Academic literature on the topic 'Sécurité numérique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sécurité numérique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sécurité numérique"
Gusev, Alexander, Arnaud Leconte, and Simone Lucatello. "Green Digital Transition and Data Governance." L'Europe en Formation 396, no. 1 (November 13, 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Full textKessous, Emmanuel, and Serge Proulx. "La sécurité dans un monde numérique." Annales Des Télécommunications 62, no. 11-12 (November 2007): 1187–91. http://dx.doi.org/10.1007/bf03253312.
Full textAchilleas, Philippe. "La bataille de la 5G et le droit international." Annuaire français de droit international 66, no. 1 (2020): 709–31. http://dx.doi.org/10.3406/afdi.2020.5489.
Full textSylvestre, Guillaume. "Sécurité de l’information numérique : relever le défi." I2D - Information, données & documents 54, no. 3 (2017): 28. http://dx.doi.org/10.3917/i2d.173.0028.
Full textMarsico, G. "Numérique, virtuel, réseaux sociaux, objets connectés : leviers ou freins à la confiance dans la relation de soins ?" Psycho-Oncologie 14, no. 1-2 (March 2020): 53–56. http://dx.doi.org/10.3166/pson-2020-0123.
Full textMeiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management." Sécurité et stratégie 32, no. 4 (March 19, 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Full textLuzeaux, Dominique. "Le numérique au service du combat collaboratif." Revue Défense Nationale N° 865, no. 10 (December 11, 2023): 17–23. http://dx.doi.org/10.3917/rdna.865.0017.
Full textCoustillière, Arnaud. "Maîtriser le combat dans l’espace numérique et contribuer à la sécurité numérique nationale." Géoéconomie 75, no. 3 (2015): 25. http://dx.doi.org/10.3917/geoec.075.0025.
Full textFreyssinet, Éric. "Transformation numérique de la gendarmerie nationale." Sécurité et stratégie 31, no. 3 (March 19, 2024): 20–24. http://dx.doi.org/10.3917/sestr.031.0020.
Full textDumas, Mathilde, Anne-Florence Fay, Emmanuel Charpentier, and Julien Matricon. "Le jumeau numérique en santé." médecine/sciences 39, no. 12 (December 2023): 953–57. http://dx.doi.org/10.1051/medsci/2023178.
Full textDissertations / Theses on the topic "Sécurité numérique"
Hogue, Simon. "La résistance esthétique à l'assemblage de surveillance de sécurité : l'art numérique comme participation citoyenne." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38454.
Full textJbara, Abdelbasset. "Méthode d'obtention et d'optimisation des principaux paramètres garantissant la sécurité d'une transmission numérique en se fixant l'objectif de sécurité : application aux système de transports." Lille 1, 1993. http://www.theses.fr/1993LIL10060.
Full textCoulongeat, François. "Modélisation numérique de l'enfant : application en accidentologie routière." Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4000/document.
Full text130 children died in the French roads in 2010. A better knowledge of the mechanisms of injuries could lead to an improvement of their safety. Crash test dummies provide data on the local forces and on kinematics but finite element models can provide further data on the mechanical behaviour of internal organs. However, few numerical models of children currently exist. The purpose of this project is to develop and assess a finite element whole-body model of a 6 year old child (FEMOCS6). The geometry of this model was provided by medical imaging data of children for the trunk and the head and by a scaling down of an adult geometry for the limbs. Meshed geometry is made up of about 390 000 tria elements and 460 000 tetra elements. The study of the specificities of children led to the definition of modelling hypotheses and of the mechanical properties. Material properties were partly provided by characterizations of paediatric tissues from literature but a lack of data led to the use of adult data for the most of the tissues. The mechanical behaviour of the model was assessed by the numerical simulations of paediatric tests from the literature: impacts, dynamical compression and sled tests with a restraint system. The model could allow to study efficiency of existing child restraint system
Ould, Moustapha Ahmed Salem. "Etude numérique du développement de panaches thermiques en milieux confinés : application à la sécurité incendie." Paris 6, 2004. http://www.theses.fr/2004PA066255.
Full textDJILALI, BERKANE LAIEB ZOHRA. "Evaluation numérique d'un coefficient de sécurité cinématique pour les barrages et les ouvrages en terre." Université Joseph Fourier (Grenoble), 1997. http://www.theses.fr/1997GRE10193.
Full textPérès, Jérémie. "Modélisation numérique de la femme enceinte : Application en accidentologie routière." Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4117.
Full textRandimbiarison, Jérôme. "Signature numérique d'un document basée sur FIDO2." Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/66598.
