Filtrer vos résultats
- 59
- 38
- 54
- 25
- 11
- 2
- 2
- 1
- 1
- 1
- 11
- 87
- 3
- 2
- 2
- 2
- 1
- 5
- 3
- 4
- 1
- 1
- 5
- 3
- 7
- 5
- 8
- 11
- 4
- 6
- 10
- 7
- 8
- 4
- 1
- 1
- 91
- 6
- 76
- 75
- 30
- 22
- 22
- 17
- 9
- 8
- 7
- 4
- 4
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 97
- 14
- 12
- 12
- 12
- 10
- 9
- 8
- 7
- 6
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
97 résultats
Routing Resilience Evaluation for Smart Metering: Definition, Metric and TechniquesPIMRC - IEEE 25th International Symposium on Personal, Indoor and Mobile Radio Communications, Sep 2014, Washington DC, United States. pp.1867-1871
Communication dans un congrès
hal-01015801v1
|
|||
|
Hierarchical Node Replication Attacks Detection in Wireless Sensor NetworksInternational Journal of Distributed Sensor Networks, 2013, 2013, 12 p. ⟨10.1155/2013/745069⟩
Article dans une revue
hal-00918969v1
|
||
|
A Mathematical Analysis of Prophet Dynamic Address Allocation[Research Report] RR-7085, INRIA. 2009, pp.15
Rapport
inria-00429480v1
|
||
How network coding system constrains packet pollution attacks in wireless sensor networksInternational Journal of Grid and Utility Computing, 2013, 4 (2/3), pp.197-203
Article dans une revue
hal-00918953v1
|
|||
Two Algebraic Attacks Against the F-FCSRs Using the IV ModeIndocrypt 2005, 2005, France. pp.143-145
Communication dans un congrès
hal-00068456v1
|
|||
A History-Based Framework to Build Trust Management SystemsSecond International IEEE SECURECOMM Workshop on the Value of Security through Collaboration (SECOVAL 2006), Apr 2006, United States. pp.1-8
Communication dans un congrès
hal-00402747v1
|
|||
Modelization and trust establishment in ambient networksInternational Symposium on Intelligent Environment, Apr 2006, Cambridge, United Kingdom
Communication dans un congrès
hal-00402750v1
|
|||
|
Solving a Symmetric Key Cryptographic Problem with Constraint ProgrammingModRef 2014, Workshop of the CP 2014 Conference, Sep 2014, Lyon, France. pp.13
Communication dans un congrès
hal-01092574v1
|
||
|
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor NetworksSECRYPT 2013 - Proceedings of the International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland. pp.543-548
Communication dans un congrès
hal-00918974v1
|
||
Enhancing Resiliency Against Routing Layer Attacks in Wireless Sensor Networks: Gradient-based Routing in FocusInternational Journal On Advances in Networks and Services, 2011
Article dans une revue
hal-00643873v1
|
|||
Key establishment and management for WSNsTelecommunication Systems, 2012, 50 (2), pp.113-125
Article dans une revue
hal-00919031v1
|
|||
|
Energy Efficient Authentication Strategies for Network CodingConcurrency and Computation: Practice and Experience, 2012, 24 (10), pp.1086-1107. ⟨10.1002/cpe.1767⟩
Article dans une revue
istex
hal-00644484v1
|
||
Some results on FCSR automata with application to the security of F-CSR-based pseudorandom generatorsIEEE Transactions on Information Theory, 2008, 54 (2), pp.836-840
Article dans une revue
hal-00336864v1
|
|||
|
A trust protocol for community collaborationJoint iTrust and PST Conferences on Privacy, Trust Management and Security, Jun 2007, Moncton, Canada. pp.169-184, ⟨10.1007/978-0-387-73655-6_12⟩
Communication dans un congrès
inria-00395599v1
|
||
Benchmarking of lightweight cryptographic algorithms for wireless IoT networksWireless Networks, 2022, 28 (8), pp.3453-3476. ⟨10.1007/s11276-022-03046-1⟩
Article dans une revue
hal-03850763v1
|
|||
Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs13th International Conference on Cryptology in India, Dec 2012, Calcutta, India. pp.209-224, ⟨10.1007/978-3-642-34931-7_13⟩
Communication dans un congrès
hal-00913832v1
|
|||
The GLUON Family: A Lightweight Hash Function Family Based on FCSRsAFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Jun 2012, Ifrance, Morocco. pp.306-323, ⟨10.1007/978-3-642-31410-0_19⟩
Communication dans un congrès
hal-00749143v1
|
|||
|
Hybrid architecture of LPV dynamical systems in the context of cybersecurity4th IFAC Workshop on Linear Parameter Varying Systems, LPVS 2021, Jul 2021, Milano, Italy. pp.154-161, ⟨10.1016/j.ifacol.2021.08.596⟩
Communication dans un congrès
hal-03292416v1
|
||
|
The Gain of Network Coding in Wireless Sensor Networking[Research Report] RR-8650, Inria. 2014
Rapport
hal-01092287v1
|
||
|
Ubiquitous Privacy ProtectionProceedings of the 5th Workshop on Ubicomp Privacy in conjunction with the 9th International Conference on Ubiquitous Computing (UbiComp'2007), Sep 2007, Innsbruck, Austria
Communication dans un congrès
inria-00395108v1
|
||
|
Resilient networking in wireless sensor networks[Research Report] RR-7230, INRIA. 2010, pp.37
Rapport
inria-00464059v1
|
||
Improving Integral Cryptanalysis against Rijndael-256 up to 9 roundsAfricacrypt 2008, Jun 2008, Casablanca, Morocco. pp.1-15
Communication dans un congrès
hal-00402740v1
|
|||
A New Approach for FCSRsSelected Areas in Cryptography - SAC 2009, Sep 2009, Calgary, Canada. pp.433-448
Communication dans un congrès
hal-00436558v1
|
|||
Aggregated Authentication (AMAC) using Universal Hash FunctionsInternational ICST Conference on Security and Privacy in Communication Networks - SecureComm 2009, Sep 2009, Athens, Greece. pp.248-264
Communication dans un congrès
hal-00436559v1
|
|||
|
Revisiting LFSRs for Cryptographic ApplicationsIEEE Transactions on Information Theory, 2011, 57 (12), pp.8095-8113. ⟨10.1109/TIT.2011.2164234⟩
Article dans une revue
hal-00683653v1
|
||
|
Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontrollerSecurity and communication networks, 2015, pp.16. ⟨10.1002/sec.1281⟩
Article dans une revue
hal-01199786v1
|
||
|
Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors3rd International Workshop on Security and Privacy Analytics (IWSPA 2017), Mar 2017, Scottsdale, United States
Communication dans un congrès
hal-01485412v1
|
||
|
Efficient Methods to Search for Best Differential Characteristics on SKINNYACNS 2021 - 19th International Conference on Applied Cryptography and Network Security, Jun 2021, Kamakura, Japan. pp.184-207, ⟨10.1007/978-3-030-78375-4_8⟩
Communication dans un congrès
hal-03040548v2
|
||
Secure method for data exchange between a terminal and a serverFrance, Patent n° : US Patent App. 17/777,906. 2023
Brevet
hal-04313153v1
|
|||
|
Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARPIACR Transactions on Symmetric Cryptology, 2022, 2022 (2), pp.113-140. ⟨10.46586/tosc.v2022.i2.113-140⟩
Article dans une revue
hal-03760280v1
|