National audienceThe most difficult problem in the domain of privacy is the one of extended data protection, which consists in ensuring that an information is not processed in an unauthorized fashion by a distant agent. We analyze the existing works trying to address this issue with respect to the level of trust they can bring to users, the ultimate level being represented by the strong guaranteees provided by Trusted Computing techniques. This technology being paradoxally dangerous for the users' liberties, we suggest three criteria for evaluating whether a TC-based architecture is fruitful or threatening to the user. On this basis, we propose a new TC-based architecture, ensuring both a high level of trust and an absence of risk for the u...
RÉSUMÉ: Dans cette thèse de doctorat, nous étudions le problème de conception d'estimateur et de com...
Current applications, from complex sensor systems (e.g. quantified self) to online e- markets acquir...
The topic of this thesis is the paradigm of the cross-organizational digital identity management. Th...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
National audienceCet article interroge la valeur des écrits de travail non pas comme objet de recher...
National audience"Image awareness" consists to identify as soon as possible negative weak signals li...
Reputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewardi...
International audienceLa communication en réseaux ad hoc, tels que des réseaux de capteurs sans fil,...
International audienceLes approches habituelles pour la protection de la privacité s'attachent à déf...
National audienceDepuis l'avènement de la loi " Informatique et Libertés " en 1978, l'image de la pr...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
The privacy of individuals is constantly undermined by some of the most prominent companies in the w...
Current applications, from complex sensor systems (e.g. quantified self) to online e-markets acquire...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Because of the increasing quantity of data processed by software, the need for privacy guarantees is...
RÉSUMÉ: Dans cette thèse de doctorat, nous étudions le problème de conception d'estimateur et de com...
Current applications, from complex sensor systems (e.g. quantified self) to online e- markets acquir...
The topic of this thesis is the paradigm of the cross-organizational digital identity management. Th...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
National audienceCet article interroge la valeur des écrits de travail non pas comme objet de recher...
National audience"Image awareness" consists to identify as soon as possible negative weak signals li...
Reputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewardi...
International audienceLa communication en réseaux ad hoc, tels que des réseaux de capteurs sans fil,...
International audienceLes approches habituelles pour la protection de la privacité s'attachent à déf...
National audienceDepuis l'avènement de la loi " Informatique et Libertés " en 1978, l'image de la pr...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
The privacy of individuals is constantly undermined by some of the most prominent companies in the w...
Current applications, from complex sensor systems (e.g. quantified self) to online e-markets acquire...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Because of the increasing quantity of data processed by software, the need for privacy guarantees is...
RÉSUMÉ: Dans cette thèse de doctorat, nous étudions le problème de conception d'estimateur et de com...
Current applications, from complex sensor systems (e.g. quantified self) to online e- markets acquir...
The topic of this thesis is the paradigm of the cross-organizational digital identity management. Th...