Follow
Damien Sauveron
Damien Sauveron
Associate Professor with Habilitation in Computer Science, University of Limoges
Verified email at unilim.fr - Homepage
Title
Cited by
Cited by
Year
Secure and Trusted Execution: Past, Present and Future–A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
IEEE TrustCom 2016, 2016
752016
Security, privacy and safety evaluation of dynamic and static fleets of drones
RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ...
2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017
742017
A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks
H Rhim, K Tamine, R Abassi, D Sauveron, S Guemara
Human-centric Computing and Information Sciences 8 (1), 1-21, 2018
622018
Multiapplication smart card: Towards an open smart card?
D Sauveron
Information security technical report 14 (2), 70-78, 2009
612009
Secure distributed computing on a Java Card/spl trade/grid
S Chaumette, P Grange, A Karray, D Sauveron, P Vignéras
19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005
25*2005
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications
F Merabet, A Cherif, M Belkadi, O Blazy, E Conchon, D Sauveron
Peer-to-Peer Networking and Applications 13, 439-474, 2020
242020
An Efficient and Simple Way to Test the Security of Java CardsTM.
S Chaumette, D Sauveron
WOSIS, 331-341, 2005
222005
An efficient, secure and trusted channel protocol for avionics wireless networks
RN Akram, K Markantonakis, K Mayes, PF Bonnefoi, D Sauveron, ...
2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 1-10, 2016
212016
TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks
R Abassi, A Ben Chehida Douss, D Sauveron
Human-centric Computing and Information Sciences 10, 1-19, 2020
192020
Secure autonomous uavs fleets by using new specific embedded secure elements
RN Akram, PF Bonnefoi, S Chaumette, K Markantonakis, D Sauveron
2016 IEEE Trustcom/BigDataSE/ISPA, 606-614, 2016
192016
Security, privacy and trust of user-centric solutions
RN Akram, HH Chen, J Lopez, D Sauveron, LT Yang
Future Generation Computer Systems 80, 417-420, 2018
162018
A Grid of Java CardsTM to Deal with Security Demanding Application Domains
E Atallah, S Chaumette, F Darrigade, A Karray, D Sauveron
Рroceedings of e-Smart, 2005
162005
An efficient protocol for UAS security
O Blazy, PF Bonnefoi, E Conchon, D Sauveron, RN Akram, ...
2017 Integrated Communications, Navigation and Surveillance Conference (ICNS …, 2017
152017
MANETS: an exclusive choice between use and security?
PF Bonnefoi, D Sauveron, JH Park
Computing and Informatics 27 (5), 799-821, 2008
152008
Some security problems raised by open multiapplication smart cards
S Chaumette, D Sauveron
NORDSEC 2005, 132, 2005
142005
Optical wireless channel simulation for communications inside aircraft cockpits
P Combeau, S Joumessi-Demeffo, A Julien-Vergonjanne, L Aveneau, ...
Journal of Lightwave Technology 38 (20), 5635-5648, 2020
132020
Which trust can be expected of the common criteria certification at end-user level?
D Sauveron, P Dusart
Future Generation Communication and Networking (FGCN 2007) 2, 423-428, 2007
132007
Mobile ad hoc network with embedded secure system
È Atallah, PF Bonnefoi, C Burgod, D Sauveron
AmI. d, 20-22, 2006
132006
A novel consumer-centric card management architecture and potential security issues
RN Akram, K Markantonakis, D Sauveron
Information Sciences 321, 150-161, 2015
122015
Overview of security threats for smart cards in the public transport industry
K Markantonakis, K Mayes, D Sauveron, IG Askoxylakis
2008 IEEE International Conference on e-Business Engineering, 506-513, 2008
122008
The system can't perform the operation now. Try again later.
Articles 1–20