Skip to Main content Skip to Navigation


...
hal-00718134v1  Journal articles
Raimundas MatuleviciusHaralambos MouratidisMayer NicolasDubois EricPatrick Heymans. Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management
Journal of Universal Computer Science, Graz University of Technology, Institut für Informationssysteme und Computer Medien, 2012, 18 (6), pp.816-844
inria-00397371v1  Book sections
Eric FleuryYu Chen. Scheduling Activities in Wireless Sensor Networks
Misra, Sudip; Woungang, Isaac; Misra, Subhas Chandra. Guide to Wireless Sensor Networks, Springer, pp.707, 2009, Computer Communications and Networks, 978-1-84882-217-7
hal-00759066v1  Conference papers
Ochirkhand Erdene-OchirApostolos KountourisMarine MinierFabrice Valois. Resiliency Taxonomy of Routing Protocols in Wireless Sensor Networks
IEEE Conference on Local Computer Networks (LCN), Oct 2012, Clearwater, United States
...
hal-00561373v1  Journal articles
Yohan BoichutRoméo CourbisPierre-Cyrille HeamOlga Kouchnarenko. Handling Non Left-Linear Rules When Completing Tree Automata
International Journal of Foundations of Computer Science, World Scientific Publishing, 2009, 20 (5), pp.837--849. ⟨10.1142/S0129054109006917⟩
...
inria-00578926v1  Conference papers
Nihel Ben YoussefAdel BouhoulaFlorent Jacquemard. Automatic Verification of Conformance of Firewall Configurations to Security Policies
IEEE Symposium on Computers and Communications (ISCC), Jul 2009, Sousse, Tunisia. pp.526-531, ⟨10.1109/ISCC.2009.5202309⟩
...
tel-01133067v1  Theses
Guillaume Scerri. Proofs of security protocols revisited
Cryptography and Security [cs.CR]. Ecole Normale Supérieure de Cachan, 2015. English. ⟨NNT : ENSC-2015-no 561⟩
...
inria-00578916v1  Conference papers
Florent JacquemardMichaël Rusinowitch. Rewrite-Based Verification of XML Updates
12th international ACM SIGPLAN symposium on Principles and practice of declarative programming (PPDP), Jul 2010, Hagenberg, Austria. ⟨10.1145/1836089.1836105⟩
hal-00527401v1  Conference papers
Ahmed BenfarahBenoit MiscopeinJean-Marie GorceCédric LauradouxRoux Bernard. Distance Bounding Protocols on TH-UWB Radios
IEEE GLOBAL COMMUNICATIONS CONFERENCE - IEEE GLOBECOM 2010, Dec 2010, Miami - FL - USA, France. pp.1-6
hal-01355681v1  Conference papers
Eddy CaronArnaud LefrayJonathan Rouzaud-Cornabas. Secured Systems in Clouds with Model-Driven Orchestration
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016). In conjunction with the IEEE CNS conference. , IEEE, Oct 2016, Philadelphia, United States
...
hal-01060537v2  Journal articles
Jean-Baptiste ArnaudStéphane DucasseMarcus DenkerCamille Teruel. Handles: Behavior-Propagating First Class References For Dynamically-Typed Languages
Science of Computer Programming, Elsevier, 2015, Science of Computer Programming, 98 (3), pp. 318-338. ⟨10.1016/j.scico.2014.07.011⟩
...
hal-02069419v1  Book sections
François Pellegrini. Sécurité et numérique
Mustapha Afroukh; Christophe Maubernard; Claire Val. La sécurité : mutations et incertitudes, Institut universitaire Varenne, pp.89-100, 2019, Collection Colloques & Essais, 978-2-37032-204-3
...
hal-00747640v1  Conference papers
Martín BarrèreGaëtan HurelRémi BadonnelOlivier Festor. Increasing Android Security using a Lightweight OVAL-based Vulnerability Assessment Framework
5th IEEE Symposium on Configuration Analytics and Automation (SafeConfig'12), IEEE, Oct 2012, Baltimore, United States
hal-00747508v1  Conference papers
Oussema DabbebiRémi BadonnelOlivier Festor. Dynamic Exposure Control in P2PSIP Networks
2012 IEEE Network Operations and Management Symposium, IEEE, Apr 2012, Maui, United States. pp.261-268
...
tel-00010545v1  Theses
Felipe Luna del Aguila. Information Flow Security for Asynchronous, Distributed, and Mobile Applications
Modeling and Simulation. Université Nice Sophia Antipolis, 2005. English
...
tel-01425638v1  Theses
Athanasia Katsouraki. Sharing and Usage Control of Personal Information
Databases [cs.DB]. Université Paris Saclay, 2016. English. ⟨NNT : 2016SACLV089⟩
...
tel-02458264v2  Theses
David Kibloff. Contributions théoriques sur les communications furtives
Réseaux et télécommunications [cs.NI]. Université de Lyon, 2019. Français. ⟨NNT : 2019LYSEI070⟩
hal-01099692v1  Conference papers
Guillaume BonfanteJean-Yves MarionThanh Dinh Ta. Malware Message Classification by Dynamic Analysis
The 7th International Symposium on Foundations and Practice of Security, Nov 2014, Montreal, Canada. pp.16
hal-00766772v1  Master thesis
Damián Vicino. Using Kad-BitTorrent Hybrid Clients to Share Contents
Networking and Internet Architecture [cs.NI]. 2012
...
tel-00461306v1  Theses
Jérémy Dubreil. Monitoring and Supervisory Control for Opacity Properties
Software Engineering [cs.SE]. Université Rennes 1, 2009. English