All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives H Qiu, K Kapusta, Z Lu, M Qiu, G Memmi Information Sciences 502, 434-445, 2019 | 61 | 2019 |
Data protection by means of fragmentation in distributed storage systems K Kapusta, G Memmi 2015 International Conference on Protocol Engineering (ICPE) and …, 2015 | 25 | 2015 |
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks K Kapusta, G Memmi, H Noura Annals of Telecommunications 74 (3), 157-165, 2019 | 23 | 2019 |
Data protection: Combining fragmentation, encryption, and dispersion G Memmi, K Kapusta, H Qiu 2015 International Conference on Cyber Security of Smart Cities, Industrial …, 2015 | 22 | 2015 |
Secure and resilient scheme for data protection in unattended wireless sensor networks K Kapusta, G Memmi, H Noura 2017 1st Cyber Security in Networking Conference (CSNet), 1-8, 2017 | 16 | 2017 |
A protocol for secure verification of watermarks embedded into machine learning models K Kapusta, V Thouvenot, O Bettan, H Beguinet, H Senet Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 14 | 2021 |
Poster: A keyless efficient algorithm for data protection by means of fragmentation K Kapusta, G Memmi, H Noura Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 12 | 2016 |
Data protection: Combining fragmentation, encryption, and dispersion, a final report G Memmi, K Kapusta, P Lambein, H Qiu arXiv preprint arXiv:1512.02951, 2015 | 9 | 2015 |
Circular AON: A very fast scheme to protect encrypted data against key exposure K Kapusta, G Memmi Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 8 | 2018 |
Enhancing data protection in a distributed storage environment using structure-wise fragmentation and dispersal of encrypted data K Kapusta, G Memmi 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 8 | 2018 |
When federated learning meets watermarking: A comprehensive overview of techniques for intellectual property protection M Lansari, R Bellafqira, K Kapusta, V Thouvenot, O Bettan, G Coatrieux Machine Learning and Knowledge Extraction 5 (4), 1382-1406, 2023 | 7 | 2023 |
Data protection by means of fragmentation in various different distributed storage systems-a survey K Kapusta, G Memmi arXiv preprint arXiv:1706.05960, 2017 | 7 | 2017 |
Secure data sharing with fast access revocation through untrusted clouds K Kapusta, H Qiu, G Memmi 2019 10th IFIP international conference on new technologies, mobility and …, 2019 | 6 | 2019 |
Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data K Kapusta, G Memmi TrustCom'18, 2018 | 6 | 2018 |
A Secure Federated Learning: analysis of different cryptographic tools O Stan, V Thouvenot, A Boudguiga, K Kapusta, M Zuber, R Sirdey SECRYPT 2022-19th International Conference on Security and Cryptography 1 …, 2022 | 5 | 2022 |
Watermarking at the service of intellectual property rights of ML models K Kapusta, V Thouvenot, O Bettan Actes de la conférence CAID 2020, 75, 2020 | 5 | 2020 |
Secure data sharing by means of fragmentation, encryption, and dispersion K Kapusta, H Qiu, G Memmi IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019 | 5 | 2019 |
Multi-hop Data Fragmentation in Unattended Wireless Sensor Networks KW Lim, K Kapusta, G Memmi, WS Jung arXiv preprint arXiv:1901.05831, 2019 | 5 | 2019 |
Selective all-or-nothing transform: Protecting outsourced data against key exposure K Kapusta, G Memmi Cyberspace Safety and Security: 10th International Symposium, CSS 2018 …, 2018 | 5 | 2018 |
A fast fragmentation algorithm for data protection in a multi-cloud environment K Kapusta, G Memmi arXiv preprint arXiv:1804.01886, 2018 | 4 | 2018 |