Suivre
Anis Bkakria
Anis Bkakria
IRT SystemX
Adresse e-mail validée de irt-systemx.fr
Titre
Citée par
Citée par
Année
Confidentiality-Preserving query execution of fragmented outsourced data
A Bkakria, F Cuppens, N Cuppens-Boulahia, JM Fernandez
Information and Communication Technology, 426-440, 2013
112013
Opal: an open-source global platform java library which includes the remote application management over http
A Bkakria, G Bouffard, J Iguchi-Cartigny, JL Lanet
e-Smart 2011, 2011
92011
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption
A Bkakria, F Cuppens, N Cuppens-Boulahia, JM Fernandez, ...
9*
Optimized and Controlled Provisioning of Encrypted Outsourced Data
A Bkakria, A Schaad, F Kerschbaum, F Cuppens, N Cuppens-Boulahia, ...
7*2014
Linking differential identifiability with differential privacy
A Bkakria, N Cuppens-Boulahia, F Cuppens
International Conference on Information and Communications Security, 232-247, 2018
62018
Optimal distribution of privacy budget in differential privacy
F Cuppens, F Bouattour, FB Fredj
Risks and Security of Internet and Systems: 13th International Conference …, 2019
42019
Optimal Distribution of Privacy Budget in Differential Privacy
A Bkakria, N Cuppens, F Cuppens
4*
Privacy-Preserving Pattern Matching on Encrypted Data
A Bkakria, N Cuppens, F Cuppens
International Conference on the Theory and Application of Cryptology and …, 2020
32020
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper)
A Bkakria, M Graa, N Cuppens-Boulahia, F Cuppens, JL Lanet
2017 15th Annual Conference on Privacy, Security and Trust (PST), 253-2535, 2017
32017
Specification and deployment of integrated security policies for outsourced data
A Bkakria, F Cuppens, N Cuppens-Boulahia, D Gross-Amblard
IFIP Annual Conference on Data and Applications Security and Privacy, 17-32, 2014
32014
Pattern matching on encrypted data
A Bkakria, N Cuppens, F Cuppens
Cryptology ePrint Archive, Report 2020/422, 2020
12020
Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption
A Bkakria
Cryptology ePrint Archive, 2022
2022
Secure and Robust Cyber Security Threat Information Sharing
A Bkakria, R Yaich, W Arabi
International Symposium on Foundations & Practice of Security, 2021
2021
Information theoretic-based privacy risk evaluation for data anonymization
A Bkakria, F Cuppens, N Cuppens, A Tasidou
Journal of Surveillance, Security and Safety 2, 83-102, 2021
2021
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems
A Bkakria, M Graa, N Cuppens-Boulahia, F Cuppens, JL Lanet
International Conference on Information Systems Security, 127-145, 2017
2017
Realtime detection and reaction to activity hijacking attacks in Android smartphones
A Bkakria, G Mariem, N Cuppens-Boulahia, F Cuppens, JL Lanet
15th International Conference on Privacy, Security and Trust (PST). IEEE, 2017
2017
Security Mechanisms Planning to Enforce Security Policies
A Bkakria, F Cuppens, N Cuppens-Boulahia, D Gross-Amblard
International Symposium on Foundations and Practice of Security, 85-101, 2015
2015
Expression and deployment of security policies for outsourced data
A Bkakria, F Cuppens, N Cuppens-Boulahia, D Gross-Amblard
Pattern Matching over Encrypted Data
A Bkakria, N Cuppens, F Cuppens
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–19