Filter your results
- 31
- 1
- 30
- 2
- 32
- 1
- 5
- 4
- 2
- 2
- 5
- 2
- 9
- 2
- 1
- 32
- 2
- 1
- 1
- 1
- 1
- 6
- 4
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Coordination Models and LanguagesSpringer International Publishing, LNCS-12717, 2021, Lecture Notes in Computer Science, 978-3-030-78141-5. ⟨10.1007/978-3-030-78142-2⟩
Books
hal-03387825v1
|
||
|
A Comprehensive Study of the Usability of Multiple Graphical Passwords14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.424-441, ⟨10.1007/978-3-642-40477-1_26⟩
Conference papers
hal-01504899v1
|
||
|
Human-Centered and Error-Resilient Systems DevelopmentSpringer International Publishing, 9856, 2016, Lecture Notes in Computer Science (LNCS), 978-3-319-44901-2. ⟨10.1007/978-3-319-44902-9⟩
Books
hal-01647710v1
|
||
|
What About My Privacy, Habibi?17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.67-87, ⟨10.1007/978-3-030-29387-1_5⟩
Conference papers
hal-02553910v1
|
||
|
Comparison of the Data Recovery Function of Forensic Tools9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.331-347, ⟨10.1007/978-3-642-41148-9_22⟩
Conference papers
hal-01460614v1
|
||
|
Type Checking Privacy Policies in the π-calculus35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers
hal-01767337v1
|
||
|
Gene Expression Programming and Trading Strategies9th Artificial Intelligence Applications and Innovations (AIAI), Sep 2013, Paphos, Greece. pp.497-505, ⟨10.1007/978-3-642-41142-7_50⟩
Conference papers
hal-01459683v1
|
||
|
Mathematical Modelling of Trust Issues in Federated Identity Management9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.13-29, ⟨10.1007/978-3-319-18491-3_2⟩
Conference papers
hal-01416204v1
|
||
|
Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.109-124, ⟨10.1007/978-3-662-43813-8_8⟩
Conference papers
hal-01381682v1
|
||
|
Unification of Publish/Subscribe Systems and Stream Databases13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.292-311, ⟨10.1007/978-3-642-35170-9_15⟩
Conference papers
hal-01555560v1
|
||
|
SFJ: An Implementation of Semantic Featherweight Java22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.153-168, ⟨10.1007/978-3-030-50029-0_10⟩
Conference papers
hal-03274001v1
|
||
|
On Efficiency Preorders5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.83-94, ⟨10.1007/978-3-642-40213-5_6⟩
Conference papers
hal-01514657v1
|
||
|
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.161-175, ⟨10.1007/978-3-319-33630-5_12⟩
Conference papers
hal-01369551v1
|
||
|
Interactive Light Feedback: Illuminating Above-Device Gesture Interfaces15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.478-481, ⟨10.1007/978-3-319-22723-8_42⟩
Conference papers
hal-01610841v1
|
||
|
$$\pi $$π with Leftovers: A Mechanisation in Agda41th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2021, Valletta, Malta. pp.157-174, ⟨10.1007/978-3-030-78089-0_9⟩
Conference papers
hal-03740255v1
|
||
|
Vulnerability Assessments of Building Management Systems14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.209-220, ⟨10.1007/978-3-030-62840-6_10⟩
Conference papers
hal-03794630v1
|
||
|
The Gilmorehill Mystery: A Location-Based Game for Campus Exploration20th International Conference on Entertainment Computing (ICEC), Nov 2021, Coimbra, Portugal. pp.236-251, ⟨10.1007/978-3-030-89394-1_18⟩
Conference papers
hal-04144405v1
|
||
|
Progress as Compositional Lock-Freedom16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.49-64, ⟨10.1007/978-3-662-43376-8_4⟩
Conference papers
hal-01290067v1
|
||
|
Prioritise the Best Variation41th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2021, Valletta, Malta. pp.100-119, ⟨10.1007/978-3-030-78089-0_6⟩
Conference papers
hal-03740257v1
|
||
|
Typechecking Java Protocols with [St]Mungo40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.208-224, ⟨10.1007/978-3-030-50086-3_12⟩
Conference papers
hal-03283241v1
|
||
|
The Impact of Encumbrance on Mobile Interactions14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.92-109, ⟨10.1007/978-3-642-40477-1_6⟩
Conference papers
hal-01504931v1
|
||
|
Dynamic Identity Federation Using Security Assertion Markup Language (SAML)3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.131-146, ⟨10.1007/978-3-642-37282-7_13⟩
Conference papers
hal-01470512v1
|
||
|
IFIP WG 13.5 Workshop on Resilience, Reliability, Safety and Human Error in System Development15th Human-Computer Interaction (INTERACT 2015), Sep 2015, Bamberg, Germany. pp.663-664, ⟨10.1007/978-3-319-22723-8_91⟩
Conference papers
hal-01610829v1
|
||
|
Towards In-Air Gesture Control of Household Appliances with Limited Displays15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.611-615, ⟨10.1007/978-3-319-22723-8_73⟩
Conference papers
hal-01610798v1
|
||
|
Passphrases Beat Thermal Attacks: Evaluating Text Input Characteristics Against Thermal Attacks on Laptops and Smartphones18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.712-721, ⟨10.1007/978-3-030-85610-6_41⟩
Conference papers
hal-04215498v1
|
||
|
An Ensemble Interpretable Machine Learning Scheme for Securing Data Quality at the Edge4th International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2020, Dublin, Ireland. pp.517-534, ⟨10.1007/978-3-030-57321-8_29⟩
Conference papers
hal-03414739v1
|
||
|
Data Recovery from Proprietary Formatted Cctv Hard Disks9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.213-223, ⟨10.1007/978-3-642-41148-9_15⟩
Conference papers
hal-01460629v1
|
||
|
BSense: A Flexible and Open-Source Broadband Mapping Framework11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.344-357, ⟨10.1007/978-3-642-30045-5_26⟩
Conference papers
hal-01531128v1
|
||
|
A Spatio-Temporal Data Imputation Model for Supporting Analytics at the Edge18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.138-150, ⟨10.1007/978-3-030-29374-1_12⟩
Conference papers
hal-02510089v1
|
||
|
Designing Mobile Phone Interfaces for Age Diversity in South Africa: “One-World” versus Diverse “Islands”14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.1-17, ⟨10.1007/978-3-642-40477-1_1⟩
Conference papers
hal-01504892v1
|
- 1
- 2