Academic literature on the topic 'Protection des informations biométriques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection des informations biométriques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protection des informations biométriques":
Rameix, Gérard. "La protection des informations privilégiées." Revue internationale de droit comparé 71, no. 1 (2019): 107–22. http://dx.doi.org/10.3406/ridc.2019.21036.
Choi, Kwan Sig. "Personal Information Protection Crisis Management in Big Data." Crisis and Emergency Management: Theory and Praxis 17, no. 11 (November 30, 2021): 95–108. http://dx.doi.org/10.14251/crisisonomy.2021.17.11.95.
Kumar, S. Martin Selva, Dr S. Kevin Andrews, and Dr N. Jayashri. "Finite Time Stabilization in the Production and its Informations Protection." International Journal of Research Publication and Reviews 5, no. 4 (April 28, 2024): 9812–19. http://dx.doi.org/10.55248/gengpi.5.0424.1139.
Jiang, Yan Lan, Xiao Rui Liang, and Shi Yong Wu. "Nanotechnology Applications in the Field of Ship Protection." Materials Science Forum 694 (July 2011): 239–43. http://dx.doi.org/10.4028/www.scientific.net/msf.694.239.
HyoungSuk Ko. "A Study on the expansion of the Informations Protection Certification Systems." Journal of Law and Politics research 16, no. 2 (June 2016): 411–41. http://dx.doi.org/10.17926/kaolp.2016.16.2.411.
Jouanno, Aubrie. "Un mandat de surveillance étendu. Une analyse des effets de la pauvreté sur la surexposition au signalement à la maternité et à l’école." Revue française des affaires sociales, no. 3 (December 5, 2023): 49–72. http://dx.doi.org/10.3917/rfas.233.0049.
Saettel, Camille. "Les secrets d’affaires : transposition en droit luxembourgeois de la directive européenne 2016/943." Pin Code N° 2, no. 2 (July 28, 2019): 1–10. http://dx.doi.org/10.3917/pinc.002.0001.
Lussier, Louise. "Le régime québécois d'indemnisation des victimes d'immunisation: problèmes d'application." Les Cahiers de droit 31, no. 3 (April 12, 2005): 849–69. http://dx.doi.org/10.7202/043039ar.
Eschwège, P. "Quelles sont les informations fournies par la transplantation rénale sur la protection rénale ?" Annales Françaises d'Anesthésie et de Réanimation 24, no. 2 (February 2005): 182–93. http://dx.doi.org/10.1016/j.annfar.2004.12.026.
Brett, Raphaël. "Le renforcement de la ‘démocratie environnementale’ par le droit international : décryptage de l’accord d’Escazú." Annuaire français de droit international 66, no. 1 (2020): 693–708. http://dx.doi.org/10.3406/afdi.2020.5488.
Dissertations / Theses on the topic "Protection des informations biométriques":
Bardou, Sophie. "Les traitements de données biométriques en entreprise." Thesis, Montpellier 1, 2010. http://www.theses.fr/2010MON10031/document.
Biometry brings together computing techniques that enable the identification of individuals on the basis of their biological, physical appearance and/or behavioral characteristics. Although firstly reserved for the legal system/judiciary domain, biometry tends to be generalized in all spheres of people life. Recently, biometry has also been used in companies who are always receptive to new technologies. Thus, the introduction of identifying devices such as these into a company life has to be the subject of corporate discussions between the managing teams and staff representatives. Indeed, such technologies are often compared to video surveillance, RFID chips, GPS data … and they can lead to the spying of employees if their uses are not well supervised. In the absence of specific laws, the legislator has given the CNIL the abilities to establish the requirements of eligibility of this technology usage within the companies. The "liberty and computing" legislation is then combined with the labor laws in order to apply common principles such as the finality, the proportionality, the loyalty, the transparency of information and employee consents
Mtibaa, Aymen. "Towards robust and privacy-preserving speaker verification systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS002.
Speaker verification systems are a key technology in many devices and services like smartphones, intelligent digital assistants, healthcare, and banking applications. Additionally, with the COVID pandemic, access control systems based on fingerprint scanners or keypads increase the risk of virus propagation. Therefore, companies are now rethinking their employee access control systems and considering touchless authorization technologies, such as speaker verification systems.However, speaker verification system requires users to transmit their recordings, features, or models derived from their voice samples without any obfuscation over untrusted public networks which stored and processed them on a cloud-based infrastructure. If the system is compromised, an adversary can use this biometric information to impersonate the genuine user and extract personal information. The voice samples may contain information about the user's gender, accent, ethnicity, and health status which raises several privacy issues.In this context, the present PhD Thesis address the privacy and security issues for speaker verification systems based on Gaussian mixture models (GMM), i-vector, and x-vector as speaker modeling. The objective is the development of speaker verification systems that perform biometric verification while preserving the privacy and the security of the user. To that end, we proposed biometric protection schemes for speaker verification systems to achieve the privacy requirements (revocability, unlinkability, irreversibility) described in the standard ISO/IEC IS~24745 on biometric information protection and to improve the robustness of the systems against different attack scenarios
Grèzes, Vincent. "Intelligence Economique et Stratégique : protection et Exploitation des Informations Légales en Europe." Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30037.
