Skip to Main content Skip to Navigation

hal-01418390v1  Journal articles
Ziad IsmailChristophe KiennertJean LeneutreDavid BatemanLin Chen. Auditing a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical Analysis
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2016, 11, pp.1685-1699. ⟨10.1109/tifs.2016.2549002⟩
hal-02278598v1  Conference papers
Claude ChaudetIsabelle DemeureSalma KtariNicola CostagliolaSamuel Tardieu. Publish/Subscribe for Wireless Sensor Networks (Invited paper)
Asian Internet Engineering Conference (AINTEC) 2011, Nov 2011, Bangkok, Thailand
hal-01318315v1  Book sections
Stéphane BalletJulia PieltantMatthieu RambaudJeroen Sijsling. On some bounds for symmetric tensor rank of multiplication in finite fields
Alp Bassa, Alain Couvreur and David Kohel. ARITHMETIC, GEOMETRY, CRYPTOGRAPHY AND CODING THEORY, 686, AMER MATHEMATICAL SOC, pp.93 - 121, 2017, Contemporary Mathematics, 978-1-4704-2810-5. ⟨10.1090/conm/686/13779⟩
hal-02354923v1  Conference papers
Ashref AlouiMounira MsahliTalel AbdessalemStephane BressanSihem Mesnager. Protocol for preserving privacy in distributed system (PPDS)
2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Jun 2017, Valencia, France. pp.1885-1890, ⟨10.1109/IWCMC.2017.7986571⟩
hal-01212126v1  Conference papers
Han QiuGerard Memmi. Fast Selective Encryption Method for Bitmaps Based on GPU Acceleration
2014 IEEE International Symposium on Multimedia (ISM), Dec 2014, Taichung, Taiwan
hal-00854882v1  Books
Philippe LalandaMccann A. JulieAda Diaconescu. Autonomic Computing - Principles, Design and Implementation
Springer, pp.288, 2013, Undergraduate Topics in Computer Science, 978-1-4471-5007-7. ⟨10.1007/978-1-4471-5007-7⟩
hal-01615143v1  Book sections
Loic BesnardThierry GautierPaul Le GuernicClément GuyJean-Pierre Talpin et al.  Formal Semantics of Behavior Specifications in the Architecture Analysis and Design Language Standard
Cyber-Physical System Design from an Architecture Analysis Viewpoint, Springer, 2017, Cyber-Physical System Design from an Architecture Analysis Viewpoint, ⟨10.1007/978-981-10-4436-6_3⟩
hal-01423637v1  Conference papers
Pierre FraigniaudSergio RajsbaumCorentin TraversPetr KuznetsovThibault Rieutord. Perfect Failure Detection with Very Few Bits
18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2016, Lyon, France
hal-03168831v1  Reports
Rima Al-AliMoussa AmraniSoumyadip BandyopadhyayAnkica BarisicFernando Barros et al.  Framework to Relate / Combine Modeling Languages and Techniques
[Technical Report] COST European Cooperation in Science and Technology. 2019
hal-01304268v2  Conference papers
Claire CapdevielleColette JohnenPetr KuznetsovAlessia Milani. Complexité du consensus anonyme en l'absence de concurrence
ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016, Bayonne, France
hal-01411528v1  Conference papers
Claire CapdevielleColette JohnenPetr KuznetsovAlessia Milani. On the Uncontended Complexity of Anonymous Consensus
19th International Conference on Principles of Distributed Systems - OPODIS 2015, Dec 2015, Rennes, France. ⟨10.4230/LIPIcs.OPODIS.2015.12⟩
hal-01212143v1  Journal articles
Han QiuGerard Memmi. Fast Selective Encryption Methods for Bitmap Images
International Journal of Multimedia Data Engineering and Management (IJMDEM), 2015, 6 (51-69), pp.18
hal-02288435v1  Conference papers
Mounira MsahliAhmed Serhrouchni. SBaaS: Safe Box as a service
IEEE Internationale Conference, CollaborateCom, Oct 2013, Austin, Texas, United States
hal-02288436v1  Conference papers
Mounira MsahliAhmed Serhrouchni. PCM in cloud
IEEE International Conference on Granular Computing (GrC), Oct 2014, Noboribetsu, Japan
hal-02449649v1  Conference papers
Philippe LalandaAda Diaconescu. Integration of Pervasive Platforms with iCasa
2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W), Jun 2019, Umea, France. pp.49-51, ⟨10.1109/FAS-W.2019.00025⟩
hal-03024408v1  Conference papers
Antoine DurandGuillaume HébertKhalifa ToumiGérard MemmiEmmanuelle Anceaume. The StakeCube blockchain : Instantiation, Evaluation & Applications
BCCA 2020 - International Conference on Blockchain Computing and Applications, Nov 2020, Virtual, Turkey. pp.1-8
hal-01121019v1  Conference papers
Etienne BordeSmail RahmounFabien CadoretLaurent PautetFrank Singhoff et al.  Architecture Models Refinement for Fine Grain Timing Analysis of Embedded Systems
IEEE International Symposium on Rapid System Prototyping, Oct 2014, New Dehli, India
hal-01113223v1  Conference papers
Ziad IsmailJean LeneutreDavid BatemanLin Chen. A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
IEEE 16th International Symposium on High Assurance Systems Engineering (HASE), Jan 2015, Daytona Beach Shores, FL, United States. ⟨10.1109/HASE.2015.24⟩
hal-03559623v1  Conference papers
Petr KuznetsovAndrei TonkikhYan Zhang. Revisiting Optimal Resilience of Fast Byzantine Consensus
PODC '21: ACM Symposium on Principles of Distributed Computing, Jul 2021, Virtual Event Italy, France. pp.343-353, ⟨10.1145/3465084.3467924⟩
hal-00479569v1  Conference papers
Samuel TardieuAlexis Polti. Complementing Ada with other programming languages
ACM SIGAda international conference on Ada, 2009, St. Petersburg, United States. pp.105-114
hal-01246343v1  Conference papers
Amine NajiFlorian Brandner. A Comparative Study of the Precision of Stack Cache Occupancy Analyses
9th Junior Researcher Workshop on Real-Time Computing, Julien Forget, Nov 2015, Lille, France. pp.4