Filter your results
- 11
- 11
- 11
- 1
- 3
- 1
- 1
- 2
- 1
- 2
- 11
- 1
- 1
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Deciphering Text from Touchscreen Key Taps30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers
hal-01633681v1
|
||
|
Toward Mining of Temporal Roles27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers
hal-01490718v1
|
||
|
Towards User-Oriented RBAC Model27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers
hal-01490719v1
|
||
|
Evaluating the Privacy Implications of Frequent Itemset Disclosure32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.506-519, ⟨10.1007/978-3-319-58469-0_34⟩
Conference papers
hal-01649007v1
|
||
|
Secure and Efficient k-NN Queries32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.155-170, ⟨10.1007/978-3-319-58469-0_11⟩
Conference papers
hal-01649018v1
|
||
|
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.169-178, ⟨10.1007/978-3-642-30955-7_15⟩
Conference papers
hal-01534305v1
|
||
|
“Please Connect Me to a Specialist”: Scrutinising ‘Recipient Design’ in Interaction with an Artificial Conversational Agent18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.155-176, ⟨10.1007/978-3-030-85610-6_10⟩
Conference papers
hal-04215505v1
|
||
|
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.281-295, ⟨10.1007/978-3-319-58469-0_19⟩
Conference papers
hal-01649012v1
|
||
|
Enhancing the Security of Image CAPTCHAs Through Noise Addition30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.354-368, ⟨10.1007/978-3-319-18467-8_24⟩
Conference papers
hal-01345127v1
|
||
|
Efficient Distributed Linear Programming with Limited Disclosure23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers
hal-01586592v1
|
||
|
An Optimization Model for the Extended Role Mining Problem23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers
hal-01586595v1
|