Search results
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Key Exchange > 34-52
Lecture Notes in Computer Science > Universal Acess in Human Computer Interaction. Coping with Diversity > Part IV: Understanding Diversity: Age > 942-949
Lecture Notes in Computer Science > Universal Access in Human-Computer Interaction. Design for All and eInclusion > eInclusion Policy, Good Practice, Legislation and Security Issues > 443-451
Lecture Notes in Computer Science > Human-Computer Interaction. Interaction Design and Usability > Part 2: Usability and Evaluation Methods and Tools > 549-558
IFIP — The International Federation for Information Processing > Future Challenges in Security and Privacy for Academia and Industry > Authentication > 80-91
IFIP — The International Federation for Information Processing > Policies and Research in Identity Management > Policies and Research in Identity Management > 85-99