Dissertations / Theses on the topic 'Sécurité numérique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Sécurité numérique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hogue, Simon. "La résistance esthétique à l'assemblage de surveillance de sécurité : l'art numérique comme participation citoyenne." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38454.
Full textJbara, Abdelbasset. "Méthode d'obtention et d'optimisation des principaux paramètres garantissant la sécurité d'une transmission numérique en se fixant l'objectif de sécurité : application aux système de transports." Lille 1, 1993. http://www.theses.fr/1993LIL10060.
Full textCoulongeat, François. "Modélisation numérique de l'enfant : application en accidentologie routière." Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4000/document.
Full text130 children died in the French roads in 2010. A better knowledge of the mechanisms of injuries could lead to an improvement of their safety. Crash test dummies provide data on the local forces and on kinematics but finite element models can provide further data on the mechanical behaviour of internal organs. However, few numerical models of children currently exist. The purpose of this project is to develop and assess a finite element whole-body model of a 6 year old child (FEMOCS6). The geometry of this model was provided by medical imaging data of children for the trunk and the head and by a scaling down of an adult geometry for the limbs. Meshed geometry is made up of about 390 000 tria elements and 460 000 tetra elements. The study of the specificities of children led to the definition of modelling hypotheses and of the mechanical properties. Material properties were partly provided by characterizations of paediatric tissues from literature but a lack of data led to the use of adult data for the most of the tissues. The mechanical behaviour of the model was assessed by the numerical simulations of paediatric tests from the literature: impacts, dynamical compression and sled tests with a restraint system. The model could allow to study efficiency of existing child restraint system
Ould, Moustapha Ahmed Salem. "Etude numérique du développement de panaches thermiques en milieux confinés : application à la sécurité incendie." Paris 6, 2004. http://www.theses.fr/2004PA066255.
Full textDJILALI, BERKANE LAIEB ZOHRA. "Evaluation numérique d'un coefficient de sécurité cinématique pour les barrages et les ouvrages en terre." Université Joseph Fourier (Grenoble), 1997. http://www.theses.fr/1997GRE10193.
Full textPérès, Jérémie. "Modélisation numérique de la femme enceinte : Application en accidentologie routière." Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4117.
Full textRandimbiarison, Jérôme. "Signature numérique d'un document basée sur FIDO2." Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/66598.
Full textIn this digital era, the use of paper documents is impractical and inefficient, which motivates companies to move towards the use of electronic documents (or e-docs). This desire to innovate towards a paperless operation can improve the efficiency and quality of public or private administration services so as to speed up their activities and at the same time better meet customer needs. However, this practice has created new needs, such as the actual digital signature of documents. In this thesis, we have proposed a new digital signature scheme using FIDO2, which happens to be a new standard for secure online authentication based on digital signatures. The fact that FIDO2 is a free standard makes it easier for software and hardware developers to implement their own products. This inspired us to use it a digital signature purpose, the idea being, to replace the challenge sent by the server with the hash of e-docs and send it to the signer’s device so that the latter signs with his private key. As with public key infrastructure, each user had a key pair, that is, a private key and a public key. A signatory must confirm their biometric identification (fingerprint, facial recognition, voice, etc.) or PIN code to access the private key stored locally on their device and sign a document. During our research, we carried out several tests with different equipment (PC, USB FIDO, Smartphone) as well as different OS (Android, iOS, Windows). The results of our tests show us that we can use FIDO2 to sign an electronic document. This proposed new approach can be used for a face-to-face (local) or remote (online) signature. The prototype developed for the implementation of our approach has been validated with typical users (member-clients and advisers) in a company.
Richard, Paul-Henri. "Crise et ville intelligente au prisme de l'éthique appliquée à la sécurité civile." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0020/document.
Full textThe support of the social rhythms and the urban complexity are a priority for the decision-makers. However, the supplied answers are subjected to a permanent analysis of the adequacy between risk and anticipation. This thesis proposes a reflection on the consideration of the ethics in the practices of crisis management. In a first part, a state of the art of the concept shows us that the "smart city" seems to be an attractive answer for the decision-maker. She develops in a continuity assured by a resilience scheduled in the global nature. Yet, when this system based on the principle of continuity is suddenly questioned, the surprise subjects the decision-maker to a reaction of break. The disqualification of the technological services imposes then to react by referring to the fundamental concepts of the human socialization. Looked for in the depths of the consciousness of the individual in the collective, we show in a second part that the break materializes for the decision-makers under the form of ethical dilemmae. Our analysis leans on one put in perspective by the ethics of the extreme situations (conflicts, health), and on an investigation realized with decision-makers. We mobilize the concept of organizational culture, applied to the actors of the civil safety as well as to the organizations having implemented a collaborative governance of the risks. Finally, in the third part, we show that the ethical questioning realized during the phase of preparation is a way of anticipation of the uncertainties associated with the decision-making in context of crisis
Février, Rémy. "Management de la sécurité des systèmes d'information : les collectivités territoriales face aux risques numériques." Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020025.
Full textThis doctoral thesis aims at answering a key question: what is the level of consideration given to Information Systems Security (ISS) by the French local authorities (LAs)? The latter are now facing new challenges that require an ever-increasing use of new technologies (e-government, e-democracy, dematerialization of call for tenders...). The under-researched territorial IT risk becomes a major issue in the sphere of public services and the protection of personal data. Theoretically based and constructed through successive professional positions, our theoretical model helps measure the actual level of inclusion of digital risk taking into account the respective influence of a set of characteristics of local authorities. A field survey was conducted with the close collaboration of representatives of LAs.While numerical risk requires a high level awareness by LA decision makers, it appears that they have a very imperfect knowledge of IT security related risks as well as of direct or indirect threats that may jeopardize their management systems. A potential solution lies with the definition of a specific public policy and with the implementation of appropriate procedures at the level of each community
Moussa, Ali Abdellatif Karim. "Chiffrement authentifié sur FPGAs de la partie reconfigurable à la partie static." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066660/document.
