Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Systèmes informatiques - Mesures de sûreté"'
Autor:
Chehade, Samer
Publikováno v:
Human-Computer Interaction [cs.HC]. Université de Technologie de Troyes-UTT, 2021. English. ⟨NNT : ⟩
Networking and Internet Architecture [cs.NI]. Université de Technologie de Troyes, 2021. English. ⟨NNT : 2021TROY0007⟩
Networking and Internet Architecture [cs.NI]. Université de Technologie de Troyes, 2021. English. ⟨NNT : 2021TROY0007⟩
This thesis deals with the problem of awareness and communications in rescue operations. We look forward to designing and implementing a communication system aiming to simplify information sharing in rescue operations based on semantic representation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::928f63723f99cc84808d08797e502209
https://theses.hal.science/tel-03539435/document
https://theses.hal.science/tel-03539435/document
Autor:
Burger, Nicolas
Publikováno v:
Systèmes embarqués. Université de Technologie de Troyes, 2020. Français. ⟨NNT : 2020TROY0021⟩
The security of communications depends on security algorithms which are often based on heavy calculations, in particular within an embedded system in view of its other tasks. In such a context, security algorithms consume significant time and energy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_____10147::cb771f0773e8533fd7b0f9f32eb39885
https://theses.hal.science/tel-03808701
https://theses.hal.science/tel-03808701
Autor:
Ternisien, Guillaume
Publikováno v:
Médecine humaine et pathologie. 2018
Les messageries de santé sécurisées (MSS) sont devenues incontournables dans la pratique quotidienne de la médecine moderne, elles permettent aux différents acteurs de santé de communiquer tout en garantissant le secret médical. Le médecin g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::eeee839bddb33c70acd730fb80811951
https://dumas.ccsd.cnrs.fr/dumas-02128483
https://dumas.ccsd.cnrs.fr/dumas-02128483
Autor:
Weber, Claude
Publikováno v:
La cyberdéfense : politique de l'espace numérique / sous la direction de Stéphane Taillat, Amaël Cattaruzza et Didier Danet
La cyberdéfense : politique de l'espace numérique / sous la direction de Stéphane Taillat, Amaël Cattaruzza et Didier Danet, Armand Colin, pp.52-60, 2018, 978-2-200-62129-2
La cyberdéfense : politique de l'espace numérique / sous la direction de Stéphane Taillat, Amaël Cattaruzza et Didier Danet, Armand Colin, pp.52-60, 2018, 978-2-200-62129-2
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5d49e9c700fa0e60a1026e6bbb3d0cd5
https://hal.univ-rennes2.fr/hal-02873637
https://hal.univ-rennes2.fr/hal-02873637
Autor:
Sokolova, Karina
Publikováno v:
Cryptography and Security [cs.CR]. Université de Technologie de Troyes, 2016. English. ⟨NNT : 2016TROY0008⟩
Nowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors inte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::32352dedec2200a31b70644d11bd6c50
https://theses.hal.science/tel-03361344/document
https://theses.hal.science/tel-03361344/document
Autor:
Wiedling, Cyrille
Publikováno v:
Cryptography and Security [cs.CR]. Université de Lorraine, 2014. English
Other [cs.OH]. Université de Lorraine, 2014. English. ⟨NNT : 2014LORR0199⟩
Cryptography and Security [cs.CR]. Université de Lorraine, 2014. English. ⟨NNT : ⟩
Other [cs.OH]. Université de Lorraine, 2014. English. ⟨NNT : 2014LORR0199⟩
Cryptography and Security [cs.CR]. Université de Lorraine, 2014. English. ⟨NNT : ⟩
Formal methods have been used to analyze security protocols and several tools have even been developed to tackle automatically different proof techniques and ease the verification of such protocols. However, for electronic voting and APIs, current to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::46e8ce675655b0d4677635dde69e4140
https://tel.archives-ouvertes.fr/tel-01107718
https://tel.archives-ouvertes.fr/tel-01107718
Autor:
Varet, Antoine
Le contexte aéronautique a depuis plusieurs années mis en évidence le besoin croissant de technologies de sécurité permettant d'éviter des utilisations malveillantes des matériels ou services installés à bord des avions. La plupart des appro
Externí odkaz:
http://tel.archives-ouvertes.fr/tel-00932283
http://tel.archives-ouvertes.fr/docs/00/93/22/83/PDF/Varet_These2013.pdf
http://tel.archives-ouvertes.fr/docs/00/93/22/83/PDF/Varet_These2013.pdf
Autor:
Bourdier, Tony
Publikováno v:
Autre [cs.OH]. Université Henri Poincaré-Nancy 1, 2011. Français. ⟨NNT : 2011NAN10096⟩
Logique en informatique [cs.LO]. Université Henri Poincaré-Nancy I, 2011. Français
Logique en informatique [cs.LO]. Université Henri Poincaré-Nancy I, 2011. Français
Designing and applying formal methods for specifying, analyzing and verifying softwares and systems are the main driving forces behind the work presented in this manuscript. In this context, our activities fall into the category of formal methods bel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b46b8b8fdf62c2156fbb715fa1f492a1
https://hal.univ-lorraine.fr/tel-01746242/document
https://hal.univ-lorraine.fr/tel-01746242/document
Autor:
Cholez, Thibault
Publikováno v:
Autre [cs.OH]. Université Henri Poincaré-Nancy 1, 2011. Français. ⟨NNT : 2011NAN10036⟩
The purpose of this thesis is to design and implement new monitoring solutions which are able to deal with the security issues affecting data stored in large structured P2P networks (DHT). There are two major types of issues. First, P2P networks are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::611c423af5b140f38b582618da8c1a12
https://hal.univ-lorraine.fr/tel-01746173
https://hal.univ-lorraine.fr/tel-01746173
Autor:
Wagener, Gérard
Publikováno v:
Computer Science [cs]. Institut National Polytechnique de Lorraine-INPL, 2011. English
Other [cs.OH]. Institut National Polytechnique de Lorraine, 2011. English. ⟨NNT : 2011INPL037N⟩
Computer Science [cs]. Institut National Polytechnique de Lorraine-INPL, 2011. English. ⟨NNT : ⟩
Other [cs.OH]. Institut National Polytechnique de Lorraine, 2011. English. ⟨NNT : 2011INPL037N⟩
Computer Science [cs]. Institut National Polytechnique de Lorraine-INPL, 2011. English. ⟨NNT : ⟩
Information security communities are always talking about "attackers" but in reality very little is known about their skills.In the last decade the number of attacks has increased exponentially and honeypots were introduced in order to gather informa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::dca70c8555c7c333c24a7cd15d458e41
https://tel.archives-ouvertes.fr/tel-00627981
https://tel.archives-ouvertes.fr/tel-00627981