The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the World, p.9780230341975, 2013. ,
, Emerging Trends in Electricity Consumption for Consumer ICT, 2013.
Clicking Clean: Who Is Winning the Race to Build a Green Internet?, 2017. ,
, On Global Electricity Usage of Communication Technology: Trends to 2030, vol.6, pp.117-157, 2015.
Energy and Data Demand: The Impact of Internet Traffic on Overall and Peak Electricity Consumption, Energy Research & Social Science, vol.38, p.22146296, 2018. ,
Advances in Intelligent Systems and Computing, Grey Energy and Environmental Impacts of ICT Hardware », in: ICT Innovations for Sustainability, pp.171-189, 2015. ,
« Music Streaming Has a Far Worse Carbon Footprint than the Heyday of Records and CDs -New Findings, The Conversation, 2019. ,
, Universal Declaration of Human Rights, Art. 12, United Nations, 1948.
, The Europeran Parliament and the Council of the European Union, General Data Protection Regulation (GDPR), Council regulation (EU) no 2016/679, vol.7, 2016.
, First Sanction against Google Following Our Collective Complaints, 2019.
Use of Data Mining by Private Health Insurance Companies and Customers' Privacy: An Ethical Analysis, Cambridge Quarterly of Healthcare Ethics, vol.24, issue.3, pp.1469-2147, 2015. ,
Terrorist Threat Drives Passion to 'Collect It All', pp.190-8286, 2013. ,
, NSA Mass Surveillance Programs: Unnecessary and Disproportionate, tech. rep., Electronic Frontier Foundation (EFF), p.23, 2014.
, NSA Utah Data Center -Serving Our Nation's Intelligence Community
« 'I Made Steve Bannon's Psychological Warfare Tool': Meet the Data War Whistleblower, The Guardian, 2018. ,
, Private Traits and Attributes Are Predictable from Digital Records of Human Behavior, pp.27-8424, 2013.
« Computer-Based Personality Judgments Are More Accurate than Those Made by Humans, Proceedings of the National Academy of Sciences, vol.112, pp.27-8424, 2015. ,
« Psychological Targeting as an Effective Approach to Digital Mass Persuasion, Proceedings of the National Academy of Sciences, pp.27-8424, 2017. ,
Computer for the 21st Century, Scientific American, vol.265, pp.36-8733, 1991. ,
The Coming Age of Calm Technolgy, Beyond Calculation, pp.0-38794932, 1997. ,
, Privacy-Aware Smart Metering: Progress and Challenges, vol.35, pp.59-78, 2018.
, Hackers Remotely Kill a Jeep on the Highway-With Me in It », in: Wired, pp.1059-1028, 2015.
, Proceedings of the 7th International Conference on Security of Information and Networks, SIN '14, vol.117, pp.978-979, 2014.
, Wearables to Reach $60bn by 2023, 2019.
, Sexual Activity Tracked By Fitbit Shows Up In Google Search Results, 2011.
, Bridging the Interoperability Gap: Overcoming Combined Application and Middleware Heterogeneity », in: Middleware, vol.7049, pp.390-409, 2011.
Towards a Systematic Approach to Composing Systems of Systems, Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware -ARM 2015, pp.1-6, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01245251
, « Composition of Heterogeneous Web Services: A Systematic Review, vol.143, pp.1084-8045, 2019.
« IoT Driven Business Model Innovation and Sustainability: A Literature Review and a Case Study in Brazil, Global IoT Summit (GIoTS), pp.1-6, 2019. ,
, Cory Doctorow, Makers, 2010.
25 Million + Raspberry Pi Computers Sold, 2019. ,
, Cisco Visual Networking Index: Forecast and Trends, 2017.
, Ethical design manifesto
, Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments, vol.4, pp.2299-0984, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01673295
, Distributed Algorithms for Message-Passing Systems, Berlin, Heidelberg, 2013.
, The NIST Definition of Cloud Computing, 2011.
The Transport Layer Security (TLS) Protocol Version 1.3, RFC 8446, RFC Editor, 2018. ,
QUIC: A UDP-Based Multiplexed and Secure Transport, Work in Progress, 2019. ,
Homomorphic Encryption Using Ideal Lattices, Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing -STOC '09, pp.978-979, 2009. ,
A Private Presence Service, Proceedings on Privacy Enhancing Technologies, vol.2, pp.2299-0984, 2015. ,
« The Capacity of Private Information Retrieval From Coded Databases, IEEE Transactions on Information Theory, vol.64, pp.18-9448, 2018. ,
, Conditionals in Homomorphic Encryption and Machine Learning Applications, 2018.
Unique Is Your Web Browser?, Privacy Enhancing Technologies, vol.6205, pp.1-18, 2010. ,
« Hiding in the Crowd: An Analysis of the Effectiveness of Browser Fingerprinting at Large Scale, Proceedings of the 2018 World Wide Web Conference on World Wide Web -WWW '18, pp.309-318, 2018. ,
We Kill People Based on Metadata, 2014. ,
Public WebGL] about the VENDOR, RENDERER, and VERSION Strings, 2010. ,
« Pixel Perfect: Fingerprinting Canvas in HTML5, Proceedings of W2SP 2012, 2012. ,
, , 2017.
