Auswahl der wissenschaftlichen Literatur zum Thema „Sécurité numérique“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Sécurité numérique" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Sécurité numérique"
Gusev, Alexander, Arnaud Leconte und Simone Lucatello. „Green Digital Transition and Data Governance“. L'Europe en Formation 396, Nr. 1 (13.11.2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Der volle Inhalt der QuelleKessous, Emmanuel, und Serge Proulx. „La sécurité dans un monde numérique“. Annales Des Télécommunications 62, Nr. 11-12 (November 2007): 1187–91. http://dx.doi.org/10.1007/bf03253312.
Der volle Inhalt der QuelleAchilleas, Philippe. „La bataille de la 5G et le droit international“. Annuaire français de droit international 66, Nr. 1 (2020): 709–31. http://dx.doi.org/10.3406/afdi.2020.5489.
Der volle Inhalt der QuelleSylvestre, Guillaume. „Sécurité de l’information numérique : relever le défi“. I2D - Information, données & documents 54, Nr. 3 (2017): 28. http://dx.doi.org/10.3917/i2d.173.0028.
Der volle Inhalt der QuelleMarsico, G. „Numérique, virtuel, réseaux sociaux, objets connectés : leviers ou freins à la confiance dans la relation de soins ?“ Psycho-Oncologie 14, Nr. 1-2 (März 2020): 53–56. http://dx.doi.org/10.3166/pson-2020-0123.
Der volle Inhalt der QuelleMeiller, Yannick. „La sécurité de l’information devrait être plus présente dans les programmes des écoles de management“. Sécurité et stratégie 32, Nr. 4 (19.03.2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Der volle Inhalt der QuelleLuzeaux, Dominique. „Le numérique au service du combat collaboratif“. Revue Défense Nationale N° 865, Nr. 10 (11.12.2023): 17–23. http://dx.doi.org/10.3917/rdna.865.0017.
Der volle Inhalt der QuelleCoustillière, Arnaud. „Maîtriser le combat dans l’espace numérique et contribuer à la sécurité numérique nationale“. Géoéconomie 75, Nr. 3 (2015): 25. http://dx.doi.org/10.3917/geoec.075.0025.
Der volle Inhalt der QuelleFreyssinet, Éric. „Transformation numérique de la gendarmerie nationale“. Sécurité et stratégie 31, Nr. 3 (19.03.2024): 20–24. http://dx.doi.org/10.3917/sestr.031.0020.
Der volle Inhalt der QuelleDumas, Mathilde, Anne-Florence Fay, Emmanuel Charpentier und Julien Matricon. „Le jumeau numérique en santé“. médecine/sciences 39, Nr. 12 (Dezember 2023): 953–57. http://dx.doi.org/10.1051/medsci/2023178.
Der volle Inhalt der QuelleDissertationen zum Thema "Sécurité numérique"
Hogue, Simon. „La résistance esthétique à l'assemblage de surveillance de sécurité : l'art numérique comme participation citoyenne“. Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38454.
Der volle Inhalt der QuelleJbara, Abdelbasset. „Méthode d'obtention et d'optimisation des principaux paramètres garantissant la sécurité d'une transmission numérique en se fixant l'objectif de sécurité : application aux système de transports“. Lille 1, 1993. http://www.theses.fr/1993LIL10060.
Der volle Inhalt der QuelleCoulongeat, François. „Modélisation numérique de l'enfant : application en accidentologie routière“. Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4000/document.
Der volle Inhalt der Quelle130 children died in the French roads in 2010. A better knowledge of the mechanisms of injuries could lead to an improvement of their safety. Crash test dummies provide data on the local forces and on kinematics but finite element models can provide further data on the mechanical behaviour of internal organs. However, few numerical models of children currently exist. The purpose of this project is to develop and assess a finite element whole-body model of a 6 year old child (FEMOCS6). The geometry of this model was provided by medical imaging data of children for the trunk and the head and by a scaling down of an adult geometry for the limbs. Meshed geometry is made up of about 390 000 tria elements and 460 000 tetra elements. The study of the specificities of children led to the definition of modelling hypotheses and of the mechanical properties. Material properties were partly provided by characterizations of paediatric tissues from literature but a lack of data led to the use of adult data for the most of the tissues. The mechanical behaviour of the model was assessed by the numerical simulations of paediatric tests from the literature: impacts, dynamical compression and sled tests with a restraint system. The model could allow to study efficiency of existing child restraint system
Ould, Moustapha Ahmed Salem. „Etude numérique du développement de panaches thermiques en milieux confinés : application à la sécurité incendie“. Paris 6, 2004. http://www.theses.fr/2004PA066255.
