1 - 63 of 63
Title Published in Access level OA Policy Year Views Downloads
Enabling compliant and inclusive financial services using a rule-languageInternational journal of applied cryptography
accessLevelPublic
2025 44 19
Editorial: Augmenting human experience and performance through interaction technologiesFrontiers in psychology
accessLevelPublic
2024 46 131
NFT Trust SurveyProceedings of ACM SAC Conference (SAC’23)
accessLevelPublic
2023 367 424
Blockchain and Signed NFT as key technologies for the metaverse interoperability2nd UN ITU Forum on "Creating a metaverse for all through international standards”
accessLevelPublic
2023 80 71
A Rule-Language Tailored for Financial Inclusion and KYC/AML Compliance20th Annual International Conference on Privacy, Security and Trust (PST)
accessLevelRestricted
2023 59 0
How should metaverse augment humans with disabilities?13th Augmented Human International Conference Proceedings
accessLevelPublic
2022 812 979
Towards a decentralized social trust solution to proof-of-addressProceedings of the 37th Symposium on Applied Computing
accessLevelPublic
2022 240 130
Using decentralized social trust as an alternative way to prove someone’s addressProceedings of the 2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)
accessLevelPublic
2022 133 256
Recognition system for behavior & activities of daily living among patients with dementia using smart algorithms and assistive technologyProceedings of the 13th Augmented Human International Conference
accessLevelPublic
2022 194 242
Enabling KYC and AML verification in DeFi serviceCVA Research Journal
accessLevelPublic
2022 265 1,381
A Survey of KYC/AML for Cryptocurrencies TransactionsHandbook of research on cyber crime and information privacy
accessLevelPublic
2021 980 3,741
The role of technology in senior co-caregiving support: a scoping review of senior care mobile applications
accessLevelPublic
2021 146 153
Stablecoin DC Architecture Analysis (2021 version)
accessLevelPublic
2021 515 971
Biomechanics of Trail Running Performance: Quantification of Spatio-Temporal Parameters by Using Low Cost Sensors in Ecological ConditionsApplied sciences
accessLevelPublic
2021 357 340
Central Bank Digital Currencies and a Euro for the Future
accessLevelPublic
2021 239 60
Body chain: using blockchain to reach augmented body health state consensus
accessLevelPublic
2020 212 146
Blockchain real estate relational value surveySAC '20: Proceedings of the 35th Annual ACM Symposium on Applied Computing
accessLevelPublic
2020 304 306
Hardware TOTP tokens with time synchronization2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)
accessLevelPublic
2019 439 907
Towards a Standard to Assess Blockchain & Other DLT Platforms
accessLevelPublic
2019 1,014 571
Physical presence verification using TOTP and QR codes34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019
accessLevelPublic
2019 563 558
Proceedings of the 10th Augmented Human International Conference 2019
2019 613 260
CalvinIA, Territorial AI, et autres technologies impactant le tourisme à GenèveEtats Généraux du Tourisme de la République et Canton de Genève
accessLevelPublic
2018 580 226
A survey on trust in augmented human technologiesProceedings of the 1st International Conference on Human Systems Engineering and Design: Future Trends and Applications (IHSED)
accessLevelPublic
2018 842 345
Towards Geneva Crypto-Friendly Smart TourismEtats Généraux du Tourisme
accessLevelPublic
2018 1,133 761
Proceedings of the 9th Augmented Human International Conference
2018 496 767
Distributed Ledger Technologies (Blockchain) Ecosystem and DecentralizationITU Asia-Pacific Centre of Excellence Bangkok 2018 DLT Training
accessLevelPublic
2018 515 734
Enhancing RADIUS based multifactor-factor authentication systems with RESTful API for self-service enrolment2017 IEEE 11th International Conference on Application of Information and Communication Technologies (AICT)
accessLevelPublic
2017 944 619
Du classement des smart cities aux smart ski resortsSalon du Facility Management et des Services aux entreprises
accessLevelPublic
2017 480 169
Design and validation of a trust-based opportunity-enabled risk management systemInformation & computer security
accessLevelRestricted
2017 1,433 5
Proceedings of the 8th Augmented Human International Conference
2017 659 852
Use case of linking a managed basket of fiat currencies to crypto-tokensFirst Meeting of the ITU Focus Group on Digital Currency including Digital Fiat Currency
accessLevelPublic
2017 2,556 648
Wi-Trust: Computational Trust and Reputation Management for Stronger Hotspot 2.0 SecurityJournal of ICT standardisation
accessLevelPublic
2017 1,626 413
Numerical investigation of the early flight phase in ski-jumpingJournal of biomechanics
