Précédents séminaires

14/03/2023  •  Cybersecurity of Critical Devices: Network Security and Host Intrusion Detection
Maxime PUYS, Ingénieur chercheur (CEA LETI)

With the advent of Industry 4.0, there is a convergence between industrial systems and IoT. As industry becomes more distributed, connected and service-oriented, it tends to move closer to IoT. On the other hand, IoT, which was initially limited to smart home devices and gadgets, is expanding into much more critical areas. What you find today in factories, healthcare, transportation or smart cities, are complex connected devices, often connected to a local network or even the cloud;...

Maxime PUYS
21/02/2023  •  Generic Privacy Preserving Private Permissioned Blockchains
Frédéric HAYEK, Doctorant

Private permissioned blockchains are becoming gradually more sought-after. Such systems are reachable by authorized users, and tend to be completely transparent to whoever interacts with the blockchain. In this paper, we mitigate the latter. Authorized users can now stay unlinked to the transaction they propose in the blockchain while being authenticated before being allowed to interact. As a first contribution, we developed a consensus algorithm for private permissioned blockchains based...

Frédéric HAYEK
10/01/2023  •  RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol
Gaël MARCADET, Doctorant

The verification of computations performed by an untrusted server is a cornerstone for delegated computations, especially in multi-clients setting where inputs are provided by different parties. Assuming a common secret between clients, a garbled circuit offers the attractive property to ensure the correctness of a result computed by the untrusted server while keeping the input and the function private. Yet, this verification can be guaranteed only once. Based on the notion of multi-key...

Gaël MARCADET
14/11/2022  •  Time Optimal Gathering of Myopic Robots on an Infinite Triangular Grid
Pritam GOSWAMI, Doctorant (Jadavpur University)

This work deals with the problem of gathering n oblivious mobile entities, called robots, at a point (not known beforehand) placed on an infinite triangular grid. The robots are considered to be myopic, i.e., robots have limited visibility. Earlier works of gathering mostly considered the robots either on a plane or on a circle or on a rectangular grid under both full and limited visibility. In the triangular grid, there are two works to the best of our knowledge. The first one is by...

Pritam GOSWAMI
11/10/2022  •  Validation formelle des requêtes PKI C-ITS
Dhekra MAHMOUD, Doctorante

Les Systèmes de Transport Intelligent (ITS) est un domaine de recherche qui gagne de plus en plus d'attention dans le contexte des Routes Intelligentes. Des messages sont échangés en permanence entre les acteurs des Systèmes de Transport Intelligent-Connectés (C-ITS) et devraient être sécurisés puisqu'ils peuvent contenir des informations sensibles relatives à la vie privée des utilisateurs. Aussi, accéder aux services spécifiques des ITS nécessite l' "authentification". L'Infrastructure...

«
Page 4 / 8
»