Der volle Inhalt der QuelleDJILALI, BERKANE LAIEB ZOHRA. „Evaluation numérique d'un coefficient de sécurité cinématique pour les barrages et les ouvrages en terre“. Université Joseph Fourier (Grenoble), 1997. http://www.theses.fr/1997GRE10193.
Der volle Inhalt der QuellePérès, Jérémie. „Modélisation numérique de la femme enceinte : Application en accidentologie routière“. Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4117.
Der volle Inhalt der QuelleRandimbiarison, Jérôme. „Signature numérique d'un document basée sur FIDO2“. Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/66598.
Der volle Inhalt der QuelleIn this digital era, the use of paper documents is impractical and inefficient, which motivates companies to move towards the use of electronic documents (or e-docs). This desire to innovate towards a paperless operation can improve the efficiency and quality of public or private administration services so as to speed up their activities and at the same time better meet customer needs. However, this practice has created new needs, such as the actual digital signature of documents. In this thesis, we have proposed a new digital signature scheme using FIDO2, which happens to be a new standard for secure online authentication based on digital signatures. The fact that FIDO2 is a free standard makes it easier for software and hardware developers to implement their own products. This inspired us to use it a digital signature purpose, the idea being, to replace the challenge sent by the server with the hash of e-docs and send it to the signer’s device so that the latter signs with his private key. As with public key infrastructure, each user had a key pair, that is, a private key and a public key. A signatory must confirm their biometric identification (fingerprint, facial recognition, voice, etc.) or PIN code to access the private key stored locally on their device and sign a document. During our research, we carried out several tests with different equipment (PC, USB FIDO, Smartphone) as well as different OS (Android, iOS, Windows). The results of our tests show us that we can use FIDO2 to sign an electronic document. This proposed new approach can be used for a face-to-face (local) or remote (online) signature. The prototype developed for the implementation of our approach has been validated with typical users (member-clients and advisers) in a company.
Richard, Paul-Henri. „Crise et ville intelligente au prisme de l'éthique appliquée à la sécurité civile“. Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0020/document.
Der volle Inhalt der QuelleThe support of the social rhythms and the urban complexity are a priority for the decision-makers. However, the supplied answers are subjected to a permanent analysis of the adequacy between risk and anticipation. This thesis proposes a reflection on the consideration of the ethics in the practices of crisis management. In a first part, a state of the art of the concept shows us that the "smart city" seems to be an attractive answer for the decision-maker. She develops in a continuity assured by a resilience scheduled in the global nature. Yet, when this system based on the principle of continuity is suddenly questioned, the surprise subjects the decision-maker to a reaction of break. The disqualification of the technological services imposes then to react by referring to the fundamental concepts of the human socialization. Looked for in the depths of the consciousness of the individual in the collective, we show in a second part that the break materializes for the decision-makers under the form of ethical dilemmae. Our analysis leans on one put in perspective by the ethics of the extreme situations (conflicts, health), and on an investigation realized with decision-makers. We mobilize the concept of organizational culture, applied to the actors of the civil safety as well as to the organizations having implemented a collaborative governance of the risks. Finally, in the third part, we show that the ethical questioning realized during the phase of preparation is a way of anticipation of the uncertainties associated with the decision-making in context of crisis
Février, Rémy. „Management de la sécurité des systèmes d'information : les collectivités territoriales face aux risques numériques“. Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020025.
