Literatura académica sobre el tema "Sécurité numérique"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Sécurité numérique".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Sécurité numérique"
Gusev, Alexander, Arnaud Leconte y Simone Lucatello. "Green Digital Transition and Data Governance". L'Europe en Formation 396, n.º 1 (13 de noviembre de 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Texto completoKessous, Emmanuel y Serge Proulx. "La sécurité dans un monde numérique". Annales Des Télécommunications 62, n.º 11-12 (noviembre de 2007): 1187–91. http://dx.doi.org/10.1007/bf03253312.
Texto completoAchilleas, Philippe. "La bataille de la 5G et le droit international". Annuaire français de droit international 66, n.º 1 (2020): 709–31. http://dx.doi.org/10.3406/afdi.2020.5489.
Texto completoSylvestre, Guillaume. "Sécurité de l’information numérique : relever le défi". I2D - Information, données & documents 54, n.º 3 (2017): 28. http://dx.doi.org/10.3917/i2d.173.0028.
Texto completoMarsico, G. "Numérique, virtuel, réseaux sociaux, objets connectés : leviers ou freins à la confiance dans la relation de soins ?" Psycho-Oncologie 14, n.º 1-2 (marzo de 2020): 53–56. http://dx.doi.org/10.3166/pson-2020-0123.
Texto completoMeiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management". Sécurité et stratégie 32, n.º 4 (19 de marzo de 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Texto completoLuzeaux, Dominique. "Le numérique au service du combat collaboratif". Revue Défense Nationale N° 865, n.º 10 (11 de diciembre de 2023): 17–23. http://dx.doi.org/10.3917/rdna.865.0017.
Texto completoCoustillière, Arnaud. "Maîtriser le combat dans l’espace numérique et contribuer à la sécurité numérique nationale". Géoéconomie 75, n.º 3 (2015): 25. http://dx.doi.org/10.3917/geoec.075.0025.
Texto completoFreyssinet, Éric. "Transformation numérique de la gendarmerie nationale". Sécurité et stratégie 31, n.º 3 (19 de marzo de 2024): 20–24. http://dx.doi.org/10.3917/sestr.031.0020.
Texto completoDumas, Mathilde, Anne-Florence Fay, Emmanuel Charpentier y Julien Matricon. "Le jumeau numérique en santé". médecine/sciences 39, n.º 12 (diciembre de 2023): 953–57. http://dx.doi.org/10.1051/medsci/2023178.
Texto completoTesis sobre el tema "Sécurité numérique"
Hogue, Simon. "La résistance esthétique à l'assemblage de surveillance de sécurité : l'art numérique comme participation citoyenne". Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38454.
Texto completoJbara, Abdelbasset. "Méthode d'obtention et d'optimisation des principaux paramètres garantissant la sécurité d'une transmission numérique en se fixant l'objectif de sécurité : application aux système de transports". Lille 1, 1993. http://www.theses.fr/1993LIL10060.
Texto completoCoulongeat, François. "Modélisation numérique de l'enfant : application en accidentologie routière". Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4000/document.
Texto completo130 children died in the French roads in 2010. A better knowledge of the mechanisms of injuries could lead to an improvement of their safety. Crash test dummies provide data on the local forces and on kinematics but finite element models can provide further data on the mechanical behaviour of internal organs. However, few numerical models of children currently exist. The purpose of this project is to develop and assess a finite element whole-body model of a 6 year old child (FEMOCS6). The geometry of this model was provided by medical imaging data of children for the trunk and the head and by a scaling down of an adult geometry for the limbs. Meshed geometry is made up of about 390 000 tria elements and 460 000 tetra elements. The study of the specificities of children led to the definition of modelling hypotheses and of the mechanical properties. Material properties were partly provided by characterizations of paediatric tissues from literature but a lack of data led to the use of adult data for the most of the tissues. The mechanical behaviour of the model was assessed by the numerical simulations of paediatric tests from the literature: impacts, dynamical compression and sled tests with a restraint system. The model could allow to study efficiency of existing child restraint system
Ould, Moustapha Ahmed Salem. "Etude numérique du développement de panaches thermiques en milieux confinés : application à la sécurité incendie". Paris 6, 2004. http://www.theses.fr/2004PA066255.
