The last decade has seen the massive democratization of smart devices such as phones, tablets, even watches. In the wealthiest societies of the world, not only do people have their personal computer at home, they now carry one in their pocket or around their wrist on a day to day basis. And those devices are no more used simply for communication through messaging or phone calls, they are now used to store personal photos or critical payment data, manage contacts and finances, connect to an e-mail box or a merchant website... Recent examples call for more complex tasks we ask to such devices: Estonia voting policy allows the use of smart ID cards and smartphones to participate to national elections. In 2017, Transport for London launched the...
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and t...
Il n'est pas surprenant , compte tenu de smartphones commodité et l'utilité, pour voir leur adoption...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
The last decade has seen the massive democratization of smart devices such as phones, tablets, even ...
Les “smart-devices” tels les smartphones, tablettes et même les montres ont été largement démocratis...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
With the development of digital networks, such as Internet, communication protocols are omnipresent....
Les particuliers et les organisations comptent de plus en plus sur le Web et sur les applications de...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
With the massive use of dematerialized storage, homomorphism has become one of the most widely used ...
With the massive use of dematerialized storage, homomorphism has become one of the most widely used ...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Security is one of the main issues of modern computer science. Nowadays more and more people use a c...
Mobility is an important component of people’s liberty. The evolution of technological means contrib...
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and t...
Il n'est pas surprenant , compte tenu de smartphones commodité et l'utilité, pour voir leur adoption...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
The last decade has seen the massive democratization of smart devices such as phones, tablets, even ...
Les “smart-devices” tels les smartphones, tablettes et même les montres ont été largement démocratis...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
With the development of digital networks, such as Internet, communication protocols are omnipresent....
Les particuliers et les organisations comptent de plus en plus sur le Web et sur les applications de...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
With the massive use of dematerialized storage, homomorphism has become one of the most widely used ...
With the massive use of dematerialized storage, homomorphism has become one of the most widely used ...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Security is one of the main issues of modern computer science. Nowadays more and more people use a c...
Mobility is an important component of people’s liberty. The evolution of technological means contrib...
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and t...
Il n'est pas surprenant , compte tenu de smartphones commodité et l'utilité, pour voir leur adoption...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...