Skip to Main content Skip to Navigation

Search by documents



hal-01166402v1  Conference papers
Gustav MalisAnnie BlandinGuillaume Piolle. The articulation between the legal and technical means of erasure of data online, from the perspective of the user
6ème Atelier sur la Protection de la Vie Privée (APVP'15), Jun 2015, Mosnes, France
hal-01241810v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Assessment of an Automatic Correlation Rules Generator
11th International Conference on Information Systems Security (ICISS 2015), Dec 2015, Kolkata, India. ⟨10.1007/978-3-319-26961-0_13⟩
hal-01241492v1  Conference papers
Sébastien GambsGuillaume Piolle. Les techniques d'effacement des données
Le droit à l'oubli numérique, enjeux et perspectives, Institut de l'Ouest : Droit et Europe, Mar 2015, Rennes, France
hal-01241807v1  Journal articles
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2015, 10 (3), pp.11
hal-01221892v1  Journal articles
Guillaume Piolle. Protection des données personnelles dans le système d'information
Techniques de l'Ingenieur, Techniques de l'ingénieur, 2015, Sécurité des SI : organisation dans l'entreprise et législation, TIB458DUO (h5455), pp.21
hal-01182303v1  Conference papers
Luca CaviglioneJean-François LalandeWojciech MazurczykSteffen Wendzel. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
HAS - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Aug 2015, Los Angeles, United States. ⟨10.1007/978-3-319-20376-8_15⟩
hal-01241813v1  Poster communications
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Generation and Assessment of correlation rules to Detect Complex Attack Scenarios
IEEE Conference on Communications and Network Security (CNS 2015), Sep 2015, Florence, Italy. Proceedings of the IEEE Conference on Communications and Network Security, 2015
hal-01344473v1  Poster communications
Kun HeCyrielle FeronGaëtan Le GuelvouitChristophe Bidan. Image Ciphering to Ensure Privacy on Open Image- Sharing Platforms
IEEE International Conference on Image Processing (ICIP 2015), Sep 2015, Québec, Canada
hal-01344674v1  Directions of work or proceedings
Emmanuelle AnceaumeMaria Potop-ButucaruCachin Christian. Nineteenth International Conference on Principles of Distributed Systems (OPODIS)
LIPICS. Nineteenth International Conference on Principles of Distributed Systems (OPODIS), Dec 2015, Rennes, France. 2015
hal-01344687v1  Directions of work or proceedings
Antonio PuliafitoEmmanuelle AnceaumeTutschku KurtAvresky DimiterErik Maehle. Fourth IEEE Symposium on Network Cloud Computing and Applications, NCCA 2015
Jun 2015, Munich, Germany. IEEE, 2015, ISBN 978-1-4673-7741-6
hal-01136768v1  Conference papers
Jean-François Lalande. Sécurité Android: exemples de malware
Colloque International sur la Sécurité des Systèmes d'Information, Mar 2015, Kénitra, Maroc
hal-01244606v1  Conference papers
Sébastien GambsCarlos Eduardo Rosar Kos LassanceCristina Onete. The Not-so-distant Future: Distance-Bounding Protocols on Smartphones
14th Smart Card Research and Advanced Application Conference, Nov 2015, Bochum, Germany. p.209-224, ⟨10.1007/978-3-319-31271-2_13⟩
hal-00967463v1  Conference papers
Jean-François Lalande. Un titre de transport sur mobile NFC respectueux de la vie privée
Colloque International sur la Sécurité des Systèmes d'Information, Mar 2014, Kénitra, Maroc
hal-01090053v1  Conference papers
Caroline FontaineSébastien GambsJulien LoliveCristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes
Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil
hal-00997137v1  Book sections
Frédéric CuppensChristophe GarionGuillaume PiolleNora Cuppens-Boulahia. Normes et logique déontique
Pierre Marquis; Odile Papini; Henri Prade. Panorama de l'Intelligence Artificielle : Volume 1. Représentation des connaissances et formalisation des raisonnements, Cépaduès Editions, pp.215-237, 2014
hal-01062313v1  Journal articles
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Information Flow Policies vs Malware -- Final Battle
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2014, 9 (2), pp.72-82
hal-01344563v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, May 2014, Saint-Germain-Au-Mont-d'Or, France
hal-01083544v1  Journal articles
Linda ZeghacheNadjib BadacheMichel HurfinIzabela Moise. Reliable mobile agents with transactional behaviour
International journal of communication networks and distributed systems, Inderscience Publishers, 2014, 13 (1), pp.27. ⟨10.1504/IJCNDS.2014.063977⟩
hal-01090668v1  Conference papers
Regina Paiva Melo MarinGuillaume PiolleChristophe Bidan. Equity-preserving Management of Privacy Conflicts in Social Network Systems
The Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014), Academy of Science and Engineering, Dec 2014, Cambridge, United States
hal-01083573v1  Conference papers
Chuanyou LiYun WangMichel Hurfin. Clock Synchronization in Mobile Ad Hoc Networks Based on an Iterative Approximate Byzantine Consensus Protocol
28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), May 2014, Victoria, Canada. pp.8, ⟨10.1109/AINA.2014.30⟩
hal-01083553v1  Journal articles
Chuanyou LiMichel HurfinYun Wang. Approximate Byzantine consensus in sparse, mobile ad-hoc networks
Journal of Parallel and Distributed Computing, Elsevier, 2014, 74 (9), pp.12. ⟨10.1016/j.jpdc.2014.05.005⟩
hal-01083376v1  Poster communications
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Highlighting Easily How Malicious Applications Corrupt Android Devices
Research in Attacks, Intrusions, and Defenses, Sep 2014, Gothenburg, Sweden. Research in Attacks, Intrusions, and Defenses, 2014
hal-01149471v1  Conference papers
Laurent GeorgetGuillaume PiolleFrédéric TronelValérie Viet Triem TongMathieu Jaume. Towards a Formal Semantics for System Calls in terms of Information Flow
Tenth International Conference on Systems (ICONS 2015), Apr 2015, Barcelone, Spain. pp.1-4
hal-01242786v1  Conference papers
Guillaume HietHervé DebarSélim MénouarVérène Houdebine. Etude comparative des formats d’alertes
C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, Nov 2015, Rennes, France. pp.125-148
hal-01246441v1  Poster communications
Damien CrémilleuxFrédéric MajorczykNicolas Prigent. VEGAS: Visualizing, Exploring and Grouping AlertS
International Symposium on Visualization for Cyber Security - VizSec 2015, Oct 2015, Chicago, United States
hal-01241511v1  Conference papers
Guillaume Piolle. La protection des données personnelles vue par un informaticien
Journées thématiques: Respect de la vie privée et services mobiles sans contact, May 2015, Meudon, France
halshs-01216636v1  Conference papers
Maryline BoizardSébastien Gambs. Le droit à l’oubli numérique face aux moteurs de recherche
Sciences et droits de l’homme, Réseau droit, sciences et techniques (GDR 3178); UMR de droit comparé de Paris I, Oct 2015, Paris, France