Texto completoDJILALI, BERKANE LAIEB ZOHRA. "Evaluation numérique d'un coefficient de sécurité cinématique pour les barrages et les ouvrages en terre". Université Joseph Fourier (Grenoble), 1997. http://www.theses.fr/1997GRE10193.
Texto completoPérès, Jérémie. "Modélisation numérique de la femme enceinte : Application en accidentologie routière". Aix-Marseille, 2012. http://www.theses.fr/2012AIXM4117.
Texto completoRandimbiarison, Jérôme. "Signature numérique d'un document basée sur FIDO2". Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/66598.
Texto completoIn this digital era, the use of paper documents is impractical and inefficient, which motivates companies to move towards the use of electronic documents (or e-docs). This desire to innovate towards a paperless operation can improve the efficiency and quality of public or private administration services so as to speed up their activities and at the same time better meet customer needs. However, this practice has created new needs, such as the actual digital signature of documents. In this thesis, we have proposed a new digital signature scheme using FIDO2, which happens to be a new standard for secure online authentication based on digital signatures. The fact that FIDO2 is a free standard makes it easier for software and hardware developers to implement their own products. This inspired us to use it a digital signature purpose, the idea being, to replace the challenge sent by the server with the hash of e-docs and send it to the signer’s device so that the latter signs with his private key. As with public key infrastructure, each user had a key pair, that is, a private key and a public key. A signatory must confirm their biometric identification (fingerprint, facial recognition, voice, etc.) or PIN code to access the private key stored locally on their device and sign a document. During our research, we carried out several tests with different equipment (PC, USB FIDO, Smartphone) as well as different OS (Android, iOS, Windows). The results of our tests show us that we can use FIDO2 to sign an electronic document. This proposed new approach can be used for a face-to-face (local) or remote (online) signature. The prototype developed for the implementation of our approach has been validated with typical users (member-clients and advisers) in a company.
Richard, Paul-Henri. "Crise et ville intelligente au prisme de l'éthique appliquée à la sécurité civile". Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0020/document.
Texto completoThe support of the social rhythms and the urban complexity are a priority for the decision-makers. However, the supplied answers are subjected to a permanent analysis of the adequacy between risk and anticipation. This thesis proposes a reflection on the consideration of the ethics in the practices of crisis management. In a first part, a state of the art of the concept shows us that the "smart city" seems to be an attractive answer for the decision-maker. She develops in a continuity assured by a resilience scheduled in the global nature. Yet, when this system based on the principle of continuity is suddenly questioned, the surprise subjects the decision-maker to a reaction of break. The disqualification of the technological services imposes then to react by referring to the fundamental concepts of the human socialization. Looked for in the depths of the consciousness of the individual in the collective, we show in a second part that the break materializes for the decision-makers under the form of ethical dilemmae. Our analysis leans on one put in perspective by the ethics of the extreme situations (conflicts, health), and on an investigation realized with decision-makers. We mobilize the concept of organizational culture, applied to the actors of the civil safety as well as to the organizations having implemented a collaborative governance of the risks. Finally, in the third part, we show that the ethical questioning realized during the phase of preparation is a way of anticipation of the uncertainties associated with the decision-making in context of crisis
Février, Rémy. "Management de la sécurité des systèmes d'information : les collectivités territoriales face aux risques numériques". Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020025.
