Reputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewarding good behaviors and punishing bad ones. Reputation mechanisms must guarantee that the computed reputation scores are precise and robust against attacks; to guarantee such properties, existing mechanisms require information that jeopardize users' privacy: for instance, clients' interactions might be tracked. Privacy-preserving reputation mechanisms have thus been proposed, protecting both clients' privacy and the providers' one. However, to guarantee strong privacy properties, these mechanisms provide imprecise reputation scores, particularly by preventing clients to testify about their negative interactions. In this thesis, we propose a n...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Étude de la règle de provision optimale que doit suivre un gouvernement, ou autre autorité, s'il sou...
Hashing and hash-based data structures are ubiquitous. Apart from their role in thedesign of efficie...
Reputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewardi...
In recent years, the concern for privacy has significantly grown. This is a consequence of the regul...
National audienceThe most difficult problem in the domain of privacy is the one of extended data pro...
At the era where our digital identity is always more linked with our personal identity, the security...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Security is a crucial requirement in the applications based on information and communication technol...
Current applications, from complex sensor systems (e.g. quantified self) to online e-markets acquire...
Cooperative intelligent transportation systems (C-ITS) have the opportunity to enhance road safety, ...
The Internet is a global system of interconnected computer networks that carries lots of services co...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
International audienceLes mécanismes de réputation permettent de réduire les risques pris par les ut...
Open and Decentralized Multi-Agent Systems (ODMAS) are particularlyvulnerable to the introduction of...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Étude de la règle de provision optimale que doit suivre un gouvernement, ou autre autorité, s'il sou...
Hashing and hash-based data structures are ubiquitous. Apart from their role in thedesign of efficie...
Reputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewardi...
In recent years, the concern for privacy has significantly grown. This is a consequence of the regul...
National audienceThe most difficult problem in the domain of privacy is the one of extended data pro...
At the era where our digital identity is always more linked with our personal identity, the security...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Security is a crucial requirement in the applications based on information and communication technol...
Current applications, from complex sensor systems (e.g. quantified self) to online e-markets acquire...
Cooperative intelligent transportation systems (C-ITS) have the opportunity to enhance road safety, ...
The Internet is a global system of interconnected computer networks that carries lots of services co...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
International audienceLes mécanismes de réputation permettent de réduire les risques pris par les ut...
Open and Decentralized Multi-Agent Systems (ODMAS) are particularlyvulnerable to the introduction of...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Étude de la règle de provision optimale que doit suivre un gouvernement, ou autre autorité, s'il sou...
Hashing and hash-based data structures are ubiquitous. Apart from their role in thedesign of efficie...