Hugues Mercier
Hugues Mercier
Email verificata su - Home page
TitoloCitata daAnno
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
M Khabbazian, H Mercier, VK Bhargava
IEEE Transactions on Wireless Communications 8 (2), 736-745, 2009
A survey of error-correcting codes for channels with symbol synchronization errors
H Mercier, VK Bhargava, V Tarokh
IEEE Communications Surveys & Tutorials 12 (1), 87-96, 2010
Confidentiality-preserving publish/subscribe: A survey
E Onica, P Felber, H Mercier, E Rivière
ACM computing surveys (CSUR) 49 (2), 27, 2016
Some research issues in cognitive radio networks
G Bansal, MJ Hossain, P Kaligineedi, H Mercier, C Nicola, U Phuyal, ...
AFRICON 2007, 1-7, 2007
Thrifty privacy: efficient support for privacy-preserving publish/subscribe
R Barazzutti, P Felber, H Mercier, E Onica, E Rivière
Proceedings of the 6th ACM International Conference on Distributed Event …, 2012
Nis02-1: Wormhole attack in wireless ad hoc networks: Analysis and countermeasure
M Khabbazian, H Mercier, VK Bhargava
IEEE Globecom 2006, 1-6, 2006
Bounds on the capacity of discrete memoryless channels corrupted by synchronization and substitution errors
H Mercier, V Tarokh, F Labeau
IEEE Transactions on Information Theory 58 (7), 4306-4330, 2012
Efficient key updates through subscription re-encryption for privacy-preserving publish/subscribe
E Onica, P Felber, H Mercier, E Rivière
Proceedings of the 16th Annual Middleware Conference, 25-36, 2015
Efficient and confidentiality-preserving content-based publish/subscribe with prefiltering
R Barazzutti, P Felber, H Mercier, E Onica, E Riviere
IEEE Transactions on Dependable and Secure Computing 14 (3), 308-325, 2015
A performance evaluation of erasure coding libraries for cloud-based data stores
D Burihabwa, P Felber, H Mercier, V Schiavoni
IFIP International Conference on Distributed Applications and Interoperable …, 2016
Epto: An epidemic total order algorithm for large-scale distributed systems
M Matos, H Mercier, P Felber, R Oliveira, J Pereira
Proceedings of the 16th Annual Middleware Conference, 100-111, 2015
On the number of subsequences when deleting symbols from a string
H Mercier, M Khabbazian, VK Bhargava
IEEE transactions on information theory 54 (7), 3279-3285, 2008
STeP-archival: Storage integrity and anti-tampering using data entanglement
H Mercier, M Augier, AK Lenstra
2015 IEEE International Symposium on Information Theory (ISIT), 1590-1594, 2015
Error-correcting codes for dynamic spectrum allocation in cognitive radio systems
C Nicola, H Mercier, VK Bhargava
2007 International Symposium on Signals, Systems and Electronics, 247-250, 2007
SafeFS: a modular architecture for secure user-space file systems: one FUSE to rule them all
R Pontes, D Burihabwa, F Maia, J Paulo, V Schiavoni, P Felber, H Mercier, ...
Proceedings of the 10th ACM International Systems and Storage Conference, 9, 2017
Infrastructure provisioning for scalable content-based routing: Framework and analysis
R Barazzutti, P Felber, H Mercier, E Onica, JF Pineau, E Riviere, C Fetzer
2012 IEEE 11th International Symposium on Network Computing and Applications …, 2012
On the cost of safe storage for public clouds: an experimental evaluation
D Burihabwa, R Pontes, P Felber, F Maia, H Mercier, R Oliveira, J Paulo, ...
2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 157-166, 2016
Performance/security tradeoffs for content-based routing supported by Bloom filters
H Mercier, E Onica, E Riviere, P Felber
International Colloquium on Structural Information and Communication …, 2013
Convolutional codes for channels with deletion errors
H Mercier, VK Bhargava
2009 11th Canadian Workshop on Information Theory, 136-139, 2009
SGX-FS: Hardening a File System in User-Space with Intel SGX
D Burihabwa, P Felber, H Mercier, V Schiavoni
2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20