Yves Roudier
According to our database1,
Yves Roudier
authored at least 63 papers
between 1995 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Proceedings of the 11th International Symposium on Theoretical Aspects of Software Engineering, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
J. Cloud Comput., 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
2015
IEEE/ACM Trans. Netw., 2015
Proceedings of the MODELSWARD 2015, 2015
Proceedings of the Model-Driven Engineering and Software Development, 2015
Proceedings of the Graphical Models for Security - Second International Workshop, 2015
2014
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014
Proceedings of the Proceedings First International Workshop on Graphical Models for Security, 2014
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Proceedings of the IEEE Global Humanitarian Technology Conference, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Inf. Secur. Tech. Rep., 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the International Workshop on Model-Driven Requirements Engineering, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
2012
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols.
Peer-to-Peer Netw. Appl., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
2011
Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011
Proceedings of the Communication Technologies for Vehicles - Third International Workshop, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
2009
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009
Proceedings of the 2009 IEEE World Congress on Services, Part II, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
2007
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Secure Service Publishing with Untrusted Registries - Securing Service Discovery.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006
2005
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
2004
Inf. Secur. Tech. Rep., 2004
Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-hoc Computing, 2004
Proceedings of the Trust Management, Second International Conference, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
2000
Proceedings of the Computer Security, 2000
1997
Proceedings of the Scientific Computing in Object-Oriented Parallel Environments, 1997
1996
1995
Proceedings of the Object-Based Parallel and Distributed Computation, 1995