Skip to Main content Skip to Navigation

inria-00080829v1  Journal articles
Teddy FuronPierre Duhamel. An Asymmetric Watermarking Method
IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2003, 51 (4), pp.981-995
hal-01781468v1  Conference papers
Saad El JaouhariAhmed BouabdallahJean-Marie Bonnin. A secure WebRTC/WoT-based health-care architecture enhanced with access control
ICOIN 2018 - 32nd International Conference on Information Networking, Jan 2018, Chiang Mai, Thailand. pp.182-187, ⟨10.1109/ICOIN.2018.8343107⟩
hal-01565795v1  Conference papers
Antoine SaverimoutouBertrand MathieuSandrine Vaton. Which Secure Transport Protocol for a Reliable HTTP/2-based Web Service : TLS or QUIC ?
ISCC 2017 : 22nd IEEE symposium on International Symposium on Computers and Communications, Jul 2017, Heraklion, Greece. ⟨10.1109/ISCC.2017.8024637⟩
hal-02948867v1  Conference papers
Nan MesseNicolas BelloirVanea ChiprianovImane CherfaRégis Fleurquin et al.  Development of Secure System of Systems Needing a Rapid Deployment
2019 14th Annual Conference System of Systems Engineering (SoSE), May 2019, Anchorage, United States. ⟨10.1109/SYSOSE.2019.8753857⟩
hal-02267192v1  Conference papers
Clément ElbazLouis RillingChristine Morin. Towards Automated Risk Analysis of "One-day" Vulnerabilities
RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Aug 2019, Erquy, France. pp.1-3
hal-01950822v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm
EUSPN 2019 : 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Nov 2019, Coimbra, Portugal. pp.70-76, ⟨10.1016/j.procs.2019.09.445⟩
hal-01894037v1  Conference papers
Saad El JaouhariAhmed Bouabdallah. Dynamic security management of smart WoT infrastructures using SDN
VTC-Fall 2018 : IEEE 88th Vehicular Technology, Aug 2018, Chicago, United States. ⟨10.1109/VTCFall.2018.8690740⟩
tel-02093561v1  Theses
Saad El Jaouhari. A secure design of WoT services for smart cities
Networking and Internet Architecture [cs.NI]. Ecole nationale supérieure Mines-Télécom Atlantique, 2018. English. ⟨NNT : 2018IMTA0120⟩
hal-01848573v1  Conference papers
Julien DucheneEric AlataVincent NicometteMohamed KaânicheColas Le Guernic. Specification-Based Protocol Obfuscation
DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩
tel-01653831v2  Theses
Anna Giannakou. Self-adaptable Security Monitoring for IaaS Cloud Environments
Cryptography and Security [cs.CR]. INSA de Rennes, 2017. English. ⟨NNT : 2017ISAR0021⟩
hal-02362062v1  Reports
Clément ElbazLouis RillingChristine Morin. Automated Keyword Extraction from "One-day" Vulnerabilities at Disclosure
[Research Report] RR-9299, Inria Rennes - Bretagne Atlantique. 2019, pp.1-22
hal-01887824v1  Conference papers
Saad El JaouhariAhmed Bouabdallah. A Privacy Safeguard Framework for a WebRTC/WoT-Based Healthcare Architecture
COMPSAC 2018 : IEEE 42nd Annual Computer Software and Applications Conference, in the 13th IEEE International Workshop on Security, Trust and Privacy for Software Application (STPSA 2018), Jul 2018, Tokyo, Japan. ⟨10.1109/COMPSAC.2018.10278⟩
hal-02314723v1  Conference papers
Christopher BrownAdam BarwellYoann MarquerCéline MinhOlivier Zendra. Type-Driven Verification of Non-functional Properties
PPDP 2019 - 21st International Symposium on Principles and Practice of Declarative Programming, Oct 2019, Porto, Portugal. pp.1-15, ⟨10.1145/3354166.3354171⟩
hal-01611324v1  Conference papers
Youssou NdiayeNicolas AilleryOlivier BaraisArnaud BlouinAhmed Bouabdallah. Modélisation et Évaluation de la Sécurité des IHM
CIEL 2017 : 6ème Conférence en IngénieriE du Logiciel, Jun 2017, Montpellier, France
hal-01379451v1  Journal articles
Béatrice BérardLoïc HélouëtJohn Mullins. Non-interference in partial order models
ACM Transactions on Embedded Computing Systems (TECS), ACM, 2017, Application and Theory of Petri Nets and Other Models of Concurrency: Special Issue of Selected Papers from Petri Nets 2015, 16 (2), pp.44:1-44:34. ⟨10.1145/2984639⟩
tel-02882523v1  Theses
Florent Tardif. Practical Considerations on Cryptanalytic Time-Memory Trade-Offs
Cryptography and Security [cs.CR]. Université Rennes 1, 2019. English
hal-02496273v1  Conference papers
Tidiane SyllaMohamed Aymen ChaloufFrancine KriefKarim Samaké. Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.240-252, ⟨10.1007/978-3-030-41702-4_15⟩
tel-03164744v1  Theses
Pierre Graux. Challenges of native android applications : obfuscation and vulnerabilities
Cryptography and Security [cs.CR]. Université Rennes 1, 2020. English. ⟨NNT : 2020REN1S047⟩
hal-03184941v1  Journal articles
Tidiane SyllaMohamed Aymeb ChaloufKrief FrancineKarim Samake. Context-Aware Security in the Internet of Things: A survey
International journal of autonomous and adaptive communications systems, Inderscience Publishers, 2021, 14 (3), pp.1. ⟨10.1504/IJAACS.2021.10035751⟩
tel-03224300v1  Theses
Guilaume Kaim. Privacy preserving post-quantum cryptography
Cryptography and Security [cs.CR]. Université Rennes 1, 2020. English. ⟨NNT : 2020REN1S077⟩
tel-01661412v1  Theses
Benjamin Richard. Authenticated key exchange protocols in three parties
Cryptography and Security [cs.CR]. Université Rennes 1, 2017. English. ⟨NNT : 2017REN1S037⟩
hal-01385201v1  Conference papers
Farhadi MozhdehJean-Louis Lanet. Paper Tiger, an endless fight
SecITC 9th International Conference on Security for Information Technology and Communications, Jun 2016, Bucarest, Romania. ⟨10.1007/978-3-319-47238-6⟩
hal-01185006v1  Conference papers
Laurent CailleuxAhmed BouabdallahJean-Marie Bonnin. Building a Confident Advanced Email System using a new Correspondence Model
WAINA 2014 :28th International Conference on Advanced Information Networking and Applications Workshops, May 2014, Victoria, Canada. pp.85 - 90, ⟨10.1109/WAINA.2014.24⟩
inria-00536603v1  Conference papers
Cristina BasescuAlexandra Carpen-AmarieCatalin LeordeanuAlexandru CostanGabriel Antoniu. Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies
The 25th International Conference on Advanced Information Networking and Applications (AINA-2011), Institute for Infocomm Research (I2R) in cooperation with the Singapore Chapter of ACM, Mar 2011, Singapore, Singapore. pp.459-466, ⟨10.1109/AINA.2011.61⟩