Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Alexandre ANZALA YAMAJAKO"'
Publikováno v:
Communications in Computer and Information Science
Communications in Computer and Information Science, 2019, E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, 990, pp.253-277
Communications in Computer and Information Science, Springer Verlag, 2019, E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, 990, pp.253-277
E-Business and Telecommunications ISBN: 9783030110383
ICETE (Selected Papers)
Communications in Computer and Information Science, 2019, E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, 990, pp.253-277
Communications in Computer and Information Science, Springer Verlag, 2019, E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper, 990, pp.253-277
E-Business and Telecommunications ISBN: 9783030110383
ICETE (Selected Papers)
Symmetric Searchable Encryption (\(\mathrm {SSE}\)) schemes enable clients to securely outsource their data while maintaining the ability to perform keywords search over it. The security of these schemes is based on an explicit leakage profile [1], h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f7c2081acd23ab277a7906ed9d38b741
https://hal.science/hal-01990354/document
https://hal.science/hal-01990354/document
Autor:
Arnaud Souillé, Ary Kokos, Gérôme Billois, Christophe Wolfhugel, Laurent Bloch, Alexandre Anzala-Yamajako, Thomas Debize
Une bible pratique pour le responsable informatique Écrit par un responsable de la sécurité des systèmes d'information devenu DSI et par des experts des réseaux, des systèmes, de l'audit de sécurité et de la cryptologie, ce livre limpide expo
Autor:
Martin DEUTSCHMANN, Sandra LATTACHER, Jeroen DELVAUX, Vladimir ROZIC, Bohan YANG, Dave SINGELEE, Lilian BOSSUET, Viktor FISCHER, Ugo MUREDDU, Oto PETURA, Alexandre ANZALA YAMAJAKO, Bernard KASSER, Gerard BATTUM
This report represents the final version of Deliverable 2.1 of the HECTOR work package WP2. It is a result of discussions and work on Task 2.1 of all HECTOR partners involved in WP2. The aim of the Deliverable 2.1 is to select principles of random nu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e10c6a1c9a7868bb604e64daef81c9e5
Autor:
Alexandre Anzala-Yamajako
Publikováno v:
ACM SIGACT News. 43:13-16
Publikováno v:
Scopus-Elsevier
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
14th International Conference on Security and Cryptography SECRYPT 2017
14th International Conference on Security and Cryptography SECRYPT 2017, Jul 2017, Madrid, France. ⟨10.5220/0006461202000211⟩
SECRYPT
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
14th International Conference on Security and Cryptography SECRYPT 2017
14th International Conference on Security and Cryptography SECRYPT 2017, Jul 2017, Madrid, France. ⟨10.5220/0006461202000211⟩
SECRYPT
International audience; Symmetric Searchable Encryption (SSE) schemes solve efficiently the problem of securely outsourcing client data with search functionality. These schemes are provably secure with respect to an explicit leakage profile; however,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3563c23eb2d43fdc41e7a73fc2ceddd6
http://www.scopus.com/inward/record.url?eid=2-s2.0-85029409325&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85029409325&partnerID=MN8TOARS