Der volle Inhalt der QuelleThis doctoral thesis aims at answering a key question: what is the level of consideration given to Information Systems Security (ISS) by the French local authorities (LAs)? The latter are now facing new challenges that require an ever-increasing use of new technologies (e-government, e-democracy, dematerialization of call for tenders...). The under-researched territorial IT risk becomes a major issue in the sphere of public services and the protection of personal data. Theoretically based and constructed through successive professional positions, our theoretical model helps measure the actual level of inclusion of digital risk taking into account the respective influence of a set of characteristics of local authorities. A field survey was conducted with the close collaboration of representatives of LAs.While numerical risk requires a high level awareness by LA decision makers, it appears that they have a very imperfect knowledge of IT security related risks as well as of direct or indirect threats that may jeopardize their management systems. A potential solution lies with the definition of a specific public policy and with the implementation of appropriate procedures at the level of each community
Moussa, Ali Abdellatif Karim. „Chiffrement authentifié sur FPGAs de la partie reconfigurable à la partie static“. Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066660/document.
Der volle Inhalt der QuelleCommunication systems need to access, store, manipulate, or communicate sensitive information. Therefore, cryptographic primitives such as hash functions and block ciphers are deployed to provide encryption and authentication. Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces better performance compared to two separated algorithms since authentication and encryption can share a part of the computation. Because of combining the programmability with the performance ofcustom hardware, FPGAs become more common as an implementation target for such algorithms. The first part of this thesis is devoted to efficient and high-speed FPGA-based architectures of AE algorithms, AES-GCM and AEGIS-128, in order to be used in the reconfigurable part of FPGAs to support security services of communication systems. Our focus on the state of the art leads to the introduction of high-speed architectures for slow changing keys applications like Virtual Private Networks (VPNs). Furthermore, we present an efficient method for implementing the GF($2^{128}$) multiplier, which is responsible for the authentication task in AES-GCM, to support high-speed applications. Additionally, an efficient AEGIS-128is also implemented using only five AES rounds. Our hardware implementations were evaluated using Virtex-5 and Virtex-4 FPGAs. The performance of the presented architectures (Thr./Slices) outperforms the previously reported ones.The second part of the thesis presents techniques for low cost solutions in order to secure the reconfiguration of FPGAs. We present different ranges of low cost implementations of AES-GCM, AES-CCM, and AEGIS-128, which are used in the static part of the FPGA in order to decrypt and authenticate the FPGA bitstream. Presented ASIC architectures were evaluated using 90 and 65 nm technologies and they present better performance compared to the previous work
Bücher zum Thema "Sécurité numérique"
Ton, Kalker, Cox I. J und Ro Yong Man, Hrsg. Digitial watermarking: Second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers. Berlin: Springer, 2004.
Den vollen Inhalt der Quelle findenShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Den vollen Inhalt der Quelle findeniPhone forensics. Sebastopol, CA: O'Reilly, 2008.
Den vollen Inhalt der Quelle findenNussbaumer, Henri. Informatique industrielle, tome 4. Commande numérique, téléinformatique, sécurité, sûreté, fiabilité. Presses Polytechniques et, 1987.
Den vollen Inhalt der Quelle findenLa gestion du risque de sécurité numérique pour la prospérité économique et sociale. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-fr.
Der volle Inhalt der Quelle(Editor), Bart Preneel, Rene Govaerts (Editor) und Joos Vandewalle (Editor), Hrsg. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Den vollen Inhalt der Quelle finden(Editor), Alessandro Acquisti, Stefanos Gritzalis (Editor), Costos Lambrinoudakis (Editor) und Sabrina di Vimercati (Editor), Hrsg. Digital Privacy: Theory, Technologies, and Practices. AUERBACH, 2007.
Den vollen Inhalt der Quelle findenDigital Watermarking and Steganography: Fundamentals and Techniques. CRC, 2007.
Den vollen Inhalt der Quelle findenShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Den vollen Inhalt der Quelle findenShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Sécurité numérique"
Delerue, François, und Aude Géry. „Diplomatie et sécurité du numérique“. In La Cyberdéfense, 105–14. Armand Colin, 2023. http://dx.doi.org/10.3917/arco.taill.2023.01.0105.
Der volle Inhalt der QuelleLEFÈVRE, Pascal, Philippe CARRÉ und Philippe GABORIT. „Codes et tatouages“. In Sécurité multimédia 1, 87–136. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch3.
