{"id":73963,"date":"2018-02-20T13:33:05","date_gmt":"2018-02-20T13:33:05","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/02\/report-distributed-iot-security-standards-workshop-ndss-2018\/"},"modified":"2025-11-27T16:46:32","modified_gmt":"2025-11-27T16:46:32","slug":"report-distributed-iot-security-standards-workshop-ndss-2018","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/report-distributed-iot-security-standards-workshop-ndss-2018\/","title":{"rendered":"Rapport: Atelier du Symposium NDSS sur la s\u00e9curit\u00e9 distribu\u00e9e IdO et sur les normes 2018"},"content":{"rendered":"<p>Le Symposium sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes distribu\u00e9s (<a href=\"https:\/\/www.ndss-symposium.org\">Network and Distributed Systems Security (NDSS) Symposium)\u00a0<\/a>bat son plein pour l&rsquo;ann\u00e9e de son 25e anniversaire. Comme d&rsquo;habitude, <a href=\"https:\/\/www.ndss-symposium.org\/ndss2018\/programme\/\">le programme du symposium<\/a>\u00a0comprend une gamme impressionnante de contenu int\u00e9ressant sur un large \u00e9ventail de sujets.<\/p>\n<p><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/report-distributed-iot-security-standards-workshop-ndss-2018\/\">Pour savoir plus cliquez ici<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le Symposium sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes distribu\u00e9s (Network and Distributed Systems Security (NDSS) Symposium)\u00a0bat son plein pour l&rsquo;ann\u00e9e de son 25e anniversaire. Comme d&rsquo;habitude, le programme du symposium\u00a0comprend une gamme impressionnante de contenu int\u00e9ressant sur un large \u00e9ventail de sujets. Pour savoir plus cliquez ici &nbsp;<\/p>\n","protected":false},"author":38,"featured_media":73964,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,185,170,189,156,4909,4775,183],"tags":[6215,6247,6316],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4103],"class_list":["post-73963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-confiance","category-confidentialite","category-evenements","category-iot-fr","category-renforcer-internet","category-securite-fr","category-technologie","tag-evenements","tag-internet-des-objets-ido","tag-symposium-sur-la-securite-des-reseaux-et-des-systemes-distribues-ndss","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-e1521969111196.jpg",1280,855,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-768x513.jpg",768,513,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-1024x684.jpg",1024,684,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-e1521969111196.jpg",1280,855,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-e1521969111196.jpg",1280,855,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-e1521969111196.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-e1521969111196.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Internet-of-Things-IoT-e1521969111196.jpg",600,401,false]},"uagb_author_info":{"display_name":"Mat Ford","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/ford\/"},"uagb_comment_info":0,"uagb_excerpt":"Le Symposium sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes distribu\u00e9s (Network and Distributed Systems Security (NDSS) Symposium)\u00a0bat son plein pour l&rsquo;ann\u00e9e de son 25e anniversaire. Comme d&rsquo;habitude, le programme du symposium\u00a0comprend une gamme impressionnante de contenu int\u00e9ressant sur un large \u00e9ventail de sujets. Pour savoir plus cliquez ici &nbsp;","authors":[{"term_id":4103,"user_id":38,"is_guest":0,"slug":"ford","display_name":"Mat Ford","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Mat-Ford.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Mat-Ford.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/73963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=73963"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/73963\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/73964"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=73963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=73963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=73963"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=73963"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=73963"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=73963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}