- D. Sauveron : My position in the author list.
- * : Student (PhD / HDR) under my supervision at the time of publication.
Summary
| Category | Prefix | Count |
|---|---|---|
| International Journals | [J] | 32 |
| International Conferences with Proceedings | [C] | 35 |
| Guest Editor of Special Issues | [GE] | 14 |
| Book Chapters | [BC] | 9 |
| Book & Conference Proceedings Editor | [E] | 7 |
| International Conferences without Proceedings | [CW] | 5 |
| National Conferences | [NC] | 4 |
| Others (Reports, Theses, Posters) | [O] | 6 |
| Total | 112 |
International Journals
- [J32] I. Mansour, M. Hamroun, S. Lajmi, R. Abassi, D. Sauveron. Hybrid Deep Learning Models for Arabic Sign Language Recognition in Healthcare Applications. Big Data and Cognitive Computing 9(11), 2025.
- [J31] J. de Bonfils Lavernelle*, D. Sauveron, P.-F. Bonnefoi, B. Gonzalvo. Deferred DMA Attack: A Threat for Bypassing the IOMMU in Dynamic Hypervisors. IEEE Access, 2025.
- [J30] M. Hamroun*, D. Sauveron. A Hybrid Deep Learning and Knowledge Graph Approach for Intelligent Image Indexing and Retrieval. Applied Sciences 15(19), 2025.
- [J29] J. de Bonfils Lavernelle*, D. Sauveron, P.-F. Bonnefoi, B. Gonzalvo. Concepts and generic model for isolation: A basis for assessing isolation solutions. Human-centric Computing and Information Sciences, 2025.
- [J28] K. Markantonakis, J.A. Meister, I. Gurulian, C. Shepherd, R.N. Akram, S.A. Ghazalah, M. Kasi, D. Sauveron, G. Hancke. Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study. IEEE Access, 2024.
- [J27] K. Markantonakis, G. Arfaoui, S.A. Ghazalah, C. Shepherd, R.N. Akram, D. Sauveron. CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management. Smart Cities 7(5), 2024.
- [J26] J. de Bonfils Lavernelle*, P.-F. Bonnefoi, B. Gonzalvo, D. Sauveron. Assessment of spatial isolation in Jailhouse: Towards a generic approach. Computer Networks 245, 2024.
- [J25] F. Thomas-Brans*, A. Fukami, Q. Clement, T. Heckmann, D. Sauveron. Case of study for in situ Memory Reading on Damaged MultiMedia Card. Forensic Science International: Digital Investigation, 2024.
- [J24] M.S.A. Toofanee*, S. Dowlut, M. Hamroun, K. Tamine, V. Petit, A.K. Duong, D. Sauveron. Federated Learning: Centralized and P2P for a Siamese Deep Learning Model for Diabetes Foot Ulcer Classification. Applied Sciences 13(23), 2023.
- [J23] M.S.A. Toofanee*, S. Dowlut, M. Hamroun, K. Tamine, A.K. Duong, V. Petit, D. Sauveron. DFU-Helper: An Innovative Framework for Longitudinal Diabetic Foot Ulcer Diseases Evaluation Using Deep Learning. Applied Sciences 13(18), 2023.
- [J22] M.S.A. Toofanee*, S. Dowlut, M. Hamroun, K. Tamine, V. Petit, A.K. Duong, D. Sauveron. DFU-SIAM a Novel Diabetic Foot Ulcer Classification with Deep Learning. IEEE Access, 2023.
- [J21] L. Moreau*, E. Conchon, D. Sauveron. An Adaptive Simultaneous Multi-Protocol Extension of CRAFT. Sensors 23(8), 2023.
- [J20] A. Ben Chehida Douss, R. Abassi, D. Sauveron. State-of-the-art survey of in-vehicle protocols and automotive Ethernet security and vulnerabilities. Mathematical Biosciences and Engineering 20(9), 2023.
- [J19] F. Thomas-Brans*, T. Heckmann, K. Markantonakis, D. Sauveron. New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards. IEEE Access, 2022.
