Gildas Avoine
Orcid: 0000-0001-9743-1779
According to our database1,
Gildas Avoine
authored at least 78 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on avoine.net
On csauthors.net:
Bibliography
2024
Analyzing and explaining privacy risks on time series data: ongoing work and challenges.
SIGKDD Explor., June, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Unique in the Smart Grid -The Privacy Cost of Fine-Grained Electrical Consumption Data.
CoRR, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
2019
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Proceedings of the Financial Cryptography and Data Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
IEEE Trans. Mob. Comput., 2016
ACM Comput. Surv., 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Comparing distance bounding protocols: A critical mission supported by decision theory.
Comput. Commun., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IEEE Trans. Wirel. Commun., 2014
Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?
Int. J. Inf. Manag., 2014
CoRR, 2014
2013
Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography.
IEEE Trans. Mob. Comput., 2013
Privacy and Security in Wireless Sensor Networks: Protocols, Algorithms, and Efficient Architectures.
J. Comput. Networks Commun., 2013
Revisiting flow-based load balancing: Stateless path selection in data center networks.
Comput. Networks, 2013
Proceedings of the Radio Frequency Identification, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
2012
Privacy-friendly synchronized ultralightweight authentication protocols in the storm.
J. Netw. Comput. Appl., 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Wirel. Commun., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
The Future Security Challenges in RFID.
Proceedings of the RFID Technology-Concepts, 2009
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement.
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Progress in Cryptology, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
CoRR, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Computer and communication sciences, CRC Press, ISBN: 978-1-4200-4620-5, 2007
2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Dependable Computing, 2005
2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003