Filtrer vos résultats
- 65
- 18
- 46
- 20
- 7
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 81
- 10
- 1
- 1
- 3
- 1
- 2
- 4
- 22
- 17
- 10
- 12
- 5
- 1
- 3
- 3
- 74
- 9
- 83
- 5
- 4
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 47
- 35
- 25
- 22
- 21
- 17
- 13
- 12
- 12
- 11
- 9
- 8
- 7
- 6
- 6
- 5
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
83 résultats
A New Cryptographic Encryption Algorithm for Securing Digital ImagesInternational Journal of Computer Applications, 2014, 94 (19), pp.28-33
Article dans une revue
hal-01119947v1
|
|||
A Novel Robust Informed Watermarking Approach and Tamper Detection based on Weber Differential Excitation DescriptorProceedings of the 5th IEEE International Symposium on Intelligent Signal Processing and Communication Systems, Nov 2015, Nusa Dua-Bali, Indonesia. pp. 194-198
Communication dans un congrès
hal-01519481v1
|
|||
JPEG Bitstream Based Integrity with Lightweight Complexity of Medical Image in WMSNS EnvironmentProceedings of The 7th International Conference on ManagEment of Digital EcoSystems (MEDES’15), ACM, Oct 2015, Caraguatatuba, Sao Paulo, Brazil. pp. 53-58, ⟨10.1145/2857218.2857227⟩
Communication dans un congrès
hal-01519482v1
|
|||
Feature Based Encryption Technique For Securing Forensic Biometric Image Data Using AES and Visual CryptographyProceedings of the IEEE International Conference on Artificial Intelligence, Modelling and Simulation, AIMS2014, IEEE, Nov 2014, Madrid, Spain. pp. 199 - 204, ⟨10.1109/AIMS.2014.65⟩
Communication dans un congrès
hal-01519484v1
|
|||
PROCEDE DE TRAITEMENT D'UNE INTRUSION DANS UN RESEAU DE COMMUNICATION SANS FIL, DISPOSITIF, ET PROGRAMME D'ORDINATEURS ASSOCIESFrance, Patent n° : WO2016051090. 2016
Brevet
hal-01484467v1
|
|||
|
Validation of a Mixed-Signal Board ATPG Method6th IEEE EAST-WEST DESIGN & TEST SYMPOSIUM EWDTS'08, Oct 2008, Lviv, Ukraine
Communication dans un congrès
hal-00783154v1
|
||
PROCÉDÉ DE PROTECTION D'UN RÉSEAU DE COMMUNICATION, DISPOSITIF, ÉQUIPEMENT DE CONTROLE ET PROGRAMME D'ORDINATEUR ASSOCIÉSFrance, N° de brevet: EP3076615. 2016
Brevet
hal-01484478v1
|
|||
Vulnerability Analysis of Software Defined Networking9th International Symposium on Foundations & Practice of Security (FPS'2016), Oct 2016, Québec City, Canada
Communication dans un congrès
hal-01411341v1
|
|||
|
A Novel Zero-Watermarking Approach of Medical Images Based on Jacobian Matrix ModelSecurity and communication networks, 2016, 9 (18), pp.5203-5218. ⟨10.1002/sec.1690⟩
Article dans une revue
hal-01519189v1
|
||
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital ImagesAbawajy J., Mukherjea S., Thampi S., Ruiz-Martínez A. Communications in Computer and Information Science, 536, Springer International Publishing, pp.89-98, 2015, Security in Computing and Communications, ⟨10.1007/978-3-319-22915-7_9⟩
Chapitre d'ouvrage
hal-01519460v1
|
|||
|
Validation of a Mixed-Signal Board ATPG Method: The TCB case study2008
Rapport
hal-00607290v1
|
||
|
Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in RoboticsInternational Journal of Computer Applications, 2012, 47 (24), pp.1-5. ⟨10.5120/7501-0353⟩
Article dans une revue
hal-00736245v1
|
||
A blind spatial domain-based image watermarking using texture analysis and association rules miningMultimedia Tools and Applications, 2018, ⟨10.1007/s11042-018-6851-2⟩
Article dans une revue
hal-02090968v1
|
|||
A new inscryption cipher for securing digital images of video surveillance devices using diffie-helleman-MD5 algorithm and RGB pixel shuffling.In proceeding of IEEE UK sim-AMSS 7th european modelling symposium on mathematical modelling and computer simulation, Nov 2013, Manchester, United Kingdom
