Filter your results
- 4
- 4
- 4
- 1
- 1
- 1
- 2
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.83-101, ⟨10.1007/978-3-642-39218-4_7⟩
Conference papers
hal-01463861v1
|
||
|
A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service12th Conference on e-Business, e-Services, and e-Society (I3E), Apr 2013, Athens, Greece. pp.25-37, ⟨10.1007/978-3-642-37437-1_3⟩
Conference papers
hal-01470566v1
|
||
|
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.479-494, ⟨10.1007/978-3-319-18467-8_32⟩
Conference papers
hal-01345140v1
|
||
|
Towards a Conceptual Search for Vietnamese Legal Text13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.175-185, ⟨10.1007/978-3-662-45237-0_18⟩
Conference papers
hal-01405579v1
|