Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marc Eluard is active.

Publication


Featured researches published by Marc Eluard.


Lecture Notes in Computer Science | 2001

An Operational Semantics of the Java Card Firewall

Marc Eluard; Thomas P. Jensen; Ewen Denney

This paper presents an operational semantics for a subset of Java Card bytecode, focussing on aspects of the Java Card firewall, method invocation, field access, variable access, shareable objects and contexts. The goal is to provide a precise description of the Java Card firewall using standard tools from operational semantics. Such a description is necessary for formally arguing the correctness of tools for validating the security of Java Card applications.


smart card research and advanced application conference | 2008

SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow

Alain Durand; Marc Eluard; Sylvain Lelievre; Christophe Vincent

This paper introduces Smart Pro , a smart card based technology aiming at protecting content in professional workflows. It gives an overview on how Smart Pro works. It also explains the design constrains that led to the use of smart cards and some of the extra difficulties implied by this choice in order to get to an implementation that may be industrially deployed.


Technique Et Science Informatiques | 2004

Validation du contrôle d'accès dans des cartes à puce multiapplications

Marc Eluard; Thomas P. Jensen

The access control exercised by the Java Card firewall can be bypassed by the use of shareable objects. To help detecting unwanted access to objects, we propose a static analysis that calculates a safe approximation of the possible flow of objects between Java Card applets. The analysis deals with a subset of the Java Card bytecode focussing on aspects of the Java Card firewall, method invocation, field access, variable access, shareable objects and contexts. The technical vehicle for achieving this task is a new kind of constraints: quantified conditional constraints, that permits us to model precisely yet cost-effectively the effects of the Java Card firewall by only producing a constraint if the corresponding operation is authorized by the firewall.


smart card research and advanced application conference | 2002

Secure object flow analysis for java card

Marc Eluard; Thomas P. Jensen


Archive | 2013

METHODS AND DEVICES FOR 3D OBJECT PROTECTION USING SURFACE SUBDIVISION

Eric Diehl; Olivier Heen; Yves Maetz; Marc Eluard


Archive | 2011

Method and a device for generating a secret value

Yves Maetz; Marc Eluard; Davide Alessio; Gilles Desoblin


Archive | 2013

Geometry-preserving Encryption for 3D Meshes

Marc Eluard; Yves Maetz; Gwenaël J. Doërr


Archive | 2012

Method and device for 3D object protection by transformation of its points

Marc Eluard; Yves Maetz; Sylvain Lelievre


Archive | 2009

Copy-protected software cartridge

Eric Diehl; Marc Eluard; Nicolas Prigent


Archive | 2013

Methods and devices for optimising rendering of an encrypted 3d graphical object

Yves Maetz; Marc Eluard

Collaboration


Dive into the Marc Eluard's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge