Search Results - "Urien, Pascal"
-
1
Simulation Framework for Misbehavior Detection in Vehicular Networks
Published in IEEE transactions on vehicular technology (01-06-2020)“…Cooperative Intelligent Transport Systems (C-ITS) is an ongoing technology that will change our driving experience in the near future. In such systems,…”
Get full text
Journal Article -
2
Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
Published in Sensors (Basel, Switzerland) (16-12-2021)“…The demand for Internet of Things services is increasing exponentially, and consequently a large number of devices are being deployed. To efficiently…”
Get full text
Journal Article -
3
Mobile money traceability and federation using blockchain services
Published in Annales des télécommunications (01-04-2021)“…This paper discusses a new approach to mobile money, a money transfer solution via mobile phone, which uses accounts associated with Subscriber Identity Module…”
Get full text
Journal Article -
4
Innovative mobile payments in the cloud for connected citizen: The MobiSIM project
Published in 2016 18th Mediterranean Electrotechnical Conference (MELECON) (01-04-2016)“…Payment is a basic facility for citizen, required by numerous services in our everyday life. In this paper we present an innovative and open mobile payment…”
Get full text
Conference Proceeding Journal Article -
5
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
Published in Decision Support Systems (01-03-2014)“…Unless specifically designed for its prevention, none of the existing RFID authentication protocols are immune to relay attacks. Relay attacks generally…”
Get full text
Journal Article -
6
Introducing TLS/DTLS Secure Access Modules for IoT frameworks: Concepts and experiments
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01-07-2017)“…This paper introduces security modules for IoT frameworks. Many IoT legacy infrastructures use the TLS/DTLS protocols for communication security. Security…”
Get full text
Conference Proceeding -
7
The SIMulation project: Demonstrating mobile payments based on cloud services
Published in 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM) (01-06-2016)“…This demonstration shows the mobile payment platform based on cloud services, designed by the SIMulation project. This project is a joint research effort from…”
Get full text
Conference Proceeding -
8
Introducing Secure Element Token With USB Wi-Fi Bluetooth Triple Communication Interfaces
Published in 2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) (26-09-2024)“…This paper introduces an innovative secure element token, which supports three communication interfaces, USB, WiFi, and Bluetooth. The token is built with a…”
Get full text
Conference Proceeding -
9
VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs
Published in ICC 2020 - 2020 IEEE International Conference on Communications (ICC) (01-06-2020)“…Cooperative Intelligent Transport Systems (C-ITS) is a new upcoming technology that aims at increasing road safety and reducing traffic accidents. C-ITS is…”
Get full text
Conference Proceeding -
10
Demonstrating Trusted Blockchain IoT Device Based On TLS-PSK Secure Element
Published in 2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (11-10-2023)“…This demonstration presents an Internet of Things (IoT) device built around a secure element. According to the Blockchain IoT (BIoT) paradigm, it is able to…”
Get full text
Conference Proceeding -
11
Revisiting Multi-Factor Authentication Token Cybersecurity: A TLS Identity Module Use Case
Published in 2024 International Conference on Computing, Networking and Communications (ICNC) (19-02-2024)“…Multi-factor authentication (MFA) procedures are widely used by digital systems. There are usually performed by hardware tokens comprising a microcontroller…”
Get full text
Conference Proceeding -
12
Demonstration of Innovative Trusted TLS-IM Multi-Factor Authentication Token
Published in 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) (06-01-2024)“…This demonstration presents an innovative trusted multi-factor authentication (MFA) token, performing client authentication for TLS1.3 session used with…”
Get full text
Conference Proceeding -
13
Internet of Secure Elements: A New Direction for Secure Elements Use in 6G Landscape: Invited Talk
Published in 2023 Eighth International Conference On Mobile And Secure Services (MobiSecServ) (04-11-2023)“…This talk presents a new and emerging open technology named Internet of Secure Elements (IOSE), whose goal is to enforce trust and security for digital…”
Get full text
Conference Proceeding -
14
A New Approach for Crypto Off-loading Based on Personal HSM
Published in 2023 7th Cyber Security in Networking Conference (CSNet) (16-10-2023)“…Crypto off-loading aims at computing cryptographic procedures in dedicated hardware in order to increase performances or to provide more security and trust…”
Get full text
Conference Proceeding -
15
On Line Secure Elements: Deploying High Security Keystores and Personal HSMs
Published in 2023 International Conference on Computing, Networking and Communications (ICNC) (20-02-2023)“…This paper presents innovative approach to deploy secure elements providing cryptographic resources in TCP/IP environment. The main idea is to execute in…”
Get full text
Conference Proceeding -
16
Demonstrating Low Cost SIM Bluetooth Token For Generation Of Ethereum Transactions
Published in 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (01-05-2023)“…This demonstration presents an original low cost SIM Ethereum Bluetooth token (SIM_ETH_BLE_TOKEN), used from a mobile application, for the generation of…”
Get full text
Conference Proceeding -
17
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case
Published 30-03-2023“…5th Cyber Security in Networking Conference (CSNet), 2021, IEEE, Oct 2021, Rio de Jaineiro, Brazil. pp.49-54 Blockchain transactions are signed by private…”
Get full text
Journal Article -
18
Demonstration Of Performance For Low Cost Personal HSM
Published in 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC) (08-01-2023)“…This demonstration presents an original personal Hardware Secure Module (HSM) server, built from grid of secure elements and host system (Raspberry Pi), with…”
Get full text
Conference Proceeding -
19
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets
Published in 2021 5th Cyber Security in Networking Conference (CSNet) (12-10-2021)“…Blockchain transactions are signed by private keys. Secure key storage and tamper resistant computing, are critical requirements for deployments of trusted…”
Get full text
Conference Proceeding -
20
Personal HSM, Privacy for Subscribers in 5G/6G Networks
Published in 2022 1st International Conference on 6G Networking (6GNet) (06-07-2022)“…This paper presents the concept of personal HSM for 5G/6G networks. In cloud infrastructures, Hardware Secure Modules provide cryptographic services, typically…”
Get full text
Conference Proceeding