Google Scholar - DBLP - ResearchGateArnetMinerCiteSeer X Beta - Microsoft Academic Search (Beta)

Editor of / Editeur de

  1. English D. Naccache, D. Sauveron (Eds.).
    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices.
    8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014
    Springer Lecture Notes in Computer Science Series, Vol. 8501, 2014, 201 p. ISBN: 978-3-662-43825-1 
    DOI: 10.1007/978-3-662-43826-8
  2. English P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron (Eds.).
    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices.
    Fourth IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010
    Springer Lecture Notes in Computer Science Series, Vol. 6033, 2010, 386 p. ISBN: 978-3-642-12367-2
    DOI: 10.1007/978-3-642-12368-9
  3. English T.-H. Kim, L.T. Yang, J.H. Park, A.C.-C. Chang, T. Vasilakos, Y. Zhang, D. Sauveron, X. Wang and Y.-S Jeong (Eds.).
    Advances in Computational Science and Engineering
    Second International Conference, FGCN 2008, Workshops and Symposia, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
    Springer Communications in Computer and Information Science Series, Vol. 28, 2009, 259 p. ISBN: 978-3-642-10237-0
    DOI: 10.1007/978-3-642-10238-7
  4. English J.A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, K. Markantonakis (Eds.).
    Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks.
    Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008.
    Springer Lecture Notes in Computer Science Series, Vol. 5019, 2008, 151 p. ISBN: 978-3-540-79965-8
    DOI: 10.1007/978-3-540-79966-5
  5. English D. Sauveron, K. Markantonakis, A. Bilas, A. J.-J. Quisquater (Eds.).
    Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems.
    First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007.
    Springer Lecture Notes in Computer Science Series, Vol. 4462, 2007, 255p. ISBN: 978-3-540-72353-0
    DOI: 10.1007/978-3-540-72354-7

Guest Editor of / Editeur invité de

  1. English G. P. Hancke, A. Mitrokotsa, R. Safavi-Naini, D. Sauveron (Eds.).
    Special Issue on Recent Advances in Physical-Layer Security
    Journal of Computer Networks. Elsevier
    2014 Impact Factor: 1.256 – SJR: 1.287 – Q1.
    DOI: 10.1016/j.comnet.2016.08.012
  2. English R. N. Akram, H.-H. Chen, J. Lopez, D. Sauveron, L. T. Yang (Eds.).
    Special Issue on Security, Privacy and Trust of the User-centric Solutions
    Future Generation Computer Systems. Elsevier
    2014 Impact Factor: 2.786 – SJR: 2.146 – Q1 – Ranked A in CORE (ERA2010). To appear in 2016.
    DOI: Not yet available
  3. English N. Mentes, D. Sauveron, J.M. Sierra Cámara, S. J. Wang, I. Woungang (Eds.).
    Special Issue on  Lightweight and Energy-Efficient Security Solutions for Mobile Computing Devices
    IET Information Security. IET
    2014 Impact Factor: 0.753 – SJR: 0.96 – Q2.
    DOI: 10.1049/iet-ifs.2016.0333
  4. English S. S. YeoH. Chang, W. Chen, N K Chilamkurti, S. Rho, D. Sauveron (Eds.).
    Special Issue on Advanced Service Technology and Application in Smart Sensor Networks
    International Journal of Distributed Sensor Networks. Hindawi 
    2013 Impact Factor: 0.923
    DOI: 10.1155/2015/156361
  5. English Y-S. Jeong, D. Sauveron, J.H. Park (Eds.).
    Special Issue on Advanced Security Technologies and Services for Future Computing Environments
    The Computer Journal, vol 56, n°10, 2013. British Computer Society - Oxford University Press.
    2013 Impact Factor: 0.888 – SJR: 0.67 – Q1 – Ranked A* in CORE (ERA2010)
    DOI: 10.1093/comjnl/bxt085
  6. English S. Rho, D. Sauveron, W. Chen (Eds.).
    Special Issue on Advanced Signal Processing and HCI Issues for Interactive Multimedia Services.
    Multimedia Tools and Applications, vol 73, N°2, September, 2013. Springer
    2014 Impact Factor: 1.346
    DOI: 10.1007/s11042-013-1674-7
  7. English S. Rho , D. Sauveron, K. Markantonakis (Eds.).
    Special Issue on Advanced Semantic and Social Multimedia Technologies for Future Computing Environment
    Multimedia Tools and Applications, vol 64, N°2, 2013. Springer
    2014 Impact Factor: 1.346
    DOI: 10.1007/s11042-012-1105-1
  8. English B. Preneel, J. Kim, D. Sauveron (Eds.).
    Special Issue on Advanced theory and practice for cryptography and future security
    Mathematical and Computer Modelling, vol 55, N°1-2; 2012. Elsevier
    2013 Impact Factor: 2.020
    DOI: 10.1016/j.mcm.2011.09.020
  9. English J. H. Park, S.-J. Wang, Damien Sauveron (Eds.).
    Special Issue on Security technologies and applications for convergence environments
    Security and Communication Networks, vol 5, N°3, 2012. Wiley
    2014 Impact Factor: 0.72
    DOI: 10.1002/sec.402
  10. English D. Sauveron, K. Markantonakis, C. Verikoukis (Eds.).
    Special Issue on Security and Resilience for Smart Devices and Applications
    EURASIP Journal on Wireless Communications and Networking, 2011 (published in 2014)
    DOI: 10.1186/1687-1499-2014-123
    2008 Impact Factor: 0.976
  11. English J. H. Park, H.-C. Chao, D. Sauveron, Y. Xiang (Eds.).
    Special Issue on Intelligent Internet Computing : Applications and Security Systems
    JIT (Journal of Internet Technology), 2010, indexed by SCI-E (Ministry of Education – Taiwan).
    2013 Impact Factor: 0.418
  12. English S. S. Yeo, J. H. Park, K. P. Arnett, K. K. Lai, D. Sauveron, T. Tabata (Eds.).
    Special Issue on Advances and Challenges of Security in Web and Pervasive Computing Environments.
    IJSIA (International Journal of  Security and Its Applications), 2008

