟨10.1007/978-3-642-27257-8_17⟩
Conference papers
hal-01596293v1
|
||
|
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.113-127, ⟨10.1007/978-3-642-39614-4_8⟩
Conference papers
hal-01492780v1
|
||
|
Reciprocity in Rapid Ethnography15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.292-299, ⟨10.1007/978-3-319-22668-2_23⟩
Conference papers
hal-01599854v1
|
||
|
PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.403-416, ⟨10.1007/978-3-642-55415-5_34⟩
Conference papers
hal-01370388v1
|
||
|
Privacy-Friendly Checking of Remote Token Blacklists3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.18-33, ⟨10.1007/978-3-642-37282-7_3⟩
Conference papers
hal-01470501v1
|
||
Participatory Design for Persons with Cognitive or Sensory Impairments14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.781
Conference papers
hal-01513885v1
|
|||
|
Industrial IoT security monitoring and test on Fed4Fire+ platformsICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.270-278, ⟨10.1007/978-3-030-31280-0_17⟩
Conference papers
hal-02526342v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7025, 2011, Lecture Notes in Computer Science, 978-3-642-24711-8. ⟨10.1007/978-3-642-24712-5⟩
Books
hal-01596212v1
|
||
|
Playful Experiences and Game Concepts for Multi-screen Environments14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.571-574, ⟨10.1007/978-3-319-24589-8_59⟩
Conference papers
hal-01758446v1
|
||
|
Towards a Framework for Open Data Publishers: A Comparison Study Between Sweden and Belgium19th International Conference on Electronic Government (EGOV), Aug 2020, Linköping, Sweden. pp.262-274, ⟨10.1007/978-3-030-57599-1_20⟩
Conference papers
hal-03282788v1
|
||
|
Accountability in the EU Data Protection Reform: Balancing Citizens’ and Business’ RightsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.156-169, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_11⟩
Book sections
hal-01619737v1
|