Texto completoThis doctoral thesis aims at answering a key question: what is the level of consideration given to Information Systems Security (ISS) by the French local authorities (LAs)? The latter are now facing new challenges that require an ever-increasing use of new technologies (e-government, e-democracy, dematerialization of call for tenders...). The under-researched territorial IT risk becomes a major issue in the sphere of public services and the protection of personal data. Theoretically based and constructed through successive professional positions, our theoretical model helps measure the actual level of inclusion of digital risk taking into account the respective influence of a set of characteristics of local authorities. A field survey was conducted with the close collaboration of representatives of LAs.While numerical risk requires a high level awareness by LA decision makers, it appears that they have a very imperfect knowledge of IT security related risks as well as of direct or indirect threats that may jeopardize their management systems. A potential solution lies with the definition of a specific public policy and with the implementation of appropriate procedures at the level of each community
Moussa, Ali Abdellatif Karim. "Chiffrement authentifié sur FPGAs de la partie reconfigurable à la partie static". Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066660/document.
Texto completoCommunication systems need to access, store, manipulate, or communicate sensitive information. Therefore, cryptographic primitives such as hash functions and block ciphers are deployed to provide encryption and authentication. Recently, techniques have been invented to combine encryption and authentication into a single algorithm which is called Authenticated Encryption (AE). Combining these two security services in hardware produces better performance compared to two separated algorithms since authentication and encryption can share a part of the computation. Because of combining the programmability with the performance ofcustom hardware, FPGAs become more common as an implementation target for such algorithms. The first part of this thesis is devoted to efficient and high-speed FPGA-based architectures of AE algorithms, AES-GCM and AEGIS-128, in order to be used in the reconfigurable part of FPGAs to support security services of communication systems. Our focus on the state of the art leads to the introduction of high-speed architectures for slow changing keys applications like Virtual Private Networks (VPNs). Furthermore, we present an efficient method for implementing the GF($2^{128}$) multiplier, which is responsible for the authentication task in AES-GCM, to support high-speed applications. Additionally, an efficient AEGIS-128is also implemented using only five AES rounds. Our hardware implementations were evaluated using Virtex-5 and Virtex-4 FPGAs. The performance of the presented architectures (Thr./Slices) outperforms the previously reported ones.The second part of the thesis presents techniques for low cost solutions in order to secure the reconfiguration of FPGAs. We present different ranges of low cost implementations of AES-GCM, AES-CCM, and AEGIS-128, which are used in the static part of the FPGA in order to decrypt and authenticate the FPGA bitstream. Presented ASIC architectures were evaluated using 90 and 65 nm technologies and they present better performance compared to the previous work
Libros sobre el tema "Sécurité numérique"
Ton, Kalker, Cox I. J y Ro Yong Man, eds. Digitial watermarking: Second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers. Berlin: Springer, 2004.
Buscar texto completoShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Buscar texto completoiPhone forensics. Sebastopol, CA: O'Reilly, 2008.
Buscar texto completoNussbaumer, Henri. Informatique industrielle, tome 4. Commande numérique, téléinformatique, sécurité, sûreté, fiabilité. Presses Polytechniques et, 1987.
Buscar texto completoLa gestion du risque de sécurité numérique pour la prospérité économique et sociale. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-fr.
Texto completo(Editor), Bart Preneel, Rene Govaerts (Editor) y Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Buscar texto completo(Editor), Alessandro Acquisti, Stefanos Gritzalis (Editor), Costos Lambrinoudakis (Editor) y Sabrina di Vimercati (Editor), eds. Digital Privacy: Theory, Technologies, and Practices. AUERBACH, 2007.
Buscar texto completoDigital Watermarking and Steganography: Fundamentals and Techniques. CRC, 2007.
Buscar texto completoShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Buscar texto completoShih, Frank Y. Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition. Taylor & Francis Group, 2017.
Buscar texto completoCapítulos de libros sobre el tema "Sécurité numérique"
Delerue, François y Aude Géry. "Diplomatie et sécurité du numérique". En La Cyberdéfense, 105–14. Armand Colin, 2023. http://dx.doi.org/10.3917/arco.taill.2023.01.0105.
Texto completoLEFÈVRE, Pascal, Philippe CARRÉ y Philippe GABORIT. "Codes et tatouages". En Sécurité multimédia 1, 87–136. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch3.