Books chapters / Chapitres de livres

  1. English Damien Sauveron. Smart Card Reader and Mobile APIS.
    Chapter 12 and Appendice in new version of Smart Cards, Tokens, Security and Applications. Springer. To appear in 2016
    Keith MayesKonstantinos Markantonakis (Eds.). [PDF]
  2. English K. Namuduri, D. Sauveron. Safety, Security and Privacy Aspects in UAV Networks.
    Chapter 7 in  UAV Networks and Communications. Cambridge University Press.  To appear in 2016. 
  3. S. Chaumette, J. Kim, K. Namuduri, J. P.G. Sterbenz (Eds.)
  4. English D. Sauveron, S. Chaumette. Wireless Sensor Nodes.
    Chapter 14 in Secure Smart Embedded Devices, Platforms and Applications. Springer. 2014. ISBN: 978-1-4614-7914-7
    K. Mayes, K. Markantonakis (Eds.)
    DOI: 10.1007/978-1-4614-7915-4_14
  5. English J. Albert, L Barrère, S. Chaumette, D. Sauveron. Wireless Sensor (Languages and programming/Developments/Tools/Examples).
    Chapter 24 in Secure Smart Embedded Devices, Platforms and Applications. Springer. 2014. ISBN: 978-1-4614-7914-7
    K. Mayes, K. Markantonakis (Eds.)
    DOI: 10.1007/978-1-4614-7915-4_24
  6. French S. Bouzefrane, D. Sauveron, J. Cordry, K. Garri. Mise en oeuvre d’une application, choix de solutions, performances.
    Les cartes à puce. Hermes. 2013. ISBN: 978-2-746-23913-5
    S. Bouzefrane, P. Paradinas (Eds.)
  7. English Damien Sauveron. Smart Card Reader APIS.
    Chapter 12 and Appendice in Smart Cards, Tokens, Security and Applications. Springer. 2008. ISBN: 978-0-387-72197-2
    Keith MayesKonstantinos Markantonakis (Eds.). [PDF]
    DOI: 10.1007/978-0-387-72198-9_12
  8. English  M. Tunstall, K. Markantonakis, D. Sauveron, K. Mayes. Smart Cards: Communication Protocols and Applications
    Chapter 151 in Handbook of Computer Networks, Wiley. 2007.
    H. Bidgoli (Ed.). [PDF]
    DOI: 10.1002/9781118256107.ch16
  9. English  K. Markantonakis, K. Mayes, M.J. Tunstall, D. Sauveron, F. Piper. Smart Card Security.
    Computational Intelligence in Information Assurance and Security. Springer SCI Series. 2007. Vol 57,  pp.201-237, ISBN: 978-3-540-71077-6.
    Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (Eds.). [PDF]
    DOI: 10.1007/978-3-540-71078-3_8

