Hervé Chabanne


Ontology type: schema:Person     


Person Info

NAME

Hervé

SURNAME

Chabanne

Publications in SciGraph latest 50 shown

  • 2022-01-28 Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks in SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING
  • 2021-12-09 Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption in CRYPTOLOGY AND NETWORK SECURITY
  • 2021-06-09 Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2021-02-12 Premium Access to Convolutional Neural Networks in RISKS AND SECURITY OF INTERNET AND SYSTEMS
  • 2021-02-12 Augmented Voting Reality in RISKS AND SECURITY OF INTERNET AND SYSTEMS
  • 2019-01-25 Outsourcing Signatures of Confidential Documents in RISKS AND SECURITY OF INTERNET AND SYSTEMS
  • 2019-01-13 Recognition Over Encrypted Faces in MOBILE, SECURE, AND PROGRAMMABLE NETWORKING
  • 2018-08-08 Efficient Proof Composition for Verifiable Computation in COMPUTER SECURITY
  • 2017-09-13 A User-Centric System for Verified Identities on the Bitcoin Blockchain in DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY
  • 2017-08-12 Verifiable Document Redacting in COMPUTER SECURITY – ESORICS 2017
  • 2016-09-17 Delegating Biometric Authentication with the Sumcheck Protocol in INFORMATION SECURITY THEORY AND PRACTICE
  • 2016-07-02 Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems in DATA AND APPLICATIONS SECURITY AND PRIVACY XXX
  • 2016-04-07 Software-Only Two-Factor Authentication Secure Against Active Servers in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2016
  • 2016-03-18 Hierarchical Identities from Group Signatures and Pseudonymous Signatures in THE NEW CODEBREAKERS
  • 2015-08-27 Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage in INFORMATION SECURITY
  • 2015-04-05 Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2015 Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures in FM 2015: FORMAL METHODS
  • 2014-11-09 Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2014-10-19 Towards Secure Two-Party Computation from the Wire-Tap Channel in INFORMATION SECURITY AND CRYPTOLOGY -- ICISC 2013
  • 2014-08-15 Studying Leakages on an Embedded Biometric System Using Side Channel Analysis in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2014 Idea: Embedded Fault Injection Simulator on Smartcard in ENGINEERING SECURE SOFTWARE AND SYSTEMS
  • 2014 Orthogonal Direct Sum Masking in INFORMATION SECURITY THEORY AND PRACTICE. SECURING THE INTERNET OF THINGS
  • 2014 Improving Thomlinson-Walker’s Software Patching Scheme Using Standard Cryptographic and Statistical Tools in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2014 New Algorithmic Approaches to Point Constellation Recognition in ICT SYSTEMS SECURITY AND PRIVACY PROTECTION
  • 2013 SHADE: Secure HAmming DistancE Computation from Oblivious Transfer in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2013 Cross-Unlinkable Hierarchical Group Signatures in PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS
  • 2013 Collusion-Resistant Domain-Specific Pseudonymous Signatures in NETWORK AND SYSTEM SECURITY
  • 2013 Two Efficient Architectures for Handling Biometric Data While Taking Care of Their Privacy in SECURITY AND PRIVACY IN BIOMETRICS
  • 2013 Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase in DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII
  • 2012-06-24 Protecting AES against side-channel analysis using wire-tap codes in JOURNAL OF CRYPTOGRAPHIC ENGINEERING
  • 2012-02-23 Embedding edit distance to enable private keyword search in HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES
  • 2012 Fuzzy Vault for Multiple Users in PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2012
  • 2011 Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing in SECURE AND TRUST COMPUTING, DATA MANAGEMENT AND APPLICATIONS
  • 2011 Vaudenay’s Privacy Model in the Universal Composability Framework: A Case Study in SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS
  • 2010 Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2009 Extending Match-On-Card to Local Biometric Identification in BIOMETRIC ID MANAGEMENT AND MULTIMODAL COMMUNICATION
  • 2009 Biometric Identification over Encrypted Data Made Feasible in INFORMATION SYSTEMS SECURITY
  • 2009 Another Look at Extended Private Information Retrieval Protocols in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2009
  • 2009 On Physical Obfuscation of Cryptographic Algorithms in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009
  • 2009 Private Interrogation of Devices via Identification Codes in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009
  • 2008 An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2008 A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2008 Cryptanalysis of EC-RAC, a RFID Identification Protocol in CRYPTOLOGY AND NETWORK SECURITY
  • 2008-01-01 An Authentication Protocol with Encrypted Biometric Data in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2008
  • 2008 Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2007 Extended Private Information Retrieval and Its Application in Biometrics Authentications in CRYPTOLOGY AND NETWORK SECURITY
  • 2007 An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication in INFORMATION SECURITY AND PRIVACY
  • 2006 On the Wiretap Channel Induced by Noisy Tags in SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS
  • 2006 Perturbing and Protecting a Traceable Block Cipher in COMMUNICATIONS AND MULTIMEDIA SECURITY
  • 2005 Public Traceability in Traitor Tracing Schemes in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2005
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.89485.38", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.9966.0", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.463717.0", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.426043.7", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.423851.9", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.29773.38", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.457355.5", 
            "type": "Organization"
          }
        ], 
        "familyName": "Chabanne", 
        "givenName": "Herv\u00e9", 
        "id": "sg:person.015205413777.51", 
        "identifier": [
          {
            "name": "orcid_id", 
            "type": "PropertyValue", 
            "value": "0000-0002-5916-3387"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015205413777.51", 
          "https://orcid.org/0000-0002-5916-3387"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-05-20T08:05", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/person/person_790.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.015205413777.51'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.015205413777.51'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.015205413777.51'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.015205413777.51'


