Filter your results
- 4
- 2
- 4
- 2
- 6
- 2
- 1
- 1
- 1
- 1
- 6
- 2
- 1
- 1
- 6
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.62-76, ⟨10.1007/978-3-319-99828-2_5⟩
Conference papers
hal-02023725v1
|
||
|
Formal Analysis of Security Metrics and Risk5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.304-319, ⟨10.1007/978-3-642-21040-2_22⟩
Conference papers
hal-01573302v1
|
||
|
Optimal Security Configuration for Cyber Insurance33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.187-200, ⟨10.1007/978-3-319-99828-2_14⟩
Conference papers
hal-02023729v1
|
||
|
Trust Management VIISpringer, AICT-401, 2013, IFIP Advances in Information and Communication Technology, 978-3-642-38322-9. ⟨10.1007/978-3-642-38323-6⟩
Books
hal-01468338v1
|
||
|
A Formal Support for Collaborative Data SharingInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.547-561, ⟨10.1007/978-3-642-32498-7_42⟩
Conference papers
hal-01542438v1
|
||
|
ICT Systems Security and Privacy ProtectionSpringer International Publishing, AICT-502, 2017, IFIP Advances in Information and Communication Technology, 978-3-319-58468-3. ⟨10.1007/978-3-319-58469-0⟩
Books
hal-01649010v1
|