Journals / Journaux-Revues

  1. English R. N. Akram, K. Markantonakis, D. Sauveron. Recovering from a Lost Digital Wallet: A Smart Cards Perspective - Extended Abstract. 2015, Pervasive and Mobile Computing, Elsevier.
  2. 2014 Impact Factor: 2.079 – SJR: 1.214 – Q1.
    DOI: 10.1016/j.pmcj.2015.06.018
  3. English R. N. Akram, K. Markantonakis, D. Sauveron. A Novel Consumer-Centric Card Management Architecture and Potential Security Issues. 2014, Information Sciences, Elsevier.
    DOI: 10.1016/j.ins.2014.12.049
    2014 Impact Factor: 4.038 – SJR: 3.286 – Q1.
  4. English D. Sauveron. Multiapplication Smart Card: Towards an Open Smart Card? Information Security Technical Report (ISTR), Vol. 14, No. 2, May 2009, pp70-78. Elsevier. [PDF]
    DOI: 10.1016/j.istr.2009.06.007
    Ranked B in ERA2010
  5. English S. Chaumette, D. Sauveron. Smart cards and remote computing: Interaction or convergence?  Information Security Technical Report (ISTR), Vol. 14, No. 2, May 2009, pp101-110. Elsevier. [PDF]
    DOI: 10.1016/j.istr.2009.06.008
    Ranked B in ERA2010
  6. English P. Dusart, D. Sauveron, K. Tai-Hoon. Some limits of Common Criteria certification International Journal of Security and Its Applications (IJSIA), Vol. 2, No. 4, October, 2008, pp11-20. [PDF]
  7. English P-F Bonnefoi, D. Sauveron et J. H. Park. MANETS: an exclusive choice between use and security? Special Issue on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous Computing (MUC) of COMPUTING AND INFORMATICS, Vol. 27, No. 5, 2008. [PDF]

International Conferences with TPC and proceedings / Conférences internationales avec comité de programme et actes

  1. English R. N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, D. Sauveron, S. Chaumette. An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks. 35th Digital Avionics Systems Conference (DASC2016). Sacramento, CA , USA, 25-29 September, 2016. [arXiv]
  2. English R. N. Akram, K. Markantonakis, K. Mayes, P.-F. Bonnefoi, D. Sauveron, S. Chaumette. Security and Performance Comparisons for Different Secure Channel Protocols for Avionics Wireless Networks. 35th Digital Avionics Systems Conference (DASC2016). Sacramento, CA , USA, 25-29 September, 2016. [arXiv]
  3. English R. N. Akram, P.-F. Bonnefoi, S. Chaumette, K. Markantonakis, D. Sauveron. Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. 15th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom-16). Tianjin, China, 22-26 August, 2016. [PDF]
    Ranked A in CORE2014 - To appear in 2016.
  4. English C. Shepherd, R. Lee, I. Gurulian, G. Arfaoui, R. N. Akram, K. Markantonakis, E. Conchon, D. Sauveron. Secure and Trusted Execution: Past, Present and Future -- A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. 15th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom-16). Tianjin, China, 22-26 August, 2016. [PDF]
    Ranked A in CORE2014 - To appear in 2016.
  5. English R. N. Akram, K. Markantonakis, D. Sauveron, K. Mayes. Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures. 14th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom-15). Helsinki, Finland, 20-22 August, 2015. [PDF]
    Ranked A in CORE2014
    DOI: 
    10.1109/Trustcom.2015.410
  6. English P-F. Bonnefoi, P. Dusart, D. Sauveron, R. N. Akram, K. Markantonakis. A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-cost RFID Tags. 14th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom-15). Helsinki, Finland, 20-22 August, 2015. [PDF]
    Ranked A in CORE2014
    DOI: 
    10.1109/Trustcom.2015.426
  7. English R. N. Akram, K. Markantonakis, D. Sauveron. Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. 13th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom-14). Beijing, China, 24-26 September, 2014. [PDF]
    Ranked A in CORE2014
    DOI: 
    10.1109/TrustCom.2014.57
  8. English K. Markantonakis, K. Mayes, D. Sauveron, I. G. Askoxylakis. Overview of Security Threats for Smart Cards in the Public Transport Industry. IEEE International Conference on e-Business Engineering (ICEBE) 2008. 22-24 October 2008, Xi'an, China. [PDF]
    DOI: 10.1109/ICEBE.2008.91
  9. English I. G. Askoxylakis, D. Sauveron, K. Markantonakis, T. Tryfonas, A. Traganitis. A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. SECURWARE 2008. 25-31 August 2008, Cap Esterel, France. [PDF]
    DOI: 10.1109/SECURWARE.2008.42
  10. English P. Dusart et D. Sauveron. Which trust can be expected of the Common Criteria certification at end-user level? First International Workshop on Information Assurance in Networks (IAN 2007). 6-7 décembre 2007, Jeju Island, Korea. "Papier invité" [PDF]
  11. English S. Chaumette, S. Eonet, J. Gimenez et D. Sauveron. Evaluation and comparison of the PRNG of different brands of Java Cards. - Framework and first results. e-Smart 2007. 19-21 septembre 2007, Nice, France. [PDF]
  12. English S. Chaumette, A. Karray et D. Sauveron. Extended Secure Memory for a Java Card in the Context of the Java Card Grid project. 11th IEEE Nordic Workshop on Secure IT-systems: NordSec 2006. 19-20 octobre 2006, Linköping, Suède. [PDF]
  13. English E. Atallah, P-F. Bonnefoi, C. Burgod et D. Sauveron. Mobile AD hoc Network with Embedded Secure System. AmI.d 2006. 20-22 septembre 2006, Nice, France. [PDF]
  14. English S. Chaumette, K. Markantonakis, K. Mayes et D. Sauveron. The Mobile Java Card Grid Project. e-Smart 2006. 20-22 septembre 2006, Nice, France. [PDF]
  15. English S. Chaumette et D. Sauveron. A High Level Security Framework for the Grid: the Java Card Grid Testbed. The 2006 High Performance Computing & Simulation (HPC&S) Conference. 28 – 31 mai 2006, Bonn, Germany. "Papier invité" [PDF]
  16. English S. Chaumette, A. Karray et D. Sauveron. The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. 8th International Conference on Enterprise Information Systems (ICEIS 2006), 4th International Workshop on Security In Information Systems: WOSIS 2006. 23 – 24 mai 2006, Paphos, Cyprus. [PDF]
  17. English S. Chaumette, A. Karray et D. Sauveron. Secure Collaborative and Distributed Services in the Java Card Grid Platform. The 2006 International Symposium on Collaborative Technologies and Systems (CTS 2006),  Workshop on Collaboration and Security (COLSEC'06). 14 – 17 mai 2006, Las Vegas, Nevada, USA. [PDF]
    DOI: 10.1109/CTS.2006.60
  18. English S. Chaumette et D. Sauveron. Some security problems raised by open multiapplication smart cards. 10th Nordic Workshop on Secure IT-systems: NordSec 2005. 20-21 octobre 2005, Tartu, Estonia. [PDF]
  19. English E. Atallah, S. Chaumette, F. Darrigade, A. Karray et D. Sauveron. A Grid of Java Cards to Deal with Security Demanding Application Domains. e-Smart 2005. 21-23 septembre 2005, Nice, France. "e-smart 2005 Isabelle Attali Award for the best innovative technology" [PDF]
  20. English P-F. Bonnefoi, P. Poulingeas et D. Sauveron. MADNESS: A Framework Proposal for Securing Work in Ad Hoc Networks. International Conference on Computer, Communication and Control Technologies: CCCT'05. 24 – 27 juillet 2005, Austin, Texas, USA. [PDF]
  21. English S. Chaumette et D. Sauveron. An efficient and simple way to test the security of Java Cards. 7th International Conference on Enterprise Information Systems (ICEIS 2005), 3rd International Workshop on Security In Information Systems: WOSIS 2005. 24 – 25 mai 2005, Miami, Floride, USA. [PDF]
    DOI: 10.1109/IPDPS.2005.394
  22. English S. Chaumette, P. Grange, A. Karray, D. Sauveron et P. Vignéras. Secure distributed computing on a Java Card grid. 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05),  7th International Workshop on Java for Parallel and Distributed Computing. 4 – 8 avril 2005, Denver, Colorado, USA. [PDF]
  23. English S. Chaumette, P. Grange, D. Sauveron et P. Vignéras. Computing with Java Cards. International Conference on Computer, Communication and Control Technologies: CCCT’03. 31 juillet – 2 août 2003, Orlando, Floride, USA. "Best paper of the Computer and Systems Security session" [PDF]
  24. English S. Chaumette, I. Hatchondo et D. Sauveron. JCAT: An environment for attack and test on Java Card. International Conference on Computer, Communication and Control Technologies: CCCT’03. 31 juillet – 2 août 2003, Orlando, Floride, USA. [PDF]

