WorldCat Identities

Urien, Pascal

Overview
Works: 24 works in 36 publications in 2 languages and 955 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Other, Opponent, Author, Thesis advisor, 956, 958
Publication Timeline
.
Most widely held works by Pascal Urien
RFID and the internet of things by Herve Chabanne( )

8 editions published between 2011 and 2013 in English and held by 271 WorldCat member libraries worldwide

RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves. An RFID tag contains an antenna and a microchip that allows it to transmit and receive. This technology is a possible alternative to the use of barcodes, which are frequently inadequate in the face of rapid growth in the scale and complexity of just-in-time inventory requirements, regional and international trade, and emerging new methods of trade based on it. Use of RFID tags will likely eventually become as widespread as barcodes today. This book describes the technologies used for implementation of RFID: from hardware, communication protocols, cryptography, to applications (including electronic product codes, or EPC) and middleware. The five parts of this book will provide the reader with a detailed description of all the elements that make up a RFID system today, including hot topics such as the privacy concerns, and the Internet of Things
2018 Fourth International Conference on Mobile and Secure Services (MOBISECSERV) : Miami Beach, Miami, FL, USA, 24-25 February 2018 by MobiSecServ( )

2 editions published in 2018 in English and held by 183 WorldCat member libraries worldwide

2017 Third Conference on Mobile and Secure Services (MOBISECSERV) : Miami Beach, Miami, FL, USA 11-12 February 2017 by Conference on Mobile and Secure Services( )

2 editions published in 2017 in English and held by 182 WorldCat member libraries worldwide

Annotation
Proceedings of the 2016 Second Conference on Mobile and Secure Services (MOBISECSERV) : University of Florida, Gainesville, FL 32611, USA, 26-27 February 2016 by Conference on Mobile and Secure Services( )

1 edition published in 2016 in English and held by 172 WorldCat member libraries worldwide

RFID et l'internet des choses( Book )

1 edition published in 2010 in French and held by 68 WorldCat member libraries worldwide

2015 7th International Conference on New Technologies, Mobility and Security (NTMS) : proceedings of NTMS'2015 Conference and Workshops by NTMS (Conference)( )

2 editions published in 2015 in English and held by 18 WorldCat member libraries worldwide

2015 First Conference on Mobile and Secure Services (MOBISECSERV) : University of Florida, Gainesville, FL, 32611, USA, 20-21 February 2015 by Conference on Mobile and Secure Services( )

2 editions published in 2015 in English and held by 16 WorldCat member libraries worldwide

Proceedings of the 2015 First Conference on Mobile and Secure Services (MOBISECSERV) University of Florida, Gainesville, FL, USA, 20-21 February 2015 by MOBISECSERV( )

1 edition published in 2015 in English and held by 11 WorldCat member libraries worldwide

2016 Second Conference on Mobile and Secure Services (MOBISECSERV) University of Florida, Gainesville, FL, USA, 26-27 February 2016 by MobiSecServ( )

1 edition published in 2016 in English and held by 10 WorldCat member libraries worldwide

RFID and the Internet of Things( )

1 edition published in 2013 in English and held by 6 WorldCat member libraries worldwide

MOBISECSERV : 2016 second Conference on Mobile and Secure Services : University of Florida, Gainesville, FL 32611, USA, 26-27 February 2016( )

1 edition published in 2016 in English and held by 3 WorldCat member libraries worldwide

Étude expérimentale et interprétation théorique du comportement de circuit logique rapide dans le froid, jusqu'à 77 °K by Pascal Urien( Book )

1 edition published in 1982 in French and held by 3 WorldCat member libraries worldwide

Evaluation de la confiance dans un processus d'authentification by Julien Hatin( )

2 editions published in 2017 in French and held by 2 WorldCat member libraries worldwide

