Filtrer vos résultats
- 21
- 8
- 21
- 3
- 2
- 1
- 1
- 1
- 2
- 27
- 1
- 1
- 2
- 1
- 2
- 2
- 1
- 4
- 3
- 2
- 3
- 1
- 2
- 2
- 3
- 1
- 24
- 5
- 27
- 22
- 7
- 6
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 29
- 11
- 7
- 5
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
29 résultats
|
|
triés par
|
|
Consequences of compromised zone keys in DNSSEC[Research Report] PI 1787, 2006, pp.13
Rapport
inria-00001138v1
|
||
|
A Privacy Preserving Distributed Reputation MechanismInternational Conference on communications (ICC), Jun 2013, Budapest, France. 6 p
Communication dans un congrès
hal-00763212v3
|
||
|
GDS Resource Record: Generalization of the Delegation Signer Model4th IEEE International Conference on Networking (ICN), Apr 2005, La Réunion, France. pp.844-851, ⟨10.1007/978-3-540-31957-3_95⟩
Communication dans un congrès
hal-01184262v1
|
||
|
SEER4US, Secured Energy Efficient Routing for UAV SwarmsWiMob 2019 - 15th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2019, Barcelona, France. pp.1-6
Communication dans un congrès
hal-02294744v1
|
||
|
Mécanisme de réputation distribué préservant la vie privée avec témoignages négatifsALGOTEL 2015 - 17èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2015, Beaune, France
Communication dans un congrès
hal-01148072v1
|
||
|
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack CampaignsIEEE Transactions on Network and Service Management, 2022, Special Issue on Recent Advances in Network Security Management, 19 (4), pp.5252-5264. ⟨10.1109/TNSM.2022.3183476⟩
Article dans une revue
hal-03694719v1
|
||
|
Alternatives to Binary Routing Policies Applied to a Military MANET CoalitionIWCMC 2018 - 14th International Wireless Communications & Mobile Computing Conference, Jun 2018, Limassol, Cyprus. pp.1-6, ⟨10.1109/IWCMC.2018.8450393⟩
Communication dans un congrès
hal-01851409v1
|
||
|
Complémentarité de DNSsec et d'IPsecJournées Réseaux (JRES 2003), Nov 2003, Lille, France
Communication dans un congrès
hal-01459436v1
|
||
|
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩
Communication dans un congrès
hal-01131975v2
|
||
AMORES: an architecture for mobiquitous resilient systemsARMOR'12, Apr 2012, Sibiu, Romania. Article N°7 (7p.), ⟨10.1145/2222436.2222443⟩
Communication dans un congrès
hal-00736020v1
|
|||
Preventive and corrective security solutions for routing in military tactical ad hoc networksMCC 2013, Oct 2013, Saint Malo, France. pp.149-165
Communication dans un congrès
hal-00919218v1
|
|||
|
Paul Lajoie-Mazenc - Signatures de réputation2014
Vidéo
medihal-01346179v1
|
||
|
Algorithm for DNSSEC Trusted Key RolloverInternational Conference on Information Networking (ICOIN). Jeju, Korea. January 31 - February 2, 2005, Jan 2005, Jeju, South Korea. pp.679 - 688, ⟨10.1007/978-3-540-30582-8_71⟩
Communication dans un congrès
hal-01501893v1
|
||
|
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range ArchitecturesFPS 2023 - 16th International Symposium on Foundations & Practice of Security, Dec 2023, Bordeaux, France. pp.1-16
Communication dans un congrès
hal-04317073v1
|
||
Comparing inter-domain routing protocol assessment tools for MANET2016 IEEE International Conference on Communications (ICC), May 2016, Kuala Lumpur, Malaysia. ⟨10.1109/icc.2016.7511313⟩
Communication dans un congrès
hal-01355402v1
|
|||
|
Efficient Distributed Privacy-Preserving Reputation Mechanism Handling Non-Monotonic Ratings2015
Pré-publication, Document de travail
hal-01104837v2
|
||
|
On the Unobservability of a Trust Relation in Mobile Ad Hoc NetworksInformation Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, 2009, Belgium. pp.1-11
Communication dans un congrès
hal-00780724v1
|
||
Comparaison d'outils d'évaluation de performance des protocoles de routage inter-MANET13ème Conference Francophone sur les Nouvelles Technologies de la Répartition (NOTERE 2016), Jul 2016, Paris, France
Communication dans un congrès
hal-01355407v1
|
|||
|
Le roulement automatique des clés de confiance dans les résolveurs DNSSECRencontres francophones sur la Sécurité et Architecture Réseaux (SAR), Jun 2005, Batz-sur-mer, France
Communication dans un congrès
hal-00530280v1
|
||
Comparison of Inter-MANET routing protocol evaluation tools2016 13th International Conference on New Technologies for Distributed Systems (NOTERE), Jul 2016, Paris, France. pp.1-6, ⟨10.1109/NOTERE.2016.7745822⟩
Communication dans un congrès
hal-02415350v1
|
|||
|
ITMAN: An Inter Tactical Mobile Ad Hoc Network Routing ProtocolMILCOM 2016 - 2016 IEEE Military Communications Conference, Nov 2016, Baltimore, United States. ⟨10.1109/milcom.2016.7795431⟩
Communication dans un congrès
hal-01397710v1
|
||
Sybil Nodes Detection based on Received Signal Strength Variations within VANETsIJNS International Journal of Network Security, 2009, 8 (3), pp.322-333
Article dans une revue
hal-00333140v1
|
|||
NoName, un protocole de routage ad hoc respectant la vie privéeSAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.122-134
Communication dans un congrès
hal-00919178v1
|
|||
|
Modeling the Operational Phases of APT CampaignsCSCI 2019 - 6th Annual Conf. on Computational Science & Computational Intelligence, Dec 2019, Las Vegas, United States. pp.1-6, ⟨10.1109/CSCI49370.2019.00023⟩
Communication dans un congrès
hal-02379869v2
|
||
|
From TTP to IoC: Advanced Persistent Graphs for Threat HuntingIEEE Transactions on Network and Service Management, 2021, Special Issue on Latest Developments for Security Management of Networks and Services, 18 (2), pp.1321 - 1333. ⟨10.1109/TNSM.2021.3056999⟩
Article dans une revue
hal-03131262v1
|
||
Accurate measurement of the energy consumption of security functions18th International Conference on Security and Cryptography (SECRYPT 2021),, Jul 2021, online streaming, France
Communication dans un congrès
hal-03510709v1
|
|||
|
Consequences of compromised zone keys in DNSSEC[Research Report] RR-5854, INRIA. 2006, pp.13
Rapport
inria-00070172v1
|
||
|
CVE representation to build attack positions graphsCyberHunt 2023 - 6th Annual Workshop on Cyber Threat Intelligence and Hunting, IEEE BigData, Dec 2023, Sorrento, Italy. pp.1-5
Communication dans un congrès
hal-04317023v1
|
||
|
Extending Signatures of ReputationHansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_13⟩
Chapitre d'ouvrage
hal-00997133v1
|