Recent publications
Recent publications
-
October 2017
Report
Embedded proofs for verifiable neural networks
Cryptology ePrint Archive: Report 2017/1038
-
September 2017
Conference
Formal specification of security guidelines for program certification
TASE 2017, 11th International Symposium on Theoretical Aspects of Software Engineering, September 13-15, 2017, Nice, France
-
September 2017
Talk
Selected security and privacy schemes for coud computing
Invited Talk, Secure Cloud Services and Storage Workshop, NTNU, Norwegian Research Council, 10 September 2017, Oslo, Norway
-
June 2017
Journal
Online-offline homomorphic signatures for polynomial functions
Eprint, 2017
-
April 2017
Conference
Reconciling security and functional requirements in multi-tenant clouds
SCC 2017, 5th International Workshop on Security in Cloud Copmuting, in conjunction with ASIACCS 2017, 2 April 2017, Abu Dhabi, United Arab Emirates
-
February 2017
Conference
Tracking dependent information flows
ICISSP 2017, 3rd International Conference on Information Systems Security and Privacy, February 19-21, 2017, Porto, Portugal
-
January 2017
Conference
Formal specification and verification of security guidelines
PRDC 2017, IEEE Pacific Rim International Symposium on Dependable Computing, January 22-25, 2017, Christchurch, New Zealand
-
January 2017
HDR
Security and privacy for emerging technologies
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
October 2016
Conference
Message-locked proofs of retrievability with secure deduplication
CCSW 2016, 8th ACM Cloud Computing Security Workshop in Conjunction with CCS 2016, 28 October 2016, Vienna, Austria
-
September 2016
Conference
Security guidelines: Requirements engineering for verifying code quality
ESPRE 2016, 3rd International Workshop on Evolving Security and Privacy Requirements Engineering, September 12th, 2016, Beijing, China, co-located with the 24th IEEE International Requirements Engineering Conference
-
May 2016
Conference
Efficient techniques for publicly verifiable delegation of computation
ASIACCS 2016, 11th ACM Asia Conference on Computer and Communications Security, May 30-June 3, 2016, Xi'ian, China
-
January 2016
Journal
TREDISEC: Towards realizing a truly secure and trustworthy cloud
ERCIM News, Special theme: Tackling Big Data in the Life Sciences, N°104, January 2016
-
December 2015
HDR
Advances in the design and engineering of secure distributed systems
Habilitation à diriger des recherches (French qualification for conducting Phd theses)
-
December 2015
Conference
TREDISEC: Trust-aware reliable and distributed information security in the cloud
E-DEMOCRACY 2015, 6th International Conference on e-Democracy, December 10-11, 2015, Athens, Greece
-
December 2015
Conference
PUDA - Privacy and unforgeability for data aggregation
CANS 2015, 14th International Conference on Cryptology and Network Security, 8-12 December 2015, Morocco, Marrakesh / Also published in LNCS, Volume 9476/2015
-
December 2015
Report
Security for vehicular DTNs
Research Report RR-16-310
-
November 2015
Report
Data security and privacy - Threats model and state of the art
Research Report RR-16-309
-
September 2015
Conference
Publicly verifiable conjunctive keyword search in outsourced databases
SPC 2015, 1st IEEE Workshop on Security and Privacy in the Cloud, 30 September 2015, Florence, Italy
-
September 2015
Conference
PerfectDedup: Secure data deduplication
DPM 2015, 10th International Workshop on Data Privacy Management, September 21-22, 2015, Vienna, Austria
-
August 2015
Report
Multi-user searchable encryption in the cloud
Research Report RR-15-306
-
August 2015
Conference
Towards a new architecture for autonomous data collection
ISPRS 2015, International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XL-3/W3, 2015, ISPRS Geospatial Week 2015, 28 September-3 October 2015, La Grande Motte, France
-
August 2015
Talk
Privacy and verifiability for data storage in cloud computing
IFIP Summer School 2015, Keynote speech, 16-21 August 2015, Edinburgh, UK
-
June 2015
Report
PUDA - Privacy and Unforgeability for Data Aggregation
Cryptology ePrint Archive: Report 2015/562
-
May 2015
Talk
Autonomous drones for disasters management: Safety and security verifications
AT-RASC 2015, 1st URSI Atlantic Radio Science Conference, 18-22 May 2015, Gran Canaria, Canary Islands, Spain
-
April 2015
Report
Publicly verifiable keyword search in outsourced databases
Research Report RR-15-303
-
February 2015
Conference
SysML-Sec: A model driven approach for designing safe and secure systems
MODELSWARD 2015, 3rd International Conference on Model-Driven Engineering and Software Development, Special session on Security and Privacy in Model Based Engineering, 9-11 February 2015, Angers, France
-
February 2015
Conference
Designing safe and secure embedded and cyber-physical systems with SysML-sec
MODELSWARD 2015, 3rd International Conference on Model-Driven Engineering and Software Development, 9-11 February 2015, Angers, France / Also published in Communications in Computer and Information Science, Vol. 580
-
January 2015
Journal
Améliorer la sécurité et la sûreté de fonctionnement par l'ingénierie de système dirigée par les modèles
Revue de l'Electricité et de l'Electronique (REE), January 2015, N°5/2014