119 results on '"Cédric Lauradoux"'
Search Results
2. Robust PDF Files Forensics Using Coding Style.
3. Can Authoritative Governments Abuse the Right to Access?
4. Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems.
5. Un jeu a debattre pour sensibiliser a l'Intelligence Artificielle dans le contexte de la pandemie de COVID-19.
6. Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?
7. How are PDF files published in the Scientific Community?
8. Security Analysis of Subject Access Request Procedures - How to Authenticate Data Subjects Safely When They Request for Their Data.
9. Security of Distance-Bounding: A Survey.
10. Robust PDF Files Forensics Using Coding Style.
11. Exploitation and Sanitization of Hidden Data in PDF Files.
12. IP-based Subject Access Requests Denied.
13. Can You Accept LaTeX Files from Strangers? Ten Years Later.
14. Duck Attack on Accountable Distributed Systems.
15. Decompression Quines and Anti-Viruses.
16. DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems.
17. The Pitfalls of Hashing for Privacy.
18. Ephemeral: Lightweight pseudonyms for 6LoWPAN MAC addresses.
19. A Privacy Analysis of Google and Yandex Safe Browsing.
20. Preserving privacy in secured ZigBee wireless sensor networks.
21. The Power of Evil Choices in Bloom Filters.
22. A Survey of Alerting Websites: Risks and Solutions.
23. Time Distortion Anonymization for the Publication of Mobility Data with High Utility.
24. Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions.
25. Private Password Auditing - Short Paper.
26. The entropy of wireless statistics.
27. Performances of cryptographic accumulators.
28. Analysing the privacy policies of Wi-Fi trackers.
29. <scp>Desire</scp> : Leveraging the Best of Centralized and Decentralized Contact Tracing Systems
30. Distributed Key Certification Using Accumulators for Wireless Sensor Networks.
31. Private and resilient data aggregation.
32. Entropy harvesting from physical sensors.
33. Hardware implementation of the GPS authentication.
34. Towards stronger jamming model: Application to TH-UWB radio.
35. Overflow of fountain codes in multi-hop wireless sensor networks.
36. Flooding attacks against network coding and countermeasures.
37. How secret-sharing can defeat terrorist fraud.
38. Distance Bounding Protocols on TH-UWB Radios.
39. Energy Friendly Integrity for Network Coding in Wireless Sensor Networks.
40. A New Approach for FCSRs.
41. When Compromised Readers Meet RFID.
42. Extended windmill polynomials.
43. Aggregated Authentication (AMAC) Using Universal Hash Functions.
44. Parallel Generation of l-Sequences.
45. Bit matrix multiplication in commodity processors.
46. Matriochka symmetric Boolean functions.
47. Sosemanuk, a Fast Software-Oriented Stream Cipher.
48. F-FCSR Stream Ciphers.
49. Decimv2.
50. From Hardware to Software Synthesis of Linear Feedback Shift Registers.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.