Filter your results
- 4
- 4
- 4
- 1
- 3
- 4
- 1
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.161-175, ⟨10.1007/978-3-319-33630-5_12⟩
Conference papers
hal-01369551v1
|
||
|
Coercion-Resistant Proxy Voting31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.3-16, ⟨10.1007/978-3-319-33630-5_1⟩
Conference papers
hal-01369533v1
|
||
|
Teaching Phishing-Security: Which Way is Best?31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.135-149, ⟨10.1007/978-3-319-33630-5_10⟩
Conference papers
hal-01369549v1
|
||
|
Election-Dependent Security Evaluation of Internet Voting Schemes32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.371-382, ⟨10.1007/978-3-319-58469-0_25⟩
Conference papers
hal-01648992v1
|