1972 résultats  enregistrer la recherche

hal-01350161v1  Article dans une revue
Jean-Yves MarionJoanna Jongwane. À propos de la virologie informatique
Interstices, INRIA, 2010
lirmm-01150269v1  Article dans une revue
Florent BruguierPascal BenoitLionel TorresLyonel BartheMorgan Bourrée et al.  Cost-Effective Design Strategies for Securing Embedded Processors
IEEE Transactions on Emerging Topics in Computing, Institute of Electrical and Electronics Engineers, 2016, 4 (1), pp.60-72. 〈http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7050262〉. 〈10.1109/TETC.2015.2407832〉
hal-00602197v1  Communication dans un congrès
Pierre-Louis CayrelPierre Dusart. McEliece/Niederreiter PKC: Sensitivity to Fault Injection
5th International Workshop on Future Engineering, 2010, May 2010, Busan, South Korea. pp.1-6, 2010, 〈10.1109/FUTURETECH.2010.5482663〉
hal-01352191v1  Communication dans un congrès
Touati LyesHamed HellaouiYacine Challal. Threshold Yoking/Grouping Proofs based on CP-ABE for IoT Applications
The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Aug 2016, TianJin, China. 〈http://adnet.tju.edu.cn/TrustCom2016/〉
hal-00851866v1  Communication dans un congrès
Géraldine Vache MarconatoVincent NicometteMohamed Kaâniche. Security-related vulnerability life cycle analysis
7th International Conference on Risk and Security of Internet and Systems (CRiSIS-2012), Oct 2012, Cork, Ireland. IEEE Computer Society, pp.1-8, 2012, 〈10.1109/CRISIS.2012.6378954〉
lirmm-00153369v1  Communication dans un congrès
Laurent ImbertAgostinho PeireraArnaud Tisserand. A Library for Prototyping the Computer Arithmetic Level in Elliptic Curve Cryptography
Advanced Signal Processing Algorithms, Architectures and Implementations XVII, Aug 2007, San Diego, California, United States. SPIE, 6697, pp.1-9 (66970N), 2007, 〈10.1117/12.733652〉
hal-01102378v1  Communication dans un congrès
Udit DhawanCătălin HriţcuRafi RubinNikos VasilakisSilviu Chiricescu et al.  Architectural Support for Software-Defined Metadata Processing
20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2015), Mar 2015, Istanbul, Turkey. ACM, pp.487-502, 2015, 〈10.1145/2694344.2694383〉
hal-01102231v1  Rapport
Karthikeyan BhargavanCédric FournetMarkulf KohlweissAlfredo PirontiPierre-Yves Strub et al.  Proving the TLS Handshake Secure (as it is)
[Research Report] 2014/182, Cryptology ePrint Archive. 2014, pp.48
lirmm-00153368v1  Communication dans un congrès
Andrew ByrneNicolas MéloniFrancis CroweWilliam MarnaneArnaud Tisserand et al.  SPA Resistant Elliptic Curve Cryptosystem using Addition Chains
ITNG'07: 4th International Conference on Information Technology, Apr 2007, Las Vegas, Nevada, U.S.A., IEEE, pp.995-1000, 2007, 〈10.1109/ITNG.2007.185〉
inria-00552886v1  Communication dans un congrès
Gilles BartheDaniel HedinSantiago Zanella-BéguelinBenjamin GrégoireSylvain Heraud. A Machine-Checked Formalization of Sigma-Protocols
CSF'10, Jul 2010, Edinburgh, Sweden. IEEE, pp.246-260, 2010, 23rd IEEE Computer Security Foundations Symposium CSF 2010. 〈10.1109/CSF.2010.24〉
hal-00702622v1  Communication dans un congrès
Danuta PamulaEdward HrynkiewiczArnaud Tisserand. Analysis of GF(2^233) Multipliers Regarding Elliptic Curve Cryptosystem Applications
PDeS - 11th IFAC/IEEE International Conference on Programmable Devices and Embedded Systems, May 2012, Brno, Czech Republic. pp.252-257, 2012, 〈10.3182/20120523-3-CZ-3015.00052〉
hal-00852244v1  Communication dans un congrès
Ivan StudniaVincent NicometteEric AlataYves DeswarteMohamed Kaâniche et al.  A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks
The 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. pp.1-12, 2013
hal-00503951v1  Communication dans un congrès
Dewan FaridJérôme DarmontNouria HarbiHuu Hoa NguyenMohammad Zahidur Rahman. Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification
WASET. International Conference on Computer Systems Engineering (ICCSE 2009), Dec 2009, Bangkok, Thailand. pp.TH60000, 2009
hal-00153120v1  Communication dans un congrès
Romain VaslinGuy GogniatJean-Philippe DiguetRussell TessierWayne Burleson. High Efficiency Protection Solution for Off-Chip Memory in Embedded Systems
international conference on engineering of reconfigurable systems & algorithms, Jun 2007, Las Vegas, United States. pp.117, 2007
inria-00552894v1  Communication dans un congrès
Gilles BartheBenjamin GrégoireSantiago Zanella-Béguelin. Programming Language Techniques for Cryptographic Proofs
Matt Kaufmann and Lawrence C. Paulson. ITP'10, 2010, Edinburgh, United Kingdom. Springer, 6172, pp.115-130, 2010, Lecture Notes in Computer Science. 〈10.1007/978-3-642-14052-5_10〉
hal-00503961v1  Communication dans un congrès
Dewan FaridHuu Hoa NguyenJérôme DarmontNouria HarbiMohammad Zahidur Rahman. Scaling up Detection Rates and Reducing False Positives in Intrusion Detection using NBTree
WASET. International Conference on Data Mining and Knowledge Engineering (ICDMKE 2010), 2010, Rome, Italy. pp.0, 2010
hal-00752925v1  Communication dans un congrès
Fabien Coelho. An (Almost) Constant-E ort Solution-Veri cation Proof-of-Work Protocol based on Merkle Trees
Vaudenay, Serge. 1st international conference on Progress in cryptology, Jun 2008, Casablanca,, Morocco. Springer-Verlag Berlin, pp.Pages 80-93, 2008, LNCS
hal-01102229v1  Communication dans un congrès
Karthikeyan BhargavanCédric FournetMarkulf KohlweissAlfredo PirontiPierre-Yves Strub et al.  Proving the TLS Handshake Secure (as it is)
Juan A. Garay; Rosario Gennaro. CRYPTO 2014, Aug 2014, Santa Barbara, United States. Springer, 8617, pp.235-255, 2014, Lecture Notes in Computer Science. 〈10.1007/978-3-662-44381-1_14〉
hal-01102144v1  Chapitre d'ouvrage
Karthikeyan BhargavanAntoine Delignat-LavaudSergio Maffeis. Defensive JavaScript
Alessandro Aldini; Javier Lopez; Fabio Martinelli. Foundations of Security Analysis and Design VII, 8604, Springer, pp.88-123, 2014, Lecture Notes in Computer Science, 978-3-319-10081-4. 〈10.1007/978-3-319-10082-1_4〉
hal-00753211v1  Article dans une revue
Bertrand Le GalLilian Bossuet. Automatic low-cost IP watermarking technique based on output mark insertions
Design Automation for Embedded System, Springer, 2012, 16 (2), pp.71-92. 〈10.1007/s10617-012-9085-y〉