Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Michaël Hauspie"'
Publikováno v:
FMEC
Physical fingerprinting is a trending domain in wireless security. Those methods aim at identifying transmitters based on the subtle variations existing in their handling of a communication protocol. They can provide an additional authentication laye
Publikováno v:
Science of Computer Programming
Science of Computer Programming, 2020, 186, ⟨10.1016/j.scico.2019.102342⟩
Science of Computer Programming, Elsevier, 2020, 186, ⟨10.1016/j.scico.2019.102342⟩
TASE
IEEE Xplore
TASE 2018-12th International Symposium on Theoretical Aspects of Software Engineering
TASE 2018-12th International Symposium on Theoretical Aspects of Software Engineering, Aug 2018, Guangzhou, China. pp.60-67, ⟨10.1109/TASE.2018.00016⟩
Science of Computer Programming, 2020, 186, ⟨10.1016/j.scico.2019.102342⟩
Science of Computer Programming, Elsevier, 2020, 186, ⟨10.1016/j.scico.2019.102342⟩
TASE
IEEE Xplore
TASE 2018-12th International Symposium on Theoretical Aspects of Software Engineering
TASE 2018-12th International Symposium on Theoretical Aspects of Software Engineering, Aug 2018, Guangzhou, China. pp.60-67, ⟨10.1109/TASE.2018.00016⟩
International audience; We propose an approach for proving partial-correctness and invariance properties of transition systems, and illustrate it on a model of a security hypervisor. Regarding partial correctness, we generalise the recently introduce
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::442eebdafb0af651d42023a97782d2f6
https://hal.inria.fr/hal-01962912
https://hal.inria.fr/hal-01962912
Publikováno v:
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems
Workshop on Privacy by Design in Distributed Systems W-P2DS
Workshop on Privacy by Design in Distributed Systems W-P2DS, Apr 2018, Porto, Portugal. ⟨10.1145/3195258.3195262⟩
P2DS@EuroSys
Workshop on Privacy by Design in Distributed Systems W-P2DS
Workshop on Privacy by Design in Distributed Systems W-P2DS, Apr 2018, Porto, Portugal. ⟨10.1145/3195258.3195262⟩
P2DS@EuroSys
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f6aa905493b3c21d3a09d5a0efb66311
https://hal.archives-ouvertes.fr/hal-01801080
https://hal.archives-ouvertes.fr/hal-01801080
Autor:
François Serman, Michaël Hauspie
Publikováno v:
Proceedings of the Tenth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016)
The Tenth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016)
The Tenth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016), IEEE, Jul 2016, Fukuoka, Japan
IMIS
The Tenth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016)
The Tenth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016), IEEE, Jul 2016, Fukuoka, Japan
IMIS
International audience; This paper presents the challenges of implementing a bare-metal hypervisor without using hardware virtualization features. This choice is dictated by two reasons:(i) some processor do not include virtualization instructions,(i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d0834313a88f3dd226902e29ade3bc4f
https://hal.archives-ouvertes.fr/hal-01329134
https://hal.archives-ouvertes.fr/hal-01329134
Publikováno v:
International Workshop on the Performance Analysis and Enhancement of Wireless Networks (PAEWN)
International Workshop on the Performance Analysis and Enhancement of Wireless Networks (PAEWN), May 2014, Victoria, Canada
AINA Workshops
International Workshop on the Performance Analysis and Enhancement of Wireless Networks (PAEWN), May 2014, Victoria, Canada
AINA Workshops
International audience; Wireless Sensor Networks (WSN) are composed of constrained devices and deployed in unattended and hostile environments. Most papers presenting solutions for WSN evaluate their work over random topologies to highlight some of t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cd4669f1ed3fc8477d346e40f067501f
https://hal.inria.fr/hal-00959921/document
https://hal.inria.fr/hal-00959921/document
Publikováno v:
2014 International Conference on Information Science, Electronics and Electrical Engineering.
Nowadays, cloud computing becomes quite popular and a lot of research is done on services it provides. Most of security challenges induced by this new architecture are not yet tackled. In this work, we propose a new security architecture, based on a
Publikováno v:
PE-WASUN
Wireless Sensor Networks (WSN) are composed of constrained devices and deployed in unattended and hostile environments. Most papers presenting solutions for WSN evaluate their work over random topologies to highlight some of their "good" performances
Publikováno v:
International Scholarly Research Notices
International Scholarly Research Notices, Hindawi, 2013
International Scholarly Research Notices, 2013
International Scholarly Research Notices, Hindawi, 2013
International Scholarly Research Notices, 2013
International audience; Clustering in wireless sensor networks is an efficient way to structure and organize the network. It aims at identifying a subset of nodes within the network and bind it to a leader (i.e. cluster-head). The leader becomes in c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::70a55fe3d60b7cc7b7ba6fafdde8cd92
https://hal.inria.fr/hal-00863123/file/ISR_Sensor_Networks_Balanced_Clustering.pdf
https://hal.inria.fr/hal-00863123/file/ISR_Sensor_Networks_Balanced_Clustering.pdf
Publikováno v:
WCNC-Wireless Communications and Networking Conference-2013
WCNC-Wireless Communications and Networking Conference-2013, Apr 2013, Shanghai, China
WCNC
WCNC-Wireless Communications and Networking Conference-2013, Apr 2013, Shanghai, China
WCNC
International audience; Clustering in wireless sensor networks is an efficient way to structure and organize the network. It aims to identify a subset of nodes within the network and bind it a leader (i.e. cluster-head). This latter becomes in charge
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::da26f2fda19304f9fbbfadfb9e9f5afc
https://inria.hal.science/hal-00767690/file/WCNC2013.pdf
https://inria.hal.science/hal-00767690/file/WCNC2013.pdf