Dissertations / Theses on the topic 'Protocle de mesure'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Protocle de mesure.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Claverie, Léa. "Dynamique d'échange de la dynamine mesurée dans les cellules vivantes pendant la formation de vésicules d'endocytose." Thesis, Bordeaux, 2019. http://www.theses.fr/2019BORD0053.
Full textClathrin-mediated endocytosis (CME), the formation of clathrin-coated vesicles (CCV) from the plasma membrane, is an essential process in eukaryotic cells. During CME, the GTPase dynamin is recruited to the neck of nascent CCV where it oligomerizes into helical filaments. Conformational changes induced by the hydrolysis of GTP catalyze the scission of the vesicle neck. This process has been studied in detail with in vitro reconstitution on membrane tubules but it needs to be established in living cells, where interactions between dynamin and other proteins such as amphiphysin are critical. Live cell total internal reflection fluorescence (TIRF) imaging with the pulsed pH (ppH) assay allows the detection of CCV formation with high spatial (~100 nm) and temporal (2 s) resolutions. It has revealed that dynamin is recruited to maturing clathrin-coated pits (CCP) in two phases with a peak at the time of scission but the parameters of its recruitment in living cells remain unclear. To determine these parameters, we have performed live cell imaging of dynamin recruitment at collective and single molecule levels during acute perturbations of its function. My PhD results showed that dynamin is recruited to the plasma membrane, diffuses outside of CCP and is trapped at CCP. Furthermore, we determined with mutated dynamins that (1) the PRD domain of dynamin is crucial for its recruitment at CCP; (2) the PH domain is important for vesicular scission but not for recruitment to CCP or to the plasma membrane. Finally, I observed that dynamin exchanges with an extra-CCP pool at all times: this would allow for its further recruitment by addition of new binding sites and its ability to narrow the vesicle neck after GTP hydrolysis. Altogether, these data suggest that in CCP dynamin molecules (1) are constantly exchanged; (2) diffuse at similar rates throughout the entire process of vesicle formation, from maturation until scission; and (3) that dynamin’s GTPase activity contributes to CCP maturation and scission
Cavalcante, Fraga Luis Henrique. "Caractérisation des sols pollués via des méthodes géophysiques : couplage entre le diagnostic conventionnel et les méthodes géophysiques pour estimer la distribution spatiale des polluants à l’aide du formalisme géostatistique." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS645.
Full textThe spatial characterization of pollution sources is a key step for estimating the costs of the rehabilitation of contaminated sites. Geochemical sampling is costly and time-consuming and only allows punctual information about contamination levels. This PhD work evaluated the electromagnetic mapping method (EMI) for imaging the physical properties of the subsoil to (1) define geophysical measurement protocols and (2) exploit spatialized geophysical and geochemical data for a better estimation of hydrocarbon-polluted soil volumes through geostatistical formalism. The results at the Poitiers’ site, located in a peri-urban context with an unknown backfill coverage, highlighted the sensitivity of the EMI method for determining the geometry of the backfill layer. The new geophysical measurement strategy applied at the Rouen’s site, which is heavily polluted with hydrocarbons and located in an urban environment, has been modified with exhaustive EMI mapping, electrical resistivity and polarization tomography, ground penetrating radar and physical measurements at sample scale. The multivariate statistical analysis indicated an overall correlation between the hydrocarbon levels and the apparent electrical conductivities measured by the EMI method. Nevertheless, the heterogeneity of the urban fill, surface facilities and a discontinuous aquifer have severely disrupted EMI measurements. Despite the decrease in the variance of estimation error when geophysical data have been integrated into geostatistical models, linear correlations are still weak. A novel geophysical measurement protocol has been designed and demonstrated its potential for assessing contaminated sites
Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.
Full textThe rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Levillain, Olivier. "Une étude de l’écosystème TLS." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0014/document.
Full textSSL/TLS, a 20-year old security protocol, has become a major component securing network communications, from HTTPS e-commerce and social network sites to Virtual Private Networks, from e-mail protocols to virtually every possible protocol. In the recent years, SSL/TLS has received a lot of attentions, leading to the discovery of many security vulnerabilities, and to protocol improvements. In this thesis, we first explore the SSL/TLS ecosystem at large using IPv4 HTTPS scans, while proposing collection and analysis methodologies to obtain reproducible and comparable results across different measurement campaigns. Beyond these observations, we focused on two key aspects of TLS security: how to mitigate Record Protocol attacks, and how to write safe and efficient parsers. Finally, building on the numerous implementation flaws in almost all TLS stacks in the last years, we propose some thoughts about the challenges in writing a secure TLS library
Mas, Denis. "Intérêt et reproductibilité d'un protocole standardisé dans la mesure de l'intervalle QKd." Bordeaux 2, 1997. http://www.theses.fr/1997BOR23069.
Full textKoutsos, Adrien. "Preuves symboliques de propriétés d’indistinguabilité calculatoire." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLN029/document.