accessLevelRestricted
2017 558 0
On the Road to Privacy- and Data Protection-Friendly Security Technologies in the Workplace – A Case-Study of the MUSES Risk and Trust Analysis EngineData Protection and Privacy: (In)visibilities and Infrastructures
accessLevelRestricted
2017 1,442 1
Proceedings of the 7th Augmented Human International Conference
2016 540 2,013
Beacon Authpath: Augmented Human Path AuthenticationProceedings of the 2016 International Conference on Computational Science and Computational Intelligence
accessLevelPublic
2016 634 902
From Weak Online Reputation Metrics to Standardized Attack-Resistant Trust MetricsITU Workshop on "Future Trust and Knowledge Infrastructure" Phase 2
accessLevelPublic
2016 553 121
Smart Cities Online Reputation Quantitative SurveySmart City Expo World Congress
accessLevelPublic
2016 942 430
Electrosmog Visualization through Augmented Blurry VisionProceedings of the 7th Augmented Human International Conference
accessLevelPublic
2016 781 451
Augmented Winter Ski with AR HMDProceedings of the 7th Augmented Human International Conference
accessLevelPublic
2016 814 679
MUSES RT2AE V P/DP: On the Road to Privacy-Friendly Security Technologies in the Workplacethe 9th Computer, Privacy & Data Protection International Conference
accessLevelPublic
2016 740 264
OPPRIM: Opportunity-Enabled Risk Management for Trust and Risk-Aware Asset Access Decision-Making
accessLevelPublic
2015 1,139 304
WifiOTP: Pervasive Two-Factor Authentication Using Wi-Fi SSID BroadcastsKaleidoscope International Conference
accessLevelPublic
2015 840 1,173
Formal Modeling and Verification of Opportunity-enabled Risk ManagementTrustcom International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications
accessLevelPublic
2015 673 507
Reconnaissance avec un Moteur de Confiance pour Facilement Configurer la Sécurité d'une Maison Intelligente sans Authentification ForteCLUSIS
accessLevelPublic
2015 562 97
Extending trust management with cooperation incentives: a fully decentralized framework for user-centric network environmentsJournal of trust management
accessLevelPublic
2015 637 333
Wi-Trust: Improving Wi-Fi Hotspots Trustworthiness with Computational Trust ManagementKaleidoscope International Conference
accessLevelPublic
2015 646 516
Case study: legal requirements for the use of social login features for online reputation updatesProceedings of the 29th Annual ACM Symposium on Applied Computing
accessLevelPublic
2014 885 408
Extending Trust Management with Cooperation Incentives: Achieving Collaborative Wi-Fi Sharing Using Trust Transfer to Stimulate Cooperative BehavioursTrust Management VIII: 8th IFIP WG 11.11 International Conference - IFIPTM 2014
accessLevelRestricted
2014 685 0
Collaborative Wireless Access to Mitigate Roaming CostsThe 10th International Conference on Networking and Services
accessLevelPublic
2014 611 428
Swiss Innovation Online Reputation Case StudyInternational Conference on Information Society (i-Society), 2014
accessLevelRestricted
2014 659 6
On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based NetworksTrust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014
accessLevelRestricted
2014 595 0
Les MOOCs, la bataille de l'e-réputation contre les formations universitaires ?Le numérique pour enseigner autrement
accessLevelPublic
2014 521 354
Online e-Reputation Management Services SurveyComputer and Information Security Handbook
accessLevelPublic
2013 1,145 599
A Survey of Trust and Risk Metrics for a BYOD Mobile Worker World : Third International Conference on Social Eco-InformaticsSOTICS 2013 The Third International Conference on Social Eco-Informatics
accessLevelPublic
2013 1,114 837
Secure User-Friendly Wi-Fi Access Point Joining : International Wireless Communications and Networking ConferenceProceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC)
accessLevelPublic
2013 796 387
Smart Ski Resort Experiment Final Report
accessLevelPublic
2013 456 117
The Emotional Economy for the Augmented HumanAH '11: Proceedings of the 2nd Augmented Human International Conference
accessLevelPublic
2011 773 154
Towards mobile/wearable device electrosmog reduction through careful network selectionAH '10: Proceedings of the 1st Augmented Human International Conference
accessLevelPublic
2010 1,157 381
Mobile Quality of Service
accessLevelPublic
2009 645 1,194
Collaborative Location Aware Mobile Services
accessLevelPublic
2008 755 2,056
Trust and Security in Spatial Messaging: FoxyTag, the Speed Camera Case StudyMobile trust
accessLevelPublic
2007 156 61
OSS Quality Assessment Trustworthiness: working paperMobile trust
accessLevelPublic
2007 140 60
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack