关注
Katarzyna Kapusta
Katarzyna Kapusta
Thales ThereSIS
在 thalesgroup.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives
H Qiu, K Kapusta, Z Lu, M Qiu, G Memmi
Information Sciences 502, 434-445, 2019
612019
Data protection by means of fragmentation in distributed storage systems
K Kapusta, G Memmi
2015 International Conference on Protocol Engineering (ICPE) and …, 2015
252015
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks
K Kapusta, G Memmi, H Noura
Annals of Telecommunications 74 (3), 157-165, 2019
232019
Data protection: Combining fragmentation, encryption, and dispersion
G Memmi, K Kapusta, H Qiu
2015 International Conference on Cyber Security of Smart Cities, Industrial …, 2015
222015
Secure and resilient scheme for data protection in unattended wireless sensor networks
K Kapusta, G Memmi, H Noura
2017 1st Cyber Security in Networking Conference (CSNet), 1-8, 2017
162017
A protocol for secure verification of watermarks embedded into machine learning models
K Kapusta, V Thouvenot, O Bettan, H Beguinet, H Senet
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
142021
Poster: A keyless efficient algorithm for data protection by means of fragmentation
K Kapusta, G Memmi, H Noura
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
122016
Data protection: Combining fragmentation, encryption, and dispersion, a final report
G Memmi, K Kapusta, P Lambein, H Qiu
arXiv preprint arXiv:1512.02951, 2015
92015
Circular AON: A very fast scheme to protect encrypted data against key exposure
K Kapusta, G Memmi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
82018
Enhancing data protection in a distributed storage environment using structure-wise fragmentation and dispersal of encrypted data
K Kapusta, G Memmi
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
82018
When federated learning meets watermarking: A comprehensive overview of techniques for intellectual property protection
M Lansari, R Bellafqira, K Kapusta, V Thouvenot, O Bettan, G Coatrieux
Machine Learning and Knowledge Extraction 5 (4), 1382-1406, 2023
72023
Data protection by means of fragmentation in various different distributed storage systems-a survey
K Kapusta, G Memmi
arXiv preprint arXiv:1706.05960, 2017
72017
Secure data sharing with fast access revocation through untrusted clouds
K Kapusta, H Qiu, G Memmi
2019 10th IFIP international conference on new technologies, mobility and …, 2019
62019
Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data
K Kapusta, G Memmi
TrustCom'18, 2018
62018
A Secure Federated Learning: analysis of different cryptographic tools
O Stan, V Thouvenot, A Boudguiga, K Kapusta, M Zuber, R Sirdey
SECRYPT 2022-19th International Conference on Security and Cryptography 1 …, 2022
52022
Watermarking at the service of intellectual property rights of ML models
K Kapusta, V Thouvenot, O Bettan
Actes de la conférence CAID 2020, 75, 2020
52020
Secure data sharing by means of fragmentation, encryption, and dispersion
K Kapusta, H Qiu, G Memmi
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019
52019
Multi-hop Data Fragmentation in Unattended Wireless Sensor Networks
KW Lim, K Kapusta, G Memmi, WS Jung
arXiv preprint arXiv:1901.05831, 2019
52019
Selective all-or-nothing transform: Protecting outsourced data against key exposure
K Kapusta, G Memmi
Cyberspace Safety and Security: 10th International Symposium, CSS 2018 …, 2018
52018
A fast fragmentation algorithm for data protection in a multi-cloud environment
K Kapusta, G Memmi
arXiv preprint arXiv:1804.01886, 2018
42018
系统目前无法执行此操作,请稍后再试。
文章 1–20