Full textCommunication systems need to access, store, manipulate, or communicate sensitive information. Therefore, cryptographic primitives such as hash functions and block ciphers are deployed to provide encryption and authentication. Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces better performance compared to two separated algorithms since authentication and encryption can share a part of the computation. Because of combining the programmability with the performance ofcustom hardware, FPGAs become more common as an implementation target for such algorithms. The first part of this thesis is devoted to efficient and high-speed FPGA-based architectures of AE algorithms, AES-GCM and AEGIS-128, in order to be used in the reconfigurable part of FPGAs to support security services of communication systems. Our focus on the state of the art leads to the introduction of high-speed architectures for slow changing keys applications like Virtual Private Networks (VPNs). Furthermore, we present an efficient method for implementing the GF($2^{128}$) multiplier, which is responsible for the authentication task in AES-GCM, to support high-speed applications. Additionally, an efficient AEGIS-128is also implemented using only five AES rounds. Our hardware implementations were evaluated using Virtex-5 and Virtex-4 FPGAs. The performance of the presented architectures (Thr./Slices) outperforms the previously reported ones.The second part of the thesis presents techniques for low cost solutions in order to secure the reconfiguration of FPGAs. We present different ranges of low cost implementations of AES-GCM, AES-CCM, and AEGIS-128, which are used in the static part of the FPGA in order to decrypt and authenticate the FPGA bitstream. Presented ASIC architectures were evaluated using 90 and 65 nm technologies and they present better performance compared to the previous work
Jemli, Anissa. "Les rôles des managers dans la formation de leurs collaborateurs : cas de deux entreprises industrielles (automobile et sécurité numérique)." Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS019S/document.
Full textIn a complex economic environment, the involvement of managers in training theiremployees seems important. In a French automotive group and a multinational in digitalsecurity, we try to identify the different roles of managers in training, the effects of theseroles, challenges and finally the requirements to carry out these roles.Now, managers live discomfort and it is certain that their position confronts them tomultiple constraints. Work and training activities merge more and more: work activities areplaced at the heart of education and training activities are investing in the workplace: hencethe need to study managers’ roles in the formal and informal training.To answer our research goal, we used the qualitative research method by semistructuredinterviews. It found that managers are heavily involved in training: from animatingtraining sessions until monitoring and knowledge transfer in day to day activities.Our research highlights the “trainer” roles of the manager in a context of instability.Indeed, the personal involvement of managers to train their team can be largely explained bythe complexity of the context that requires from them to act urgently to overcome failures dueto the complexity and the slowness of the formal training process
Bouchami, Ahmed. "Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0091/document.
Full textEnterprise social networks (ESN) have revolutionized collaboration between professional organizations. By means of an ESN, conventional mobility constraints, complex procedures for services exchange and the lack of flexibility and communication are no longer concerns. In this thesis we have worked on the project OpenPaaS ESN. Mainly we focused on the management of the access control, which led us to other needs, namely the management of digital identities and their monitoring. We worked primarily on managing the authentication of digital identities within collaborative communities made of heterogeneous enterprises regarding authentication management systems. For this, we have proposed an interoperable architecture for managing federated authentication, allowing thus each enterprise to preserve its (own) authentication mechanism and each principal to perform a single sign on authentication regarding different enterprises. Further, we focused on the management of digital identities accreditations, i.e. Access Control. On this aspect, we have proposed a flexible access control model based on a set of identity attributes. We developed this model on the basis of a formal language based on temporal logic, namely the Event-Calculus logic. We were thus able to make the sharing of resources fluid and agile, and also able to handle temporary authorizations, i.e. delegations. The fluidity and agility of the shares is due to the user-centric resources’ sharing in a straightforward manner. In addition, the logical formalism has allowed us to automatically check the access control policies consistency. For enterprises, our access control system gives them the ability to control the user-centric sharing policies through policies based on a risk management mechanism, which make our access control mechanism dynamic. The risk mechanism is based on the NIST’s risk definition with an alignment with a set of parameters that include access control in the ESN context. More precisely, the dynamic risk management includes, the collaborative resource’s importance, the authentication system’s vulnerabilities and trust level reflected through the behavior of each collaborative actor. On this latter aspect of trust, we made an evaluation of trust through the computation of reputation scores based on the history of collaborative interactions of each subject of collaboration. Finally, we have implemented all those security modules and integrate them as a prototype into OpenPaaS ESN
Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Full textThe Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
Choi, Yong-Joon. "Étude numérique 0D-multiD pour l'analyse de perte de réfrigérant dans une enceinte de confinement d'un réacteur nucléaire." Université de Marne-la-Vallée, 2005. http://www.theses.fr/2005MARN0257.
Full textIn the case of PWR severe accident (Loss of Coolant Accident, LOCA), the inner containment ambient properties such as temperature, pressure and gas species concentrations due to the released steam condensation are the main factors that determine the risk. For this reason, their distributions should be known accurately, but the complexity of the geometry and the computational costs are strong limitations to conduct full three-dimensional numerical simulations. An alternative approach is presented in this thesis, namely, the coupling between a lumped-parameter model and a CFD. The coupling is based on the introduction of a "heat transfer function" between both models and it is expected that large decreases in the CPU-costs may be achieved. First of all, wall condensation models, such as the Uchida or the Chilton-Colburn models which are implemented in the code CAST3M/TONUS, are investigated. They are examined through steady-state calculations by using the code TONUS-0D, based on lumpedparameter models. The temperature and the pressure within the inner containment are compared with those reported in the archival literature. In order to build the "heat transfer function", natural convection heat transfer is then studied by using the code CAST3M for a partitioned cavity which represents a simplified geometry of the reactor containment. At a first step, two-dimensional natural convection heat transfer without condensation is investigated only. Either the incompressible-Boussinesq fluid flow model or the asymptotic low Mach model are considered for solving the time dependent conservation equations. The SUPG finite element method and the implicit scheme are applied for the numerical discretization. The computed results are qualified by the second-order Richardson extrapolation method which allows obtaining the so-called "Exact values", i. E. Grid size independent values. The computations are also validated through non-partitioned cavity case studies. The discussion is focused on heat transfer characteristics such as the variations of the average Nusselt number (Nu) versus the dimensionless thickness of the partition (0. 01 ≤ γ ≤ 0. 2) and conductivity ratio of the partition wall to the fluid (1 ≤ σ ≤ 10 [puissance] 5 ). Finally, a "heat transfer function" is suggested based upon the thermal resistance of the partition wall. The validity of the model is assessed thanks to comparisons with ’half-cavity’ simulations
Raffo, Daniele. "Schémas de sécurité pour le protocole OLSR pour les réseaux ad hoc." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2005. http://tel.archives-ouvertes.fr/tel-00010678.
