Practical multi-candidate election system, Proceedings of the twentieth annual ACM symposium on Principles of distributed computing , PODC '01, pp.274-283, 2001. ,
DOI : 10.1145/383962.384044
URL : https://hal.archives-ouvertes.fr/inria-00565273
Order-Preserving Symmetric Encryption Secure Localization with Hidden and Mobile Base Stations, Advances in Cryptology -EUROCRYPT 2009 Int'l Conf. on Computer Communication (INFOCOM 2006), 2006. 5. S. ? Capkun and J.-P. Hubaux. Secure Positioning of Wireless Devices with Application to Sensor Networks INFOCOM 2005: 24th Annual Joint Conf. of the IEEE Computer and Communications Societies, pp.224-241, 2005. ,
Inferring Identity Using Accelerometers in Television Remote Controls, Pervasive Computing, pp.151-167, 2009. ,
DOI : 10.1007/978-3-642-01516-8_11
Secure and precise location verification using distance bounding and simultaneous multilateration, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.181-192, 2009. ,
DOI : 10.1145/1514274.1514301
A Generalisation, a Simplification and some Applications of Paillier???s Probabilistic Public-Key System, Public Key Cryptography, pp.119-136, 2001. ,
DOI : 10.7146/brics.v7i45.20212
A Fully Homomorphic Encryption Scheme, 2009. ,
Implementing Gentrys Fully-Homomorphic Encryption Scheme, Advances in Cryptology -EUROCRYPT 2011, pp.129-148, 2011. ,
How to Play Any Mental Game -A Completeness Theorem for Protocols with Honest Majority, Proc. 19th ACM symposium on Theory of Computing, pp.218-229, 1987. ,
Tamper-Resistant Storage Techniques for Multimedia Systems, Electronic Imaging 2005 International Society for Optics and Photonics, pp.30-40, 2005. ,
Implicit Authentication for Mobile Devices, Proc. of the 4th USENIX conf. on Hot Topics in Security. USENIX Association, 2009. ,
Gait-based recognition of humans using continuous HMMs, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition, pp.336-341, 2002. ,
DOI : 10.1109/AFGR.2002.1004176
Inference Attacks on Location Tracks, Pervasive Computing, pp.127-143, 2007. ,
DOI : 10.1007/978-3-540-72037-9_8
Dynamic identity verification via keystroke characteristics, International Journal of Man-Machine Studies, vol.35, issue.6, pp.859-870, 1991. ,
DOI : 10.1016/S0020-7373(05)80165-8
A polymer/semiconductor write-once read-many-times memory, Nature, vol.426, issue.6963, pp.426166-169, 2003. ,
DOI : 10.1038/nature02070
Authentication via keystroke dynamics, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.48-56, 1997. ,
DOI : 10.1145/266420.266434
Towards Behaviometric Security Systems: Learning to Identify a Typist, Knowledge Discovery in Databases: PKDD 2003, pp.363-374, 2003. ,
DOI : 10.1007/978-3-540-39804-2_33
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in cryptology -EUROCRYPT99, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Privacy-Preserving Implicit Authentication, Cryptology ePrint Archive, vol.203203, 2014. ,
DOI : 10.1007/978-3-642-55415-5_40
URL : https://hal.archives-ouvertes.fr/hal-01370405
Private Fingerprint Matching, Information Security and Privacy, pp.426-433, 2012. ,
DOI : 10.1007/978-3-642-31448-3_32
Location verification using secure distance bounding protocols, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005., pp.840-846, 2005. ,
DOI : 10.1109/MAHSS.2005.1542879
A correlation attack against user mobility privacy in a large-scale WLAN network, Proceedings of the 2010 ACM workshop on Wireless of the students, by the students, for the students, S3 '10, pp.33-36, 2010. ,
DOI : 10.1145/1860039.1860050
Password Authentication Schemes: Current Status and Key Issues, IJ Network Security, vol.3, issue.2, pp.101-115, 2006. ,
A New Fingerprint-Based Remote User Authentication Scheme Using Mobile Devices, Int'l Conf. on Apperceiving Computing and Intelligence Analysis, pp.65-68, 2009. ,
How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986. ,
DOI : 10.1109/SFCS.1986.25