2024
Key Policy Attribute-Based Encryption Leveraging Isogeny-Based Cryptography.
IACR Cryptol. ePrint Arch., 2024
A Framework for Managing Multifaceted Privacy Leakage While Optimizing Utility in Continuous LBS Interactions.
CoRR, 2024
Efficient Post-Quantum Pattern Matching on Encrypted Data.
IACR Commun. Cryptol., 2024
From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data.
Proceedings of the Information Systems Security - 20th International Conference, 2024
A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption.
J. Comput. Secur., 2023
Privacy of Smart Traffic Lights Systems.
Proceedings of the IEEE Vehicular Networking Conference, 2023
Robustness Assessment of Biometric Authenticators.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
A Framework for Privacy Policy Enforcement for Connected Automotive Systems.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
H3PC: Enhanced Security and Privacy-Preserving Platoon Construction Based on Fully Homomorphic Encryption.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023
A Systematic Approach for Automotive Privacy Management.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023
2022
Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption.
IACR Cryptol. ePrint Arch., 2022
Privacy Threat Analysis for connected and autonomous vehicles.
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022
Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
2021
Secure and Robust Cyber Security Threat Information Sharing.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
2020
Privacy-Preserving Pattern Matching on Encrypted Data.
IACR Cryptol. ePrint Arch., 2020
2018
Linking Differential Identifiability with Differential Privacy.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Optimal Distribution of Privacy Budget in Differential Privacy.
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017
2015
Specification and deployment of integrated Security Policy for Outsourced Data. (Expression et déploiement de politiques de sécurité intégrés pour données externalisées).
PhD thesis, 2015
Security Mechanisms Planning to Enforce Security Policies.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
2014
Optimized and controlled provisioning of encrypted outsourced data.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Specification and Deployment of Integrated Security Policies for Outsourced Data.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013