Full textTano, Bekoin Françis Guillaume. "Etude analytique, numérique et expérimentale du comportement mécanique des systèmes géosynthétiques : application au cas des barrières de sécurité des extensions d'ISDND." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAU053/document.
Full textGeosynthetics (GSYs) are polymeric materials that are used in engineering and environmental constructions to replace or in addition to natural materials. In landfills, GSYs are used as a lining system to prevent leachate infiltration into groundwater.Nowadays, the scarcity of suitable sites to establish new landfills leads more and more landfill owners to build new landfill cells over older ones. In such type of construction commonly called piggy-back landfill, a new GSY lining system is often implemented between old and new cells. However, in this specific configuration, the risk of translational instability of the construction is increased since the lining system involved several interfaces with low shear strength. Such instability is related to the failure of the various interfaces within the GSY lining system and hence to the sliding of GSY layers on each other. Moreover, the potential occurrence of differential settlements and / or localized collapses (cavity) which are related to the compressible nature of the waste within the old cell could tear (excessive tensile forces / strains) the GSY lining system under the overload of the new waste. Therefore, understanding the mechanisms controlling translational slip phenomena and deformation of GSYs is essential to ensure a proper design of such a project.In this context, this PhD thesis focused on better understanding of the mechanical behaviour of GSY systems and their interactions. The study was conducted using firstly a global analysis (large scale, all over the piggy-back landfill) of the lining system in terms of translational slips between the various GSYs. Secondly, this study investigated the integrity of the GSY lining system subjected to a cavity (small scale analysis).To achieve this goal, a multi-approaches investigation involving analytical study, numerical modelling and experimental study was performed.First, the analytical part focused on a comparative analysis based on ten methods used to assess the factor of safety of translational slip and on eight methods used for the design of GSY reinforcement over cavities. These comparative studies have not only assessed the differences between these methods, but also identified those best suited to be applied in the context of piggy-back landfills.Then, a rigorous method (MeRaMoG) that addressed the key aspects of the mechanical behaviour of GSYs and interfaces (e.g., the nonlinear axial stiffness of GSYs), was developed for the numerical modelling of multi-layered geosynthetic systems. Through MeRaMoG which was experimentally validated, the mechanisms controlling the translational slip and deformation of the geosynthetic lining system on side slopes and cavity were investigated.Finally, a new large-scale testing device (DEPGeC) was developed to assess the efficiency of a GSY reinforcement to bridge a cavity. The DEPGeC is a prototype that was used to simulate the mechanical behaviour of multi-layered GSY systems over a rectangular cavity and under a confining load of up to 100 kPa. Using the DEPGeC, the influence of the applied vertical load, the stiffness of the GSY reinforcement and a perfect anchorage on the deformations of GSY, was investigated
Zwolinska, Monika. "Sécurité et libertés fondamentales des communications électroniques en droit français, européen et international." Thesis, Nice, 2015. http://www.theses.fr/2015NICE0038/document.
Full textThe impact of today’s information and communication technologies is essential forthe exercice of human rights, particularly concerning freedom of expression and privacyprotection. With the massive use of Internet, mobile phones and – more recently – other smart objects and digital services, the tension mounts with respect to establishing the limit between public and private space online. Likewise, the freedom of expression, communication and information are at risk as - under the pretext of fighting cybercrime and cyber terrorism, as well as maintaining public order - public authorities interfere with online contents by controlling, monitoring, restraining or prohibiting it. Especially as both States’ and private companies’ capacities in creating extremely precise databases identifying information on persons’ consumption habits, itineraries, thoughts and opinions gradually increase. Therefore, the need to redefine the way in which the respect of fundamental freedoms is taken into consideration in the context of digital environment becomes urgent
Valea, Emanuele. "Security Techniques for Test Infrastructures." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS042.
Full textTest infrastructures are crucial to the modern Integrated Circuits (ICs) industry. The necessity of detecting manufacturing defects and preventing system failures in the field, makes their presence inevitable in every IC and its sub-modules. Unfortunately, test infrastructures also represent a security threat due to the augmented controllability and observability on the IC internals that they typically provide. In this thesis, we present a comprehensive analysis of the existing threats and the respective countermeasures, also providing a classification and a taxonomy of the state-of-the-art. Furthermore, we propose new security solutions, based on lightweight cryptography, for the design of test infrastructures. All proposed countermeasures belong to the category of scan encryption solutions and their purpose is to guarantee data confidentiality and user authentication. Each proposed solution is evaluated in terms of implementation costs and security capabilities. The works that have been carried out and are presented in this thesis, indicate that scan encryption is a promising solution for granting a secure design of test infrastructures
Fresnel, Harold. "Mise en place d'une méthode d'analyse numérique de la rupture structurale des générateurs de gaz pour airbag en phase de tests destructifs." Lorient, 2008. http://www.theses.fr/2008LORIS100.
Full textAirbag inflator functioning is submitted to draconian safety rules for vehicle occupants. In this study, the inflator structure is a thin tube closed at both extremities, crimped and perforated with exit ports for combustion gas release. Prior to manufacturing, the pyrotechnic system undergoes validation (burst) tests. The latter consist in putting inflator combustion chamber under various dynamic pressure ramps until structure failure. This work aims at increasing the efficiency and at reducing validation tests number by using numerical simulation. In this work, we are interested in the numerical description of the dissipative response of the inflator material during the burst test induced by dynamic loading. The failure mode under ductile plastic damage is particularly studied. For obtaining reliable experimental results, a preliminary numerical study is carried out for optimising the geometry of curved samples (machined in thin small diameter tubes) regarding strain and stress fields in the gage length. The experimental campaign shows significant influence of strain hardening, plastic viscosity and ductile damage on inflator material behaviour. The GTN damage-plasticity model is used to describe the combined aforementioned effects, including cavity nucleation and growth laws as well as viscous plasticity potential. Numerical simulations considering the validation burst test problem is performed employing the engineering calculation code ABAQUS. Confrontation of numerical results with experimental ones is encouraging concerning prediction ability of the model
Vincent, Johann. "Identité numérique en contexte Télécom." Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01007682.
