-
Multi-energy methods for material identification using an X-ray spectrometric...
The development of X-ray photon counting detectors based on semiconductors has grown up over the last ten years, and applications in medicine, in security and in... -
Ontologies for Security Requirements: A Literature Survey and Classification
International audience -
Ontologies for Security Requirements: A Literature Survey and Classification ...
Despite existing methodologies in the field, most requirements engineers are poorly trained to define security requirements. This is due to a considerable lack of... -
Towards a new generation of security requirements definition methodology usin...
International audience -
Langue et politique
National audience -
Resistance of cryptographic circuits to fault attacks
The cryptographic blocks used in the integrated circuits implement algorithms proved robust against cryptanalysis. However, malicious manipulation against the circuit... -
A differentially private mechanism of optimal utility for a region of priors
International audience -
A lattice based authentication for low-cost RFID
International audience -
From NoC Security Analysis To Design Solutions
This paper addresses a new kind of security vulnerable spots introduced by Network-on-chip (NoC) use in System-on-Chip (SoC) design. This study is based on the... -
Task-oriented source coding : Secure transmission, detection
This thesis investigates some task-oriented source coding problems. In this framework, an information source is compressed/quantized in view of the task for which it... -
Franco-Nigerian Business Relationships: The Emergence of International Social...
Thèse préparée d'octobre 2006 à mai 2010. -
Background check. Police and minorities in Paris and Berlin.
Cotutelle franco-allemande. Thèse comparative. -
Des corps étrange(r)s dans la police ?
Deuxième prix du "Jeune auteur" 2010 -
A history of sexual perversion. Emergence and transformations of the concept ...
Date de rédaction : Septembre 2009 - Octobre 2010 -
Towards a Complex Networks Modeling of Interdependent Critical Infrastructures
International audience -
Lebanon in search of sovereignty: Post 2005 security dilemmas
Lebanon's option in favor of a "weak" state implied that armed forces remained voluntarily limited and under-equipped. Traditionally, external defense was neglected... -
Performance evaluation of user applications in the ITS scenario: An analytica...
International audience -
Detection and mitigation of localized attacks in a widely deployed P2P network
International audience
