Christophe Bidan
christophe.bidan [at] centralesupelec.fr
Publications :
- Communication dans un congrès - 43 documents
- Aimad Berady, Valérie Viet Triem Tong, Gilles Guette, Christophe Bidan, Guillaume Carat. Modeling the Operational Phases of APT Campaigns, 2019-12-05. (https://inria.hal.science/hal-02379869v2)
- Aurélien Dupin, David Pointcheval, Christophe Bidan. On the Leakage of Corrupted Garbled Circuits, 2018-10-25. (https://inria.hal.science/hal-01903806)
- Aurélien Dupin, Jean-Marc Robert, Christophe Bidan. Location-Proof System Based on Secure Multi-party Computations, 2018-10-25. (https://centralesupelec.hal.science/hal-02415335)
- Damien Crémilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent. Enhancing Collaboration between Security Analysts in Security Operations Centers, 2018-10-16. (https://inria.hal.science/hal-01992346)
- Deepak Subramanian, Guillaume Hiet, Christophe Bidan. A self-correcting information flow control model for the web-browser, 2016-10-24. (https://inria.hal.science/hal-01398192)
- Kun He, Christophe Bidan, Gaëtan Le Guelvouit. Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms, 2016-07-20. (https://inria.hal.science/hal-01344469)
- Deepak Subramanian, Guillaume Hiet, Christophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses, 2016-07-20. (https://inria.hal.science/hal-01344565)
- Kun He, Christophe Bidan, Gaëtan Le Guelvouit. Privacy Protection for JPEG Content on Image-Sharing Platforms, 2016-06-20. (https://inria.hal.science/hal-01344472)
- Damien Crémilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent. VEGAS: Visualizing, exploring and grouping alerts, 2016-04-25. (https://hal.science/hal-01416464)
- Kun He, Christophe Bidan, Gaëtan Le Guelvouit. Robust and Secure Image Encryption Schemes During JPEG Compression Process, 2016-02-14. (https://inria.hal.science/hal-01344471)
- Regina Paiva Melo Marin, Guillaume Piolle, Christophe Bidan. Equity-preserving Management of Privacy Conflicts in Social Network Systems, 2014-12-13. (https://centralesupelec.hal.science/hal-01090668)
- Antoine Guellier, Christophe Bidan, Nicolas Prigent. Homomorphic Cryptography-based Privacy-Preserving Network Communications, 2014-11-27. (https://inria.hal.science/hal-01088441)
- Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. Catégorisation par objectifs de la visualisation pour la sécurité, 2014-11-24. (https://inria.hal.science/hal-01096337)
- Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. CORGI: Combination, Organization and Reconstruction through Graphical Interactions, 2014-11-14. (https://inria.hal.science/hal-01096331)
- Deepak Subramanian, Guillaume Hiet, Christophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses, 2014-05-13. (https://inria.hal.science/hal-01344563)
- Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. ELVIS: Extensible Log VISualization, 2013-10-14. (https://inria.hal.science/hal-00875668)
- Christophe Bidan, David Boucart, Morgane Chapon, Patrick Cloitre, Grégory Donias, Gilles Guette, Thierry Plesse, Nicolas Prigent, Sarah Tarrapey. Preventive and corrective security solutions for routing in military tactical ad hoc networks, 2013-10-07. (https://centralesupelec.hal.science/hal-00919218)
- Nathanaël Aubert, Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent. The Hecate Attack, 2013-09-16. (https://centralesupelec.hal.science/hal-00919227)
- Antoine Guellier, Christophe Bidan, Nicolas Prigent. Protocole Ad hoc Proactif Anonyme à Base de Cryptographie Homomorphique, 2013-09-16. (https://centralesupelec.hal.science/hal-00881049)
- Simon Boche, Gilles Guette, Christophe Bidan, Nicolas Prigent. NoName, un protocole de routage ad hoc respectant la vie privée, 2013-09-16. (https://centralesupelec.hal.science/hal-00919178)
