Filter your results
- 18
- 1
- 17
- 1
- 1
- 19
- 4
- 1
- 2
- 1
- 2
- 3
- 2
- 1
- 2
- 4
- 1
- 19
- 1
- 1
- 1
- 1
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
On Detecting Abrupt Changes in Network Entropy Time Series12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.194-205, ⟨10.1007/978-3-642-24712-5_18⟩
Conference papers
hal-01596209v1
|
||
|
Finding the Right Way for Interrupting People Improving Their Sitting Posture13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.1-17, ⟨10.1007/978-3-642-23771-3_1⟩
Conference papers
hal-01590847v1
|
||
|
A Formal Equivalence Classes Based Method for Security Policy Conformance CheckingInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.146-160, ⟨10.1007/978-3-642-32498-7_12⟩
Conference papers
hal-01542451v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-6109, 2010, Lecture Notes in Computer Science, 978-3-642-13240-7. ⟨10.1007/978-3-642-13241-4⟩
Books
hal-01555320v1
|
||
|
Eye Contact: Gaze as a Connector Between Spectators and Players in Online Games16th International Conference on Entertainment Computing (ICEC), Sep 2017, Tsukuba City, Japan. pp.310-321, ⟨10.1007/978-3-319-66715-7_34⟩
Conference papers
hal-01771291v1
|
||
|
GPU-Assisted AES Encryption Using GCM12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.178-185, ⟨10.1007/978-3-642-24712-5_16⟩
Conference papers
hal-01596207v1
|
||
|
Mindtraining: Playful Interaction Techniques for People with Dementia15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.223-228, ⟨10.1007/978-3-319-46100-7_21⟩
Conference papers
hal-01640286v1
|
||
|
Scenario-Based Requirements Elicitation for User-Centric Explainable AI4th International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2020, Dublin, Ireland. pp.321-341, ⟨10.1007/978-3-030-57321-8_18⟩
Conference papers
hal-03414721v1
|
||
|
Risk Analysis of Physically Unclonable Functions15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.136-139, ⟨10.1007/978-3-662-44885-4_12⟩
Conference papers
hal-01404204v1
|
||
|
WeldVUI: Establishing Speech-Based Interfaces in Industrial Applications17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.679-698, ⟨10.1007/978-3-030-29387-1_40⟩
Conference papers
hal-02553926v1
|
||
|
Vancouver Maneuver: Designing a Cooperative Augmented Reality Board Game15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.286-289, ⟨10.1007/978-3-319-46100-7_31⟩
Conference papers
hal-01640283v1
|
||
|
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.201-203, ⟨10.1007/978-3-642-32805-3_19⟩
Conference papers
hal-01540899v1
|
||
|
Systematic Integration of Solution Elements: How Does Digital Creativity Support Change Group Dynamics?14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.547-565, ⟨10.1007/978-3-642-40483-2_39⟩
Conference papers
hal-01497461v1
|
||
|
Using Ontologies to Express Prior Knowledge for Genetic Programming3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.362-376, ⟨10.1007/978-3-030-29726-8_23⟩
Conference papers
hal-02520033v1
|
||
|
EyeCo: Effects of Shared Gaze on Social Presence in an Online Cooperative Game15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.102-114, ⟨10.1007/978-3-319-46100-7_9⟩
Conference papers
hal-01640281v1
|
||
|
Real-World Identification for an Extensible and Privacy-Preserving Mobile eIDMarit Hansen; Eleni Kosta; Igor Nai-Fovino; Simone Fischer-Hübner. Privacy and Identity Management. The Smart Revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, AICT-526, Springer International Publishing, pp.354-370, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-92924-8. ⟨10.1007/978-3-319-92925-5_24⟩
Book sections
hal-01883623v1
|
||
|
A Security Policy Model for Agent Based Service-Oriented Architectures1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.13-25, ⟨10.1007/978-3-642-23300-5_2⟩
Conference papers
hal-01590399v1
|
||
|
Protection Profile for PUF-Based Devices29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.91-98, ⟨10.1007/978-3-642-55415-5_8⟩
Conference papers
hal-01370357v1
|
||
|
Improving Language-Dependent Named Entity Detection1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.330-345, ⟨10.1007/978-3-319-66808-6_22⟩
Conference papers
hal-01677147v1
|