International Conferences with TPC without proceedings / Conférences internationales avec comité de programme et sans actes 

  1. English A Cherif, D. Sauveron, M. Belkadi. Overview on Formal Verification Methods for RFID Protocols. International Workshop on Cryptography and its Applications (IWCA 2016), Oran, Algeria, 26-27 April, 2016. [PDF]
  2. English R. N. Akram, P.-F. Bonnefoi, S. Chaumette, K. Markantonakis, D. Sauveron. Improving Security of Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements - A Position Paper. 2nd AETOS international conference on "Research challenges for future RPAS/UAV systems". Bordeaux, France, 9-10 September, 2014. [PDF]

National Conferences with TPC and proceedings / Conférences nationales avec comité de programme et actes

  1. French S. Chaumette, A. Karray et D. Sauveron. Gestion de la Sécurité pour l'Extraction Parallèle Distribuée des Connaissances. EGC 2006 (Sixième Journées Francophones "Extraction et Gestion de Connaissances"). 17 – 20 janvier 2006, Lille, France. [PDF]
  2. French P. Dusart et D. Sauveron. La guerre du développement numérique. Menaces sur la confidentialité des photos numériques. 3ième Symposium sur la Sécurité des Technologies de l'Information et des Communications. 1 – 3 juin 2005, Rennes, France. [PDF]
  3. French S. Chaumette et D. Sauveron. Modèles de mémoire en Java Card. Introduction du concept de pré-persistance. MAJECSTIC’04 (MAnifestation des JEunes Chercheurs STIC). 13 – 15 octobre 2004, Calais, France. [PDF]

Submitted / Soumis

  1. English Raja Naeem Akram, Konstantinos Markantonakis, and Damien Sauveron. Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager - A flexible model to boost multiapplication smart cards. Electronic Commerce Research, Springer. 