This research focuses on the identification of legal information available on businesses in Europe, the identification of measures able to protect it, and the identification of methods able to exploit it in an economic and strategic intelligence process. Legal information is understood as structural and accounting information about enterprises, subject to legal disclosure requirement. The results of this study present a repository of legal information on companies in Europe, as well as Switzerland and Norway, and the analysis of different options regarding the protection, the collection and the use of this information in an economic and strategic intelligence process
Ichikawa, Kotaro. "Studies on behavioral ecology and protection measures of the dugongs based on analyses of marine acoustical informations." 京都大学 (Kyoto University), 2007. http://hdl.handle.net/2433/135985.
Marot, Pierre-Yves. "Les données et informations à caractère personnel : essai sur la notion et ses fonctions." Nantes, 2007. http://www.theses.fr/2007NANT4012.
Whereas the primacy of the person is strongly stated by law, the splitting of the, legal sources devoted to the data and information pertaining to the person (personal data. Nominative information, privacy. . . ) is likely to set the dismantling of the person into as many specific legal statuses as there are data and information. The notion of privacy highly participates to this danger because, if its protection means the protection of an important amount of data and information, their nature doesn't indicate what legal status is to be applied in each case. In this context, it is not surprising to see courts allowing the modification of the civil status (names, surnames, sex. . . ) on the paradoxical rationale of the right of privacy, even if it in large parts depends on state decisions. Facing these conceptual contradictions, we note the emergence of a category of personal data and information which as common criterion holds the identification of the person thus allowed. Starting from this functional category, it becomes possible to explore its practical implication and to give an account of it. As it appears, if the use of personal data and information remains exceptional, it becomes massive as soon as public interest are concerned (e. G. Penal system, public health and public information). It is therefore advised to restore in all, its fullness. The principle of protection for personal data and information by strictly appreciating its exemptions and by relying on the necessary safeguard unavailability provides
Anstett, Michel. "L'enquête sociale en protection de l'enfance : techniques utilisées et influences des informations fournies par l'environnement sur le diagnostic révélant l'inadaptation." Paris 8, 1987. http://www.theses.fr/1987PA080169.
We will choose the methodological approach valuing the interactive aspects of several parameters which intervene in the social investigation practices. We suppose that the last in a privileged objet from and around which there can be several social and institutional practices observed. Consequently, the social investigation becomes : 1. An act of social service assistance based on listening and respecting the notions of the individual, 2. A judicial tool of information and of verification whose invention is in itself historically dated, 3. A method of investigation in which the interview techniques and certain conceptions of the observation approach express themselves, 4. A practice through which it is possible to retrace the channels of report and discover the origins of the inadaptility. Presented under the forme of four distinct but complementary parts, our study approaches this four stages in a dialectic way. Some importants facts : the report is not only of professional use, but is also used in an active way by the social corps. But, also, it is used by the professionals as an internal regulation. The inquiry investigation, in spite of its technicality and recours to the human sciences, remains well defined by the procedurial logic of the law. The social inquiry is not the unity of something more vast, and cannot be analysed without an observation of the whole of the social field
Anstett, Michel. "L'Enquête sociale en protection de l'enfance techniques utilisées et influence des informations fournies par l'environnement sur le diagnostic révélant l'inadaptation /." Lille 3 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb37602267p.
Morel, Victor. "Enhancing transparency and consent in the internet of things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI073.
