Skip to Main content Skip to Navigation

Search by documents

hal-00845780v1  Conference papers
Annie BlandinMaryline BoizardSébastien GambsGuillaume Piolle. Le droit à l'oubli : Présentation du projet DAO
4ème Atelier sur la Protection de la Vie Privée (APVP'13), Jun 2013, Les Loges en Josas, France
hal-00840338v1  Conference papers
Christophe HauserFrédéric TronelColin FidgeLudovic Mé. Intrusion detection in distributed systems, an approach based on taint marking
IEEE ICC2013 - IEEE International Conference on Communications, Jun 2013, Budapest, Hungary
hal-00831401v1  Conference papers
Ehab ElsalamounyVladimiro Sassone. An HMM-based reputation model
Advances in Security of Information and Communication Networks, Sep 2013, Cairo, Egypt. pp.111-121, ⟨10.1007/978-3-642-40597-6_9⟩
hal-00875211v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Diagnosing intrusions in Android operating system using system flow graph
Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2013, Troyes, France
hal-00926485v1  Journal articles
Emmanuelle AnceaumeYann BusnelSébastien Gambs. On the Power of the Adversary to Solve the Node Sampling Problem
Transactions on Large-Scale Data- and Knowledge-Centered Systems, Springer Berlin / Heidelberg, 2013, 8290, pp.102-126. ⟨10.1007/978-3-642-45269-7_5⟩
hal-00818650v1  Conference papers
Emmanuelle AnceaumeErwan Le MerrerRomaric LudinardBruno SericolaGilles Straub. FixMe : détection répartie de défaillances isolées
15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), May 2013, Pornic, France. pp.1-4
hal-00997133v1  Book sections
Emmanuelle AnceaumeGilles GuettePaul Lajoie-MazencThomas SirventValérie Viet Triem Tong. Extending Signatures of Reputation
Hansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_13⟩
hal-00985631v1  Conference papers
Emmanuelle AnceaumeYann BusnelBruno Sericola. Service d'échantillonage uniforme résiliant aux comportments malveillants
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, France. pp.1--4
hal-01076918v1  Conference papers
Pierre MeyePhilippe RaipinFrédéric TronelEmmanuelle Anceaume. A secure two-phase data deduplication scheme
6th International Symposium on Cyberspace Safety and Security (CSS), Aug 2014, Paris, France
hal-01090053v1  Conference papers
Caroline FontaineSébastien GambsJulien LoliveCristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes
Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil
hal-00924051v1  Conference papers
Pierre MeyePhilippe Raïpin-ParvédyFrédéric TronelEmmanuelle Anceaume. Toward a distributed storage system leveraging the DSL infrastructure of an ISP
11th IEEE Consumer Communications and Networking Conference, Jan 2014, United States. pp.2
hal-01011346v1  Conference papers
Raghavendran BaluTeddy FuronSébastien Gambs. Challenging differential privacy: the case of non-interactive mechanisms
European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. ⟨10.1007/978-3-319-11212-1_9⟩
hal-00909406v1  Conference papers
Radoniaina AndriatsimandefitraThomas SaliouValérie Viet Triem Tong. Information Flow Policies vs Malware
IAS - Information assurance and security - 2013, 2013, Yassmine Hammamet, Tunisia
hal-01091327v1  Conference papers
E GodefroyEric TotelM HurfinF MajorczykA Maaroufi. Automatiser la construction de règles de corrélation : prérequis et processus
C&ESAR 2014 - Détection et réaction face aux attaques informatiques, Nov 2014, Rennes, France. pp.9
hal-01094051v1  Conference papers
Pierre-Alain FouqueAntoine JouxChrysanthi Mavromati. Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE (Full version * )
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Palash Sarkar, Tetsu Iwata, Dec 2014, Kaoshiung, Taiwan. pp.20
hal-01088441v1  Conference papers
Antoine GuellierChristophe BidanNicolas Prigent. Homomorphic Cryptography-based Privacy-Preserving Network Communications
Applications and Techniques in Information Security, Batten, Lynn and Li, Gang and Niu, Wenjia and Warren, Matthew, Nov 2014, Deakin University, Melbourne, VIC, Australia, France. pp.159-170, ⟨10.1007/978-3-662-45670-5_15⟩
hal-00926685v1  Conference papers
Emmanuelle AnceaumeYann Busnel. Sketch *-metric: Comparing Data Streams via Sketching
12th IEEE International Symposium on Network Computing and Applications (IEEE NCA 2013), Aug 2013, Boston, United States. pp.11, ⟨10.1109/NCA.2013.11⟩
hal-01059201v1  Conference papers
Jean-François LalandeKarine HeydemannPascal Berthomé. Software countermeasures for control flow integrity of smart card C codes
ESORICS - 19th European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. pp.200-218, ⟨10.1007/978-3-319-11212-1_12⟩
hal-00909293v1  Conference papers
Mounir AssafJulien SignolesFrédéric TronelEric Totel. Moniteur hybride de flux d'information pour un langage supportant des pointeurs
SARSSI - 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Sep 2013, Mont de Marsan, France
hal-01076907v1  Conference papers
Pierre MeyePhilippe RaipinFrédéric TronelEmmanuelle Anceaume. Mistore: A distributed storage system leveraging the DSL infrastructure of an ISP
International Conference on High Performance Computing & Simulation, HPCS 2014, Jul 2014, Bologne, Italy. pp.260 - 267, ⟨10.1109/HPCSim.2014.6903694⟩
hal-00985641v1  Conference papers
Romaric LudinardEmmanuelle AnceaumeYann BusnelErwan Le MerrerJean-Louis Marchand et al.  Anomaly Characterization Problems
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, Le-Bois-Plage-en-Ré, France. pp.1--4
hal-00777430v1  Conference papers
Guillaume Piolle. La vie privée sur Internet, une question de confiance ?
Journée Web et Confiance, Jan 2013, Lyon, France
hal-01018611v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph
NSS 2014 - The 8th International Conference on Network and System Security, Oct 2014, Xi'an, China. ⟨10.1007/978-3-319-11698-3_43⟩