Filter your results
- 4
- 4
- 4
- 4
- 5
- 2
- 2
- 2
- 2
- 2
- 1
- 5
- 5
- 3
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Proxy Smart Card Systems4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.213-220, ⟨10.1007/978-3-642-12368-9_15⟩
Conference papers
hal-01056085v1
|
||
|
On the Security of a Two-Factor Authentication Scheme4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.245-252, ⟨10.1007/978-3-642-12368-9_19⟩
Conference papers
hal-01056082v1
|
||
|
A Model for Vendor Selection and Dynamic EvaluationInternational Conference on Advances in Production and Management Systems (APMS), Sep 2009, Paris, France. pp.283-290, ⟨10.1007/978-3-642-16358-6_36⟩
Conference papers
hal-01055843v1
|
||
|
Increasing Project Control and Guidance through a Time-frame Simulation ApproachInternational Conference on Advances in Production and Management Systems (APMS), Sep 2009, Paris, France. pp.417-424, ⟨10.1007/978-3-642-16358-6_52⟩
Conference papers
hal-01060461v1
|