Skip to Main content Skip to Navigation


inria-00504558v1  Conference papers
Imed {hadj Kacem}Noura SellamiInbar FijalkowAline Roumy. {Training interval length optimization for MIMO flat fading channels using decision-directed channel estimation}
IEEE International Conference on Wireless and Mobile Computing (WiMob'09), 2009, Casablanca, Macau SAR China
inria-00504557v1  Conference papers
Imed {hadj Kacem}Noura SellamiInbar FijalkowAline Roumy. {Joint training interval length and power allocation optimization for MIMO flat fading channels}
IEEE International Symposium on Wireless Communication Systems 2009 (ISWCS'09), 2009, Sienna, Italy
inria-00504559v1  Conference papers
Imed {hadj Kacem}Noura SellamiAline RoumyInbar Fijalkow. {Training sequence optimization for frequency selective channels with MAP equalization}
Proc. of IEEE International Symposium on Communications, Control and Signal Processing ISCCSP, 2008, La Valette, Malta. pp.532-537
inria-00638559v1  Book sections
Gabriel A. WainerKhaldoon Al-ZoubiOlivier DalleSaurabh MittalJosé L. Risco Martin et al.  Chapter 18: Standardizing DEVS Simulation Middleware
Wainer, G. and Mosterman, P. Discrete-Event Modeling and Simulation: Theory and Applications, CRC press, pp.459--494, 2011, 978-1-4200-7233-4
inria-00638560v1  Book sections
Gabriel A. WainerKhaldoon Al-ZoubiOlivier DalleSaurabh MittalJosé Luis Risco Martin et al.  Chapter 17: Standardizing DEVS model representation
Wainer, G. and Mosterman, P. Discrete-Event Modeling and Simulation: Theory and Applications, CRC press, pp.427--458, 2011, 978-1-4200-7233-4
hal-01094867v1  Journal articles
Mridul AanjaneyaFrédéric ChazalDaniel ChenMarc GlisseLeonidas J. Guibas et al.  Metric Graph Reconstruction From Noisy Data
International Journal of Computational Geometry and Applications, World Scientific Publishing, 2012, 22 (4), pp.305-325. ⟨10.1142/S0218195912600072⟩
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
inria-00537591v1  Conference papers
Alexandre AbadieRomain CarpentierPierre HellierPierre JanninJean-Yves Gauvrit et al.  Une plateforme logicielle de neurochirurgie assistée par l'image
Congrès de la Société de Neurochirurgie de Langue Française, Dec 2010, Paris, France. ⟨10.1016/j.neuchi.2010.10.019⟩
inria-00578884v1  Conference papers
Ryma AbassiFlorent JacquemardMichaël RusinowitchSihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas
Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
hal-01949202v1  Conference papers
Carmine AbateArthur Azevedo de AmorimRoberto BlancoAna Nora EvansGuglielmo Fachini et al.  When Good Components Go Bad
25th ACM Conference on Computer and Communications Security (CCS), Oct 2018, Toronto, Canada. pp.1351--1368, ⟨10.1145/3243734.3243745⟩
hal-02398915v1  Conference papers
Carmine AbateRoberto BlancoDeepak GargCătălin HriţcuMarco Patrignani et al.  Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
CSF 2019 - 32nd IEEE Computer Security Foundations Symposium, Jun 2019, Hoboken, United States. pp.256-271, ⟨10.1109/CSF.2019.00025⟩
hal-01662076v1  Directions of work or proceedings
Alessandro AbateSylvie Boldo. 10th International Workshop on Numerical Software Verification
10th International Workshop on Numerical Software Verification, France. Springer, 2017
hal-02568304v1  Conference papers
Hernan AbaunzaPedro Castillo GarciaDidier TheilliolAdel BelkadiLaurent Ciarletta. Cylindrical bounded quaternion control for tracking and surrounding a ground target using UAVs
21st International Federation of Automatic Control World Congress (IFAC WC 2020), Jul 2020, Berlin, Germany