« The Case for VM-Based Cloudlets in Mobile Computing, IEEE Pervasive Computing, vol.8, issue.4, pp.1536-1268, 2009. ,
, Computer, vol.50, pp.30-39, 2017.
, 2019 IEEE International Conference on Pervasive Computing and Communications, pp.1-10, 2019.
, Using Machine Learning for Protecting the Security and Privacy of Internet of Things (IoT) Systems », in: Fog and Edge Computing, pp.223-257, 2019.
, Centric Computing: Vision and Challenges, vol.45, pp.37-42, 2015.
Simple Mail Transfer Protocol, RFC 2821, 2001. ,
, Extensible Messaging and Presence Protocol (XMPP): Core, RFC, vol.6120, 2011.
, , vol.3, 2018.
,
,
,
, THe Fediverse Network
A: Gruppo Editoriale Fabbri-Bompiani, pp.978-978, 1980. ,
, Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper) », in: Financial Cryptography and Data Security, pp.250-259, 2012.
, New NSA Leak Shows MITM Attacks Against Major Internet Services -Schneier on Security, 2013.
, Enforcement Appliance Subverts SSL, pp.1059-1028, 2010.
, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, vol.2, p.5, 1981.
, « Hiding Routing Information », in: Information Hiding, vol.1174, pp.137-150, 1996.
Tor: The Second-Generation Onion Router, tech. rep, 2004. ,
The BitTorrent Protocol Specification, tech. rep, 2008. ,
A Peer-to-Peer Information System Based on the Xor Metric, International Workshop on Peer-to-Peer Systems, pp.53-65, 2002. ,
A Practicable Approach towards Secure Key-Based Routing, 2007 International Conference on Parallel and Distributed Systems, pp.1-8, 2007. ,
, A Survey of DHT Security Techniques, vol.43, 2011.
, Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference On, pp.325-334, 2012.
, The BitTorrent DHT Protocol, tech. rep., BitTorrent Inc, 2008.
, IPFS -Content Addressed, Versioned, P2P File System, p.11, 2014.
Distributed Dataset Synchronization And Versioning, 2018. ,
, Epidemic Algorithms for Replicated Database Maintenance, 1987.
Distributed Algorithms for Message-Passing Systems, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00922219
Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations, Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware, Middleware '04, pp.978-981, 2004. ,
, Gossip-based peer sampling, vol.25, p.8, 2007.
A Secure Peer Sampling Protocol, 2008 European Conference on Computer Network Defense, pp.3-10, 2008. ,
, Byzantine Resilient Random Membership Sampling, vol.53, p.13891286, 2009.
« Secure Peer Sampling, Computer Networks, vol.54, p.13891286, 2010. ,
, Secure Scuttlebutt -a Decent(Ralised) Secure Gossip Platform, 2018.
, ACM SIGCOMM Computer Communication Review, vol.49, p.1464833, 2019.
, Scalable Secure Scuttlebutt, 2019.
A Peer-to-Peer Electronic Cash System, p.9, 2008. ,
Decentralizing Identity with Privacy for Secure Messaging, Proceedings of the 12th International Conference on Availability, Reliability and Security -ARES '17, pp.1-10, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01673292
A Provably Secure Proof-of-Stake Blockchain Protocol, Advances in Cryptology -CRYPTO 2017, vol.10401, pp.357-388, 2017. ,
,
, IACR Cryptology ePrint Archive 2016, p.86, 2016.
, A Secure and Practical Tor Anonymity Network With SGX Enclaves, vol.26, pp.1558-2566, 2018.
Cryptographic Group Access Control Using Trusted Execution Environments, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.207-218, 2018. ,
, Proceedings of the 16th ACM Workshop on Hot Topics in Networks, HotNets-XVI, pp.72-79, 2017.
A Compact and Provably Secure Mix Format, 30th IEEE Symposium on Security and Privacy, pp.269-282, 2009. ,
High-Speed Onion Routing at the Network Layer, 2015. ,
, The Libra Blockchain, p.29, 2019.
Libra Is Blockchain Virtue-Signalling at Its Worst -Centralised, Not Private, and Good for Facebook, 2019. ,
Distributed Sensor Virtualization for Mobile Apps, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp.1-9, 2018. ,
Distributed Ledger for P2P Energy Trading: Case with IOTA?, Advanced Information Systems Engineering, pp.111-125, 2019. ,
« Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker, International Conference on Pervasive Computing, pp.398-405, 2009. ,
The new multi-screen world: Understanding cross-platform consumer behavior, 2012. ,
Bernheim Brush, « Home Computing Unplugged: Why, Where and when People Use Different Connected Devices at Home, UBI-COMP'13, pp.627-636 ,
, Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, OzCHI '15, pp.427-436, 2015.
, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.3903-3912, 2015.
Understanding Smartphone Usage, International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, pp.195-208, 2013. ,
, The Tablet Boom Is Long Over | Statista
, , 2019.
Designing Multi-Device Experiences, p.1449340385, 2014. ,
,
,
,
,
,
,
« Designing Peer-to-peer Distributed User Interfaces: Case Studies on Building Distributed Applications, Int. J. Hum.-Comput. Stud, vol.72, issue.1, pp.100-110, 2014. ,
Toolkit for Peer-to-peer Distributed User Interfaces: Concepts, Implementation, and Applications, The 1st ACM SIGCHI Symposium on Engineering Interactive Computing Systems, EICS '09, pp.69-78, 2009. ,
, Deploying Stateful Web Components on Multiple Devices with Liquid.js for Polymer, pp.85-90, 2016.
,
,
,
clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, pp.558-565, 1978. ,
, « Bimodal Multicast, 1998.
Reliable Probabilistic Communication in Large-Scale Information Dissemination Systems, tech. rep, 2000. ,
, Parallel and Distributed Algorithms: proceedings of the International Workshop on Parallel & Distributed Algorithms, pp.215-226, 1989.
« Probabilistic reliable dissemination in large-scale systems, IEEE Transactions on Parallel and Distributed systems, vol.14, pp.248-258, 2003. ,
« Power laws, Pareto distributions and Zipf's law », in: Cities, vol.30, p.2642751, 2013. ,
, Migration of Web Applications with Seamless Execution, pp.173-185, 2015.
« Some Implementations of the Boxplot, The American Statistician, vol.43, pp.50-54, 1989. ,
,
« Roulette-wheel selection via stochastic acceptance, Physica A: Statistical Mechanics and its Applications, vol.391, p.3784371, 2012. ,
« Understanding Churn in Peer-to-peer Networks, Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06, 2006. ,
An Application Framework for Seamless Device-to-Device Interaction in the Wild, Proceedings of the 19th International Middleware Conference on -Middleware '18, pp.161-173, 2018. ,
« D2D Pervasive Communication System with Out-of-Band Control Autonomous to 5G Networks: Project and Evaluation of a Middleware for Networking and Content Exchange to D2D Communication without Human Interaction, Wireless Networks, pp.1572-8196, 2018. ,
« It's on My Other Computer!: Computing with Multiple Devices, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08, pp.767-776, 2008. ,
« A Diary Study of Mobile Information Needs, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI'08, pp.433-442, 2008. ,
Being Human: Human-Computer Interaction in the Year 2020, 2008. ,
Multi-device Mobile Platform for Cross-device Functionality Sharing, Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '17, 2017. ,
, Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, UIST '11, 2011.
, Side Channels in Cloud Services: Deduplication in Cloud Storage, vol.8, pp.40-47, 2010.
, American Spies: Modern Surveillance, Why You Should Care, and What to Do About It, pp.53-66, 2017.
A Distributed Anonymous Information Storage and Retrieval System, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp.46-66, 2001. ,
A Peer-to-peer Anonymizing Network Layer, Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02, 2002. ,
« Introducing MorphMix: Peer-to-peer Based Anonymous Internet Usage with Collusion Detection, Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES '02, 2002. ,
A Peer-to-Peer Anonymizing Network Layer, p.14, 2002. ,
A Structured Approach to Largescale Anonymity, Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06, pp.1-59593, 2006. ,
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Commun. ACM, vol.24, issue.2, pp.84-90, 1981. ,
« Towards Efficient Traffic-Analysis Resistant Anonymity Networks, Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, SIGCOMM '13, pp.978-979, 2013. ,
, Proceedings of the 25th Symposium on Operating Systems Principles -SOSP '15, pp.137-152, 2015.
, 26th USENIX Security Symposium (USENIX Security 17, pp.1199-1216, 2017.
, , pp.978-979, 2017.
, Proceedings of the 2012 ACM Conference on Computer and Communications Security -CCS '12, p.605, 2012.
, Artificial Intelligence, A Modern Approach. Second Edition, p.835, 2003.
Inexpensive Membership Management for Unstructured P2P Overlays, Journal of Network and Systems Management, vol.13, issue.2, pp.197-217, 2005. ,
, Advances in Cryptology -CRYPTO' 93, pp.480-491, 1993.
Cryptography: theory and practice, 2005. ,
, Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, vol.7293, pp.206-224, 2012.
« Privacy in encrypted content distribution using private broadcast encryption, International Conference on Financial Cryptography and Data Security, pp.52-64, 2006. ,
, 3rd International Conference on Digital Satellite Communications, pp.189-195, 1975.
, « An Improved Selective-Repeat ARQ Strategy, vol.30, pp.90-6778, 1982.
Computer Networks: A Systems Approach, pp.97-110, 2003. ,
« Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions, Sensors 18, vol.12, p.4215, 2018. ,
Building the next generation of privacy infrastructure, 2019. ,