Skip to Main content Skip to Navigation


...
hal-01242268v1  Journal articles
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. De-anonymization attack on geolocated data
Journal of Computer and System Sciences, Elsevier, 2014, 80 (8), pp.1597-1614. ⟨10.1016/j.jcss.2014.04.024⟩
hal-00761351v1  Journal articles
Mathieu JaumeValérie Viet Triem TongGuillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (6), pp.713-742. ⟨10.3166/tsi.31.713-742⟩
hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
...
hal-01311032v1  Poster communications
Mounir Nasr AllahGuillaume HietMuhammad Abdul WahabPascal CotretGogniat Guy et al.  HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking
Séminaire des doctorantes et doctorants en informatique de la Société Informatique de France, Apr 2016, Paris, France. 2016
...
hal-00845780v1  Conference papers
Annie BlandinMaryline BoizardSébastien GambsGuillaume Piolle. Le droit à l'oubli : Présentation du projet DAO
4ème Atelier sur la Protection de la Vie Privée (APVP'13), Jun 2013, Les Loges en Josas, France
...
halshs-01223778v1  Reports
Maryline BoizardAnnie BlandinCristina Corgas-BernardGilles Dedessus Le MoustierSébastien Gambs et al.  Le droit à l'oubli
[Rapport de recherche] 11-25, Mission de recherche Droit et Justice. 2015, pp.216
...
hal-00606014v1  Conference papers
Guillaume AucherCatherine Barreau-SaliouGuido BoellaAnnie BlandinSébastien Gambs et al.  The Coprelobri project: the logical approach to privacy
2e Atelier Protection de la Vie Privée (APVP 2011), Jun 2011, Sorèze, France
hal-01166402v1  Conference papers
Gustav MalisAnnie BlandinGuillaume Piolle. The articulation between the legal and technical means of erasure of data online, from the perspective of the user
6ème Atelier sur la Protection de la Vie Privée (APVP'15), Jun 2015, Mosnes, France
...
hal-00916734v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardAina RavoajaFrancisco Brasiliero. PeerCube: an Hypercube-based P2P Overlay Robust against Collusion and Churn
IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008, France. pp.12
...
hal-00650086v1  Journal articles
Emmanuelle AnceaumeFrancisco BrasilieroRomaric LudinardBruno SericolaFrédéric Tronel. Dependability Evaluation of Cluster-based Distributed Systems
International Journal of Foundations of Computer Science, World Scientific Publishing, 2011, 22 (5), pp.1123-1142. ⟨10.1142/S0129054111008593⟩
...
hal-00650095v1  Conference papers
Emmanuelle AnceaumeBruno SericolaRomaric LudinardFrédéric Tronel. Modeling and Evaluating Targeted Attacks in Large Scale Dynamic Systems
Proceedings of the 41rst 2011 International Conference on Dependable Systems and Networks (DSN), Jun 2011, Hong-Kong, China. pp.12
hal-00725049v1  Conference papers
Michel HurfinIzabela Elena MoiseJean-Pierre Le NarzulFrédéric Majorczyk. Adaptive Strategies for Speeding Up Sequences of Consensus
26th International Conference on Advanced Information Networking and Applications, Mar 2012, Fukuoka, Japan
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
...
hal-01183508v1  Conference papers
Ghada ArfaouiJean-François LalandeSaïd GharoutJacques Traoré. Practical and Privacy-Preserving TEE Migration
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
...
hal-01154374v1  Conference papers
Sébastien GambsJean-François LalandeJacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
...
hal-01009516v1  Conference papers
Ghada ArfaouiGuillaume DabosvilleSébastien GambsPatrick LacharmeJean-François Lalande. Un pass de transport anonyme et intraçable pour mobile NFC
Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France
hal-01091576v1  Journal articles
Ghada ArfaouiGuillaume DabosvilleSébastien GambsPatrick LacharmeJean-François Lalande. A Privacy-Preserving NFC Mobile Pass for Transport Systems
EAI Endorsed Transactions on Mobile Communications and Applications, ICST, 2014, 14 (5), pp.e4. ⟨10.4108/mca.2.5.e4⟩
...
hal-00875098v1  Conference papers
Ghada ArfaouiSébastien GambsPatrick LacharmeJean-François LalandeLescuyer Roch et al.  A Privacy-Preserving Contactless Transport Service for NFC Smartphones
Fifth International Conference on Mobile Computing, Applications and Services, Nov 2013, Paris, France. pp.282-285, ⟨10.1007/978-3-319-05452-0_24⟩
hal-01083544v1  Journal articles
Linda ZeghacheNadjib BadacheMichel HurfinIzabela Moise. Reliable mobile agents with transactional behaviour
International journal of communication networks and distributed systems, Inderscience Publishers, 2014, 13 (1), pp.27. ⟨10.1504/IJCNDS.2014.063977⟩
hal-00926075v1  Conference papers
Ludovic Mé. Faire face aux cybermenaces : détecter (les attaques) et former (des experts en SSI)
11ème Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2013), Jun 2013, Rennes, France
hal-01344565v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩
...
hal-00677077v1  Conference papers
Emmanuelle AnceaumeYann BusnelSébastien Gambs. AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence
Ninth European Dependable Computing Conference (EDCC 2012), May 2012, Sibiu, Romania. pp.12