Full textIn this digital era, the use of paper documents is impractical and inefficient, which motivates companies to move towards the use of electronic documents (or e-docs). This desire to innovate towards a paperless operation can improve the efficiency and quality of public or private administration services so as to speed up their activities and at the same time better meet customer needs. However, this practice has created new needs, such as the actual digital signature of documents. In this thesis, we have proposed a new digital signature scheme using FIDO2, which happens to be a new standard for secure online authentication based on digital signatures. The fact that FIDO2 is a free standard makes it easier for software and hardware developers to implement their own products. This inspired us to use it a digital signature purpose, the idea being, to replace the challenge sent by the server with the hash of e-docs and send it to the signer’s device so that the latter signs with his private key. As with public key infrastructure, each user had a key pair, that is, a private key and a public key. A signatory must confirm their biometric identification (fingerprint, facial recognition, voice, etc.) or PIN code to access the private key stored locally on their device and sign a document. During our research, we carried out several tests with different equipment (PC, USB FIDO, Smartphone) as well as different OS (Android, iOS, Windows). The results of our tests show us that we can use FIDO2 to sign an electronic document. This proposed new approach can be used for a face-to-face (local) or remote (online) signature. The prototype developed for the implementation of our approach has been validated with typical users (member-clients and advisers) in a company.
Richard, Paul-Henri. "Crise et ville intelligente au prisme de l'éthique appliquée à la sécurité civile." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0020/document.
Full textThe support of the social rhythms and the urban complexity are a priority for the decision-makers. However, the supplied answers are subjected to a permanent analysis of the adequacy between risk and anticipation. This thesis proposes a reflection on the consideration of the ethics in the practices of crisis management. In a first part, a state of the art of the concept shows us that the "smart city" seems to be an attractive answer for the decision-maker. She develops in a continuity assured by a resilience scheduled in the global nature. Yet, when this system based on the principle of continuity is suddenly questioned, the surprise subjects the decision-maker to a reaction of break. The disqualification of the technological services imposes then to react by referring to the fundamental concepts of the human socialization. Looked for in the depths of the consciousness of the individual in the collective, we show in a second part that the break materializes for the decision-makers under the form of ethical dilemmae. Our analysis leans on one put in perspective by the ethics of the extreme situations (conflicts, health), and on an investigation realized with decision-makers. We mobilize the concept of organizational culture, applied to the actors of the civil safety as well as to the organizations having implemented a collaborative governance of the risks. Finally, in the third part, we show that the ethical questioning realized during the phase of preparation is a way of anticipation of the uncertainties associated with the decision-making in context of crisis
Février, Rémy. "Management de la sécurité des systèmes d'information : les collectivités territoriales face aux risques numériques." Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020025.
Full textThis doctoral thesis aims at answering a key question: what is the level of consideration given to Information Systems Security (ISS) by the French local authorities (LAs)? The latter are now facing new challenges that require an ever-increasing use of new technologies (e-government, e-democracy, dematerialization of call for tenders...). The under-researched territorial IT risk becomes a major issue in the sphere of public services and the protection of personal data. Theoretically based and constructed through successive professional positions, our theoretical model helps measure the actual level of inclusion of digital risk taking into account the respective influence of a set of characteristics of local authorities. A field survey was conducted with the close collaboration of representatives of LAs.While numerical risk requires a high level awareness by LA decision makers, it appears that they have a very imperfect knowledge of IT security related risks as well as of direct or indirect threats that may jeopardize their management systems. A potential solution lies with the definition of a specific public policy and with the implementation of appropriate procedures at the level of each community
Moussa, Ali Abdellatif Karim. "Chiffrement authentifié sur FPGAs de la partie reconfigurable à la partie static." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066660/document.
Full textCommunication systems need to access, store, manipulate, or communicate sensitive information. Therefore, cryptographic primitives such as hash functions and block ciphers are deployed to provide encryption and authentication. Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces better performance compared to two separated algorithms since authentication and encryption can share a part of the computation. Because of combining the programmability with the performance ofcustom hardware, FPGAs become more common as an implementation target for such algorithms. The first part of this thesis is devoted to efficient and high-speed FPGA-based architectures of AE algorithms, AES-GCM and AEGIS-128, in order to be used in the reconfigurable part of FPGAs to support security services of communication systems. Our focus on the state of the art leads to the introduction of high-speed architectures for slow changing keys applications like Virtual Private Networks (VPNs). Furthermore, we present an efficient method for implementing the GF($2^{128}$) multiplier, which is responsible for the authentication task in AES-GCM, to support high-speed applications. Additionally, an efficient AEGIS-128is also implemented using only five AES rounds. Our hardware implementations were evaluated using Virtex-5 and Virtex-4 FPGAs. The performance of the presented architectures (Thr./Slices) outperforms the previously reported ones.The second part of the thesis presents techniques for low cost solutions in order to secure the reconfiguration of FPGAs. We present different ranges of low cost implementations of AES-GCM, AES-CCM, and AEGIS-128, which are used in the static part of the FPGA in order to decrypt and authenticate the FPGA bitstream. Presented ASIC architectures were evaluated using 90 and 65 nm technologies and they present better performance compared to the previous work
Books on the topic "Sécurité numérique"
Ton, Kalker, Cox I. J, and Ro Yong Man, eds. Digitial watermarking: Second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers. Berlin: Springer, 2004.
Find full textShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Find full textiPhone forensics. Sebastopol, CA: O'Reilly, 2008.
