Filter your results
- 6
- 6
- 6
- 1
- 1
- 1
- 1
- 2
- 1
- 6
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Security Analysis of Mobile Edge Computing in Virtualized Small Cell Networks12th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2016, Thessaloniki, Greece. pp.653-665, ⟨10.1007/978-3-319-44944-9_58⟩
Conference papers
hal-01557614v1
|
||
|
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.116-127, ⟨10.1007/978-3-642-21040-2_8⟩
Conference papers
hal-01573301v1
|
||
|
Effects of Touch Screen Response Time on Psychological State and Task Performance13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.507-510, ⟨10.1007/978-3-642-23768-3_69⟩
Conference papers
hal-01596934v1
|
||
|
A Very Compact Hardware Implementation of the KASUMI Block Cipher4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.293-307, ⟨10.1007/978-3-642-12368-9_23⟩
Conference papers
hal-01056077v1
|
||
|
The Bonsai Hypothesis: An Efficient Network Pruning Technique18th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2022, Hersonissos, Greece. pp.229-241, ⟨10.1007/978-3-031-08333-4_19⟩
Conference papers
hal-04317167v1
|
||
|
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.55-74
Conference papers
hal-01506566v1
|