- [J18] M.K. Kasi, S.A. Ghazalah, R.N. Akram, D. Sauveron. Secure mobile edge server placement using multi-agent reinforcement learning. Electronics 10(17), 2021.
- [J17] B. Velusamy, K. Karunanithy, D. Sauveron, R.N. Akram, J. Cho. Multi-objective function-based node-disjoint multipath routing for mobile ad hoc networks. Electronics 10(15), 2021.
- [J16] H. Rhim, D. Sauveron, R. Abassi, K. Tamine, S. Guemara. A Secure protocol against Selfish and Pollution attacker misbehaviour in clustered WSNs. Electronics 10(11), 2021.
- [J15] L. Moreau*, E. Conchon, D. Sauveron. CRAFT: A Continuous Remote Attestation Framework for IoT. IEEE Access, 2021.
- [J14] T. Heckmann, T. Souvignet, D. Sauveron, D. Naccache. Medical Equipment Used for Forensic Data Extraction: A low-cost solution for forensic laboratories… Forensic Science International: Digital Investigation 36, 2021.
- [J13] O. Blazy, E. Conchon, M. Klingler*, D. Sauveron. An IoT Attribute-Based Security Framework for Topic-Based Publish/Subscribe Systems. IEEE Access, 2021.
- [J12] R. Abassi, A. Ben Chehida Douss, D. Sauveron. TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks. Human-centric Computing and Information Sciences 10(1), 2020.
- [J11] P. Combeau, S. Joumessi-Demeffo, A. Julien-Vergonjanne, L. Aveneau, S. Sahuguède, H. Boeglen, D. Sauveron. Optical wireless channel simulation for communications inside aircraft cockpits. Journal of Lightwave Technology 38(20), 2020.
- [J10] F. Merabet, A. Cherif, M. Belkadi, O. Blazy, E. Conchon, D. Sauveron. New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications. Peer-to-Peer Networking and Applications, 2019.
- [J9] I. Belkacem, S. Nait-Bahloul, D. Sauveron. Enhancing dependability through profiling in the collaborative internet of things. Multimedia Tools and Applications 78, 2019.
- [J8] A. Cherif*, M. Belkadi, D. Sauveron. A Lightweight & Secure Data Collection Serverless Protocol Demonstrated in an Active RFIDs scenario. ACM Transactions on Embedded Computing Systems 18, 2019.
- [J7] H. Rhim, K. Tamine, R. Abassi, D. Sauveron, S. Guemara. A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks. Human-centric Computing and Information Sciences 8(1), 2018.
- [J6] R.N. Akram, K. Markantonakis, D. Sauveron. Recovering from a Lost Digital Wallet: A Smart Cards Perspective - Extended Abstract. Pervasive and Mobile Computing 29, 2016.
- [J5] R.N. Akram, K. Markantonakis, D. Sauveron. A Novel Consumer-Centric Card Management Architecture and Potential Security Issues. Information Sciences 321, 2015.
- [J4] D. Sauveron. Multiapplication Smart Card: Towards an Open Smart Card? Information Security Technical Report (ISTR) 14(2), 2009.
- [J3] S. Chaumette, D. Sauveron. Smart cards and remote computing: Interaction or convergence? Information Security Technical Report (ISTR) 14(2), 2009.
- [J2] P. Dusart, D. Sauveron, K. Tai-Hoon. Some limits of Common Criteria certification. International Journal of Security and Its Applications (IJSIA) 2(4), 2008.
- [J1] P.-F. Bonnefoi, D. Sauveron, J.H. Park. MANETS: an exclusive choice between use and security? COMPUTING AND INFORMATICS 27(5), 2008.
Book Editor & Conference Proceedings Editor
- [E7] S. Bouzefrane, D. Sauveron (Eds.). Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. 14th IFIP WG 11.2 International Conference, WISTP 2024. Springer LNCS 14625, 2024.
- [E6] D. Maimut, A.G. Oprina, D. Sauveron (Eds.). Innovative Security Solutions for Information Technology and Communications 13th International Conference, SecITC 2020. Springer LNCS 12596, 2021.
