References of "Roch, J.-L."
     in
Bookmark and Share    
Full Text
See detailThéorie des Codes : Compression, Cryptage et Correction
Dumas, J.-G.; Roch, J.-L.; Tannier, E. et al

Book published by Dunod - 3rd (2018)

Transmettre des informations sous forme numérique suppose entre autres d’optimiser la taille des messages transmis pour éviter de surcharger les canaux de transmission, d’être capable de rectifier des ... [more ▼]

Transmettre des informations sous forme numérique suppose entre autres d’optimiser la taille des messages transmis pour éviter de surcharger les canaux de transmission, d’être capable de rectifier des erreurs apparues en cours de transmission, de crypter les contenus et d’authentifier les émissaires et les destinataires… L’originalité de cet ouvrage est de présenter tous les fondements mathématiques et informatiques sur lesquels reposent ces techniques. Les notions théoriques présentées sont illustrées par 140 exercices corrigés. Cette 3e édition s’enrichit de compléments sur les infrastructures à clefs publiques (PKI), les courbes elliptiques, les registres à décalage (LFSR), les fonctions de hachage. L’utilisation de la cryptographie dans les applications mobiles (Facebook, Messenger, WhatsApp…) est abordée, et des bonnes pratiques de sécurité sont présentées pour des utilitaires incontournables comme GPG et SSH. [less ▲]

Detailed reference viewed: 217 (2 UL)
Full Text
See detailFoundations of Coding: Compression, Encryption, Error-Correction
Dumas, J.-G.; Roch, J.-L.; Tannier, E. et al

Book published by Wiley Sons (2015)

This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the ... [more ▼]

This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations. This text focuses on the ways to structure information so that its transmission will be in the safest, quickest, and most efficient and error-free manner possible. All coding operations are covered in a single framework, with initial chapters addressing early mathematical models and algorithmic developments which led to the structure of code. After discussing the general foundations of code, chapters proceed to cover individual topics such as notions of compression, cryptography, detection, and correction codes. Both classical coding theories and the most cutting-edge models are addressed, along with helpful exercises of varying complexities to enhance comprehension. Explains how to structure coding information so that its transmission is safe, error-free, efficient, and fast Includes a pseudo-code that readers may implement in their preferential programming language Features descriptive diagrams and illustrations, and almost 150 exercises, with corrections, of varying complexity to enhance comprehension Foundations of Coding: Compression, Encryption, Error-Correction is an invaluable resource for understanding the various ways information is structured for its secure and reliable transmission in the 21st-century world. [less ▲]

Detailed reference viewed: 99 (1 UL)
See detailThéorie des Codes : Compression, Cryptage et Correction
Dumas, J.-G.; Roch, J.-L.; Tannier, E. et al

Book published by Dunod - 2nde (2014)

Detailed reference viewed: 133 (4 UL)
See detailFoundations of Coding: Compression, Encryption, Error-Correction
Dumas, J.-G.; Roch, J.-L.; Tannier, E. et al

Book published by Wiley Sons (2014)

The topic of this book is the automatic transmission of numerical information. We focus on the structure of information, without regarding the type of transmission support. Information can be of any kind ... [more ▼]

The topic of this book is the automatic transmission of numerical information. We focus on the structure of information, without regarding the type of transmission support. Information can be of any kind as long as we can give a numerical representation of it: for example texts, images, sounds, videos. Transmission of this type of data is ubiquitous in technology, especially in telecommunications. Hence, it is necessary to rely on solid foundations for that transmission to be reliable. In this context, we explain how to structure the information so that its transmission is safe, error-free, efficient and fast. It can be used as a reference book by teachers, researchers or companies involved in telecommunication or information security, such that the information it now contains will be still relevant for the coming years as it was the case until now. [less ▲]

Detailed reference viewed: 179 (1 UL)
Peer Reviewed
See detailchapt. Sécurité dans les grilles de calcul,
Cérin, C.; Dubacq, J.-C.; Hérault, T. et al

in Systèmes répartis en action : de l'embarqué aux systèmes à large échelle (2008)

Detailed reference viewed: 58 (1 UL)
Peer Reviewed
See detailchapter "Cryptographie à Clé Secrète"
Bouvry, Pascal UL; Dumas, J.-G.; Gillard, R. et al

in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006)

Detailed reference viewed: 106 (1 UL)
Peer Reviewed
See detailApplicative Solutions for Safe Computations in Distributed Environments
Varrette, Sébastien UL; Roch, J.-L.; Leprévost, Franck UL

in Workshop "Trustworthy Software" (2006)

Detailed reference viewed: 49 (0 UL)
Peer Reviewed
See detailchap. "Cryptographie à Clé Publique"
Dumas, J.-G.; Leprévost, Franck UL; Roch, J.-L. et al

in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006)

Detailed reference viewed: 65 (0 UL)
Peer Reviewed
See detailSafe Distributed Architecture for Image-based Computer Assisted Diagnosis
Varrette, Sébastien UL; Roch, J.-L.; Montagnat, J. et al

in Proc. of the IEEE Intl. Conf. on Pervasive Services, Workshop on Health Pervasive Systems (HPS'06) (2006)

Detailed reference viewed: 58 (0 UL)
Peer Reviewed
See detailAuthentification Distribuée sur Grille de Grappes basée sur LDAP
Varrette, Sébastien UL; Georget, S.; Roch, J.-L. et al

in Proc. des 16èmes rencontres francophones du parallélisme (RenPar'16) (2005)

Detailed reference viewed: 55 (2 UL)
Peer Reviewed
See detailSecure Architecture for Clusters and Grids
Varrette, Sébastien UL; Roch, J.-L.; Denneulin, Y. et al

in Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004) (2004)

Detailed reference viewed: 68 (3 UL)
Peer Reviewed
See detailUsing Data-Flow Analysis for Resilence and Result Checking in Peer to Peer Computations
Jafar, S.; Varrette, Sébastien UL; Roch, J.-L.

in Proc. of the 1th Intl. Workshop on Grid and Peer-to-Peer Computing Impacts on Large Scale Heterogeneous Distributed Database Systems (GLOBE'04) (2004)

Detailed reference viewed: 43 (0 UL)
Peer Reviewed
See detailFlowCert : Probabilistic Certification for Peer-to-Peer Computations
Varrette, Sébastien UL; Roch, J.-L.; Leprévost, Franck UL

in Proc. of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004) (2004)

Detailed reference viewed: 136 (2 UL)