Filter your results
- 21
- 2
- 21
- 2
- 23
- 1
- 1
- 2
- 1
- 1
- 3
- 4
- 4
- 5
- 2
- 23
- 1
- 1
- 1
- 1
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless CommunicationSpringer, LNCS-6633, 2011, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-21040-2⟩
Books
hal-01573289v1
|
||
|
A Secure RFID Ticket System for Public Transport24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.350-357, ⟨10.1007/978-3-642-13739-6_27⟩
Conference papers
hal-01056673v1
|
||
|
Enhanced Dictionary Based Rainbow Table27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.513-524, ⟨10.1007/978-3-642-30436-1_42⟩
Conference papers
hal-01518235v1
|
||
|
Investigating Feedback for Two-Handed Exploration of Digital Maps Without Vision17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.305-324, ⟨10.1007/978-3-030-29381-9_19⟩
Conference papers
hal-02544543v1
|
||
|
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.217-230, ⟨10.1007/978-3-642-22348-8_17⟩
Conference papers
hal-01586582v1
|
||
|
Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.537-542, ⟨10.1007/978-3-642-30436-1_45⟩
Conference papers
hal-01518215v1
|
||
|
On the Design and Evaluation of Nippon Paint Color Visualizer Application – A Case Study16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.372-376, ⟨10.1007/978-3-319-68059-0_33⟩
Conference papers
hal-01679803v1
|
||
|
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.217-230, ⟨10.1007/978-3-642-39218-4_17⟩
Conference papers
hal-01463829v1
|
||
|
Enhancing the Security of On-line Transactions with CAPTCHA Keyboard27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.531-536, ⟨10.1007/978-3-642-30436-1_44⟩
Conference papers
hal-01518212v1
|
||
|
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.72-86, ⟨10.1007/978-3-642-32805-3_6⟩
Conference papers
hal-01540901v1
|
||
|
Towards User-Oriented RBAC Model27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers
hal-01490719v1
|
||
|
Passive Network-Awareness for Dynamic Resource-Constrained Networks11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.106-121, ⟨10.1007/978-3-642-21387-8_9⟩
Conference papers
hal-01583584v1
|
||
|
Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.3-16, ⟨10.1007/978-3-662-44952-3_1⟩
Conference papers
hal-01393754v1
|
||
|
Designing Humour in Human Computer Interaction (HUMIC 2017)16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.527-530
Conference papers
hal-01680339v1
|
||
|
Dynamic Workflow Adjustment with Security Constraints28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers
hal-01284857v1
|
||
|
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.146-153, ⟨10.1007/978-3-319-41354-9_11⟩
Conference papers
hal-01438341v1
|
||
|
Virtual Expansion of Rainbow Tables6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.243-256, ⟨10.1007/978-3-642-15506-2_17⟩
Conference papers
hal-01060622v1
|
||
|
Designing IDA - An Intelligent Driver Assistant for Smart City Parking in Singapore15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.510-513, ⟨10.1007/978-3-319-22723-8_50⟩
Conference papers
hal-01610825v1
|
||
|
Multiplicative Homomorphic E-Auction with Formally Provable Security7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.1-17, ⟨10.1007/978-3-642-38530-8_1⟩
Conference papers
hal-01485930v1
|
||
|
Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.351-360, ⟨10.1007/978-3-642-21040-2_25⟩
Conference papers
hal-01573300v1
|
||
|
Short and Efficient Certificate-Based SignatureInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.167-178, ⟨10.1007/978-3-642-23041-7_17⟩
Conference papers
hal-01587839v1
|
||
|
Sustainable Pseudo-random Number Generator28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.139-147, ⟨10.1007/978-3-642-39218-4_11⟩
Conference papers
hal-01463823v1
|
||
|
Trust Management VIIISpringer, AICT-430, 2014, IFIP Advances in Information and Communication Technology, 978-3-662-43812-1. ⟨10.1007/978-3-662-43813-8⟩
Books
hal-01381694v1
|