Précédents séminaires

11/12/2023  •  A Unified Symbolic Analysis of WireGuard
Dhekra MAHMOUD, Doctorante

In this talk, we present a unified formal model of the WireGuard protocol in the symbolic model. Using the automatic cryptographic protocol verifiers SAPIC+, PROVERIF and TAMARIN, we conduct a thorough security assessment of the protocol with regard to an adversary that can read or set static, ephemeral or pre-shared keys, read or set ecdh pre-computations and control key distribution. We consider a complete protocol execution, including cookie messages used for resistance against denial...

14/11/2023  •  Etude, spécification et implémentation d’un chiffrement homomorphe ad-hoc basé sur RLWE
Lola-Baie MALLORDY, Stagiaire

Cloud storage is used to store huge amounts of data, both for companies and private users. Multi-cloud emerged to prevent data from system failure by storing simultaneously several copies of the data among multiple clouds. Yet, this solution is costly in memory, and often does not guarantee confidentiality nor integrity of the data. Moreover, handling communication with each server can be a daunting task for private users. Using secret sharing, we propose an approach involving multiple...

10/10/2023  •  On Contention-related Failures
Anaïs DURAND, Maîtresse de conférences

Reaching consensus is fundamental for many coordination problems in distributed computing. Yet, this problem is impossible in an asynchronous system as soon as one process may crash. We show that an additional constraint on failure occurrences allows solving the consensus problem in crash-prone environments. We will consider so-called λ-constrained failures that can happen only while a predefined contention threshold λ has not yet been bypassed. Assuming these failures, we...

Anaïs DURAND
20/06/2023  •  Performance Enhancement in Wi-Fi Networks using Machine Learning
Ibrahim SAMMOUR, Doctorant

Répétition de soutenance de thèse

Dans le cadre de cette présentation, nous analysons d'abord les algorithmes d'adaptation de débit existants et leur impact sur les performances d'un réseau Wi-Fi. Ensuite, nous étudions les meilleures pratiques pour le déploiement de ces réseaux au sein d'une exploitation agricole, notamment le nombre de points d'accès requis et leur emplacement pour maximiser la couverture et les performances dans le cadre d'une application de...

09/05/2023  •  Multi-Armed Bandit Framework for Resource Allocation in Uplink NOMA Networks
Amani BEN AMOR, Doctorante (XLIM, Université de Limoges)

Attracted by the advantages of Non-Orthogonal Multiple Access (NOMA) in accommodating multiple users within the same resources, this paper jointly addresses the resource allocation and power control problem for Machine Type Devices (MTDs) in a Hybrid NOMA system. Particularly, we model the problem using a Mean Field Game (MFG) framework underlying a Multi-Armed Bandit (MAB) approach. Firstly, the devices invoke the MAB tool to arrange themselves into multiple NOMA coalitions. Then, within...

Amani BEN AMOR
«
Page 3 / 8
»