Filtrer vos résultats
- 341
- 124
- 3
- 302
- 65
- 26
- 20
- 18
- 12
- 5
- 4
- 4
- 4
- 3
- 2
- 2
- 1
- 13
- 2
- 444
- 12
- 10
- 10
- 8
- 4
- 1
- 1
- 30
- 4
- 21
- 26
- 21
- 24
- 42
- 35
- 27
- 44
- 53
- 51
- 39
- 44
- 31
- 1
- 2
- 1
- 2
- 393
- 75
- 468
- 468
- 32
- 27
- 24
- 19
- 18
- 17
- 14
- 14
- 13
- 13
- 11
- 10
- 9
- 8
- 8
- 8
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 121
- 64
- 55
- 48
- 45
- 39
- 38
- 34
- 29
- 28
- 28
- 27
- 27
- 22
- 21
- 20
- 19
- 15
- 14
- 14
- 13
- 12
- 11
- 11
- 10
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
468 résultats
|
On the Power of the Adversary to Solve the Node Sampling ProblemTransactions on Large-Scale Data- and Knowledge-Centered Systems, 2013, 8290, pp.102-126. ⟨10.1007/978-3-642-45269-7_5⟩
Article dans une revue
hal-00926485v1
|
||
|
Proactive Online Scheduling for Shuffle Grouping in Distributed Stream Processing Systems[Research Report] LINA-University of Nantes; Sapienza Università di Roma (Italie). 2015
Rapport
hal-01246701v2
|
||
Preventive and corrective security solutions for routing in military tactical ad hoc networksMCC 2013, Oct 2013, Saint Malo, France. pp.149-165
Communication dans un congrès
hal-00919218v1
|
|||
|
Towards a Restrained Use of Non-equivocation for Achieving Iterative Approximate Byzantine Consensus30th IEEE International Parallel and Distributed Processing Symposium (IPDPS), May 2016, Chicago, United States. pp.10, ⟨10.1109/IPDPS.2016.62⟩
Communication dans un congrès
hal-01339477v1
|
||
Fourth IEEE Symposium on Network Cloud Computing and Applications, NCCA 2015IEEE, 2015, ISBN 978-1-4673-7741-6
Ouvrages
hal-01344687v1
|
|||
|
Yggdrasil: Secure State Sharding of Transactions and Smart Contracts that Self-adapts to Transaction Load2022
Pré-publication, Document de travail
hal-03793291v2
|
||
|
Sycomore ++ , un registre distribué orienté graphe auto-adaptatifAlgoTel 2022 - 24èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2022, Saint-Rémy-Lès-Chevreuse, France. pp.1-4
Communication dans un congrès
hal-03656546v1
|
||
La vie privée sur Internet, une question de confiance ?Journée Web et Confiance, Jan 2013, Lyon, France
Communication dans un congrès
hal-00777430v1
|
|||
|
A secure two-phase data deduplication scheme6th International Symposium on Cyberspace Safety and Security (CSS), Aug 2014, Paris, France
Communication dans un congrès
hal-01076918v1
|
||
|
Lutter contre les codes malveillantsInterstices, 2016
Article dans une revue
hal-01427326v1
|
||
The Not-so-distant Future: Distance-Bounding Protocols on Smartphones14th Smart Card Research and Advanced Application Conference, Nov 2015, Bochum, Germany. p.209-224, ⟨10.1007/978-3-319-31271-2_13⟩
Communication dans un congrès
hal-01244606v1
|
|||
|
Exploiting Rateless Coding in Structured Overlays to Achieve Persistent StorageNetworking and Internet Architecture [cs.NI]. Université Rennes 1, 2012. English. ⟨NNT : ⟩
Thèse
tel-00763284v1
|
||
From SSIR to CIDre: a New Security Research Group in Rennes1st SysSec Workshop, Jul 2011, Amsterdam, Netherlands
Communication dans un congrès
hal-00656940v1
|
|||
Outils informatiques pour la protection de la vie privéeInterstices, 2011, http://interstices.info/outils-protection
Article dans une revue
hal-00657244v1
|
|||
|
Dégradation de données par publication éphémère4ème Atelier sur la Protection de la Vie Privée (APVP'13), Jun 2013, Les Loges en Josas, France
Communication dans un congrès
hal-00845567v1
|
||
|
New results on a generalized coupon collector problem using Markov chainsJournal of Applied Probability, 2015, pp.17. ⟨10.1239/jap/1437658606⟩
Article dans une revue
hal-01189564v1
|
||
|
Relying on Consensus does not Make Bitcoin SaferFast Abstract in the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2016, Toulouse, France
Communication dans un congrès
hal-01316541v1
|
||
P3ERS: Privacy-Preserving PEer Review SystemTransactions on Data Privacy, 2012
Article dans une revue
hal-00737755v1
|
|||
Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'améliorationRendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
Communication dans un congrès
hal-01587915v1
|
|||
|
Towards privacy-driven design of a dynamic carpooling systemPervasive and Mobile Computing, 2014, 14, pp.71-82. ⟨10.1016/j.pmcj.2014.05.009⟩
Article dans une revue
hal-01242263v1
|
||
|
Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions DemandNCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, IEEE, Nov 2018, Boston, United States. pp.1-8, ⟨10.1109/NCA.2018.8548053⟩
Communication dans un congrès
hal-01888265v1
|
||
|
Highlight and execute suspicious paths in Android malwareCryptography and Security [cs.CR]. Université de Rennes, 2018. English. ⟨NNT : 2018REN1S090⟩
Thèse
tel-02132759v1
|
||
|
Analysis of Rumor Spreading with 2-pull or 3-pull OperationsNCA 2021 - 20th IEEE International Symposium on Network Computing and Applications, Nov 2021, Online, France. pp.1-8
Communication dans un congrès
hal-03438975v1
|
||
|
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range ArchitecturesFPS 2023 - 16th International Symposium on Foundations & Practice of Security, Dec 2023, Bordeaux, France. pp.1-16
Communication dans un congrès
hal-04317073v1
|
||
|
Balanced allocations and global clock in population protocols: An accurate analysisSIROCCO 2018 - 25th International Colloquium on Structural Information and Communication Complexity, Jun 2018, Ma'ale HaHamisha, Israel. p.296-311, ⟨10.1007/978-3-030-01325-7_26⟩
Communication dans un congrès
hal-01888301v1
|
||
Ransomware can always be detected but at which cost ?JATNA'04, Nov 2019, Oujda, Morocco
Communication dans un congrès
hal-02416070v1
|
|||
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM,International Journal of Information Security, 2018, pp.1-16. ⟨10.1007/s10207-018-0401-9⟩
Article dans une revue
hal-01887577v1
|
|||
|
Intrusion Survivability for Commodity Operating Systems and Services: A Work in ProgressRESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France
Communication dans un congrès
hal-02280376v1
|
||
|
A Semantic Overlay for Self- Peer-to-Peer Publish/SubscribeProceedings of the 26th International Conference on Distributed Computing Systems (ICDCS), Jul 2006, Lisboa, Portugal. pp.22 - 22, ⟨10.1109/ICDCS.2006.12⟩
Communication dans un congrès
hal-01099200v1
|
||
|
Novelty detection on graph structured data to detect network intrusionsCAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
Communication dans un congrès
hal-03115308v1
|