Search
The subject of this project is the improvement of the chromatic response of the Diffractive Optically Variable Image Devices (DOVID) used for Optical Documents Security (ODS), The main objective is to generate new visual and chromatic effects, in order to enhance the robustness of the security hol
Forensic sciences are central to criminal investigations since uncovering, collecting and analyzing crime scenes evidences allows clear identification of suspects. Improvement of existing protocols is thus a field of intense research in forensic sciences. Dactyloscopy which is the science of fingerp
With the convergence of mobile communications, sensors and online social networks technologies, we are witnessing an exponential increase in the acquisition of personal data. All these data end up in corporate servers or in the Cloud and introduce an unprecedented threat on privacy. The PerSoCloud p
The objective of FILTER2 (FILtrage negaTif des contEnus de videopRotection 2.0) is to provide the forensics investigators faced with huge digital CCTV files with automatic solutions guiding them in the optimized sequence to use when such files or segments thereof) need to be processed by video analy
TLS/SSL (currently version TLS 1.2) is one of the 3 essential cryptographic protocols used today (together with SSH and IPSec). Despite its central role in securing e-commerce, Internet browsing, email, VoIP, etc., despite the fact that almost every search and connection query in every browser in th
Populations are increasingly vulnerable to disastrous natural or technological events, as demographic and urban growth lead to greater exposures of goods and people. Large scale evacuation strategies are efficient tools for mitigating this vulnerability. Nonetheless, risks incurred during an importa
Since September 11, 2001, “radicalization” has become a category and major topic of public and scientific debate in the Anglo-Saxon world. The same applies to France, particularly since the January and September 2015 attacks. But as soon as we turn our attention towards political and geographical ar
Abstract Biometric solutions increasingly appear into our everyday life, such as for instance access control terminals, biometric passports and mobile phones, with fingerprint recognition system in the first place. This continuous expansion of biometrics leads to attempts to circumvent biometric
The identification of biochemical molecules is a major challenge for applications ranging from biology, health control, medicine, air quality monitoring or the detection of CBRN-E agents. The most widespread techniques are mass spectrometry and ion mobility spectrometry, but also dogs. However, none
Cryptography is a crucial and ubiquitous component of information security. It permits to deal with basic computer security needs, related to e.g. confidentiality, privacy, integrity or authentication, but also more unconventional ones. For instance, the basic goal of an encryption scheme is to guar
The Ebola epidemic in West Africa, and more recently Zika virus, have highlighted our vulnerability to outbreaks of infection disease. In the current geopolitical context, terrorist and bioterrorism threats grow. These bioterrorist attacks can be performed with bacteria, viruses or toxins. Among the
The ID-Fix project aims to improve authentication methods in everyday communication. Usually there is a clash between two worlds at this level, on one hand academic research tends to propose solutions proven secure in some abstract model without real consideration for efficiency, while industrial te
The virtualisation of financial transactions is ubiquitous. While payment cards do not offer anonymity, electronic cash does, but despite extensive research it has hardly ever been deployed. Instead, users are increasingly turning to ``crypto\-currencies" like Bitcoin, which provide online payments
The goal of project DEREC is to demonstrate the feasibility of relativistic cryptography, a new and exciting research direction which takes advantage of the No Superluminal Signaling (NSS) principle in order to perform various cryptographic tasks. NSS states that no information carrier can travel at
Populations located on active volcanoes are at huge risk from both explosive and effusive eruptions. Although the explosive risk is well known and researched, the effusive risk less so. Fatalities are very rare during effusive eruptions, but lava flow inundation will require replacement and/or rel
Europe and France have been shaken by a major social crisis provoking divisions and conflicts within populations in a context of repeated terrorist attacks as well as an unprecedented migrant wave. In a Europe of closing borders, there is fertile ground for acts of racism and intolerance which can j