Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Julien Cartigny"'
Publikováno v:
16th IEEE Intl Conf on Dependable, Autonomic and Secure Computing (IEEE-DASC'2018).
16th IEEE Intl Conf on Dependable, Autonomic and Secure Computing (IEEE-DASC'2018)., Aug 2018, Athens, Greece
DASC/PiCom/DataCom/CyberSciTech
16th IEEE Intl Conf on Dependable, Autonomic and Secure Computing (IEEE-DASC'2018)., Aug 2018, Athens, Greece
DASC/PiCom/DataCom/CyberSciTech
In order to bring integrity and confidentiality through memory isolation in embedded devices, we developed Pip, a proto-kernel ensuring only memory isolation and control flow in the Internet of Things's computing environments. Its API is verified, en
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::44177797c765b835f761c50c30686f48
https://hal.archives-ouvertes.fr/hal-01819676
https://hal.archives-ouvertes.fr/hal-01819676
Autor:
Jean-Philippe Wary, Xiao Han, Julien Cartigny, Vicente Sanchez-Leighton, Gilles Grimaud, Chrystel Gaber, Mahieddine Yaker
Publikováno v:
FiCloud 2018
FiCloud 2018, Aug 2018, Barcelona, Spain
FiCloud
FiCloud 2018, Aug 2018, Barcelona, Spain
FiCloud
In recent years, Internet of Things devices(IoT) and Cyber-Physicals Systems(CPS) are ubiquitous and used in many situations (e.g. avionic, vehicles, household devices, smartphones). End-user privacy and security was one of the main concerns of devic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6836c8f5518082023c3a09d5e2fcd2c0
https://hal.archives-ouvertes.fr/hal-01819666
https://hal.archives-ouvertes.fr/hal-01819666
Locality-preserving distributed path reservation protocol for asynchronous cooperative mobile robots
Publikováno v:
ISADS
Many interesting applications of mobile robotics envision groups or swarms of robots cooperating toward a common goal. Due to their inherent mobility and limited energy resources, it is only natural to consider that the robots form a mobile ad hoc ne
Publikováno v:
Ad Hoc Networks. 3:1-16
In the minimum energy broadcasting problem, each node adjusts its transmission power to minimize the total energy consumption while still guaranteeing the full coverage of the network. We consider both topology control and broadcast oriented protocol
Publikováno v:
International Journal of Foundations of Computer Science. 14:253-265
In this paper, we study broadcasting protocols where nodes use some of their neighbors to forward messages. We propose a new protocol based on a variant of neighbor elimination scheme using RNG graph to ensure a full coverage of the network. The comp
Autor:
Julien Cartigny, David Simplot
Publikováno v:
Telecommunication Systems. 22:189-204
We propose some improvements to the flooding protocols that aim to efficiently broadcast given information in ad-hoc networks. These improvements are based on probabilistic approach and decrease the number of emitted packets. Indeed, it is more inter
Publikováno v:
2012 Seventh International Conference on Availability, Reliability and Security
2012 Seventh International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.551-556, ⟨10.1109/ARES.2012.24⟩
ARES
2012 Seventh International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.551-556, ⟨10.1109/ARES.2012.24⟩
ARES
International audience; Smart card are often the target of software or hardware attacks. For instance the most recent attacks are based on fault injection which can modify the behavior of applications loaded in the card, changing them as mutant appli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b4f5f45df19b749fc3172f55d32fe73
https://hal.archives-ouvertes.fr/hal-00937292
https://hal.archives-ouvertes.fr/hal-00937292
Publikováno v:
WIFS
IEEE International Workshop on Information Forensics and Security
International Workshop on Information Forensics and Security (WIFS), 2011
International Workshop on Information Forensics and Security (WIFS), 2011, Nov 2011, Foz do Iguaçu, Portugal. pp.1-6, ⟨10.1109/WIFS.2011.6123124⟩
IEEE International Workshop on Information Forensics and Security
International Workshop on Information Forensics and Security (WIFS), 2011
International Workshop on Information Forensics and Security (WIFS), 2011, Nov 2011, Foz do Iguaçu, Portugal. pp.1-6, ⟨10.1109/WIFS.2011.6123124⟩
International audience; Smart card are often the target of software or hardware attacks. The most recent attack is based on fault injection which modifies the behavior of the application. We propose an evaluation of the effect of the propagation and
Publikováno v:
Personal Wireless Communications ISBN: 9783540231622
PWC
PWC
Several solutions for energy-efficient broadcasting, mostly centralized, have been proposed with directional antennas. However, such globalized protocols are not suitable for ad hoc networks, because each node needs a full knowledge of the topology.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3aab5aa2a514f898c665423ace28353a
https://doi.org/10.1007/978-3-540-30199-8_33
https://doi.org/10.1007/978-3-540-30199-8_33
Autor:
Julien Cartigny, David Simplot
Publikováno v:
HICSS
In this paper, we propose some improvements to the flooding protocols that aim to efficiently broadcast given information through the whole ad-hoc network. These improvements are based on probabilistic approach and decrease the number of emitted pack