Full textOur society extensively relies on communications systems. Because such systems are used to exchange sensitive information and are pervasive, they need to be secured. Cryptographic protocols are what allow us to have secure communications. It is crucial that such protocols do not fail in providing the security properties they claim, as failures have dire consequences. Unfortunately, designing cryptographic protocols is notoriously hard, and major protocols are regularly and successfully attacked. We argue that formal verification is the best way to get a strong confidence in a protocol security. Basically, the goal is to mathematically prove that a protocol satisfies some security property.Our objective is to develop techniques to formally verify equivalence properties of cryptographic protocols, using a method that provides strong security guarantees while being amenable to automated deduction techniques. In this thesis, we argue that the Bana-Comon model for equivalence properties meets these goals. We support our claim through three different contributions.First, we design axioms for the usual functions used in security protocols, and for several cryptographic hypothesis. Second, we illustrate the usefulness of these axioms and of the model by completing case studies of concrete protocols: we study two RFID protocols, KCL et LAK, as well as the 5G-AKA authentication protocol used in mobile communication systems. For each of these protocols, we show existing or new attacks against current versions, propose fixes, and prove that the fixed versions are secure. Finally, we study the problem of proof automation in the Bana-Comon model, by showing the decidability of a set of inference rules which is a sound, though incomplete, axiomatization of computational indistinguishability when using an IND-CCA2 encryption scheme. From a cryptographer's point of view, this can be seen as the decidability of a fixed set of cryptographic game transformations
Borelly, Audrey. "Comment mesurer l'influence de l'information préventive sur les risques majeurs ? : L'intérêt de la mise en situation sur maquette." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAU011/document.
Full textSince 1987, populations have been granted access to preventive information about major risks. It is passed down through a variety of methods, from regulatory documents (DICRIM, PPI brochure etc.) to original supports and alternative expression forms (plays, video clips, exhibitions etc.). Direct questionnaires to populations already assess the efficiency and impact of first category preventive information. However, these assessments do not check whether the information has actually induced adapted behaviors when confronted to stressful conditions, as is the case with extreme events. On the other hand, the impact of second category information appears under-studied, while it is characterized by original methods and tools. These methods, borrowed from arts and pedagogy, generate an interesting popular response, by activating emotions and resorting to sensory stimulation. As a matter of fact, communication science has shown that mobilizing sense and emotions helps with message memorization.In the face of these observations, this thesis proposes to assess how different ways to pass down preventive information influence behavior in a fictional crisis situation. To that end, a new method inspired from arts and role play has been created and experimented upon.Therefore, the study first compares this new method to the classic questionnaire method, and secondly, it opposes regulatory documents to alternative information. By focusing on floods, earthquakes and gas emanation risks, the comparison has been set up and studied on three different sites in Isère in France: Grenoble, Jarrie et Saint-Egrève. The respondents were presented a 3D model as the operating stage, and then confronted to typical dilemmas that can stem from emergency situations. Here, this thesis has highlighted reactions that surveys cannot reveal: reflex actions sometimes contradicting the respondents’ knowledge, hesitations, etc. Benefits and limits of preventive information are thereby more accurate, and depend on circumstances as well as on the respondents’ sociogeographic profiles. The results demonstrate how necessary it is to multiply and diversify the modes of information transmission, and to adapt them to specific audiences, through experience sharing and crisis contextualization
Corral, Gonzalez Joël Eduardo. "Mesure de paramètres de qualité de service dans les réseaux IP." Rennes 1, 2004. http://www.theses.fr/2004REN10121.
Full textKiennert, Christophe. "Elaboration d'un modèle d'identité numérique adapté à la convergence." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-01002153.
Full textJaubert, Jean. "Etudes de quelques interactions entre espèces et facteurs de l'environnement (lumière, température et oxygène dissous) mesures in situ en milieu récifal : conception et réalisation d'instruments de mesure et protocoles expérimentaux." Nice, 1987. http://www.theses.fr/1987NICE4110.
Full textAït, Ali Ahmed Lepage Francis. "Amélioration de la mesure de la bande passante dans un réseau basé sur IP." S. l. : Nancy 1, 2007. http://www.scd.uhp-nancy.fr/docnum/SCD_T_2007_0088_AIT.ALI.pdf.
Full textSeurin, Yannick. "Primitives et protocoles cryptographiques à sécurité prouvée." Versailles-St Quentin en Yvelines, 2009. http://www.theses.fr/2009VERS0009.
Full textWe study the relation between the random oracle model and the ideal block cipher model. We prove that these two models are equivalent: the existence of a cryptosystem secure in one of the models implies the existence of a cryptosystem secure in the other model. We prove that if a cryptosystem using an ideal block cipher is secure, then this cryptosystem remains secure when the block cipher is replaced by the Luby-Rackoff construction with 6 rounds where the inner functions are publicly accessible. Then, we study cryptographic protocols based on the LPN problem. The authentication protocol HB+ aroused much interest and several variants seeking to reinforce the security of this protocol were subsequently proposed. We present a cryptanalysis of three of these variants, and then we propose the protocol HB#. We also propose a probabilistic symmetric encryption scheme whose security against chosen plaintext attacks can be reduced to the difficulty of the LPN problem
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
Full textThe interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
CHABERNAUD, JEAN-MARC. "Mesure des gaz respiratoires a l'effort dans l'insuffisance cardiaque congestive : comparaison de deux protocoles de charge." Limoges, 1989. http://www.theses.fr/1989LIMO0124.
Full textGuen, Eloise. "Microscopie thermique à sonde locale : Etalonnages, protocoles de mesure et applications quantitatives sur des matériaux nanostructurés." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI003.
