|
||
---|---|---|
hal-01242268v1
Journal articles
De-anonymization attack on geolocated data Journal of Computer and System Sciences, Elsevier, 2014, 80 (8), pp.1597-1614. ⟨10.1016/j.jcss.2014.04.024⟩ |
||
hal-00761351v1
Journal articles
Spécification et mécanisme de détection de flots d'information illégaux Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (6), pp.713-742. ⟨10.3166/tsi.31.713-742⟩ ![]() |
||
hal-00647170v1
Conference papers
Flow based interpretation of access control: Detection of illegal information flows 7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩ ![]() |
||
hal-01311032v1
Poster communications
HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking Séminaire des doctorantes et doctorants en informatique de la Société Informatique de France, Apr 2016, Paris, France. 2016 |
||
hal-00845780v1
Conference papers
Le droit à l'oubli : Présentation du projet DAO 4ème Atelier sur la Protection de la Vie Privée (APVP'13), Jun 2013, Les Loges en Josas, France |
||
halshs-01223778v1
Reports
Le droit à l'oubli [Rapport de recherche] 11-25, Mission de recherche Droit et Justice. 2015, pp.216 |
||
hal-00606014v1
Conference papers
The Coprelobri project: the logical approach to privacy 2e Atelier Protection de la Vie Privée (APVP 2011), Jun 2011, Sorèze, France |
||
hal-01166402v1
Conference papers
The articulation between the legal and technical means of erasure of data online, from the perspective of the user 6ème Atelier sur la Protection de la Vie Privée (APVP'15), Jun 2015, Mosnes, France |
||
hal-00916690v1
Journal articles
Unreliable Distributed Timing Scrutinizer to Converge toward Decision Conditions Studia Informatica Universalis, Hermann, 2008, 6 (2), pp.23--50 |
||
|
||
hal-00916734v1
Conference papers
PeerCube: an Hypercube-based P2P Overlay Robust against Collusion and Churn IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008, France. pp.12 |
||
hal-00650086v1
Journal articles
Dependability Evaluation of Cluster-based Distributed Systems International Journal of Foundations of Computer Science, World Scientific Publishing, 2011, 22 (5), pp.1123-1142. ⟨10.1142/S0129054111008593⟩ |
||
hal-00650095v1
Conference papers
Modeling and Evaluating Targeted Attacks in Large Scale Dynamic Systems Proceedings of the 41rst 2011 International Conference on Dependable Systems and Networks (DSN), Jun 2011, Hong-Kong, China. pp.12 |
||
hal-00725049v1
Conference papers
Adaptive Strategies for Speeding Up Sequences of Consensus 26th International Conference on Advanced Information Networking and Applications, Mar 2012, Fukuoka, Japan |
||
hal-00606065v1
Conference papers
Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC |
||
hal-01183508v1
Conference papers
Practical and Privacy-Preserving TEE Migration 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩ |
||
hal-01150321v1
Preprints, Working Papers, ...
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing 2015 |
||
hal-01154374v1
Conference papers
ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France |
||
hal-01009516v1
Conference papers
Un pass de transport anonyme et intraçable pour mobile NFC Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France |
||
hal-01091576v1
Journal articles
A Privacy-Preserving NFC Mobile Pass for Transport Systems EAI Endorsed Transactions on Mobile Communications and Applications, ICST, 2014, 14 (5), pp.e4. ⟨10.4108/mca.2.5.e4⟩ ![]() |
||
hal-01192867v1
Journal articles
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2015, 2015 (2), pp.25-45. ⟨10.1515/popets-2015-0019⟩ |
||
hal-00875098v1
Conference papers
A Privacy-Preserving Contactless Transport Service for NFC Smartphones Fifth International Conference on Mobile Computing, Applications and Services, Nov 2013, Paris, France. pp.282-285, ⟨10.1007/978-3-319-05452-0_24⟩ |
||
tel-01184857v1
Theses
From qualitative to quantitative program analysis : permissive enforcement of secure information flow Cryptography and Security [cs.CR]. Université Rennes 1, 2015. English. ⟨NNT : 2015REN1S003⟩ |
||
hal-00761354v1
Conference papers
User Defined Control Flow Policy for Web Service Orchestration C&ESAR 2012, Nov 2012, Rennes, France. pp.NC |
||
hal-01361422v1
Conference papers
SpecCert: Specifying and Verifying Hardware-based Software Enforcement 21st International Symposium on Formal Methods (FM 2016), Nov 2016, Limassol, Cyprus. ⟨10.1007/978-3-319-48989-6_30⟩ |
||
hal-01083544v1
Journal articles
Reliable mobile agents with transactional behaviour International journal of communication networks and distributed systems, Inderscience Publishers, 2014, 13 (1), pp.27. ⟨10.1504/IJCNDS.2014.063977⟩ |
||
hal-00926075v1
Conference papers
Faire face aux cybermenaces : détecter (les attaques) et former (des experts en SSI) 11ème Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2013), Jun 2013, Rennes, France |
||
hal-01344565v1
Conference papers
Preventive Information Flow Control through a Mechanism of Split Addresses 9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩ |
||
hal-00763751v1
Conference papers
Netzob : un outil pour la rétro-conception de protocoles de communication SSTIC 2012, Jun 2012, Rennes, France. pp.43 |
||
hal-00677077v1
Conference papers
AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Ninth European Dependable Computing Conference (EDCC 2012), May 2012, Sibiu, Romania. pp.12 |
||
|