Name
Affiliation
Papers
NICOLAS ANCIAUX
INRIA Rocquencourt, Le Chesnay, France
53
Collaborators
Citations 
PageRank 
72
148
22.93
Referers 
Referees 
References 
232
695
474
Search Limit
100695
Title
Citations
PageRank
Year
Edgelet Computing: Pushing Query Processing and Liability at the Extreme Edge of the Network00.342022
An Extensive and Secure Personal Data Management System Using SGX00.342022
Data Leakage Mitigation of User-Defined Functions on Secure Personal Data Management Systems00.342022
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution00.342022
Poster: Reducing Data Leakage on Personal Data Management Systems10.382021
Secure Distributed Queries over Large Sets of Personal Home Boxes.00.342020
Personal Data Management Systems: The security and functionality standpoint.40.442019
A Manifest-Based Framework for Organizing the Management of Personal Data at the Edge of the Network.00.342019
Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments10.352019
Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads.00.342019
Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads.00.342019
Reconciling Privacy and Data Sharing in a Smart and Connected Surrounding.00.342018
SWYSWYK: A Privacy-by-Design Paradigm for Personal Information Management Systems.00.342017
Supporting secure keyword search in the personal cloud.10.392017
A New Sharing Paradigm for the Personal Cloud.10.372017
SWYSWYK: A New Sharing Paradigm for the Personal Cloud.00.342017
Distributed Secure Search in the Personal Cloud.20.372016
A Root of Trust for the Personal Cloud.00.342016
A Scalable Search Engine for Mass Storage Smart Objects.00.342015
A Secure Search Engine for the Personal Cloud50.442015
Managing Personal Health Records in an Infrastructure-Weak Environment.00.342015
Limiting Data Exposure in Multi-Label Classification Processes.10.372015
A scalable search engine for mass storage smart objects60.722015
Opportunistic data services in least developed countries: benefits, challenges and feasibility issues20.392014
Folk-IS: Opportunistic Data Services in Least Developed Countries.00.342014
Trusted Cells: Ensuring Privacy For The Citizens Of Smart Cities00.342014
Folk-IS: opportunistic data services in least developed countries40.432014
Tutorial: Managing Personal Data with Strong Privacy Guarantees.00.342014
MILo-DB: a personal, secure and portable database machine110.592014
MinExp-card: limiting data collection using a smart card10.382013
Exposition minimum de données pour des applications à base de classifieurs.00.342013
Trusted Cells: A Sea Change for Personal Data Services.90.552013
The Minimum Exposure Project: Limiting Data Collection In Online Forms20.392012
Limiting data collection in application forms: A real-case application of a founding privacy principle20.372012
Personal Data Server: Keeping Sensitive Data Under The Individual'S Control00.342012
Secure personal data servers: a vision paper230.952010
Pluggable personal data servers60.472010
Secure Personal Data Servers: a Vision Paper.00.342010
A Framework to Balance Privacy and Data Usability Using Data Degradation20.422009
Revelation on demand20.382009
InstantDB: Enforcing Timely Degradation of Sensitive Data40.442008
Data degradation: making private data less sensitive over time40.442008
DiSC: Benchmarking Secure Chip DBMS30.412008
SGBD embarqué dans une puce. Retour d'expérience00.342008
Restoring the Patient Control over Her Medical History60.532008
Querying and Aggregating Visible and Hidden Data Without Leaks00.342007
GhostDB: hiding data from prying eyes00.342007
Future Trends in Secure Chip Data Management20.432007
GhostDB: querying visible and hidden data without leaks151.052007
Balancing smartness and privacy for the ambient intelligence20.412006
  • 1
  • 2