The verification of systems for protecting sensitive and confidential information is becoming an increasingly important issue in the modern world. Many protocols for protecting confidential information have used randomized mechanisms, to obfuscate the link between the secret and the public information. Typical examples are DCNets, Crowds, Onion Routing, Freenet and Tor. Another common denominator of them is that various entities involved in the system to verify occur as concurrent processes, and present typically nondeterministic behavior.This dissertation is devoted to the development of novel reasoning techniques for verifying differential privacy in concurrent systems. Differential privacy is a promising notion of privacy originated from...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Distributed message passing applications are in the mainstream of information technology since they ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
In an increasingly connected world, the Internet permeates every aspect of our lives. The number of ...
The increasing availability of smartphone and tablets has given place to the development of a broad ...
Security is a crucial requirement in the applications based on information and communication technol...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
This dissertation is concerned with the question of formally verifying that the implementation of an...
Large-scale centralized storage of speech data poses severe privacy threats to the speakers. Indeed,...
Equipe cascade, ENS, InriaThis thesis is dedicated to the analysis of modes of operation in the cont...
In recent years, the concern for privacy has significantly grown. This is a consequence of the regul...
Hashing and hash-based data structures are ubiquitous. Apart from their role in thedesign of efficie...
The B Method is a formal method heavily used in the railwayindustry to specify and develop safety-cr...
This thesis addresses the security and privacy challenges relevant to the resource constrained devic...
Inverse problems related to physical processes are of great importance in practically every field re...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Distributed message passing applications are in the mainstream of information technology since they ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
In an increasingly connected world, the Internet permeates every aspect of our lives. The number of ...
The increasing availability of smartphone and tablets has given place to the development of a broad ...
Security is a crucial requirement in the applications based on information and communication technol...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
This dissertation is concerned with the question of formally verifying that the implementation of an...
Large-scale centralized storage of speech data poses severe privacy threats to the speakers. Indeed,...
Equipe cascade, ENS, InriaThis thesis is dedicated to the analysis of modes of operation in the cont...
In recent years, the concern for privacy has significantly grown. This is a consequence of the regul...
Hashing and hash-based data structures are ubiquitous. Apart from their role in thedesign of efficie...
The B Method is a formal method heavily used in the railwayindustry to specify and develop safety-cr...
This thesis addresses the security and privacy challenges relevant to the resource constrained devic...
Inverse problems related to physical processes are of great importance in practically every field re...
Summary : The benefit of performing Big data computations over individual’s microdata is manifold, i...
Distributed message passing applications are in the mainstream of information technology since they ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...