Filter your results
- 110
- 8
- 1
- 104
- 8
- 7
- 119
- 19
- 1
- 13
- 6
- 8
- 3
- 6
- 5
- 13
- 10
- 10
- 22
- 15
- 7
- 119
- 16
- 7
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 13
- 10
- 9
- 8
- 7
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Using a Smartphone to Access Personalized Web Services on a Workstation7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.144-156, ⟨10.1007/978-3-642-31668-5_11⟩
Conference papers
hal-01517605v1
|
||
|
Understanding Actor Roles in Inter-organizational Digital Public Services20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.43-58, ⟨10.1007/978-3-030-84789-0_4⟩
Conference papers
hal-04175105v1
|
||
|
Trusted Computing to Increase Security and Privacy in eID Authentication29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.485-492, ⟨10.1007/978-3-642-55415-5_41⟩
Conference papers
hal-01370406v1
|
||
|
Towards a Framework for Open Data Publishers: A Comparison Study Between Sweden and Belgium19th International Conference on Electronic Government (EGOV), Aug 2020, Linköping, Sweden. pp.262-274, ⟨10.1007/978-3-030-57599-1_20⟩
Conference papers
hal-03282788v1
|
||
|
The Practice of Enterprise ModelingSpringer International Publishing, LNBIP-305, 2017, Lecture Notes in Business Information Processing, 978-3-319-70240-7. ⟨10.1007/978-3-319-70241-4⟩
Books
hal-01765245v1
|
||
|
The Practice of Enterprise ModelingSpringer International Publishing, LNBIP-432, 2021, Lecture Notes in Business Information Processing, 978-3-030-91278-9. ⟨10.1007/978-3-030-91279-6⟩
Books
hal-04323866v1
|
||
|
The ‘Relay Ideation’ Technique: Moving from Problem Understanding to Problem Solving in the Design Process14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.651-658, ⟨10.1007/978-3-642-40498-6_57⟩
Conference papers
hal-01510503v1
|
||
|
Testing a Selection of BPMN Tools for Their Support of Modelling Guidelines8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.111-125, ⟨10.1007/978-3-319-25897-3_8⟩
Conference papers
hal-01442301v1
|
||
|
Subobject Transactional Memory14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.44-58, ⟨10.1007/978-3-642-30829-1_4⟩
Conference papers
hal-01529600v1
|
||
|
Strong Customer Authentication in Online Payments Under GDPR and PSD2: A Case of Cumulative Application15th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Sep 2020, Maribor, Slovenia. pp.78-95, ⟨10.1007/978-3-030-72465-8_5⟩
Conference papers
hal-03703763v1
|
||
|
Stress Out: Translating Real-World Stressors into Audio-Visual Stress Cues in VR for Police Training18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.551-561, ⟨10.1007/978-3-030-85616-8_32⟩
Conference papers
hal-04196885v1
|
||
|
Serene: Self-Reliant Client-Side Protection against Session Fixation12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.59-72, ⟨10.1007/978-3-642-30823-9_5⟩
Conference papers
hal-01527644v1
|
||
|
Secure Storage on Android with Context-Aware Access Control15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.46-59, ⟨10.1007/978-3-662-44885-4_4⟩
Conference papers
hal-01404184v1
|
||
|
Secure Resource Sharing for Embedded Protected Module Architectures9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers
hal-01442554v1
|
||
|
Secure Negotiation for Manual Authentication Protocols12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.214-221, ⟨10.1007/978-3-642-24712-5_20⟩
Conference papers
hal-01596202v1
|
||
|
Secure Multi-Execution through Static Program Transformation14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.186-202, ⟨10.1007/978-3-642-30793-5_12⟩
Conference papers
hal-01528736v1
|
||
|
ROAC: A Role-Oriented Access Control Model6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.113-127, ⟨10.1007/978-3-642-30955-7_11⟩
Conference papers
hal-01534310v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders (Part 2)14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.386-397, ⟨10.1007/978-3-319-25013-7_31⟩
Conference papers
hal-01448056v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.209-221, ⟨10.1007/978-3-319-22479-4_16⟩
Conference papers
hal-01412272v1
|
||
|
Reciprocity in Rapid Ethnography15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.292-299, ⟨10.1007/978-3-319-22668-2_23⟩
Conference papers
hal-01599854v1
|
||
|
Recent Developments in Low-Level Software Security6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.1-16, ⟨10.1007/978-3-642-30955-7_1⟩
Conference papers
hal-01534300v1
|
||
|
RAM: Rapid Alignment Method10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.266-282, ⟨10.1007/978-3-642-27257-8_17⟩
Conference papers
hal-01596293v1
|
||
|
Radon Transform-Based Secure Image Hashing12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.186-193, ⟨10.1007/978-3-642-24712-5_17⟩
Conference papers
hal-01596211v1
|
||
|
Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.264-281, ⟨10.1007/978-3-319-22723-8_22⟩
Conference papers
hal-01610802v1
|
||
|
Privacy-Preserving Scheduling Mechanism for eHealth Systems13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers
hal-01540885v1
|
||
|
Privacy-Preserving Public Transport Ticketing System29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.135-150, ⟨10.1007/978-3-319-20810-7_9⟩
Conference papers
hal-01745821v1
|
||
|
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.555-560, ⟨10.1007/978-3-642-30436-1_48⟩
Conference papers
hal-01518223v1
|
||
|
Privacy-Friendly Checking of Remote Token Blacklists3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.18-33, ⟨10.1007/978-3-642-37282-7_3⟩
Conference papers
hal-01470501v1
|
||
|
Privacy Preserving Mechanisms for a Pervasive eHealth System7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.221-231, ⟨10.1007/978-3-642-31668-5_17⟩
Conference papers
hal-01517608v1
|
||
|
Privacy by Design – The Case of Automated Border ControlJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.139-152, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_10⟩
Book sections
hal-01431568v1
|