Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Tasidou, A. (2021). Information theoretic-based privacy risk evaluation for data anonymization. Journal of Surveillance, Security and Safety, 2, 83-102. Available
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020). Privacy-Preserving Pattern Matching on Encrypted Data. IACR Cryptol. ePrint Arch., 2020, 28 pages. External link
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020, December). Privacy-Preserving Pattern Matching on Encrypted Data [Paper]. 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea. External link
Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2018, October). Linking Differential Identifiability with Differential Privacy [Paper]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. External link
Bkakria, A., Tasidou, A., Boulahia Cuppens, N., Cuppens, F., Bouattour, F., & Fredj, F. B. (2018, October). Optimal Distribution of Privacy Budget in Differential Privacy [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link
Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2017, December). Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems [Paper]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. External link
Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2017, August). Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper) [Paper]. 15th annual Conference on Privacy, Security and Trust (PST 2017), Calgary, AB, Canada. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2015, October). Security Mechanisms Planning to Enforce Security Policies [Paper]. 8th International Symposium on Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France. External link
Schaad, A., Bkakria, A., Kerschbaum, F., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2014, June). Optimized and controlled provisioning of encrypted outsourced data [Paper]. 19th ACM symposium on Access control models and technologies, London, Ontario, Canada. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2014, July). Specification and Deployment of Integrated Security Policies for Outsourced Data [Paper]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Fernandez, J. M. (2013, March). Confidentiality-preserving query execution of fragmented outsourced data [Paper]. International Conference on Information and Communication Technology (ICT-EurAsia 2013), Yogyakarta, Indonesia. External link
Bkakria, A., Cuppens, F., Boulahia Cuppens, N., Fernandez, J. M., & Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), 39-62. External link