|
||
---|---|---|
hal-01059789v1
Conference papers
Overlap regions and grey model-based approach for interference avoidance in cognitive radio networks Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on, Jul 2013, Vietnam. pp.642 - 647, ⟨10.1109/ICUFN.2013.6614897⟩ |
||
tel-02946399v1
Theses
Extended Security of Lattice-Based Cryptography Cryptography and Security [cs.CR]. Équipe CASCADE, Département d'Informatique de l'ENS de Paris; Université PSL, 2020. English |
||
hal-01614569v1
Conference papers
A Side-Channel Assisted Cryptanalytic Attack Against QcBits CHES 2017 - Conference on Cryptographic Hardware and Embedded Systems, Sep 2017, Taipei, Taiwan. pp.22, ⟨10.1007/978-3-319-66787-4_1⟩ |
||
hal-00976877v1
Conference papers
Adaptive Mobile Traffic Offloading ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, Le Bois-Plage-en-Ré, France. pp.1-4 |
||
hal-01002992v1
Conference papers
DROiD: Adapting to Individual Mobility Pays Off in Mobile Data Offloading IFIP Networking 2014, Jun 2014, Trondheim, Norway. pp.1-6 |
||
hal-01516180v1
Conference papers
Placement du coeur d'un réseau mobile autonome ALGOTEL 2017 - 19èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2017, Quiberon, France |
||
hal-01573380v1
Conference papers
Core Network Function Placement in Mobile Networks PIMRC 2017 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Oct 2017, Montreal, Canada. pp.5 |
||
hal-01573383v1
Journal articles
Overview of LTE Isolated E-UTRAN Operation for Public Safety IEEE Communications Standards Magazine, Institute of Electrical and Electronics Engineers, 2017, 1 (2), pp.98-105. ⟨10.1109/MCOMSTD.2017.1600875⟩ |
||
hal-01928552v1
Journal articles
Core Network Function Placement in Self-Deployable Mobile Networks Computer Communications, Elsevier, 2019, 133, pp.12-23. ⟨10.1016/j.comcom.2018.10.009⟩ |
||
hal-00998856v1
Conference papers
Mitigating the Hospital Area Communication's Interference using Cognitive Radio Networks 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), Oct 2013, Lisbon, Portugal. pp.Page(s): 324 - 328 |
||
hal-00853899v1
Journal articles
Mitigating the Hospital Area Communication's Interference using Cognitive Radio Networks IEEE International Conference on e-Health Networking, Application & Services (IEEE Healthcom), 2013 |
||
hal-01343275v1
Conference papers
On the Necessity of Accounting for Resiliency in SFC First International Workshop on Programmability for Cloud Networks and Applications (PROCON), Sep 2016, Wuerzburg, Germany |
||
hal-00853905v1
Journal articles
Overlap Regions and Grey Model-Based Approach for Interference Avoidance in Cognitive Radio Networks International Conference on Ubiquitous and Future Networks, IEEE ICUFN, 2013 |
||
|
||
hal-01401251v1
Conference papers
Seamless content distribution with OpenFlow Student Workshop at ACM CoNEXT, Dec 2016, Irvine, United States. pp.3 |
||
hal-01660055v1
Journal articles
Interdisciplinarity in practice: Challenges and benefits for privacy research Computer Law and Security Review, Elsevier, 2017, 33 (6), pp.864-869. ⟨10.1016/j.clsr.2017.05.020⟩ |
||
hal-02305051v2
Journal articles
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation Designs, Codes and Cryptography, Springer Verlag, 2020, ⟨10.1007/s10623-020-00727-w⟩ |
||
hal-01539481v2
Journal articles
Optimal Orchestration of Virtual Network Functions Computer Networks, Elsevier, 2018, 142, pp.108-127. ⟨10.1016/j.comnet.2018.06.006⟩ |
||
hal-01362552v1
Conference papers
Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks PROOFS: Security Proofs for Embedded Systems 2016, Aug 2016, San, United States |
||
hal-01242180v1
Conference papers
Tooling Support for Variability and Architectural Patterns in Systems Engineering 19th International Conference on Software Product Line, Jul 2015, Nashville, United States. ⟨10.1145/2791060.2791097⟩ |
||
hal-01408633v1
Conference papers
Worst case QC-MDPC decoder for McEliece cryptosystem IEEE International Symposium on Information Theory, ISIT 2016, Jul 2016, Barcelone, Spain. pp.5, ⟨10.1109/ISIT.2016.7541522⟩ |
||
hal-01088439v1
Book sections
Fostering Analysis from Industrial Embedded Systems Modeling Alessandra Bagnato; Leandro Soares Indrusiak; Imran Rafiq Quadri; Matteo Rossi. Handbook of Research on Embedded Systems Design, IGI Global, pp.283--300, 2014, 9781466661943. ⟨10.4018/978-1-4666-6194-3.ch011⟩ |
||
|
||
tel-01235207v1
Theses
Security of Cryptosystems Against Power-Analysis Attacks Cryptography and Security [cs.CR]. ENS, 2015. English |
||
hal-01410216v1
Conference papers
Strong Non-Interference and Type-Directed Higher-Order Masking CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩ |
||
hal-01900708v1
Conference papers
Masking the GLP Lattice-Based Signature Scheme at Any Order Eurocrypt 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2018, Tel Aviv, Israel. pp.354-384, ⟨10.1007/978-3-319-78375-8_12⟩ |
||
hal-01170042v2
Conference papers
Virtual Network Functions Placement and Routing Optimization CloudNet 2015 - IEEE 4th International Conference on Cloud Networking, Oct 2015, Niagara Falls, ON, Canada. pp.171-177, ⟨10.1109/CloudNet.2015.7335301⟩ |
||
|