Filter your results
- 4
- 4
- 4
- 1
- 2
- 1
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Where and When Can Open Source Thrive? Towards a Theory of Robust Performance6th International IFIP WG 2.13 Conference on Open Source Systems,(OSS), May 2010, Notre Dame, United States. pp.156-176, ⟨10.1007/978-3-642-13244-5_13⟩
Conference papers
hal-01061360v1
|
||
|
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.501-512, ⟨10.1007/978-3-642-30436-1_41⟩
Conference papers
hal-01518218v1
|
||
|
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.72-86, ⟨10.1007/978-3-642-32805-3_6⟩
Conference papers
hal-01540901v1
|
||
|
A Comparative Study of Pointing Techniques for Eyewear Using a Simulated Pedestrian Environment17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.625-646, ⟨10.31219/osf.io/ktuy4⟩
Conference papers
hal-02272539v1
|