Skip to Main content Skip to Navigation

Search by documents



...
halshs-01223778v1  Reports
Maryline BoizardAnnie BlandinCristina Corgas-BernardGilles Dedessus Le MoustierSébastien Gambs et al.  Le droit à l'oubli
[Rapport de recherche] 11-25, Mission de recherche Droit et Justice. 2015, pp.216
...
hal-01183508v1  Conference papers
Ghada ArfaouiJean-François LalandeSaïd GharoutJacques Traoré. Practical and Privacy-Preserving TEE Migration
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
...
hal-01154374v1  Conference papers
Sébastien GambsJean-François LalandeJacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
...
hal-01009516v1  Conference papers
Ghada ArfaouiGuillaume DabosvilleSébastien GambsPatrick LacharmeJean-François Lalande. Un pass de transport anonyme et intraçable pour mobile NFC
Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France
...
hal-01191595v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring
The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. ⟨10.1109/cscloud.2015.27⟩
...
hal-01052509v2  Reports
Antoine Guellier. Can Homomorphic Cryptography ensure Privacy?
[Research Report] RR-8568, IRISA; Supélec Rennes, équipe Cidre; Inria. 2014, pp.109
...
hal-01018611v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph
NSS 2014 - The 8th International Conference on Network and System Security, Oct 2014, Xi'an, China. ⟨10.1007/978-3-319-11698-3_43⟩
...
tel-01342243v1  Habilitation à diriger des recherches
Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2015
...
tel-01242084v2  Theses
Christopher Humphries. User-centred security event visualisation
Cryptography and Security [cs.CR]. Université Rennes 1, 2015. English. ⟨NNT : 2015REN1S086⟩
...
hal-01076907v1  Conference papers
Pierre MeyePhilippe RaipinFrédéric TronelEmmanuelle Anceaume. Mistore: A distributed storage system leveraging the DSL infrastructure of an ISP
International Conference on High Performance Computing & Simulation, HPCS 2014, Jul 2014, Bologne, Italy. pp.260 - 267, ⟨10.1109/HPCSim.2014.6903694⟩
...
hal-01076918v1  Conference papers
Pierre MeyePhilippe RaipinFrédéric TronelEmmanuelle Anceaume. A secure two-phase data deduplication scheme
6th International Symposium on Cyberspace Safety and Security (CSS), Aug 2014, Paris, France
...
hal-00997133v1  Book sections
Emmanuelle AnceaumeGilles GuettePaul Lajoie-MazencThomas SirventValérie Viet Triem Tong. Extending Signatures of Reputation
Hansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_13⟩
...
hal-00985641v1  Conference papers
Romaric LudinardEmmanuelle AnceaumeYann BusnelErwan Le MerrerJean-Louis Marchand et al.  Anomaly Characterization Problems
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, Le-Bois-Plage-en-Ré, France. pp.1--4
...
hal-01194529v1  Conference papers
Emmanuelle AnceaumeYann BusnelNicolò Rivetti. Estimating the Frequency of Data Items in Massive Distributed Streams
IEEE 4th Symposium on Network Cloud Computing and Applications (NCCA), Jun 2015, Munich, Germany. pp.9, ⟨10.1109/ncca.2015.19⟩
...
hal-00736916v1  Journal articles
Emmanuelle AnceaumeFrançois CastellaBruno Sericola. Analysis of a large number of Markov chains competing for transitions
International Journal of Systems Science, Taylor & Francis, 2014, 45 (3), pp.232--240. ⟨10.1080/00207721.2012.704090⟩
...
hal-01194511v1  Conference papers
Emmanuelle AnceaumeYann BusnelNicolò RivettiBruno Sericola. Identifying Global Icebergs in Distributed Streams
34th International Symposium on Reliable Distributed Systems (SRDS), Sep 2015, Montreal, Canada. pp.10, ⟨10.1109/SRDS.2015.19⟩
...
hal-00985631v1  Conference papers
Emmanuelle AnceaumeYann BusnelBruno Sericola. Service d'échantillonage uniforme résiliant aux comportments malveillants
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, France. pp.1--4
...
hal-00924051v1  Conference papers
Pierre MeyePhilippe Raïpin-ParvédyFrédéric TronelEmmanuelle Anceaume. Toward a distributed storage system leveraging the DSL infrastructure of an ISP
11th IEEE Consumer Communications and Networking Conference, Jan 2014, United States. pp.2
...
hal-00948135v1  Conference papers
Emmanuelle AnceaumeYann BusnelErwan Le MerrerRomaric LudinardJean-Louis Marchand et al.  Anomaly Characterization in Large Scale Networks
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun 2014, Atlanta, United States