Dissertations / Theses on the topic 'Radiofréquences – Mesures de sécurité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Radiofréquences – Mesures de sécurité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Etrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Full textThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
Soos, Mate. "Protocoles de protection de la vie privée et de sécurité pour les RFIDs." Grenoble INPG, 2009. http://www.theses.fr/2009INPG0068.
Full textRFID tags are small electronic devices that will be put on almost every item sold. Since RFIDs are so small, they can only use extremely lightweight security protocols, offering a unique challenge to researchers. Security protocols for RFIDs have been in the forefront of academic research in the past years. This thesis outlines what RFIDs are, and describes and analyses multiple RFID security solutions. We present the state of the art in the field of RFIDs, next, we iIIustrate and analyse the Di Pietro-Molva private RFID authentication protocol, detailing its shortcomings and insecurities. Then, we describe the privacy-preserving RFID identification protocol ProblP and analyse its security. An improved version of ProblP. EProbIP, is also presented, which counters the insecurities found in original protocol. Finally, we describe how low hardware-complexity stream ciphers could be used in RFIDs and analyse such ciphers using a SAT sol ver which we improved for this purpose
Elkhiyaoui, Kaoutar. "Sécurité et protection de la vie privée dans les systèmes RFID." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0040.
Full textWhile RFID systems are one of the key enablers helping the prototype of pervasive computer applications, the deployment of RFID technologies also comes with new privacy and security concerns ranging from people tracking and industrial espionage to produ ct cloning and denial of service. Cryptographic solutions to tackle these issues were in general challenged by the limited resources of RFID tags, and by the formalizations of RFID privacy that are believed to be too strong for such constrained devices. It follows that most of the existing RFID-based cryptographic schemes failed at ensuring tag privacy without sacrificing RFID scalability or RFID cost effectiveness. In this thesis, we therefore relax the existing definitions of tag privacy to bridge the gap between RFID privacy in theory and RFID privacy in practice, by assuming that an adversary cannot continuously monitor tags. Under this assumption, we are able to design sec ure and privacy preserving multi-party protocols for RFID-enabled supply chains. Namely, we propose a protocol for tag ownership transfer that features constant-time authentication while tags are only required to compute hash functions. Then, we tackle the problem of product genuineness verification by introducing two protocols for product tracking in the supply chain that rely on storage only tags. Finally, we present a solution for item matching that uses storage only tags and aims at the automation of safety inspections in the supply chain.The protocols presented in this manuscript rely on operations performed in subgroups of elliptic curves that allow for the construction of short encryptions and signatures, resulting in minimal storage requirements for RFID tags. Moreover, the privacy and the security of these protocols are proven under well defined formal models that take into account the computational limitations of RFID technology and the stringent privacy and security requirements of each targeted supply chain application
Cherif, Amina. "Sécurité des RFIDs actifs et applications." Thesis, Limoges, 2021. http://www.theses.fr/2021LIMO0015.
Full textOver the 30 last years, active RFID devices have evolved from nodes dedicated to identification to autonomous nodes that, in addition, sense (from environment or other sources) and exchange data. Consequently, the range of their applications has rapidly grown from identification only to monitoring and real time localisation. In recent years, thanks to their advantages, the use of active RFID nodes for mobile data collection has attracted significant attention. However, in most scenarios, these nodes are unattended in an adverse environments, so data must be securely stored and transmitted to prevent attack by active adversaries: even if the nodes are captured, data confidentiality must be ensured. Furthermore, due to the scarce resources available to nodes in terms of energy, storage and/or computation, the used security solution has to be lightweight. This thesis is divided in two parts. In the first, we will study in details the evolution of active RFID nodes and their security. We will then, present, in the second part, a new serverless protocol to enable MDCs (Mobile Data Collectors), such as drones, to collect data from mobile and static Active RFID nodes and then deliver them later to an authorized third party. The whole solution ensures data confidentiality at each step (from the sensing phase, before data collection by the MDC, once data have been collected by MDC, and during final delivery) while fulfilling the lightweight requirements for the resource-limited entities involved. To assess the suitability of the protocol against the performance requirements, we will implement it on the most resource-constrained secure devices to prove its efficiency even in the worst conditions. In addition, to prove the protocol fulfills the security requirements, we will analyze it using security games and we will also formally verify it using the AVISPA and ProVerif tools
Mulugeta, Biruk Ashenafi. "RF Indoor mapping using measurements, sensors network, simulations and artificial intelligence." Electronic Thesis or Diss., Institut polytechnique de Paris, 2025. http://www.theses.fr/2025IPPAT005.
Full textThe rapid advancements in wireless technologies to meet the escalating demand for wireless data traffic, have also raised the public's risk perception due to the increased emission of electromagnetic fields (EMFs). In response to these concerns, international guidelines have been established to avoid overexposure that can potentially induce adverse health effects.Given that people spend more than 70% of their daily time in indoor environments, efforts to assess indoor RF-EMF exposure have intensified. However, assessment of indoor exposure to RF-EMF using a deterministic approach is a challenging and time consuming task as it is affected by uncertainties due to the complex interaction of EMFs with different obstructions whose geometry and dielectric properties are unknown in a dynamic indoor environment. In addition, the available base station information is limited.In this study, we characterize the spatial and temporal indoor RF-EMF exposure in three-level buildings by developing statistical and AI-based models. The buildings are located in more than 200 meters vicinity of outdoor cellular antennas supporting several cellular technologies (2G, 3G, 4G, and 5G). Different measurement campaigns have been conducted to develop the statistical and AI-based models. In addition, RF sensors, that monitors the temporal variation of the total indoor RF-EMF exposure, has been installed in the rear offices on each floor of the buildings to provide a representative measurement.We identify the key parameters that characterize the indoor RF-EMF exposure by performing a one-sample Kolmogorov-Smirnov (K-S) test on exposure measurement data. The result of this statistical test indicates that the indoor RF-EMF exposure on each floor, along the length of a wing, can be modeled using a Gaussian (normal) distribution. The result implies that the exposure levels can be fully characterized by the mean and standard deviation parameters.The evaluation of autocorrelation of long-term sensor measurement data indicates that the time series data exhibit a clear daily periodicity, which is consistent over various weeks, months, seasons, and years. We develop robust polynomial regression and AI-based models using long-term time series sensor measurement data to capture the 24-hour time variability of total indoor RF-EMF exposure. The models provide a good high-level representation of hourly fluctuations in the mean exposure levels of the 24-hour temporal variation.We develop novel multivariate polynomial and linear regression models to predict the mean and standard deviation of the total RF-EMF exposure level, respectively. To more effectively capture the impact of antenna beam gain, we present an innovative approach that segments the main antenna beam into smaller subbeams. This innovative technique allows the models to capture more accurately the differences in beam gain experienced by each wing of the building. The beam factor has been specifically designed to summarize the key information about the base station antennas. This parameter enables the models to adapt whenever there are changes in the infrastructure of the cellular base stations. The measurements of the reference sensors provide real-time input to the models. The statistical models serve as a powerful RF mapping tool by estimating both the mean and standard deviation of the total RF-EMF exposure levels on all floors of the buildings
Elkhiyaoui, Kaoutar. "Sécurité et protection de la vie privée dans les systèmes RFID." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00990228.