- [E5] D. Naccache, D. Sauveron (Eds.). Information Security Theory and Practices… 8th IFIP WG 11.2 International Workshop, WISTP 2014. Springer LNCS 8501, 2014.
- [E4] P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron (Eds.). Information Security Theory and Practices… Fourth IFIP WG 11.2 International Workshop, WISTP 2010. Springer LNCS 6033, 2010.
- [E3] T.-H. Kim, H. Adeli, H. Chang, J.H. Park, D. Sauveron, X. Wang, Y.-S. Jeong (Eds.). Advances in Computational Science and Engineering. Second International Conference, FGCN 2008. Springer, 2008.
- [E2] J.A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, K. Markantonakis (Eds.). Information Security Theory and Practices… Second IFIP WG 11.2 International Workshop, WISTP 2008. Springer LNCS 5019, 2008.
- [E1] D. Sauveron, K. Markantonakis, A. Bilas, A. J.-J. Quisquater (Eds.). Information Security Theory and Practices… First IFIP WG 11.2 International Workshop, WISTP 2007. Springer LNCS 4462, 2007.
Guest Editor of Special Issues
- [GE14] S.S. Yeo, D. Sauveron. Special Issue on Security and Privacy for IoT and Multimedia Services. Electronics, MDPI, 2021.
- [GE13] J. Kim, K. Choi, D. Sauveron. Special Issue on Soft Computing for Network and System Security of Internet of Everything. Applied Soft Computing, Elsevier, 2020.
- [GE12] R.N. Akram, H.-H. Chen, J. Lopez, D. Sauveron, L.T. Yang (Eds.). Special Issue on Security, Privacy and Trust of the User-centric Solutions. Future Generation Computer Systems, Elsevier, 2018.
- [GE11] G.P. Hancke, A. Mitrokotsa, R. Safavi-Naini, D. Sauveron (Eds.). Special Issue on Recent Advances in Physical-Layer Security. Computer Networks, Elsevier, 2016.
- [GE10] N. Mentes, D. Sauveron, J.M. Sierra Cámara, S.J. Wang, I. Woungang (Eds.). Special Issue on Lightweight and Energy-Efficient Security Solutions for Mobile Computing Devices. IET Information Security, 2016.
- [GE9] S.S. Yeo, H. Chang, W. Chen, N.K. Chilamkurti, S. Rho, D. Sauveron (Eds.). Special Issue on Advanced Service Technology and Application in Smart Sensor Networks. International Journal of Distributed Sensor Networks, Hindawi, 2015.
- [GE8] D. Sauveron, K. Markantonakis, C. Verikoukis (Eds.). Special Issue on Security and Resilience for Smart Devices and Applications. EURASIP Journal on Wireless Communications and Networking, Springer, 2014.
- [GE7] Y.-S. Jeong, D. Sauveron, J.H. Park (Eds.). Special Issue on Advanced Security Technologies and Services for Future Computing Environments. The Computer Journal, Oxford University Press, 2013.
- [GE6] S. Rho, D. Sauveron, W. Chen (Eds.). Special Issue on Advanced Signal Processing and HCI Issues for Interactive Multimedia Services. Multimedia Tools and Applications, Springer, 2013.
- [GE5] S. Rho, D. Sauveron, K. Markantonakis (Eds.). Special Issue on Advanced Semantic and Social Multimedia Technologies for Future Computing Environment. Multimedia Tools and Applications, Springer, 2013.
- [GE4] B. Preneel, J. Kim, D. Sauveron (Eds.). Special Issue on Advanced theory and practice for cryptography and future security. Mathematical and Computer Modelling, Elsevier, 2012.
- [GE3] J.H. Park, S.-J. Wang, D. Sauveron (Eds.). Special Issue on Security technologies and applications for convergence environments. Security and Communication Networks, Wiley, 2012.
- [GE2] J.H. Park, H.-C. Chao, D. Sauveron, Y. Xiang (Eds.). Special Issue on Intelligent Internet Computing: Applications and Security Systems. Journal of Internet Technology, 2010.
