This thesis addresses the security and privacy challenges relevant to the resource constrained devices in the era of pervasive computing. Pervasive computing, a term coined by Schechter to describe the idea of computing services available anytime, anywhere and on demand, is characterized by seamless interactions between heterogeneous players in the Internet. This phenomenon allows intelligent chips, sensors or microcontrollers to be embedded into everyday objects to enable them generate, communicate and share information. Pervasive computing accelerates technological evolution by integrating small and resource constrained devices to the Internet arena, eventually opening doors to new services requiring seamless interactions and integrations...
It is no surprise, given smartphones convenience and utility, to see their wide adoption worldwide. ...
Computation offloading is a technique that allows resource-constrained mobile devices to fully or pa...
In this document, we focus on ways of increasing the security of wireless ad-hoc networks. These net...
The network ecosystem has tremendously changed in the past years and is becoming more complex as dev...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
The Internet of Things (IoT) has been fostered by accelerated advancements in communication technolo...
Cette thèse aborde des nouveaux défis de sécurité dans l'Internet des Objets (IdO). La transition ac...
In an increasingly connected world, the Internet permeates every aspect of our lives. The number of ...
Computational reproducibility is an unavoidable concept in the 21st century. Computer hardware evolu...
Large-scale centralized storage of speech data poses severe privacy threats to the speakers. Indeed,...
The advent of Cloud computing and Big Data has introduced a paradigm shift in the area of Informatio...
In the context of the building developments, it is increasing necessary to interconnect communicatin...
Internet of Things (IoT) paradigm envisages expanding the current Internet with a huge number of the...
Performance requirements and constraints on design costs and power consumption still require that si...
It is no surprise, given smartphones convenience and utility, to see their wide adoption worldwide. ...
Computation offloading is a technique that allows resource-constrained mobile devices to fully or pa...
In this document, we focus on ways of increasing the security of wireless ad-hoc networks. These net...
The network ecosystem has tremendously changed in the past years and is becoming more complex as dev...
Cryptographic protocols are one of the foundations for the trust people put in computer systems nowa...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
The Internet of Things (IoT) has been fostered by accelerated advancements in communication technolo...
Cette thèse aborde des nouveaux défis de sécurité dans l'Internet des Objets (IdO). La transition ac...
In an increasingly connected world, the Internet permeates every aspect of our lives. The number of ...
Computational reproducibility is an unavoidable concept in the 21st century. Computer hardware evolu...
Large-scale centralized storage of speech data poses severe privacy threats to the speakers. Indeed,...
The advent of Cloud computing and Big Data has introduced a paradigm shift in the area of Informatio...
In the context of the building developments, it is increasing necessary to interconnect communicatin...
Internet of Things (IoT) paradigm envisages expanding the current Internet with a huge number of the...
Performance requirements and constraints on design costs and power consumption still require that si...
It is no surprise, given smartphones convenience and utility, to see their wide adoption worldwide. ...
Computation offloading is a technique that allows resource-constrained mobile devices to fully or pa...
In this document, we focus on ways of increasing the security of wireless ad-hoc networks. These net...