Filtrer vos résultats
- 41
- 15
- 35
- 15
- 3
- 1
- 1
- 1
- 2
- 1
- 55
- 3
- 2
- 1
- 5
- 2
- 3
- 2
- 5
- 4
- 3
- 3
- 2
- 9
- 5
- 7
- 2
- 3
- 1
- 53
- 3
- 56
- 44
- 38
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 20
- 19
- 16
- 13
- 11
- 8
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
56 résultats
|
|
triés par
|
|
An Invariant-based Approach for Detecting Attacks against Data in Web ApplicationsInternational journal of secure software engineering, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩
Article dans une revue
hal-01083296v1
|
||
|
A framework for proving the self-organization of dynamic systems[Research Report] Rapport LAAS n° 10746, LAAS. 2010, pp.26
Rapport
inria-00534372v1
|
||
|
PROPS: A PRivacy-Preserving Location Proof System33rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2014,, Oct 2014, Nara, Japan. ⟨10.1109/SRDS.2014.37⟩
Communication dans un congrès
hal-01242266v1
|
||
|
Design-Driven Development Methodology for Resilient ComputingCBSE'13: Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based Software Engineering, Jun 2013, Vancouver, Canada
Communication dans un congrès
hal-00814298v1
|
||
MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, May 2013, Cambridge, United States. pp.1937-1946, ⟨10.1109/IPDPSW.2013.180⟩
Communication dans un congrès
hal-00911238v1
|
|||
|
Adversarial frontier stitching for remote neural network watermarkingRapport LAAS n° 17713. 2017
Autre rapport, séminaire, workshop
hal-02043818v1
|
||
|
YouTube Recommendations Do Predict Polls: A note on the 2022 French presidential election[Research Report] Rapport LAAS n° 22136, Inria. 2022
Rapport
hal-03655608v1
|
||
|
Bug ou ban ? Une Perspective Topologique sur le Shadow BanningALGOTEL 2020 – 22èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Sep 2020, Lyon, France. pp.1-4
Communication dans un congrès
hal-02875595v1
|
||
|
Towards privacy-driven design of a dynamic carpooling systemPervasive and Mobile Computing, 2014, 14, pp.71-82. ⟨10.1016/j.pmcj.2014.05.009⟩
Article dans une revue
hal-01242263v1
|
||
|
Time-Efficient Read/Write Register in Crash-prone Asynchronous Message-Passing SystemsComputing, 2019, 101 (1), pp.3-17. ⟨10.1007/s00607-018-0615-8⟩
Article dans une revue
hal-01784210v1
|
||
|
Specification-Based Protocol ObfuscationDSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩
Communication dans un congrès
hal-01848573v1
|
||
|
State of the art of network protocol reverse engineering toolsJournal of Computer Virology and Hacking Techniques, 2018, 14 (1), pp.53-68. ⟨10.1007/s11416-016-0289-8⟩
Article dans une revue
hal-01496958v1
|
||
Towards a recommender system for bush taxis3rd Conference on the Analysis of Mobile Phone Datasets (NetMob'13), May 2013, Boston, United States
Communication dans un congrès
hal-00911241v1
|
|||
|
GEPETO: a GEoPrivacy-Enhancing TOolkitProceedings of the International Workshop on Advances in Mobile Computing and Applications: Security, Privacy and Trust, held in conjunction with the 24th IEEE AINA conference, Apr 2010, Perth, Australia. ⟨10.1109/WAINA.2010.170⟩
Communication dans un congrès
inria-00556835v1
|
||
|
Distributed run-time WCET controller for concurrent critical tasks in mixed-critical systems22nd International Conference on Real-Time Networks and Systems, Oct 2014, Versailles, France. ⟨10.1145/2659787.2659799⟩
Communication dans un congrès
hal-01096102v1
|
||
|
XPIR : Private Information Retrieval for EveryoneProceedings on Privacy Enhancing Technologies, 2016, avril 2016, pp.155-174. ⟨10.1515/popets-2016-0010⟩
Article dans une revue
hal-01396142v1
|
||
|
Vssdb: A Verifiable Secret-Sharing Distance-Bounding ProtocolInternational Conference on Cryptography and Information security (BalkanCryptSec'14), Oct 2014, Istanbul, France
Communication dans un congrès
hal-01242265v1
|
||
|
Show me how you move and I will tell you who you areProceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL'10), Nov 2010, San José, United States. ⟨10.1145/1868470.1868479⟩
Communication dans un congrès
inria-00556833v1
|
||
Show me how you move and I will tell you who you areTransactions on Data Privacy, 2011, 4 (2), pp.103-126
Article dans une revue
hal-00660055v1
|
|||
Next place prediction using mobility Markov chainsMPM - EuroSys 2012 Workshop on Measurement, Privacy, and Mobility - 2012, Apr 2012, Bern, Switzerland
Communication dans un congrès
hal-00736947v1
|
|||
|
Qu’est ce qu’un algorithme en boîte noire ? Tractatus des décisions algorithmiques2022
Pré-publication, Document de travail
hal-03851597v1
|
||
|
Modeling Rabbit-Holes on YouTubeSocial Network Analysis and Mining, 2023, 13 (1), pp.100. ⟨10.1007/s13278-023-01105-9⟩
Article dans une revue
hal-03620039v2
|
||
|
A Topological Perspective on Distributed Network Algorithms26th International Colloquium on Structural Information and Communication Complexity (SIROCCO 2019), Jul 2019, L'Aquila, Italy. ⟨10.1007/978-3-030-24922-9_1⟩
Communication dans un congrès
hal-02433511v1
|
||
|
DYNASCORE: DYNAmic Software COntroller to increase REsource utilization in mixed-critical systemsACM Transactions on Design Automation of Electronic Systems, 2018, 23 (2), pp.art ID n°13. ⟨10.1145/3110222⟩
Article dans une revue
hal-01559696v1
|
||
|
Algorithmic audits of algorithms, and the lawAI and Ethics, 2023, pp.1-21. ⟨10.1007/s43681-023-00343-z⟩
Article dans une revue
hal-03583919v2
|
||
De-anonymization attack on geolocated datasetsAtelier Protection de la Vie Privée (APVP 2012), 3ième édition, Jun 2012, Ile de Groix, France
Communication dans un congrès
hal-00765525v1
|
|||
From Resilient Computing Architectural Concepts to Wireless Sensor Network-based ApplicationsEDCC 2014 - Tenth European Dependable Computing Conference, May 2014, Newcastle upon Tyne, United Kingdom. pp.46 - 49, ⟨10.1109/EDCC.2014.23⟩
Communication dans un congrès
hal-00938389v1
|
|||
A Necessary and Sufficient Synchrony Condition for Solving Byzantine Consensus in Symmetric Networks12th International Conference on Distributed Computing and Networking (ICDCN'11), Jan 2011, Bangalore, India. pp.215-226
Communication dans un congrès
hal-00647764v1
|
|||
|
Protocol reverse engineering: Challenges and obfuscationThe 11th International Conference on Risks and Security of Internet and Systems - CRiSIS 2016, Sep 2016, Roscoff, France. ⟨10.1007/978-3-319-54876-0_11⟩
Communication dans un congrès
hal-01388060v1
|
||
|
Privacy-preserving carpoolingOdysseus 2015 - 6th International Workshop on Freight Transportation and Logistics, May 2015, Ajaccio, France
Communication dans un congrès
hal-01146639v1
|
- 1
- 2