Recherche - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu

Filtrer vos résultats

370 résultats
keyword_s : Privacy
Image document

APISENSE® : une plate-forme répartie pour la conception,le déploiement et l'exécution de campagnes de collecte de données sur des terminaux intelligents

Nicolas Haderer
Informatique mobile. Université des Sciences et Technologie de Lille - Lille I, 2014. Français. ⟨NNT : ⟩
Thèse tel-01087240v1
Image document

Scalable and Privacy-Preserving Admission Control for Smart Grids

Giovanni Neglia , Giuseppe Di Bella , Laura Giarré , Ilenia Tinnirello
[Research Report] RR-8769, Inria Sophia Antipolis. 2015
Rapport hal-01193294v1

Privacy Harm Analysis: a Case Study on Smart Grids

Daniel Le Métayer , Sourya Joyee De
International Workshop on Privacy Engineering (IWPE 2016), May 2016, San Jose, United States
Communication dans un congrès hal-01403889v1
Image document

Demo : Data Minimization and Informed Consent in Administrative Forms

Nicolas Anciaux , Sabine Frittella , Baptiste Joffroy , Benjamin Nguyen
ACM CCS 2023 - Conference on Computer and Communications Security, Nov 2023, Copenhagen, Denmark. ⟨10.1145/3576915.3624363⟩
Communication dans un congrès hal-04240432v1

Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, revised selected papers

Abdessamad Imine , José M. Fernandez , Jean-Yves Marion , Luigi Logrippo , Joaquin Garcia-Alfaro
FPS 2017 - 10th International Symposium on Foundations and Practice of Security, Oct 2017, Nancy, France. Lecture Notes in Computer Science, 10723, pp.319, 2018, FPS: International Symposium on Foundations and Practice of Security, 978-3-319-75649-3. ⟨10.1007/978-3-319-75650-9⟩
N°spécial de revue/special issue hal-01869014v1
Image document

Overview of real-world deployment of physical analytics systems

Célestin Matte , Mathieu Cunche
[Research Report] RR-9143, Inria Grenoble Rhône-Alpes. 2018, pp.18
Rapport hal-01682373v1
Image document

MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences

Jagdish Prasad Achara , Javier Parra-Arnau , Claude Castelluccia
2016
Pré-publication, Document de travail hal-01302613v1
Image document

Protecting Privacy of Web Users

Nataliia Bielova
Computer Science [cs]. Universite cote d'Azur, 2021
HDR tel-04296294v1

AAL and Static Conflict Detection in Policy

Jean-Claude Royer , Anderson Santana de Oliveira
15th International Conference on Cryptology and Network Security, Nov 2016, Milan, Italy. pp.362-382, ⟨10.1007/978-3-319-48965-0_22⟩
Communication dans un congrès hal-01396376v1
Image document

Intrusion Detections in Collaborative Organizations by Preserving Privacy

Verma Nischal , François Trousset , Pascal Poncelet , Florent Masseglia
Fabrice Guillet and Gilbert Ritschard and Djamel Abdelkader Zighed and Henri Briand. Advances in Knowledge Discovery and Management, 292, Springer, pp.235-247, 2010, Studies in Computational Intelligence, 978-3-642-00579-4. ⟨10.1007/978-3-642-00580-0_14⟩
Chapitre d'ouvrage lirmm-00430642v1
Image document

Detecting smartphone state changes through a Bluetooth based timing attack

Guillaume Celosia , Mathieu Cunche
WiSec '18 - 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.154-159, ⟨10.1145/3212480.3212494⟩
Communication dans un congrès hal-01870011v1
Image document

A Distributed Information Filtering: Stakes and solution for satellite broadcasting

Sylvain Castagnos , Anne Boyer , François Charpillet
First International Conference on Web Information Systems and Technologies (WEBIST'05), Institute for Systems and Technologies of Information, Control and Communication (INSTICC), May 2005, Miami/USA, pp.299-304
Communication dans un congrès inria-00000508v1
Image document

Decentralizing news personalization systems

Antoine Boutet
Other [cs.OH]. Université Rennes 1, 2013. English. ⟨NNT : 2013REN1S023⟩
Thèse tel-00861370v1
Image document

Private Similarity Computation in Distributed Systems: from Cryptography to Differential Privacy

Mohammad Alaggan , Sébastien Gambs , Anne-Marie Kermarrec
OPODIS, Dec 2011, Toulouse, France. pp.357 - 377
Communication dans un congrès hal-00646831v1
Image document

