Zobrazeno 1 - 10
of 23
pro vyhledávání: '"ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection"'
Autor:
Alexandre Kabil, Gérard Le Comte, Christophe Ponchel, Yoran Halgand, Nora Cuppens, Thierry Duval
Publikováno v:
CDVE 2018 : 15th International Conference on Cooperative Design, Visualization and Engineering
CDVE 2018 : 15th International Conference on Cooperative Design, Visualization and Engineering, Oct 2018, Hangzou, China. pp.176-183, ⟨10.1007/978-3-030-00560-3_24⟩
Lecture Notes in Computer Science ISBN: 9783030005597
CDVE
CDVE 2018 : 15th International Conference on Cooperative Design, Visualization and Engineering, Oct 2018, Hangzou, China. pp.176-183, ⟨10.1007/978-3-030-00560-3_24⟩
Lecture Notes in Computer Science ISBN: 9783030005597
CDVE
in proceedings of CDVE 2018 (15th International Conference on Cooperative Design, Visualization and Engineering), Springer, p. 176-183, Hangzhou, China, October 21-24, 2018; International audience; Although Immersive Analytics solutions are now devel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::11ee893a16f902015425879f43967d35
https://hal.archives-ouvertes.fr/hal-01831965/file/CDVE2018.pdf
https://hal.archives-ouvertes.fr/hal-01831965/file/CDVE2018.pdf
Publikováno v:
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems
Workshop on Privacy by Design in Distributed Systems W-P2DS
Workshop on Privacy by Design in Distributed Systems W-P2DS, Apr 2018, Porto, Portugal. ⟨10.1145/3195258.3195262⟩
P2DS@EuroSys
Workshop on Privacy by Design in Distributed Systems W-P2DS
Workshop on Privacy by Design in Distributed Systems W-P2DS, Apr 2018, Porto, Portugal. ⟨10.1145/3195258.3195262⟩
P2DS@EuroSys
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f6aa905493b3c21d3a09d5a0efb66311
https://hal.archives-ouvertes.fr/hal-01801080
https://hal.archives-ouvertes.fr/hal-01801080
Autor:
Guillaume Bouffard, Jean-Louis Lanet
Publikováno v:
Computers and Security
Computers and Security, Elsevier, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, Elsevier, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
International audience; Recently, researchers published several attacks on smart cards. Among these, software attacks are the most affordable, they do not require specific hardware (laser, EM probe, etc.). Such attacks succeed to modify a sensitive s
Autor:
Grothoff, Christian
Publikováno v:
Networking and Internet Architecture [cs.NI]. Université de Rennes 1, 2017
GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Our goal is to replace the old insecure Internet protocol stack. Starting from an application for secure publication of files,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6bcdc75e1953d269cbb6f1678b2555c3
https://hal.inria.fr/tel-01654244
https://hal.inria.fr/tel-01654244
Autor:
Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Guy Gogniat
Publikováno v:
2017 27th International Conference on Field Programmable Logic and Applications (FPL)
2017 27th International Conference on Field Programmable Logic and Applications (FPL), Sep 2017, Ghent, Belgium. ⟨10.23919/fpl.2017.8056767⟩
BASE-Bielefeld Academic Search Engine
FPL
2017 27th International Conference on Field Programmable Logic and Applications (FPL), Sep 2017, Ghent, Belgium. ⟨10.23919/fpl.2017.8056767⟩
BASE-Bielefeld Academic Search Engine
FPL
International audience; Security is a major issue nowadays for the embedded systems community. Untrustworthy authorities may use a wide range of attacks in order to retrieve critical information. This paper introduces ARMHEx, a practical solution tar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a735314c3178ba90727b4a62315bd2a7
https://hal.archives-ouvertes.fr/hal-01558473/file/bare_conf.pdf
https://hal.archives-ouvertes.fr/hal-01558473/file/bare_conf.pdf
Autor:
Fangan-Yssouf Dosso, Pascal Véron
Publikováno v:
IOLTS 2017
IOLTS 2017, Jul 2017, Thessaloniki, Greece. pp.163-168, ⟨10.1109/IOLTS.2017.8046212⟩
IOLTS
IOLTS 2017, Jul 2017, Thessaloniki, Greece. pp.163-168, ⟨10.1109/IOLTS.2017.8046212⟩
IOLTS
International audience; In this paper, we improved the method proposed in [1] which was designed to detect errors in the elliptic curve scalar multiplication algorithm (ECSM). The algorithm we propose is SPA-secure and safe against recent data and in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cc48062ab05749fed187850cf6df8360
https://hal-univ-tln.archives-ouvertes.fr/hal-01618180
https://hal-univ-tln.archives-ouvertes.fr/hal-01618180
Publikováno v:
GREHACK 2013
GREHACK 2013, Guillaume Jeanne, Nov 2013, Grenoble, France
GREHACK 2013, Guillaume Jeanne, Nov 2013, Grenoble, France
to appear also in Springer Journal of Computer Virology and Hacking Techniques (JCVHT); International audience; We analyzed the RATP App, both Android and iOS versions, using our instrumented versions of these mobile OSs. Our analysis reveals that bo
Autor:
Blin, Lélia, Tixeuil, Sébastien
Publikováno v:
Proceedings of DISC 2017
31st International Symposium on Distributed Computing (DISC 2017)
31st International Symposium on Distributed Computing (DISC 2017), Oct 2017, Vienna, Austria
31st International Symposium on Distributed Computing (DISC 2017)
31st International Symposium on Distributed Computing (DISC 2017), Oct 2017, Vienna, Austria
International audience; We present a self-stabilizing leader election algorithm for general networks, with space-complexity $O(\max\{\log \Delta, \log \log n\})$ bits per node in $n$-node networks with maximum degree~$\Delta$. This space complexity i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::704161c89345efcef4ea01c512fe0757
https://hal.sorbonne-universite.fr/hal-01553088
https://hal.sorbonne-universite.fr/hal-01553088
Publikováno v:
Annual Conference on Privacy, Security and Trust
Annual Conference on Privacy, Security and Trust, Dec 2016, Auckland, New Zealand
PST
Annual Conference on Privacy, Security and Trust, Dec 2016, Auckland, New Zealand
PST
International audience; JavaScript (JS) engines are virtual machines that execute JavaScript code. These engines find frequent application in web browsers like Google Chrome, Mozilla Firefox, Microsoft Internet Explorer and Apple Safari. Since, the p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d53a03d71d22c43e0b528e8632bc479d
https://hal.inria.fr/hal-01382971/document
https://hal.inria.fr/hal-01382971/document
Autor:
Romain Laborde
Publikováno v:
Cryptographie et sécurité [cs.CR]. Université Toulouse 3 Paul Sabatier, 2016
HAL
HAL
L’adoption massive de systèmes informatiques multiples et variés dans les entreprises et dans les foyers a profondément changé les activités humaines exacerbant par là même les problématiques de sécurité.En effet, si auparavant le systèm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::2da8e8727631a672b78b76d1e444ff5c
https://hal.archives-ouvertes.fr/tel-01524399/document
https://hal.archives-ouvertes.fr/tel-01524399/document