- Regina Paiva Melo Marin, Guillaume Piolle, Christophe Bidan. An Analysis Grid for Privacy-related Properties of Social Network Systems, 2013-09-08. (https://centralesupelec.hal.science/hal-00908339)
- Jean-Marc Robert, Christophe Bidan. A proactive routing protocol for wireless ad hoc networks assuring some privacy, 2013-04-17. (https://centralesupelec.hal.science/hal-00920036)
- Regina Paiva Melo Marin, Guillaume Piolle, Christophe Bidan. Privacy Policy Requirements for Distributed Social Network Systems, 2012-06. (https://centralesupelec.hal.science/hal-00736023)
- Christian Artigues, Yves Deswarte, Jérémie Guiochet, Marie-José Huguet, Marc-Olivier Killijian, David Powell, Matthieu Roy, Christophe Bidan, Nicolas Prigent, Emmanuelle Anceaume, Sébastien Gambs, Gilles Guette, Michel Hurfin, Frédéric Schettini. AMORES: an architecture for mobiquitous resilient systems, 2012-04. (https://centralesupelec.hal.science/hal-00736020)
- Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frédéric Tronel, Valérie Viet Triem Tong. From SSIR to CIDre: a New Security Research Group in Rennes, 2011-07-06. (https://centralesupelec.hal.science/hal-00656940)
- Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent. A Trust-Based IDS for the AODV Protocol, 2010-12-15. (https://centralesupelec.hal.science/hal-00547102)
- Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent. Expérimentation sur la détection de nœuds malhonnêtes dans les réseaux ad hoc, 2010-05-18. (https://centralesupelec.hal.science/hal-00547095)
- Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin, Christophe Alleaune, Valérie-Laure Benabou, Denis Beras, Christophe Bidan, Gregor Goessler, Julien Le Clainche, Ludovic Mé, Sylvain Steer. Liability in Software Engineering Overview of the LISE Approach and Illustration on a Case Study, 2010-05-02. (https://inria.hal.science/inria-00472287v3)
- Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula. Implicit Trust Analysis of the AODV Routing Protocol, 2009-09-22. (https://centralesupelec.hal.science/hal-00422264)
- Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula. Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol, 2009-08-29. (https://centralesupelec.hal.science/hal-00422260)
- Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula. Analyse de la confiance dans AODV, 2009-06-22. (https://centralesupelec.hal.science/hal-00422262)
- Hassiba Asmaa Adnane, Rafael de Sousa, Christophe Bidan, Ludovic Mé. Autonomic trust reasoning enables misbehavior detection in OLSR, 2008-03-16. (https://centralesupelec.hal.science/hal-00353032)
- Jérôme Lebegue, Christophe Bidan, Thierry Plesse. An OLSR extension to deal with predefined groups, 2007-11. (https://centralesupelec.hal.science/hal-00268403)
- Hassiba Asmaa Adnane, Rafael de Sousa, Christophe Bidan, Ludovic Mé. Analysis of the implicit trust within the OLSR protocol, 2007-11. (https://centralesupelec.hal.science/hal-00268402)
- Hassiba Asmaa Adnane, Rafael de Sousa, Christophe Bidan, Ludovic Mé. Integrating Trust Reasonings into Node Behavior in OLSR, 2007-10. (https://centralesupelec.hal.science/hal-00268405)
- Jérôme Lebegue, Christophe Bidan, Thierry Plesse. Security of predifined groups in MANETs, 2007-10. (https://centralesupelec.hal.science/hal-00268406)
- Guillaume Hiet, Ludovic Mé, Jacob Zimmermann, Christophe Bidan, Benjamin Morin, Valérie Viet Triem Tong. Détection fiable et pertinente de flux d'information illégaux, 2007-06. (https://centralesupelec.hal.science/hal-00268422)
