Filter your results
- 3
- 3
- 3
- 3
- 2
- 4
- 3
- 4
- 5
- 5
- 7
- 4
- 8
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Simple and Practical Integrity Models for Binaries and Files9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.30-46, ⟨10.1007/978-3-319-18491-3_3⟩
Conference papers
hal-01416206v1
|
||
|
Randomizing the Montgomery Powering Ladder9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.169-184, ⟨10.1007/978-3-319-24018-3_11⟩
Conference papers
hal-01442541v1
|
||
|
Kwento: Using a Participatory Approach to Design a Family Storytelling Application for Domestic Helpers15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.493-500, ⟨10.1007/978-3-319-22698-9_33⟩
Conference papers
hal-01609388v1
|