Der volle Inhalt der QuellePiazza, Pierre. „L’extension des fichiers de sécurité publique“. In Politiques sécuritaires et surveillance numérique, 29–45. CNRS Éditions, 2014. http://dx.doi.org/10.4000/books.editionscnrs.20179.
Der volle Inhalt der QuelleCassou-Mounat, Bernard. „Chapitre 35. La sécurité numérique : comment s’y préparer ?“ In Architecture et ingénierie à l'hôpital, 265–70. Presses de l’EHESP, 2018. http://dx.doi.org/10.3917/ehesp.lange.2018.01.0265.
Der volle Inhalt der QuelleBronnikova, Olga, Ksenia Ermoshina und Anna Zaytseva. „Chapitre 4. Les formations à la sécurité numérique : GAFAM/ MAGMA, protection des données et chiffrement“. In Genèse d’un autoritarisme numérique, 97–118. Presses des Mines, 2023. http://dx.doi.org/10.4000/books.pressesmines.9088.
Der volle Inhalt der QuelleCull, Nicholas John, und Maxime Chervaux. „Chapitre 9. Le Royaume-Uni : appréhender une sécurité réputationnelle“. In Les guerres de l'information à l'ère numérique, 231–59. Presses Universitaires de France, 2021. http://dx.doi.org/10.3917/puf.maran.2021.01.0231.
Der volle Inhalt der QuellePériès, Gabriel. „La confiance au prisme de la « sécurité nationale ». Une analyse critique à l’ère des réseaux numériques“. In Politiques sécuritaires et surveillance numérique, 59–78. CNRS Éditions, 2014. http://dx.doi.org/10.4000/books.editionscnrs.20191.
Der volle Inhalt der Quelle„Gérer le risque de sécurité numérique de l’entreprise à l’ère de l’industrie 4.0“. In Six clés pour la transformation numérique de votre entreprise à l’ère de l’industrie 4.0, 127–58. Presses de l'Université du Québec, 2023. http://dx.doi.org/10.2307/j.ctv37wprdg.12.
Der volle Inhalt der Quelle„Recommandation du Conseil sur la gestion du risque de sécurité numérique pour la prospérité économique et sociale“. In La gestion du risque de sécurité numérique pour la prospérité économique et sociale, 7–18. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-1-fr.
Der volle Inhalt der Quelle„Document d'accompagnement de la Recommandation du Conseil de l'OCDE sur la gestion du risque de sécurité numérique pour la prospérité économique et sociale“. In La gestion du risque de sécurité numérique pour la prospérité économique et sociale, 19–73. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-2-fr.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Sécurité numérique"
Kamaté, Caroline. Le monde change, la sécurité industrielle aussi: Humain, numérique, nouvelles organisations: 10 points-clés à l’horizon 2040. Fondation pour une culture de sécurité industrielle, Mai 2023. http://dx.doi.org/10.57071/240dpc.
Der volle Inhalt der QuelleGariépy, Félix, Benoit Dupont, Céline Castets-Renard, Hugo Loiseau, Lyse Langlois, Nadia Tawbi, Pierre-Martin Tardif, Sébastien Gambs und Steve Jacob. Guide sur les conditions et bonnes pratiques pour la mise en place d’une identité numérique nationale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, Februar 2024. http://dx.doi.org/10.61737/afqc2028.
Der volle Inhalt der Quellede Marcellis-Warin, Nathalie, François Vaillancourt, Ingrid Peignier, Molivann Panot, Thomas Gleize und Simon Losier. Obstacles et incitatifs à l’adoption des technologies innovantes dans le secteur minier québécois. CIRANO, Mai 2024. http://dx.doi.org/10.54932/dlxt6536.
Der volle Inhalt der QuelleDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, Oktober 2023. http://dx.doi.org/10.54932/ryht5065.
Der volle Inhalt der QuelleCadre d'action de l'OCDE sur la sécurité numérique. Organisation for Economic Co-Operation and Development (OECD), Februar 2023. http://dx.doi.org/10.1787/a0517600-fr.
Der volle Inhalt der QuelleRapport sur le dialogue social 2022 : la négociation collective pour une reprise durable, résiliente et inclusive. ILO, 2022. http://dx.doi.org/10.54394/iscj2582.
Der volle Inhalt der Quelle