Filter your results
- 2
- 2
- 2
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
2 results
|
|
sorted by
|
|
Role Mining under Role-Usage Cardinality Constraint27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.150-161, ⟨10.1007/978-3-642-30436-1_13⟩
Conference papers
hal-01518246v1
|
||
|
Enhancing the Security of Image CAPTCHAs Through Noise Addition30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.354-368, ⟨10.1007/978-3-319-18467-8_24⟩
Conference papers
hal-01345127v1
|