Literatura académica sobre el tema "TCP/IP (protocole de réseaux d'ordinateurs) – Mesures de sûreté"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "TCP/IP (protocole de réseaux d'ordinateurs) – Mesures de sûreté".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Tesis sobre el tema "TCP/IP (protocole de réseaux d'ordinateurs) – Mesures de sûreté"
Ramirez, Rojas Octavio. "Architectures pour la gestion de la mobilité dans les réseaux IEEE 802. 11". Versailles-St Quentin en Yvelines, 2005. http://www.theses.fr/2005VERS0016.
Texto completoLe but de cette thèse a été l'étude et la proposition de solutions pour gérer la mobilité de l'utilisateur dans des réseaux utilisant le standard IEEE 802. 11. Dans cette thèse, nous avons développé deux architectures. Dans la première, nous avons introduit une architecture sécurisée pour gérer le roaming des nœuds mobiles dans les réseaux sans fil. Le but de cette architecture SMMArc (Service Mobility Management Architecture) a consisté à offrir des services à l'utilisateur d'après son profil. La deuxième architecture a été développée de manière à gérer des connexions TCP lorsque les nœuds mobiles changent de domaine en cours de communication. Cette architecture ATHOMIC (Architecture managing Tcp Handoff Over Mobile Ip Connections) a permis de réduire la probabilité de perte des segments lorsque les nœuds mobiles changent de domaines IP
Grasset, Frédéric. "Gestion d'environnements de sécurité dans les réseaux IP". Toulouse 3, 2004. http://www.theses.fr/2004TOU30253.
Texto completoThe growing use of internet as an inexpensive and widely available interconnection means elevate the security concerns of sensible content data flow. This security can be done by protecting the communication infrastructure and enforcing some cryptographic techniques. Configuration of the network elements that have to ensure the enforcement of the flow security is a long, repetitive and rigorous task. Any error can involve security faults even of dysfunction of the network. Systems, as the policy based networks one, form a starting point to facilitate a automatic deployment within the border of an administrative domain. However, the domain boundary as well as the absence of administrative control on a foreign domain limits the deployment of security for trans-organizational data flows. Moreover, the current tendency to equipment and users mobility makes the long and perilous static equipment configuration obsolete. .
Dubos, Charles. "Analyse, définition et conception d'une messagerie résiliente et sécurisée". Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT052.
Texto completoAsynchronous messaging has established itself as an essential means of communication, both in the private and organizational contexts. However, it remains a privileged attack vector by the exploitation of attack modes combining social engineering and protocol structures. This thesis first studies the mechanisms and extensions contributing to the security of asynchronous messaging protocols.Based on a classification of interpersonal messaging, it presents the modern security principles implemented in alternatives to e-mail. In particular, it describes the exchanges necessary for the implementation of ephemeral keys specific to synchronous exchanges.A second major contribution is the description of updated use cases of asynchronous messaging,providing a mapping of security needs according to various contexts. This work introduces the needfor adaptable security levels to adapt to contexts, by highlighting sometimes contradictory functions of the same security principle (such as the ephemeral or non-repudiable signature). A catalog of existing exploitations backed by ambiguities of interpretation is produced from recent literature. It then allows us to consider the threats that currently weigh on messaging and to deduce the related risks. In a third step, messaging adjustments are imagined, gradually moving away from current tropisms to be able to take into account changes in needs and technologies. Our work then leads us to introduce a mechanism to maintain the S/MIME signature in the event of messagetransfer by a user intermediary, highlighting the complexity of the security ecosystem. The desire to report the use of security at the user level also leads us to design a mechanism implementing policies before transmission. Subsequently, the PACMAIL device offering pseudonymization of transmitters is considered.It notably introduces the key concept of identification/ authentication distinction in the messagingarchitecture. Finally, this work converges towards a new asynchronous messaging model using SMTP as a control channel, and inviting to move towards an alternative protocol for content management
Cridlig, Vincent. "Sécurité du plan de gestion des réseaux IP". Phd thesis, Université Henri Poincaré - Nancy I, 2006. http://tel.archives-ouvertes.fr/tel-00134670.
Texto completoTlaiss, Ziad. "Automated network packet traces analysis methods for fault recognition and TCP flavor identification". Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2023. http://www.theses.fr/2023IMTA0384.
Texto completoIn recent years, the field of network troubleshooting has garnered significant attention from researchers due to the complexity and importance of this task. The work presented in this thesis focuses on automating network troubleshooting using performance metrics extracted from packet captures. The first contribution of this thesis lies in extracting features to identify the root cause of an anomaly by analyzing TCP packet traces with bad performance. We have categorized four frequently observed causes of degradation: transmission problems, congestion problems, jitter problems, and application-limited problems. The second contribution of this thesis involves developing an automated method to detect the moment of exiting the Slow-Start state. The significance of this method lies in saving valuable time in the analysis of network degradation, as the Slow-Start state serves as a key indicator for fault diagnosis. The third contribution of this thesis revolves around identifying the BBR congestion control algorithm. The primary goal of our approach is to detect whether packet pacing is employed in a TCP connection. This method relies on modeling the distribution of inter-packet duration during the Slow-Start state. The objective is to distinguish unimodal distributions of inter-packet intervals in the case of BBR compared to mixed two component distributions in the case of CUBIC
Libros sobre el tema "TCP/IP (protocole de réseaux d'ordinateurs) – Mesures de sûreté"
Jake, Kouns, ed. Security in an IPv6 environment. Boca Raton: Auerbach, 2009.
Buscar texto completo