Search Results - "Sauveron, D."
-
1
CRAFT: A Continuous Remote Attestation Framework for IoT
Published in IEEE access (2021)“…As Internet of Things (IoT) networks keep growing with regards to the number of devices they contain, they become more attractive targets for attackers…”
Get full text
Journal Article -
2
New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards
Published in IEEE access (2022)“…Over the past twenty years, Secure Digital memory cards have become the most popular digital storage media. Therefore, forensic experts need to develop…”
Get full text
Journal Article -
3
A Link Reliability Study of Optical Wireless Headset inside Aircraft Cockpit
Published in 2019 Global LIFI Congress (GLC) (01-06-2019)“…Communications inside an aircraft cockpit are currently based on wired or radiofrequency connections. For instance, wireless ones have been introduced to…”
Get full text
Conference Proceeding -
4
Case of study for in situ memory reading on damaged MultiMedia Card
Published in Forensic science international. Digital investigation (Online) (01-03-2024)Get full text
Journal Article -
5
-
6
Advanced Security Technologies and Services for Future Computing Environments
Published in Computer journal (01-10-2013)“…The objectives of this special issue are advanced security technologies and services for future computing environments, including, but not limited to, security…”
Get full text
Journal Article -
7
CRAFT: A Continuous Remote Attestation Framework for IoT
Published in Access, IEEE (2021)“…As Internet of Things (IoT) networks keep growing with regards to the number of devices they contain, they become more attractive targets for attackers…”
Get full text
Standard -
8
Which Trust Can Be Expected of the Common Criteria Certification at End-User Level?
Published in Future Generation Communication and Networking (FGCN 2007) (01-12-2007)“…For the end-user of IT (information technologies) products, several questions exist about their real security. For instance, in the case of a smart card which…”
Get full text
Conference Proceeding -
9
Overview of Security Threats for Smart Cards in the Public Transport Industry
Published in 2008 IEEE International Conference on e-Business Engineering (01-10-2008)“…The advantages of utilising smart card technology, more importantly contactless smart cards, in the transport industry have long been realised. In this paper…”
Get full text
Conference Proceeding -
10
Secure distributed computing on a Java Card/spl trade/ grid
Published in 19th IEEE International Parallel and Distributed Processing Symposium (2005)“…More and more pieces of hardware are being connected to the Internet every day. Technologies such as Bluetooth or Wi-Fi make this evolution even faster. To…”
Get full text
Conference Proceeding -
11
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Published in 2008 Second International Conference on Emerging Security Information, Systems and Technologies (01-08-2008)“…Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity…”
Get full text
Conference Proceeding -
12
Secure Collaborative and Distributed Services in the Java Card Grid Platform
Published in International Symposium on Collaborative Technologies and Systems (CTS'06) (2006)“…Ensuring the security of services in a distributed system requires the collaboration of all the elements involved in providing this service. In this paper we…”
Get full text
Conference Proceeding