With the advent of Industry 4.0, there is a convergence between industrial systems and IoT. As industry becomes more distributed, connected and service-oriented, it tends to move closer to IoT. On the other hand, IoT, which was initially limited to smart home devices and gadgets, is expanding into much more critical areas. What you find today in factories, healthcare, transportation or smart cities, are complex connected devices, often connected to a local network or even the cloud;...
Private permissioned blockchains are becoming gradually more sought-after. Such systems are reachable by authorized users, and tend to be completely transparent to whoever interacts with the blockchain. In this paper, we mitigate the latter. Authorized users can now stay unlinked to the transaction they propose in the blockchain while being authenticated before being allowed to interact. As a first contribution, we developed a consensus algorithm for private permissioned blockchains based...
The verification of computations performed by an untrusted server is a cornerstone for delegated computations, especially in multi-clients setting where inputs are provided by different parties. Assuming a common secret between clients, a garbled circuit offers the attractive property to ensure the correctness of a result computed by the untrusted server while keeping the input and the function private. Yet, this verification can be guaranteed only once. Based on the notion of multi-key...
This work deals with the problem of gathering n oblivious mobile entities, called robots, at a point (not known beforehand) placed on an infinite triangular grid. The robots are considered to be myopic, i.e., robots have limited visibility. Earlier works of gathering mostly considered the robots either on a plane or on a circle or on a rectangular grid under both full and limited visibility. In the triangular grid, there are two works to the best of our knowledge. The first one is by...
Les Systèmes de Transport Intelligent (ITS) est un domaine de recherche qui gagne de plus en plus d'attention dans le contexte des Routes Intelligentes. Des messages sont échangés en permanence entre les acteurs des Systèmes de Transport Intelligent-Connectés (C-ITS) et devraient être sécurisés puisqu'ils peuvent contenir des informations sensibles relatives à la vie privée des utilisateurs. Aussi, accéder aux services spécifiques des ITS nécessite l' "authentification". L'Infrastructure...