In an increasingly connected world, the Internet permeates every aspect of our lives. The number of devices connected to the global network is rising, with prospects foreseeing 75 billions devices by 2025. The Internet of Things envisioned twenty years ago is now materializing at a fast pace, but this growth is not without consequence. The increasing number of devices raises the possibility of surveillance to a level never seen before. A major step has been taken in 2018 to safeguard privacy, with the introduction of the General Data Protection Regulation (GDPR) in the European Union. It imposes obligations to data controllers on the content of information about personal data collection and processing, and on the means of communication of this information to data subjects. This information is all the more important that it is required for consent, which is one of the legal grounds to process personal data. However, the Internet of Things can pose difficulties to implement lawful information communication and consent management. The tension between the requirements of the GDPR for information and consent and the Internet of Things cannot be easily solved. It is however possible. The goal of this thesis is to provide a solution for information communication and consent management in the Internet of Things from a technological point of view. To do so, we introduce a generic framework for information communication and consent management in the Internet of Things. This framework is composed of a protocol to communicate and negotiate privacy policies, requirements to present information and interact with data subjects, and requirements over the provability of consent. We support the feasibility of this generic framework with different options of implementation. The communication of information and consent through privacy policies can be implemented in two different manners: directly and indirectly. We then propose ways to implement the presentation of information and the provability of consent. A design space is also provided for systems designers, as a guide for choosing between the direct and the indirect implementations. Finally, we present fully functioning prototypes devised to demonstrate the feasibility of the framework’s implementations. We illustrate how the indirect implementation of the framework can be developed as a collaborative website named Map of Things. We then sketch the direct implementation combined with the agent presenting information to data subjects under the mobile application CoIoT
Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques." Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Dealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the design and implementation of practical privacy-preserving biometric systems, from the feature extraction to the matching with enrolled users. This work is consecrated to the design of secure biometric solutions for multiple scenarios, putting special care to balance accuracy and performance with the security guarantees, while improving upon existing works in the domain. We go beyond privacy preservation against semi-honest adversaries by also ensuring correctness facing malicious adversaries. Lastly, we address the leakage of biometric data when revealing the output, a privacy concern often overlooked in the literature. The main contributions of this thesis are: • A new face identification solution built on FE-based private inner product matching mitigating input leakage. • A novel efficient two-party computation protocol, Funshade, to preserve the privacy of biometric thresholded distance metric operations. • An innovative method to perform privacy-preserving biometric identification based on the notion of group testing named Grote. • A new distributed decryption protocol with collaborative masking addressing input leakage, dubbed Colmade. • An honest majority three-party computation protocol, Banners, to perform maliciously secure inference of Binarized Neural Networks. • A HE Python library named Pyfhel, offering a high-level abstraction and low-level functionalities, with applications in teaching
Gerl, Armin. "Modelling of a privacy language and efficient policy-based de-identification." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI105.
The processing of personal information is omnipresent in our datadriven society enabling personalized services, which are regulated by privacy policies. Although privacy policies are strictly defined by the General Data Protection Regulation (GDPR), no systematic mechanism is in place to enforce them. Especially if data is merged from several sources into a data-set with different privacy policies associated, the management and compliance to all privacy requirements is challenging during the processing of the data-set. Privacy policies can vary hereby due to different policies for each source or personalization of privacy policies by individual users. Thus, the risk for negligent or malicious processing of personal data due to defiance of privacy policies exists. To tackle this challenge, a privacy-preserving framework is proposed. Within this framework privacy policies are expressed in the proposed Layered Privacy Language (LPL) which allows to specify legal privacy policies and privacy-preserving de-identification methods. The policies are enforced by a Policy-based De-identification (PD) process. The PD process enables efficient compliance to various privacy policies simultaneously while applying pseudonymization, personal privacy anonymization and privacy models for de-identification of the data-set. Thus, the privacy requirements of each individual privacy policy are enforced filling the gap between legal privacy policies and their technical enforcement
Books on the topic "Protection des informations biométriques":
Rudin, Beat, and Baeriswyl Bruno. Praxiskommentar zum Informations- und Datenschutzgesetz des Kantons Zürich (IDG). Zürich: Schulthess, 2012.
Germany) Herbstakademie (11th 2010 Munich. Digitale Evolution: Herausforderungen für das Informations- und Medienrecht ; [Tagungsband Herbstakademie 2010]. Edewecht: Oldenburger Verlag für Wirtschaft, Informatik und Recht (OlWIR), 2010.
Property, Canada Movable Cultural. Designation of institutions and public authorities : guidelines & information =: Désignation des administrations et des établissements : lignes directrices et informations. Ottawa, Ont: Dept. of Communications = Ministère des communications, 1990.
Wolfgang, Zankl, and Feiler Lukas, eds. Auf dem Weg zum Überwachungsstaat?: Neue Überwachungsmassnahmen im Bereich der Informations- und Kommunikationstechnologie. Wien: Facultas.wuv, 2009.
Rojas, Fernando Martínez. Habeas data. Colombia: Ediciones Jurídicas Gustavo Ibáñez, 1999.
