In this thesis, we analyze the problem of the finite representation of real numbers and we control the deviation due to this approximation. We particularly focus on two complex problems. First, we study how finite precision interacts with differentially private protocols. We present a methodology to study the perturbations on the probabilistic distribution induced by finite representation. Then we show that a direct implementation of differential privacy protocols is not safe while, with addition of some safeguards, differential privacy is preserved under finite precision up to some quantified inherent leakage. Next, we propose a method to analyze programs that cannot be analyzed by a compositional analysis due to ''erratic'' control flow. ...
As quantum computers become more and more plausible, it is important to redesign cryptography in ord...
Co-encadrement de la thèse : Marc Bordier et Jean-Paul MarmoratAbstract: A way to improve an existin...
This thesis is about the creation of links between textual content and ontological knowledge bases (...
In this thesis, we analyze the problem of the finite representation of real numbers and we control t...
Les problèmes logiciels sont frustrants et diminuent l’expérience utilisateur. Par exemple, la fuite...
The control of the information given by a system has recently seen increasing importance due to the ...
Trustworthiness in systems is of paramount importance. Among safety modeling languages, Markov chain...
La réplication des données, qui est un problème de calcul distribué, est utilisée dans les grands sy...
This thesis takes place in the context of uncertainty propagation and sensitivity analysis of comput...
Un moniteur de sécurité actif est un mécanisme indépendant qui est responsable de maintenir le systè...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
The work reported in this thesis revisits in two waysthe abstract domain of polyhedraused for static...
Riding the wave of smart disclosure initiatives and new privacy-protection regulations, the Personal...
The study of the p-variation of a process in probability is not new. It is indeed initiated by autho...
With the advent of Internet of things (IoT), there is a need to provide energy for a massive number...
As quantum computers become more and more plausible, it is important to redesign cryptography in ord...
Co-encadrement de la thèse : Marc Bordier et Jean-Paul MarmoratAbstract: A way to improve an existin...
This thesis is about the creation of links between textual content and ontological knowledge bases (...
In this thesis, we analyze the problem of the finite representation of real numbers and we control t...
Les problèmes logiciels sont frustrants et diminuent l’expérience utilisateur. Par exemple, la fuite...
The control of the information given by a system has recently seen increasing importance due to the ...
Trustworthiness in systems is of paramount importance. Among safety modeling languages, Markov chain...
La réplication des données, qui est un problème de calcul distribué, est utilisée dans les grands sy...
This thesis takes place in the context of uncertainty propagation and sensitivity analysis of comput...
Un moniteur de sécurité actif est un mécanisme indépendant qui est responsable de maintenir le systè...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
The work reported in this thesis revisits in two waysthe abstract domain of polyhedraused for static...
Riding the wave of smart disclosure initiatives and new privacy-protection regulations, the Personal...
The study of the p-variation of a process in probability is not new. It is indeed initiated by autho...
With the advent of Internet of things (IoT), there is a need to provide energy for a massive number...
As quantum computers become more and more plausible, it is important to redesign cryptography in ord...
Co-encadrement de la thèse : Marc Bordier et Jean-Paul MarmoratAbstract: A way to improve an existin...
This thesis is about the creation of links between textual content and ontological knowledge bases (...