- [GE1] S.S. Yeo, J.H. Park, K.P. Arnett, K.K. Lai, D. Sauveron, T. Tabata (Eds.). Special Issue on Advances and Challenges of Security in Web and Pervasive Computing Environments. International Journal of Security and Its Applications, 2008.
Book Chapters
- [BC9] D. Reinhardt, D. Sauveron. Data security and privacy in the Internet-of-Things. In Information Security: Foundations, Technologies and Applications, IET, 2018.
- [BC8] K. Namuduri, D. Sauveron. Safety, Security and Privacy Aspects in UAV Networks. In UAV Networks and Communications, Cambridge University Press, 2017.
- [BC7] D. Sauveron, R.N. Akram, K. Markantonakis. Smart Card Reader and Mobile APIS. In Smart Cards, Tokens, Security and Applications, Springer, 2017.
- [BC6] D. Sauveron, S. Chaumette. Wireless Sensor Nodes. In Secure Smart Embedded Devices, Platforms and Applications, Springer, 2014.
- [BC5] J. Albert, L. Barrère, S. Chaumette, D. Sauveron. Wireless Sensor Languages and programming/Developments/Tools/Examples. In Secure Smart Embedded Devices, Platforms and Applications, Springer, 2014.
- [BC4] S. Bouzefrane, D. Sauveron, J. Cordry, K. Garri. Mise en œuvre d’une application, choix de solutions, performances. In Les cartes à puce, Hermes, 2013.
- [BC3] D. Sauveron. Smart Card Reader APIS. In Smart Cards, Tokens, Security and Applications, Springer, 2008.
- [BC2] M. Tunstall, K. Markantonakis, D. Sauveron, K. Mayes. Smart Cards: Communication Protocols and Applications. In Handbook of Computer Networks, Wiley, 2007.
- [BC1] K. Markantonakis, K. Mayes, M. Tunstall, D. Sauveron, F. Piper. Smart Card Security. In Computational Intelligence in Information Assurance and Security, Springer, 2007.
International Conferences with Proceedings
- [C35] F. Merabet*, Y. Challal, E. Conchon, D. Sauveron. Hash-based Threshold Group RFID Authentication Protocol for Medical IoT Applications. AICCSA 2025, Doha, Qatar.
- [C34] J. de Bonfils Lavernelle*, P.-F. Bonnefoi, B. Gonzalvo, D. Sauveron. DMA: A persistent threat to embedded systems isolation. IEEE TrustCom-24, Sanya, China.
- [C33] C. Verdeyen, C. Shepherd, K. Markantonakis, R.N. Akram, R. Milroy, S.A. Ghazalah, D. Sauveron. DECML: Distributed Edge Consensus Machine Learning Framework. GCAIoT 2024, Dubai, UAE.
- [C32] M.S.A. Toofanee*, N.Z.A. Pooloo, S. Dowlut, K. Tamine, D. Sauveron. Analyzing Online Media Articles on Diabetes using Natural Language Processing: A Comparative Study of Indian Ocean Region and France. NLPML 2023, Zurich, Switzerland.
- [C31] H. Rhim, K. Tamine, R. Abassi, D. Sauveron, S. Guemara. Enhancing security using digital signature in an efficient Network Coding-enabled WSN. SSD 2021, Monastir, Tunisia.
- [C30] H. Rhim, R. Abassi, K. Tamine, D. Sauveron, S. Guemara. A Secure Network Coding-enabled approach for a Confidential Cluster-based Routing in Wireless Sensor Networks. SAC 2020, Brno, Czech Republic.
- [C29] B. Bounab, S. Chaumette, A. Zemmari, D. Sauveron. Detection of Clone Attacks in Swarms of Autonomous Aircraft Systems. DASC 2019, San Diego, USA.
- [C28] S. Joumessi-Demeffo, S. Sahuguède, D. Sauveron, A. Julien-Vergonjanne, P. Combeau, B. Mercier, L. Aveneau, H. Boeglen. A Link Reliability Study of Optical Wireless Headset inside Aircraft Cockpit. GLC 2019, Paris, France.