hal-00663467v1  Conference papers
Katia AbbaciFernando LemosAllel HadjaliDaniela GrigoriLudovic Liétard et al.  Selecting and Ranking Business Processes with Preferences: An Approach Based on Fuzzy Sets
On the Move to Meaningful Internet Systems: OTM 2011, Oct 2011, Hersonissos, Greece. pp.38-55, ⟨10.1007/978-3-642-25109-2_4⟩
hal-00663438v1  Conference papers
Katia AbbaciFernando LemosAllel HadjaliDaniela GrigoriLudovic Liétard et al.  An Approach Based on Fuzzy Sets to Selecting and Ranking Business Processes
IEEE 13th Conference on Commerce and Enterprise, Sep 2011, Luxembourg, Luxembourg. pp.213-218
hal-00664237v1  Conference papers
Katia AbbaciMokrane BouzeghoubDaniela GrigoriAllel HadjaliFernando Lemos et al.  A Fuzzy Set Approach to Handle Preferences in Service Retrieval
27èmes journées Bases de Données Avancées, BDA 2011, Oct 2011, Rabat, Morocco
hal-00784059v1  Journal articles
Th. AbballeGrégoire AllaireE. LaucoinPh. Montarnal. Application of a coupled FV/FE multiscale method to cement media
Networks and Heterogeneous Media, AIMS-American Institute of Mathematical Sciences, 2010, 5 (3), pp.603-615
inria-00554191v1  Conference papers
Naeem AbbasSteven DerrienPatrice QuintonSanjay Rajopadhye. Accelerating HMMER on FPGA using Parallel Prefixes and Reductions
Proc. of the IEEE International Conference on Field-Programmable Technology (FPT'10), Dec 2010, Beijing, China, China. x-proceedings = yes, x-international-audience = yes, x-editorial-board = yes, x-invited-conference
hal-01235328v1  Journal articles
Naeem AbbasSteven DerrienSanjay RajopadhyePatrice QuintonAlexandre Cornu et al.  Combining execution pipelines to improve parallel implementation of HMMER on FPGA
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2015, 39, pp.457-470. ⟨10.1016/j.micpro.2015.06.006⟩
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
hal-00390289v1  Conference papers
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. High Dimensional Pricing of Exotic European Contracts on a GPU Cluster, and Comparison to a CPU Cluster
Second International Workshop on Parallel and Distributed Computing in Finance - PDCoF 2009, May 2009, Rome, Italy. Proceedings on CD-ROM (8 p.), ⟨10.1109/IPDPS.2009.5161143⟩
hal-00773740v1  Journal articles
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
hal-01107836v1  Journal articles
Zeinab AbbassiNidhi HegdeLaurent Massoulié. Distributed Content Curation on the Web
ACM Transactions on Internet Technology, Association for Computing Machinery, 2014, pp.9. ⟨10.1145/2663489⟩
inria-00528201v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection
International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
inria-00329730v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. An inference system for detecting firewall filtering rules anomalies
23rd Annual ACM Symposium on Applied Computing - SAC'08, 2008, Fortaleza, Brazil. pp.2122-2128
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
hal-00350939v1  Conference papers
Samy AbbesAlbert BenvenisteStefan Haar. A Petri net model for distributed estimation
Sixteenth International Symposium on Mathematical Theory of Networks and Systems, 2004, Louvain, Belgium. pp.ISBN 90-5682-517-8
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
inria-00099116v1  Conference papers
John AbbottVictor ShoupPaul Zimmermann. Factorization in Z[x]: the searching phase
International Symposium on Symbolic and Algebraic Computation - ISSAC 2000, Aug 2000, St Andrews/United Kingdom, pp.1--7
