Nombre de documents

51

CV de Christophe Bidan


Communication dans un congrès39 documents

  • Kun He, Christophe Bidan, Gaëtan Le Guelvouit. Privacy Protection for JPEG Content on Image-Sharing Platforms. 4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Jun 2016, Vigo, Galicia, Spain. <hal-01344472>
  • Kun He, Christophe Bidan, Gaëtan Le Guelvouit. Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms. 9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Rutgers University, New Jersey, United States. <hal-01344469>
  • Deepak Subramanian, Guillaume Hiet, Christophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses. 9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Rutgers University, New Jersey, United States. <hal-01344565>
  • Kun He, Christophe Bidan, Gaëtan Le Guelvouit. Robust and Secure Image Encryption Schemes During JPEG Compression Process. 2016 IS&T International Symposium on Electronic Imaging (EI 2016), Feb 2016, San Francisco, California, United States. <hal-01344471>
  • Deepak Subramanian, Guillaume Hiet, Christophe Bidan. A self-correcting information flow control model for the web-browser. FPS 2016 - The 9th International Symposium on Foundations & Practice of Security, Oct 2016, Québec City, Canada. 10128, pp.285-301, Lecture Notes in Computer Science. <https://www.fps2016.fsg.ulaval.ca/no_cache/home/>. <hal-01398192>
  • Damien Crémilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent. VEGAS: Visualizing, exploring and grouping alerts. IEEE/IFIP International Workshop on Analytics for Network and Service Management, Apr 2016, Istanbul, Turkey. Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP, pp.1097 - 1100, 2016, <10.1109/NOMS.2016.7502968>. <hal-01416464>
  • Regina Paiva Melo Marin, Guillaume Piolle, Christophe Bidan. Equity-preserving Management of Privacy Conflicts in Social Network Systems. The Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014), Dec 2014, Cambridge, United States. Proceedings of the 6yh ASE International Conference on Privacy, Security, Risk and Trust, 2014. <hal-01090668>
  • Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. CORGI: Combination, Organization and Reconstruction through Graphical Interactions. VizSec, Nov 2014, Paris, France. <10.1145/2671491.2671494>. <hal-01096331>
  • Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. Catégorisation par objectifs de la visualisation pour la sécurité. CESAR, Nov 2014, Rennes, France. <hal-01096337>
  • Antoine Guellier, Christophe Bidan, Nicolas Prigent. Homomorphic Cryptography-based Privacy-Preserving Network Communications. Batten, Lynn and Li, Gang and Niu, Wenjia and Warren, Matthew. Applications and Techniques in Information Security, Nov 2014, Deakin University, Melbourne, VIC, Australia, France. Springer Berlin Heidelberg, Applications and Techniques in Information Security, 490, pp.159-170, 2014, Communications in Computer and Information Science. <http://link.springer.com/chapter/10.1007/978-3-662-45670-5_15?no-access=true#>. <10.1007/978-3-662-45670-5_15>. <hal-01088441>
  • Deepak Subramanian, Guillaume Hiet, Christophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses. 9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, May 2014, Saint-Germain-Au-Mont-d'Or, France. <hal-01344563>
  • Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. ELVIS: Extensible Log VISualization. VIZSEC, Oct 2013, ATLANTA, United States. 2013. <hal-00875668>
  • Regina Paiva Melo Marin, Guillaume Piolle, Christophe Bidan. An Analysis Grid for Privacy-related Properties of Social Network Systems. SOCIALCOM 2013, Sep 2013, Washington D.C., United States. IEEE Computer Society, pp.520-525, 2013, <10.1109/PASSAT/SocialCom.2013.79>. <hal-00908339>
  • Antoine Guellier, Christophe Bidan, Nicolas Prigent. Protocole Ad hoc Proactif Anonyme à Base de Cryptographie Homomorphique. SAR-SSI 2013, Sep 2013, Mont-de-Marsan, France. 11 p., 2013. <hal-00881049>
  • Christophe Bidan, David Boucart, Morgane Chapon, Patrick Cloitre, Grégory Donias, et al.. Preventive and corrective security solutions for routing in military tactical ad hoc networks. MCC 2013, Oct 2013, Saint Malo, France. pp.149-165, 2013. <hal-00919218>
  • Simon Boche, Gilles Guette, Christophe Bidan, Nicolas Prigent. NoName, un protocole de routage ad hoc respectant la vie privée. SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.122-134, 2013. <hal-00919178>
  • Jean-Marc Robert, Christophe Bidan. A proactive routing protocol for wireless ad hoc networks assuring some privacy. HotWiSec '13, Apr 2013, Budapest, Hungary. pp.25-30, 2013, <10.1145/2463183.2463190>. <hal-00920036>
  • Nathanaël Aubert, Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent. The Hecate Attack. SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.205-215, 2013. <hal-00919227>