Homomorphic Cryptography-based Privacy-Preserving Network Communications

Antoine Guellier , Christophe Bidan , Nicolas Prigent
Applications and Techniques in Information Security, Batten, Lynn and Li, Gang and Niu, Wenjia and Warren, Matthew, Nov 2014, Deakin University, Melbourne, VIC, Australia, France. pp.159-170, ⟨10.1007/978-3-662-45670-5_15⟩
Communication dans un congrès hal-01088441v1
Image document

MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs

Jagdish Prasad Achara , Vincent Roca , Claude Castelluccia , Aurelien Francillon
2016
Pré-publication, Document de travail hal-01322286v1
Image document

Context-aware computing using a shared contextual information service

Nancy Miller , Glenn Judd , Urs Hengartner , Fabien Gandon , Peter Steenkiste , et al.
Advances in Pervasive Computing. A Collection of Contributions Presented at the 2nd International Conference on Pervasive Computing (Pervasive 2004), Austrian Computer Society (OCG), Apr 2004, Vienna, Austria
Communication dans un congrès hal-01149747v1
Image document

On the tradeoffs of statistical learning with privacy

Clément Lalanne
Machine Learning [cs.LG]. ENS Lyon, 2023. English. ⟨NNT : 2023ENSL0068⟩
Thèse tel-04431813v1
Image document

Linking wireless devices using information contained in Wi-Fi probe requests

Mathieu Cunche , Mohamed Ali Kaafar , Roksana Boreli
Pervasive and Mobile Computing, 2013, ⟨10.1016/j.pmcj.2013.04.001⟩
Article dans une revue hal-00816374v1
Image document

I know your MAC address: targeted tracking of individual using Wi-Fi

Mathieu Cunche
Journal of Computer Virology and Hacking Techniques, 2013, ⟨10.1007/s11416-013-0196-1⟩
Article dans une revue hal-00923467v1
Image document

A Generic Information and Consent Framework for the IoT

Daniel Le Métayer , Victor Morel , Mathieu Cunche
[Research Report] RR-9234, Inria. 2018, pp.1-18
Rapport hal-01953052v1
Image document

Practical Fully-Decentralized Secure Aggregation for Personal Data Management Systems

Julien Mirval , Luc Bouganim , Iulian Sandu Popa
33rd International Conference on Scientific and Statistical Database Management, SSDBM 2021, Jul 2021, Tampla, FL, United States. pp.259-264, ⟨10.1145/3468791.3468821⟩
Communication dans un congrès hal-03329878v1
Image document

Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation

Mariem Brahem , Guillaume Scerri , Nicolas Anciaux , Valerie Issarny
PerCom 2021 - IEEE International Conference on Pervasive Computing and Communications, Mar 2021, Kassel / Virtual, Germany
Communication dans un congrès hal-03097047v3
Image document

Sharing and Usage Control of Personal Information

Athanasia Katsouraki
Databases [cs.DB]. Université Paris Saclay, 2016. English. ⟨NNT : 2016SACLV089⟩
Thèse tel-01425638v1
Image document

Towards an evolution in the characterization of the risk of re-identification of medical images

Antoine Boutet , Carole Frindel , Mohamed Maouche
BigData 2023 - IEEE International Conference on Big Data, Dec 2023, Sorrento, Italy. pp.1-6
Communication dans un congrès hal-04299422v1

On the Impact of Output Perturbation on Fairness in Binary Linear Classification

Vitalii Emelianov , Michaël Perrot
2024
Pré-publication, Document de travail hal-04440982v1
Image document

The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions

Harry Halpin
SPACE 2017 - Seventh International Conference on Security, Privacy, and Applied Cryptography Engineering, Dec 2017, Goa, India. pp.10-29, ⟨10.1007/978-3-319-71501-8_2⟩
Communication dans un congrès hal-01673296v1
Image document

Electronic Voting: Definitions and Analysis Techniques

Joseph Lallemand
Cryptography and Security [cs.CR]. Université de Lorraine, 2019. English. ⟨NNT : 2019LORR0135⟩
Thèse tel-02396851v1
Image document

On Consent in Online Social Networks: Privacy Impacts and Research Directions

Sourya Joyee De , Abdessamad Imine
[Research Report] RR-9197, Inria Nancy - Grand Est. 2018
Rapport hal-01851759v2
Image document

A note on replay attacks that violate privacy in electronic voting schemes

Ben Smyth , Véronique Cortier
[Research Report] RR-7643, INRIA. 2011
Rapport inria-00599182v1