-
Trust-based security for the OLSR routing protocol
International audience -
Adaptation of the ARAMIS methodology to integrate the security of hazradous i...
This dataset has no description
-
Adaptation of the ARAMIS methodology to assess the security of hazardous plan...
This dataset has no description
-
Protection of hazardous installations and critical infrastructures - compleme...
International audience -
Safety and security in the light of complexity. Uncertainty & qualification o...
International audience -
New energy carriers in vehicles and their impact on confined infrastructures ...
International audience -
Secure Information Flow for a Concurrent Language with Scheduling
International audience -
La violence carcérale en question
Pour la première fois en France, des sociologues ont réussi à enquêter sur la violence carcérale. Ce livre analyse l'ensemble des relations entre personnes... -
Hypervisor for executables protection - design, development and discussion
To ensure the continuity of the company, it must seek export contracts. In the defense field, these contracts are often accompanied by transfers of technology (ToT) to... -
How can model driven development approaches improve the certification process...
International audience -
A multiple fault injection methodology based on cone partitioning towards RTL...
International audience -
Java Lectures Notes
Support de cours. -
Vers une approche sécurisée des mécanismes d'autoconfiguration dans IPv6
Stage de DEA. Rapport de stage. -
La sécurité dans IPv6 pour des applications multipoints
Stage de DEA. Rapport de stage. -
Authentification dans IPv6
Rapport interne. -
Compiling and Verifying Security Protocols
Colloque avec actes et comité de lecture. internationale. -
Les protocoles peer-to-peer, leur utilisation et leur détection
Colloque avec actes sans comité de lecture. nationale. -
High-speed encryption method based on switched chaotic model with changeable ...
International audience
