Open Access
| Issue |
J3eA
Volume 18, 2019
JPCNFM 2018 – 15e journées pédagogiques du CNFM (Coordination nationale pour la formation en micro-électronique et en nanotechnologies)
|
|
|---|---|---|
| Article Number | 1017 | |
| Number of page(s) | 10 | |
| DOI | https://doi.org/10.1051/j3ea/20191017 | |
| Published online | 18 octobre 2019 | |
- https://fr.statista.com/statistiques/584481/internet-des-objets-nombre-d-appareils-connectes-dans-le-monde--2020/ [Google Scholar]
- D. Dagon, T. Martin, and T. Starner : “Mobile phones as computing devices: The viruses are coming!” Pervasive Computing, IEEE, 3(4), pp. 11–15 (2004) [Google Scholar]
- M. Wolf, A. Weimerskirch, and T. Wollinger : “State of the art: Embedding security in vehicles,” EURASIP Journal on Embedded Systems, 2007 (1), pp. 1–16 (2007) [CrossRef] [Google Scholar]
- D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, et al.: “Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses,” in Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, pp. 129–142 (2008) [Google Scholar]
- F. Bruguier, P. Benoit, L. Torres : “Enseignement de la sécurité numérique : De la sensibilisation à l'expertise”, J3eA2017, 1004 (2017) [Google Scholar]
- M. Bourrée, F. Bruguier, L. Barthe, et al. : “Secnum: an open characterizing platform for integrated circuits”, Proc. Euro. Work. Microelectronics Education, Grenoble, France, 88–91 (2012) [Google Scholar]
- J. Turner, S.G Paris, How literacy tasks influence children’s motivation for literacy. The reading teacher, 48(8), 662–673 (1995) [Google Scholar]
- L. Bossuet, Teaching FPGA security. Proc. International Conference in Field-Programmable Technology (FPT), 306–309 (2013) [Google Scholar]
- Koushanfar, Farinaz, and Miodrag Potkonjak. "Hardware security: preparing students for the next design frontier." IEEE International Conference on Microelectronic Systems Education (MSE'07). IEEE (2007). [Google Scholar]
- B. Halak, Course on secure hardware design of silicon chips. IET Circuits, Devices & Systems 11(4), 304–309 (2017) [CrossRef] [Google Scholar]
- F. Bruguier, P. Benoit, L. Torres, and L. Bossuet. Hardware security: From concept to application. In Proc. 11th European Workshop on Microelectronics Education (EWME). 1–6 (2016) [Google Scholar]
- N.H Mackworth, The breakdown of vigilance during prolonged visual search. Quarterly Journal of Experimental Psychology, 1(1), 6–21 (1948) [CrossRef] [Google Scholar]
- L.A. Annetta, The “I’s” have it: A framework for serious educational game design. Review of General Psychology 14(2) 105 (2010) [CrossRef] [Google Scholar]
- J. Alvarez, D. Djaouti, et O. Rampnoux, “Apprendre avec les serious games ? ”, Réseau Canopé. [Google Scholar]
- P. Nadam, M. Fenaert, A. Petit, “Créer SON énigme”, 2018, http://scape.enepe.fr/creer-son-enigme.html [Google Scholar]
- D. Halperin, Th.S. Heydt-Benjamin, B. Ransford, S.S Clark, B. Defend, W. Morgan, K. Fu, Tadayoshi Kohno, and W.H Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. IEEE Symposium on In Security and Privacy, 129–142 (2008) [Google Scholar]
- P. Lévy and R. Bononno, Collective intelligence: Mankind’s emerging world in cyberspace. Perseus books, (1997) [Google Scholar]
- P. Nadam, “Les contraintes d’un escape game en classe”, http://scape.enepe.fr/les-contraintes-d-un-escape-game-en-classe.html (http://scape.enepe.fr/les-contraintes-d-un-escape-game-en-classe.html) [Google Scholar]
- P. Nadam, M. Fenaert, A. Petit, “Édu Game Master, quand le prof se prend au jeu !”, http://scape.enepe.fr/edugamemaster.html (2018) [Google Scholar]
- S. Granger, Social engineering fundamentals, part I: hacker tactics. Security Focus, December 18 (2001). [Google Scholar]
- K. Goyal and S. Kinger, Modified Caesar cipher for better security enhancement. International Journal of Computer Applications 73(3) (2013) [Google Scholar]
- T. Kelly, The Spartan Scytale. The Craft of the Ancient Historian: Essays’ in honor of Chester G. Starr 141–169 (1985) [Google Scholar]
- P. Engebretson, The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier (2013) [Google Scholar]
- P. Kocher, J. Jaffe, and B. Jun, Differential power analysis. In Annual International Cryptology Conference. Springer, 388–397 (1999) [Google Scholar]
- E. Brier, Ch. Clavier, and F. Olivier, Correlation power analysis with a leakage model. In International workshop on cryptographic hardware and embedded systems. Springer, 16–29 (2004) [Google Scholar]
- BS Bloom, Bloom’s taxonomy of educational objectives. Longman (1965) [Google Scholar]
- Arduboy. https://arduboy.com/ [Google Scholar]
- Film : “La septième compagnie”, Robert Lamoureux (1973) [Google Scholar]
- Vidéo en ligne, AMUSE : https://www.youtube.com/watch?v=-weijQTu4Io (2019) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.