Full textSaniour, Isabelle. "Exploitation des effets électro-optiques pour la sécurité en IRM : applications des liaisons optiques pour des capteurs RF endoluminaux et des sondes de mesure du TAS." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE1330/document.
Full textThe recent advancement in MRI systems and the increase of the static magnetic field strength were accompanied by a strong concern about the effect of RF electromagnetic fields on patients. The effect can be increased by the use of conductive elements inside the volume coil as in the case of endoluminal coils used to analyze digestive walls. These coils lead to an increase of the local SAR which is induced by RF electric field in the presence of the coaxial cable connecting the coil to the MR system, resulting in strong local heating. Giving that these coils have the potential to present a real benefit to the patient, it worth to overcome these limitations. Accordingly, the first objective of the thesis is the development of a fully optical endoluminal receiver coil. An optical active detuning system has been developed and characterized. The NMR images show a signal-to-noise ratio distribution similar to that obtained with conventional detuning techniques, thus validating the efficiency of the optical detuning. Concerning the electro-optical conversion and the optical transmission of the NMR signal, experiments were performed to overcome constraints related to the use of waveguide for electro-optical conversion by Pockels effect. Moreover, the importance of monitoring global and local SAR during MRI exams remains a need which is not limited only to the endoluminal coils. The second objective of the thesis is then the experimental validation of an electro-optical probe for real-time measurements of RF electric field. This probe can measure the RF electric field in air and in biological media at 3 T and 4.7 T MRI systems and allows the estimation of the local SAR
El, Rafei Abdelkader. "Analyse des effets dispersifs dans les transistors radiofréquences par mesures électriques." Limoges, 2011. https://aurore.unilim.fr/theses/nxfile/default/381740cc-fba9-4386-9b9d-0e0dd1113527/blobholder:0/2011LIMO4037.pdf.
Full textPower amplifiers (PAs) are key elements of telecommunications and radar front ends at radio frequencies. The potential of the PA is limited by the phenomena of dispersion. In this context, we are interested in the characterization of thermal phenomena in the HBT transistors of different technology (GaAs, InP and SiGe) and characterization of thermal and traps effects in HEMT transistors based on GaN (AlGaN and AlInN) at low frequencies. A bench for low frequency S-parameters measurement [10 Hz, 40 GHz] is set up to enable us to study the behavior of the new components in the frequency range seat of nonlinear parasitic phenomena. A simple, yet accurate, method to experimentally characterize the thermal impedance of Hetero junction Bipolar Transistors (HBT) with different technologies proposed. This method relies on low frequency S-parameters measurements. A detailed study has been initiated to characterize the phenomena of low frequency dispersion in the HEMT transistors based on GaN. The thermal and traps effects are studied for both technologies (AlGaN/GaN and AlInN/GaN) with the method of admittance spectroscopy to quantify the levels of deep traps
Hadhiri, Amine. "Sécurité des applications androïde : menaces et contre-mesures." Mémoire, École de technologie supérieure, 2012. http://espace.etsmtl.ca/1008/1/HADHIRI_Amine.pdf.
Full textZargouni, Yadh. "Évaluation de l'efficacité des mesures de sécurité routière." Paris 6, 1986. http://www.theses.fr/1986PA066194.
Full textBiziere, Nicolas. "Détection de radiofréquences par des composants magnéto-résistifs." Paris 11, 2007. https://tel.archives-ouvertes.fr/tel-00135915.
Full textThis thesis is centered on the behaviour of the giant magnetoresistance effect (gmr) in a micrometric spin valve sensor fed with a hyper frequency magnetic field and a hyper frequency voltage. We have developped an original technique based on the use of the magnetoresistive sensor as an in situ demodulator. The study of the magnetization dynamics of the spin valve with micro antennas allowed us determining the rules for the ferromagnetic resonance of the free layer of the sensor and emphasizing the role of dipolar coupling and the electron scattering on the relaxation processes. We have been able to model the gmr effect when a hyper frequency magnetic field is applied showing the very good sensitivity of the sensor to this kind of excitation. Moreover the magnetization dynamics of the hard layer has been detected from the profile in frequency of the gmr effect. At last we obtained preliminary results showing the decrease of the gmr effect when the frequency of the applied voltage is higher than the ferromagnetic resonance of the free layer
Nascimento, Adelaïde. "Produire la santé, produire la sécurité : développer une culture collective de sécurité en radiothérapie." Paris, CNAM, 2009. http://www.theses.fr/2009CNAM0669.
Full textCette thèse porte sur la sécurité des patients, plus particulièrement dans le domaine de la radiothérapie, spécialité médicale qui utilise des rayonnements ionisants pour le traitement des cancers. L’objectif de cette thèse est d’apporter des éléments de compréhension sur la gestion de la sécurité en radiothérapie et de fournir des pistes d’amélioration de la sécurité des patients, au travers du développement de la culture collective de sécurité. Pour ce faire, trois études empiriques ont été conduites : dans un premier temps, 14 sujets (médecins, physiciens médicaux, dosimétristes et manipulatrices) ont analysé des situations d’écart à la norme ; dans un second temps, l’activité des manipulatrices a été analysée au moyen d'observations in situ ; dans un dernier temps, 14 physiciens médicaux ont pu, via des allo-confrontations individuelles, commenter des dosimétries réalisées par leurs confrères. Cette thèse débouche sur une vision de la sécurité totale qui articule qualité et sécurité – réglées ou gérées – où la qualité est tributaire de la sécurité. Les résultats ont montré le manque de procédures formelles relatives à la sécurité des patients et l’existence de sous-cultures de sécurité propres aux professions et aux établissements ; En plus, les données indiquent que la sécurité totale repose en partie sur la connaissance du travail des collègues. De manière générale et de façon à pouvoir assurer la sécurité totale, c’est-à-dire la production de la qualité (santé) en sécurité, il faut accorder aux organisations des ressources matérielles et humaines ainsi qu’une place au développement du collectif et de l’organisation prescrite
Lanneau-Sebert, Mathilde. "La mise en oeuvre du droit de la sécurité maritime." Nantes, 2006. http://www.theses.fr/2006NANT4029.