- [C27] R.N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, A. Cherif*, D. Sauveron, S. Chaumette. A Secure and Trusted Channel Protocol for UAVs Fleets. WISTP 2017, Heraklion, Greece.
- [C26] C. Mtita, M. Laurent, D. Sauveron, R.N. Akram, K. Markantonakis, S. Chaumette. Serverless protocols for inventory and tracking with a UAV. DASC 2017, St. Petersburg, USA.
- [C25] R.N. Akram, K. Markantonakis, K. Mayes, O. Habachi, D. Sauveron, A. Steyven, S. Chaumette. Security, privacy and safety evaluation of dynamic and static fleets of drones. DASC 2017, St. Petersburg, USA.
- [C24] R.N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, D. Sauveron, S. Chaumette. An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks. DASC 2016, Sacramento, USA.
- [C23] R.N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, D. Sauveron, S. Chaumette. Security and Performance Comparisons for Different Secure Channel Protocols for Avionics Wireless Networks. DASC 2016, Sacramento, USA.
- [C22] R.N. Akram, P.-F. Bonnefoi, S. Chaumette, K. Markantonakis, D. Sauveron. Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. IEEE TrustCom-16, Tianjin, China.
- [C21] C. Shepherd, R. Lee, I. Gurulian, G. Arfaoui, R.N. Akram, K. Markantonakis, E. Conchon, D. Sauveron. Secure and Trusted Execution: Past, Present and Future – A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. IEEE TrustCom-16, Tianjin, China.
- [C20] R.N. Akram, K. Markantonakis, D. Sauveron, K. Mayes. Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures. IEEE TrustCom-15, Helsinki, Finland.
- [C19] P.-F. Bonnefoi, P. Dusart, D. Sauveron, R.N. Akram, K. Markantonakis. A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-cost RFID Tags. IEEE TrustCom-15, Helsinki, Finland.
- [C18] R.N. Akram, K. Markantonakis, D. Sauveron. Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. IEEE TrustCom-14, Beijing, China.
- [C17] K. Markantonakis, K. Mayes, D. Sauveron, I.G. Askoxylakis. Overview of Security Threats for Smart Cards in the Public Transport Industry. ICEBE 2008, Xi’an, China.
- [C16] I.G. Askoxylakis, D. Sauveron, K. Markantonakis, T. Tryfonas, A. Traganitis. A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. SECURWARE 2008, Cap Esterel, France.
- [C15] P. Dusart, D. Sauveron. Which trust can be expected of the Common Criteria certification at end-user level? IAN 2007, Jeju Island, Korea.
- [C14] S. Chaumette, S. Eonet, J. Gimenez, D. Sauveron. Evaluation and comparison of the PRNG of different brands of Java Cards. e-Smart 2007, Nice, France.
- [C13] S. Chaumette, A. Karray, D. Sauveron. Extended Secure Memory for a Java Card in the Context of the Java Card Grid project. NordSec 2006, Linköping, Sweden.
- [C12] E. Atallah, P.-F. Bonnefoi, C. Burgod, D. Sauveron. Mobile AD hoc Network with Embedded Secure System. AmI.d 2006, Nice, France.
- [C11] S. Chaumette, K. Markantonakis, K. Mayes, D. Sauveron. The Mobile Java Card Grid Project. e-Smart 2006, Nice, France.
- [C10] S. Chaumette, D. Sauveron. A High Level Security Framework for the Grid: the Java Card Grid Testbed. HPC&S 2006, Bonn, Germany.
- [C9] S. Chaumette, A. Karray, D. Sauveron. The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. WOSIS 2006, Phaos, Cyprus.
- [C8] S. Chaumette, A. Karray, D. Sauveron. Secure Collaborative and Distributed Services in the Java Card Grid Platform. COLSEC'06, Las Vegas, USA.
- [C7] S. Chaumette, D. Sauveron. Some security problems raised by open multiapplication smart cards. NordSec 2005, Tartu, Estonia.
- [C6] E. Atallah, S. Chaumette, F. Darrigade, A. Karray, D. Sauveron. A Grid of Java Cards to Deal with Security Demanding Application Domains. E-Smart 2005, Nice, France.