UNESCO-Kommission, Nationale Schweizerische. Die UNESCO-Konvention 1970 und ihre Anwendung: Standortbestimmung und Perspektiven : Beiträge der Informations- und Austauschtagung vom 1. Juni 2010 in Bern = La convention UNESCO de 1970 et sa mise en application : etat des lieux et perspectives : les textes de la journee d'information et d'echange du 1 juin 2010 a Berne. Zürich: Dike, 2011.
MYLY, E. L. EL. Informations Personnelles Confidentielles: Un Carnet de Protection des Informations Personnelles / Conserve Toutes Vos Informations Confidentielles 110 Page. Independently Published, 2021.
Auf dem Weg zum Überwachungsstaat?: Neue Überwachungsmassnahmen im Bereich der Informations- und Kommunikationstechnologie. Wien: Facultas.wuv, 2009.
Informations sur les ressources en environnement dans les îles de l'océan Indien: Comores, Madagascar, Maurice, Réunion, Seychelles : personnes ressources, institutions et organismes, projets ou activités, bibliographies. 2nd ed. Antananarivo, Madagascar: REDES OI, 2001.
FAFA, Lala LALA. Journal de Bord de Private Password Tracker: Un Carnet de Protection des Informations Personnelles / Conserve Tous Vos Mots de Passe Privés. Independently Published, 2022.
Book chapters on the topic "Protection des informations biométriques":
Tanzini, Lorenzo. "«Situm in loco alto et forti». Una controversia del vescovo Andrea de’ Mozzi per il monastero di San Miniato." In La Basilica di San Miniato al Monte di Firenze (1018-2018), 151–73. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-295-9.09.
Gallot, Éric. "Outil 15. Les règles de protection des informations classifiées." In La boîte à outils de la sécurité économique, 54–57. Dunod, 2015. http://dx.doi.org/10.3917/dunod.moine.2015.01.0054.
Abirov, Rustam, and Mirzakhid Miralimov. "On Mitigation of Damages on Landslide Prone Regions of Uzbekistan." In Advances in Transdisciplinary Engineering. IOS Press, 2023. http://dx.doi.org/10.3233/atde230856.
Boobalan, P., K. Gunasekar, P. Thirumoorthy, and J. Senthil. "An Introduction to Deepfakes on Cryptographic Image Security." In Advances in Multimedia and Interactive Technologies, 72–81. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch006.
"Titelei/Inhaltsverzeichnis." In Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, edited by Diana-Urania Galetta and Jacques Ziller, 1–14. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-1.
Galetta, Diana-Urania. "Information and Communication Technology and Public Administration: through the Looking Glass." In Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 117–30. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-117.
Schneider, Jens-Peter. "Bausteine eines Datenverkehrsrechts für die europäische Verwaltung." In Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 131–42. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-131.
Carullo, Gherardo. "Government in the digital era: can we do more with less?" In Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 143–52. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-143.
Losano, Mario G. "Die Transparenz im öffentlichen Recht – Drei Beispiele eines schwer erreichbaren Ziels." In Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 15–34. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-15.
Auby, Jean-Bernard. "Contrôle de la puissance publique et gouvernance par algorithme." In Das öffentliche Recht vor den Herausforderungen der Informations- und Kommunikationstechnologien jenseits des Datenschutzes | Information and Communication Technologies Challenging Public Law, Beyond Data Protection | Le droit public au défi des technologies de l'information et de la communication, au-delà de la protection des donnés, 153–66. Nomos Verlagsgesellschaft mbH & Co. KG, 2018. http://dx.doi.org/10.5771/9783845294933-153.
Conference papers on the topic "Protection des informations biométriques":
Vasiljević, Zoran, and Dragana Vasiljević. "BANKARSKA TAJNA – GRANICE ZAŠTITE." In 14 Majsko savetovanje. University of Kragujevac, Faculty of Law, 2018. http://dx.doi.org/10.46793/xivmajsko.999v.
Pirinu, Andrea, Vincenzo Bagnolo, Raffaele Argiolas, and Marco Utzeri. "Metodologie integrate per la conoscenza, la tutela e la rappresentazione dell’architettura militare storica. Sistemi costruttivi e percorsi voltati lungo i bastioni occidentali di Cagliari (Sardegna, Italia)." In FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11378.
Moise, Andrei emil. "E-LEARNING AND MILITARY RULES ACROSS BATTLEFIELDS." In eLSE 2013. Carol I National Defence University Publishing House, 2013. http://dx.doi.org/10.12753/2066-026x-13-016.
Reports on the topic "Protection des informations biométriques":
Kaboré, Gisele. Etude qualitative sur le mariage précoce des adolescentes: Leur vécu, leurs besoins en matière d'éducation, de santé de la reproduction et d'opportunités socio-économiques. Population Council, 2009. http://dx.doi.org/10.31899/pgy20.1002.