Filtrer vos résultats
- 12
- 12
- 16
- 5
- 3
- 24
- 1
- 1
- 1
- 5
- 3
- 6
- 1
- 3
- 1
- 2
- 1
- 21
- 3
- 15
- 8
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 24
- 7
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
24 résultats
|
|
triés par
|
|
Anonymous certification for an e-assessment frameworkNORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems, Nov 2017, Tartu, Estonia. pp.70 - 85, ⟨10.1007/978-3-319-70290-2_5⟩
Communication dans un congrès
hal-01699347v1
|
||
|
PCS, a privacy-preserving certification schemeDPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. pp.239 - 256, ⟨10.1007/978-3-319-67816-0_14⟩
Communication dans un congrès
hal-01593430v1
|
||
|
MOOC sécurité des réseaux : un apprentissage massif de la sécurité par la théorie et la pratiqueRESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4
Communication dans un congrès
hal-03754082v1
|
||
L?identité numérique dans le Cloud ComputingISTE. La gestion des identités numériques, pp.340, 2014, à paraître
Chapitre d'ouvrage
hal-01126447v1
|
|||
Security and privacy in the TeSLA architectureEngineering data-driven adaptive trust-based e-assessment systems: challenges and infrastructure solutions, 34, Springer, pp.85-108, 2020, Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT), 978-3-030-29325-3. ⟨10.1007/978-3-030-29326-0_5⟩
Chapitre d'ouvrage
hal-02393547v1
|
|||
|
A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cardsCTS, 2011, United States. pp.476 - 483, ⟨10.1109/CTS.2011.5928726⟩
Communication dans un congrès
hal-00673667v1
|
||
Systèmes d?authentificationISTE. La gestion des identités numériques, pp.340, 2014, à paraître
Chapitre d'ouvrage
hal-01126446v1
|
|||
|
Survey on intrusion detection systems in 5GRendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), LIFO, May 2023, Neuvy-sur-Barangeon, France
Communication dans un congrès
hal-04164470v1
|
||
|
A New Convergent Identity System Based on EAP-TLS Smart CardsSAR-SSI, 2011, France. pp.1-6
Communication dans un congrès
hal-00673666v1
|
||
PCS, a privacy-preserving certification schemeDPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway
Communication dans un congrès
hal-01702450v1
|
|||
Preserving confidentiality during the migration of virtual SDN topologies: a formal approachNCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171392⟩
Communication dans un congrès
hal-01666374v1
|
|||
|
Security challenges in e-assessment and technical solutionsIV 2017 : 21st International Conference on Information Visualization, Jul 2017, Londres, United Kingdom. pp.366 - 371, ⟨10.1109/iV.2017.70⟩
Communication dans un congrès
hal-01699388v1
|
||
Data Integrity and Availability Verification Game in Untrusted Cloud StorageGameSec, Nov 2014, Los Angeles, United States
Communication dans un congrès
hal-01110522v1
|
|||
Evaluating security products: formal model and requirements of a new approachInternational Journal On Advances in Security, 2019, 12 (1 & 2), pp.29-41
Article dans une revue
hal-02281230v1
|
|||
|
The influence of conception paradigms on data protection in e-learning platforms: a case studyIEEE Access, 2019, 7, pp.64110-64119. ⟨10.1109/ACCESS.2019.2915275⟩
Article dans une revue
hal-02281231v1
|
||
|
Integration of an adaptive trust-based e-assessment system into virtual learning environments : the TeSLA project experienceInternet technology letters, 2018, 1 (4), pp.e56-1 - e56-6. ⟨10.1002/itl2.56⟩
Article dans une revue
hal-02013504v1
|
||
A survey on game-theoretic approaches for intrusion detection and response optimizationACM Computing Surveys, 2018, 51 (5), pp.1-31. ⟨10.1145/3232848⟩
Article dans une revue
hal-02009646v1
|
|||
|
Methodology of a network simulation in the context of an evaluation: application to an IDSICISSP 2019: 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.378-388, ⟨10.5220/0007378603780388⟩
Communication dans un congrès
hal-02176684v1
|
||
|
An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart CardsICDT, 2010, Greece. pp.22-27, ⟨10.1109/ICDT.2010.12⟩
Communication dans un congrès
hal-00673665v1
|
||
|
A new approach of network simulation for data generation in evaluating security productsICIMP 2018: 13th International Conference on Internet Monitoring and Protection, Jul 2018, Barcelone, Spain. pp.35-41
Communication dans un congrès
hal-01901017v1
|
||
Towards secure identity management in smartphone environments2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Aug 2013, X, France. pp.2133-2135
Communication dans un congrès
hal-01126288v1
|
|||
Auditing a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical AnalysisIEEE Transactions on Information Forensics and Security, 2016, 11, pp.1685-1699. ⟨10.1109/tifs.2016.2549002⟩
Article dans une revue
hal-01418390v1
|
|||
A Game Theoretical Model for Optimal Distribution of Network Security ResourcesGamesec, Oct 2017, Vienna, Austria. ⟨10.1007/978-3-319-68711-7_13⟩
Communication dans un congrès
hal-01688475v1
|
|||
|
Optimizing resource allocation for secure SDN-based virtual network migrationNCA 2019: 18th International Symposium on Network Computing and Applications, Sep 2019, Cambridge, MA, United States. pp.1-10, ⟨10.1109/nca.2019.8935027⟩
Communication dans un congrès
hal-02438632v1
|