Skip to Main content Skip to Navigation


...
hal-03038560v1  Conference papers
Sébastien CanardAdela GeorgescuGuillaume KaimAdeline Roux-LangloisJacques Traoré. Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model
ProvSec 2020 - the 14th International Conference on Provable and Practical Security, Nov 2020, Singapore / Virtual, Singapore. pp.24-44, ⟨10.1007/978-3-030-62576-4_2⟩
...
hal-01183508v1  Conference papers
Ghada ArfaouiJean-François LalandeSaïd GharoutJacques Traoré. Practical and Privacy-Preserving TEE Migration
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
hal-02165816v1  Conference papers
Maxime BelairSylvie LaniepceJean-Marc Menaud. Container interaction with host OS for enhanced security: a survey
COMPAS 2019 - Conférence d'informatique en Parallélisme, Architecture et Système, Jun 2019, Anglet, France
...
hal-01408584v1  Conference papers
Véronique CortierAlicia FilipiakSaïd GharoutJacques Traoré. Designing and proving an EMV-compliant payment protocol for mobile devices
2nd IEEE European Symposium on Security and Privacy (EuroSP'17), Apr 2017, Paris, France
...
hal-02169298v1  Conference papers
Maxime BelairSylvie LaniepceJean-Marc Menaud. Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey
IWSECC 2019 - 2nd International Workshop on Security Engineering for Cloud Computing, Aug 2019, Canterbury, United Kingdom. pp.1-6, ⟨10.1145/3339252.3340502⟩
...
hal-01154374v1  Conference papers
Sébastien GambsJean-François LalandeJacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
hal-02471031v1  Conference papers
Nicolas DesmoulinsPierre-Alain FouqueCristina OneteOlivier Sanders. Pattern Matching on Encrypted Streams.
ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.121-148
hal-00731368v1  Book sections
Kahina HamadacheLuigi Lancieri. Role-Based Collaboration Extended to Pervasive Computing, (chapter) in Intelligent Networking, Collaborative Systems and Applications
Springer-Verlag. Intelligent Networking, Collaborative Systems and Applications, Springer-Verlag., pp.55-76, 2010, Studies in Computational Intelligence
hal-00982549v1  Conference papers
Julien DevigneEleonora GuerriniFabien Laguillaumie. Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
AFRICACRYPT: Cryptology in Africa, May 2014, Marrakech, Morocco. pp.13-30, ⟨10.1007/978-3-319-06734-6_2⟩
...
hal-01404486v1  Conference papers
Sébastien CanardFabien LaguillaumieMarie Paindavoine. Verifiable Message-Locked Encryption
CANS 2016 - 15th International Conference Cryptology and Network Security, Nov 2016, Milano, Italy. pp.299 - 315, ⟨10.1007/978-3-319-48965-0_18⟩
...
hal-03039850v1  Conference papers
Sébastien CanardAdel HamdiFabien Laguillaumie. Blind Functional Encryption
ICICS 2020 - International Conference on Information and Communications Security, Aug 2020, Copenhagen, Denmark. pp.183-201, ⟨10.1007/978-3-030-61078-4_11⟩
hal-00811644v1  Book sections
Kahina HamadacheLuigi Lancieri. Role-Based Collaboration Extended to Pervasive Computing
Intelligent Networking, Collaborative Systems and Applications, Springer, pp.55-78, 2011, Studies in Computational Intelligence, 978-3-642-16792-8
...
hal-02482253v1  Journal articles
Ghada ArfaouiXavier BultelPierre-Alain FouqueAdina NedelcuCristina Onete. The privacy of the TLS 1.3 protocol
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2019, 2019, pp.190 - 210. ⟨10.2478/popets-2019-0065⟩
...
tel-00841484v1  Theses
Kahina Hamadache. Collaboration intelligente et transparente. Apports de l'informatique ubiquitaire au travail collaboratif assisté par ordinateur.
Informatique ubiquitaire. Université des Sciences et Technologie de Lille - Lille I, 2011. Français
...
hal-01009516v1  Conference papers
Ghada ArfaouiGuillaume DabosvilleSébastien GambsPatrick LacharmeJean-François Lalande. Un pass de transport anonyme et intraçable pour mobile NFC
Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France
...
hal-00875098v1  Conference papers
Ghada ArfaouiSébastien GambsPatrick LacharmeJean-François LalandeLescuyer Roch et al.  A Privacy-Preserving Contactless Transport Service for NFC Smartphones
Fifth International Conference on Mobile Computing, Applications and Services, Nov 2013, Paris, France. pp.282-285, ⟨10.1007/978-3-319-05452-0_24⟩
...
hal-03108231v1  Conference papers
Maxime BelairSylvie LaniepceJean-Marc Menaud. SNAPPY: Programmable Kernel-Level Policies for Containers
SAC 2021 : 36th ACM/SIGAPP Symposium On Applied Computing, Mar 2021, Gwangju / Virtual, South Korea. pp.1-10
...
hal-00523087v1  Conference papers
Jacques SimoninEmmanuel BertinYves Le TraonJean-Marc JézéquelNoel Crespi. Business and information system alignment: a formal solution for telecom services
ICSEA 2010 : The Fifth International Conference on Software Engineering Advances, Aug 2010, Nice, France. pp.278 - 283, ⟨10.1109/ICSEA.2010.49⟩
...
inria-00456508v1  Conference papers
Jacques SimoninYves Le TraonJean-Marc JézéquelBertrand NicolasFrancis Alizon et al.  EA4UP: an Enterprise Architecture-Assisted Telecom Service Development Method
EDOC'08 (Entreprise Distributed Object Computing Conference), 2008, Munchen, Germany, Germany
hal-01471876v1  Conference papers
David PointchevalOlivier SandersJacques Traoré. Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.61-90, ⟨10.1007/978-3-662-54365-8_4⟩