17 research outputs found

    Femmes des anti-LumiĂšres, femmes apologistes

    Get PDF
    This book questions the place occupied by women, reputed to be "quarrelsome" according to Richelet, in the polemical exchanges supposed to guarantee their faith and put a mute to the words of "philosophy" of the Enlightenment

    Symbolic verification of privacy-type properties for security protocols with XOR (extended version)

    Get PDF
    In symbolic verification of security protocols, process equivalences have recently been used extensively to model strong secrecy, anonymity and unlinkability properties. However, tool support for automated analysis of equivalence properties is limited compared to trace properties, e.g., modeling authentication and weak notions of secrecy. In this paper, we present a novel procedure for verifying equivalences on finite processes, i.e., without replication, for protocols that rely on various cryptographic primitives including exclusive or (xor). We have implemented our procedure in the tool AKISS, and successfully used it on several case studies that are outside the scope of existing tools, e.g., unlinkability on various RFID protocols, and resistance against guessing attacks on protocols that use xor

    Symbolic verification of privacy-type properties for security protocols with XOR

    Get PDF
    International audienceIn symbolic verification of security protocols, process equivalences have recently been used extensively to model strong secrecy, anonymity and unlinkability properties. However, tool support for automated analysis of equivalence properties is limited compared to trace properties, e.g., modeling authentication and weak notions of secrecy. In this paper, we present a novel procedure for verifying equivalences on finite processes, i.e., without replication, for protocols that rely on various cryptographic primitives including exclusive or (xor). We have implemented our procedure in the tool AKISS, and successfully used it on several case studies that are outside the scope of existing tools, e.g., unlinkability on various RFID protocols, and resistance against guessing attacks on protocols that use xor

    Combining magnetic nanoparticles with cell derived microvesicles for drug loading and targeting

    Get PDF
    International audienceInspired by microvesicle-mediated intercellular communication, we propose a hybrid vector for magnetic drug delivery. It consists of macrophage-derived microvesicles engineered to enclose different therapeutic agents together with iron oxide nanoparticles. Here, we investigated in vitro how magnetic nanoparticles may influence the vector effectiveness in terms of drug uptake and targeting. Human macrophages were loaded with iron oxide nanoparticles and different therapeutic agents: a chemotherapeutic agent (doxorubicin), tissue-plasminogen activator (t-PA) and two photosensitizers (disulfonated tetraphenyl chlorin-TPCS2a and 5,10,15,20-tetra(m-hydroxyphenyl)chlorin-mTHPC). The hybrid cell microvesicles were magnetically responsive, readily manipulated by magnetic forces and MRI-detectable. Using photosensitizer-loaded vesicles, we showed that the uptake of microvesicles by cancer cells could be kinetically modulated and spatially controlled under magnetic field and that cancer cell death was enhanced by the magnetic targeting

    Femmes des anti-LumiĂšres, femmes apologistes

    Get PDF
    This book questions the place occupied by women, reputed to be "quarrelsome" according to Richelet, in the polemical exchanges supposed to guarantee their faith and put a mute to the words of "philosophy" of the Enlightenment.Ce livre s’interroge sur la place qu’ont occupĂ©e les femmes, rĂ©putĂ©es « querelleuses » selon Richelet, dans les Ă©changes polĂ©miques censĂ©s garantir leur foi et mettre une sourdine aux propos de « la philosophie » des LumiĂšres
    corecore