Filter your results
- 2
- 2
- 2
- 1
- 1
- 2
- 1
- 1
- 13
- 6
- 6
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
2 results
|
|
sorted by
|
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.71-86, ⟨10.1007/978-3-642-30955-7_8⟩
Conference papers
hal-01534318v1
|