Full textFor a long time, safety has always been taking into account only by sailors or people which have interest in maritime trade. The enacted rules regarding in this domain have been designed from this simplistic scheme. They resolved the consequences of the events between all the interested parties involved in the expedition, they proposed solutions which weighed up the interest of each of them, as well as the risks taken. The sea traffic has become more intense and more dangerous as a result of the technologic progress, the rise of the maritime transport and the development of those carrying dangerous goods. Sea events involving ships carrying dangerous and polluting goods have forced terrestrial and maritime societies to think about insafety reasons, to find better solutions and to treat those consequences. The result was to show that maritime safety laws are rich and full, but their efficiency are compromised because of deficient implementation. Some flag States, whereas they are the main skilled entities, adopted latitudinarianism behaviour, obliging coastal States to extend their competences in order to supply themselves for their own territory. The study concentrates on the evolution of the balance between prerogatives hold by flag States and coastal States, in order to assess the improvement of maritime safety
Wioland, Liên. "Etudes sur la protection et détection des erreurs, contribution au modèle écologique de sécurité." Paris 5, 1997. http://www.theses.fr/1997PA05H092.
Full textIt contains 4 parts, - the first one is a theorical chapter (from human error to the model of ecological safety), - the second one concerns an experiment in a micro-world (situation of air trafic control) to study the mechanisms underlying this model (the main mechanismes are detection, recovery and protection) - the third one is related to the study of 2 ways to improve the effenciency of this ecological safety - a human assistance (by an outside observer, this is not a cooperation or a collective situation) - to improve these mechanisms by a human factors education training (a group of pilots trainees have been educated and we have compared their performance with those of a group control) - the last one is a discussion about this model and this work
Signorello, Patrick. "Sécurité et société : conceptions et pratiques de la sécurité dans les Instructions officielles de l'E.P.S." Paris 5, 2007. http://www.theses.fr/2007PA05H083.
Full textThe subject of this study deals with the evolution of the concept of safety through the prism of the official directives concerning physical and sports education. It rests on the assumption that this semantic evolution has an impact on physical practices as well as on teaching attitudes. The study centered around three poles of research. The first pole, based on the history of physical education raises the question of the relationship of this discipline with the institutions which govern it in order to determine the sociopolitical influences. The second pole deals with the study of the pertinent legislation to determine the various meanings of the word safety often revealed by the related official directives which are binding on the sports educators. Finally, the third pole is articulated with the preceding two by an analysis of the civil and/or criminal liability related to accidents and to the people involved. A cross analysis of these three poles makes it possible to understand the political and institutional bases which are driving the transformations and evolutions of the concept of safety. The study results show the changes of the meaning of the word safety are revealed at the same time by a synchronic dimension related to the institution governing physical education but also by a diachronic dimension resulting from the political context of the time. Thus the word safety could mean the defense of the Nation or the protection of health but more recently the absence of the risk of accidents. The development of technologies, the refusal of risk and the increase in litigation are factors of progress which place individual and collective liability at the cornerstone of a risk free corporation whose two pillars consist of prevention and indemnification. Physical education, as a social but also educational practice is placed at the heart of these influences. As a result, it must modify its teaching methods and adapt its practices with two objectives in mind: 1. To progress with societal changes 2. To respond to the educational goals set by the Ministry of Education. (Education Nationale). Consequently the integration of the concept of risk, resulting from the professional practices of the industrial world, with teaching methods seems to be the answer to a modern world influenced by the principle of precaution
Vache, Géraldine. "Evaluation quantitative de la sécurité informatique : approche par les vulnérabilités." Toulouse, INSA, 2009. http://eprint.insa-toulouse.fr/archive/00000356/.
Full textThis thesis presents a new approach for quantitative security evaluation for computer systems. The main objective of this work is to define and evaluate several quantitative measures. These measures are probabilistic and aim at quantifying the environment influence on the computer system security considering vulnerabilities. Initially, we identified the three factors that have a high influence on system state: 1) the vulnerability life cycle, 2) the attacker behaviour and 3) the administrator behaviour. We studied these three factors and their interdependencies and distinguished two main scenarios based on nature of vulnerability discovery, i. E. Malicious or non malicious. This step allowed us to identify the different states of the system considering the vulnerability exploitation process and to define four measures relating to the states of the system: vulnerable, exposed, compromised, patched and secure. To evaluate these measures, we modelled the process of system compromising by vulnerability exploitation. Afterwards, we characterized the vulnerability life cycle events quantitatively, using real data from a vulnerability database, in order to assign realistic values to the parameters of the models. The simulation of these models enabled to obtain the values of the four measures we had defined. Finally, we studied how to extend the modelling to consider several vulnerabilities. So, this approach allows the evaluation of measures quantifying the influences of several factors on the system security
Diaz, Frédéric. "Coproduction de la sécurité : un nouveau mode de contrôle et de régulation sociale : la gestion des risques dans les espaces privés lors de manifestations sportives et culturelles." Versailles-St Quentin en Yvelines, 2003. http://www.theses.fr/2003VERS018S.
Full textMendy, Norbert Lucien. "Les attaques et la sécurité des systèmes informatiques." Paris 8, 2006. http://www.theses.fr/2006PA082735.
Full textHacking activities appeared around 1980 with first personal computers and since did not stop developing. At the beginning, this practice was primarily individual and playful. Now it is mainly made up by the activities of groups, with very various motivations. Today, due to the development of electronic means of communication, data security concerns a wider public. This thesis examines initially, from a technical and sociological point of view, attacks and defense mechanisms, and proposes a new concept of the security which is not only any centered on technical solutions but also takes in consideration the social dimension of the problem
Disson, Eric. "Sécurité des accès dans les systèmes d'information coopératifs." Lyon 3, 2001. http://www.theses.fr/2001LYO33032.
