Laurent Gomez

According to our database1, Laurent Gomez authored at least 33 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security for Distributed Machine Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Security for Next-Gen Analytics for Cross-Organisation Collaboration.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2019
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Towards End-to-End Data Protection in Low-Power Networks.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

2015
A Privacy Preserving Framework for Mobile and Cloud.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

2014
Obligation Based Access Control.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

2013
Dynamic Risk Assessment by Communicating Objects in Supply Chain of Chemicals.
Int. J. Appl. Logist., 2013

Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application.
Int. J. Agric. Environ. Inf. Syst., 2013

Secure Alert Tracking in Supply Chain.
Proceedings of the SECRYPT 2013, 2013

2012
Secure Product Tracking in Supply Chain.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
A framework for trust assessment of sensor data.
Proceedings of the 4th Joint IFIP Wireless and Mobile Networking Conference, 2011

2009
Efficient Access Control for Wireless Sensor Data.
Int. J. Wirel. Inf. Networks, 2009

Efficient Access Control forWireless Sensor Data.
Ad Hoc Sens. Wirel. Networks, 2009

A Security Pattern for Untraceable Secret Handshakes.
Proceedings of the Third International Conference on Emerging Security Information, 2009

LWESP: Light-Weight Exterior Sensornet Protocol.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Web based communication between embedded systems and an ERP.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009

Trustworthiness Assessment of Wireless Sensor Data for Business Applications.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Access Control in Mobile and Ubiquitous Environments.
Proceedings of the Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability, 2009

2008
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Efficient access control for wireless sensor data.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Encryption-based access control for building management.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Design guidelines for integration of wireless sensor networks with enterprise systems.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008

Fuzzy Distributed Workflows for Crisis Management Decision Makers.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies.
Proceedings of the SECRYPT 2007, 2007

Towards User Authentication Flexibility.
Proceedings of the SECRYPT 2007, 2007

The WASP Architecture for Wireless Sensor Networks.
Proceedings of the Constructing Ambient Intelligence, 2007

Context-Aware Security Policy for the Service Discovery.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Context-aware security and secure context-awareness in ubiquitous computing environments.
Ann. UMCS Informatica, 2006

Context-Aware Access Control; Making Access Control Decisions Based on Context Information.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

Trust Establishment in Emergency Case.
Proceedings of the Trust Management, 4th International Conference, 2006


  Loading...