     

    This table displays all metadata directly associated to this object as RDF triples.

    33 TRIPLES      11 PREDICATES      19 URIs      8 LITERALS      3 BLANK NODES

    Subject Predicate Object
    1 sg:person.015205413777.51 schema:affiliation N690609aba38e417ebc652f476c7be9ea
    2 grid-institutes:grid.29773.38
    3 grid-institutes:grid.423851.9
    4 grid-institutes:grid.426043.7
    5 grid-institutes:grid.457355.5
    6 grid-institutes:grid.463717.0
    7 grid-institutes:grid.9966.0
    8 schema:familyName Chabanne
    9 schema:givenName Hervé
    10 schema:identifier N812338f9fccf47a7bd04a6b1eb4d8cf1
    11 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015205413777.51
    12 https://orcid.org/0000-0002-5916-3387
    13 schema:sdDatePublished 2022-05-20T08:05
    14 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    15 schema:sdPublisher N64153a208d714210958f10f4edef6f4f
    16 sgo:license sg:explorer/license/
    17 sgo:sdDataset persons
    18 rdf:type schema:Person
    19 N64153a208d714210958f10f4edef6f4f schema:name Springer Nature - SN SciGraph project
    20 rdf:type schema:Organization
    21 N690609aba38e417ebc652f476c7be9ea schema:affiliation grid-institutes:grid.89485.38
    22 sgo:isCurrent true
    23 rdf:type schema:OrganizationRole
    24 N812338f9fccf47a7bd04a6b1eb4d8cf1 schema:name orcid_id
    25 schema:value 0000-0002-5916-3387
    26 rdf:type schema:PropertyValue
    27 grid-institutes:grid.29773.38 schema:Organization
    28 grid-institutes:grid.423851.9 schema:Organization
    29 grid-institutes:grid.426043.7 schema:Organization
    30 grid-institutes:grid.457355.5 schema:Organization
    31 grid-institutes:grid.463717.0 schema:Organization
    32 grid-institutes:grid.89485.38 schema:Organization
    33 grid-institutes:grid.9966.0 schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...