Spelling suggestions: "subject:"protocoles"" "subject:"protocole""
31 |
Protocoles cryptographiques pour les réseaux ad hocBhaskar, Raghav 03 July 2006 (has links) (PDF)
Mobile Ad hoc networks are a step closer to the vision of pervasive computing where all devices dynamically discover each other, organize communication networks between themselves and share resources/information to provide seamless service to the end-user. But providing any reliable service over such a network requires a secure and well-functioning network. Lack of infrastructure, energy-constrained nature of devices and high dynamism in the network makes the task of securing such networks quite challenging. In this thesis we propose cryptographic protocols, which are a stepping stone to a secure ad hoc network. In particular, we contribute to the areas of key establishment and secure routing in ad hoc networks. Key establishment is concerned with making available cryptographic keys to the devices, necessary for participating in the security services of the network. On the other hand routing needs to be secured in such networks as almost all nodes need to participate in the routing process (for eciency reasons) and presence of one malicious node could easily have drastic consequences on the routing performance of the whole network. Thus security checks are required to prevent such malicious nodes from hampering the routing process and to recover from it in case they do succeed. Our rst result is a new group key agreement protocol which is especially suitable for ad hoc networks but also outperforms most known protocols for traditional networks as well. The protocol adapts well to the dynamics of the network and is robust enough to deal with message losses and link failures. It requires little self-organization by the nodes in the network. We present some modied versions of the same and vii tel-00469429, version 1 - 1 Apr 2010 security proofs showing that the security of these protocols is tightly related to the security of the Decisional Die-Hellman problem. We also discuss issues related to implementation of this protocol in real scenarios. Our second result is the introduction of the notion of an Aggregate Designated Verier Signature (ADVS) scheme. An ADVS scheme allows ecient aggregation of multiple signatures on dierent messages designated to the same verier. We show how this primitive can be eciently utilized to secure reactive routing protocols in ad hoc networks. We provide a security model to analyze such schemes and propose an ADVS scheme which aggregates signatures more eciently than existing schemes.
|
32 |
Intégration de l'Internet 3G au sein d'une plate-forme active /Chamoun, Maroun, January 1900 (has links)
Thèse de doctorat--Informatique et réseaux--Paris--ENST, 2006. / Bibliogr. p. 161-167. Glossaire. Résumé en anglais et en français.
|
33 |
DOSIS un serveur OSI pour l'ouverture des systèmes distribués au monde extérieur /Haj Houssain, Samer. Mazaré, Guy. Mossière, Jacques. January 2008 (has links)
Reproduction de : Thèse de doctorat : informatique : Grenoble, INPG : 1988. / Titre provenant de l'écran-titre.
|
34 |
Les circuits intégrés de communication de données architecture et méthodologie de conception /Nguyen-Xuan-Dang, Michel Mazaré, Guy. Verjus, Jean-Pierre. January 2008 (has links)
Reproduction de : Thèse d'Etat : informartique : Grenoble, INPG : 1988. / Titre provenant de l'écran-titre.
|
35 |
Cytologie péritonéale dans les cancers de l'endomètre état des connaissances et des pratiques /Gallon, François. Guillemin, François January 2004 (has links) (PDF)
Reproduction de : Thèse d'exercice : Médecine : Nancy 1 : 2004. / Titre provenant de l'écran-titre.
|
36 |
Abstract lattices for the verification of systems with queues and stacksLe Gall, Tristan Jéron, Thierry January 2008 (has links) (PDF)
Thèse doctorat : Informatique : Rennes 1 : 2008. / Titre provenant de la page du titre du document électronique. Bibliogr. p. 155-161.
|
37 |
TCP performance study and enhancements within wireless multi-hop ad hoc network environmentsSeddik, Alaa Agoulmine, Nazim January 2009 (has links) (PDF)
Thèse de doctorat : Informatique et réseaux : Evry-Val d'Essonne : 2009. / Titre provenant de l'écran-titre.
|
38 |
Seamless secured roaming over heterogeneous wireless networksGondi, Vamsi Krishna Agoulmine, Nazim January 2009 (has links) (PDF)
Thèse de doctorat : Informatique : Evry-Val d'Essonne : 2009. / Titre provenant de l'écran-titre.
|
39 |
Protocoles pour les communications dans les réseaux de véhicules en environnement urbain routage et geocast basés sur les intersections /Jerbi, Moez Agoulmine, Nazim January 2008 (has links) (PDF)
Thèse de doctorat : Réseaux et informatique : Evry-Val d'Essonne : 2008. / Titre provenant de l'écran-titre.
|
40 |
CONKERRiveill, Michel Mazaré, Guy. January 2008 (has links)
Reproduction de : Thèse de doctorat : informatique : Grenoble, INPG : 1987. / Titre provenant de l'écran-titre. Bibliogr. p. 189-194.
|
Page generated in 0.0451 seconds