default search action
Laurent Gomez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c27]Laurent Gomez, Francesco Capano, Patrick Duverger:
Security for Next-Gen Analytics for Cross-Organisation Collaboration. SECRYPT 2023: 604-609 - [c26]Laurent Gomez, Tianchi Yu, Patrick Duverger:
Security for Distributed Machine Learning. SECRYPT 2023: 838-843
2010 – 2019
- 2019
- [c25]Laurent Gomez, Marcus Wilhelm, José Márquez, Patrick Duverger:
Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection. ICETE (2) 2019: 439-447 - [c24]Lorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, Patrick Duverger:
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data. SEC 2019: 151-164 - [i2]Lorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, Patrick Duverger:
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data. CoRR abs/1901.02477 (2019) - [i1]Laurent Gomez, Marcus Wilhelm, José Márquez, Patrick Duverger:
Security for Distributed Deep Neural Networks Towards Data Confidentiality & Intellectual Property Protection. CoRR abs/1907.04246 (2019) - 2018
- [c23]Laurent Gomez, Alberto Ibarrondo, José Márquez, Patrick Duverger:
Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference. ICETE (2) 2018: 313-320 - 2017
- [c22]Vasily Mikhalev, Laurent Gomez, Frederik Armknecht, José Márquez:
Towards End-to-End Data Protection in Low-Power Networks. CyberICPS/SECPRE@ESORICS 2017: 3-18 - 2015
- [c21]Francesco Di Cerbo, Dolière Francis Somé, Laurent Gomez, Slim Trabelsi:
PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile. TELERISE@ICSE 2015: 2-7 - [c20]Slim Trabelsi, Francesco Di Cerbo, Laurent Gomez, Michele Bezzi:
A Privacy Preserving Framework for Mobile and Cloud. MOBILESoft 2015: 160-161 - 2014
- [c19]Laurent Gomez, Slim Trabelsi:
Obligation Based Access Control. OTM Workshops 2014: 108-116 - 2013
- [j5]Laurent Gomez, Michel Riveill:
Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application. Int. J. Agric. Environ. Inf. Syst. 4(4): 1-24 (2013) - [j4]Omar Gaci, Hervé Mathieu, Jean-Pierre Deutsch, Laurent Gomez:
Dynamic Risk Assessment by Communicating Objects in Supply Chain of Chemicals. Int. J. Appl. Logist. 4(2): 34-45 (2013) - [c18]Mehdi Khalfaoui, Refik Molva, Laurent Gomez:
Secure Alert Tracking in Supply Chain. SECRYPT 2013: 219-229 - 2012
- [c17]Mehdi Khalfaoui, Refik Molva, Laurent Gomez:
Secure Product Tracking in Supply Chain. Inscrypt 2012: 351-370 - 2011
- [c16]Laurent Gomez, Xavier Gentile, Michel Riveill:
A framework for trust assessment of sensor data. WMNC 2011: 1-7
2000 – 2009
- 2009
- [j3]Alessandro Sorniotti, Refik Molva, Laurent Gomez:
Efficient Access Control forWireless Sensor Data. Ad Hoc Sens. Wirel. Networks 7(3-4): 325-336 (2009) - [j2]Alessandro Sorniotti, Refik Molva, Laurent Gomez, Christophe Trefois, Annett Laube, Piervito Scaglioso:
Efficient Access Control for Wireless Sensor Data. Int. J. Wirel. Inf. Networks 16(3): 165-174 (2009) - [c15]Laurent Gomez, Annett Laube, Alessandro Sorniotti:
Trustworthiness Assessment of Wireless Sensor Data for Business Applications. AINA 2009: 355-362 - [c14]Pierre-Christophe Mesnil, Cédric Ulmer, Laurent Gomez:
Web based communication between embedded systems and an ERP. INDIN 2009: 551-556 - [c13]Ángel Cuevas, Manuel Urueña, Annett Laube, Laurent Gomez:
LWESP: Light-Weight Exterior Sensornet Protocol. ISCC 2009: 913-919 - [c12]Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube, Alessandro Sorniotti:
A Security Pattern for Untraceable Secret Handshakes. SECURWARE 2009: 8-14 - [p1]Laurent Gomez, Annett Laube, Alessandro Sorniotti:
Access Control in Mobile and Ubiquitous Environments. Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability 2009: 278-294 - 2008
- [c11]Jean-François Landry, Cédric Ulmer, Laurent Gomez:
Fuzzy Distributed Workflows for Crisis Management Decision Makers. EuroISI 2008: 226-236 - [c10]Laurent Gomez, Annett Laube, Alessandro Sorniotti:
Design guidelines for integration of wireless sensor networks with enterprise systems. MOBILWARE 2008: 12 - [c9]Laurent Gomez, Annett Laube, Vincent Ribière, Alessandro Sorniotti, Christophe Trefois, Marco Valente, Patrick Wetterwald:
Encryption-based access control for building management. MobiQuitous 2008 - [c8]Alessandro Sorniotti, Refik Molva, Laurent Gomez:
Efficient access control for wireless sensor data. PIMRC 2008: 1-5 - [c7]Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube:
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data. SECURWARE 2008: 62-67 - 2007
- [c6]Slim Trabelsi, Laurent Gomez, Yves Roudier:
Context-Aware Security Policy for the Service Discovery. AINA Workshops (1) 2007: 477-482 - [c5]Johan Lukkien, Frank Siegemund, Richard Verhoeven, Remi Bosman, Laurent Gomez, Michael Hellenschmidt:
The WASP Architecture for Wireless Sensor Networks. AmI Workshops 2007: 430-447 - [c4]Laurent Gomez, Ivonne Thomas:
Towards User Authentication Flexibility. SECRYPT 2007: 59-66 - [c3]Annett Laube, Laurent Gomez:
Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies. SECRYPT 2007: 386-393 - 2006
- [j1]Konrad S. Wrona, Laurent Gomez:
Context-aware security and secure context-awareness in ubiquitous computing environments. Ann. UMCS Informatica 4(1): 332-348 (2006) - [c2]Laurent Gomez, Ulrich Jansen:
Trust Establishment in Emergency Case. iTrust 2006: 443-448 - [c1]Sven Lachmund, Thomas Walter, Laurent Gomez, Laurent Bussard, Eddy Olk:
Context-Aware Access Control; Making Access Control Decisions Based on Context Information. MobiQuitous 2006: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint