Filter your results
- 23
- 3
- 22
- 3
- 1
- 26
- 3
- 1
- 2
- 7
- 2
- 3
- 1
- 1
- 2
- 2
- 2
- 1
- 2
- 26
- 4
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Practice in Reality for Virtual Reality Games: Making Players Familiar and Confident with a Game16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.147-162, ⟨10.1007/978-3-319-67684-5_10⟩
Conference papers
hal-01678506v1
|
||
|
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.219-234, ⟨10.1007/978-3-319-24018-3_14⟩
Conference papers
hal-01442545v1
|
||
|
Special Digital Monies: The Design of Alipay and WeChat Wallet for Mobile Payment Practices in China16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.136-155, ⟨10.1007/978-3-319-68059-0_9⟩
Conference papers
hal-01679828v1
|
||
|
DupRobo: Interactive Robotic Autocompletion of Physical Block-Based Repetitive Structure17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.475-495, ⟨10.1007/978-3-030-29384-0_29⟩
Conference papers
hal-02544601v1
|
||
|
ScaffoMapping: Assisting Concept Mapping for Video Learners17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.314-328, ⟨10.1007/978-3-030-29384-0_20⟩
Conference papers
hal-02544599v1
|
||
|
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.180-193, ⟨10.1007/978-3-030-22312-0_13⟩
Conference papers
hal-03744302v1
|
||
|
Designing Artifacts for Systems of Information5th Working Conference on Information Systems and Organizations (ISO), Dec 2014, Auckland, New Zealand. pp.233-245, ⟨10.1007/978-3-662-45708-5_15⟩
Conference papers
hal-01331829v1
|
||
|
A Panoramic View of 3G Data/Control-Plane Traffic: Mobile Device Perspective11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.318-330, ⟨10.1007/978-3-642-30045-5_24⟩
Conference papers
hal-01531132v1
|
||
|
CPMap: Design of Click-Points Map-Based Graphical Password Authentication33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.18-32, ⟨10.1007/978-3-319-99828-2_2⟩
Conference papers
hal-02023732v1
|
||
|
Facilitating Social Harmony Through ICTs14th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2017, Yogyakarta, Indonesia. pp.3-9, ⟨10.1007/978-3-319-59111-7_1⟩
Conference papers
hal-01650089v1
|
||
|
An Incident Response Model for Industrial Control System Forensics Based on Historical Events13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.311-328, ⟨10.1007/978-3-030-34647-8_16⟩
Conference papers
hal-03364562v1
|
||
|
Human Choice and Digital by Default: Autonomy vs Digital DeterminationSpringer International Publishing, AICT-656, 2022, IFIP Advances in Information and Communication Technology, 978-3-031-15687-8. ⟨10.1007/978-3-031-15688-5⟩
Books
hal-04395457v1
|
||
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-10741, 2018, Lecture Notes in Computer Science, 978-3-319-93523-2. ⟨10.1007/978-3-319-93524-9⟩
Books
hal-01875516v1
|
||
|
Digital Equity, Sustainable Development and the ICT ProfessionalLeon Strous; Roger Johnson; David Alan Grier; Doron Swade. Unimagined Futures – ICT Opportunities and Challenges :, AICT-555, Springer International Publishing, pp.220-231, 2020, IFIP Advances in Information and Communication Technology, 978-3-030-64245-7. ⟨10.1007/978-3-030-64246-4_17⟩
Book sections
hal-03194547v1
|
||
|
Evolving a Secure Internet28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.42-54, ⟨10.1007/978-3-642-39218-4_4⟩
Conference papers
hal-01463845v1
|
||
|
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.55-68, ⟨10.1007/978-3-642-39218-4_5⟩
Conference papers
hal-01463846v1
|
||
|
Defining Attack Patterns for Industrial Control Systems13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.289-309, ⟨10.1007/978-3-030-34647-8_15⟩
Conference papers
hal-03364574v1
|
||
|
Advances in Digital Forensics VISpringer, IFIP Advances in Information and Communication Technology (AICT-337), 2010, 978-3-642-15505-5. ⟨10.1007/978-3-642-15506-2⟩
Books
hal-01549682v1
|
||
|
Maximizing Lifetime of Connected-Dominating-Set in Cognitive Radio Networks11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.316-330, ⟨10.1007/978-3-642-30054-7_25⟩
Conference papers
hal-01531957v1
|
||
|
Additive Voronoi Cursor: Dynamic Effective Areas Using Additively Weighted Voronoi Diagrams17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.273-292, ⟨10.1007/978-3-030-29387-1_16⟩
Conference papers
hal-02553875v1
|
||
|
Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.203-214, ⟨10.1007/978-3-030-56223-6_11⟩
Conference papers
hal-03657233v1
|
||
|
The Impact of Instant Messaging Tools on Knowledge Management and Team Performance1st Working Conference Researching the Future (Future-IS), Jun 2011, Turku, Finland. pp.131-148, ⟨10.1007/978-3-642-21364-9_9⟩
Conference papers
hal-01567987v1
|
||
|
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.146-153, ⟨10.1007/978-3-319-41354-9_11⟩
Conference papers
hal-01438341v1
|
||
|
Acceptance of Tools for Electronic Citizen Participation11th International Conference on Electronic Participation (ePart), Sep 2019, San Benedetto Del Tronto, Italy. pp.35-46, ⟨10.1007/978-3-030-27397-2_4⟩
Conference papers
hal-02446022v1
|
||
|
A Business Continuity Management Simulator25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.9-18, ⟨10.1007/978-3-642-15257-3_2⟩
Conference papers
hal-01054559v1
|
||
|
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.61-76, ⟨10.1007/978-3-662-43813-8_5⟩
Conference papers
hal-01381679v1
|