Filter your results
- 110
- 8
- 1
- 104
- 8
- 7
- 119
- 19
- 1
- 13
- 6
- 8
- 3
- 6
- 5
- 13
- 10
- 10
- 22
- 15
- 7
- 119
- 16
- 7
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 13
- 10
- 9
- 8
- 7
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Understanding Actor Roles in Inter-organizational Digital Public Services20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.43-58, ⟨10.1007/978-3-030-84789-0_4⟩
Conference papers
hal-04175105v1
|
||
|
Governance Challenges of Inter-organizational Digital Public Services Provisioning: A Case Study on Digital Invoicing Services in Belgium19th International Conference on Electronic Government (EGOV), Aug 2020, Linköping, Sweden. pp.223-235, ⟨10.1007/978-3-030-57599-1_17⟩
Conference papers
hal-03282764v1
|
||
|
A Secure Perceptual Hash Algorithm for Image Content Authentication12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.108-121, ⟨10.1007/978-3-642-24712-5_9⟩
Conference papers
hal-01596205v1
|
||
|
An Integrated Enterprise Modeling Framework Using the RUP/UML Business Use-Case Model and BPMN10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.299-315, ⟨10.1007/978-3-319-70241-4_20⟩
Conference papers
hal-01765257v1
|
||
|
Evaluating the Impact of User Stories Quality on the Ability to Understand and Structure Requirements12th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2019, Luxembourg, Luxembourg. pp.3-19, ⟨10.1007/978-3-030-35151-9_1⟩
Conference papers
hal-03231362v1
|
||
|
Dynamic Composition of Cross-Organizational Features in Distributed Software Systems10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.183-197, ⟨10.1007/978-3-642-13645-0_14⟩
Conference papers
hal-01061086v1
|
||
|
A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.370-389, ⟨10.1007/978-3-642-25821-3_19⟩
Conference papers
hal-01597768v1
|
||
|
Client-Side Biometric Verification Based on Trusted Computing14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.34-49, ⟨10.1007/978-3-642-40779-6_3⟩
Conference papers
hal-01492832v1
|
||
|
Trusted Computing to Increase Security and Privacy in eID Authentication29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.485-492, ⟨10.1007/978-3-642-55415-5_41⟩
Conference papers
hal-01370406v1
|
||
|
A Smart Card Based Solution for User-Centric Identity Management6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.164-177, ⟨10.1007/978-3-642-20769-3_14⟩
Conference papers
hal-01559463v1
|
||
|
Annotation Inference for Separation Logic Based Verifiers13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik,, Iceland. pp.319-333, ⟨10.1007/978-3-642-21461-5_21⟩
Conference papers
hal-01583323v1
|
||
|
PriMan : A Privacy-Preserving Identity Framework24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.327-334, ⟨10.1007/978-3-642-13739-6_24⟩
Conference papers
hal-01056676v1
|
||
|
Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.264-281, ⟨10.1007/978-3-319-22723-8_22⟩
Conference papers
hal-01610802v1
|
||
|
Oh, What a Night! Effortless Sleep Monitoring at Home15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.417-424, ⟨10.1007/978-3-319-22723-8_33⟩
Conference papers
hal-01610785v1
|
||
|
A Framework for Production System Design: Insights from Industrial ExperienceIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.76-82, ⟨10.1007/978-3-662-44733-8_10⟩
Conference papers
hal-01387150v1
|
||
|
Playful Experiences and Game Concepts for Multi-screen Environments14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.571-574, ⟨10.1007/978-3-319-24589-8_59⟩
Conference papers
hal-01758446v1
|
||
|
Privacy by Design – The Case of Automated Border ControlJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.139-152, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_10⟩
Book sections
hal-01431568v1
|
||
|
A Categorical Approach to Secure Compilation15th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2020, Dublin, Ireland. pp.155-179, ⟨10.1007/978-3-030-57201-3_9⟩
Conference papers
hal-03232345v1
|
||
|
A Survey on Multimodal Biometrics and the Protection of Their TemplatesJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.169-184, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_12⟩
Book sections
hal-01431575v1
|
||
|
HINT-KB: The Human Interactome Knowledge Base8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.612-621, ⟨10.1007/978-3-642-33412-2_63⟩
Conference papers
hal-01523049v1
|
||
|
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.194-208, ⟨10.1007/978-3-319-33630-5_14⟩
Conference papers
hal-01369553v1
|
||
|
Efficient and Effective Buffer Overflow Protection on ARM Processors4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.1-16, ⟨10.1007/978-3-642-12368-9_1⟩
Conference papers
hal-01056081v1
|
||
|
Testing a Selection of BPMN Tools for Their Support of Modelling Guidelines8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.111-125, ⟨10.1007/978-3-319-25897-3_8⟩
Conference papers
hal-01442301v1
|
||
|
Heap-Dependent Expressions in Separation LogicJoint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.170-185, ⟨10.1007/978-3-642-13464-7_14⟩
Conference papers
hal-01055155v1
|
||
Participatory Design for Persons with Cognitive or Sensory Impairments14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.781
Conference papers
hal-01513885v1
|
|||
|
The ‘Relay Ideation’ Technique: Moving from Problem Understanding to Problem Solving in the Design Process14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.651-658, ⟨10.1007/978-3-642-40498-6_57⟩
Conference papers
hal-01510503v1
|
||
|
The Practice of Enterprise ModelingSpringer International Publishing, LNBIP-432, 2021, Lecture Notes in Business Information Processing, 978-3-030-91278-9. ⟨10.1007/978-3-030-91279-6⟩
Books
hal-04323866v1
|
||
|
Identity-Theft Through e-Government Services – Government to Pay the Bill?David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.253-264, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_17⟩
Book sections
hal-01619729v1
|
||
|
Serene: Self-Reliant Client-Side Protection against Session Fixation12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.59-72, ⟨10.1007/978-3-642-30823-9_5⟩
Conference papers
hal-01527644v1
|
||
|
Behind the Scenes of Coproduction of Smart Mobility: Evidence from a Public Values’ Perspective18th International Conference on Electronic Government (EGOV), Sep 2019, San Benedetto del Tronto, Italy. pp.338-352, ⟨10.1007/978-3-030-27325-5_26⟩
Conference papers
hal-02445806v1
|