Full textBotrel, Jean-Louis. "Transistors en couches minces (TFT) pour les radiofréquences." Grenoble INPG, 2006. http://www.theses.fr/2006INPG0169.
Full textThis PhD dissertation presents a work on Thin Film Transistors for Radiofrequency applications. Ln a first chapter the various applications of Thin Film Transistors: from displays to RFlD systems are presented. Ln the second chapter, some theoretical considerations about the working of Thin Film Transistors are formulated. This general frameworks is useful in order to present tools su ch as two dimensional simulations, SPlCE modeling, density of states extraction techniques; which were used for the study of our devices. Ln a third chapter, the results about polysilicon thin film transistors are exposed. The fourth is dedicated to organic thin film transistors and in particular poly3-(hexylthiophene) devices. Finally, some comparisons between the two kinds of devices are made and the conclusions are drawn
Shikfa, Abdullatif. "Sécurité des communications opportunistes." Paris, Télécom ParisTech, 2010. http://www.theses.fr/2010ENST0045.
Full textIn this thesis, we investigate security in opportunistic communications. This new communication paradigm involves storing and carrying messages in addition to forwarding and impacts all security aspects of communication. Indeed, nodes’ high mobility implies that security solutions should be dynamic and local. Furthermore, delay tolerance, which is one of the main characteristics of opportunistic networks, has a strong impact from a security perspective as it amounts to the infeasibility of interactive protocols. Moreover, radically new forwarding strategies have been proposed to enable communication in opportunistic networks: parting from traditional network addresses, these enriched forwarding strategies use information such as context of a node or content of a message to take forwarding decisions. Context or content are sensitive information that users might not want to reveal to others in order to preserve their privacy, hence these information should be carefully handled to ensure their secrecy. The conflicting requirements between security and forwarding motivate the need for new security mechanisms that enable computation on encrypted data. After analyzing the security challenges in opportunistic communications, we propose a complete security framework for context-based communication. This framework features not only data confidentiality and user privacy, but also computation assurance, which provides resilience against malicious entities aiming at disrupting or subverting the communication. We also propose a privacy-preserving content-based protocol which relies on multiple encryption layers, and an associated local and topology-dependent key management solution
Luo, Zhengqin. "Sémantique et sécurité des applications Web." Nice, 2011. http://www.theses.fr/2011NICE4058.
Full textIn this work we study the formal semantics and security problems of Web applications. The thesis is divided into three parts. The first part proposes a small-step operational semantics for a multitier programing language HOP, which can be used to globally reasoning about Web applications. The semantics covers a core of the HOP language, including dynamic generations of client code, and interactions between servers and clients. The second part studies a new technique to automatically prevent code injection attacks, based on multitier compilation. We add a new phase in the compiler to compare the intended and the actual syntax structure of the output. The validity of our technique is proved correct in the operational semantics of HOP. The last part of the thesis studies Mashic, a source-to-source compiler of JavaScript to isolate untrusted script by ifram sandbox and postmessage in HTML5. The compiler is proved correct in a formal semantics of JavaScript
El, Mariky Mohammed Rida. "Les incidences juridiques du traitement de la sécurité maritime par le code ISM." Aix-Marseille 3, 2009. http://www.theses.fr/2009AIX32013.
Full textUntil recently, the international maritime community has approached maritime safety from a predominantly engineering and technological solutions to promote safety, chiefly trough prescriptive regulations. However, this approach failed to reach the aimed goal. Following analysis of marine disasters such as the Herald of Free Enterprise, Braer, Estonia and Joola, the international marine community concluded that vessel safety could be enhanced by establishing improved ship operation practices and procedures. The effective use of a safety management system specifically enhances the ability of a company’s shore-based personnel to respond to vessel operational needs and emergencies. Safe operating practices, implemented through documented ISM Code procedures and company policies, are expected to provide improved ship safety. These are the goal and the philosophy of ISM Code. All persons involved, directly or indirectly, by the implementation of the ISM Code must understand that this latter is not a lighthouse leading to increase litigation or prosecution but rather than reducing accidents from which litigation results. Nevertheless, any ISM non-conformity may lead to many legal implications in many areas such as withdrawal of certificates, refusal to entry port, ship detention, evidence of breach of contractual obligations, loss of insurance cover, denial of P & I Clubs membership and facilitating criminal prosecution. Even though the entry into force of the ISM Code elevates the requirements of seaworthiness, widens the category of persons who may be held liable for deficiency in safe operations of ships and increase prosecutions, the ISM Code should be seen from its bright side. As for its legal implications, they seem fair and reasonably proportionate in achieving shipping safety management goals
Gharout, Saïd. "Sécurité des communications dans les groupes dynamiques." Compiègne, 2009. http://www.theses.fr/2009COMP1841.
Full textGroup-oriented services are among the emerging technologies of the last few years. The advantages of using IP multicast in group communications, such as saving bandwidth, simplicity and efficiency are typically interesting for new services combining voice, video and text over Internet. Group key management, which is an important building block in securing group communications, has received a particular attention in both academic and industry research communities. This is due to the economical relevance of group-based applications, such as video on demand, videoconferencing, collaborative work. The key management concerns the distribution and updates of the key material each time a member joins or leaves the group. The dynamic aspect of group applications due to free membership joins and leaves in addition to members' mobility makes difficult the design of efficient and scalable key management protocols. In this thesis we deal with the security issue of communication in dynamic groups. We present a detailed analysis of the problem while highlighting special features and issues inherent to the group communication nature. Then, we review existing solutions in the literature and analyze their advantages and shortcomings. Finally, we provide our own original proposals, depicting their advantages over the existing solutions
Cormier, Alexandre. "Modélisaton et sécurité des réseaux." Thesis, Université Laval, 2007. http://www.theses.ulaval.ca/2007/25012/25012.pdf.
Full textMohamed, El-Marouf Ahmed. "Mesure de distance entre politiques de sécurité dans un service Web." Master's thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/25929.
Full textThe main contribution of this paper is to suggest a new method to measure the similarity between security policies written in XACML. This is done in two steps: first the safety policy is formalized in SPL, secondly the results will be used to measure the distance between policies. The choice of the distance to use depends on the types of predicates (categorical or numeric). Thus, a synthetic table is provided to link the different metrics that are calculated in accordance with their predicate. A prototype has been coded in PHP and implemented to validate our contribution. Recommendations were issued in conclusion to enrich the proposed approach.