Full textScanning thermal microscopy (SThM) is a technique that allows characterizing the thermal properties of nanomaterials and helps understanding heat transfer at submicron scales. To interpret the measurements, parameters influencing heat transfer between the probe and the sample are studied. Firstly, three resistive SThM probes, differing in particular by their micro and nanometric radii of curvature, are analyzed and a systematic methodology for the measurements is proposed. It is put forward that the sensitive zone to thermal conductivity of bulk planar materials is limited to few W.m-1.K-1 for the three probes. For the more conductive materials, SThM measurements are dominated by interfacial thermal resistance. Heat transfer at the solid-solid nanocontact between the probe and the sample can be both ballistic and diffusive. It is further demonstrated that surface roughness strongly impacts SThM measurements, decreasing heat transfer at the contact by more than 50 % in some cases. This work is used for characterizations of nanomaterials. The determination of the thermal conductivity of SiO2 thin film on silicon substrate indicates that thicknesses of a few nanometers up to 1 µm are detected by certain probes. Phase transition temperature measurement by SThM is also studied, using a calibration with bulk polymers. The application of this calibration for the characterization of polymer thin films demonstrates the influence of the substrate and the thin film thickness on the temperature determined by SThM. These results demonstrate that scanning thermal microscopy allows obtaining quantitative measurements
Scerri, Guillaume. "Proof of security protocols revisited." Thesis, Cachan, Ecole normale supérieure, 2015. http://www.theses.fr/2015DENS0002/document.
Full textWith the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the criticality and complexity of these protocols, there is an important need of formal verification.In order to obtain formal proofs of cryptographic protocols, two main attacker models exist: the symbolic model and the computational model. The symbolic model defines the attacker capabilities as a fixed set of rules. On the other hand, the computational model describes only the attacker's limitations by stating that it may break some hard problems. While the former is quiteabstract and convenient for automating proofs the later offers much stronger guarantees.There is a gap between the guarantees offered by these two models due to the fact the symbolic model defines what the adversary may do while the computational model describes what it may not do. In 2012 Bana and Comon devised a new symbolic model in which the attacker's limitations are axiomatised. In addition provided that the (computational semantics) of the axioms follows from the cryptographic hypotheses, proving security in this symbolic model yields security in the computational model.The possibility of automating proofs in this model (and finding axioms general enough to prove a large class of protocols) was left open in the original paper. In this thesis we provide with an efficient decision procedure for a general class of axioms. In addition we propose a tool (SCARY) implementing this decision procedure. Experimental results of our tool shows that the axioms we designed for modelling security of encryption are general enough to prove a large class of protocols
Adnane, Hassiba-Asmaa. "La confiance dans le routage ad hoc : étude du protocole OLSR." Rennes 1, 2008. https://tel.archives-ouvertes.fr/tel-00354194.
Full textThe implicit trust is always present in the operating protocols, in particular, between the entities involved in routing operations. In our work, we are interested by trust management as security solution for OLSR protocol. This approach fits particularly with characteristic of ad-hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities. First, we analyse the fonctionning of OLSR protocol under the terms of trust. Then, we propose a trust-based reasoning which allow to each node to evaluate the behavior of the other nodes, to detect misbehavior nodes, and then to be able to trust or not the other nodes. Finally, we propose a solutions of prevention and contermeasures to resolve the situations of inconsistency, and counter the malicious nodes. These solutions require only minor modifications on the OLSR and can be extended depending on the attack type and users needs
Jaubert, Jean. "Etude de quelques interactions entre espèces et facteurs de l'environnement (lumière, température et oxygène dissous) mesurés in situ en milieu récifal conception et réalisation d'instruments de mesure et protocoles expérimentaux /." Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37606222p.
Full textPittoli, Philippe. "Influence d'une architecture de type maître-esclave dans les problématiques de sécurité de l'Internet des objets." Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAD006/document.
Full textThe Internet of things is a network design where "things" are connected to the Internet, such as thermometers or lights. These objects are constrained in memory, computational capacity and communication (packet size, shared medium). The thesis is focused on issues around those constraints. A client willing to send a request to an object may either establish a direct connection to the object (end-to-end architecture) or establish a connection to the network gateway, which is not constrained in memory or computation capabilities, and will be used as a broker between clients and objects (master-slave architecture). This purpose of the thesis is to understand and to spotlight the differences between those two kinds of architectures and to determine their viability in an IoT context
Ligier, Simon. "Développement d’une méthodologie pour la garantie de performance énergétique associant la simulation à un protocole de mesure et vérification." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEM083/document.
Full textDiscrepancies between ex-ante energy performance assessment and actual consumption of buildings hinder the development of construction and renovation projects. Energy performance contracting (EPC) ensures a maximal level of energy consumption and secures investment. Implementation of EPC is limited by technical and methodological problems.This thesis focused on the development of an EPC methodology that allies building energy simulation (BES), and measurement and verification (M&V) process anticipation. The building parameters’ uncertainties and dynamic loads variability are considered using a Monte-Carlo analysis. A model generating synthetic weather data was developed. Statistical studies of simulation results allow a guaranteed consumption limit to be evaluated according to a given risk. Quantile regression methods jointly capture the risk level and the relationship between the guaranteed energy consumption and external adjustment factors. The statistical robustness of these methods was studied as well as the choice of the best adjustment factors to consider. The latter will be measured during building operation. The impact of measurement uncertainties is statistically integrated in the methodology. The influence of M&V process accuracy is also examined. The complete EPC methodology is finally applied on two different projects: the refurbishment of a residential building and the construction of a high energy performance office building
Sorniotti, Alessandro. "Protocoles pour Poignées de Main Secrètes." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00006276.
Full textLeita, Corrado. "Automated protocol learning for the observation of malicious threats." Nice, 2008. http://www.theses.fr/2008NICE4061.
Full textOne of the main prerequisites for the development of reliable defenses to protect a network resource consists in the collection of quantitative data on Internet threats. This attempt to “know your enemy” leads to an increasing interest in the collection and exploitation of datasets providing intelligence on network attacks. The creation of these datasets is a very challenging task. The challenge derives from the need to cope with the spatial and quantitative diversity of malicious activities. The observations need to be performed on a broad perspective, since the activities are not uniformly distributed over the IP space. At the same time, the data collectors need to be sophisticated enough to extract a sufficient amount of information on each activity and perform meaningful inferences. How to combine the simultaneous need to deploy a vast number of data collectors with the need of sophistication required to make meaningful observations? This work addresses this challenge by proposing a protocol learning technique based on bioinformatics algorithms. The proposed technique allows to automatically generate low-cost responders starting from a set of samples of network interaction. Its characteristics are exploited in a distributed honeypot deployment that collected information on Internet attacks for a period of 8 months in 23 different networks distributed all over the world (Europe, Australia, United States). This information is organized in a central dataset that is analyzed in the context of this work
Labelle, Simon. "Étude de la mesure de la fiabilité des analyses de protocole dans le cadre de réunions techniques en génie logiciel." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0020/MQ53584.pdf.
Full textAït, Ali Ahmed. "Amélioration de la mesure de la bande passante dans un réseau basé sur IP." Thesis, Nancy 1, 2007. http://www.theses.fr/2007NAN10088/document.
Full textThis thesis work is focused on the end-to-end available bandwidth measurement that has attracted extensive attentions this last decade. This parameter is useful for several network applications, however, its measurement with good accuracy still stays a challenge to take up. To improve the performance of the available bandwidth measurement techniques, we developed a new deterministic model of packet pair delays that takes into account the probing packet size parameter; and implemented it in a new measurement tool called IGMPS. Through measurements on several network testbed configurations, we evaluated IGMPS and found that it provides available bandwidth measurements with high accuracy. Using sensitivity and uncertainty analysis to study the proposed model, we investigated the sources of observed errors on the measurement tools. We found that these errors are likely to be inherent in delay measurement. Indeed, the timestamping operations at the sender end the receiver are mainly at the origin of the inaccuracy of the estimates provided by the available bandwidth measurement tools
Boisseau, Alexandre. "Abstractions pour la vérification de propriétés de sécurité de protocoles cryptographiques." Cachan, Ecole normale supérieure, 2003. https://theses.hal.science/tel-01199555.
Full textSince the development of computer networks and electronic communications, it becomes important for the public to use secure electronic communications. Cryptographic considerations are part of the answer to the problem and cryptographic protocols describe how to integrate cryptography in actual communications. However, even if the encryption algorithms are robust, there can still remain some attacks due to logical flaw in protocols and formal verification can be used to avoid such flaws. In this thesis, we use abstraction techniques to formally prove various types of properties : secrecy and authentication properties, fairness properties and anonymity
Ninet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.
Full textIn this thesis, we analyze the IKEv2 protocol specification using three formal verification tools: Spin, ProVerif and Tamarin. To perform the analysis with Spin, we extend and improve an existing modeling method with a simpler adversary model and a model for common cryptographic primitives and Lowe's authentication properties. As a result we show that the reflection attack, an attack found by a previous analysis, is actually not applicable. Moreover, our analysis using ProVerif and Tamarin provides new results regarding non-injective agreement and injective agreement guaranties of IKEv2 in the unbounded model. We then show that the penultimate authentication flaw, a vulnerability that was considered harmless by previous analyses, actually allows for a new type of Denial-of-Service attack, which works against IKEv2: the Deviation Attack. The Deviation Attack is harder to detect than existing DoS attacks, but is also harder to perform. To concretely demonstrate the attack, we successfully implement it against a popular open-source implementation of IKEv2. Finally, we study the use of existing DoS countermeasures and existing configuration options to defeat the attack, but we only find mitigations or incomplete workarounds. We therefore tackle the problem at a higher level: we propose two possible inexpensive modifications of the protocol, and formally prove that they both prevent the attack
Nounouh, Soufiane. "Protocoles de mesure et de calibrage de champs électromagnétiques en vue de l'imagerie par diffraction d'objets faiblement enfouis." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM4750/document.
