Skip to Main content Skip to Navigation

Search by documents



hal-00875211v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Diagnosing intrusions in Android operating system using system flow graph
Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2013, Troyes, France
hal-01090053v1  Conference papers
Caroline FontaineSébastien GambsJulien LoliveCristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes
Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil
hal-00909406v1  Conference papers
Radoniaina AndriatsimandefitraThomas SaliouValérie Viet Triem Tong. Information Flow Policies vs Malware
IAS - Information assurance and security - 2013, 2013, Yassmine Hammamet, Tunisia
hal-00777430v1  Conference papers
Guillaume Piolle. La vie privée sur Internet, une question de confiance ?
Journée Web et Confiance, Jan 2013, Lyon, France
hal-01344563v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, May 2014, Saint-Germain-Au-Mont-d'Or, France
hal-01083544v1  Journal articles
Linda ZeghacheNadjib BadacheMichel HurfinIzabela Moise. Reliable mobile agents with transactional behaviour
International journal of communication networks and distributed systems, Inderscience Publishers, 2014, 13 (1), pp.27. ⟨10.1504/IJCNDS.2014.063977⟩
hal-01083384v1  Conference papers
Mathieu JaumeRadoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Secure states versus Secure executions: From access control to flow control
ICISS 2013 - 9th International Conference on Information Systems Security, Dec 2013, Calcutta, India. pp.148-162, ⟨10.1007/978-3-642-45204-8_11⟩
hal-00919178v1  Conference papers
Simon BocheGilles GuetteChristophe BidanNicolas Prigent. NoName, un protocole de routage ad hoc respectant la vie privée
SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.122-134
hal-01090668v1  Conference papers
Regina Paiva Melo MarinGuillaume PiolleChristophe Bidan. Equity-preserving Management of Privacy Conflicts in Social Network Systems
The Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014), Academy of Science and Engineering, Dec 2014, Cambridge, United States
hal-00967463v1  Conference papers
Jean-François Lalande. Un titre de transport sur mobile NFC respectueux de la vie privée
Colloque International sur la Sécurité des Systèmes d'Information, Mar 2014, Kénitra, Maroc
hal-01062313v1  Journal articles
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Information Flow Policies vs Malware -- Final Battle
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2014, 9 (2), pp.72-82
hal-00919227v1  Conference papers
Nathanaël AubertMohamed Ali AyachiChristophe BidanNicolas Prigent. The Hecate Attack
SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.205-215
hal-00926075v1  Conference papers
Ludovic Mé. Faire face aux cybermenaces : détecter (les attaques) et former (des experts en SSI)
11ème Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2013), Jun 2013, Rennes, France
hal-00736948v1  Journal articles
Esma AïmeurGilles BrassardSébastien Gambs. Quantum speed-up for unsupervised learning
Machine Learning, Springer Verlag, 2013, 90 (2), pp.261-287. ⟨10.1007/s10994-012-5316-5⟩
hal-00909400v1  Conference papers
Stéphane GellerValérie Viet Triem TongLudovic Mé. BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies
SECUREWARE - 7th International Conference on Emerging Security Information, Systems and Technologies - 2013, 2013, Barcelona, Spain
hal-01090047v1  Conference papers
Sébastien GambsSamuel RanellucciAlain Tapp. The crypto-democracy and the Trustworthy
Data Privacy Management (DPM'14), Sep 2014, Wroclaw, Poland
hal-01091597v1  Conference papers
Ghada ArfaouiJean-François Lalande. A Privacy Preserving Post-Payment Mobile Ticketing Protocol for Transport Systems
Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France
hal-01083376v1  Poster communications
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Highlighting Easily How Malicious Applications Corrupt Android Devices
Research in Attacks, Intrusions, and Defenses, Sep 2014, Gothenburg, Sweden. Research in Attacks, Intrusions, and Defenses, 2014
hal-00911241v1  Conference papers
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado CortezMoussa Traoré. Towards a recommender system for bush taxis
3rd Conference on the Analysis of Mobile Phone Datasets (NetMob'13), May 2013, Boston, United States
hal-00911238v1  Conference papers
Sébastien GambsMarc-Olivier KillijianIzabela MoiseMiguel Nuñez del Prado Cortez. MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces
2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, May 2013, Cambridge, United States. pp.1937-1946, ⟨10.1109/IPDPSW.2013.180⟩
hal-00997137v1  Book sections
Frédéric CuppensChristophe GarionGuillaume PiolleNora Cuppens-Boulahia. Normes et logique déontique
Pierre Marquis; Odile Papini; Henri Prade. Panorama de l'Intelligence Artificielle : Volume 1. Représentation des connaissances et formalisation des raisonnements, Cépaduès Editions, pp.215-237, 2014
hal-01083573v1  Conference papers
Chuanyou LiYun WangMichel Hurfin. Clock Synchronization in Mobile Ad Hoc Networks Based on an Iterative Approximate Byzantine Consensus Protocol
28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), May 2014, Victoria, Canada. pp.8, ⟨10.1109/AINA.2014.30⟩
hal-01083553v1  Journal articles
Chuanyou LiMichel HurfinYun Wang. Approximate Byzantine consensus in sparse, mobile ad-hoc networks
Journal of Parallel and Distributed Computing, Elsevier, 2014, 74 (9), pp.12. ⟨10.1016/j.jpdc.2014.05.005⟩