  • Christian Artigues, Yves Deswarte, Jérémie Guiochet, Marie-José Huguet, Marc-Olivier Killijian, et al.. AMORES: an architecture for mobiquitous resilient systems. ARMOR'12, Apr 2012, Sibiu, Romania. Article N°7 (7p.), 2012, <10.1145/2222436.2222443>. <hal-00736020>
  • Regina Paiva Melo Marin, Guillaume Piolle, Christophe Bidan. Privacy Policy Requirements for Distributed Social Network Systems. APVP'12, Jun 2012, Groix, France. 2012. <hal-00736023>
  • Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, et al.. From SSIR to CIDre: a New Security Research Group in Rennes. 1st SysSec Workshop, Jul 2011, Amsterdam, Netherlands. <hal-00656940>
  • Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, et al.. Liability in Software Engineering Overview of the LISE Approach and Illustration on a Case Study. ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010), May 2010, Cape Town, South Africa. pp.135--144, 2010, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, ICSE 2010. <http://doi.acm.org/10.1145/1806799.1806823>. <10.1145/1806799.1806823>. <inria-00472287v3>
  • Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent. Expérimentation sur la détection de nœuds malhonnêtes dans les réseaux ad hoc. 5ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information - SAR-SSI'10, May 2010, Nice, France. pp.NC, 2010. <hal-00547095>
  • Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent. A Trust-Based IDS for the AODV Protocol. 12th International Conference on Information and Communications Security - ICICS 2010, Dec 2010, Barcelona, Spain. Springer, p. 430-444, 2010. <hal-00547102>
  • Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula. Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. IEEE Computer Society. CSE'09, Aug 2009, Vancouver, Canada. Vol.2, pp.802-808, 2009, <10.1109/CSE.2009.125>. <hal-00422260>
  • Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula. Implicit Trust Analysis of the AODV Routing Protocol. Workshop on Symbolic Computation in Software Science, Sep 2009, Gammarth, Tunisia. Vol. 1, pp. 56-68     , 2009. <hal-00422264>
  • Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula. Analyse de la confiance dans AODV. 4ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI) , Jun 2009, Luchon, France. pp. 31-45, 2009. <hal-00422262>
  • Hassiba Asmaa Adnane, Rafael De Sousa, Christophe Bidan, Ludovic Mé. Autonomic trust reasoning enables misbehavior detection in OLSR. 23rd Annual ACM Symposium on Applied Computing (ACM SAC 2008), Mar 2008, Ceará, Brazil. 8 p., 2008. <hal-00353032>
  • Hassiba Asmaa Adnane, Rafael De Sousa, Christophe Bidan, Ludovic Mé. Analysis of the implicit trust within the OLSR protocol. Trust Management and Security (IFIPTM), Nov 2007, Moncton, Canada. 2007. <hal-00268402>
  • Hassiba Asmaa Adnane, Rafael De Sousa, Christophe Bidan, Ludovic Mé. Integrating Trust Reasonings into Node Behavior in OLSR. 2nd ACM International Workshop on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet), Oct 2007, Chania, Greece. 2007. <hal-00268405>
  • Jérôme Lebegue, Christophe Bidan, Thierry Plesse. Security of predifined groups in MANETs. 2nd ACM Internation Wokshop on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet), Oct 2007, Chania, Greece. 2007. <hal-00268406>
  • Jérôme Lebegue, Christophe Bidan, Thierry Plesse. Taking advantage of predifined groups in tactical MANETs. Military CIS Conference, 2007, France. 2007. <hal-00268407>
  • Jérôme Lebegue, Christophe Bidan, Thierry Plesse. An OLSR extension to deal with predefined groups. Mobile Summit, Nov 2007, France. 2007. <hal-00268403>
  • Hassiba Asmaa Adnane, Rafael De Sousa, Christophe Bidan, Ludovic Mé. Analyse de la confiance implicite requise dans le routage adhoc OLSR. Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France. 2007. <hal-00268414>
  • Guillaume Hiet, Ludovic Mé, Jacob Zimmermann, Christophe Bidan, Benjamin Morin, et al.. Détection fiable et pertinente de flux d'information illégaux. Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France. 2007. <hal-00268422>
  • Jérôme Lebegue, Christophe Bidan, Thierry Plesse, David Boucart. Vers une gestion de groupe sécurisée dans les réseaux ad hoc militaires. Conférence sur la Sécurité et Architecture Réseaux, Jun 2006, NC, France. 11 p., 2006. <hal-00269307>
  • Jacob Zimmermann, Ludovic Mé, Christophe Bidan. An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. ESORICS 2003, Oct 2003, Gjovik, Norway. 18 p., 2003. <hal-00356444>
  • Jacob Zimmermann, Ludovic Mé, Christophe Bidan. Experimenting a Policy-Based HIDS Based on an Information Flow Control Model. ACSAC 2003, Dec 2003, Las Vegas, United States. 10 p., 2003. <hal-00356441>
  • Jacob Zimmermann, Ludovic Mé, Christophe Bidan. Introducing reference flow control for intrusion detection at the OS level. RAID 2002, Oct 2002, Zurich, Switzerland. Springer Verlag, 15 p., 2002. <hal-00356484>

