Search - IFIP Open Digital Library Access content directly

Filter your results

26 results
Structure: Internal structure identifier : 32772
Image document

Practice in Reality for Virtual Reality Games: Making Players Familiar and Confident with a Game

Jeffrey Ho
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.147-162, ⟨10.1007/978-3-319-67684-5_10⟩
Conference papers hal-01678506v1
Image document

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

Qiao Hu , Lavinia Mihaela Dinca , Gerhard Hancke
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.219-234, ⟨10.1007/978-3-319-24018-3_14⟩
Conference papers hal-01442545v1
Image document

Special Digital Monies: The Design of Alipay and WeChat Wallet for Mobile Payment Practices in China

Yong Ming Kow , Xinning Gui , Waikuen Cheng
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.136-155, ⟨10.1007/978-3-319-68059-0_9⟩
Conference papers hal-01679828v1
Image document

DupRobo: Interactive Robotic Autocompletion of Physical Block-Based Repetitive Structure

Taizhou Chen , Yi-Shiun Wu , Kening Zhu
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.475-495, ⟨10.1007/978-3-030-29384-0_29⟩
Conference papers hal-02544601v1
Image document

ScaffoMapping: Assisting Concept Mapping for Video Learners

Shan Zhang , Xiaojun Meng , Can Liu , Shengdong Zhao , Vibhor Sehgal , et al.
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.314-328, ⟨10.1007/978-3-030-29384-0_20⟩
Conference papers hal-02544599v1
Image document

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications

Weizhi Meng , Wenjuan Li , Lijun Jiang , Jianying Zhou
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.180-193, ⟨10.1007/978-3-030-22312-0_13⟩
Conference papers hal-03744302v1
Image document

Designing Artifacts for Systems of Information

Richard Baskerville , Robert Davison , Mala Kaul , Louie Wong
5th Working Conference on Information Systems and Organizations (ISO), Dec 2014, Auckland, New Zealand. pp.233-245, ⟨10.1007/978-3-662-45708-5_15⟩
Conference papers hal-01331829v1
Image document

A Panoramic View of 3G Data/Control-Plane Traffic: Mobile Device Perspective

Xiuqiang He , Patrick Lee , Lujia Pan , Cheng He , John Lui
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.318-330, ⟨10.1007/978-3-642-30045-5_24⟩
Conference papers hal-01531132v1
Image document

CPMap: Design of Click-Points Map-Based Graphical Password Authentication

Weizhi Meng , Fei Fei , Lijun Jiang , Zhe Liu , Chunhua Su , et al.
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.18-32, ⟨10.1007/978-3-319-99828-2_2⟩
Conference papers hal-02023732v1
Image document

Facilitating Social Harmony Through ICTs

Robert M. Davison
14th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2017, Yogyakarta, Indonesia. pp.3-9, ⟨10.1007/978-3-319-59111-7_1⟩
Conference papers hal-01650089v1
Image document

An Incident Response Model for Industrial Control System Forensics Based on Historical Events

Ken Yau , Kam-Pui Chow , Siu-Ming Yiu
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.311-328, ⟨10.1007/978-3-030-34647-8_16⟩
Conference papers hal-03364562v1

Human Choice and Digital by Default: Autonomy vs Digital Determination

David Kreps , Robert Davison , Taro Komukai , Kaori Ishii
Springer International Publishing, AICT-656, 2022, IFIP Advances in Information and Communication Technology, 978-3-031-15687-8. ⟨10.1007/978-3-031-15688-5⟩
Books hal-04395457v1

Information Security Theory and Practice

Gerhard P. Hancke , Ernesto Damiani
Springer International Publishing, LNCS-10741, 2018, Lecture Notes in Computer Science, 978-3-319-93523-2. ⟨10.1007/978-3-319-93524-9⟩
Books hal-01875516v1
Image document

Digital Equity, Sustainable Development and the ICT Professional

Leon Strous , Robert M. Davison , Gabriela Marín-Raventós
Leon Strous; Roger Johnson; David Alan Grier; Doron Swade. Unimagined Futures – ICT Opportunities and Challenges :, AICT-555, Springer International Publishing, pp.220-231, 2020, IFIP Advances in Information and Communication Technology, 978-3-030-64245-7. ⟨10.1007/978-3-030-64246-4_17⟩
Book sections hal-03194547v1
Image document

Evolving a Secure Internet

William J. Caelli , Lam-For Kwok , Dennis Longley
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.42-54, ⟨10.1007/978-3-642-39218-4_4⟩
Conference papers hal-01463845v1
Image document

Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones

Yuxin Meng , Wenjuan Li , Lam-For Kwok
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.55-68, ⟨10.1007/978-3-642-39218-4_5⟩
Conference papers hal-01463846v1
Image document

Defining Attack Patterns for Industrial Control Systems

Raymond Chan , Kam-Pui Chow , Chun-Fai Chan
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.289-309, ⟨10.1007/978-3-030-34647-8_15⟩
Conference papers hal-03364574v1

Advances in Digital Forensics VI

Kam-Pui Chow , Sujeet Shenoi
Springer, IFIP Advances in Information and Communication Technology (AICT-337), 2010, 978-3-642-15505-5. ⟨10.1007/978-3-642-15506-2⟩
Books hal-01549682v1
Image document

Maximizing Lifetime of Connected-Dominating-Set in Cognitive Radio Networks

Zhiyong Lin , Hai Liu , Xiaowen Chu , Yiu-Wing Leung , Ivan Stojmenovic
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.316-330, ⟨10.1007/978-3-642-30054-7_25⟩
Conference papers hal-01531957v1
Image document

Additive Voronoi Cursor: Dynamic Effective Areas Using Additively Weighted Voronoi Diagrams

Jacky Kit Cheung , Oscar Kin-Chung Au , Kening Zhu
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.273-292, ⟨10.1007/978-3-030-29387-1_16⟩
Conference papers hal-02553875v1
Image document

Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition

Wencan Wu , Kam-Pui Chow , Yonghao Mai , Jun Zhang
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.203-214, ⟨10.1007/978-3-030-56223-6_11⟩
Conference papers hal-03657233v1
Image document

The Impact of Instant Messaging Tools on Knowledge Management and Team Performance

Carol Ou , Darren Leung , Robert M. Davison
1st Working Conference Researching the Future (Future-IS), Jun 2011, Turku, Finland. pp.131-148, ⟨10.1007/978-3-642-21364-9_9⟩
Conference papers hal-01567987v1
Image document

Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation

Wenjuan Li , Lijun Jiang , Weizhi Meng , Lam-For Kwok
10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.146-153, ⟨10.1007/978-3-319-41354-9_11⟩
Conference papers hal-01438341v1
Image document

Acceptance of Tools for Electronic Citizen Participation

Michael Sachs , Judith Schossböck
11th International Conference on Electronic Participation (ePart), Sep 2019, San Benedetto Del Tronto, Italy. pp.35-46, ⟨10.1007/978-3-030-27397-2_4⟩
Conference papers hal-02446022v1
Image document

A Business Continuity Management Simulator

W. J. Caelli , L. F. Kwok , D. Longley
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.9-18, ⟨10.1007/978-3-642-15257-3_2⟩
Conference papers hal-01054559v1
Image document

Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks

Wenjuan Li , Weizhi Meng , Lam-For Kwok
8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.61-76, ⟨10.1007/978-3-662-43813-8_5⟩
Conference papers hal-01381679v1