Filter your results
- 110
- 8
- 1
- 103
- 7
- 110
- 19
- 1
- 12
- 6
- 8
- 3
- 5
- 5
- 12
- 9
- 9
- 21
- 14
- 5
- 110
- 15
- 7
- 4
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 11
- 10
- 8
- 7
- 7
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Interactive Interaction Constraints15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.211-225, ⟨10.1007/978-3-642-38493-6_15⟩
Conference papers
hal-01486028v1
|
||
|
A Secure Perceptual Hash Algorithm for Image Content Authentication12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.108-121, ⟨10.1007/978-3-642-24712-5_9⟩
Conference papers
hal-01596205v1
|
||
|
HyperForce: Hypervisor-enForced Execution of Security-Critical Code27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.126-137, ⟨10.1007/978-3-642-30436-1_11⟩
Conference papers
hal-01518236v1
|
||
|
Commercial Home Assistance (eHealth) ServicesInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.28-42, ⟨10.1007/978-3-642-27585-2_3⟩
Conference papers
hal-01481504v1
|
||
|
Domain Modelling in Bloom: Deciphering How We Teach It10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.3-17, ⟨10.1007/978-3-319-70241-4_1⟩
Conference papers
hal-01765258v1
|
||
|
Analysis of Revocation Strategies for Anonymous Idemix Credentials12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers
hal-01596188v1
|
||
|
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.53-69, ⟨10.1007/978-3-319-45931-8_4⟩
Conference papers
hal-01639618v1
|
||
|
PA Meets IS Research: Analysing Failure of Intergovernmental Information Systems via IS Adoption and Success Models13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.72-83, ⟨10.1007/978-3-662-44426-9_6⟩
Conference papers
hal-01401726v1
|
||
|
Annotation Inference for Separation Logic Based Verifiers13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik,, Iceland. pp.319-333, ⟨10.1007/978-3-642-21461-5_21⟩
Conference papers
hal-01583323v1
|
||
|
Behind the Scenes of Coproduction of Smart Mobility: Evidence from a Public Values’ Perspective18th International Conference on Electronic Government (EGOV), Sep 2019, San Benedetto del Tronto, Italy. pp.338-352, ⟨10.1007/978-3-030-27325-5_26⟩
Conference papers
hal-02445806v1
|
||
|
Get to Know Your Geek: Towards a Sociological Understanding of Incentives Developing Privacy-Friendly Free and Open Source Software14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.177-189, ⟨10.1007/978-3-030-42504-3_12⟩
Conference papers
hal-03378966v1
|
||
|
Assessing the Adoption Level of Agile Development Within Software Product Lines: The AgiPL-AM Model12th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2019, Luxembourg, Luxembourg. pp.134-148, ⟨10.1007/978-3-030-35151-9_9⟩
Conference papers
hal-03231348v1
|
||
|
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.350-369, ⟨10.1007/978-3-642-25821-3_18⟩
Conference papers
hal-01597755v1
|
||
|
Decision Tree Analysis for Estimating the Costs and Benefits of Disclosing Data18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.205-217, ⟨10.1007/978-3-030-29374-1_17⟩
Conference papers
hal-02510106v1
|
||
|
Learning from Errors: Error-based Exercises in Domain Modelling Pedagogy11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.321-334, ⟨10.1007/978-3-030-02302-7_20⟩
Conference papers
hal-02156467v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders (Part 2)14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.386-397, ⟨10.1007/978-3-319-25013-7_31⟩
Conference papers
hal-01448056v1
|
||
|
Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.264-281, ⟨10.1007/978-3-319-22723-8_22⟩
Conference papers
hal-01610802v1
|
||
|
Using a Smartphone to Access Personalized Web Services on a Workstation7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.144-156, ⟨10.1007/978-3-642-31668-5_11⟩
Conference papers
hal-01517605v1
|
||
|
Client-Side Biometric Verification Based on Trusted Computing14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.34-49, ⟨10.1007/978-3-642-40779-6_3⟩
Conference papers
hal-01492832v1
|
||
|
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.323-336, ⟨10.1007/978-3-319-33630-5_22⟩
Conference papers
hal-01369566v1
|
||
|
Secure Multi-Execution through Static Program Transformation14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.186-202, ⟨10.1007/978-3-642-30793-5_12⟩
Conference papers
hal-01528736v1
|
||
|
Privacy by Design – The Case of Automated Border ControlJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.139-152, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_10⟩
Book sections
hal-01431568v1
|
||
|
Oh, What a Night! Effortless Sleep Monitoring at Home15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.417-424, ⟨10.1007/978-3-319-22723-8_33⟩
Conference papers
hal-01610785v1
|
||
|
Partial Connector Colouring14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.59-73, ⟨10.1007/978-3-642-30829-1_5⟩
Conference papers
hal-01529589v1
|
||
|
A Survey on Multimodal Biometrics and the Protection of Their TemplatesJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.169-184, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_12⟩
Book sections
hal-01431575v1
|
||
|
Secure Storage on Android with Context-Aware Access Control15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.46-59, ⟨10.1007/978-3-662-44885-4_4⟩
Conference papers
hal-01404184v1
|
||
|
“I Really Don’t Know What ‘Thumbs Up’ Means”: Algorithmic Experience in Movie Recommender Algorithms17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.521-541, ⟨10.1007/978-3-030-29387-1_30⟩
Conference papers
hal-02553857v1
|
||
|
Heap-Dependent Expressions in Separation LogicJoint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.170-185, ⟨10.1007/978-3-642-13464-7_14⟩
Conference papers
hal-01055155v1
|
||
|
AlgorithmicsAdvancing Research in Information and Communication Technology, AICT-600, pp.59-98, 2021, ⟨10.1007/978-3-030-81701-5_3⟩
Book sections
hal-03325977v1
|
||
|
MeViTa: Interactive Visualizations to Help Older Adults with Their Medication Intake Using a Camera-Projector System16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.132-152, ⟨10.1007/978-3-319-67744-6_9⟩
Conference papers
hal-01676181v1
|