Search

Your search keyword '"Sécurité des Données et des Systèmes (SDS)"' showing total 111 results

Search Constraints

Start Over You searched for: Author "Sécurité des Données et des Systèmes (SDS)" Remove constraint Author: "Sécurité des Données et des Systèmes (SDS)"
111 results on '"Sécurité des Données et des Systèmes (SDS)"'

Search Results

1. A new PET for Data Collection via Forms with Data Minimization, Full Accuracy and Informed Consent

2. Rough concepts

3. Cryptanalysis of a code-based one-time signature

4. Generic Construction for Identity-based Proxy Blind Signature

5. DashBot: An ML-Guided Dashboard Generation System

6. Secure key distribution in heterogeneous interoperable industrial Internet of Things

7. Graph rewriting rules for RDF database evolution: optimizing side-effect processing

8. Unlinkable and Invisible $\gamma$-Sanitizable Signatures

9. A model transformation approach for multiscale modeling of software architectures applied to smart cities

10. Analyse Sécurisée de Données Externalisées

11. How to (Legally) Keep Secrets from Mobile Operators

12. Generic Plaintext Equality and Inequality Proofs

13. Belief Based on Inconsistent Information

14. DARC : Data Anonymization and Re-identification Challenge

15. Secure Cumulative Reward Maximization in Linear Stochastic Bandits

16. Demonstration of GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation

17. A Faster Cryptographer's Conspiracy Santa

18. Designing Reverse Firewalls for the Real World

19. Rings in which idempotents generate maximal or minimal ideals

20. Techniques d'anonymisation tabulaire : concepts et mise en oeuvre

21. Secure Outsourcing of Multi-Armed Bandits

22. An Enrolment Gateway for Data Security in Heterogeneous Industrial Internet of Things

23. Graph Rewriting System for Consistent Evolution of RDF/S databases

24. Secure Best Arm Identification in Multi-Armed Bandits

25. oMAC : Open Model for Automotive Cybersecurity

26. Extending Atomic Chain Swaps

27. Probabilistic epistemic updates on algebras

28. Secure and Efficient Matrix Multiplication with MapReduce

29. SEmantic Networks of Data: Utility and Privacy

30. Industrial Internet of Things: Security of Interoperability

31. Personnalisation de contraintes de vie privée dans des modèles d'anonymat basés sur les généralisations

32. Personalizing Privacy Constraints in Generalization-based Anonymization Models

33. Logics for Unordered Trees with Data Constraints

34. Atelier : Sécurité informatique et protection de la vie privée : pratiques et perspectives dans les entreprises

35. Tutoriel : Anonymization Techniques : Theory and Practice

36. Accretion in strong field gravity with eXTP

37. Personal Data Management Systems: The security and functionality standpoint

38. Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture

39. Interopérabilité dans l'Internet des Objets : Étude et mise en œuvre

40. Software Tool Support for Modular Reasoning in Modal Logics of Actions

41. The Case for Personalized Anonymization of Database Query Results

42. Toward a Formal Multiscale Architectural Framework for Emerging Properties Analysis in Systems of Systems

43. Post-Quantum Cryptography: tomorrow’s security

44. A reasoning approach towards Ethics-Based Medicine and care of disabled people

45. Delegating Elliptic-Curve Operations with Homomorphic Encryption

46. Personalized k-anonymity

47. Correctness by construction and style preserving reconfigurations of system of systems

48. A refinement-based approach for specifying multi-scale software architectures

49. De l’éthique de la numérisation de la santé à la numérisation de l’éthique de la santé

50. Ouroboros-E: An efficient Lattice-based Key-Exchange Protocol

Catalog

Books, media, physical & digital resources