Communication dans un congrès
hal-00979532v1
|
|||
Service robotics, three case studiesRyhti workshop, Sep 2012, Finland
Communication dans un congrès
hal-00783749v1
|
|||
Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithmthe 3rd International Conference, Jul 2019, Paris, France. pp.1-6, ⟨10.1145/3341325.3341991⟩
Communication dans un congrès
hal-02507655v1
|
|||
Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual CryptographySpringer International Publishing. Computational Science and Its Applications - ICCSA 2015, 9158, Springer International Publishing, pp.712, 2015, Lecture Notes in Computer Science, 978-3-319-21409-2. ⟨10.1007/978-3-319-21410-8_54⟩
Chapitre d'ouvrage
hal-01171540v1
|
|||
Special Issue on Ambient Assisted LivingDe Gruyter, 24 (3), pp.299-300, 2015, Journal of Intelligent Systems, Fleyeh, Hasan, ISSN (Online) 2191-026X, ISSN (Print) 0334-1860,. ⟨10.1515/jisys-2015-0012⟩
Ouvrages
hal-01186531v1
|
|||
Generating Optimal Informed and Adaptive Watermark Image Based on Zero-Suppressed Binary Decision Diagrams for Medical ImagesInternational journal of electronic security and digital forensics, 2016, 8 (3), pp.262-284. ⟨10.1504/IJESDF.2016.077451⟩
Article dans une revue
hal-01519436v1
|
|||
|
A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital ImagesInternational Journal of Computer Applications, 2015, 119 (7), pp.11-15. ⟨10.5120/21078-3755⟩
Article dans une revue
hal-01519446v1
|
||
A Proactive Stateful Firewall for Software Defined NetworkingCRiSIS 2016: 11th International Conference on Risks and Security, Sep 2016, Roscoff, France. pp.123-138, ⟨10.1007/978-3-319-54876-0_10⟩
Communication dans un congrès
hal-01411346v2
|
|||
|
Helping and monitoring robots at low costCongrés Français de Mécanique 2013 - CFM 2013, Aug 2013, Bordeaux, France. pp.6
Communication dans un congrès
hal-00873001v1
|
||
Analysis of ICS and Corporate system Integration vulnerabilities14th International Conference on Embedded Systems, Cyber-physical Systems, and Applications (ESCS'2016), Jul 2016, Las Vegas, United States
Communication dans un congrès
hal-01411587v1
|
|||
Vulnerability Analysis of Software Defined NetworkingVulnerability Analysis of Software Defined Networking, pp.97-116, 2017, ⟨10.1007/978-3-319-51966-1_7⟩
Chapitre d'ouvrage
hal-02458797v1
|
|||
STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks undeR atTack8th Workshop on Communications in Critical Embedded Systems (WoCCES), Jul 2020, Rennes, France
Communication dans un congrès
hal-02891507v1
|
|||
Measuring Watermarking Robustness Using Fractal DimensionsJournal of communication and computer, 2010, 7 (1), pp.serial n°62
Article dans une revue
hal-01119865v1
|
|||
|
On an Access Control Model enhancement for the 5G System2020 european conference on networks and communications (EuCNC): Posters (EuCNC2020 - posters), Jun 2020, Dubrovnik, Croatia
Poster de conférence
hal-02733050v1
|
||
Formal proof of security algorithms based on reachability reductionProceedings of the 8th International ACM Conference on Management of Digital EcoSystems, MEDES 2016, Nov 2016, Biarritz, France. pp. 67-72
Communication dans un congrès
hal-01519465v1
|
|||
Improving Authenticity and Robustness of Medical Images Watermarking Schemes Based on Multi-resolution DecompositionProceedings of the 12th IEEE International Conference on Imaging Systems and Techniques, Sep 2015, Macau, China. pp. 331-336
Communication dans un congrès
hal-01519483v1
|
|||
|
A Framework for Anomaly Diagnosis in Smart Homes Based on OntologyThe 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), May 2016, Madrid, Spain
Communication dans un congrès
hal-01332582v1
|