Skip to Main content Skip to Navigation

hal-01827610v1  Journal articles
Matthieu Giraud. Protéger et utiliser ses données en ligne
Interstices, INRIA, 2018
hal-01826053v1  Conference papers
Nicolas LarrieuTheobald de RiberollesGuthemberg Silvestre. Design, Development and Implementation of a Network Intrusion Detection Tool for Air Traffic Management Systems
DSN 2018, 48th IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg, Luxembourg. ⟨10.1109/DSN-W.2018.00044⟩
hal-01833587v1  Conference papers
Wei WangSylvain GombaultThomas Guyet. Towards fast detecting intrusions: using key attributes of network traffic
ICIMP 2008 - Third International Conference on Internet Monitoring and Protection, Jun 2008, Bucharest, Romania. pp.86-91, ⟨10.1109/ICIMP.2008.13⟩
hal-01833583v1  Conference papers
yacine BouzidaFrédéric CuppensSylvain Gombault. Modelling network traffic to detect new anomalies using principals components analysis
HPOVUA 2005 : 12th Workshop of the HP OpenView University Association, Jul 2005, Porto, Portugal. pp.119 - 132
cea-01835563v1  Conference papers
Virgile PrévostoVincent MonfortDavid Maison. projet INGOPCS: Initiative pour la Nouvelle Génération OPC-UA Sécurisée
Rendez-vous de la Recherche et de l'Enseignement en Sécurité des Systèmes d'Information, May 2017, Grenoble, France
hal-01831965v1  Conference papers
Alexandre KabilThierry DuvalNora CuppensGérard Le Comteyoran Halgand et al.  3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training
CDVE 2018 : 15th International Conference on Cooperative Design, Visualization and Engineering, Oct 2018, Hangzou, China. pp.176-183, ⟨10.1007/978-3-030-00560-3_24⟩
hal-00400015v1  Conference papers
Lilian BossuetGuy Gogniat. How to Teach Hardware Security?
International CryptArchi Workshop, Sep 2007, Montpellier, France
tel-02081080v1  Theses
Salaheddine Zerkane. Security Analysis and Access Control Enforcement through Software Defined Networks
Cryptography and Security [cs.CR]. Université de Bretagne occidentale - Brest, 2018. English. ⟨NNT : 2018BRES0057⟩
hal-02880764v1  Conference papers
Paloma de Las CuevasPablo Garcia-SanchezZaineb Chelly DagdiaMaria-Isabel Garcia-ArenasJuan Julian Merelo. Automatic rule extraction from access rules using Genetic Programming
EvoCOP 2020 - 20th European Conference on Evolutionary Computation in Combinatorial Optimisation, Apr 2020, Seville, Spain
hal-00406496v1  Conference papers
K. MayesSerge ChaumetteK. MarkantonakisDamien Sauveron. The Mobile Java Card Grid Project
7th e-Smart International Conference (e-smart 2006), Sep 2006, Sophia Antipolis, France. pp.1-5
hal-00965183v1  Conference papers
Kévin HugueninErwan Le MerrerNicolas Le ScouarnecGilles Straub. Hoop: Offloading HTTP(S) POSTs from User Devices onto Residential Gateways
21st IEEE International Conference on Web Services (ICWS), Jun 2014, Anchorage, AK, United States. pp.654-661, ⟨10.1109/ICWS.2014.96⟩
hal-00406456v1  Conference papers
Serge ChaumetteAchraf KarrayDamien Sauveron. Gestion de la Sécurité pour l'Extraction Parallèle Distribuée des Connaissances
6èmes journées Francophones Extraction et Gestion de Connaissances, Jan 2006, France. pp.1-10
hal-03374157v1  Conference papers
Geoffroy CouteauDominik Hartmann. Shorter Non-interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
CRYPTO 2020 - Annual International Cryptology Conference, Aug 2020, Santa Barbara, United States. pp.768-798, ⟨10.1007/978-3-030-56877-1_27⟩
ujm-00572889v1  Journal articles
Nathalie BochardFlorent BernardViktor FischerBoyan Valtchanov. True-Randomness and Pseudo-Randomness in Ring Oscillator-Based True Random Number Generators
International Journal of Reconfigurable Computing, Hindawi Publishing Corporation, 2010, 2010, pp.ID 879281. ⟨10.1155/2010/879281⟩
hal-01456773v1  Journal articles
Cyril GrunspanRicardo Pérez-Marco. Double spend races
International Journal of Theoretical and Applied Finance, World Scientific Publishing, 2018
inria-00417797v1  Conference papers
Charles BouillaguetPierre-Alain Fouque. Analysis of the Collision Resistance of RadioGatun using Algebraic Techniques
Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Aug 2008, Sackville, Canada. pp.245-261, ⟨10.1007/978-3-642-04159-4_16⟩
hal-02412260v1  Conference papers
Eleni DiamantiAdeline OrieuxIsabelle ZaquineMarc KaplanTanumoy Pramanik et al.  Experimental detection of steerability for Bell-local states with two measurement settings
Qcrypt 2017 - 7th International Conference on Quantum Cryptography, Sep 2017, Cambridge, United Kingdom
hal-01091241v1  Conference papers
Steve KremerRobert Künnemann. Automated Analysis of Security Protocols with Global State
35th IEEE Symposium on Security and Privacy (S&P'14), May 2014, San Jose, United States. pp.163-178, ⟨10.1109/SP.2014.18⟩
hal-01103545v1  Conference papers
Véronique CortierFabienne EignerSteve KremerMatteo MaffeiCyrille Wiedling. Type-Based Verification of Electronic Voting Protocols
4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom
inria-00636747v1  Conference papers
Stéphanie DelauneSteve KremerRyan D. MarkGraham Steel. Formal analysis of protocols based on TPM state registers
24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. ⟨10.1109/CSF.2011.12⟩
hal-01615205v1  Conference papers
Thomas GougeonMorgan BarbierPatrick LacharmeGildas AvoineChristophe Rosenberger. Memory carving can finally unveil your embedded personal data
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), Aug 2017, Reggio di calabria, Italy