Bahouche, Mebrouk. "Etude et traçabilité du calibrage "Line-Attenuator Reflect" pour des mesures sous pointes à l'aide de l'analyseur de réseau vectoriel." Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00567066.
Full textThe LAR (Line-Attenuator-Reflect) calibration procedure is particularly attractive because it is already integrated into modern VNAs and it enables broadband measurements with a limited number of standards. On the other hand, only a few studies concern the traceability assessment of this method. That is the reason why the LNE (Laboratoire National de Métrologie) decided to estimate the traceability and accuracy of S parameters measurement when the LAR calibration method is used. In this context, the thesis can be summarized as follows: 1) Realization of a on wafer calibration kit allowing to execute both the LAR calibration and the Multiline TRL calibration which is considered as the reference calibration for on wafer measurements. 2) Development of a new method in order to estimate the errors due to the fact that the input and output impedances of the standard attenuator is different from 50 Ω. This solution is very efficient and it does not require an accurate determination of the reference impedance of the LAR calibration technique. 3) Development of an original method for determining the input and output impedances of the LAR calibration procedure leading to a precise measurement of the reference impedance. 4) Realization of a calibration kit for users, with three different methods to determine the reference impedance. ● Electrical model of the standard attenuator. ● Polynomial interpolation of the reference impedance measurement. ● Development of a new simplified and low cost technique named the LAR-L procedure. 5) Analysis of errors when the substrate of the calibration kit is different from the substrate of the device under test
Saleh, Hayder. "Une architecture novatrice de sécurité à base de carte à puce Internet." Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERSA009.
Full textAntakly, Dimitri. "Apprentissage et vérification statistique pour la sécurité." Thesis, Nantes, 2020. http://www.theses.fr/2020NANT4015.
Full textThe main objective of this thesis is to combine the advantages of probabilistic graphical model learning and formal verification in order to build a novel strategy for security assessments. The second objective is to assess the security of a given system by verifying whether it satisfies given properties and, if not, how far is it from satisfying them. We are interested in performing formal verification of this system based on event sequences collected from its execution. Consequently, we propose a model-based approach where a Recursive Timescale Graphical Event Model (RTGEM), learned from the event streams, is considered to be representative of the underlying system. This model is then used to check a security property. If the property is not verified, we propose a search methodology to find another close model that satisfies it. We discuss and justify the different techniques we use in our approach and we adapt a distance measure between Graphical Event Models. The distance measure between the learned "fittest" model and the found proximal secure model gives an insight on how far our real system is from verifying the given property. For the sake of completeness, we propose series of experiments on synthetic data allowing to provide experimental evidence that we can attain the desired goals
Benali, Fatiha. "Modélisation et classification automatique des informations de sécurité." Lyon, INSA, 2009. http://theses.insa-lyon.fr/publication/2009ISAL0007/these.pdf.
Full textThe security of the Information System(IS) has become an important strategic issue. Currently, organizations or companies are evolving and have multiple nodes running multiple systems. These organizations are deploying multiple security devices and offer different services to their users. Services, resources and equipment deployed may be the targets for intruders. Interoperability between products to monitoring the IS is absolutely necessary. We present in our work an architecture for intrusion detection system based on interoperability between different products (security and management) and services deployed in an organization. This architecture will provide a comprehensive and meets the current needs of the security administrator. Intrusion detection in this context is to analyze the information (alerts and events) generated from all these devices to prevent any action not legally permitted. The process of analyzing information security faced serious problems because of the heterogeneity of the mechanisms involved in the monitoring of the IS and because of the lack of standard to presents of such information. The thesis is part of the modeling of security information to address the problem of the heterogeneity of the products, allowing the management process of information security (such as intrusion detection or the search for causes of a security incident) to be operational and efficient. The first part of the thesis proposes a solution for modeling the semantics of information security through an ontology. The purpose of the ontology is to describe in a uniform manner the semantics for all activities that may be made by users of IS, regardless of the products involved in the supervision of an IS, and focusing on the concepts of knowledge for mechanisms for processing such information. The implementation of the ontology is to make a classification of events and alerts generated by the monitoring products, in categories that were described by the ontology. The second part of the thesis focuses on automating the classification of security messages. As we have a corpus of previously classified messages, therefore we are interested in the techniques for automatic categorization of text (CT). These techniques are based on machine learning methods. The proposed classification process consists of two stages. The first step allows the data preparation and representation in a format usable by the classification algorithms. The second step aims to implement the algorithms machine learning on information security preprocessed. The application of the solutions proposed in the thesis is on a basis of alerts and events provided by the company Exaprotect (a publisher of software security)
Kreipe, Nils. "Les "autorisations" données par le Conseil de sécurité à des mesures militaires." Paris 10, 2004. http://www.theses.fr/2004PA100183.
Full textIt is generally acknowledged that the Security Council can "authorize" the recourse to armed force, and that such "authorization" provides sufficient legal basis for military measures. However, no satisfactory explanation of the "authorization" has yet been developed. Actually, the "authorization" is not to be regarded as a "permission" of recourse to armed force, exempting the States of the respect of the prohibition of the military coercion (article 2 (4) of the Charter). Rather, it reminds the concept of agency, the "authorization" providing a mandate that enables States to undertake military enforcement measures on behalf of the Council. "Authorized" States thus exercise the Security Council's powers of military coercion. The cases of Kosovo and Iraq show that it is conceivable that the Security Council can grant such a mandate implicitly, and that he can also "ratify" military measures ex post
Fontaine, Jonathan. "Optimisation de l’insertion de contre-mesures pour la sécurité des circuits intégrés." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS058.