Full textFriot, Nicolas. "Itérations chaotiques pour la sécurité de l'information dissimulée." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2035/document.
Full textDiscrete dynamical systems by chaotic or asynchronous iterations have proved to be highly interesting toolsin the field of computer security, thanks to their unpredictible behavior obtained under some conditions. Moreprecisely, these chaotic iterations possess the property of topological chaos and can be programmed in anefficient way. In the state of the art, they have turned out to be really interesting to use notably through digitalwatermarking schemes. However, despite their multiple advantages, these existing algorithms have revealedsome limitations. So, these PhD thesis aims at removing these constraints, proposing new processes whichcan be applied both in the field of digital watermarking and of steganography. We have studied these newschemes on two aspects: the topological security and the security based on a probabilistic approach. Theanalysis of their respective security level has allowed to achieve a comparison with the other existing processessuch as, for example, the spread spectrum. Application tests have also been conducted to steganalyse and toevaluate the robustness of the algorithms studied in this PhD thesis. Thanks to the obtained results, it has beenpossible to determine the best adequation of each processes with targeted application fields as, for example,the anonymity on the Internet, the contribution to the development of the semantic web, or their use for theprotection of digital documents. In parallel to these scientific research works, several valorization perspectiveshave been proposed, aiming at creating a company of innovative technology
Kaced, Ahmed Réda. "Problèmes de sécurité posés par les proxies d'adaptation multimédia : proposition de solutions pour une sécurisation de bout-en-bout." Phd thesis, Télécom ParisTech, 2009. http://pastel.archives-ouvertes.fr/pastel-00005883.
Full textBattikh, Dalia. "Sécurité de l’information par stéganographie basée sur les séquences chaotiques." Thesis, Rennes, INSA, 2015. http://www.theses.fr/2015ISAR0013/document.
Full textSteganography is the art of the dissimulation of a secret message in a cover medium such that the resultant medium (stego) is almost identical to the cover medium. Nowadays, with the globalization of the exchanges (Internet, messaging and e-commerce), using diverse mediums (sound, embellish with images, video), modern steganography is widely expanded. In this manuscript, we studied adaptive LSB methods of stéganography in spatial domain and frequency domain (DCT, and DWT), allowing of hiding the maximum of useful information in a cover image, such that the existence of the secret message in the stégo image is imperceptible and practically undetectable. Security of the message contents, in the case of its detection by an opponent, is not really insured by the methods proposed in the literature. To solve this question, we adapted and implemented two (known) methods of adaptive stéganographie LSB, by adding a strong chaotic system allowing a quasi-chaotic insertion of the bits of the secret message. The proposed chaotic system consists of a generator of strong chaotic sequences, supplying the dynamic keys of a modified chaotic 2D Cat map. Universal steganalysis (classification) of the developed methods of stéganography, is studied. On this question, we used the linear discriminating analysis of Fisher as classifier of the characteristic vectors of Farid, Shi and Wang. This choice is based on the wide variety of tested characteristic vectors that give an information about the properties of the image before and after message insertion. An analysis of the performances of three developed methods of steganalysis, applied to the produced stego images by the proposed adaptive methods of stéganography, is realized. Performance evaluation of the classification is realized by using the parameters: sensibility, specificity, precision and coefficient Kappa
Ouadghiri, Abdel Hadi. "Sur les conditions d'utilisation des codes détecteurs d'erreurs dans les transmissions numériques nécessitant une sécurité quasi absolue : applications aux systèmes de transports et en particulier aux métros souterrains." Lille 1, 1986. http://www.theses.fr/1986LIL10039.
Full textRobin, Jean-Nicolas. "La matière pénale à l'épreuve du numérique." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1G035/document.
Full textToday, it seems possible to consider that digital technology and cyberspace have completely changed the balance of power in our modern society. By digitizing, the society gives its members almost unlimited access to millions of resources and data. Digital technology also facilitates personal and professional relationships between individuals. If digital technology can be presented as a real revolution, it exposes its user to new vulnerabilities and risks. The criminal law, insofar as it governs society and chooses the social values to be protected, has therefore been concerned with the development of digital technology. The present study notes the extensive legislative arsenal for fighting in the most effective manner against digital delinquency. Nevertheless, the analysis observes that many obstacles are against the application of criminal law into the cyberspace because of networks particularities. Moreover, digital crime is not the only threat generated by digital technology, since it is now possible to consider the cyberspace as a new space for confrontation. Thus, military threat is added to digital delinquency as the States set up electronics weapons into networks. Then, the arised question is about the relevance of these state choices and the solutions to intensify the fight against digital delinquency
Akrout, Ali. "Modélisation numérique du comportement vibro-acoustique des systèmes doubles vitrages feuilletés." Compiègne, 2008. http://www.theses.fr/2008COMP1792.
Full textThe main objective of this work is to develop a finite element approach for the modelization of the laminated double glazing acoustic transparency. A literature review study on both laminated double glazing vibro-acoustic behaviour and numerical resolution approach of fluid structure coupled system is presented. The study of laminated dynamical behaviour allows developing a new laminate model including an ultra-thin film at the skin's interface. Furthermore, based on the viscoelastic behaviour of polymer materials, a dynamic model of the double glazing clamping joint can be investigated. Also, a mathematical model for a thin viscothermal fluid cavity is established and allows obtaining a dimensional dynamic equation. The discretization of the energy functional by finite elements method gives after minimization a non linear symetrical coupled matrix system requiring the development of an iterative model approach for its resolution. The study of the acoustic radiation problem in the case of laminated double glazing system excited by harmonic uniform normal external pressure applied on the first plate shows, via the calculation of the transmission (TL) of the coupled system, the efficiency of the laminated double glazing on the acoustic insulation. Numerical results showed the reduced vibration's amplitude of a laminated glass with ultra-thin film compared to the one without taking into account the shear interfacial stress and the importance of viscothermal fluid effects on double glazing vibroacoustic behaviour
Moussa, Ali Abdellatif Karim. "Chiffrement authentifié sur FPGAs de la partie reconfigurable à la partie static." Electronic Thesis or Diss., Paris 6, 2014. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2014PA066660.pdf.
