Skip to main content

Showing 1–5 of 5 results for author: Brunie, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:1909.06462  [pdf, other

    cs.CR

    A transparent referendum protocol with immutable proceedings and verifiable outcome for trustless networks

    Authors: Maximilian Schiedermeier, Omar Hasan, Tobias Mayer, Lionel Brunie, Harald Kosch

    Abstract: High voter turnout in elections and referendums is very desirable in order to ensure a robust democracy. Secure electronic voting is a vision for the future of elections and referendums. Such a system can counteract factors that hinder strong voter turnout such as the requirement of physical presence during limited hours at polling stations. However, this vision brings transparency and confidentia… ▽ More

    Submitted 13 September, 2019; originally announced September 2019.

    Comments: 14 pages, 3 figures

  2. arXiv:1609.07349  [pdf, other

    cs.CR

    Adaptive Location Privacy with ALP

    Authors: Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Lionel Brunie

    Abstract: With the increasing amount of mobility data being collected on a daily basis by location-based services (LBSs) comes a new range of threats for users, related to the over-sharing of their location information. To deal with this issue, several location privacy protection mechanisms (LPPMs) have been proposed in the past years. However, each of these mechanisms comes with different configuration par… ▽ More

    Submitted 23 September, 2016; originally announced September 2016.

    Comments: 35th Symposium on Reliable Distributed Systems, Sep 2016, Budapest, Hungary

  3. arXiv:1507.00443  [pdf, other

    cs.CR

    Time Distortion Anonymization for the Publication of Mobility Data with High Utility

    Authors: Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie

    Abstract: An increasing amount of mobility data is being collected every day by different means, such as mobile applications or crowd-sensing campaigns. This data is sometimes published after the application of simple anonymization techniques (e.g., putting an identifier instead of the users' names), which might lead to severe threats to the privacy of the participating users. Literature contains more sophi… ▽ More

    Submitted 2 July, 2015; originally announced July 2015.

    Comments: in 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland

  4. Privacy-preserving Publication of Mobility Data with High Utility

    Authors: Vincent Primault, Sonia Ben Mokhtar, Lionel Brunie

    Abstract: An increasing amount of mobility data is being collected every day by different means, e.g., by mobile phone operators. This data is sometimes published after the application of simple anonymization techniques, which might lead to severe privacy threats. We propose in this paper a new solution whose novelty is twofold. Firstly, we introduce an algorithm designed to hide places where a user stops d… ▽ More

    Submitted 30 June, 2015; originally announced June 2015.

    Comments: 2015 35th IEEE International Conference on Distributed Computed Systems

  5. arXiv:1410.7744  [pdf

    cs.CR

    Differentially Private Location Privacy in Practice

    Authors: Vincent Primault, Sonia Ben Mokhtar, Cedric Lauradoux, Lionel Brunie

    Abstract: With the wide adoption of handheld devices (e.g. smartphones, tablets) a large number of location-based services (also called LBSs) have flourished providing mobile users with real-time and contextual information on the move. Accounting for the amount of location information they are given by users, these services are able to track users wherever they go and to learn sensitive information about th… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.longhoe.net/abs/1410.6674)

    Report number: MoST/2014/02