Jean-Louis Lanet
Orcid: 0000-0002-4751-3941Affiliations:
- INRIA, France
According to our database1,
Jean-Louis Lanet
authored at least 97 papers
between 1996 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
ACM Comput. Surv., 2022
2021
Proceedings of the Smart Card Research and Advanced Applications, 2021
2020
J. Comput. Virol. Hacking Tech., 2020
A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures.
Softw. Pract. Exp., 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Preface of the 2<sup>nd</sup> Workshop on the Security of Software/Hardware Interfaces (SILM 2020).
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Int. J. Inf. Sec., 2019
Int. J. Crit. Comput. Based Syst., 2019
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019
Proceedings of the 2019 International Workshop on Big Data and Information Security, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
<i>JavaNeighbors</i>: Improving <i>ChuckyJava</i>'s neighborhood discovery algorithm.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
2018
Machine learning techniques to predict sensitive patterns to fault attack in the Java Card application.
J. Exp. Theor. Artif. Intell., 2018
Int. J. Interact. Mob. Technol., 2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Int. J. Crit. Comput. Based Syst., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security Theory and Practice, 2017
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Secure IT Systems, 2017
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017
2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
Proceedings of the Smart Card Research and Advanced Applications, 2016
2015
Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems, 2015
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
2014
J. Comput. Virol. Hacking Tech., 2014
Int. J. Trust. Manag. Comput. Commun., 2014
Proceedings of the Third IEEE International Colloquium in Information Science and Technology, 2014
Proceedings of the Smart Card Research and Advanced Applications, 2014
Proceedings of the Smart Card Research and Advanced Applications, 2014
2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Proceedings of the Computer Safety, Reliability, and Security, 2013
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
Proceedings of the Proceedings Fourth International Symposium on Symbolic Computation in Software Science, 2012
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the Workshops Proceedings of the 27th International Conference on Data Engineering, 2011
Proceedings of the CRiSIS 2011, 2011
Proceedings of the Smart Card Research and Advanced Applications, 2011
Proceedings of the Smart Card Research and Advanced Applications, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Reusing a JML Specification Dedicated to Verification for Testing, and Vice-Versa: Case Studies.
J. Autom. Reason., 2010
Proceedings of the Future Generation Information Technology, 2010
2009
Proceedings of the 4th Workshop on Embedded Systems Security, 2009
2006
Proceedings of the Formal Methods for Components and Objects, 5th International Symposium, 2006
2004
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Proceedings of the FME 2003: Formal Methods, 2003
2002
J. Comput. Secur., 2002
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002
2000
Proceedings of the ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29, 2000
Proceedings of the Java on Smart Cards: Programming and Security, 2000
Proceedings of the Computer Security, 2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
Proceedings of the Software Engineering, 1999
How to Formally Specify the Java Bytecode Semantivs Using the B Method.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999
1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1996
Proceedings of the Euro-Par '96 Parallel Processing, 1996