Damien Sauveron
Orcid: 0000-0001-7948-6143
According to our database1,
Damien Sauveron
authored at least 54 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Forensic Sci. Int. Digit. Investig., 2024
Comput. Networks, 2024
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study.
IEEE Access, 2024
2023
IEEE Access, 2023
2022
IEEE Access, 2022
2021
Medical Equipment Used for Forensic Data Extraction: A low-cost solution for forensic laboratories not provided with expensive diagnostic or advanced repair equipment.
Digit. Investig., 2021
IEEE Access, 2021
Enhancing security using digital signature in an efficient Network Coding-enabled WSN.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021
2020
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications.
Peer-to-Peer Netw. Appl., 2020
TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks.
Hum. centric Comput. Inf. Sci., 2020
Special Issue on Soft Computing for Network and System Security of Internet of Everything.
Appl. Soft Comput., 2020
A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
2019
A Lightweight and Secure Data Collection Serverless Protocol Demonstrated in an Active RFIDs Scenario.
ACM Trans. Embed. Comput. Syst., 2019
Multim. Tools Appl., 2019
2018
A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks.
Hum. centric Comput. Inf. Sci., 2018
Future Gener. Comput. Syst., 2018
2017
CoRR, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
2016
Pervasive Mob. Comput., 2016
CoRR, 2016
Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks.
CoRR, 2016
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2015
Inf. Sci., 2015
Int. J. Distributed Sens. Networks, 2015
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
Multim. Tools Appl., 2014
EURASIP J. Wirel. Commun. Netw., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
Editorial: advanced semantic and social multimedia technologies for future computing environment.
Multim. Tools Appl., 2013
Comput. J., 2013
2012
Secur. Commun. Networks, 2012
Math. Comput. Model., 2012
2009
Inf. Secur. Tech. Rep., 2009
Inf. Secur. Tech. Rep., 2009
2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
2007
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007
Proceedings of the Future Generation Communication and Networking, 2007
2006
The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications.
Proceedings of the Security in Information Systems, 2006
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006
2005
An Efficient and Simple Way to Test the Security of Java CardsTM.
Proceedings of the Security in Information Systems, 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
2004
Study and realization of an experimentation and modeling environment for Java Card technology. Application to security. (Étude et réalisation d'un environnement d'expérimentation et de modélisation pour la technologie Java Card. Application à la sécurité).
PhD thesis, 2004