


{"id":481,"date":"2016-02-29T16:19:16","date_gmt":"2016-02-29T15:19:16","guid":{"rendered":"https:\/\/csins2i.irisa.fr\/?p=481"},"modified":"2019-09-11T15:07:46","modified_gmt":"2019-09-11T13:07:46","slug":"seminaire-thematique-securite-en-sciences-de-linformation","status":"publish","type":"post","link":"http:\/\/csins2i.irisa.fr\/en\/seminaire-thematique-securite-en-sciences-de-linformation\/","title":{"rendered":"Thematic workshop &#8220;Security in information sciences&#8221;"},"content":{"rendered":"<p><\/p>\n<h2 style=\"text-align: center;\">Thematic Workshop\u00a0of Ins2I\u00a0Scientific Council on Security and Information Sciences<\/h2>\n<p style=\"text-align: center;\"><em>February 29th, 2016<\/em><\/p>\n\n<h4><strong>Official report of the Scientific Council on\u00a0&#8220;Security and Information Sciences&#8221;<\/strong><\/h4>\n<ul>\n<li>Report approved on Sept. 9th, 2016 (<em>in French<\/em>)\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/02\/Fiche-de-synthese-securite-CSI-2016-09-19.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4><strong>List of presentations, CSI INS2I, Feb. 29th 2016:<\/strong><\/h4>\n<ul>\n<li>\n<h5>Guy Gogniat : Introduction\u00a0f the workshop<\/h5>\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/Intro-Journ\u00e9e-Thematique-s\u00e9curit\u00e9.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<li>\n<h5>Jean-Marc J\u00e9z\u00e9quel &#8211; IRISA -Research in Cyber Security is dual (civil\u2010military) &amp; multi disciplinary<\/h5>\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/JM-Jezequel_ResearchPanorama.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<li>\n<h5>Jean-Yves Marion &#8211; LORIA -Enjeux et avanc\u00e9es dans le domaine de la virologie<\/h5>\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/CSI-Jean-Yves-Marion.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<li>\n<h5>David Monniaux &#8211; VERIMAG &#8211; Formal Verification and Security<\/h5>\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/Monniaux_2016-02-29_CS_INS2I_securite.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4><strong>Thematic Seminar \u00a0&#8220;Security&#8221;, CSI INS2I, Dec. 9 2013<\/strong><\/h4>\n<ul>\n<li>\n<h5>Introduction :\u00a0(Hubert Comon-Lundh<em>,\u00a0ENS Cachan<\/em>)<\/h5>\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/insii-SecuriteIntro1.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<li>\n<h5>Research on protocols security\u00a0(V\u00e9ronique Cortier<em>, LORIA, Nancy<\/em>)<\/h5>\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/VeroniqueCortier.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<li>\n<h5>System Security\u00a0(Loic Duflot, ANSSI)<\/h5>\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/LoicDuflot_presentation_CNRS.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<li>\n<h5>Research in Cryptography\u00a0(David Pointcheval, <em>CNRS<\/em>, <em>ENS Paris<\/em>)<\/h5>\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/DavidPointcheval.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<li>Conclusion\n<ul>\n<li>[gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/insii-SecuriteConclusion.pdf&#8221;]<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Thematic Workshop\u00a0of Ins2I\u00a0Scientific Council on Security and Information Sciences February 29th, 2016 Official report of the Scientific Council on\u00a0&#8220;Security and Information Sciences&#8221; Report approved on Sept. 9th, 2016 (in French) [gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/02\/Fiche-de-synthese-securite-CSI-2016-09-19.pdf&#8221;] List of presentations, CSI INS2I, Feb. 29th 2016: Guy Gogniat : Introduction\u00a0f the workshop [gview file=&#8221;https:\/\/csins2i.irisa.fr\/files\/2016\/01\/Intro-Journ\u00e9e-Thematique-s\u00e9curit\u00e9.pdf&#8221;] Jean-Marc J\u00e9z\u00e9quel &#8211; IRISA -Research in Cyber &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"http:\/\/csins2i.irisa.fr\/en\/seminaire-thematique-securite-en-sciences-de-linformation\/\">Continue reading<\/a><\/p>\n","protected":false},"author":284,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[11,14],"tags":[],"class_list":["post-481","post","type-post","status-publish","format-standard","hentry","category-csi_meeting","category-seminaire-thematique","item-wrap"],"_links":{"self":[{"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/posts\/481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/users\/284"}],"replies":[{"embeddable":true,"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/comments?post=481"}],"version-history":[{"count":11,"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/posts\/481\/revisions"}],"predecessor-version":[{"id":584,"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/posts\/481\/revisions\/584"}],"wp:attachment":[{"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/media?parent=481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/categories?post=481"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/csins2i.irisa.fr\/en\/wp-json\/wp\/v2\/tags?post=481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}