Full textThis thesis is devoted to the development of a microwave system dedicated to subsurface imaging applications. The analysis of the measured wave after the interaction with the medium allows to retrieve the electromagnetic properties of the probed structure. Here, we choose a single frequency operating mode combined with a multistatic configuration in order to improve the information diversity.Quantitative imaging requires a high-precision calibration of the measured data even after a careful correction of experimental errors. Thus, a calibration method is proposed, exploiting the measurement in free-space of the radiation pattern of each antenna. These patterns are quantitatively modeled thanks to an optimized linear combination of elementary sources positioned on the antenna's aperture. This simple and efficient calibration avoids additional measurements with calibration objects. This method provides successful results in a 2D free space scattering problem, as well as in the shallowly buried targets case.The calibrated data serve as inputs to inversion algorithms. As localization is concerned, very satisfactory detection results are obtained. Regarding the characterization aspects, the results indicate that the stratified configuration is less suitable than the free space configuration, due to its lack of spatial information. In order to improve the signal-to-noise ratio, some amendments are made to the experimental configuration (different antennas with or without orientation). Although the permittivity reconstructions are perfectible, the first results are promising especially since no a-priori on the targets has been inserted in the inversion algorithm so far
Allard, Fabien. "Le transfert de contexte : atout pour la mobilité et outil de réduction de coûts pour la sécurité." Télécom Bretagne, 2009. http://www.theses.fr/2008TELB0090.
Full textBernat, Vincent. "Théories de l'intrus pour la vérification des protocoles cryptographiques." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2006. http://tel.archives-ouvertes.fr/tel-00132064.
Full textChevalier, Céline. "Etude de protocoles cryptographiques à base de mots de passe." Paris 7, 2009. http://www.theses.fr/2009PA077183.
Full textA fundamental property fulfilled by cryptography is the creation of secure communication channels, which guarantee authentication, integrity and confidentiality of the data transfered. Authentication, which allows several users to be convinced of the identities of their interlocutors, is generally nothing but a preliminary step to the proper communication, and is often coupled with the generation of a secret session key, which then enables the encryption of the following messages. We focus here on a particular type of authentication, based on passwords. We first recall the different security frameworks, as well as the existing protocols, particularly insisting on the new framework of universal composability. We show next that two variants of existing protocols remain secure in this context, under strong security hypothesis, and in the random oracle and ideal cipher models. In a third step, we extend the smooth hash functions to obtain a protocol with an equivalent level of security, but this time in the standard model. This protocol does not output a bitstring anymore, but a random group element. We then present a randomness ex-tractor from such a group element, to obtain a random bitstring. Finally, we show how to extend the use of passwords to public key primitives, by defining the new notion of distributed cryptography from passwords
Hördegen, Heinrich. "Vérification des protocoles cryptographiques : comparaison des modèles symboliques avec une application des résultats : étude des protocoles récursifs." Thesis, Nancy 1, 2007. http://www.theses.fr/2007NAN10083.
Full textThis thesis deals with formal verification of cryptographic protocols. It is about symbolic modelling of protocols with the objective to prove security properties. The thesis is split in two parts: The first part defines four symbolic models which differ in the syntactic resources that protocol designers may use do model cryptographic primitives. We found that engineers employ coding dodges in order to model missing cryptographic primitives in simpler models. We showed that these codings are correct in that protocol properties that are proven in lean models also hold in more elaborated models. We finish this part with the description of a module implementation for the verification plate-form AVISPA. The module is based on results that allow to automatically translate protocol properties, proven in symbolic models, to computational models. In the second part of this thesis, we develop a symbolic model in order to represent ecursive protocols. This class of protocols is difficult to analyse and, so far, there are only few decidability results. We show that our symbolic model allows us to retrieve an previously known attack against a special security property of an e-commerce protocol. We then modify this protocol and show that the property holds for the modified protocol
Guts, Nataliya. "Auditabilité pour les protocoles de sécurité." Paris 7, 2011. http://www.theses.fr/2011PA077004.
Full textSecurity protocols often log some data available at runtime for an eventual a posteriori analysis, called audit. In practice, audit procedures remain informal, and the choice of log contents is left to the programmer's common sense. The goal of this dissertation is to formalize and verify the properties expected from audit ! logs. First we consider the use of logs in so called optimistic security protocols which, as opposed to classic security protocols, rely on the logs to postpone certain security checks until the end of execution. We formally study two optimistic schemes: value commitment scheme and offline e-cash; using process languages techniques, we prove that the information logged by their implementations suffices to detect the cheat of participants, if any. Then we define auditability as the ability of a protocol to collect enough evidence to convince an audit ! procedure (judge). We propose a method based on types with logical refinements to verify auditability, and ; implement it as an extension to an existing typechecker. We show that verifying auditability boils down to typechecking the protocol implementation. We also implement logical support for generic pre- and post-! conditions to enhance modular typechecking of higher-order functions
NGUYEN, XUAN FLORENCE. "Conception d'un protocole de mesure de la catalycite des materiaux sous flux d'oxygene atomique / echelle de catalycite et vieillissement rapide des surfaces." Paris 6, 1997. http://www.theses.fr/1997PA066147.
Full textJarma, Yesid. "Protection de ressources dans des centres de données d'entreprise : architectures et protocoles." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00666232.
Full textArnaud, Mathilde. "Formal verification of secured routing protocols." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00675509.
Full textCherif, Amina. "Sécurité des RFIDs actifs et applications." Thesis, Limoges, 2021. http://www.theses.fr/2021LIMO0015.