Find full textNussbaumer, Henri. Informatique industrielle, tome 4. Commande numérique, téléinformatique, sécurité, sûreté, fiabilité. Presses Polytechniques et, 1987.
Find full textLa gestion du risque de sécurité numérique pour la prospérité économique et sociale. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-fr.
Full text(Editor), Bart Preneel, Rene Govaerts (Editor), and Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Find full text(Editor), Alessandro Acquisti, Stefanos Gritzalis (Editor), Costos Lambrinoudakis (Editor), and Sabrina di Vimercati (Editor), eds. Digital Privacy: Theory, Technologies, and Practices. AUERBACH, 2007.
Find full textDigital Watermarking and Steganography: Fundamentals and Techniques. CRC, 2007.
Find full textShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Find full textShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Find full textBook chapters on the topic "Sécurité numérique"
Delerue, François, and Aude Géry. "Diplomatie et sécurité du numérique." In La Cyberdéfense, 105–14. Armand Colin, 2023. http://dx.doi.org/10.3917/arco.taill.2023.01.0105.
Full textLEFÈVRE, Pascal, Philippe CARRÉ, and Philippe GABORIT. "Codes et tatouages." In Sécurité multimédia 1, 87–136. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch3.
Full textPiazza, Pierre. "L’extension des fichiers de sécurité publique." In Politiques sécuritaires et surveillance numérique, 29–45. CNRS Éditions, 2014. http://dx.doi.org/10.4000/books.editionscnrs.20179.
Full textCassou-Mounat, Bernard. "Chapitre 35. La sécurité numérique : comment s’y préparer ?" In Architecture et ingénierie à l'hôpital, 265–70. Presses de l’EHESP, 2018. http://dx.doi.org/10.3917/ehesp.lange.2018.01.0265.
Full textBronnikova, Olga, Ksenia Ermoshina, and Anna Zaytseva. "Chapitre 4. Les formations à la sécurité numérique : GAFAM/ MAGMA, protection des données et chiffrement." In Genèse d’un autoritarisme numérique, 97–118. Presses des Mines, 2023. http://dx.doi.org/10.4000/books.pressesmines.9088.
Full textCull, Nicholas John, and Maxime Chervaux. "Chapitre 9. Le Royaume-Uni : appréhender une sécurité réputationnelle." In Les guerres de l'information à l'ère numérique, 231–59. Presses Universitaires de France, 2021. http://dx.doi.org/10.3917/puf.maran.2021.01.0231.
Full textPériès, Gabriel. "La confiance au prisme de la « sécurité nationale ». Une analyse critique à l’ère des réseaux numériques." In Politiques sécuritaires et surveillance numérique, 59–78. CNRS Éditions, 2014. http://dx.doi.org/10.4000/books.editionscnrs.20191.
Full text"Gérer le risque de sécurité numérique de l’entreprise à l’ère de l’industrie 4.0." In Six clés pour la transformation numérique de votre entreprise à l’ère de l’industrie 4.0, 127–58. Presses de l'Université du Québec, 2023. http://dx.doi.org/10.2307/j.ctv37wprdg.12.
Full text"Recommandation du Conseil sur la gestion du risque de sécurité numérique pour la prospérité économique et sociale." In La gestion du risque de sécurité numérique pour la prospérité économique et sociale, 7–18. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-1-fr.
Full text"Document d'accompagnement de la Recommandation du Conseil de l'OCDE sur la gestion du risque de sécurité numérique pour la prospérité économique et sociale." In La gestion du risque de sécurité numérique pour la prospérité économique et sociale, 19–73. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-2-fr.
Full textReports on the topic "Sécurité numérique"
Kamaté, Caroline. Le monde change, la sécurité industrielle aussi: Humain, numérique, nouvelles organisations: 10 points-clés à l’horizon 2040. Fondation pour une culture de sécurité industrielle, May 2023. http://dx.doi.org/10.57071/240dpc.
Full textGariépy, Félix, Benoit Dupont, Céline Castets-Renard, Hugo Loiseau, Lyse Langlois, Nadia Tawbi, Pierre-Martin Tardif, Sébastien Gambs, and Steve Jacob. Guide sur les conditions et bonnes pratiques pour la mise en place d’une identité numérique nationale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, February 2024. http://dx.doi.org/10.61737/afqc2028.
Full textde Marcellis-Warin, Nathalie, François Vaillancourt, Ingrid Peignier, Molivann Panot, Thomas Gleize, and Simon Losier. Obstacles et incitatifs à l’adoption des technologies innovantes dans le secteur minier québécois. CIRANO, May 2024. http://dx.doi.org/10.54932/dlxt6536.
Full textDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, October 2023. http://dx.doi.org/10.54932/ryht5065.
Full textCadre d'action de l'OCDE sur la sécurité numérique. Organisation for Economic Co-Operation and Development (OECD), February 2023. http://dx.doi.org/10.1787/a0517600-fr.
Full textRapport sur le dialogue social 2022 : la négociation collective pour une reprise durable, résiliente et inclusive. ILO, 2022. http://dx.doi.org/10.54394/iscj2582.
Full text