Skip to Main content Skip to Navigation

Search by documents



...
hal-00845780v1  Conference papers
Annie BlandinMaryline BoizardSébastien GambsGuillaume Piolle. Le droit à l'oubli : Présentation du projet DAO
4ème Atelier sur la Protection de la Vie Privée (APVP'13), Jun 2013, Les Loges en Josas, France
...
hal-01009516v1  Conference papers
Ghada ArfaouiGuillaume DabosvilleSébastien GambsPatrick LacharmeJean-François Lalande. Un pass de transport anonyme et intraçable pour mobile NFC
Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France
...
hal-00875098v1  Conference papers
Ghada ArfaouiSébastien GambsPatrick LacharmeJean-François LalandeLescuyer Roch et al.  A Privacy-Preserving Contactless Transport Service for NFC Smartphones
Fifth International Conference on Mobile Computing, Applications and Services, Nov 2013, Paris, France. pp.282-285, ⟨10.1007/978-3-319-05452-0_24⟩
...
hal-01052509v2  Reports
Antoine Guellier. Can Homomorphic Cryptography ensure Privacy?
[Research Report] RR-8568, IRISA; Supélec Rennes, équipe Cidre; Inria. 2014, pp.109
...
hal-00804430v1  Conference papers
Emmanuelle AnceaumeYann BusnelBruno Sericola. Uniform Node Sampling Service Robust against Collusions of Malicious Nodes
43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013), Jun 2013, Budapest, Hungary. pp.249
...
hal-00926485v1  Journal articles
Emmanuelle AnceaumeYann BusnelSébastien Gambs. On the Power of the Adversary to Solve the Node Sampling Problem
Transactions on Large-Scale Data- and Knowledge-Centered Systems, Springer Berlin / Heidelberg, 2013, 8290, pp.102-126. ⟨10.1007/978-3-642-45269-7_5⟩
...
hal-00818650v1  Conference papers
Emmanuelle AnceaumeErwan Le MerrerRomaric LudinardBruno SericolaGilles Straub. FixMe : détection répartie de défaillances isolées
15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), May 2013, Pornic, France. pp.1-4
...
hal-01018611v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph
NSS 2014 - The 8th International Conference on Network and System Security, Oct 2014, Xi'an, China. ⟨10.1007/978-3-319-11698-3_43⟩
...
hal-00831401v1  Conference papers
Ehab ElsalamounyVladimiro Sassone. An HMM-based reputation model
Advances in Security of Information and Communication Networks, Sep 2013, Cairo, Egypt. pp.111-121, ⟨10.1007/978-3-642-40597-6_9⟩
...
hal-00840338v1  Conference papers
Christophe HauserFrédéric TronelColin FidgeLudovic Mé. Intrusion detection in distributed systems, an approach based on taint marking
IEEE ICC2013 - IEEE International Conference on Communications, Jun 2013, Budapest, Hungary
...
hal-01076907v1  Conference papers
Pierre MeyePhilippe RaipinFrédéric TronelEmmanuelle Anceaume. Mistore: A distributed storage system leveraging the DSL infrastructure of an ISP
International Conference on High Performance Computing & Simulation, HPCS 2014, Jul 2014, Bologne, Italy. pp.260 - 267, ⟨10.1109/HPCSim.2014.6903694⟩
...
hal-01076918v1  Conference papers
Pierre MeyePhilippe RaipinFrédéric TronelEmmanuelle Anceaume. A secure two-phase data deduplication scheme
6th International Symposium on Cyberspace Safety and Security (CSS), Aug 2014, Paris, France
...
hal-00997133v1  Book sections
Emmanuelle AnceaumeGilles GuettePaul Lajoie-MazencThomas SirventValérie Viet Triem Tong. Extending Signatures of Reputation
Hansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_13⟩
...
hal-00985641v1  Conference papers
Romaric LudinardEmmanuelle AnceaumeYann BusnelErwan Le MerrerJean-Louis Marchand et al.  Anomaly Characterization Problems
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, Le-Bois-Plage-en-Ré, France. pp.1--4
...
hal-00736916v1  Journal articles
Emmanuelle AnceaumeFrançois CastellaBruno Sericola. Analysis of a large number of Markov chains competing for transitions
International Journal of Systems Science, Taylor & Francis, 2014, 45 (3), pp.232--240. ⟨10.1080/00207721.2012.704090⟩
...
hal-00985631v1  Conference papers
Emmanuelle AnceaumeYann BusnelBruno Sericola. Service d'échantillonage uniforme résiliant aux comportments malveillants
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, France. pp.1--4
...
hal-00763212v3  Conference papers
Emmanuelle AnceaumeGilles GuettePaul Lajoie-MazencNicolas PrigentValérie Viet Triem Tong. A Privacy Preserving Distributed Reputation Mechanism
International Conference on communications (ICC), Jun 2013, Budapest, France. 6 p
...
hal-00924051v1  Conference papers
Pierre MeyePhilippe Raïpin-ParvédyFrédéric TronelEmmanuelle Anceaume. Toward a distributed storage system leveraging the DSL infrastructure of an ISP
11th IEEE Consumer Communications and Networking Conference, Jan 2014, United States. pp.2
...
hal-00948135v1  Conference papers
Emmanuelle AnceaumeYann BusnelErwan Le MerrerRomaric LudinardJean-Louis Marchand et al.  Anomaly Characterization in Large Scale Networks
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun 2014, Atlanta, United States
...
hal-01091385v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
2014 International Conference on Information Assurance and Security (IAS 2014), Nov 2014, Okinawa, Japan. pp.6, ⟨10.1109/ISIAS.2014.7064615⟩
...
hal-01083699v1  Conference papers
Erwan GodefroyEric TotelFrédéric MajorczykMichel Hurfin. Génération automatique de règles de corrélation pour la détection d'attaques complexes
9eme conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI), May 2014, Lyon, France. pp.10