La lecture à portée de main
Suivre university
Documents
A neutral approach to proof and refutation in MALL
Olivier Delande
Documents
Etudes supérieures
A neutral approach to proof and refutation in MALL
Olivier Delande
11 pages
English
Documents
A Proof Theoretic Approach to the Static Analysis of Logic Programs Dale Miller
Peter Andrews
Documents
Etudes supérieures
A Proof Theoretic Approach to the Static Analysis of Logic Programs Dale Miller
Peter Andrews
20 pages
English
Documents
UNIFORM PROOFS AS A FOUNDATION FOR LOGIC PROGRAMMING
Duke University
Documents
Etudes supérieures
UNIFORM PROOFS AS A FOUNDATION FOR LOGIC PROGRAMMING
Duke University
35 pages
English
Documents
Unification of Simply Typed Lambda Terms as Logic Programming
Documents
Etudes supérieures
Unification of Simply Typed Lambda Terms as Logic Programming
12 pages
English
Documents
CSL07 September
Documents
Encryption as an abstract data type
Documents
Light Logics for Polynomial Time Computations April 3th
Time Computations
Documents
Etudes supérieures
Light Logics for Polynomial Time Computations April 3th
Time Computations
58 pages
English
Documents
A Brief Survey of Imprinting Options for Constrained Devices
Eric Rescorla
Documents
Etudes supérieures
A Brief Survey of Imprinting Options for Constrained Devices
Eric Rescorla
4 pages
English
Documents
On Access Control in the Internet of Things
Jan Janak
Documents
Etudes supérieures
On Access Control in the Internet of Things
Jan Janak
3 pages
English
Documents
Access Tokens for the IoT Jens Matthias Bohli NEC Laboratories Europe eu Introduction The vision of the Internet of Things has been discussed for several years now and has already attracted attention beyond the research community Besides the widespread use of RFID chips the Internet of Things is also characterized by smart real world objects that report status of themselves or the environment detected by sensors Some objects also offer to change their status or the environment through actuators Communication and management platforms for smart objects are currently developed Privacy security and trust are an essential component in such a platform due to the sensitivity of personal data and the impact that decisions and actuations have on the real world This paper discusses access protection for smart objects The focus is on access tokens that support payment and access tokens for wireless sensor networks with unprotected sensor nodes The goal is to present specific requirements and point to initial solutions Access restrictions on the smart object are needed to prevent unauthorized access to the object to protect the data or actuation offered by the smart object or to prevent malicious access patterns that aim at exhausting limited resources in a DoS attack The SENSEI project considered two kinds of access restricted objects Objects that can only be accessed by a small restricted group and Objects that are in principle publicly available but require payment for access The assumed use case is a network of sensor equipped parking lots that allow the user to find a parking space remotely or reserve the parking space actuation Being able to offer payment for access to objects or wireless sensor network can also be an incentive to accelerate wide deployments of this technology Setting The involved parties are the owner of the object a framework provider where the object is registered and the users wishing to access the object Initially the object has a shared key with the framework provider Users have to receive ...
Matthias Bohli
Documents
Etudes supérieures
Access Tokens for the IoT Jens Matthias Bohli NEC Laboratories Europe eu Introduction The vision of the Internet of Things has been discussed for several years now and has already attracted attention beyond the research community Besides the widespread use of RFID chips the Internet of Things is also characterized by smart real world objects that report status of themselves or the environment detected by sensors Some objects also offer to change their status or the environment through actuators Communication and management platforms for smart objects are currently developed Privacy security and trust are an essential component in such a platform due to the sensitivity of personal data and the impact that decisions and actuations have on the real world This paper discusses access protection for smart objects The focus is on access tokens that support payment and access tokens for wireless sensor networks with unprotected sensor nodes The goal is to present specific requirements and point to initial solutions Access restrictions on the smart object are needed to prevent unauthorized access to the object to protect the data or actuation offered by the smart object or to prevent malicious access patterns that aim at exhausting limited resources in a DoS attack The SENSEI project considered two kinds of access restricted objects Objects that can only be accessed by a small restricted group and Objects that are in principle publicly available but require payment for access The assumed use case is a network of sensor equipped parking lots that allow the user to find a parking space remotely or reserve the parking space actuation Being able to offer payment for access to objects or wireless sensor network can also be an incentive to accelerate wide deployments of this technology Setting The involved parties are the owner of the object a framework provider where the object is registered and the users wishing to access the object Initially the object has a shared key with the framework provider Users have to receive ...
Matthias Bohli
3 pages
English
Documents
Un trusted Intermediaries in CoAP
Thomas Fossati?