Full textCommunication systems need to access, store, manipulate, or communicate sensitive information. Therefore, cryptographic primitives such as hash functions and block ciphers are deployed to provide encryption and authentication. Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces better performance compared to two separated algorithms since authentication and encryption can share a part of the computation. Because of combining the programmability with the performance ofcustom hardware, FPGAs become more common as an implementation target for such algorithms. The first part of this thesis is devoted to efficient and high-speed FPGA-based architectures of AE algorithms, AES-GCM and AEGIS-128, in order to be used in the reconfigurable part of FPGAs to support security services of communication systems. Our focus on the state of the art leads to the introduction of high-speed architectures for slow changing keys applications like Virtual Private Networks (VPNs). Furthermore, we present an efficient method for implementing the GF(2¹²⁸) multiplier, which is responsible for the authentication task in AES-GCM, to support high-speed applications. Additionally, an efficient AEGIS-128is also implemented using only five AES rounds. Our hardware implementations were evaluated using Virtex-5 and Virtex-4 FPGAs. The performance of the presented architectures (Thr./Slices) outperforms the previously reported ones.The second part of the thesis presents techniques for low cost solutions in order to secure the reconfiguration of FPGAs. We present different ranges of low cost implementations of AES-GCM, AES-CCM, and AEGIS-128, which are used in the static part of the FPGA in order to decrypt and authenticate the FPGA bitstream. Presented ASIC architectures were evaluated using 90 and 65 nm technologies and they present better performance compared to the previous work
Lallement, Julien. "Modélisation et simulation numérique d’écoulements de films minces avec effet de mouillage partiel." Thesis, Toulouse, ISAE, 2019. http://www.theses.fr/2019ESAE0005/document.
Full textThe ice accretion on surfaces encountered in aeronautics (wings, nacelle lips, sensors)is considered as a major risk for aviation safety. The consequences observed are the degradationof the aerodynamic performances that can lead to the aircraft stall, disturbancesin the engines that can lead to flame out or clogging of the sensors. That is why aircraftmanufacturers are developing thermal protection systems against icing. The wateraccumulated on the surfaces thus remains in the liquid state and forms a thin film. Thedynamic properties (thickness, velocity and spreading) and thermal properties (temperature,evaporation rate) of the film in the presence of a sheared air flow make it possible apotential refreezing of the water film on unprotected surfaces (”runback ice” phenomena).Since flight or wind tunnel tests are generally expensive and difficult to set up, numericalsimulation has become an effective and complementary tool to design these systems. Themain purpose of this thesis is to develop a model integrated in a numerical tool to predictthe transport of liquid water on a surface which might take the form of a film, a rivulet ora droplet. An integral approach based on a shallow water type model is adopted. It makesit possible to describe the macroscopic dynamics of a three-dimensional liquid film onrealistic configurations and within reasonable computing times compared to a full Navier-Stokes computation. An extended formulation is proposed, it corresponds to a second orderdifferential system and thus allows to use arbitrary surface meshes. Contrary to modelsavailable in the literature, the one proposed in this manuscript has the advantage of takinginto account capillary and wetting phenomena without validity limit in term of staticcontact angle. An energy conservation equation ensuring the thermodynamic consistencyof the calculated solutions is derived from the extended model governing fluid dynamics.A Finite Volume discretization of the system is proposed. Numerical simulations validatethe model for both static and dynamic academical wetting configurations. The transitionof a continuous film into rivulets is also simulated
Jouffroy, Damien. "Vers une démarche d'intégration de la sécurité à la conception des machines à bois semi-automatisées : Application au développement d'un système de captage des poussières pour défonceuse à commande numérique." Nancy 1, 1999. http://docnum.univ-lorraine.fr/public/SCD_T_1999_0014_JOUFFROY.pdf.
Full textBrenac, Marin. "La souveraineté numérique sur les données personnelles : étude du règlement européen no 2016/679 sur la protection des données personnelles à l'aune du concept émergent de souveraineté numérique." Master's thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/28306.
Full textYounes, Iyad. "Etude expérimentale et modélisation numérique de la traction et compression locales d'un assemblage métallique soudé et semi-rigide sous chargement monotone et cyclique." Rennes, INSA, 2002. http://www.theses.fr/2002ISAR0011.
Full textCarassus, Hugo. "Comportement dynamique des matériaux cellulaires issus de la fabrication additive pour l'allègement structural et la sécurité au crash et à l'impact." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2023. http://www.theses.fr/2023UPHF0003.
Full textThe rise of additive manufacturing since the end of the 20th century has made it possible to consider the design of new architectural cellular materials combining lightness and high energy absorption capacity. Their use in the field of ground or air transport sectors is therefore of interest to contribute jointly to structural lightening and safety in the event of a crash and/or impact.The objectives of the research work are to investigate and model the mechanical behaviour, under uniaxial dynamic loadings, of this new category of cellular materials, the TPMS (Triply Period Minimal Surface) structures, for which the current state of the art is rather focused on quasi-static or cyclic loadings.The work presented in this thesis is organised in three parts. The first part aims to characterise the mechanical behaviour of the constitutive material, 316L steel chosen for its high ductility, produced by the SLM (Selective Laser Melting) process. The specificities induced by laser melting on a powder bed, such as anisotropy and strain rate sensitivity, are identified and modelised by material behaviour laws.The second part of this thesis focuses on the mechanical response of TPMS structures under quasi-static and dynamic solicitations. The mechanical responses of the structures show the characteristics of an ideal energy absorber with the absence of an initial peak, a long and slightly rising plateau phase, and a late densification. In addition, the deformation mechanisms are stable. Compared to other so-called conventional cellular materials, the energy absorption capacities of TPMS structures are superior with the advantage of being less sensitive to the direction of solicitation for uniaxial loading. In the dynamic regime, the observed increase in energy absorption capacities is linked to the sensitivity of the constitutive material.This experimental approach is coupled with a detailed numerical FE approach at the mesoscopic scale in order to better understand the local collapse mechanisms that measurement alone does not allow, especially under dynamic solicitations. The numerical model is capable of predicting the experimental mechanical response fairly accurately, based in particular on the material behaviour laws identified previously. Locally, the deformation is a combination of several mechanisms such as buckling, bending and shearing. Energy absorption diagrams and Gibson-Ashby laws are determined in order to relate the energy absorption capacities to the geometrical dimensions and thus to choose the most suitable configuration for the imposed specifications
Nguyen, Khac Tien. "Dégradation thermique de matériaux solides poreux exposés au feu - Simulation numérique avec prise en compte des processus chimiques et mécanismes de transfert." Thesis, Poitiers, 2014. http://www.theses.fr/2014POIT2344.
