Vincent Frey

According to our database1, Vincent Frey authored at least 18 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Interpersonal trust modelling through multi-agent Reinforcement Learning.
Cogn. Syst. Res., January, 2024

2019
Access control in the Internet of Things: a survey of existing approaches and open research questions.
Ann. des Télécommunications, 2019

Securing Smartphone Handwritten Pin Codes with Recurrent Neural Networks.
Proceedings of the IEEE International Conference on Acoustics, 2019

Orange labs contribution to the Sussex-Huawei locomotion-transportation recognition challenge.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

2018
Detection and Response to Data Exfiltration from Internet of Things Android Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

A Certificate-Less Key Exchange Protocol for IoT.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
Why can't users choose their identity providers on the web?
Proc. Priv. Enhancing Technol., 2017

A Community-Driven Access Control Approach in Distributed IoT Environments.
IEEE Commun. Mag., 2017

Discrimination rate: an attribute-centric metric to measure privacy.
Ann. des Télécommunications, 2017

The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Access control in IoT: From requirements to a candidate vision.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

2016
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

A Continuous LoA Compliant Trust Evaluation Method.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Similarity Measure for Security Policies in Service Provider Selection.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Communication services in the Web era: How can Telco join the OTT hangout?
Proceedings of the 18th International Conference on Intelligence in Next Generation Networks, 2015

2014
Reaching Agreement in Security Policy Negotiation.
Proceedings of the 13th IEEE International Conference on Trust, 2014


  Loading...