Search Results - "Sauveron, D."

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    CRAFT: A Continuous Remote Attestation Framework for IoT by Moreau, L., Conchon, E., Sauveron, D.

    Published in IEEE access (2021)
    “…As Internet of Things (IoT) networks keep growing with regards to the number of devices they contain, they become more attractive targets for attackers…”
    Get full text
    Journal Article
  2. 2

    New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards by Thomas-Brans, F., Heckmann, T., Markantonakis, K., Sauveron, D.

    Published in IEEE access (2022)
    “…Over the past twenty years, Secure Digital memory cards have become the most popular digital storage media. Therefore, forensic experts need to develop…”
    Get full text
    Journal Article
  3. 3

    A Link Reliability Study of Optical Wireless Headset inside Aircraft Cockpit by Joumessi-Demeffo, S., Sahuguede, S., Sauveron, D., Julien-Vergonjanne, A., Combeau, P., Mercier, B., Aveneau, L., Boeglen, H.

    Published in 2019 Global LIFI Congress (GLC) (01-06-2019)
    “…Communications inside an aircraft cockpit are currently based on wired or radiofrequency connections. For instance, wireless ones have been introduced to…”
    Get full text
    Conference Proceeding
  4. 4
  5. 5
  6. 6

    Advanced Security Technologies and Services for Future Computing Environments by Jeong, Young-Sik, Sauveron, Damien, Park, Jong Hyuk

    Published in Computer journal (01-10-2013)
    “…The objectives of this special issue are advanced security technologies and services for future computing environments, including, but not limited to, security…”
    Get full text
    Journal Article
  7. 7

    CRAFT: A Continuous Remote Attestation Framework for IoT by Moreau, L, Conchon, E, Sauveron, D

    Published in Access, IEEE (2021)
    “…As Internet of Things (IoT) networks keep growing with regards to the number of devices they contain, they become more attractive targets for attackers…”
    Get full text
    Standard
  8. 8

    Which Trust Can Be Expected of the Common Criteria Certification at End-User Level? by Dusart, P., Sauveron, D.

    “…For the end-user of IT (information technologies) products, several questions exist about their real security. For instance, in the case of a smart card which…”
    Get full text
    Conference Proceeding
  9. 9

    Overview of Security Threats for Smart Cards in the Public Transport Industry by Markantonakis, K., Mayes, K., Sauveron, D., Askoxylakis, I.G.

    “…The advantages of utilising smart card technology, more importantly contactless smart cards, in the transport industry have long been realised. In this paper…”
    Get full text
    Conference Proceeding
  10. 10

    Secure distributed computing on a Java Card/spl trade/ grid by Chaumette, S., Grange, P., Karray, A., Sauveron, D., Vigneras, P.

    “…More and more pieces of hardware are being connected to the Internet every day. Technologies such as Bluetooth or Wi-Fi make this evolution even faster. To…”
    Get full text
    Conference Proceeding
  11. 11

    A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks by Askoxylakis, I.G., Sauveron, D., Markantonakis, K., Tryfonas, T., Traganitis, A.

    “…Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity…”
    Get full text
    Conference Proceeding
  12. 12

    Secure Collaborative and Distributed Services in the Java Card Grid Platform by Chaumette, S., Karray, A., Sauveron, D.

    “…Ensuring the security of services in a distributed system requires the collaboration of all the elements involved in providing this service. In this paper we…”
    Get full text
    Conference Proceeding