Full textOver the last 75 years, the electronics industry has experienced a spectacular evolution, moving from manual design to an automated industry. This industrialization has led to increased complexity in circuits, requiring specialization in tasks during the design of electronic circuits. Various companies around the world have emerged to perform these tasks, with varying levels of trust assigned. From a designer's perspective, these actors pose several threats, such as the insertion of malicious functionalities, intellectual property theft, or circuit counterfeiting. These threats impact the economy of the semiconductor industry, amounting to billions of dollars in losses annually.One way to combat these threats is to lock the circuit with a key, preventing it from functioning correctly if the right key is not present. Logic locking is a method that involves logically locking a circuit using key gates and the corresponding digital key. Several implementations of logic locking have been developed. In these works, we focus on Strong Logic Locking. It locks the circuit by connecting XOR/XNOR gates to the digital key, inserted in circuit signals. Each insertion position has a different impact on security, which is the possibility of recovering the digital key. However, adding logic gates in a circuit increases power consumption, the circuit's area, and decreases performance. Strong logic locking aims to maximize the security of the lock by identifying positions that enhance security, regardless of the resulting impact.In this thesis, we seek to optimize security while considering the impact on circuit performance. We propose a new approach to solving strong logic locking. We start by formulating our security problem based on mathematical models that include security for optimally inserting key gates in the circuit. This formulation calculates the cliques of a subgraph representing the insertion positions. We establish a branch and bound solving algorithm for our problem and evaluate it. We then present a second mathematical models representing the impact on the delay from inserting key gates in the circuit. Finaly, we propose strategies to optimize security while limiting the impact on circuit performance. Our tools are integrated into the design flow, allowing us to validate them with numerical results obtained on circuits used by the electronic community
Seurin, Yannick. "Primitives et protocoles cryptographiques à sécurité prouvée." Versailles-St Quentin en Yvelines, 2009. http://www.theses.fr/2009VERS0009.
Full textWe study the relation between the random oracle model and the ideal block cipher model. We prove that these two models are equivalent: the existence of a cryptosystem secure in one of the models implies the existence of a cryptosystem secure in the other model. We prove that if a cryptosystem using an ideal block cipher is secure, then this cryptosystem remains secure when the block cipher is replaced by the Luby-Rackoff construction with 6 rounds where the inner functions are publicly accessible. Then, we study cryptographic protocols based on the LPN problem. The authentication protocol HB+ aroused much interest and several variants seeking to reinforce the security of this protocol were subsequently proposed. We present a cryptanalysis of three of these variants, and then we propose the protocol HB#. We also propose a probabilistic symmetric encryption scheme whose security against chosen plaintext attacks can be reduced to the difficulty of the LPN problem
Seigneur, Viviane. "La sécurité en haute montagne : penser la sécurité, jugement de fait, jugement de valeur...et autres jugements : approche anthropologique et sociologique." Rouen, 2003. http://www.theses.fr/2003ROUEL448.
Full textThe subject of this thesis is security in high mountain. This work reveals how the security initiatives are built and what the regulation mechanics are. With this aim in view, the research focus on the knowledge which influences on this mechanisms. This knowledge is studied from three points of view. The first one is about the daily life, the second one is about the institutional world and the last one is about the general relationships with risk. Moreover, this research studies the weight of the "non rationals logics" as opposed to "interests logics" (more or less economics) which influence the collective organisation of security. The high mountain is a good illustration with its little economic stakes, a limited scientific knowledge and a very strong mythical potential. The socio-anthropological approach is particularly interesting to identify this different "non rational" dynamisms
Kyriakopoulos, Georges D. "La sécurité de l'aviation civile en droit international public." Paris 2, 1998. http://www.theses.fr/1998PA020020.
Full textBeside the aircraft aeronautical accidents, civil aviation is also threatened by acts of unlawful interference - aircraft hijacking, destruction of aircraft in flight, and unlawful acts of violence at airports. In order to suppress these offences, the tokyo, hague and montreal conventions have been adopted. Suppression in this field is fortified by the application of said conventions in national laws, by the adoption of additional measures - legal and technical ones, in order to also prevent acts of unlawful interference - , as also by the application of other international instruments related to international terrorism. Sometimes, states have intervened by force in order to free passengers kept as hostages ; the question of imposing collective sanctions against states found in default of their obligations was also posed. On the other hand, the security of civil aviation can be endangered by state activities : as far as interception of civil aircraft in national and international airspace is concerned, legal and technical detailed measures have been adopted, in conformity with the humanitarian limits imposed by international law. Regarding military activities presenting a danger for civil aviation, a civil/military coordination was necessary. In order to implement this coordination, icao adopted concrete measures, which are contained in annex 11 to chicago convention. Finally, even in case of armed conflict, civil aviation must be protected: the suspension of the chicago convention in case of war, in accordance with article 89 of this instrument, does not affect the international rules on aviation security ; nevertheless, even apart from the chicago convention, the obligation to protect civil aviation is always valid - not only on the basis of principles as the protection of human life, or the prohibition of the use of arms against civil aircraft, but also according to the principles of the traditional law of armed conflict and of those of the contemporary humanitarian law
Pascual, Nathalie. "Horloges de synchronisation pour systèmes haute sécurité." Montpellier 2, 1992. http://www.theses.fr/1992MON20145.
Full textZnaidi, Wassim. "Quelques propositions de solutions pour la sécurité des réseaux de capteurs sans fil." Lyon, INSA, 2010. http://theses.insa-lyon.fr/publication/2010ISAL0083/these.pdf.
Full textThe self-organized growth of three-dimensional (3D) quantum dots has attracted a lot of interest for their potential applications in ptoelectronic and in nanophotonic devices. In this work, we study by optical spectroscopy lnAs/lnP and lnAs/GaAs quantum dots grown by molecular beam epitaxy (MBE) using the Stanski-Krastanov (SK) growth mode. The quantum dots are then embedded in an electric-field tunable device called « nanopixel ». Ln the case of the lnAs/lnP quantum dots, we focused on the impact of growth conditions like the cap thickness of the double cap process on the emission energy, the influence of the first cap, temperature effect and the exciton-biexciton system. In the case of lnAs/GaAs system, we studied the impact of the capping layer, the excited level sates, the excitonbi-exciton system, and the impact of temperature. We successfully fabricated nanopixels including a quantum dots layer inside the intrinsic region of a Schottky diode. First results showing the effect of an electric field on a single quantum dot emission are finally described
Chevallier-Mames, Benoit. "Cryptographie à clé publique : constructions et preuves de sécurité." Paris 7, 2006. http://www.theses.fr/2006PA077008.
