| 12432639 |
Handover in presence of false base stations |
Afef FEKI, Ahmad AWADA |
2025-09-30 |
| 12368598 |
Consensus automation |
Mathieu Boussard |
2025-07-22 |
| 10747906 |
Ensuring USB attack protection |
Haithem El Abed |
2020-08-18 |
| 10673872 |
Advanced persistent threat detection |
Haithem El Abed, Antony Martin |
2020-06-02 |
| 10509904 |
USB attack protection |
Haithem El Abed |
2019-12-17 |
| 10091647 |
Process for preserving the privacy of a user connected to a network |
Sylvain L'Haridon, Wael Kanoun |
2018-10-02 |
| 9998916 |
Process for preserving the privacy of a user connected to a network |
Sylvain L'Haridon, Wael Kanoun |
2018-06-12 |
| 9728009 |
Augmented reality based management of a representation of a smart environment |
Mathieu Boussard, Benoit Christophe |
2017-08-08 |
| 9686239 |
Secure data transmission |
Vincent Toubiana |
2017-06-20 |
| 9571999 |
Conditional interaction control for a virtual object |
Antony Martin |
2017-02-14 |
| 9286487 |
Method for protecting confidentiality of a file distributed and stored at a plurality of storage service providers |
Abdullatif Shikfa |
2016-03-15 |
| 9203615 |
Confidential provisioning of secret keys over the air |
Haithem El Abed, Antony Martin, Abdullatif Shikfa |
2015-12-01 |
| 9135454 |
Systems and methods for enabling searchable encryption |
Abdullatif Shikfa |
2015-09-15 |