Filtrer vos résultats
- 38
- 22
- 12
- 11
- 4
- 2
- 1
- 1
- 47
- 44
- 18
- 14
- 13
- 10
- 10
- 8
- 7
- 6
- 6
- 6
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 89
- 3
- 2
- 1
- 1
- 1
- 1
- 89
- 62
- 62
- 28
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 91
- 91
- 91
- 91
- 89
- 89
- 63
- 62
- 62
- 62
- 41
- 41
- 41
- 41
- 41
- 41
- 41
- 40
- 40
- 39
- 28
- 28
- 22
- 10
- 10
- 9
- 7
- 7
- 7
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 81
- 10
- 65
- 26
- 1
- 1
- 1
- 1
- 3
- 2
- 1
- 1
- 1
- 2
- 2
- 2
- 4
- 8
- 11
- 3
- 6
- 5
- 5
- 7
- 3
- 12
- 4
- 5
91 résultats
Le Brain-Hacking ou la manipulation par les donnéesCNRS Editions. Médecine et intelligence artificielle, CNRS Editions, 2022, 978-2-271-14151-4
Chapitre d'ouvrage
hal-03956245v1
|
|||
|
A Hierarchical Mobile IPv6 ProposalRT-0226, INRIA. 1998, pp.25
Rapport
inria-00069945v1
|
||
|
HIPPCO: A High Performance Protocol Code OptimizerRR-2748, INRIA. 1995
Rapport
inria-00073944v1
|
||
|
Extending Mobile IP with Adaptive Individual Paging : A Performance Analysis[Technical Report] RT-0236, INRIA. 1999, pp.23
Rapport
inria-00069936v1
|
||
|
Securing Group Management in IPv6 with Cryptographically Generated Addresses[Research Report] RR-4523, INRIA. 2002
Rapport
inria-00072065v1
|
||
|
Tailored Protocol Development Using ESTEREL[Research Report] RR-2374, INRIA. 1994
Rapport
inria-00074302v1
|
||
|
Shake Them Up! A movement-based pairing protocol for CPU-constrained devices[Research Report] RR-5457, INRIA. 2006, pp.28
Rapport
inria-00070549v1
|
||
|
De la mobilité à la sécurité des réseauxRéseaux et télécommunications [cs.NI]. Institut National Polytechnique de Grenoble - INPG, 2008
HDR
tel-00414514v1
|
||
|
A hash-based paging and location update procedureWiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Mar 2003, Sophia Antipolis, France. 4 p
Communication dans un congrès
inria-00466582v1
|
||
|
TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network NodesWIOPT'07, 5th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Apr 2007, Limassol, Cyprus
Communication dans un congrès
inria-00190971v1
|
||
|
Geolocalization of proxied services and its application to fast-flux hidden serversProceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC), Nov 2009, Chicago, United States. pp.184--189, ⟨10.1145/1644893.1644915⟩
Communication dans un congrès
hal-00748235v1
|
||
|
Code injection attacks on harvard-architecture devicesCCS '08: Proceedings of the 15th ACM conference on Computer and communications security, Oct 2008, Alexandria, Virginia, United States. pp.15--26, ⟨10.1145/1455770.1455775⟩
Communication dans un congrès
inria-00355202v1
|
||
|
How Unique and Traceable Are Usernames?Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Jul 2011, Waterloo, Canada. pp.1-17, ⟨10.1007/978-3-642-22263-4_1⟩
Communication dans un congrès
hal-00747495v1
|
||
|
Hash-Based Dynamic Source Routing (HB-DSR)RR-4784, INRIA. 2003
Rapport
inria-00071802v1
|
||
|
How to convert any ID-based Signature Schemes into a Group Signature SchemeRR-4524, INRIA. 2002
Rapport
inria-00072064v1
|
||
|
IPv6 Opportunistic Encryption[Research Report] RR-4568, INRIA. 2002
Rapport
inria-00072020v1
|
||
|
Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012), Jul 2012, Vigo, Spain
Communication dans un congrès
hal-00747841v1
|
||
|
Differentially Private Histogram Publishing through Lossy CompressionICDM 2012 - 12th IEEE International Conference on Data Mining, Dec 2012, Brussels, Belgium. pp.1-10, ⟨10.1109/ICDM.2012.80⟩
Communication dans un congrès
hal-00747821v1
|
||
Renseignement : le traitement massif de données est aussi dangereux qu'inefficacePour la science, 2015, L'ère des méduses : pourquoi elles vont conquérir les océans, 453
Article dans une revue
hal-01247129v1
|
|||
|
Impact Analysis of Facial Recognition2020
Pré-publication, Document de travail
hal-02480647v1
|
||
Selling Off Privacy at AuctionNetwork and Distributed System Security Symposium (NDSS), ISOC, Nov 2014, San Diego, California, United States
Communication dans un congrès
hal-01087557v1
|
|||
|
Dataveillance and the False-Positive Paradox2018
Pré-publication, Document de travail
hal-01157921v2
|
||
|
From Dataveillance to Datapulation : The Dark Side of Targeted Persuasive Technologies2020
Pré-publication, Document de travail
hal-02904926v1
|
||
À propos du droit à l’oubli sur InternetInterstices, 2011
Article dans une revue
hal-01350401v1
|
|||
I'm 2.8% Neanderthal - The Beginning of Genetic Exhibitionism?Workshop on Genome Privacy, Jul 2014, Amsterdam, Netherlands, Netherlands
Communication dans un congrès
hal-01087696v1
|
|||
|
DoS-Resistant Self-Keying Mobile Ad-Hoc Networks[Research Report] RR-5373, INRIA. 2004, pp.28
Rapport
inria-00070630v1
|
||
|
Differentially Private Sequential Data Publication via Variable-Length N-GramsACM Computer and Communication Security (CCS), ACM, Oct 2012, Raleigh, United States
Communication dans un congrès
hal-00747830v1
|
||
Betrayed by Your Ads! Reconstructing User Pro les From Targeted Ads.Privacy Enhancing Technologies, Jul 2012, Vigo, Spain. pp.1--17
Communication dans un congrès
hal-00748156v1
|
|||
|
Probabilistic k$^m$-anonymityIEEE Internation Conference on Big Data (BigData) 2015, Oct 2015, Santa Clara, United States
Communication dans un congrès
hal-01205533v1
|
||
Les failles de la loi sur le renseignementLa Recherche, 2015, 505
Article dans une revue
hal-01247131v1
|