|
||
---|---|---|
tel-01746173v1
Theses
Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus Autre [cs.OH]. Université Henri Poincaré - Nancy 1, 2011. Français. ⟨NNT : 2011NAN10036⟩ |
||
tel-01751142v1
Theses
Formal verification of advanced families of security protocols : E-voting and APIs Other [cs.OH]. Université de Lorraine, 2014. English. ⟨NNT : 2014LORR0199⟩ |
||
hal-01055656v1
Journal articles
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android IEEE Transactions on Software Engineering, Institute of Electrical and Electronics Engineers, 2014, 40, pp.617-632. ⟨10.1109/TSE.2014.2322867⟩ |
||
hal-00718134v1
Journal articles
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management Journal of Universal Computer Science, Graz University of Technology, Institut für Informationssysteme und Computer Medien, 2012, 18 (6), pp.816-844 |
||
inria-00397371v1
Book sections
Scheduling Activities in Wireless Sensor Networks Misra, Sudip; Woungang, Isaac; Misra, Subhas Chandra. Guide to Wireless Sensor Networks, Springer, pp.707, 2009, Computer Communications and Networks, 978-1-84882-217-7 |
||
hal-00759066v1
Conference papers
Resiliency Taxonomy of Routing Protocols in Wireless Sensor Networks IEEE Conference on Local Computer Networks (LCN), Oct 2012, Clearwater, United States |
||
hal-00561373v1
Journal articles
Handling Non Left-Linear Rules When Completing Tree Automata International Journal of Foundations of Computer Science, World Scientific Publishing, 2009, 20 (5), pp.837--849. ⟨10.1142/S0129054109006917⟩ |
||
inria-00578926v1
Conference papers
Automatic Verification of Conformance of Firewall Configurations to Security Policies IEEE Symposium on Computers and Communications (ISCC), Jul 2009, Sousse, Tunisia. pp.526-531, ⟨10.1109/ISCC.2009.5202309⟩ |
||
hal-00863110v1
Conference papers
Jasmin: An Alternative for Secure Modularity Inside the Digital Home Component Based Software Engineering, Jun 2012, Bertinoro, Italy. pp.Pages 145-150, ⟨10.1145/2304736.2304760⟩ |
||
tel-01133067v1
Theses
Proofs of security protocols revisited Cryptography and Security [cs.CR]. Ecole Normale Supérieure de Cachan, 2015. English. ⟨NNT : ENSC-2015-no 561⟩ |
||
inria-00578916v1
Conference papers
Rewrite-Based Verification of XML Updates 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming (PPDP), Jul 2010, Hagenberg, Austria. ⟨10.1145/1836089.1836105⟩ |
||
hal-00527401v1
Conference papers
Distance Bounding Protocols on TH-UWB Radios IEEE GLOBAL COMMUNICATIONS CONFERENCE - IEEE GLOBECOM 2010, Dec 2010, Miami - FL - USA, France. pp.1-6 |
||
hal-01355681v1
Conference papers
Secured Systems in Clouds with Model-Driven Orchestration The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016). In conjunction with the IEEE CNS conference. , IEEE, Oct 2016, Philadelphia, United States |
||
hal-01060537v2
Journal articles
Handles: Behavior-Propagating First Class References For Dynamically-Typed Languages Science of Computer Programming, Elsevier, 2015, Science of Computer Programming, 98 (3), pp. 318-338. ⟨10.1016/j.scico.2014.07.011⟩ |
||
hal-02069419v1
Book sections
Sécurité et numérique Mustapha Afroukh; Christophe Maubernard; Claire Val. La sécurité : mutations et incertitudes, Institut universitaire Varenne, pp.89-100, 2019, Collection Colloques & Essais, 978-2-37032-204-3 |
||
hal-00747640v1
Conference papers
Increasing Android Security using a Lightweight OVAL-based Vulnerability Assessment Framework 5th IEEE Symposium on Configuration Analytics and Automation (SafeConfig'12), IEEE, Oct 2012, Baltimore, United States |
||
hal-00747508v1
Conference papers
Dynamic Exposure Control in P2PSIP Networks 2012 IEEE Network Operations and Management Symposium, IEEE, Apr 2012, Maui, United States. pp.261-268 |
||
hal-01176842v1
Conference papers
Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing ACM WiSec 2015, Jun 2015, New York, United States. ⟨10.1145/2766498.2766521⟩ |
||
hal-01149736v1
Journal articles
Semantic web technologies to reconcile privacy and context awareness Journal of Web Semantics, Elsevier, 2004, 1 (3), pp.20. ⟨10.1016/j.websem.2003.07.008⟩ |
||
tel-00010545v1
Theses
Information Flow Security for Asynchronous, Distributed, and Mobile Applications Modeling and Simulation. Université Nice Sophia Antipolis, 2005. English |
||
tel-01425638v1
Theses
Sharing and Usage Control of Personal Information Databases [cs.DB]. Université Paris Saclay, 2016. English. ⟨NNT : 2016SACLV089⟩ |
||
tel-02458264v2
Theses
Contributions théoriques sur les communications furtives Réseaux et télécommunications [cs.NI]. Université de Lyon, 2019. Français. ⟨NNT : 2019LYSEI070⟩ |
||
hal-00924296v1
Reports
Improving users' isolation in IaaS: Virtual Machine Placement with Security Constraints [Research Report] RR-8444, INRIA. 2014 |
||
inria-00312747v2
Reports
Monitoring Information flow by Diagnosis Techniques [Research Report] PI 1901, 2008, pp.15 |
||
inria-00396442v1
Reports
Dynamic Observers for the Synthesis of Opaque Systems [Research Report] PI 1930, 2009, pp.22 |
||
hal-01099692v1
Conference papers
Malware Message Classification by Dynamic Analysis The 7th International Symposium on Foundations and Practice of Security, Nov 2014, Montreal, Canada. pp.16 |
||
hal-00766772v1
Master thesis
Using Kad-BitTorrent Hybrid Clients to Share Contents Networking and Internet Architecture [cs.NI]. 2012 |
||
|
||
hal-00747585v1
Reports
An Online Risk Management Strategy for VoIP Enterprise Infrastructures [Research Report] 2012, pp.18 |
||
tel-00461306v1
Theses
Monitoring and Supervisory Control for Opacity Properties Software Engineering [cs.SE]. Université Rennes 1, 2009. English |
||
|