- Hassiba Asmaa Adnane, Rafael de Sousa, Christophe Bidan, Ludovic Mé. Analyse de la confiance implicite requise dans le routage adhoc OLSR, 2007-06. (https://centralesupelec.hal.science/hal-00268414)
- Jérôme Lebegue, Christophe Bidan, Thierry Plesse. Taking advantage of predifined groups in tactical MANETs, 2007. (https://centralesupelec.hal.science/hal-00268407)
- Jérôme Lebegue, Christophe Bidan, Thierry Plesse, David Boucart. Vers une gestion de groupe sécurisée dans les réseaux ad hoc militaires, 2006-06. (https://centralesupelec.hal.science/hal-00269307)
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan. Experimenting a Policy-Based HIDS Based on an Information Flow Control Model, 2003-12-08. (https://centralesupelec.hal.science/hal-00356441)
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan. An Improved Reference Flow Control Model for Policy-Based Intrusion Detection, 2003-10. (https://centralesupelec.hal.science/hal-00356444)
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan. Introducing reference flow control for intrusion detection at the OS level, 2002-10. (https://centralesupelec.hal.science/hal-00356484)
- POSTER - 1 document
- Kun He, Cyrielle Feron, Gaëtan Le Guelvouit, Christophe Bidan. Image Ciphering to Ensure Privacy on Open Image- Sharing Platforms, 2015-09-27. (https://inria.hal.science/hal-01344473)
- Autre publication - 1 document
- Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. Vers une catégorisation par objectif des outils de visualisation pour la sécurité, 2013-09. (https://centralesupelec.hal.science/hal-00919211)
- Article dans une revue - 5 documents
- Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior. Trust-based security for the OLSR routing protocol, 2013-06. (https://centralesupelec.hal.science/hal-00968882)
- Christopher Humphries, Nicolas Prigent, Christophe Bidan. Visualization for Monitoring Network Security Events, 2012-07. (https://centralesupelec.hal.science/hal-00735995)
- Rafael de Sousa, Hassiba Asmaa Adnane, Christophe Bidan, Ludovic Mé. Vulnerabilidades e Proteções do Protocolo de Roteamento Ad Hoc OLSR sob o Ponto de Vista da Confiança (On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust), 2009-09. (https://centralesupelec.hal.science/hal-00464808)
- Christophe Bidan, Guillaume Hiet, Ludovic Mé, Benjamin Morin, Jacob Zimmermann. Vers une détection d'intrusions à fiabilité et pertinence prouvables, 2006-10. (https://centralesupelec.hal.science/hal-00269279)
- Jérôme Lebegue, Christophe Bidan, Bernard Jouga. Les problématiques de sécurité dans les réseaux ad hoc, 2006-06. (https://centralesupelec.hal.science/hal-00269275)
- Rapport - 4 documents
- Valérie Viet Triem Tong, Christophe Bidan, Ludovic Mé, Christopher Humphries, Guillaume Piolle. Analyse de logs guidée par des vérifications de formules de responsabilité exprimées en CTL, 2011-01. (https://centralesupelec.hal.science/hal-01172702)
- Christophe Alleaune, Valérie-Laure Benabou, Denis Beras, Christophe Bidan, Nicolas Craipeau, Stéphane Frénot, Gregor Goessler, Ronan Hardouin, Julien Le Clainche, Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Ludovic Mé, Marie-Laure Potet, Sylvain Steer, Valérie Viet Triem Tong. Liability in Software Engineering: Overview of the LISE Approach and Illustration on a Case Study, 2009. (https://inria.hal.science/inria-00440437)
- Christophe Bidan, Valérie Issarny. Security Benefits from Software Architecture, 1997. (https://inria.hal.science/inria-00073576)
- Christophe Bidan, Valérie Issarny. Dealing with Multi-Policy Security in Large Open Distributed Systems, 1997. (https://inria.hal.science/inria-00073578)
- Chapitre d'ouvrage - 1 document
- Christophe Bidan. Sécurité et mobilité, 2006. (https://centralesupelec.hal.science/hal-00269308)