Managing your digital life, Commun. ACM, vol.58, pp.32-35, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01068006
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable, NDSS, vol.9, pp.341-353, 2009. ,
Cozy allow you to control your personal data (pictures, bank statements, bills, health reinbursements) in a secure and private space, 2013. ,
The mesinfos project explores and implements the self data concept in france, vol.3, 2013. ,
Have I been pwned? Check if you have an account that has been compromised in a data breach, 2013. ,
Supporting secure keyword search in the personal cloud, Information Systems, vol.72, pp.1-26, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01660599
Innovative instructions and software model for isolated execution, HASP@ ISCA, vol.10, 2013. ,
Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, pp.32016-0679, 2016. ,
A scalable content-addressable network, vol.31, 2001. ,
How to share a secret, Commun. ACM, vol.22, pp.612-613, 1979. ,
Chord: A scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM Computer Communication Review, vol.31, pp.149-160, 2001. ,