Filter your results
- 8
- 8
- 8
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 8
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
IT Governance Framework Adoption: Establishing Success FactorsGovernance and Sustainability in Information Systems: Managing the Transfer and Diffusion of IT (Working conference), Sep 2011, Hamburg, Germany. pp.239-248, ⟨10.1007/978-3-642-24148-2_15⟩
Conference papers
hal-01571722v1
|
||
|
Reasoning About Distributed Secrets37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.156-170, ⟨10.1007/978-3-319-60225-7_11⟩
Conference papers
hal-01658413v1
|
||
|
Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.111-124, ⟨10.1007/978-3-642-15240-5_9⟩
Conference papers
hal-01054440v1
|
||
|
A Distributed Computing Workflow for Modelling Environmental Flows in Complex Terrain11th International Symposium on Environmental Software Systems (ISESS), Mar 2015, Melbourne, Australia. pp.321-332, ⟨10.1007/978-3-319-15994-2_32⟩
Conference papers
hal-01328566v1
|
||
|
Gender Bias in AI: Implications for Managerial Practices20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.259-270, ⟨10.1007/978-3-030-85447-8_23⟩
Conference papers
hal-03648154v1
|
||
|
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.257-272, ⟨10.1007/978-3-642-13739-6_17⟩
Conference papers
hal-01056684v1
|
||
|
Social Engineering and Organisational Dependencies in Phishing Attacks17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.564-584, ⟨10.1007/978-3-030-29381-9_35⟩
Conference papers
hal-02544575v1
|
||
|
Purpose-based access control policies and conflicting analysis25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.217-228, ⟨10.1007/978-3-642-15257-3_20⟩
Conference papers
hal-01054514v1
|