Skip to Main content Skip to Navigation
New interface

Search by documents



hal-01113223v1  Conference papers
Ziad IsmailJean LeneutreDavid BatemanLin Chen. A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
IEEE 16th International Symposium on High Assurance Systems Engineering (HASE), Jan 2015, Daytona Beach Shores, FL, United States. ⟨10.1109/HASE.2015.24⟩
...
hal-02122427v1  Conference papers
Farah HaidarArnaud KaiserBrigitte LoncPascal Urien. Risk Analysis on C-ITS pseudonymity aspects
International Conference on New Technologies, Mobility and Security (NTMS), Jun 2019, Ile canaries, Spain
hal-03024074v1  Conference papers
Aida DiopMaryline LaurentJean LeneutreJacques Traoré. CoRA: a scalable Collective Remote Attestation protocol for sensor networks
ICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩
hal-03295351v1  Conference papers
Mohammad El HajjAhmad FadlallahMaroun ChamounAhmed Serhrouchni. Secure PUF: Physically Unclonable Function based on Arbiter with Enhanced Resistance against Machine Learning (ML) Attacks
Proc. 5th Int. Conf. Sensors Electron. Instrum. Adv.(SEIA), Sep 2019, Adaje, Canary, Islands (Tenerife), Spain
hal-03289804v1  Conference papers
Mohammed El-HajjMaroun ChamounAhmad FadlallahAhmed Serhrouchni. Analysis of authentication techniques in Internet of Things (IoT)
2017 1st Cyber Security in Networking Conference (CSNet), Oct 2017, Rio de Janeiro, France. pp.1-3, ⟨10.1109/CSNET.2017.8242006⟩
hal-03295358v1  Conference papers
Ahmed SerhrouchniElloh Yves Christian Adja. Improved CRL Distribution point for Cooperative Intelligent Transportation Systems
2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), May 2021, Bordeaux, France
...
tel-03719946v1  Theses
Sameh Khalfaoui. Security bootstrapping for Internet of Things
Cryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAT023⟩
hal-02288435v1  Conference papers
Mounira MsahliAhmed Serhrouchni. SBaaS: Safe Box as a service
IEEE Internationale Conference, CollaborateCom, Oct 2013, Austin, Texas, United States
hal-02288436v1  Conference papers
Mounira MsahliAhmed Serhrouchni. PCM in cloud
IEEE International Conference on Granular Computing (GrC), Oct 2014, Noboribetsu, Japan
...
hal-01917456v1  Conference papers
Joseph KamelInes Ben JemaaArnaud KaiserPascal Urien. Misbehavior Reporting Protocol for C-ITS
2018 IEEE Vehicular Networking Conference (VNC), Dec 2018, Taipei, Taiwan
hal-03295361v1  Conference papers
Zakarya DriasAhmed SerhrouchniOlivier Vogel. Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
2017 1st Cyber Security in Networking Conference (CSNet), Oct 2017, Rio de Janeiro, France. pp.1-10, ⟨10.1109/CSNET.2017.8242008⟩
hal-02287108v1  Conference papers
Mounira MsahliAhmed SerhrouchniXiuzhen Chen. Towards a Fine-Grained Access Control for Cloud
2014 IEEE 11th International Conference on e-Business Engineering, Oct 2013, Guangzhou, China
hal-02287106v1  Journal articles
Soumia NatouriChidung LacAhmed Serhrouchni. A Model-Based Resilience Analysis for IMS.
Journal of Networks, Academy Publisher, 2014, 9 (3), pp.588-603
hal-02287112v1  Conference papers
Balkis HamdaneAhmed SerhrouchniGuemera Sihem. A novel name-based security mechanism for information-centric networking
IEEE Wireless Communications and Networking Conference (WCNC), Apr 2014, Istanbul, Turkey
hal-01113214v1  Journal articles
Ziad IsmailJean LeneutreDavid BatemanLin Chen. A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI
IEEE Journal on Selected Areas in Communications, Institute of Electrical and Electronics Engineers, 2014, 32 (7), pp.12. ⟨10.1109/JSAC.2014.2332095⟩
...
tel-03634698v1  Theses
Nilesh Vyas. Quantum cryptography in a hybrid security model
Cryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAT049⟩
hal-03628457v1  Proceedings
Joaquin Garcia‐alfaroJean LeneutreNora CuppensReda Yaich. Risks and security of internet and systems
CRISIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris, France. 12528, Springer, pp.xi-378, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-68886-8. ⟨10.1007/978-3-030-68887-5⟩
...
hal-03590199v1  Conference papers
Wen-Jie TsengElise BonnailMark McgillMohamed KhamisEric Lecolinet et al.  The Dark Side of Perceptual Manipulations in Virtual Reality
CHI Conference on Human Factors in Computing Systems (CHI '22), Apr 2022, New Orleans, LA, United States. ⟨10.1145/3491102.3517728⟩
hal-03295346v1  Conference papers
Mohammad El-HajjAhmad FadlallahMaroun ChamounAhmed Serhrouchni. Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs)
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM), Oct 2019, Fez, Morocco. pp.1-7, ⟨10.1109/WINCOM47513.2019.8942487⟩
...
tel-03419019v1  Theses
Han Qiu. An efficient data protection architecture based on fragmentation and encryption
Cryptography and Security [cs.CR]. Télécom ParisTech, 2017. English. ⟨NNT : 2017ENST0049⟩
hal-02287110v1  Conference papers
Mounira MsahliRached AbdeljaouedAhmed Serhrouchni. Access Control in Probative Value Cloud
The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Dec 2013, London, United Kingdom
hal-02287886v1  Journal articles
Mohamed T. HammiErwan LivolantPatrick BellotPascale MinetAhmed Serhrouchni. A Safe Communication Protocol for IoT Devices
Annals of Telecommunications - annales des télécommunications, Springer, 2018, pp.15
...
hal-01978179v1  Conference papers
Farah HaidarArnaud KaiserBrigitte LoncPascal Urien. C-ITS PKI protocol: Performance Evaluation in a Real Environment
WONS 2019 15 th Wireless On-demand Network systems and Services Conference, Jan 2019, Wengen, Switzerland
hal-02278603v1  Conference papers
Moussa OuedraogoHaralambos MouratidisArtur HeckerCédric BonhommeDjamel Khadraoui et al.  A New Approach to Evaluating Security Assurance
7th International Conference on Information Assurance and Security, Dec 2011, Melaka, Malaysia
hal-02286239v1  Journal articles
Liliana RoseroJesus ArandaMichel RiguidelDaniel Gidoin. A Fine-Grained Document-based Access Control Model
International Journal of Machine Learning and Computing, EJournal, 2011, pp.317-324