|
Search the dblp DataBase
Yves Roudier:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Slim Trabelsi, Laurent Gomez, Yves Roudier
Context-Aware Security Policy for the Service Discovery. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:477-482 [Conf]
- Sergio Loureiro, Laurent Bussard, Yves Roudier
Extending Tamper-Proof Hardware Security to Untrusted Execution Environments. [Citation Graph (0, 0)][DBLP] CARDIS, 2002, pp:111-124 [Conf]
- Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva
Enabling adaptive and secure extranets. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2002, pp:123-135 [Conf]
- Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. [Citation Graph (0, 0)][DBLP] ECOWS, 2006, pp:35-43 [Conf]
- Matija Puzar, Jon Andersson, Thomas Plagemann, Yves Roudier
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations. [Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:14-26 [Conf]
- Refik Molva, Yves Roudier
A Distributed Access Control Model for Java. [Citation Graph (0, 0)][DBLP] ESORICS, 2000, pp:291-308 [Conf]
- Yuuji Ichisugi, Yves Roudier
The Extensible Java Preprocessor Kit and a Tiny Data-Parallel Java. [Citation Graph (0, 0)][DBLP] ISCOPE, 1997, pp:153-160 [Conf]
- Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta
Trust and Authorization in Pervasive B2E Scenarios. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:295-309 [Conf]
- Laurent Bussard, Refik Molva, Yves Roudier
History-Based Signature or How to Trust Anonymous Documents. [Citation Graph (0, 0)][DBLP] iTrust, 2004, pp:78-92 [Conf]
- Marc-Olivier Killijian, David Powell, Michel Banâtre, Paul Couderc, Yves Roudier
Collaborative backup for dependable mobile applications. [Citation Graph (0, 0)][DBLP] Middleware for Pervasive and Ad-hoc Computing, 2004, pp:146-149 [Conf]
- Denis Caromel, Yves Roudier
Reactive Programming in Eiffel//. [Citation Graph (0, 0)][DBLP] OBPDC, 1995, pp:125-147 [Conf]
- Laurent Bussard, Yves Roudier, Refik Molva
Untraceable Secret Credentials: Trust Establishment with Privacy. [Citation Graph (0, 0)][DBLP] PerCom Workshops, 2004, pp:122-126 [Conf]
- Thomas Walter, Laurent Bussard, Philip Robinson, Yves Roudier
Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. [Citation Graph (0, 0)][DBLP] SAINT Workshops, 2004, pp:696-701 [Conf]
- Laurent Bussard, Yves Roudier
Embedding Distance-Bounding Protocols within Intuitive Interactions. [Citation Graph (0, 0)][DBLP] SPC, 2003, pp:143-156 [Conf]
- Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier
Enabling Secure Discovery in a Pervasive Environment. [Citation Graph (0, 0)][DBLP] SPC, 2006, pp:18-31 [Conf]
- Françoise Baude, Fabrice Belloncle, Denis Caromel, Nathalie Furmento, Yves Roudier, Philippe Mussi, Günther Siegel
Parallel Object-Oriented Programming for Parallel Simulations. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1996, v:93, n:1, pp:35-64 [Journal]
Distributed Access Control For XML Document Centric Collaborations. [Citation Graph (, )][DBLP]
On the Impact of DoS Attacks on Secure Service Discovery. [Citation Graph (, )][DBLP]
Password Strength: An Empirical Analysis. [Citation Graph (, )][DBLP]
A Security Protocol for Self-Organizing Data Storage. [Citation Graph (, )][DBLP]
Ontology-Based Secure XML Content Distribution. [Citation Graph (, )][DBLP]
Secure Service Publishing with Untrusted Registries - Securing Service Discovery. [Citation Graph (, )][DBLP]
A Game Theoretical Approach in Securing P2P Storage against Whitewashers. [Citation Graph (, )][DBLP]
A Game Theoretic Model of a Protocol for Data Possession Verification. [Citation Graph (, )][DBLP]
Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory. [Citation Graph (, )][DBLP]
A Secure Comparison Technique for Tree Structured Data. [Citation Graph (, )][DBLP]
Towards Secure Content Based Dissemination of XML Documents. [Citation Graph (, )][DBLP]
Document-Based Dynamic Workflows: Towards Flexible and Stateful Services. [Citation Graph (, )][DBLP]
Measuring Password Strength: An Empirical Analysis [Citation Graph (, )][DBLP]
Securing Ad Hoc Storage through Probabilistic Cooperation Assessment. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.282secs
|