Documents
Etudes supérieures
Un trusted Intermediaries in CoAP
Thomas Fossati?
3 pages
English
Documents
A System of Interaction and Structure IV: The Exponentials and Decomposition
Lutz Strassburger
Documents
Etudes supérieures
A System of Interaction and Structure IV: The Exponentials and Decomposition
Lutz Strassburger
43 pages
English
Documents
April final version for proceedings of CiE'10
Lutz Strassburger
Documents
Etudes supérieures
April final version for proceedings of CiE'10
Lutz Strassburger
10 pages
English
Documents
ANon commutative Extension of MELL Alessio Guglielmi and Lutz Straßburger
Documents
Etudes supérieures
ANon commutative Extension of MELL Alessio Guglielmi and Lutz Straßburger
16 pages
English
Documents
Some Observations on the Proof Theory of Second Order Propositional Multiplicative Linear Logic
Second Order
Documents
Etudes supérieures
Some Observations on the Proof Theory of Second Order Propositional Multiplicative Linear Logic
Second Order
15 pages
English
Documents
January Submitted pages paper pages appendix
Second Order
Documents
Etudes supérieures
January Submitted pages paper pages appendix
Second Order
39 pages
English
Documents
May To be presented at HyLo'07 Part of ESSLLI
Lutz Strassburger
Documents
Etudes supérieures
May To be presented at HyLo'07 Part of ESSLLI
Lutz Strassburger
10 pages
English
Documents
Under consideration for publication in Math Struct in Comp Science
Documents
Etudes supérieures
Under consideration for publication in Math Struct in Comp Science
21 pages
English
Documents
March This is an expanded version of the LICS'05 submission Mistakes have been corrected and the relative emphasis of axioms has changed but the claims are strictly identical
Francois Lamarche
Documents
Etudes supérieures
March This is an expanded version of the LICS'05 submission Mistakes have been corrected and the relative emphasis of axioms has changed but the claims are strictly identical
Francois Lamarche
17 pages
English
Documents
June Lecture notes for ESSLLI'06 Malaga Spain
Lutz Strassburger
Documents
Etudes supérieures
June Lecture notes for ESSLLI'06 Malaga Spain
Lutz Strassburger
96 pages
English
Documents
Supervisory Control for Modal Specifications of Services
Philippe Darondeau
Documents
Etudes supérieures
Supervisory Control for Modal Specifications of Services
Philippe Darondeau
8 pages
English
Documents
P U B L I C A T I O N I N T E R N E No
Documents
Statistical Region Merging Richard Nock and Frank Nielsen
Documents
Etudes supérieures
Statistical Region Merging Richard Nock and Frank Nielsen
7 pages
English
Documents
Marie Albenque Eric Fusy and Dominique Poulalhon
Marie Albenque
Documents
Etudes supérieures
Marie Albenque Eric Fusy and Dominique Poulalhon
Marie Albenque
8 pages
English
Documents
Optimal Coding and Sampling of Triangulations
Documents
Etudes supérieures
Optimal Coding and Sampling of Triangulations
12 pages
English
Documents
Planar Graphs via Well Orderly Maps and Trees
Cyril Gavoille
Documents
Etudes supérieures
Planar Graphs via Well Orderly Maps and Trees
Cyril Gavoille
19 pages
English
Documents
Marie Albenque Eric Fusy and Dominique Poulalhon
Marie Albenque
Documents
Etudes supérieures
Marie Albenque Eric Fusy and Dominique Poulalhon
Marie Albenque
8 pages
English
Documents
Dynamic programming for graphs on surfaces
Ignasi Saucnrs, Lirmm, Montpellier
Documents
Etudes supérieures
Dynamic programming for graphs on surfaces
Ignasi Saucnrs, Lirmm, Montpellier
61 pages
English
Documents
Metastability for Ginzburg Landau type
Nils Berglund
Documents
Etudes supérieures
Metastability for Ginzburg Landau type
Nils Berglund
48 pages
English
Documents
Jam8 soumis a Topics on the Interface between Harmonic Analysis and Number Theory T Erdelyi B Saffari G Tenenbaum Eds
Philippe Jaming
Documents
Etudes supérieures
Jam8 soumis a Topics on the Interface between Harmonic Analysis and Number Theory T Erdelyi B Saffari G Tenenbaum Eds
Philippe Jaming
17 pages
English
Collection
{{collectionTitle}}
Collection
{{collectionTitle}}
Collection
{{collectionTitle}}
{{productCategoryLabel}}
{{productTitle}}
{{productAuthors}}
{{productCategoryLabel}}
{{productThemeLabel}}
{{productTitle}}
{{productAuthors}}
{{productPages}}
{{productLanguageIsoCode}}