- [C5] P.-F. Bonnefoi, P. Poulingeas, D. Sauveron. MADNESS: A Framework Proposal for Securing Work in Ad Hoc Networks. CCCT'05, Austin, USA.
- [C4] S. Chaumette, D. Sauveron. An efficient and simple way to test the security of Java Cards. WOSIS 2005, Miami, USA.
- [C3] S. Chaumette, P. Grange, A. Karray, D. Sauveron, P. Vignéras. Secure distributed computing on a Java Card Grid. IPDPS 2005, Denver, USA.
- [C2] S. Chaumette, P. Grange, D. Sauveron, P. Vignéras. Computing with Java Cards. CCCT'03, Orlando, USA.
- [C1] S. Chaumette, I. Hatchondo, D. Sauveron. JCAT: An environment for attack and test on Java Card. CCCT'03, Orlando, USA.
International Conferences without Proceedings
- [CW5] D. Sauveron. A Brief Overview of Security Proposals for UAV-based Solutions. 5th AETOS Unmanned and Swarming International Conference, Bordeaux, 2018.
- [CW4] O. Blazy, P.-F. Bonnefoi, E. Conchon, D. Sauveron, R.N. Akram, K. Markantonakis, K. Mayes, S. Chaumette. An efficient protocol for UAS security. ICNS 2017, Herndon, USA.
- [CW3] R.N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, D. Sauveron, S. Chaumette. A secure and trusted protocol for enhancing safety of on-ground airplanes using UAVs. ICNS 2017, Herndon, USA.
- [CW2] A. Cherif*, D. Sauveron, M. Belkadi. Overview on Formal Verification Methods for RFID Protocols. IWCA 2016, Oran, Algeria.
- [CW1] R.N. Akram, P.-F. Bonnefoi, S. Chaumette, K. Markantonakis, D. Sauveron. Improving Security of Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements - A Position Paper. 2nd AETOS international conference, Bordeaux, 2014.
National Conferences
- [NC4] S. Joumessi-Demeffo, S. Sahuguède, D. Sauveron, A. Julien-Vergonjanne, P. Combeau, B. Mercier, L. Aveneau, H. Boeglen. Casque audio connecté par optique sans fil dans le poste de pilotage d’un avion de ligne. PLUMEE 2019, Limoges, France.
- [NC3] S. Chaumette, A. Karray, D. Sauveron. Gestion de la Sécurité pour l’Extraction Parallèle Distribuée des Connaissances. EGC 2006, Lille, France.
- [NC2] P. Dusart, D. Sauveron. La guerre du développement numérique. Menaces sur la confidentialité des photos numériques. 3ème Symposium SSTIC, Rennes, 2005.
- [NC1] S. Chaumette, D. Sauveron. Modèles de mémoire en Java Card. Introduction du concept de pré-persistance. MAJECSTIC’04, Calais, 2004.
Others (Vulgarisation, Research Reports, Theses, Posters)
- [O6] D. Sauveron. La généralisation de l’usage informatique cause-t-elle de nouvelles guerres, voire de plus en plus de cyberguerres ? Donne ta langue au chercheur, 2025.
- [O5] P. Dusart, D. Sauveron. Exploration de carte bancaire B0’. GNU Linux Magazine/France Hors Série 39, 2008.
- [O4] V. Jolivet, D. Sauveron. Sécuriser son ordinateur contre les virus / Les antivirus / Les parefeux I & II. Revue du cadre de Santé, 2005-2006.
- [O3] D. Sauveron. Sécurité et interactions des « smart secure devices » et des « réseaux mobiles ». Habilitation à Diriger des Recherches (Habilitation to Direct Research) Thesis, Université de Limoges, 2014.
- [O2] D. Sauveron. Étude et réalisation d’un environnement d’expérimentation et de modélisation pour la technologie Java Card. PhD Thesis, Université Bordeaux 1, 2004.
- [O1] Multiple posters presented at URSI-France (2020), GNU Radio Days (2018, 2019), AETOS (2018), WISTP (2007), ICCSA (2006), and Cartes (2003).