scispace - formally typeset
Search or ask a question
Institution

Orange S.A.

CompanyParis, France
About: Orange S.A. is a company organization based out in Paris, France. It is known for research contribution in the topics: Terminal (electronics) & Signal. The organization has 6735 authors who have published 9190 publications receiving 156440 citations. The organization is also known as: Orange SA & France Télécom.


Papers
More filters
Book ChapterDOI
30 Nov 2003
TL;DR: The new algorithm can be described as an iterative block cipher belonging to the class of multivariate schemes and it has advantages in terms of performance over existing traitor tracing schemes and furthermore, it allows to restrict overheads to one single block per encrypted content payload.
Abstract: In this paper we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys providing distinct descriptions of the same instance of the block cipher. But it is computationally difficult, given one or even up to k equivalent keys, to recover the so called meta-key from which they were derived, or to find any additional equivalent key, or more generally to forge any new untraceable description of the same instance of the block cipher. Therefore, if each legitimate user of a digital content distribution system based on encrypted information broadcast (e.g. scrambled pay TV, distribution over the Internet of multimedia content, etc.) is provided with one of the equivalent keys, he can use this personal key to decrypt the content. But it is conjectured infeasible for coalitions of up to k traitors to mix their legitimate personal keys into untraceable keys they might redistribute anonymously to pirate decoders. Thus, the proposed block cipher inherently provides an efficient traitor tracing scheme [4]. The new algorithm can be described as an iterative block cipher belonging to the class of multivariate schemes. It has advantages in terms of performance over existing traitor tracing schemes and furthermore, it allows to restrict overheads to one single block (i.e. typically 80 to 160 bits) per encrypted content payload. Its strength relies upon the difficulty of the “Isomorphism of Polynomials” problem [17], which has been extensively investigated over the past years. An initial security analysis is supplied.

55 citations

Patent
25 Mar 2005
TL;DR: In this article, the authors present a facility for an application server operating externally to an internet protocol multi-media system (IMS) network to have controlled access to resources within the IMS network.
Abstract: A security node (SN) controls access to an internet protocol multi-media system (IMS) (1) from an application server (12) outside the system. The multi-media system includes a session protocol server S-CSCF (4) and a subscriber database HSS (2). The security node comprises a database access control node operable to control access to the subscriber database HSS from the application server, a session message control node operable to control communication of the messages to the session protocol server from the application server, and a control information database for storing control data. The control data specifies conditions for accessing the subscriber database HSS and for communicating with the session protocol server S-CSCF. The database access control node is operable to control access to the subscriber database in accordance with the control data, and the session message control node is operable to control communication of messages to the session protocol server in accordance with the control data. Embodiments of the present invention can provide a facility for an application server operating externally to an internet protocol multi-media system IMS network to have controlled access to resources within the IMS network. For example, the access may be controlled in accordance with a policy agreed between an operator of the IMS network and an operator of the application server.

55 citations

Journal ArticleDOI
TL;DR: In this paper, the relationship between various morphologies and lattice mismatch is discussed by reviewing the competition between elastic energy and surface energy and it is shown that the relaxation can be partially or fully frozen by decreasing the growth temperature or increasing the V/III flux ratio.

54 citations

Journal ArticleDOI
TL;DR: This paper gives an overview of Part 1 of ISO/IEC 15939 (MPEG-7 Systems) and describes the status of the standardization effort, as well as future extensions of the specification.
Abstract: This paper gives an overview of Part 1 of ISO/IEC 15939 (MPEG-7 Systems). It first presents the objectives of the MPEG-7 Systems activity. In the MPEG-1 and MPEG-2 standards, "Systems" referred only to overall architecture, multiplexing, and synchronization. In MPEG-4, in addition to these issues, the Systems part encompasses interactive scene description, content description, and programmability, MPEG-7 brings new challenges to the Systems expertise, such as languages for description representation, binary representation of descriptions, and delivery of descriptions either separate or jointly with the audio-visual content. The paper then presents the description of the MPEG-7 Systems specification, starting from the general architecture up to the description of the individual MPEG-7 Systems tools. Finally, a conclusion describes the status of the standardization effort, as well as future extensions of the specification.

54 citations

Proceedings ArticleDOI
03 Mar 2004
TL;DR: After a review of the state of the art with respect to honeypots, a wish to use data collected by honeypots to validate fault assumptions required when designing intrusion-tolerant systems is established.
Abstract: We report on an experiment run with several honeypots for 4 months. The motivation of this work resides in our wish to use data collected by honeypots to validate fault assumptions required when designing intrusion-tolerant systems. This work in progress establishes the foundations for a feasibility study into that direction. After a review of the state of the art with respect to honeypots, we present our test bed, discuss results obtained and lessons learned. Avenues for future work are also proposed.

54 citations


Authors

Showing all 6762 results

NameH-indexPapersCitations
Patrick O. Brown183755200985
Martin Vetterli10576157825
Samy Bengio9539056904
Aristide Lemaître7571222029
Ifor D. W. Samuel7460523151
Mischa Dohler6835519614
Isabelle Sagnes6775318178
Jean-Jacques Quisquater6533518234
David Pointcheval6429819538
Emmanuel Dupoux6326714315
David Gesbert6345624569
Yonghui Li6269715441
Sergei K. Turitsyn6172214063
Joseph Zyss6143417888
Jean-Michel Gérard5842114896
Network Information
Related Institutions (5)
Alcatel-Lucent
53.3K papers, 1.4M citations

92% related

Fujitsu
75K papers, 827.5K citations

90% related

Bell Labs
59.8K papers, 3.1M citations

89% related

NEC
57.6K papers, 835.9K citations

89% related

Hewlett-Packard
59.8K papers, 1.4M citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20238
20225
20215
20205
201915
201814