Full textThe description of the degradation of solids is crucial in the numerical simulation of a fire, the pyrolysis gases constituting the combustible source. It is important to describe with accuracy these processes, according to the ambient conditions. However, the couplings between chemical reactions and mechanisms of mass and heat transports strongly modify the behavior of the fire.The objective of this work is to predict the macroscopic behavior of the thermal decomposition of solid fuel by numerical simulation. The intrinsic properties of the material, among which a chemical model including a reactive scheme and the associated thermochemical parameters stemming from small-scale experiment are considered as well as the transport mechanisms and the limiting effects that they can introduce. The comportment of the material is then predicted for geometrical configurations and arbitrary scenarios of exposure. The specific tool developed during this Ph-D is based on a description on the Darcy scale. It has in the future to be coupled with a global code of simulation of the fire, so that the conditions undergone by every exposed solid element would be described whereas the prediction of the fire evolution fire would depend on the behavior of the materials supplied by the present module.A set of applications is presented for two wooden materials, featuring different reactive schemes, with sequential or competitive reactions. The configurations and the examined scenarios correspond to normalized tests under cone calorimeter, and a comparison between the numerical and experimental results is made
Bernier, Carl. "Courbes de fragilité pour la vulnérabilité sismique de barrages-poids en béton." Mémoire, Université de Sherbrooke, 2015. http://hdl.handle.net/11143/8379.
Full textLeclercq, Thomas. "Contribution à la comparaison de séquences d'images couleur par outils statistiques et par outils issus de la théorie algorithmique de l'information." Lille 1, 2006. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2006/50376-2006-Leclercq.pdf.
Full textBlanchard, Elizabeth. "Computational study of water mist for a tunnel fire application." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00860103.
Full textBlanchard, Elizabeth. "Modélisation de l'interaction entre un brouillard d'eau et un feu en tunnel." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00672668.
Full textAguilar, Melchor Carlos. "Les communications anonymes à faible latence." Toulouse, INSA, 2006. http://www.theses.fr/2006ISAT0021.
Full textIn this thesis, we present different systems providing low-latency anonymous communications. We first study the performance of systems based on well known primitives such as superposed sending and encrypted padding for transmission, and broadcast with implicit addressing for reception, when the group of potential users is restricted to be small, closed, or localized. We propose the usage of Private Information Retrieval (PIR) protocols as an alternative to broadcast with implicit addressing, and we study the resulting systems. These systems allow us to trade communication cost, for computational cost. Through some examples, we show that the new solutions offer a better choice in some situations, specially when the users are connected to the service through the Internet. Then, we put forward how the different approaches are related, and show that the systems based on classic primitives are in fact just some instances of a family, which becomes much larger and versatile through the introduction of PIR protocols
Fayad, Jacky. "Études numériques des feux extrêmes." Electronic Thesis or Diss., Corte, 2023. http://www.theses.fr/2023CORT0015.
Full textExtreme fires are characterized by their high intensity and rate of spread, which overwhelm firefighting resources. These phenomena result in increased damage, civilian and operational fatalities and disruption to ecosystems, human life and the economy. There are several types of extreme fires, including high-intensity fires, which are the main subject of this thesis. This type of fire presents a real risk, given the increase in its frequency and scale throughout the world. Consequently, it is very useful to assess the conditions of propagation that can trigger a high- intensity fire in order to be able to anticipate these phenomena. In addition, studying the behavior of a high-intensity fire (rate of spread, intensity and impact) can provide information to operational staff during the firefighting phase. The main aim of this thesis is to study the propagation of high-intensity fires by means of experimental fires carried out on a field scale on Corsican shrub species named 'Genista salzmannii'. These experiments were carried out during two periods (winter and autumn), in two different regions: North-West and South-West of Corsica, using an experimental protocol and technologies that make it possible to assess the dynamic and impact of these fires. Following the experiments, numerical studies were carried out using fully physical fire models based on a multiphase formulation, FireStar2D and 3D, in order to test the relevance of these propagation models in predicting the behavior of these experimental fires. The different numerical results obtained for the three terrain configurations chosen were in agreement with the experimental results. This shows that these models can be used to study other configurations without necessarily having to resort to experiments. The fire campaigns carried out were representative of high-intensity fires that occurred despite marginal propagation conditions related to low wind speeds, high fuel moisture content and relative air humidity. These experiments can also provide detailed observations, as well as input data that can be used in modelling, given that carrying out such experiments is not easy and is always subject to difficulties and constraints. The second part of the research focused on a numerical study of a "critical case" of a high- intensity fire. This fire was studied using several empirical approaches, fully physical models found in the literature, in particular FireStar2D and 3D and the simplified physical Balbi model. Several parameters were evaluated using the different approaches, including the rate of spread, the intensity of the flame front, the geometry of the front and of the flame (length and tilting). The main aim of this study was to assess not only the behavior but also the impact of this high-intensity fire on two different targets: the human body and a four level building. This made it possible to establish correlations between the total heat fluxes received by the targets as a function of their position in front of the fire. The aim was to assess the safety distance around wildland urban interfaces by considering the maximum tolerable value of thermal heat flux that can be received by the target without causing damage. The safety distances assessed using this methodology, for a firefighter and a building, are less than 50 meters. This confirms, for this configuration, the effectiveness of the value of the safety distance around buildings, set by operational experts and assumed to be equal to a minimum of 50 m in France
Flidrova, Kamila. "Contribution à la simulation numérique des crash de véhicules : prise en compte des non-linéarités matérielles et géométriques des composants de fonderie." Thesis, Ecully, Ecole centrale de Lyon, 2010. http://www.theses.fr/2010ECDL0043.