Full textOver the 30 last years, active RFID devices have evolved from nodes dedicated to identification to autonomous nodes that, in addition, sense (from environment or other sources) and exchange data. Consequently, the range of their applications has rapidly grown from identification only to monitoring and real time localisation. In recent years, thanks to their advantages, the use of active RFID nodes for mobile data collection has attracted significant attention. However, in most scenarios, these nodes are unattended in an adverse environments, so data must be securely stored and transmitted to prevent attack by active adversaries: even if the nodes are captured, data confidentiality must be ensured. Furthermore, due to the scarce resources available to nodes in terms of energy, storage and/or computation, the used security solution has to be lightweight. This thesis is divided in two parts. In the first, we will study in details the evolution of active RFID nodes and their security. We will then, present, in the second part, a new serverless protocol to enable MDCs (Mobile Data Collectors), such as drones, to collect data from mobile and static Active RFID nodes and then deliver them later to an authorized third party. The whole solution ensures data confidentiality at each step (from the sensing phase, before data collection by the MDC, once data have been collected by MDC, and during final delivery) while fulfilling the lightweight requirements for the resource-limited entities involved. To assess the suitability of the protocol against the performance requirements, we will implement it on the most resource-constrained secure devices to prove its efficiency even in the worst conditions. In addition, to prove the protocol fulfills the security requirements, we will analyze it using security games and we will also formally verify it using the AVISPA and ProVerif tools
Robin, Ludovic. "Vérification formelle de protocoles basés sur de courtes chaines authentifiées." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0019/document.
Full textModern security protocols may involve humans in order to compare or copy short strings betweendifferent devices. Multi-factor authentication protocols, such as Google 2-factor or 3D-Secure are typical examplesof such protocols. However, such short strings may be subject to brute force attacks. In this thesis we propose asymbolic model which includes attacker capabilities for both guessing short strings, and producing collisions whenshort strings result from an application of weak hash functions. We propose a new decision procedure for analyzing(a bounded number of sessions of) protocols that rely on short strings. The procedure has been integrated in theAKISS tool and tested protocols from the ISO/IEC 9798-6:2010 standard
Etrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Full textThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
La, Vinh Hoa. "Security monitoring for network protocols and applications." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLL006/document.
Full textComputer security, also known as cyber-security or IT security, is always an emerging topic in computer science research. Because cyber attacks are growing in both volume and sophistication, protecting information systems or networks becomes a difficult task. Therefore, researchers in research community give an ongoing attention in security including two main directions: (i)-designing secured infrastructures with secured communication protocols and (ii)-monitoring/supervising the systems or networks in order to find and re-mediate vulnerabilities. The former assists the later by forming some additional monitoring-supporting modules. Whilst, the later verifies whether everything designed in the former is correctly and securely functioning as well as detecting security violations. This is the main topic of this thesis.This dissertation presents a security monitoring framework that takes into consideration different types of audit dataset including network traffic and application logs. We propose also some novel approaches based on supervised machine learning to pre-process and analyze the data input. Our framework is validated in a wide range of case studies including traditional TCP/IPv4 network monitoring (LAN, WAN, Internet monitoring), IoT/WSN using 6LoWPAN technology (IPv6), and other applications' logs. Last but not least, we provide a study regarding intrusion tolerance by design and propose an emulation-based approach to simultaneously detect and tolerate intrusion.In each case study, we describe how we collect the audit dataset, extract the relevant attributes, handle received data and decode their security meaning. For these goals, the tool Montimage Monitoring Tool (MMT) is used as the core of our approach. We assess also the solution's performance and its possibility to work in "larger scale" systems with more voluminous dataset
Ducasse, Jean-Marie. "Randonnée pédestre et en raquettes (en moyenne montagne) : proposition d'un protocole d'étude des contraintes cardio-respiratoires en situation." Bordeaux 2, 1999. http://www.theses.fr/1999BOR2M153.
Full textSaavedra, Benitez Yesica Imelda. "Nouveau mécanisme pour la sécurisation IEEE 802. 11s protocoles de routage." Versailles-St Quentin en Yvelines, 2013. http://www.theses.fr/2013VERS0001.
Full textThe aim of this thesis is to provide necessary security features in order to protect packet routing in WMNs. To achieve this goal, first of all we will carry out a detailed review of the literature in relation to WMNs, including WMN’s architecture, applications, routing protocols and security requirements. In this context, we propose three different secure routing protocols for WMNs which provide security in terms of routing, as well as countermeasures in case of compromised nodes. Our protocols are secure against both internal and external attacks. The first protocol is a data-link-layer secure protocol for routing. We base the design of our secure routing protocol IBE-HWMP on the HWMP. HWMP is a routing protocol that is employed on the second layer (Data Link Layer). The second proposed protocol is also the secure Hybrid-Wireless-Mesh Protocol (HWMP). Our Watchdog-HWMP prevents attacks on internal nodes. The third proposed protocol is an extension of the classical RA-OLSR protocol. We have proposed a digital signature of routing messages with IBE. In this thesis we not only contribute to security routing, but also to other issues such as increasing throughput, minimizing packet delay, and handling node mobility. Through extensive simulations, we evaluate the effectiveness of our proposed solutions in terms of delay and overhead control
Flandé, Yves. "Protocoles expérimentaux, tests d'hypothèses et transfert, en sciences, à l'école primaire." Paris 7, 2000. http://www.theses.fr/2000PA070095.