hal-01667150v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. On the Tightness of Forward-Secure Signature Reductions
[Research Report] Report 2017/746, IACR Cryptology ePrint Archive. 2017
hal-01385178v1  Journal articles
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Public-key encryption indistinguishable under plaintext-checkable attacks
IET Information Security, Institution of Engineering and Technology, 2016, 10 (6), pp.288-303. ⟨10.1049/iet-ifs.2015.0500⟩
hal-01380735v1  Reports
Michel AbdallaRomain GayMariana RaykovaHoeteck Wee. Multi-Input Inner-Product Functional Encryption from Pairings
[Technical Report] Cryptology ePrint Archive: Report 2016/425, IACR. 2016
hal-00918539v1  Journal articles
Michel AbdallaEike KiltzGregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption
IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
hal-00915711v1  Directions of work or proceedings
Michel AbdallaCristina Nita-RotaruRicardo Dahab. CANS 2013
Michel Abdalla and Cristina Nita-Rotaru and Ricardo Dahab. 8257, Springer, pp.349, 2013, Lecture Notes in Computer Science, 978-3-319-02936-8. ⟨10.1007/978-3-319-02937-5⟩
hal-02135871v1  Conference papers
Michel AbdallaFabrice BenhamoudaMarkulf KohlweissHendrik Waldner. Decentralizing Inner-Product Functional Encryption
Public-Key Cryptography – PKC 2019, Apr 2019, Beijing, China. pp.128-157, ⟨10.1007/978-3-030-17259-6_5⟩
hal-02317011v1  Reports
Michel AbdallaFabrice BenhamoudaMarkulf KohlweissHendrik Waldner. Decentralizing Inner-Product Functional Encryption
[Research Report] Report 2019/020, IACR Cryptology ePrint Archive. 2019
hal-02391547v1  Conference papers
Michel AbdallaSara MinerChanathip Namprempre. Forward-Secure Threshold Signature Schemes
Topics in Cryptology - 2001, Apr 2001, San Francisco, United States. pp.441-456, ⟨10.1007/3-540-45353-9_32⟩
hal-02391361v1  Conference papers
Michel AbdallaDavid Pointcheval. A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
Advances in Cryptology - ASIACRYPT 2006, Dec 2006, Shanghai, China. pp.332-347, ⟨10.1007/11935230_22⟩
hal-02391427v1  Conference papers
Michel AbdallaEmmanuel BressonOlivier ChevassutDavid Pointcheval. Password-Based Group Key Exchange in a Constant Number of Rounds
Public Key Cryptography - PKC 2006, Apr 2009, New York, United States. pp.427-442, ⟨10.1007/11745853_28⟩
hal-02391472v1  Conference papers
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
Public Key Cryptography - PKC 2005, Jan 2005, Les Diablerets, Switzerland. pp.65-84, ⟨10.1007/978-3-540-30580-4_6⟩
inria-00539538v1  Directions of work or proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩
hal-01471896v1  Conference papers
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Removing Erasures with Explainable Hash Proof Systems
Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.151-174, ⟨10.1007/978-3-662-54365-8_7⟩
hal-02391456v1  Conference papers
Michel AbdallaDavid Pointcheval. Simple Password-Based Encrypted Key Exchange Protocols
Topics in Cryptology - CT-RSA 2005, Feb 2005, San Francisco, United States. pp.191-208, ⟨10.1007/978-3-540-30574-3_14⟩
hal-02391460v1  Conference papers
Michel AbdallaOlivier ChevassutDavid Pointcheval. One-Time Verifier-Based Encrypted Key Exchange
Public Key Cryptography - PKC 2005, Jan 2005, Les Diablerets, Switzerland. pp.47-64, ⟨10.1007/978-3-540-30580-4_5⟩
hal-02391603v1  Conference papers
Michel AbdallaYuval ShavittAvishai Wool. Towards Making Broadcast Encryption Practical
Financial Cryptography - FC 1999, Feb 1999, Anguilla, Anguilla. pp.140-157, ⟨10.1007/3-540-48390-X_11⟩