Full textNowadays, road safety is one of the main aims of car makers. To guarantee a high level of security to car drivers and passengers and also to other road users, such as for example pedestrians and two wheelers, the cars are submitted to a lot of tests before their commercialisation. Whether they are virtual or real, the experiments set out the conception and the development of a car. Nowadays, the numerical simulation plays a prime role in the development of new systems and equipments. In order to offer more and more predictivity by numerical models, the domain of the numerical simulation is inconstant evolution. The aim of this thesis is to contribute to the improvement of a car crash simulation. The subject of the study presented in this document is composed by two themes. The first one consists in inclusion of the material nonlinearities as fracture in the car crash dimensioning process. In car crash, two types of components are distinguished. Those which have to brake during the shock such as engine suspensions and those which have not to brake such as crankcase or clutch housing. The fracture is a phenomenon difficult to model, moreover, its computational time is important. Thus, the first fracture models were only functional (deactivation of fracture springs). With the arrival of numerical methods such as element deletion method, a lot of fracture models were developed. Because these models are relatively recent, the material databases are often incomplete which makes their use more difficult. Thus, one of the aims of this study is the material parameters identification of Mohr-Coulomb and Johnson-Cook fracture model with the aid of experiments on specimens. Another experiment campaign on an automotive subsystem was also realized. The numerical correlation using the material fracture parameters identified in the first step enabled to validate the "volumic"fracture modelisation and to identify the ways of progress of the current methodology. The second theme presented in this document is the modeling of linear elastic behavior of components which have not to brake in car crash and inclusion of geometrical nonlinearities as large rotations and contact. A modeling by linear elastic super elements adapted for explicit simulations with large rotations was proposed for massive cast iron components. The modeling by super elements was realized in Radioss by means of the file.fxb. A new reduction method derived from that of MacNeal was proposed. Its transformation basis is constituted by a free eigen-modes completed by residual flexibility modes. The model is reduced by means of Matlab routines which were developed in the framework of the thesis. In order to integrate the modeling by superelements in the dimensioning car crash process used at PSA, a procedure Abaqus–Matlab–Radioss was proposed. A process for the generation of the file.fxb by means of the CAD/CAMtools used at PSA was established. In order to optimize the simulation performance with superelements, three new models for contact management with a superelement were proposed. The modeling by superelement was applied in a test model and also in a frontal car crash simulation
Bennour, Zouaoui Jihane. "Sécurité multimédia et objets vidéo 3D." Paris, ENST, 2008. http://www.theses.fr/2008ENST0004.
Full textIn all the published 3D watermarking techniques, users are assumed to access the 3D watermarking datafile to extract/detect the mark. Having observed that in many cases the 3D datafile is not accessible at the extractionstep, we propose a completely different approach. It consists in watermarking 3D objects and retrieving the mark from 2D images or videos having used the 3D synthetic object, thus protecting the visual representation of the object. Several tests are proposed for various environments showing the performance and limits of our asymmetric approach. The second part of the thesis introduces a more classic 3D watermarking application in which both insertion and extraction are performed on the 3D object itself. The originality of this 3D watermarking algorithm is the use of the silhouette to embed the mark, and the introduction of the characteristic views notion. We have also used the silhouette to hide additional information related to the 3D model. For this purpose, we proposed a blind polygonal-line watermarking technique that has capacity
Moreau, Baptiste. "Modélisation statistique de la géométrie 3D de la cage thoracique à partir d'images médicales en vue de personnaliser un modèle numérique de corps humain pour la biomécanique du choc automobile." Thesis, Montpellier, 2018. http://www.theses.fr/2018MONTS030/document.
Full textRoad safety is a major issue of public health and personal safety. According to the World Health Organization (WHO), nearly 1.2 million people die each year worldwide due to road accidents (2015). According to accident data, 36.7% of serious injuries are caused by thoracic injuries (Page et al., 2012). The aim of biomechanics in passive safety is to improve our understanding of the human body in order to build better tools for assessing the risk of injury.Numerical human body models are used to virtually simulate the conditions of an accident. Today, they are increasingly used by car manufacturers and equipment manufacturers to better understand injury mechanisms. However, they exist only in few sizes and do not take into account the morphological variations observed in the population.3D medical imaging gives access to the geometries of the different anatomical structures that make up the human body. Today, hospitals are full of 3D images covering a very large part of the population in terms of age, body size and sex.The overall objective of this thesis is to statistically model the 3D geometry of the rib cage from medical images in order to personalize a numerical human body model to simulate car crash conditions.The first objective is to develop a segmentation process based on CT-scans in order to obtain geometric data adapted to the construction of a statistical model of shape of the rib cage.The second objective is to build a statistical model of the shape of the rib cage, taking into account its articulated structure.The third objective is to use the statistical model of the rib cage to deform a numerical human body model, in order to study the influence of certain parameters on the risk of injury
Leroy, Damien. "Étude des modes de perturbation et susceptibilité des circuits numériques aux collisions de particules et aux attaques laser." Metz, 2006. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/2006/Leroy.Damien.SMZ0628.pdf.
Full textMore and more sensitive data are stored inside smart cards, like bank account or car access codes. Recently, these security circuits have become a target for hackers who try to abuse these data. To achieve this goal, these attackers use the state of the art technologies like fault injection. To comply with the smart card market requirements, designers have to build protections against these attacks while keeping design costs as low as possible. These constraints should lead to a cost-efficient design and benefit from dedicated automatic protection methodologies. In this thesis we first study radiation sources able to tamper with silicon circuit behavior, and then we reveal similarities between laser attacks and radiation effects on a circuit. Then we show the specificities of secure circuit design and the spectrum of attacks used by hackers. The third part characterizes Single Event Transients (SET). A design methodology is proposed and implemented in two circuits, one dedicated to measuring laser-induced SET duration in logic gates, the other dedicated to measuring gate sensitivity to neutrons. This work concludes the review of results obtained after a laser shooting experiment campaign
Lopard, Gabriel. "Conception et dimensionnement des ouvrages souterrains dans les massifs rocheux discontinus – Développement de la méthode des blocs isolés." Electronic Thesis or Diss., Université Paris sciences et lettres, 2021. http://www.theses.fr/2021UPSLM014.
