Contents
Academic literature on the topic 'Protocoles client-serveur'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protocoles client-serveur.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Dissertations / Theses on the topic "Protocoles client-serveur"
Yahfoufi, Nassireddine. "Contribution à la tolérance aux fautes dans les applications distribuées." Versailles-St Quentin en Yvelines, 1999. http://www.theses.fr/1999VERS0005.
Full textMusic, Luka. "Multi-Party Quantum Cryptography : from Folklore to Real-World." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS412.
Full textQuantum cryptography builds upon decades of advances both in classical cryptography and networks. However, contrary to its classical counterparts, it is still in its infancy applicability-wise, even in the scenario where powerful quantum computers are readily available, and more theoretical work is required before it can provide concrete benefits. The first goal is to formalise in rigorous quantum security frameworks the properties of various techniques that have been transposed, often without proper justification, from the classical world.Then, the recent developments in quantum technologies suggest a mostly cloud-based future availability of quantum devices. Therefore, quantum computation and communication cost of protocol participants must be lowered before being useful.Finally, in most situations, additional steps need to be taken to tailor protocols to the specifications of devices. This allows for optimisations both in terms of quantum memory and operation requirements.This thesis contributes to these three aspects by: (i) giving the first general security definition of the Quantum Cut-and-Choose, a technique for proving the correctness of a quantum message; (ii) presenting a more realistic framework of security against superposition attacks, where classical protocols run on inherently quantum devices; (iii) constructing an efficient delegated multi-party quantum computation protocol, allowing clients to delegate securely to a quantum server a private computation; (iv) building a method for verifying the honesty of a quantum server performing computations on behalf of a client with no operation or memory overhead compared to the unprotected computation
Books on the topic "Protocoles client-serveur"
Jean-Alain, Hernandez, Joachim Bruno, and Joly René (1948 ), eds. TCP/IP: Architecture, protocoles, applications. 3rd ed. Paris: InterEditions, 1996.
Find full textRobert, Eckstein, and Collier-Brown David, eds. Using Samba. 2nd ed. Beijing: O'Reilly, 2003.
Find full textDavid, Collier-Brown, and Kelly Peter, eds. Using Samba. Sebastopol, CA: O'Reilly, 2000.
Find full textComer, Douglas E. Internetworking with TCP/IP: Principles, protocols, and architecture. 2nd ed. Englewood Cliffs, N.J: Prentice Hall, 1991.
Find full textCarter, Gerald, Jay Ts, and Robert Eckstein. Using Samba: A File and Print Server for Linux, Unix and Mac OS X. O'Reilly Media, Incorporated, 2007.
Find full textKelly, Peter, Robert Eckstein, and David Collier-Brown. Using Samba. O'Reilly, 1999.
Find full textKelly, Peter, Robert Eckstein, Andrew Oram, and David Collier-Brown. Using Samba. O'Reilly Media, Incorporated, 1999.
Find full textCarter, Gerald, Jay Ts, and Robert Eckstein. Using Samba: A File and Print Server for Linux, Unix and Mac OS X. O'Reilly Media, Incorporated, 2007.
Find full text