Yves Deswarte
Orcid: 0000-0002-3742-8612
According to our database1,
Yves Deswarte
authored at least 70 papers
between 1982 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Secur. Commun. Networks, 2014
2013
Proceedings of the SAFECOMP 2013, 2013
Proceedings of the Computer Safety, Reliability, and Security, 2013
Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012
2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
J. Comput. Virol., 2011
J. Syst. Archit., 2011
Proceedings of the Distributed Computing and Internet Technology, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the Dependable and Historic Computing, 2011
2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
2009
IEEE Trans. Dependable Secur. Comput., 2009
Int. J. Crit. Infrastructure Prot., 2009
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
IEEE Trans. Knowl. Data Eng., 2008
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008
Proceedings of the Critical Infrastructure Protection II, 2008
Safety and Security Architectures for Avionics.
Proceedings of the DCSOFT 2008, 2008
Proceedings of the Critical Information Infrastructure Security, 2008
Proceedings of the CRiSIS '08, 2008
2007
CoRR, 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
IEEE Secur. Priv., 2006
Ann. des Télécommunications, 2006
Le projet européen PRIME: protection de la vie privée et gestion des identités pour l'Europe.
Ann. des Télécommunications, 2006
Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases.
Proceedings of the Privacy in Statistical Databases, 2006
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006
2005
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the Building the Information Society, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Security Model for Health Care Computing and Communication Systems.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
2002
Proceedings of the Security Protocols, 2002
2001
Proceedings of the Smart Card Programming and Security, 2001
1999
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security.
IEEE Trans. Software Eng., 1999
1998
Proceedings of the Digest of Papers: FTCS-28, 1998
1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997
1996
Models and tools for quantitative assessment of operational security.
Proceedings of the Information Systems Security, 1996
Proceedings of the Computer Security, 1996
Proceedings of the Concurrency and Parallelism, 1996
1994
Proceedings of the Computer Security, 1994
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach.
Proceedings of the Dependable Computing, 1994
1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
1990
An Intrusion-Tolerant Security Server for an Open Distributed System.
Proceedings of the ESORICS 90, 1990
1988
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988
1986
A Saturation Network to Tolerate Faults and Intrusions.
Proceedings of the Fifth Symposium on Reliability in Distributed Software and Database Systems, 1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
1982
Run-Time Program for Self-Checking Single Board Computer.
Proceedings of the Proceedings International Test Conference 1982, 1982