hal-02391396v1  Conference papers
Michel AbdallaChanathip NamprempreGregory Neven. On the (Im)possibility of Blind Message Authentication Codes
Topics in Cryptology - CT-RSA 2006, Feb 2006, San Jose, United States. pp.262-279, ⟨10.1007/11605805_17⟩
hal-02391537v1  Conference papers
Michel AbdallaMihir BellarePhillip Rogaway. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
Topics in Cryptology - CT-RSA 2001, Apr 2001, San Francisco, United States. pp.143-158, ⟨10.1007/3-540-45353-9_12⟩
hal-00870955v1  Conference papers
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. pp.471-488, ⟨10.1007/978-3-642-40349-1_27⟩
hal-01132190v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Schemes
[Technical Report] Cryptology ePrint Archive: Report 2015/196, IACR. 2015
hal-01380699v1  Conference papers
Michel AbdallaMario CornejoAnca NitulescuDavid Pointcheval. Robust Password-Protected Secret Sharing
ESORICS 2016 - 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.61-79, ⟨10.1007/978-3-319-45741-3_4⟩
hal-01380730v1  Reports
Michel AbdallaMario CornejoAnca NitulescuDavid Pointcheval. Robust Password-Protected Secret Sharing
[Technical Report] Cryptology ePrint Archive: Report 2016/123, IACR. 2016
hal-02293208v1  Directions of work or proceedings
Michel AbdallaRicardo Dahab. Public-Key Cryptography – PKC 2018
Michel Abdalla; Ricardo Dahab. Public-Key Cryptography – PKC 2018, Mar 2018, Rio de Janeiro, Brazil. Springer, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-319-76578-5⟩
hal-01380726v1  Reports
Michel AbdallaFlorian BourseAngelo de CaroDavid Pointcheval. Better Security for Functional Encryption for Inner Product Evaluations
[Technical Report] Cryptology ePrint Archive: Report 2016/011, IACR. 2016
hal-02135963v1  Reports
Michel AbdallaFabrice BenhamoudaRomain Gay. From Single-Input to Multi-Client Inner-Product Functional Encryption
[Research Report] Report 2019/487, IACR Cryptology ePrint Archive. 2019
hal-01132195v1  Reports
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
hal-01538113v1  Journal articles
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
Journal of Cryptology, Springer Verlag, 2018, 31 (2), pp.307-350. ⟨10.1007/s00145-017-9258-8⟩
hal-02293219v1  Directions of work or proceedings
Michel AbdallaRicardo Dahab. Public-Key Cryptography – PKC 2018
Michel Abdalla; Ricardo Dahab. Public-Key Cryptography – PKC 2018, Mar 2018, Rio de Janeiro, Brazil. 10770, Springer, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-319-76581-5⟩
hal-01432705v1  Conference papers
Gabriel AbdallaCarlos DamascenoMilena GuessiFlavio OquendoElisa Nakagawa. A Systematic Literature Review on Knowledge Representation Approaches for Systems-of-Systems
9th Brazilian Symposium on Components, Architectures and Reuse Software (SBCARS 2015), Sep 2015, Belo Horizonte, Brazil. pp.70-79, ⟨10.1109/SBCARS.2015.18⟩
hal-00918504v1  Journal articles
Michel AbdallaYuval ShavittAvishai Wool. Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking, IEEE/ACM, 2000, 8 (4), pp.443-454. ⟨10.1109/90.865073⟩
hal-00915803v1  Directions of work or proceedings
Michel AbdallaPaulo S. L. M. Barreto. Progress in Cryptology - LATINCRYPT 2010
Michel Abdalla and Paulo Barreto. 6212, Springer, pp.323, 2010, Lecture Notes in Computer Science, 978-3-642-14711-1. ⟨10.1007/978-3-642-14712-8⟩
hal-00915816v1  Conference papers
Michel AbdallaJill-Jênn Vie. Leakage-Resilient Spatial Encryption
LATINCRYPT 2012, Oct 2012, Santiago, Chile. pp.78-99, ⟨10.1007/978-3-642-33481-8_5⟩