Filter your results
- 10
- 10
- 10
- 1
- 2
- 2
- 1
- 1
- 1
- 2
- 10
- 10
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.62-76, ⟨10.1007/978-3-319-99828-2_5⟩
Conference papers
hal-02023725v1
|
||
|
Modelling Social-Aware Forwarding in Opportunistic NetworksPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.141-152, ⟨10.1007/978-3-642-25575-5_12⟩
Conference papers
hal-01586891v1
|
||
|
An Enriched Emoji Picker to Improve Accessibility in Mobile Communications18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.418-433, ⟨10.1007/978-3-030-85623-6_25⟩
Conference papers
hal-04331585v1
|
||
|
Characterising Aggregate Inter-contact Times in Heterogeneous Opportunistic Networks10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.301-313, ⟨10.1007/978-3-642-20798-3_23⟩
Conference papers
hal-01597962v1
|
||
|
Optimal Security Configuration for Cyber Insurance33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.187-200, ⟨10.1007/978-3-319-99828-2_14⟩
Conference papers
hal-02023729v1
|
||
|
Blockchain Based Access Control17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.206-220, ⟨10.1007/978-3-319-59665-5_15⟩
Conference papers
hal-01800124v1
|
||
|
Application-Level Traceroute: Adopting Mimetic Mechanisms to Increase Discovery Capabilities17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.66-77, ⟨10.1007/978-3-030-30523-9_6⟩
Conference papers
hal-02881737v1
|
||
|
PERSONA - A Personalized Data Protection Framework7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.272-280, ⟨10.1007/978-3-642-38323-6_22⟩
Conference papers
hal-01468180v1
|
||
|
A Labelled Semantics for Soft Concurrent Constraint Programming17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.133-149, ⟨10.1007/978-3-319-19282-6_9⟩
Conference papers
hal-01149227v1
|
||
|
Opportunistic D2D-Aided Uplink Communications in 5G and Beyond Networks17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.141-153, ⟨10.1007/978-3-030-30523-9_12⟩
Conference papers
hal-02881747v1
|