Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Gerard Memmi"'
Publikováno v:
IEEE Internet of Things Journal
IEEE Internet of Things Journal, 2021, 8 (13), pp.10327-10335. ⟨10.1109/JIOT.2020.3048038⟩
IEEE Internet of Things Journal, 2021, 8 (13), pp.10327-10335. ⟨10.1109/JIOT.2020.3048038⟩
Deep learning (DL) has gained popularity in network intrusion detection, due to its strong capability of recognizing subtle differences between normal and malicious network activities. Although a variety of methods have been designed to leverage DL m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::efa0573a9cb516792b6f7b41326da5a7
https://telecom-paris.hal.science/hal-03559698
https://telecom-paris.hal.science/hal-03559698
Publikováno v:
Annals of Telecommunications-annales des télécommunications
Annals of Telecommunications-annales des télécommunications, Springer, 2019, 74 (3-4), pp.157-165. ⟨10.1007/s12243-018-0684-x⟩
Annals of Telecommunications-annales des télécommunications, Springer, 2019, 74 (3-4), pp.157-165. ⟨10.1007/s12243-018-0684-x⟩
Data fragmentation and dispersion is recognized as a way of providing confidentiality and availability of data stored inside unattended wireless sensor networks. This paper introduces an additively homomorphic encryption and fragmentation scheme (AHE
Publikováno v:
BCCA
Blockchains have seen a recent rise in popularity as a generic solution for trustless distributed applications across a wide range of industries. However, blockchain protocols have faced scalability issues in applications involving a growing number o
Publikováno v:
AsiaCCS
AsiaCCS, Sep 2020, taipei, Taiwan. ⟨10.1145/3320269.3372198⟩
AsiaCCS, Sep 2020, taipei, Taiwan. ⟨10.1145/3320269.3372198⟩
International audience; This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker. It comes with several con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1c6a551d15b942526be554075e3d3670
https://hal.telecom-paris.fr/hal-03024707
https://hal.telecom-paris.fr/hal-03024707
Publikováno v:
Smart Computing and Communication
Smart Computing and Communication, Oct 2019, Birmingham, United Kingdom. pp.266-276, ⟨10.1007/978-3-030-34139-8_26⟩
Lecture Notes in Computer Science ISBN: 9783030341381
SmartCom
Smart Computing and Communication, Oct 2019, Birmingham, United Kingdom. pp.266-276, ⟨10.1007/978-3-030-34139-8_26⟩
Lecture Notes in Computer Science ISBN: 9783030341381
SmartCom
With the deployment of multimedia compression techniques, contents such as images or videos are transmitted through resource-constrained networks such as Internet of Things (IoT) scenarios. Traditional multimedia compression methods based on spatial-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b3ce08bc5d5c28d2376d64eaad18ac3b
https://hal.telecom-paris.fr/hal-02450312
https://hal.telecom-paris.fr/hal-02450312
Publikováno v:
Information Fusion
Information Fusion, Elsevier, 2019, 50, pp.212-220. ⟨10.1016/j.inffus.2019.02.002⟩
Information Fusion, Elsevier, 2019, 50, pp.212-220. ⟨10.1016/j.inffus.2019.02.002⟩
Data fusion in Vehicle-to-Everything (V2X) networks for different data types coming from different sources is the foundation for decision making in the smart vehicle driving systems. Different communication technologies have been combined to form a h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f1a54c658408e9569b3a837c9225e061
https://hal.telecom-paris.fr/hal-02450299
https://hal.telecom-paris.fr/hal-02450299
Publikováno v:
Future Generation Computer Systems
Future Generation Computer Systems, Elsevier, 2019, 96, pp.23-31. ⟨10.1016/j.future.2019.01.037⟩
Future Generation Computer Systems, Elsevier, 2019, 96, pp.23-31. ⟨10.1016/j.future.2019.01.037⟩
With the development of data based technology, data transmission methods for ubiquitous computing and communication systems are more and more needed. There are various kinds of data processing techniques such as compression or coding to improve the t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fb02f56cff810dda8b19a7003fd20edb
https://hal.telecom-paris.fr/hal-02450213
https://hal.telecom-paris.fr/hal-02450213
Publikováno v:
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Jun 2019, CANARY ISLANDS, France. pp.1-5, ⟨10.1109/NTMS.2019.8763850⟩
NTMS
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Jun 2019, CANARY ISLANDS, France. pp.1-5, ⟨10.1109/NTMS.2019.8763850⟩
NTMS
With the introduction of recent regulations concerning data privacy, encrypting data before uploading it to a public cloud becomes a widespread approach. Such processing reinforces data confidentiality but raises a challenge for efficient access revo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6b58b52fdf8b346c209d9fb96d5c07b5
https://hal.telecom-paris.fr/hal-02450309
https://hal.telecom-paris.fr/hal-02450309
Publikováno v:
CSCloud/EdgeCom
2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Jun 2019, Paris, France. pp.7-9, ⟨10.1109/CSCloud/EdgeCom.2019.00011⟩
2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Jun 2019, Paris, France. pp.7-9, ⟨10.1109/CSCloud/EdgeCom.2019.00011⟩
The Secure Fragmentation and Dispersal (SFD) scheme fragments and disperses encrypted data over at least two storage clouds. It increases the space complexity of a bruteforce search that has to be performed by an attacker unable to compromise the tot
Publikováno v:
INFOCOM Workshops
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Apr 2019, Paris, France. pp.1051-1052, ⟨10.1109/INFCOMW.2019.8845243⟩
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Apr 2019, Paris, France. pp.1051-1052, ⟨10.1109/INFCOMW.2019.8845243⟩
Outsourcing data to the cloud raise several security challenges. Among others, a user may fear that their data could be exposed during a data breach, misused by the storage provider, or acquired by an attacker observing communication channels. In thi