Full textThe aim of the work is to study the possibilities and difficulties encountered by pupils (9 to 11 years old) confronted to the generalisation of hypotheses within the framework of an investigation approach. It deals with teaching aids helping to acquire and even transfer to capabilities brought into play in two classes concerned i. E. 4th and 5th grades. The first part of the research work states the various researches in the fields of epistemology, psychology, general education and educational software. It also underlines the questions from which to reduce the requirements to be met with during the learning periods. A second part describes four teaching units on four different subjects. In the course of their investigation approach, pupils have to bring forward hypotheses relates to the purpose dependence of the phenomenon upon one or more factors. They also have to plan the tests (it is required that each hypothesis must be tested with at least two conditions assigned to the factor) to draw up the procedures, assess the results of the measures carried out and finally infer conclusions about the dependence of one factor upon another. The third part brings together the various data (minutes of the group sessions, individual or group proposal in a written from by pupils, individual assessments) collected during the learning periods. It stresses the interest of the procedures and analyses put forward and focuses on types of difficulties that pupils come across. It analyses the impact of the teaching aids offered in order to acquire methodological capabilities and how such aids can be used in other studies. It also assesses the evolution of each individual pupil as well as that the two classes, over the last two school years. It also emphasises the role of the teachers in the way they manage the class (how activities are planned out, situations proposed, techniques brought in and debates dealt with. . . )
Bassil, Carole. "SVSP (Secure Voice over IP Simple Protocole) : une solution pour la sécurisation de la voix sur IP." Paris, ENST, 2005. http://www.theses.fr/2005ENST0045.
Full textSince the invention of the first telephone by Alexander Graham Bell in 1869, network telephony technology did not stop evolving: from circuit switching to packet switching, from fixed network to wireless network. Several new architectures were created which combines the transport of voice, data and image in the same data network. The nature of these open networks has an impact on the voice in terms of security. This yields to the imminent need to secure voice communications while insuring a good quality of service to the voice as well in fixed, wireless and IP networks. Different security solutions are proposed for the data. But partial even incomplete solutions are proposed for the voice. First, we define the needs for securing the telephony and the security services required. Thus, we analyze the security offered by the different telephone networks, namely the security in the traditional telephone network (PSTN and ISDN), in the mobile networks (GSM and UMTS), and in the IP network based on the H. 323 and SIP architectures. This will allow us to compare the security solutions offered by these telephony architectures and to be able to present their advantages and limitations and the security requirements that they cannot satisfy. This analysis drives us to an eloquent result that is the absence of a complete end to end security solution that complies with the security requirements of telephony. Secondly, we propose security architecture for a unified telephony architecture. This security architecture proposes a service layer that is inserted between N and N + 1 layers of the OSI reference model. This choice provides a transparency and an independence of the underlying network but requires reviewing the interfaces and therefore the needs to define an API between the security application and the underlying network that insures transparency. This architecture provides the security services and defines necessary security policies to secure voice communications. Following the security architecture, we defined a security protocol that we named SVSP for Simple Voice Security Protocol. SVSP satisfies the security services defined by this architecture that provides a secure end-to-end phone call. Studies were carried out to integrate it in different telephony infrastructures, namely with the traditional telephone network, GSM the mobile network and with the H. 323 standard for voice over IP communications. A prototype of SVSP was implemented followed by integrating it with SIP the IETF voip standard
Dalverny, Elisabeth. "Mise au point d'un protocole d'essai de toxicité chronique base sur la mesure du taux intrinsèque d'accroissement de la population de Brachydanio rerio." Lyon, INSA, 1993. http://www.theses.fr/1993ISAL0015.
Full textThe chronic toxicity study of substances based on the intrinsic rate of population increase require the knowledge of survival and fecundity probabilities of the tests organisms. The chronic toxicity test application using Brachydanio rerio had been performed with three substances frequently meeting in waters (chrome, cadmium and atrazine) and had been conceived in two steps: - a life cycle test lasting 130 days post fertilisation for the determination of survival, growth and maturity ages, - a partial life cycle test for the reproduction study. We have compared the different development stage sensitivity and compared the sensitivity of the different tests methods: those based on the measure of intrinsic rate of population increase with those which also permit to assess the chronic toxicity: 15-days ELS tests and tests based on the reproduction. Reproduction appeared to be the most sensitive endpoint, the sensitivity factors determined between the early life stage and reproduction are equal to 4,7 to 11,7 with the three substances studies. Thus, the 15-days ELS tests appeared as no good predictors of effect on the complete life cycle on fish. However, for the ELS test realisation, our study shows that a test duration of 15 days is acceptable because the observed effects occurred within this duration. The toxicity test based on the intrinsic rate of population increase is a good method which provides an ecological relevant way but which present a bad cost-effective factor compared with ELS tests or reproduction tests
Jacomme, Charlie. "Preuves de protocoles cryptographiques : méthodes symboliques et attaquants puissants." Electronic Thesis or Diss., université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG005.
Full textThe use of communication protocols has become pervasive at all levels of our society. Yet, their uses come with risks, either about the security of the system or the privacy of the user. To mitigate those risks, we must provide the protocols with strong security guarantees: we need formal, extensive, modular and machine-checked proofs. However, such proofs are very difficult to obtain in practice. In this Thesis, we strive to ease this process in the case of cryptographic protocols and powerful attackers. The four main contributions of this Thesis, all based on symbolic methods, are 1) a methodology for extensive analyses via a case study of multi-factor authentication; 2) composition results to allow modular proofs of complex protocols in the computational model; 3) symbolic methods for deciding basic proof steps in computational proofs, formulated as problems on probabilistic programs; 4) a prototype of a mechanized prover in the Computationally Complete Symbolic Attacker model
Nobelis, Nicolas. "Une architecture pour le transfert électronique sécurisé de document." Nice, 2008. http://www.theses.fr/2008NICE4054.
