Jean-François Lalande

Learn More
—Covert channels enable a policy-breaking communication not foreseen by a system's design. Recently, covert channels in Android were presented and it was shown that these channels can be used by malware to leak confidential information (e.g., contacts) between applications and to the Internet. Performance aspects as well as means to counter these covert(More)
— This paper presents an algorithm for resource allocation in satellite networks 1. It deals with planning a time/frequency plan for a set of terminals with a known geometric configuration under interference constraints. Our objective is to maximize the system throughput while guaranteeing that the different types of demands are satisfied, each type using a(More)
To ensure the privacy of users in transport systems, researchers are working on new protocols providing the best security guarantees while respecting functional requirements of transport operators. In this paper 1 , we design a secure NFC m-ticketing protocol for public transport that preserves users' anonymity and prevents transport operators from tracing(More)