In our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing to online services from its mobile phone is an usual action.In order to authenticate to those services, that might be sensitive, the one and only protection is usually a password. Those passwords must be longer and longer to stay robust.This is a bigger constraint on mobile phones than on desktop computers.Other authentication solutions are dedicated to smartphones, like facial recognition on android and now Apple smartphones or the fingerprint that conquier new phones.To ease the authentication process, biometrics is more and more often used on mobile phones. In addition to the dedicated biometric sensors, it is also possible to use the phone environement to authenticate users.However, if authentication methods are becoming more and more transparent, it brings two questions:How to integrate those new methods within the actual authentication framework ?What is the impact of those new methods on users' privacy ?The main goal of the phD is to offers privacy compliant transparent authentication methods while integrating them in current authentication systems.In this document, we evaluates those two questions by first analyzing existing works on the data collection for transparent authentication on mobile phones. Then, once the data are collected, we will see wich process can enable the privacy protection. To conclude, we will evaluates concretly those solutions by building industrial prototypes
Elaboration d'un modèle d'identité numérique adapté à la convergence by Christophe Kiennert( )

1 edition published in 2012 in French and held by 1 WorldCat member library worldwide

L'évolution des réseaux informatiques, et notamment d'Internet, s'ancre dans l'émergence de paradigmes prépondérants tels que la mobilité et les réseaux sociaux. Cette évolution amène à considérer une réorganisation de la gestion des données circulant au cœur des réseaux. L'accès à des services offrant de la vidéo ou de la voix à la demande depuis des appareils aussi bien fixes que mobiles, tels que les Smartphones, ou encore la perméabilité des informations fournies à des réseaux sociaux conduisent à s'interroger sur la notion d'identité numérique et, de manière sous-jacente, à reconsidérer les concepts de sécurité et de confiance. La contribution réalisée dans ce travail de thèse consiste, dans une première partie, à analyser les différents modèles d'identité numérique existants ainsi que les architectures de fédération d'identité, mais également les protocoles déployés pour l'authentification et les problèmes de confiance engendrés par l'absence d'élément sécurisé tel qu'une carte à puce. Dans une deuxième partie, nous proposons, en réponse aux éléments dégagés dans la partie précédente, un modèle d'identité fortement attaché au protocole d'authentification TLS embarqué dans un composant sécurisé, permettant ainsi de fournir les avantages sécuritaires exigibles au cœur des réseaux actuels tout en s'insérant naturellement dans les différents terminaux, qu'ils soient fixes ou mobiles. Enfin, dans une dernière partie, nous expliciterons plusieurs applications concrètes, testées et validées, de ce modèle d'identité, afin d'en souligner la pertinence dans des cadres d'utilisation pratique extrêmement variés
De la sécurité des platesformes JavaCardTM face aux attaques matérielles by Guillaume Barbu( )

1 edition published in 2012 in English and held by 1 WorldCat member library worldwide

Smart cards play a key role in various applications we use on a daily basis: payment, mobile communication, public transports, etc. In this context, the Java Card technology has evolved since its introduction in the mid-nineties to become nowadays the world leading smart card platform. In the context of Java Card, researches on security have revealed that the possibility of loading malicious applications represents a real threat. In the meantime, the scientific community has also paid interest to the security of embedded cryptography, revealing that theoretically strong cryptosystems can be easily broken if their implementation does not take into account certain physical properties of the underlying hardware device. In particular, a part of the published attacks relies on the attacker's capacity to physically perturb the component during a cryptographic operation. These latter fault attacks have been rarely considered in the literature in the Java Card context. In this thesis, we study and evaluate the security of Java Cards against the combination of fault and software attacks in order to enhance it. First, we present various attack paths involving both hardware and software attacks and expose how these attacks allow to break various security mechanisms of Java Cards. In particular, our security analysis proves that the type-safety property, the control-flow integrity and the application isolation can be tampered with by the combination of adequate fault injections and malicious applications. Then, with regards to the goal of this thesis and the results of our security analysis, we present different approaches allowing to improve the resistance of Java Cards and Java Card applications against combined attacks. Thus we define several countermeasures against the attack we exposed as well as against some of the state-of-the-art attacks, always bearing in mind the strong constraints relative to smart cards
Contribution à l'amélioration de la sécurité pour le protocole SIP (Session Initiation Protocol) by Samer El Sawda( Book )

