The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yves Roudier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Slim Trabelsi, Laurent Gomez, Yves Roudier
    Context-Aware Security Policy for the Service Discovery. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:477-482 [Conf]
  2. Sergio Loureiro, Laurent Bussard, Yves Roudier
    Extending Tamper-Proof Hardware Security to Untrusted Execution Environments. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:111-124 [Conf]
  3. Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva
    Enabling adaptive and secure extranets. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:123-135 [Conf]
  4. Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier
    Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ECOWS, 2006, pp:35-43 [Conf]
  5. Matija Puzar, Jon Andersson, Thomas Plagemann, Yves Roudier
    SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:14-26 [Conf]
  6. Refik Molva, Yves Roudier
    A Distributed Access Control Model for Java. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:291-308 [Conf]
  7. Yuuji Ichisugi, Yves Roudier
    The Extensible Java Preprocessor Kit and a Tiny Data-Parallel Java. [Citation Graph (0, 0)][DBLP]
    ISCOPE, 1997, pp:153-160 [Conf]
  8. Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta
    Trust and Authorization in Pervasive B2E Scenarios. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:295-309 [Conf]
  9. Laurent Bussard, Refik Molva, Yves Roudier
    History-Based Signature or How to Trust Anonymous Documents. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:78-92 [Conf]
  10. Marc-Olivier Killijian, David Powell, Michel Banâtre, Paul Couderc, Yves Roudier
    Collaborative backup for dependable mobile applications. [Citation Graph (0, 0)][DBLP]
    Middleware for Pervasive and Ad-hoc Computing, 2004, pp:146-149 [Conf]
  11. Denis Caromel, Yves Roudier
    Reactive Programming in Eiffel//. [Citation Graph (0, 0)][DBLP]
    OBPDC, 1995, pp:125-147 [Conf]
  12. Laurent Bussard, Yves Roudier, Refik Molva
    Untraceable Secret Credentials: Trust Establishment with Privacy. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:122-126 [Conf]
  13. Thomas Walter, Laurent Bussard, Philip Robinson, Yves Roudier
    Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2004, pp:696-701 [Conf]
  14. Laurent Bussard, Yves Roudier
    Embedding Distance-Bounding Protocols within Intuitive Interactions. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:143-156 [Conf]
  15. Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier
    Enabling Secure Discovery in a Pervasive Environment. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:18-31 [Conf]
  16. Françoise Baude, Fabrice Belloncle, Denis Caromel, Nathalie Furmento, Yves Roudier, Philippe Mussi, Günther Siegel
    Parallel Object-Oriented Programming for Parallel Simulations. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1996, v:93, n:1, pp:35-64 [Journal]

  17. Distributed Access Control For XML Document Centric Collaborations. [Citation Graph (, )][DBLP]


  18. On the Impact of DoS Attacks on Secure Service Discovery. [Citation Graph (, )][DBLP]


  19. Password Strength: An Empirical Analysis. [Citation Graph (, )][DBLP]


  20. A Security Protocol for Self-Organizing Data Storage. [Citation Graph (, )][DBLP]


  21. Ontology-Based Secure XML Content Distribution. [Citation Graph (, )][DBLP]


  22. Secure Service Publishing with Untrusted Registries - Securing Service Discovery. [Citation Graph (, )][DBLP]


  23. A Game Theoretical Approach in Securing P2P Storage against Whitewashers. [Citation Graph (, )][DBLP]


  24. A Game Theoretic Model of a Protocol for Data Possession Verification. [Citation Graph (, )][DBLP]


  25. Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory. [Citation Graph (, )][DBLP]


  26. A Secure Comparison Technique for Tree Structured Data. [Citation Graph (, )][DBLP]


  27. Towards Secure Content Based Dissemination of XML Documents. [Citation Graph (, )][DBLP]


  28. Document-Based Dynamic Workflows: Towards Flexible and Stateful Services. [Citation Graph (, )][DBLP]


  29. Measuring Password Strength: An Empirical Analysis [Citation Graph (, )][DBLP]


  30. Securing Ad Hoc Storage through Probabilistic Cooperation Assessment. [Citation Graph (, )][DBLP]


Search in 0.088secs, Finished in 0.091secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002