Full textThe public key cryptography concept, proposed by Whitfield Diffie et Martin Hellman, changed the cryptology world. After the description of first heuristically secure schemes, thé formalization of models and security notions has allowed the emergency of provable security. After some reminds about cryptography and security reduction, we propose new signature and encryption schemes, with some advantages over the existing Systems. Indeed, we propose two new signature schemes with a security proof in the random oracle model, and expose a new signature scheme which features a provable security in the standard model. All of these schemes feature both tight security and the possible use of coupons. Next, we describe a new encryption scheme, based on a new cryptographical problem. We also give another look to the universel paddings, and show how to obtain tight security for identity-based encryption schemes. In the last part of this thesis, we deal with the physical security of cryptographical software. We propose notably new efficient countermeasures against simple side-channel attacks (SPA) and differentiel side-channel attacks (DPA)
Bascou, Jean-Jacques. "Contribution à la sécurité des systèmes : une méthodologie d'authentification adaptative." Toulouse 3, 1996. http://www.theses.fr/1996TOU30253.
Full textGagnerot, Georges. "Etude des attaques et des contre-mesures associées sur composants embarqués." Limoges, 2013. http://aurore.unilim.fr/theses/nxfile/default/feffb1ab-ad89-4586-a86c-efb78fb12b3c/blobholder:0/2013LIMO4057.pdf.
Full textEmbedded cryptographic systems are more and more used nowadays, starting from our credit card, to our SIM that identifies us on the GSM networks, or to our smartphones for example that store personal or secret data. Those systems have to be resistant against different kind of attacks, physical and logical. Our work that we present thereafter first introduce cryptography with the different classic algorithms used. We proceed to present the state of the art on side channel attacks, those attacks are very dangerous since they do not always need the physical possession of the target device, and can be done remotely with the good material. They are based on the study of the emissions produced by a component while it is using the secret stored in its internal memory to retrieve the secret through statistic computations or simple observations like the time it takes to treat data. We then propose a survey on faults attacks that also threaten security product. The idea is to produce a non standard behavior by changing its environment, like sending photons or power discharge and then trying to recover the secrets. In a second part, we propose new attacks, associated counter-measures and new algorithm to secure computation while making them also quicker. We present after a simulator of side channel emissions and faults attacks that allows us to assess the security of embedded systems quicker and cheaper than standard methods
Contes, Arnaud. "Une architecture de sécurité hiérarchique, adaptable et dynamique pour la Grille." Nice, 2005. http://www.theses.fr/2005NICE4025.
Full textWhereas security is a key notion in the world of distributed applications, its numerous concepts are a difficult step to overcome when constructing such applications. Current middlewares provide all major security-related technologies. However developers still have to select the more accurate one and handle all its underlying processes which is particularly difficult with dynamic, grid-enabled applications. To facilitate the use of security concepts in such applications, tis thesis presents a decentralised security model which takes care of security requirements expressed by all actors (resource provides, administrators, users) involved in a computation. The model is implemented outside the application source code. Its configuration is read from external policy files allowing the adaptation of the application’s security according to its deployments. It has been conceived to handle specific behaviors which could happen during a distributed application life-cycle (use of newly discovered resources, remote object creation)
Hourdin, Vincent. "Contexte et sécurité dans les intergiciels d'informatique ambiante." Nice, 2010. http://www.theses.fr/2010NICE4076.
Full textIn ubiquitous computing, context is key. Computer applications are extending their interactions with the environment: new inputs and outputs are used, such as sensors and other mobile devices interacting with the physical environment. Middlewares, created in distributed computing to hide the complexity of lower layers, are then loaded with new concerns, such as taking into account the context, adaptation of applications or security. A middleware layer representation of these concerns cannot express all heir interdependencies. In pervasive computing, distribution is required to obtain contextual information, but it is also necessary to take into account the context in distribution, for example to restrict interactions between entities in a defined context. In addition,asynchronous interactions used in those new environments require special attention when taking into account the context. Similarly, security is involved both in the middleware layers of distribution and context-sensitivity. In this thesis we present a model taking into account the context both in security and distribution. Access control must evolve to incorporate a dynamic and reactive authorization, based on information related to environment or simply on the authentication information of entities. Contextual information evolve with their own dynamic, independent of applications. It is also necessary to detect context changes to reenforce the authorization. We are experimenting this context-awareness targetting interaction control with the experimental framework WComp, derived from the SLCA/AA (Service Lightweight Component Architecture / Aspects of Assembly) model. SLCA allows to create dynamic middlewares and applications for which functional cutting is not translated into layers but into an interleaving of functionalities. Aspects of assembly are a mechanism for compositional adaptation of assemblies of components. We use them to express our non-functional concerns and to compose them with existing applications in a deterministic and reactive manner. For this purpose, we introduce context-aware interaction control rules. The middleware thus allows to adapt, according to context, our non-functional concerns and the behavior of the application
Mallouli, Wissam. "Une approche formelle pour le test des politiques de sécurité." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0021.
Full textSecurity is a critical issue especially in dynamic and open distributed environments such as World Wide Web or wireless networks. To ensure that a certain level of security is always maintained, the system behavior must be restrained by a security policy. In this thesis, we propose a framework to specify security policies and test their implementation on networking and information systems. Security policies, nowadays, are a key point for the success of every modern infrastructure. The specification and the testing of security policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. We rely on two different test approaches to build our framework: the active and the passive approaches. The active testing consists in generating a set of test cases that can be applied on a specific implementation to study its conformance according to its security requirements. Whereas, the passive testing consists in passively observing the traffic of the system under test, without interrupting its normal operations. In the active approach, we propose a framework to automatically generate test sequences to validate the conformance of a security policy. The functional behavior of the system is specified using a formal description technique based on Extended Finite State Machines (EFSM), while the security requirement is specified using two formals languages (Or-BAC and Nomad). We developed specific algorithms to integrate the security rules within the functional system specification. In this way, we obtain a complete specification of the secured system. Then, the automatic test generation is performed using dedicated tools to produce test suites in a standard language (TTCN or MSC) facilitating their portability. In the passive testing approach, we specify, using Nomad formal language, the security policy the system under test has to respect. We analyze then the collected traces of the system execution in order to deduce verdicts of their conformity with respect to the system security requirements. Several algorithms are developed to check whether the collected traces conform or not to the security policy. We applied our framework on diverse systems ranging from wireless networking (OLSR ad hoc routing protocol) to computer systems including audit systems (SAP R/3), web services (France Télécom Travel) and web applications (Weblog Application). This wide range of applications allows to demonstrate the efficiency and the reliability of the proposed approaches
Chevalier, Sébastien. "La sécurité de l'immeuble loué." Toulouse 1, 2005. http://www.theses.fr/2005TOU10015.
