<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Bkakria, Anis"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Aller à : B | S
Nombre de documents: 12

B

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Tasidou, A. (2021). Information theoretic-based privacy risk evaluation for data anonymization. Journal of Surveillance, Security and Safety, 2, 83-102. Disponible

Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020). Privacy-Preserving Pattern Matching on Encrypted Data. IACR Cryptol. ePrint Arch., 2020, 28 pages. Lien externe

Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (décembre 2020). Privacy-Preserving Pattern Matching on Encrypted Data [Communication écrite]. 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea. Lien externe

Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (octobre 2018). Linking Differential Identifiability with Differential Privacy [Communication écrite]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. Lien externe

Bkakria, A., Tasidou, A., Boulahia Cuppens, N., Cuppens, F., Bouattour, F., & Fredj, F. B. (octobre 2018). Optimal Distribution of Privacy Budget in Differential Privacy [Communication écrite]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. Lien externe

Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (décembre 2017). Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems [Communication écrite]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. Lien externe

Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (août 2017). Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper) [Communication écrite]. 15th annual Conference on Privacy, Security and Trust (PST 2017), Calgary, AB, Canada. Lien externe

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (octobre 2015). Security Mechanisms Planning to Enforce Security Policies [Communication écrite]. 8th International Symposium on Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France. Lien externe

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (juillet 2014). Specification and Deployment of Integrated Security Policies for Outsourced Data [Communication écrite]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. Lien externe

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Fernandez, J. M. (mars 2013). Confidentiality-preserving query execution of fragmented outsourced data [Communication écrite]. International Conference on Information and Communication Technology (ICT-EurAsia 2013), Yogyakarta, Indonesia. Lien externe

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., Fernandez, J. M., & Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), 39-62. Lien externe

S

Schaad, A., Bkakria, A., Kerschbaum, F., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (juin 2014). Optimized and controlled provisioning of encrypted outsourced data [Communication écrite]. 19th ACM symposium on Access control models and technologies, London, Ontario, Canada. Lien externe

Liste produite: Fri Apr 26 03:48:20 2024 EDT.