Skip to Main content Skip to Navigation

hal-01572193v1  Conference papers
Álvaro García-Recuero. Efficient Privacy-Preserving Adversarial Learning in Decentralized Online Social Networks
ASONAM 2017 - IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining , Jul 2017, Sydney, Australia. ⟨10.1145/3110025.3119400⟩
tel-01655322v1  Theses
Solenn Brunet. Conception de mécanismes d’accréditations anonymes et d’anonymisation de données
Cryptographie et sécurité [cs.CR]. Université de Rennes 1 [UR1], 2017. Français
tel-01654244v1  Habilitation à diriger des recherches
Christian Grothoff. The GNUnet System
Networking and Internet Architecture [cs.NI]. Université de Rennes 1, 2017
tel-02093561v1  Theses
Saad El Jaouhari. A secure design of WoT services for smart cities
Networking and Internet Architecture [cs.NI]. Ecole nationale supérieure Mines-Télécom Atlantique, 2018. English. ⟨NNT : 2018IMTA0120⟩
hal-01887824v1  Conference papers
Saad El JaouhariAhmed Bouabdallah. A Privacy Safeguard Framework for a WebRTC/WoT-Based Healthcare Architecture
COMPSAC 2018 : IEEE 42nd Annual Computer Software and Applications Conference, in the 13th IEEE International Workshop on Security, Trust and Privacy for Software Application (STPSA 2018), Jul 2018, Tokyo, Japan. ⟨10.1109/COMPSAC.2018.10278⟩
hal-01611101v1  Conference papers
Alejandro Gómez-BoixPierre LaperdrixBenoit Baudry. Fingerprinting mobile devices: A short analysis
CIEL 2017 - 6ème Conférence en IngénieriE du Logiciel, Jun 2017, Montpellier, France
tel-02389297v2  Theses
Adrien Luxey. E-squads : a novel paradigm to build privacy-preserving ubiquitous applications
Distributed, Parallel, and Cluster Computing [cs.DC]. Université Rennes 1, 2019. English. ⟨NNT : 2019REN1S071⟩
hal-02496273v1  Conference papers
Tidiane SyllaMohamed Aymen ChaloufFrancine KriefKarim Samaké. Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
hal-03184941v1  Journal articles
Tidiane SyllaMohamed Aymeb ChaloufKrief FrancineKarim Samake. Context-Aware Security in the Internet of Things: A survey
International journal of autonomous and adaptive communications systems, Inderscience Publishers, 2021, 14 (3), pp.1. ⟨10.1504/IJAACS.2021.10035751⟩
tel-03224300v1  Theses
Guilaume Kaim. Privacy preserving post-quantum cryptography
Cryptography and Security [cs.CR]. Université Rennes 1, 2020. English. ⟨NNT : 2020REN1S077⟩
tel-01661412v1  Theses
Benjamin Richard. Authenticated key exchange protocols in three parties
Cryptography and Security [cs.CR]. Université Rennes 1, 2017. English. ⟨NNT : 2017REN1S037⟩
hal-02482253v1  Journal articles
Ghada ArfaouiXavier BultelPierre-Alain FouqueAdina NedelcuCristina Onete. The privacy of the TLS 1.3 protocol
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2019, 2019, pp.190 - 210. ⟨10.2478/popets-2019-0065⟩
hal-01158723v1  Conference papers
Davide FreyRachid GuerraouiAnne-Marie KermarrecAntoine Rault. Collaborative Filtering Under a Sybil Attack: Analysis of a Privacy Threat
Eighth European Workshop on System Security EuroSec 2015, Apr 2015, Bordeaux, France. ⟨10.1145/2751323.2751328⟩
hal-01309032v2  Conference papers
Ahmet IscenTeddy Furon. Group Testing for Identification with Privacy
ACM Workshop on Information Hiding and Multimedia Security, Jun 2016, Vigo, Spain
hal-01083328v1  Journal articles
Li WengLaurent AmsalegApril MortonStéphane Marchand-Maillet. A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2014, 10, pp.152-167. ⟨10.1109/TIFS.2014.2365998⟩
hal-01511323v1  Book sections
Saad El JaouhariAhmed BouabdallahJean-Marie Bonnin. Security issues of the web of things
Managing the Web of Things : Linking the Real World to the Web, Elsevier, pp.389 - 424, 2017, 978-0-12-809764-9. ⟨10.1016/B978-0-12-809764-9.00018-4⟩
hal-01285470v2  Conference papers
Pierre LaperdrixWalter RudametkinBenoit Baudry. Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints
37th IEEE Symposium on Security and Privacy (S&P 2016), May 2016, San Jose, United States
hal-01578990v1  Conference papers
Tristan AllardTassadit BouadiJoris DuguépérouxVirginie Sans. From Self-Data to Self-Preferences: Towards Preference Elicitation in Personal Information Management Systems
International Workshop on Personal Analytics and Privacy (In conjunction with ECML PKDD 2017) , Sep 2017, Skopje, Macedonia
tel-02375909v1  Habilitation à diriger des recherches
Davide Frey. Epidemic Protocols: From Large Scale to Big Data
Computational Engineering, Finance, and Science [cs.CE]. Université De Rennes 1, 2019
hal-03225201v1  Conference papers
Tristan AllardLouis BéziaudSébastien Gambs. Publication of court records: circumventing the privacy-transparency trade-off
AICOL 2020 - 11th International Workshop on Artificial Intelligence and the Complexity of Legal Systems, in conjunction with JURIX 2020, Dec 2020, Virtual, Czech Republic
hal-01090053v1  Conference papers
Caroline FontaineSébastien GambsJulien LoliveCristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes
Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil
hal-00861078v1  Conference papers
Florent FourcotLaurent ToutainFrédéric CuppensNora Cuppens-BouhlahiaStefan KÖpsell. IPv6 address obfuscation by intermediate middlebox in coordination with connected devices
EUNICE 2013 : 19th EUNICE/IFIP WG 6.6 International Workshop, Aug 2013, Chemnitz, Germany. pp.148 - 160