Full textThe late but increasing recognition of building security give to the parties involved in a lease a real safety oblogation at its agreement as well as during its execution. The public health and safety policy justifies government interference in building management and seems to be using the lease to ensure building compliance with norms
Humphries, Christopher. "User-centred security event visualisation." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S086/document.
Full textManaging the vast quantities of data generated in the context of information system security becomes more difficult every day. Visualisation tools are a solution to help face this challenge. They represent large quantities of data in a synthetic and often aesthetic way to help understand and manipulate them. In this document, we first present a classification of security visualisation tools according to each of their objectives. These can be one of three: monitoring (following events in real time to identify attacks as early as possible), analysis (the exploration and manipulation a posteriori of a an important quantity of data to discover important events) or reporting (representation a posteriori of known information in a clear and synthetic fashion to help communication and transmission). We then present ELVis, a tool capable of representing security events from various sources coherently. ELVis automatically proposes appropriate representations in function of the type of information (time, IP address, port, data volume, etc.). In addition, ELVis can be extended to accept new sources of data. Lastly, we present CORGI, an successor to ELVIS which allows the simultaneous manipulation of multiple sources of data to correlate them. With the help of CORGI, it is possible to filter security events from a datasource by multiple criteria, which facilitates following events on the currently analysed information systems
Habib, Lionel. "Formalisations et comparaisons de politiques et de systèmes de sécurité." Paris 6, 2011. http://www.theses.fr/2011PA066146.
Full textPuig, Jean-Jacques. "Une approche générique de la sécurité du routage." Evry, Institut national des télécommunications, 2004. http://www.theses.fr/2004TELE0006.
Full textIn datagrams networks, routing protocols provide for the data required for datagrams forwarding, from router to router, up to destination. Yet, routing protocols security is weak and often limited to securing neighbouring routers exchanges. This thesis studies main routing protocols in use in IPv4 networks (RIP, OSPF, IS-IS and BGP). It elaborates models for protocols operations and routing information representation. A risks analysis is then pursued and leads to the definition of security goals. This work is related to the ongoing effort of the author through its contributions in the [RPSec] working group of the IETF. Author investigated for solutions against threats through two directions : prevention and the reactive approach. Both are necessaries in order to provide for a sufficient security level in a routing system and to cover a significant part of security goals. Prevention protects routing information and it's infrastructure. As an instance, some solutions protect destinations description against forbidden alterations. The reactive approach checks and tests routing coherence, detects inconsistencies, finds out necessary actions so that security incidents consequences get limited or the system gets back working properly. As an instance, it is sometimes possible to detect that forwarding state denies routing data. The document follows a security process, from the analysis of the failing systems up to solutions design. A simplified version of this process was the topic of one of the author's articles
Sam-Lefebvre, Awa. "La sécurité du passager dans le transport maritime." Nantes, 2011. http://www.theses.fr/2011NANT4020.
Full textThe concept of risk governs maritime navigation. The maritime transport has significant risks that are both inherent in the environment, the used equipments and staff on board. The risks management is necessary to prevent maritime disasters as the shipwrecks of the Estonia, the Joola, the Al Salam Boccaccio and, recently, the MV Spice Lander Tanzania which they stemmed the security flaws governing the sector. We must protect passengers in ensuring the safety and the security of maritime navigation. The regulation, dispersed by the geographic application of conventions more or less extensive according to their ratification by states, makes the questions more difficult. In this context, revisit the whole issue of passenger safety is paramount importance. Then, It will necessary to review the risk management and the failures of maritime regulation by redefining the responsibilities, whether that of the carrier, first contact of the passenger, the ship builder, classification societies or the pavilion State
Petropoulou, Athanasia. "Liberté et sécurité : les mesures antiterroristes et la Convention Européenne des Droits de l'Homme." Thesis, Paris 1, 2013. http://www.theses.fr/2013PA010274.
Full textThe dialectic relation between liberty and security in the context of the fight against terrorism illustrates the ambivalence and the difficulties of the articulation of these concepts, underlying the classical dilemma in the democratic political regimes: how to defend democracy without destroying its essence. The renewed interest for the subject. finds its origin in the events of September II, sinister witnesses of the extent of the dissemination and privatization of violence, which radicalized the effects and characteristics of terrorist criminality. Confronted with the tremendous force of terrorism, whose definition in law remains imprecise, national governments responded by adopting legislative measures and practices. which defy openly human rights and the Rule of Law. As far as the question of the protection of human rights is concerned. it is the judge. who has the task to limit the arbitrary action of the executive and the "excesses" of the terrorized legislator. The approach of the European Convention of Human Rights and the case-law of the Court of Strasbourg have marked the debate relating to the protection of human rights in the fight against terrorism in Europe and word wide. and has become an essential reference in this field. The study of the case -law permits us to pose the question as to whether the case-law of the Court within the last decade has radically evolved and eventually whether the predominant preventive aspect of antiterrorist policies has had an impact on the control applied by the judges. who must struck a balance between the respect of human rights and security interests in a democratic society. In this regard. the analysis of the "terrorist case-law" is based. firstly. on the protection of rights and liberties closely connected to the Rule of Law and to democratic pluralism. and secondly. on the protection of human life and dignity. two values which are fundamental in democratic societies. In spite of the danger of an attenuated proportionality control and a systematic differentiation of the scope of the protection of the rights and liberties according to the gravity of the terrorist threat the response of the European Court of Human Rights consists in reaffirming the principles of the European Convention and the values inherent to human rights and democratic society
Qin, Hao. "Sécurité pratique de systèmes de cryptographie quantique : étude d'attaques et développement de contre-mesures." Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0040.
Full textIn this thesis, I study a cryptographic primitive called quantum key distribution which allows two remote parties to share a secret key, in the presence of an eavesdropper, whose power is only limited by the laws of quantum physics. I focus my study on the implementation and the practical security of continuousvariable protocols. For the first time, I have proposed and studied a detector-based side channel attack on a continuous-variable system : saturation attack. This attack opens a new security loophole that we have characterized experimentally in our laboratory, on a real continuous-variable system. Finally, we have demonstrated experimentally for the first time the feasibility of a continuous-variable system deployment in a Dense Wavelength Division Multiplexing network, where quantum signals coexist with intense classical signals in a same fiber