Poster1 document

  • Kun He, Cyrielle Feron, Gaëtan Le Guelvouit, Christophe Bidan. Image Ciphering to Ensure Privacy on Open Image- Sharing Platforms. IEEE International Conference on Image Processing (ICIP 2015), Sep 2015, Québec, Canada. <hal-01344473>

Rapport4 documents

  • Valérie Viet Triem Tong, Christophe Bidan, Ludovic Mé, Christopher Humphries, Guillaume Piolle. Analyse de logs guidée par des vérifications de formules de responsabilité exprimées en CTL. [Rapport de recherche] D4.1, Supélec. 2011. <hal-01172702>
  • Christophe Alleaune, Valérie-Laure Benabou, Denis Beras, Christophe Bidan, Nicolas Craipeau, et al.. Liability in Software Engineering: Overview of the LISE Approach and Illustration on a Case Study. [Research Report] RR-7148, INRIA. 2009, pp.23. <inria-00440437>
  • Christophe Bidan, Valérie Issarny. Security Benefits from Software Architecture. [Research Report] RR-3114, INRIA. 1997. <inria-00073576>
  • Christophe Bidan, Valérie Issarny. Dealing with Multi-Policy Security in Large Open Distributed Systems. [Research Report] RR-3112, INRIA. 1997. <inria-00073578>

Article dans une revue5 documents

  • Asmaa Adnane, Christophe Bidan, Rafael Timóteo De Sousa Júnior. Trust-based security for the OLSR routing protocol. Journal on Computer Communications, 2013, 36 (10-11), pp.1159-1171. <10.1016/j.comcom.2013.04.003>. <hal-00968882>
  • Christopher Humphries, Nicolas Prigent, Christophe Bidan. Visualization for Monitoring Network Security Events. ERCIM News, ERCIM, 2012, pp.Page 31. <hal-00735995>
  • Rafael De Sousa, Hassiba Asmaa Adnane, Christophe Bidan, Ludovic Mé. Vulnerabilidades e Proteções do Protocolo de Roteamento Ad Hoc OLSR sob o Ponto de Vista da Confiança (On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust). IEEE Latin America Transactions, Institute of Electrical and Electronics Engineers, 2009, 7 (5), pp. 586-593. <hal-00464808>
  • Jérôme Lebegue, Christophe Bidan, Bernard Jouga. Les problématiques de sécurité dans les réseaux ad hoc. La Revue de l'Electricité et de l'Electronique, Société de l'Électricité, de l'Électronique et des Technologies de l'Information et de la Communication, 2006, 13 p. <hal-00269275>
  • Christophe Bidan, Guillaume Hiet, Ludovic Mé, Benjamin Morin, Jacob Zimmermann. Vers une détection d'intrusions à fiabilité et pertinence prouvables. La Revue de l'Electricité et de l'Electronique, Société de l'Électricité, de l'Électronique et des Technologies de l'Information et de la Communication, 2006, 13 p. <hal-00269279>

Chapitre d'ouvrage1 document

  • Christophe Bidan. Sécurité et mobilité. Traité IC2 Sécurité des Systèmes d'Information, Hermès, 2006. <hal-00269308>

Autre publication1 document

  • Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. Vers une catégorisation par objectif des outils de visualisation pour la sécurité. Poster. 2013. <hal-00919211>