Lauradoux, Cédric
199  Ergebnisse:
Personensuche X
?
3

Robust PDF Files Forensics Using Coding Style:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
Adhatarao, Supriya ; Lauradoux, Cédric - p. 179-195 , 2022
 
?
4

Can Authoritative Governments Abuse the Right to Access?:

, In: Privacy Technologies and Policy; Lecture Notes in Computer Science,
Lauradoux, Cédric - p. 23-33 , 2022
 
?
6

Exploitation and Sanitization of Hidden Data in PDF Files: ..:

, In: Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security,
 
?
8

Security Analysis of Subject Access Request Procedures: How..:

, In: Privacy Technologies and Policy; Lecture Notes in Computer Science,
Boniface, Coline ; Fouad, Imane ; Bielova, Nataliia.. - p. 182-209 , 2019
 
?
 
?
10

Security of Distance-Bounding : A Survey:

Avoine, Gildas ; Bingöl, Muhammed Ali ; Boureanu, Ioana...
ACM Computing Surveys (CSUR).  51 (2018)  5 - p. 1-33 , 2018
 
?
11

Decompression Quines and Anti-Viruses:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
 
?
12

Duck Attack on Accountable Distributed Systems:

, In: Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services,
 
?
13

Analysing the privacy policies of Wi-Fi trackers:

, In: Proceedings of the 2014 workshop on physical analytics,
 
?
14

Entropy harvesting from physical sensors:

, In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks,
 
?
15

Energy efficient authentication strategies for network codi..:

Apavatjrut, Anya ; Znaidi, Wassim ; Fraboulet, Antoine...
Concurrency and Computation: Practice and Experience.  24 (2011)  10 - p. 1086-1107 , 2011
 
1-15