Full textMany activity sectors involve occupation of underground space. Digging in a rockmass presents different modes of ruin that must be identified in order to use the appropriate design tools. Among them, block instability is a usual problem in fractured rock masses. Numerical approaches of multiple blocks allow to consider the complete rockmass but their use can be hard and requires a lot of input data sometimes unavailable. The Isobloc approach is based on the isolated block concept and, compared to other methods based on the same concept, it is more rigorous in solving the block mechanics problem. In this thesis, this method has been studied in order to integrate it in the design approach of fractured rock mass. A first part is specifically interested in the normal joint behavior law, and in definition of indicators to quantify the safety of the block's equilibrium state. A second part presents reflections and ways to model a support solution with Isobloc. Three types are proposed according to the knowledge degree of the support. Finally, an application of the Isobloc method in the blocks stability study approach has been proposed using data from a real study site
Hatoum, Makram. "Digital watermarking for PDF documents and images : security, robustness and AI-based attack." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD016.
Full textTechnological development has its pros and cons. Nowadays, we can easily share, download, and upload digital content using the Internet. Also, malicious users can illegally change, duplicate, and distribute any kind of information, such as images and documents. Therefore, we should protect such contents and arrest the perpetrator. The goal of this thesis is to protect PDF documents and images using the Spread Transform Dither Modulation (STDM), as a digital watermarking technique, while taking into consideration the main requirements of transparency, robustness, and security. STDM watermarking scheme achieved a good level of transparency and robustness against noise attacks. The key to this scheme is the projection vector that aims to spreads the embedded message over a set of cover elements. However, such a key vector can be estimated by unauthorized users using the Blind Source Separation (BSS) techniques. In our first contribution, we present our proposed CAR-STDM (Component Analysis Resistant-STDM) watermarking scheme, which guarantees security while preserving the transparency and robustness against noise attacks. STDM is also affected by the Fixed Gain Attack (FGA). In the second contribution, we present our proposed N-STDM watermarking scheme that resists the FGA attack and enhances the robustness against the Additive White Gaussian Noise (AWGN) attack, JPEG compression attack, and variety of filtering and geometric attacks. Experimentations have been conducted distinctly on PDF documents and images in the spatial domain and frequency domain. Recently, Deep Learning and Neural Networks achieved noticeable development and improvement, especially in image processing, segmentation, and classification. Diverse models such as Convolutional Neural Network (CNN) are exploited for modeling image priors for denoising. CNN has a suitable denoising performance, and it could be harmful to watermarked images. In the third contribution, we present the effect of a Fully Convolutional Neural Network (FCNN), as a denoising attack, on watermarked images. STDM and Spread Spectrum (SS) are used as watermarking schemes to embed the watermarks in the images using several scenarios. This evaluation shows that such type of denoising attack preserves the image quality while breaking the robustness of all evaluated watermarked schemes
Lepoint, Tancrède. "Conception and implémentation de cryptographie à base de réseaux." Phd thesis, Ecole Normale Supérieure de Paris - ENS Paris, 2014. http://tel.archives-ouvertes.fr/tel-01069864.
Full textCarre, Hélène. "Etude du comportement à la rupture d'un matériau fragile précontraint : le verre trempé." Phd thesis, Ecole Nationale des Ponts et Chaussées, 1996. http://tel.archives-ouvertes.fr/tel-00529410.
Full textLe, Tellier Bérenger. "Méthode d'évaluation des systèmes de retenue des enfants dans un environnement automobile." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAD010.
Full textFollowing changes in Child Restraint System (CRS) regulation in July 2013, an experimental CRS evaluation campaign has been conducted. Then, it has been noticed that the situation amongst the youngest involved in side impact was particularly critical. An original methodology has been therefore developed in order to define the “best” energy absorption materials to use in child seats for head, shoulder and pelvis areas. A parametric study in which the restraint of each body segments was independently piloted has then been conducted. The aim was to minimize either regulatory criteria of Q0 and Q1 dummies, or biomechanical criteria based on Q0-6WOC hybrid model. Those recommendations have thereafter been applied to improve an existing child restraint system under side impact. First, it has been checked that resultant linear acceleration of the head and HPC criteria were below regulation limits. Second, Finite Element (FE) model of the optimized car seat has been created and validated in several dynamical steps. Third, both reference child restraint system and optimized child seat has been evaluated in side impact with Q0-6WOC hybrid model. Finally, it has been showed that technical changes helped to cut in half the biomechanical results
Colombier, Brice. "Methods for protecting intellectual property of IP cores designers." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.
Full textDesigning integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Tsaousis, Georgios. "Le difficile équilibre entre sécurité et protection des données : comparaison des cadres juridiques français et grec sous l'influence du droit européen." Thesis, Dijon, 2014. http://www.theses.fr/2014DIJOD003.
Full textConfronted by his own violence and the forces of nature, man has consistently expressed the need to be protected. Since the creation of organized societies, the right of security has been a fundamental principle of his existence. Since the attacks of September 11th, 2001, the question of security is being brought up constantly in the media. The implementation of effective security policies is an exciting objective, a factor that strengthens the executive power. This objective has been characterized as a "pressing social need". However, in the purely textual level, the right of security does not appear explicitly as a constitutional norm. Security using the most advanced techniques requires, legally, the adaptation of law to the digital era. CCTV systems, mobile phones, the word-wide-web and automatic archiving constitute the new weapons of the police apparatus. As such, data processing forms the core of the new security guidelines. Nevertheless, using new technologies for reasons related to the maintenance of public order also requires another duty: respect for fundamental freedoms, law's obvious concern. However, the overestimation of security policies and the proliferation of security measures may cause some degradation and loss of the right of data protection, a fundamental principle of EU law since the adoption of the Lisbon Treaty. Faced with this challenge, law seeks the right balance between privacy and security. Of course, the equation is old, but the ways to solve it evolve due to technological advances that laugh at borders and undermine the state's inherent principle of territorial sovereignty. National laws also handle poorly the abolition of frontiers. Comparison between Greek and French legal systems, albeit with their differences, is a beautiful illustration of this fact, notably within the EU where national security, remaining the sole responsibility of the member states, creates disparities between national laws. In this environment the Independent Administrative Authorities of data protection of the compared countries remain at the margin, trapped in specific legal frameworks. Only the judge remains to the counterweight police abuse. In the current state of the constitutive treaties, protection of processed data for police purposes by the Luxembourg court is impossible. And the ECHR is the only european court capable of providing a balance between the two basic requirements: maintenance of public order and data protection. Indeed, it only exercises a proportionality test of the applied measures. Thus, establishment of a balance at least within the EU ultimately leads law towards the implementation of a unique approach to security policies through a possible revision of the Treaties