Skip to Main content Skip to Navigation

hal-01380170v1  Journal articles
Ulrich Matchi AïvodjiSébastien GambsMarie-José HuguetMarc-Olivier Killijian. Meeting points in ridesharing: A privacy-preserving approach
Transportation research. Part C, Emerging technologies, Elsevier, 2016, 72, pp.239 - 253. ⟨10.1016/j.trc.2016.09.017⟩
hal-01567075v1  Conference papers
Eduardo B. FernandezBrahim Hamid. A pattern for network functions virtualization
20th European Conference on Pattern Language of Programs (EuroPlop 2015), Jul 2015, Kloster Irsee, Germany. pp. 1-9
hal-00765530v1  Conference papers
Sébastien GambsMarc-Olivier KillijianMatthieu RoyMoussa Traoré. Locanyms: Towards privacy-preserving location-based services
Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Jun 2012, Ile de Groix, France
hal-00765525v1  Conference papers
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. De-anonymization attack on geolocated datasets
Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Jun 2012, Ile de Groix, France
hal-01387807v1  Conference papers
Tan Thuan VoBernard CouletteHanh Nhi TranRedouane Lbath. Defining and Using Collaboration Patterns for Software Process Development
International Workshop on Cooperative Model Driven Development (CMDD 2015) within the 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2015), Feb 2015, Angers, France. pp.557-564, ⟨10.5220/0005338705570564⟩
hal-01848573v1  Conference papers
Julien DucheneEric AlataVincent NicometteMohamed KaânicheColas Le Guernic. Specification-Based Protocol Obfuscation
DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩
hal-02089337v1  Journal articles
Amani MakhloufChristian PerceboisHanh Nhi Tran. An Auto-active Approach to Develop Correct Logic-based Graph Transformations
International Journal On Advances in Software, IARIA, 2018, 11 (1 & 2), pp.147-158
hal-02871341v1  Conference papers
Nathanael SensfelderAurélie HuraultPhilippe Quéinnec. Inference of Channel Priorities for Asynchronous Communication
14th International Conference on Distributed Computing and Artificial Intelligence (DCAI 2017), Jun 2017, Porto, Portugal. pp.262-269, ⟨10.1007/978-3-319-62410-5_32⟩
hal-02864406v1  Conference papers
Regina BernhauptFrançois MancietMichael Pirker. User Experience Centered Engineering: A Process Model Inspired by Games Development
IFIP TC 13.2. Workshop on UX Engineering at 15th IFIP TC 13 International Conference (INTERACT 2015), Sep 2015, Bamberg, Germany. pp.7-14
hal-02864411v1  Conference papers
Michael PirkerRegina BernhauptFrançois Manciet. Engineering for User Experience: An Interactive TV Case Study
IFIP TC 13.2. Workshop on UX Engineering at 15th IFIP TC 13 International Conference (INTERACT 2015), Sep 2015, Bamberg, Germany. pp.1-6
hal-01178546v1  Journal articles
Yann BachyVincent NicometteEric AlataMohamed KaânicheJean-Christophe Courrège. La sécurité des box ADSL. Analyse de risques et expérimentations
Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, Lavoisier, 2014, 19 (6), pp.63-88. ⟨10.3166/isi.19.6.63-88⟩
hal-02960354v1  Conference papers
Fabian RomeroYannick Chevalier. Decidability of Deterministic Process Equivalence for Finitary Deduction Systems
28th Euromicro International Conference on Parallel, Distributed and network-based Processing - PDP 2020, Mar 2020, Västerås, Sweden. pp.441-444, ⟨10.1109/PDP50117.2020.00074⟩
hal-00349447v1  Conference papers
Silvia FarraposoK. BoudaoudLaurent GallonPhilippe Owezarski. Some Issues raised by DoS Attacks and the TCP/IP Suite
4ème conférence sur la Sécurité et les Architectures Réseau (SAR'2005), Oct 2005, Batz sur mer, France
hal-00433850v2  Conference papers
Mahmoud MostafaAnas Abou El KalamChristian Fraboul. Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework
Third IEEE / IFIP International Conference on New Technologies, Mobility and Security, Dec 2009, Cairo, Egypt. pp.1-7
hal-00433854v1  Conference papers
Mahmoud MostafaAnas Abou El KalamChristian Fraboul. Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing
19th International Conference on Computer Theory and Applications (ICCTA 2009), Oct 2009, Alexandria, Egypt. pp.40-43
hal-02346074v1  Conference papers
Romain CayreVincent NicometteGuillaume AuriolEric AlataMohamed Kaâniche et al.  Mirage: towards a Metasploit-like framework for IoT
2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Oct 2019, Berlin, Germany
hal-02364255v1  Conference papers
Olivier BrunYonghua Yin. Random Neural Networks and Deep Learning for Attack Detection at the Edge
2019 IEEE International Conference on Fog Computing (ICFC), Jun 2019, Prague, Czech Republic. pp.11-14, ⟨10.1109/ICFC.2019.00009⟩
hal-02383454v1  Conference papers
Rita ZgheibAntonio de NicolaMaria Luisa VillaniEmmanuel ConchonRémi Bastide. A flexible architecture for cognitive sensing of activities in ambient assisted living
IEEE 26th international conference on enabling technologies: infrastructure for collaborative enterprises (WETICE 2017), Jun 2017, Poznan, Poland. pp.284--289, ⟨10.1109/WETICE.2017.41⟩
hal-02383455v1  Conference papers
Mohamed Amine BouazzouniEmmanuel ConchonFabrice PeyrardPierre-François Bonnefoi. A Card-less TEE-based Solution for Trusted Access Control.
14th International Conference on Security and Cryptography (SECRYPT 2017), Jul 2017, Madrid, Spain. pp.456--461, ⟨10.5220/0006431704560461⟩
hal-02381395v1  Conference papers
Carlos Aguilar MelchorMarc-Olivier KillijianCédric LefebvreThomas Ricosset. A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib
International Conference on Security for Information Technology and Communications (SECITC 2018), Nov 2018, Bucharest, Romania. pp.425-442, ⟨10.1007/978-3-030-12942-2_32⟩