RST – Publications

Retrouvez ici l’ensemble des publications du département RST, ainsi que les futures contributions scientifiques à venir. Cette page sera régulièrement enrichie pour refléter la diversité et la richesse de nos travaux de recherche.

1384 documents

  • Ibrahim Tariq Javed, Khalifa Toumi, Noel Crespi. N-Combat: a nuisance call combating framework for internet telephony. TrustCom/BigDataSE 2018: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering, Aug 2018, New York, United States. pp.112 - 117, ⟨10.1109/TrustCom/BigDataSE.2018.00027⟩. ⟨hal-01988338⟩
  • Sana Belguith, Nesrine Kaaniche, Giovanni Russello. Lightweight attribute-based encryption supporting access policy update for cloud assited IoT. Secrypt 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.135-146, ⟨10.5220/0006854603010312⟩. ⟨hal-03991119⟩
  • Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.168 - 176, ⟨10.5220/0006855601680176⟩. ⟨hal-01864317⟩
  • Nesrine Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.155 - 167, ⟨10.5220/0006855501550167⟩. ⟨hal-01850387⟩
  • Pierre-Edouard Fabre, Jouni Viinikka, Hervé Debar, Gregory Blanc. Network visibility-aware blacklist generation. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.7 - 15. ⟨hal-01987693⟩
  • Pierre-Marie Bajan, Hervé Debar, Christophe Kiennert. A new approach of network simulation for data generation in evaluating security products. ICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.35-41. ⟨hal-01901017⟩
  • Swapnil Dhamal, Walid Ben-Ameur, Tijani Chahed, Eitan Altman. Manipulating opinion dynamics in social networks in two phases. SocInf+MAISoN 2018: 1st Joint International Workshop on Social Influence Analysis and Mining Actionable Insights from Social Networks, Jul 2018, Stockholm, Sweden. ⟨hal-01800311v3⟩
  • Swapnil Dhamal, Walid Ben-Ameur, Tijani Chahed, Eitan Altman. Optimal multiphase investment strategies for influencing opinions in a social network. AAMAS 2018: 17th international conference on Autonomous Agents and Multiagent Systems, Jul 2018, Stockholm, Sweden. pp.1927-1929, ⟨10.5555/3237383.3238026⟩. ⟨hal-01716062v2⟩
  • Mohamed Ibn Khedher, Houda Jmila, Mounim El Yacoubi. Fusion of interest point/image based descriptors for efficient person re-identification. IJCNN 2018 : International Joint Conference on Neural Networks, Jul 2018, Rio De Janeiro, Brazil. pp.1 - 7, ⟨10.1109/IJCNN.2018.8489111⟩. ⟨hal-01901844⟩
  • Nesrine Kaaniche, Maryline Laurent. BDUA: blockchain-based data usage auditing. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Jul 2018, San Francisco, United States. pp.630-637, ⟨10.1109/CLOUD.2018.00087⟩. ⟨hal-03754087⟩

© Télécom SudParis – Siret : 180 092 025 00055 – APE : 8542Z