Skip to Main content Skip to Navigation

Search by documents



...
halshs-01223778v1  Reports
Maryline BoizardAnnie BlandinCristina Corgas-BernardGilles Dedessus Le MoustierSébastien Gambs et al.  Le droit à l'oubli
[Rapport de recherche] 11-25, Mission de recherche Droit et Justice. 2015, pp.216
hal-01166402v1  Conference papers
Gustav MalisAnnie BlandinGuillaume Piolle. The articulation between the legal and technical means of erasure of data online, from the perspective of the user
6ème Atelier sur la Protection de la Vie Privée (APVP'15), Jun 2015, Mosnes, France
...
hal-01183508v1  Conference papers
Ghada ArfaouiJean-François LalandeSaïd GharoutJacques Traoré. Practical and Privacy-Preserving TEE Migration
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
...
hal-01154374v1  Conference papers
Sébastien GambsJean-François LalandeJacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
...
hal-01191595v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring
The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. ⟨10.1109/cscloud.2015.27⟩
hal-01241810v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Assessment of an Automatic Correlation Rules Generator
11th International Conference on Information Systems Security (ICISS 2015), Dec 2015, Kolkata, India. ⟨10.1007/978-3-319-26961-0_13⟩
hal-01241492v1  Conference papers
Sébastien GambsGuillaume Piolle. Les techniques d'effacement des données
Le droit à l'oubli numérique, enjeux et perspectives, Institut de l'Ouest : Droit et Europe, Mar 2015, Rennes, France
hal-01241807v1  Journal articles
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2015, 10 (3), pp.11
hal-01221892v1  Journal articles
Guillaume Piolle. Protection des données personnelles dans le système d'information
Techniques de l'Ingenieur, Techniques de l'ingénieur, 2015, Sécurité des SI : organisation dans l'entreprise et législation, TIB458DUO (h5455), pp.21
...
tel-01342243v1  Habilitation à diriger des recherches
Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2015
hal-01182303v1  Conference papers
Luca CaviglioneJean-François LalandeWojciech MazurczykSteffen Wendzel. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
HAS - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Aug 2015, Los Angeles, United States. ⟨10.1007/978-3-319-20376-8_15⟩
hal-01241813v1  Poster communications
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Generation and Assessment of correlation rules to Detect Complex Attack Scenarios
IEEE Conference on Communications and Network Security (CNS 2015), Sep 2015, Florence, Italy. Proceedings of the IEEE Conference on Communications and Network Security, 2015
hal-01344473v1  Poster communications
Kun HeCyrielle FeronGaëtan Le GuelvouitChristophe Bidan. Image Ciphering to Ensure Privacy on Open Image- Sharing Platforms
IEEE International Conference on Image Processing (ICIP 2015), Sep 2015, Québec, Canada
...
tel-01242084v2  Theses
Christopher Humphries. User-centred security event visualisation
Cryptography and Security [cs.CR]. Université Rennes 1, 2015. English. ⟨NNT : 2015REN1S086⟩
hal-01344674v1  Directions of work or proceedings
Emmanuelle AnceaumeMaria Potop-ButucaruCachin Christian. Nineteenth International Conference on Principles of Distributed Systems (OPODIS)
LIPICS. Nineteenth International Conference on Principles of Distributed Systems (OPODIS), Dec 2015, Rennes, France. 2015
...
hal-01194529v1  Conference papers
Emmanuelle AnceaumeYann BusnelNicolò Rivetti. Estimating the Frequency of Data Items in Massive Distributed Streams
IEEE 4th Symposium on Network Cloud Computing and Applications (NCCA), Jun 2015, Munich, Germany. pp.9, ⟨10.1109/ncca.2015.19⟩
...
hal-01194511v1  Conference papers
Emmanuelle AnceaumeYann BusnelNicolò RivettiBruno Sericola. Identifying Global Icebergs in Distributed Streams
34th International Symposium on Reliable Distributed Systems (SRDS), Sep 2015, Montreal, Canada. pp.10, ⟨10.1109/SRDS.2015.19⟩
hal-01344687v1  Directions of work or proceedings
Antonio PuliafitoEmmanuelle AnceaumeTutschku KurtAvresky DimiterErik Maehle. Fourth IEEE Symposium on Network Cloud Computing and Applications, NCCA 2015
Jun 2015, Munich, Germany. IEEE, 2015, ISBN 978-1-4673-7741-6
...
hal-01189596v1  Conference papers
Yves MocquardEmmanuelle AnceaumeJames AspnesYann BusnelBruno Sericola. Counting with Population Protocols
2015 IEEE 14th International Symposium on Network Computing and Applications, IEEE, Sep 2015, Cambridge, United States. pp.9, ⟨10.1109/nca.2015.35⟩
hal-01136768v1  Conference papers
Jean-François Lalande. Sécurité Android: exemples de malware
Colloque International sur la Sécurité des Systèmes d'Information, Mar 2015, Kénitra, Maroc