Texto completoPiazza, Pierre. "L’extension des fichiers de sécurité publique". En Politiques sécuritaires et surveillance numérique, 29–45. CNRS Éditions, 2014. http://dx.doi.org/10.4000/books.editionscnrs.20179.
Texto completoCassou-Mounat, Bernard. "Chapitre 35. La sécurité numérique : comment s’y préparer ?" En Architecture et ingénierie à l'hôpital, 265–70. Presses de l’EHESP, 2018. http://dx.doi.org/10.3917/ehesp.lange.2018.01.0265.
Texto completoBronnikova, Olga, Ksenia Ermoshina y Anna Zaytseva. "Chapitre 4. Les formations à la sécurité numérique : GAFAM/ MAGMA, protection des données et chiffrement". En Genèse d’un autoritarisme numérique, 97–118. Presses des Mines, 2023. http://dx.doi.org/10.4000/books.pressesmines.9088.
Texto completoCull, Nicholas John y Maxime Chervaux. "Chapitre 9. Le Royaume-Uni : appréhender une sécurité réputationnelle". En Les guerres de l'information à l'ère numérique, 231–59. Presses Universitaires de France, 2021. http://dx.doi.org/10.3917/puf.maran.2021.01.0231.
Texto completoPériès, Gabriel. "La confiance au prisme de la « sécurité nationale ». Une analyse critique à l’ère des réseaux numériques". En Politiques sécuritaires et surveillance numérique, 59–78. CNRS Éditions, 2014. http://dx.doi.org/10.4000/books.editionscnrs.20191.
Texto completo"Gérer le risque de sécurité numérique de l’entreprise à l’ère de l’industrie 4.0". En Six clés pour la transformation numérique de votre entreprise à l’ère de l’industrie 4.0, 127–58. Presses de l'Université du Québec, 2023. http://dx.doi.org/10.2307/j.ctv37wprdg.12.
Texto completo"Recommandation du Conseil sur la gestion du risque de sécurité numérique pour la prospérité économique et sociale". En La gestion du risque de sécurité numérique pour la prospérité économique et sociale, 7–18. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-1-fr.
Texto completo"Document d'accompagnement de la Recommandation du Conseil de l'OCDE sur la gestion du risque de sécurité numérique pour la prospérité économique et sociale". En La gestion du risque de sécurité numérique pour la prospérité économique et sociale, 19–73. OECD, 2015. http://dx.doi.org/10.1787/9789264246089-2-fr.
Texto completoInformes sobre el tema "Sécurité numérique"
Kamaté, Caroline. Le monde change, la sécurité industrielle aussi: Humain, numérique, nouvelles organisations: 10 points-clés à l’horizon 2040. Fondation pour une culture de sécurité industrielle, mayo de 2023. http://dx.doi.org/10.57071/240dpc.
Texto completoGariépy, Félix, Benoit Dupont, Céline Castets-Renard, Hugo Loiseau, Lyse Langlois, Nadia Tawbi, Pierre-Martin Tardif, Sébastien Gambs y Steve Jacob. Guide sur les conditions et bonnes pratiques pour la mise en place d’une identité numérique nationale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, febrero de 2024. http://dx.doi.org/10.61737/afqc2028.
Texto completode Marcellis-Warin, Nathalie, François Vaillancourt, Ingrid Peignier, Molivann Panot, Thomas Gleize y Simon Losier. Obstacles et incitatifs à l’adoption des technologies innovantes dans le secteur minier québécois. CIRANO, mayo de 2024. http://dx.doi.org/10.54932/dlxt6536.
Texto completoDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, octubre de 2023. http://dx.doi.org/10.54932/ryht5065.
Texto completoCadre d'action de l'OCDE sur la sécurité numérique. Organisation for Economic Co-Operation and Development (OECD), febrero de 2023. http://dx.doi.org/10.1787/a0517600-fr.
Texto completoRapport sur le dialogue social 2022 : la négociation collective pour une reprise durable, résiliente et inclusive. ILO, 2022. http://dx.doi.org/10.54394/iscj2582.
Texto completo