Skip to Main content Skip to Navigation

Sécurité des Communications Ouvertes : Vers une Infrastructure Globale pour les Services d'Authentification

Abstract : "Networks: the last pirate utopia of the Information Age", published journalists Mondo 2000, the magazine cyber1 time [Wiz94]. A dominant technology has each of the last three centuries scored. The eighteenth century was the era of the great industrial revolution specific mechanical systems. The nineteenth century was the age of steam. During the twentieth century, the key technology concerned the collection, processing and distribution of information. We saw, among others, the establishment of a global telephone network, the invention of the radio and television, the birth and unprecedented growth of the IT industry and launch communication satellites [Tan89 ]. During the last years of this century, these areas converge and differences between 'collection, processing, transportation and storage of information quickly fade. The fusion of computers and telecommunications has had a profound influence on the structure of systems. The old model of the single computer serving all processing needs of an organization is found quickly supplanted by that of the performance of work by separate but interconnected computers. Such systems are called computer networks.
Document type :
Complete list of metadata
Contributor : Florent Breuil Connect in order to contact the contributor
Submitted on : Tuesday, May 7, 2013 - 5:41:00 PM
Last modification on : Monday, June 27, 2022 - 3:02:27 AM
Long-term archiving on: : Thursday, August 8, 2013 - 4:07:04 AM


  • HAL Id : tel-00821147, version 1


Suzan Mendes. Sécurité des Communications Ouvertes : Vers une Infrastructure Globale pour les Services d'Authentification. Web. Ecole Nationale Supérieure des Mines de Saint-Etienne; Université Jean Monnet - Saint-Etienne, 1995. Français. ⟨tel-00821147⟩



Record views


Files downloads