1 edition published in 2011 in English and held by 1 WorldCat member library worldwide

SIP est un protocole de signalisation de la couche application pour créer, modifier et terminer des sessions, pour les appels téléphoniques sur Internet et la diffusion et les conférences multimédia. Nous proposons dans cette thèse l'extension "SIP SIGN" permettant de signer quelques champs d'entête pour fournir un service de non-répudiation et une authentification de bout-en-bout tout en utilisant le protocole TLS ou DTLS. Nous proposons aussi "SIP SecLite" comme une solution complète, simple, efficace et rapide pour sécuriser les communications SIP en fournissant les propriétés de sécurité exigées par SIP. Notre solution permet de réaliser la sécurité de bout en bout d'un réseau SIP tout en assurant la confidentialité et l'intégrité des messages SIP, la non-répudiation de la communication, l'anonymat par rapport aux serveurs intermédiaires et la protection d'identité et des données privées des utilisateurs finaux
La sécurité des futures architectures convergentes pour des services personnalisés : aspect architectural et protocolaire by Ali Hammami( )

1 edition published in 2013 in French and held by 1 WorldCat member library worldwide

The emergence and evolution of Next Generation Networks (NGN) have raised several challenges mainly in terms of heterogeneity, mobility and security. In fact, the user is able, in such environment, to have access to many networks, via multiple devices, with a vast choice of services offered by different providers. Furthermore, end-users claim to be constantly connected anywhere, anytime and anyhow. Besides, they want to have a secure access to their services through a dynamic, seamless and continuous session according to their preferences and the desired QoS. In this context, security represents an important concern. In fact, this user-centric session should obviously be secured. However, many challenges arise. In such environment, system boundaries, which were well delimited, become increasingly open. Indeed, there are multiple services which are unknown in advance and multiple communications between services and with users. Besides, heterogeneity of involved resources (terminals, networks and services) in the user session increases the complexity of security tasks. In addition, the different types of mobility (user, terminal, network and service mobility) affect the user-centric session that should be unique, secure and seamless and ensure continuity of services
Une architecture d'administration de cartes à puce, similaire à OTA, et dédiée aux réseaux sans fil IP by Toundé Mesmin Dandjinou( Book )

1 edition published in 2006 in French and held by 1 WorldCat member library worldwide

IP wireless networks are invading most of our life areas. But the lack of secured access of these networks is a serious brake for the development of new services in them. In our work, we propose to use smart cards as security modules, as it is the case in the mobile radio telephony networks GSM. For this purpose in spite of smart cards limitations of their computational and storage capabilities, we suggest a new protocol named EAP-SSC (EAP Secured Smartcard Channel). This protocol is dedicated to the mutual authentication using both symmetrical and asymmetrical cryptographic keys contexts. As IP wireless networks are operated by various administrative authorities, it is necessary to anticipate the consideration of the diversity of the underlined security politics. So, we propose a platform named OpenEAPSmartcard intended to be set up in every Java card of the market place. This platform is opened and easy for being convenient for new authentication scenarios chosen by the computer programmers. Security of cryptographic materials stored on the servers is not safeguarded, because of the operating systems flaws and vulnerabilities; access points closed to the users are less sheltered from attacks. For that reason we suggest to create authentication micro-servers that correspond to EAP servers included in the Java smart cards. The deployment of those micro-servers on a large scale will cause the problem of keeping them up to date. We propose a software architecture called TEAPM (Trusted EAP Module) which heart is formed by EAP and EAP-TLS surrounded by XML and HTTP protocols. This architecture allows the "On The Air" secured administration of the micro-servers
Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices by Hilal Houssain( )

1 edition published in 2012 in English and held by 1 WorldCat member library worldwide

Les systèmes de cryptographie à base de courbe elliptique (ECC) ont été adoptés comme des systèmes standardisés de cryptographie à clé publique (PKC) par l'IEEE, ANSI, NIST, SEC et WTLS. En comparaison avec la PKC traditionnelle, comme RSA et ElGamal, l'ECC offre le même niveau de sécurité avec des clés de plus petites tailles. Cela signifie des calculs plus rapides et une consommation d'énergie plus faible ainsi que des économies de mémoire et de bande passante. Par conséquent, ECC est devenue une technologie indispensable, plus populaire et considérée comme particulièrement adaptée à l'implémentation sur les dispositifs à ressources restreintes tels que les réseaux de capteurs sans fil (WSN). Le problème majeur avec les noeuds de capteurs chez les WSN, dès qu'il s'agit d'opérations cryptographiques, est les limitations de leurs ressources en termes de puissance, d'espace et de temps de réponse, ce qui limite la capacité du capteur à gérer les calculs supplémentaires nécessaires aux opérations cryptographiques. En outre, les mises en oeuvre actuelles de l'ECC sur WSN sont particulièrement vulnérables aux attaques par canaux auxiliaires (SCA), en particulier aux attaques par analyse de consommation (PAA), en raison de l'absence de la sécurité physique par blindage, leur déploiement dans les régions éloignées et le fait qu'elles soient laissées sans surveillance. Ainsi, les concepteurs de crypto-processeurs ECC sur WSN s'efforcent d'introduire des algorithmes et des architectures qui ne sont pas seulement résistants PAA, mais également efficaces sans aucun supplément en termes de temps, puissance et espace. Cette thèse présente plusieurs contributions dans le domaine des cryptoprocesseurs ECC conscientisés aux PAA, pour les dispositifs à ressources limitées comme le WSN. Premièrement, nous proposons deux architectures robustes et efficaces pour les ECC conscientisées au PAA. Ces architectures sont basées sur des algorithmes innovants qui assurent le fonctionnement de base des ECC et qui prévoient une sécurisation de l'ECC contre les PAA simples (SPA) sur les dispositifs à ressources limitées tels que les WSN. Deuxièmement, nous proposons deux architectures additionnelles qui prévoient une sécurisation des ECC contre les PAA différentiels (DPA). Troisièmement, un total de huit architectures qui incluent, en plus des quatre architectures citées ci-dessus pour SPA et DPA, deux autres architectures dérivées de l'architecture DPA conscientisée, ainsi que deux architectures PAA conscientisées. Les huit architectures proposées sont synthétisées en utilisant la technologie des réseaux de portes programmables in situ (FPGA). Quatrièmement, les huit architectures sont analysées et évaluées, et leurs performances comparées. En plus, une comparaison plus avancée effectuée sur le niveau de la complexité du coût (temps, puissance, et espace), fournit un cadre pour les concepteurs d'architecture pour sélectionner la conception la plus appropriée. Nos résultats montrent un avantage significatif de nos architectures proposées par rapport à la complexité du coût, en comparaison à d'autres solutions proposées récemment dans le domaine de la recherche
Sécurisation d'un système de transactions sur terminaux mobiles by Chrystel Gaber( Book )

1 edition published in 2013 in French and held by 1 WorldCat member library worldwide

Mobile-based transactions have driven growing attention for the past few years. This thesis focuses on mobile-based transaction systems which are managed by a mobile network operator. In such a context, transactions are carried out with electronic money emitted by the operator by the subscribers of the service only. This thesis addresses the problem of securing such services. We propose an architecture which achieves end-to-end security between the payment platform and the payment application in the mobile device. Is is based on a Secure Element (SE) and a Trusted Execution Environment. Several types of transactions were considered such as payments or transfers as well as different modes based on the connection availability of the various actors. The protocols proposed were formally verified. Their performances were also taken into account. Several classification algorithms were compared to be adapted to the fraud detection problem in mobile-based systems. To achieve this, the payment platform and the user's behavior were modeled to create a synthetic data generator. The latter is preliminarily validated in the thesis. The originality of this simulator is that it is based on data from an existing system
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.59 (from 0.51 for Proceeding ... to 0.94 for Étude exp ...)

RFID and the internet of things
Covers
Languages
English (24)

French (8)