Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Jean Leneutre"'
Publikováno v:
Sensors, Vol 21, Iss 24, p 8415 (2021)
The demand for Internet of Things services is increasing exponentially, and consequently a large number of devices are being deployed. To efficiently authenticate these objects, the use of physical unclonable functions (PUFs) has been introduced as a
Externí odkaz:
https://doaj.org/article/ad7b03678a974a439ac4db24fb9263e6
Autor:
Lin Chen, Jean Leneutre
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2009 (2009)
Routing amid malicious attackers in multihop wireless networks with unreliable links is a challenging task. In this paper, we address the fundamental problem of how to choose secure and reliable paths in such environments. We formulate the multipath
Externí odkaz:
https://doaj.org/article/5e7b0c452c9644d4b5524a280bee03ee
Publikováno v:
Proceedings of the 15th International Conference on Agents and Artificial Intelligence.
Since 2009, Moving Target Defense (MTD) has become a new paradigm of defensive mechanism that frequently changes the state of the target system to confuse the attacker. This frequent change is costly and leads to a trade-off between misleading the at
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::76163e2a905e88b32fd6aac07f56164f
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography.
Publikováno v:
2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC).
Autor:
Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien
Publikováno v:
2021 IEEE 20th International Symposium on Network Computing and Applications (NCA).
Publikováno v:
CSR
Deep neural network-based Intrusion Detection Systems (IDSs) are gaining popularity to improve anomaly detection accuracy and robustness. Yet, Deep neural network (DNN) models have been shown to be vulnerable to adversarial attacks. An attacker can u
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2021 (2021)
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of
Autor:
Jean Leneutre, Sophie Chabridon, Nathanaël Denis, Denis Conan, Pierre Chaffardon, Maryline Laurent
Publikováno v:
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications
SECRYPT 2020: 17th International Conference on Security and Cryptography
SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint-Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩
ICETE (2)
SECRYPT 2020: 17th International Conference on Security and Cryptography
SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint-Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩
ICETE (2)
International audience; The content-based publish/subscribe paradigm enables a loosely-coupled and expressive form of communication. However, privacy preservation remains a challenge for distributed event-based middleware especially since encrypted m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::837d87994d374b7ce0a9b75427dd5a79
https://hal.archives-ouvertes.fr/hal-02910407
https://hal.archives-ouvertes.fr/hal-02910407