The emergence of personal mobile devices, with communication and positioning features, is leading to new use cases and personalized services. However, they imply a significant collection of personal data and therefore require appropriate security solutions. Indeed, users are not always aware of the personal and sensitive information that can be inferred from their use. The main objective of this thesis is to show how cryptographic mechanisms and data anonymization techniques can reconcile privacy, security requirements and utility of the service provided.In the first part, we study keyed-verification anonymous credentials which guarantee the anonymity of users with respect to a given service provider: a user proves that she is granted acces...
The benefit of performing Big data computations over individual’s microdata is manifold, in the medi...
The benefit of performing Big data computations over individual’s microdata is manifold, in the medi...
Machine to Machine (M2M) applications enable a better management of resources and provide users With...
The emergence of personal mobile devices, with communication and positioning features, is leading to...
The emergence of personal mobile devices, with communication and positioning features, is leading to...
The emergence of personal mobile devices, with communication and positioning features, is leading to...
L'émergence de terminaux mobiles personnels, capables à la fois de communiquer et de se positionner,...
New technologies offer greater convenience for end-users but usually at the cost of a loss in terms ...
The processing of personal information is omnipresent in our datadriven society enabling personalize...
The processing of personal information is omnipresent in our datadriven society enabling personalize...
The processing of personal information is omnipresent in our datadriven society enabling personalize...
In our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing t...
Avec l'émergence de nouvelles technologies telles que le NFC (Communication à champ proche) et l'acc...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
The benefit of performing Big data computations over individual’s microdata is manifold, in the medi...
The benefit of performing Big data computations over individual’s microdata is manifold, in the medi...
Machine to Machine (M2M) applications enable a better management of resources and provide users With...
The emergence of personal mobile devices, with communication and positioning features, is leading to...
The emergence of personal mobile devices, with communication and positioning features, is leading to...
The emergence of personal mobile devices, with communication and positioning features, is leading to...
L'émergence de terminaux mobiles personnels, capables à la fois de communiquer et de se positionner,...
New technologies offer greater convenience for end-users but usually at the cost of a loss in terms ...
The processing of personal information is omnipresent in our datadriven society enabling personalize...
The processing of personal information is omnipresent in our datadriven society enabling personalize...
The processing of personal information is omnipresent in our datadriven society enabling personalize...
In our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing t...
Avec l'émergence de nouvelles technologies telles que le NFC (Communication à champ proche) et l'acc...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
The benefit of performing Big data computations over individual’s microdata is manifold, in the medi...
The benefit of performing Big data computations over individual’s microdata is manifold, in the medi...
Machine to Machine (M2M) applications enable a better management of resources and provide users With...