-
Security analysis of smart card C code using simulated physical attacks
This thesis focuses on the effects of attacks by physical faults on embedded source code specifically for smart cards. Such attacks can compromise the security of the... -
A Comparative Study of French and U.S. Public Company governance: French Law ...
International audience -
The use of benthic invertebrate community and water quality analyses to asses...
The ecological consequences of freshwater land-based salmonid farms on rivers were studied by monitoring eight farms with substantial differences in annual trout... -
Characterization of the structure-function relationship in the human brain us...
Recent advances in Magnetic Resonance Imaging are allowing neuroscientists to gain critical insights into the neural networks mediating a variety of cognitive... -
Secure Component Deployment in the OSGi(tm) Release 4 Platform
Last years have seen a dramatic increase in the use of component platforms, not only in classical application servers, but also more and more in the domain of Embedded... -
Adding Integrity to the Ephemerizer's Protocol
We present a symbolic analysis of the ephemerizer's protocol by Radia Perlman, using the CL-Atse tool from the AVISPA's tool-suite. This protocol allows transmitting a... -
Andromeda: Accurate and Scalable Security Analysis of Web Applications
Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013 -
Study of circulating small RNAs for diagnostic clear cell renal cell carcinoma
Kidney cancer is a major public health problem. Early diagnosis improves the chances of survival. The diagnosis is mainly based on the imaging tests such as...