Full textIn our Information Era, various actors have expressed their needs related to electronic document transfer. These actors can be corporates (a company willing to send confidential schematics to its subcontractor), individuals (a person wishing to share his holiday pictures with his friend) or governments (an administration sending documents to another department). These needs are heterogeneous because they depend not only on the document being transferred, but also on the security properties to fulfill. To satisfy these different needs, numerous secure communication protocols have been developed. However, there is no bijection between the protocols and the needs: thus, it is difficult to associate the adequate protocol to a specific need. During their life cycles, the existing communication protocols can be managed (created, deployed, and used) by three roles, each of them having different objectives: non-expert user, protocol developer and system administrator. The first objective of this thesis is to help these roles find a solution to their problems. A component-based approach seems particularly suitable: in fact, software components allow to isolate specific functionalities for reuse and composition. Moreover, the use of such components enables applications to certify features which may be required by the users. In the context of this work, we define the notion of high level security components, each fulfilling a security property. These components have a generic interface which allows their use by various protocols and applications. The second objective of this thesis is to design an architecture named A. D. E. P. T. And dedicated to the electronic document transfer. This architecture, driven by security policies, relies on one or several assemblies of high level security components to satisfy users needs. These assemblies allow us to illustrate the functionalities of our components as well as their use by the aforementioned roles
Jamet, Raphaël. "Protocols and models for the security of wireless ad-hoc networks." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM039/document.
Full textIn this document, we focus on ways of increasing the security of wireless ad-hoc networks. These networks, and more specifically wireless sensor networks, look increasingly like the right answer to a lot of problem, such as data collection over a large area, or providing emergency network infrastructure after a disaster. They are also inherently exposed to malicious intents due to their collaborative nature. In order to protect them, we focus on the security aspects of the protocols built for these networks. We first propose a Secure and Resilient Reputation-based Routing protocol, called SR3. This protocol routes messages according to a reputation metric built using only trusted information. This protocol achieves data confidentiality and data packet unforgeability, which we prove formally using two verification tools: CryptoVerif and Scyther. We experimentally show the resiliency of SR3 against various attack scenarios, and we compared our results to several routing algorithms of the literature. This evaluation shows that both the resiliency and fairness accomplished by SR3 are better than for those others protocols, especially when the network is sparse. Moreover, and unlike previous solutions, if the compromised nodes behavior changes, then SR3 will self-adapt in order to ensure an acceptable quality of service. Analyses of routing protocols security are nearly always supported by simulations, which often evaluate the ability to deliver messages to a given destination. Several competing definitions for secure routing exist, but to our knowledge, they only address source routing protocols. We propose the notion of incorruptibility, a quantitative computational definition for routing security based on the attacker's ability to alter the routes used by messages. These definitions are then illustrated with several routing algorithms. Finally, we study Intrusion Detection Systems (IDS) for WANET, and more specifically their inputs. These systems provide a supplementary layer of defenses for WANETs, and they are able to easily detect attacks who are complicated for the network protocols. We classify the different inputs used by the decision process of these IDS, according to their level of required cooperation, and the source of their data. We then propose the InDICE tool, a decision aid which, given an IDS, allows automated discovery of undetectable attacks according to the inputs used by that IDS. In the end, we apply our framework to discover weaknesses in two existing IDS
Fu, Yulong. "Sécurité Vérification d’implémentation de protocole." Thesis, Pau, 2014. http://www.theses.fr/2014PAUU3003/document.
Full textRegarding the development of computer technologies, computer systems have been deeply used in our daily life. Those systems have become the foundation of our modern information society. Some of them even take responsibilities for many essential and sensitive tasks (e.g., Medical Treatment System, E-Commerce, Airplane System, Spaceship System, etc.). Once those systems are executed with problems, the loss on the economy may reach an unacceptable number. In order to avoid these disappointing situations, the security of the current systems needs to be verified before their installations. While, most of the systems are implemented from protocol specifications, the problems of verifying the security of concrete system can be transformed to verify the security of protocol implementation. In this thesis, we focus on the security verification methods of protocol implementations and we are interested with two main types of network attacks: Denis-of-Services (DoS) attacks and Protocol Authentication attacks. We investigate the features of these attacks and the existed formal verification methods and propose two extended models of IOLTS and the corresponding algorithms to generate the security verification test cases automatically. In order to avoid the possible state explosions, we also formalize the security experiences of the tester as Security Objective to control the test generation on-the-fly. Meanwhile, a modeled based Anomaly Intrusion Detection Systems (IDS) analysis method is also proposed in this thesis, which can enhance the detect abilities of Anomaly IDS. These proposed verification methods are demonstrated with the case study of RADIUS protocol and an integrated GUI tool is also proposed to simply the operations of test generation
SIFFERT, ANNE-ELISABETH. "Modes de transfert des radionucleides aux vegetaux et a l'homme ; mise au point d'un protocole de mesure de la radioactivite au niveau des plantes." Strasbourg 1, 1990. http://www.theses.fr/1990STR15064.
Full textCheval, Vincent. "Automatic verification of cryptographic protocols : privacy-type properties." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2012. http://tel.archives-ouvertes.fr/tel-00861389.
Full text