Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Lancrenon, Jean"'
Autor:
Lancrenon, Jean
Cette thèse est consacrée à la description et à l'étude de la sécurité de divers protocoles destinés à faire de l'authentification d'objets physiques à distance à base de comparaison de vecteurs binaires. L'objectif des protocoles proposé
Externí odkaz:
http://www.theses.fr/2011GRENM021/document
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:827-841
Autor:
Muller, Steve *, Lancrenon, Jean, Harpes, Carlo, Le Traon, Yves, Gombault, Sylvain, Bonnin, Jean-Marie
Publikováno v:
In Computers & Security July 2018 76:1-11
Autor:
Balboni, Paolo, Barata, Martim Taborda, Basile, Cataldo, Bella, Giampaolo, Beuchelt, Gerald, Caballero, Albert, Capparelli, Francesco, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Curry, Samuel J.J., Dara, Rozita, Ellis, Scott R., Gross, William F., Jr., Gurkok, Cem, Hamed, Tarfa, Hao, Feng, Harmening, Jim, Hoffman, Rich, Huseynov, Emin, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Karunamoorthy, Aruna, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Kotapati, Kameswari, Kremer, Stefan C., Lancrenon, Jean, LaPorta, Thomas F., Lewis, Keith, Liu, Peng, Mansoor, Bill, Mims, Nailah A., Padmavathi, V., Pandya, Pramod, Paraboschi, Stefano, Patil, Harsh Kupwade, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Saminathan, R., Santana, Mario D., Seigneur, Jean-Marc, Soper, Daniel S., Spies, Terence, Walker, Jesse, West, Michael A., Yan, Liang, Yee, George O.M., Zhao, Gansen
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:xvii-xviii
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:e109-e123
Autor:
Lancrenon, Jean
Publikováno v:
In Sokratis & I., Agudo (Eds.), Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers (pp. 83-101). Springer-Verlag (2014).
We study three-party, password-authenticated key exchange protocols where the trusted third party has a high-entropy private key to which corresponds a public key. In this scenario we can maintain the user-friendliness of password authentication whil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::d2bce5516a245e6200c10c09e956f791
http://orbilu.uni.lu/handle/10993/10573
http://orbilu.uni.lu/handle/10993/10573
Publikováno v:
In Computer and Information Security Handbook Edition: Second Edition. 2013:705-720
Autor:
Lancrenon, Jean
Publikováno v:
Mathématiques générales [math.GM]. Université Grenoble Alpes, 2011. Français. ⟨NNT : 2011GRENM021⟩
Mathématiques générales [math.GM]. Université de Grenoble, 2011. Français. ⟨NNT : 2011GRENM021⟩
Mathématiques générales [math.GM]. Université de Grenoble, 2011. Français. ⟨NNT : 2011GRENM021⟩
This thesis is dedicated to the description of several bitrsitring comparison based remote object authentication protocols and the study of their theoretical security. The proposed protocols are designed to carry out the authentication of a given obj
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::d421f13779b639a8f78807eef72adb53
https://theses.hal.science/tel-00685206
https://theses.hal.science/tel-00685206
Publikováno v:
2016 11th International Conference on Availability, Reliability & Security (ARES); 2016, p444-453, 10p
Publikováno v:
Applied Cryptography & Network Security (9783319395548); 2016, p58-76, 19p