Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Vincent Frey"'
Autor:
Fabrice Bénédet, Sylvie Gourlet-Fleury, Félix Allah-Barem, Fidèle Baya, Denis Beina, Guillaume Cornu, Luc Dimanche, Émilien Dubiez, Éric Forni, Vincent Freycon, Frédéric Mortier, Dakis-Yaoba Ouédraogo, Nicolas Picard, Vivien Rossi, Olivia Semboli, Yves Yalibanda, Olga Yongo-Bombo, Adeline Fayolle
Publikováno v:
Scientific Data, Vol 11, Iss 1, Pp 1-13 (2024)
Abstract A vast silvicultural experiment was set up in 1982 nearby the town of M’Baïki in the Central African Republic to monitor the recovery of tropical forests after disturbance. The M’Baïki experiment consists of ten 4-ha Permanent Sample P
Externí odkaz:
https://doaj.org/article/630a251790b3452882aafff4f8968afe
Autor:
Raymond Pfister, Vincent Frey, Matthias Kirsch, Piergiogio Tozzi, Dominique Delay, Ziyad Gunga, René Prêtre, Lars Niclauss
Publikováno v:
Asian Cardiovascular and Thoracic Annals. :021849232311663
Background To compare mid-term clinical outcomes and hemodynamic performance of the stented pericardial Trifecta bioprosthesis for surgical aortic valve replacement (AVR) with a technically comparable commonly used surgical bioprosthesis. Methods Dat
Publikováno v:
Annals of Telecommunications-annales des télécommunications
Annals of Telecommunications-annales des télécommunications, Springer, 2017, 72 (11-12), pp.755-766. ⟨10.1007/s12243-017-0581-8⟩
Annals of Telecommunications-annales des télécommunications, Springer, 2017, 72 (11-12), pp.755-766. ⟨10.1007/s12243-017-0581-8⟩
International audience; As far as we know, there is no good privacy metric for quantify- ing how privacy-efficient an anonymity system is. This paper discusses first the features needed for defining such a metric and proposes a new metric based on in
Publikováno v:
IEEE Communications Magazine. 55:146-153
The distributed Internet of Things is emerging in the literature as a new paradigm for IoT where remotely controlled smart objects can act on their own to sense/actuate, store, and interpret information either created by them or within the surroundin
Publikováno v:
UbiComp/ISWC Adjunct
In this paper, our team (Orange Labs) propose to address the task of the Sussex-Huawei Locomotion-Transportation (SHL) recognition challenge (2019), which consists in recognizing the user transportation mode based on the smartphone inertial sensors d
Autor:
Vincent Frey, Gael Le Lan
Publikováno v:
ICASSP
This paper investigates the use of recurrent neural networks to secure PIN code based authentication on smartphones, in a scenario where the user is invited to draw digits on the touchscreen. From the sequence of successive positions of the users fin
The Internet of Things operates in a personal-data-rich sector, which makes security and privacy an increasing concern for consumers. Access control is thus a vital issue to ensure trust in the IoT. Several access control models are today available,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a7176e0f3739c5231825f6959be43e6c
http://bura.brunel.ac.uk/handle/2438/20385
http://bura.brunel.ac.uk/handle/2438/20385
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030121426
CRiSIS
CRiSIS
Diffie-Hellman key exchange is a popular cryptographic algorithm that allows Internet protocols to agree on a shared key and negotiate a secure connection. It is used in many protocols including SSH, IPsec, SMTPS, and protocols that rely on TLS. In t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f9c4d25fb6725ef005b9f5944f36694f
https://doi.org/10.1007/978-3-030-12143-3_6
https://doi.org/10.1007/978-3-030-12143-3_6
Publikováno v:
IoTSMS
The need to connect things is skyrocketing and the Internet of Things is drawing a clear pattern of the need for smarter things. We are proposing an upgrade of Constrained Application Protocol (CoAP) built upon the 3 main networking needs of a connec
Publikováno v:
IFIP Advances in Information and Communication Technology
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.339-354, ⟨10.1007/978-3-319-99828-2_24⟩
ICT Systems Security and Privacy Protection ISBN: 9783319998275
SEC
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.339-354, ⟨10.1007/978-3-319-99828-2_24⟩
ICT Systems Security and Privacy Protection ISBN: 9783319998275
SEC
Part 4: Software Security / Attacks; International audience; Hackers can exfiltrate sensitive data stored in an IoT device such as Android smartphones. He/She abuses the Android pairing mode and targets a personal computer system previously trusted b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6cd64e94bb0a66486d4873d924635ddd
https://hal.inria.fr/hal-02023715/document
https://hal.inria.fr/hal-02023715/document