Skip to Main content Skip to Navigation

Search by documents



...
hal-00845780v1  Conference papers
Annie BlandinMaryline BoizardSébastien GambsGuillaume Piolle. Le droit à l'oubli : Présentation du projet DAO
4ème Atelier sur la Protection de la Vie Privée (APVP'13), Jun 2013, Les Loges en Josas, France
...
hal-00840338v1  Conference papers
Christophe HauserFrédéric TronelColin FidgeLudovic Mé. Intrusion detection in distributed systems, an approach based on taint marking
IEEE ICC2013 - IEEE International Conference on Communications, Jun 2013, Budapest, Hungary
...
hal-00831401v1  Conference papers
Ehab ElsalamounyVladimiro Sassone. An HMM-based reputation model
Advances in Security of Information and Communication Networks, Sep 2013, Cairo, Egypt. pp.111-121, ⟨10.1007/978-3-642-40597-6_9⟩
hal-00875211v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Diagnosing intrusions in Android operating system using system flow graph
Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2013, Troyes, France
...
hal-00926485v1  Journal articles
Emmanuelle AnceaumeYann BusnelSébastien Gambs. On the Power of the Adversary to Solve the Node Sampling Problem
Transactions on Large-Scale Data- and Knowledge-Centered Systems, Springer Berlin / Heidelberg, 2013, 8290, pp.102-126. ⟨10.1007/978-3-642-45269-7_5⟩
...
hal-00818650v1  Conference papers
Emmanuelle AnceaumeErwan Le MerrerRomaric LudinardBruno SericolaGilles Straub. FixMe : détection répartie de défaillances isolées
15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), May 2013, Pornic, France. pp.1-4
...
hal-00997133v1  Book sections
Emmanuelle AnceaumeGilles GuettePaul Lajoie-MazencThomas SirventValérie Viet Triem Tong. Extending Signatures of Reputation
Hansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_13⟩
...
hal-00985631v1  Conference papers
Emmanuelle AnceaumeYann BusnelBruno Sericola. Service d'échantillonage uniforme résiliant aux comportments malveillants
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, France. pp.1--4
...
hal-01076918v1  Conference papers
Pierre MeyePhilippe RaipinFrédéric TronelEmmanuelle Anceaume. A secure two-phase data deduplication scheme
6th International Symposium on Cyberspace Safety and Security (CSS), Aug 2014, Paris, France
hal-01090053v1  Conference papers
Caroline FontaineSébastien GambsJulien LoliveCristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes
Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil
...
hal-00924051v1  Conference papers
Pierre MeyePhilippe Raïpin-ParvédyFrédéric TronelEmmanuelle Anceaume. Toward a distributed storage system leveraging the DSL infrastructure of an ISP
11th IEEE Consumer Communications and Networking Conference, Jan 2014, United States. pp.2
...
hal-01011346v1  Conference papers
Raghavendran BaluTeddy FuronSébastien Gambs. Challenging differential privacy: the case of non-interactive mechanisms
European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. ⟨10.1007/978-3-319-11212-1_9⟩
hal-00909406v1  Conference papers
Radoniaina AndriatsimandefitraThomas SaliouValérie Viet Triem Tong. Information Flow Policies vs Malware
IAS - Information assurance and security - 2013, 2013, Yassmine Hammamet, Tunisia
...
hal-01091327v1  Conference papers
E GodefroyEric TotelM HurfinF MajorczykA Maaroufi. Automatiser la construction de règles de corrélation : prérequis et processus
C&ESAR 2014 - Détection et réaction face aux attaques informatiques, Nov 2014, Rennes, France. pp.9
...
hal-01094051v1  Conference papers
Pierre-Alain FouqueAntoine JouxChrysanthi Mavromati. Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE (Full version * )
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Palash Sarkar, Tetsu Iwata, Dec 2014, Kaoshiung, Taiwan. pp.20
...
hal-01088441v1  Conference papers
Antoine GuellierChristophe BidanNicolas Prigent. Homomorphic Cryptography-based Privacy-Preserving Network Communications
Applications and Techniques in Information Security, Batten, Lynn and Li, Gang and Niu, Wenjia and Warren, Matthew, Nov 2014, Deakin University, Melbourne, VIC, Australia, France. pp.159-170, ⟨10.1007/978-3-662-45670-5_15⟩
...
hal-00926685v1  Conference papers
Emmanuelle AnceaumeYann Busnel. Sketch *-metric: Comparing Data Streams via Sketching
12th IEEE International Symposium on Network Computing and Applications (IEEE NCA 2013), Aug 2013, Boston, United States. pp.11, ⟨10.1109/NCA.2013.11⟩
...
hal-01059201v1  Conference papers
Jean-François LalandeKarine HeydemannPascal Berthomé. Software countermeasures for control flow integrity of smart card C codes
ESORICS - 19th European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. pp.200-218, ⟨10.1007/978-3-319-11212-1_12⟩
...
hal-00909293v1  Conference papers
Mounir AssafJulien SignolesFrédéric TronelEric Totel. Moniteur hybride de flux d'information pour un langage supportant des pointeurs
SARSSI - 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Sep 2013, Mont de Marsan, France
...
hal-01076907v1  Conference papers
Pierre MeyePhilippe RaipinFrédéric TronelEmmanuelle Anceaume. Mistore: A distributed storage system leveraging the DSL infrastructure of an ISP
International Conference on High Performance Computing & Simulation, HPCS 2014, Jul 2014, Bologne, Italy. pp.260 - 267, ⟨10.1109/HPCSim.2014.6903694⟩
...
hal-00985641v1  Conference papers
Romaric LudinardEmmanuelle AnceaumeYann BusnelErwan Le MerrerJean-Louis Marchand et al.  Anomaly Characterization Problems
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, Le-Bois-Plage-en-Ré, France. pp.1--4
hal-00777430v1  Conference papers
Guillaume Piolle. La vie privée sur Internet, une question de confiance ?
Journée Web et Confiance, Jan 2013, Lyon, France
...
hal-01018611v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph
NSS 2014 - The 8th International Conference on Network and System Security, Oct 2014, Xi'an, China. ⟨10.1007/978-3-319-11698-3_43⟩