Skip to Main content Skip to Navigation

Search by documents



...
halshs-01223778v1  Reports
Maryline BoizardAnnie BlandinCristina Corgas-BernardGilles Dedessus Le MoustierSébastien Gambs et al.  Le droit à l'oubli
[Rapport de recherche] 11-25, Mission de recherche Droit et Justice. 2015, pp.216
...
hal-01183508v1  Conference papers
Ghada ArfaouiJean-François LalandeSaïd GharoutJacques Traoré. Practical and Privacy-Preserving TEE Migration
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
...
hal-01154374v1  Conference papers
Sébastien GambsJean-François LalandeJacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
...
hal-01316541v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno Sericola. Relying on Consensus does not Make Bitcoin Safer
Fast Abstract in the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2016, Toulouse, France
...
hal-01311970v1  Reports
Nicoló RivettiEmmanuelle AnceaumeYann BusnelLeonardo QuerzoniBruno Sericola. Load-Aware Shedding in Stream Processing Systems
[Research Report] LINA-University of Nantes; Sapienza Università di Roma (Italie); Irisa; Inria Rennes. 2016
...
hal-01191595v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring
The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. ⟨10.1109/cscloud.2015.27⟩
...
hal-01398192v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. A self-correcting information flow control model for the web-browser
FPS 2016 - The 9th International Symposium on Foundations & Practice of Security, Oct 2016, Québec City, Canada. pp.285-301, ⟨10.1007/978-3-319-51966-1_19⟩
...
hal-01356690v1  Reports
Thomas LetanPierre ChifflierGuillaume HietPierre NéronBenjamin Morin. SpecCert: Specifying and Verifying Hardware-based Security Enforcement
[Technical Report] CentraleSupélec; Agence Nationale de Sécurité des Systèmes d’Information. 2016, pp.20
...
tel-01342243v1  Habilitation à diriger des recherches
Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2015
...
tel-01413001v2  Theses
Pierre Obame Meye. Dependability in cloud storage
Distributed, Parallel, and Cluster Computing [cs.DC]. Université Rennes 1, 2016. English. ⟨NNT : 2016REN1S091⟩
...
hal-01305334v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno Sericola. L'empire romain ne doit pas être géré comme une petite île grecque
ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016, Bayonne, France
...
hal-01247495v1  Journal articles
Luca CaviglioneMauro GaggeroJean-François LalandeWojciech MazurczykMarcin Urbanski. Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2016, 11 (4), pp.799-810. ⟨10.1109/TIFS.2015.2510825⟩
...
tel-01242084v2  Theses
Christopher Humphries. User-centred security event visualisation
Cryptography and Security [cs.CR]. Université Rennes 1, 2015. English. ⟨NNT : 2015REN1S086⟩
...
hal-01397685v1  Conference papers
Emmanuelle AnceaumeThibaut Lajoie-MazencRomaric LudinardBruno Sericola. Safety Analysis of Bitcoin Improvement Proposals
2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), IEEE, Oct 2016, Cambridge, United States
...
hal-01194529v1  Conference papers
Emmanuelle AnceaumeYann BusnelNicolò Rivetti. Estimating the Frequency of Data Items in Massive Distributed Streams
IEEE 4th Symposium on Network Cloud Computing and Applications (NCCA), Jun 2015, Munich, Germany. pp.9, ⟨10.1109/ncca.2015.19⟩
...
hal-01194511v1  Conference papers
Emmanuelle AnceaumeYann BusnelNicolò RivettiBruno Sericola. Identifying Global Icebergs in Distributed Streams
34th International Symposium on Reliable Distributed Systems (SRDS), Sep 2015, Montreal, Canada. pp.10, ⟨10.1109/SRDS.2015.19⟩
...
hal-01355122v1  Journal articles
Valérie Viet Triem TongJean-François LalandeMourad Leslous. Challenges in Android Malware Analysis
ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43