International audienceThe Internet of Things (IoT) is composed of a wide range of heterogeneous network devices that communicate with their users and the surrounding devices. The secure communications between these devices are still essential even with little or no previous knowledge about each other and regardless of their resource capabilities. This particular context requires appropriate security mechanisms which should be wellsuited for the heterogeneous nature of IoT devices, without pre-sharing a secret key for each secure connection. In this work, we first propose a novel symmetric cipher proxy re-encryption scheme. Such a primitive allows a user to delegate her decryption rights to another with the help of a semi-trusted proxy, but ...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
This thesis addresses two problems associated with the cybersecurity in the Internet of Things (IoT)...
A proxy re-encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the p...
International audienceThe Internet of Things (IoT) is composed of a wide range of heterogeneous netw...
Abstract The Internet of Things (IoT) technologies interconnect a broad range of network devices, d...
The Internet of Things (IoT) technologies interconnect a broad range of network devices, differing i...
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that...
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including ...
The IoT devices deployed in various application scenarios will generate massive data with immeasurab...
Cybersecurity is a major issue for the SmartGrid and energy industries. Manipulating data collected ...
Secure and scalable data sharing is one of the main concerns of the Internet of Things (IoT) ecosyst...
With the rapid popularization of the Internet of Things (IoT) in our daily lives, the communication ...
The Internet of Things (IoT) enables billions of embedded computing devices to connect to each other...
Abstract Data is central to the Internet of Things IoT ecosystem. Most of the current IoT systems a...
La cyber sécurité est un enjeu majeur pour le SmartGrid et les industries énergétiques. La manipulat...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
This thesis addresses two problems associated with the cybersecurity in the Internet of Things (IoT)...
A proxy re-encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the p...
International audienceThe Internet of Things (IoT) is composed of a wide range of heterogeneous netw...
Abstract The Internet of Things (IoT) technologies interconnect a broad range of network devices, d...
The Internet of Things (IoT) technologies interconnect a broad range of network devices, differing i...
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that...
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including ...
The IoT devices deployed in various application scenarios will generate massive data with immeasurab...
Cybersecurity is a major issue for the SmartGrid and energy industries. Manipulating data collected ...
Secure and scalable data sharing is one of the main concerns of the Internet of Things (IoT) ecosyst...
With the rapid popularization of the Internet of Things (IoT) in our daily lives, the communication ...
The Internet of Things (IoT) enables billions of embedded computing devices to connect to each other...
Abstract Data is central to the Internet of Things IoT ecosystem. Most of the current IoT systems a...
La cyber sécurité est un enjeu majeur pour le SmartGrid et les industries énergétiques. La manipulat...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
This thesis addresses two problems associated with the cybersecurity in the Internet of Things (IoT)...
A proxy re-encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the p...