Being drafted / En cours de rédaction

  1. English  Several coauthors. Several topics. No yet decided where we will submit. [PDF]

Research reports / Rapports de recherche

  1. English S. Chaumette et D. Sauveron. New security problems raised by open multiapplication smart cards. RR-1332-04, LaBRI, Université Bordeaux 1, 2004. [PDF]
  2. English S. Chaumette, P. Grange, A. Karray, D. Sauveron et P. Vignéras. Secure distributed computing on a Java Card Grid. Position paper. RR-1331-04, LaBRI, Université Bordeaux 1, 2004. [PDF]
  3. French S. Chaumette, J-P. Lacoustille et D. Sauveron. Projet Sécurité Java Card, Rapport d'avancement, Phase 2, Novembre 2001 à Septembre 2002. RR-1278-02, LaBRI, Université Bordeaux 1, 2002. [PS]
  4. French S. Chaumette, J-P. Lacoustille et D. Sauveron. Projet Sécurité Java Card, Rapport d'Avancement, Phase 1, Juin 2001 à Octobre 2001. RR-1267-01, LaBRI, Université Bordeaux 1, 2001. [PS]
  5. French D. Sauveron. La technologie Java Card : Présentation de la carte à puce. La Java Card. RR-1259-01, LaBRI, Université Bordeaux 1, 2001. [PS]

Thesis / Mémoires

  1. French D. Sauveron. Sécurité et interactions des "smart secure devices" et des "réseaux mobiles". Habilitation à Diriger des Recherches. XLIM, Université de Limoges, Décembre 2014.
  2. French D. Sauveron. Étude et réalisation d'un environnement d'expérimentation et de modélisation pour la technologie Java Card. Application à la sécurité. Thèse de doctorat. LaBRI, Université Bordeaux 1, Décembre 2004. [PDF]
  3. French D. Sauveron. Sécurité et vérification d'applications embarquées en environnement Java Card. Mémoire de DEA. LaBRI, Université Bordeaux 1, Juin 2001. [PDF]

Vulgarisation papers / Oeuvres de vulgarisation

  1. French Pierre Dusart et D. Sauveron. Exploration de carte bancaire B0’. GNU Linux Magazine/France Hors Série 39, Novembre/Decembre 2008. ISSN xxx. Édition Diamond. [PDF]
  2. French V. Jolivet et D. Sauveron. Sécuriser son ordinateur. Les parefeux II. Revue du cadre de Santé. Janvier-Février 2006, numéro 22. ISSN 1760-2890. Édition Elvesier. [PDF]
  3. French V. Jolivet et D. Sauveron. Sécuriser son ordinateur. Les parefeux. Revue du cadre de Santé. Novembre-Décembre 2005, numéro 21. ISSN 1760-2890. Édition Elvesier. [PDF]
  4. French V. Jolivet et D. Sauveron.  Sécuriser son ordinateur. Les antivirus. Revue du cadre de Santé. Septembre-Octobre 2005, numéro 20. ISSN 1760-2890. Édition Elvesier. [PDF]
  5. French V. Jolivet et D. Sauveron. Sécuriser son ordinateur contre les virus. Revue du cadre de Santé. Juillet-Août 2005, numéro 19, p28-29. ISSN 1760-2890. Édition Elvesier. [PDF]
  6. French D. Sauveron. La carte à puce multi-applicative et sa sécurité. Dossier de presse pour la journée Les nouveaux enjeux de la carte à puce. 19 décembre 2001, Talence, France. [PDF]

Other publications (Posters, ...) / Autres publications (Posters, ...)

  1. English E. Atallah, P-F. Bonnefoi et D. Sauveron. MANESS. WISTP2007. 8-11 mai 2007, Heraklion, Greece. (Poster). [PDF]
  2. English S. Chaumette, K. Markantonakis, K. Mayes et D. Sauveron. The Mobile Java Card Grid Project. The 3rd ISG Smart Card Centre Open-Day. 12 septembre 2006, Egham, UK. (Poster). [PDF]
  3. English S. Chaumette, A. Karray et D. Sauveron. Secure Extended Memory for Java Cards. The 2006 International Conference on Computational Science and its Applications (ICCSA 2006). 8 – 11 mai 2006, Glasgow, UK. (Poster). [PDF]
  4. French S. Chaumette, A. Karray et D. Sauveron. Le projet Smart Cards Grid. Rencontres Industriels-Chercheurs. 27 janvier 2006, Bordeaux, France. (Posters). [PDF, PDF]
  5. English S. Chaumette et D. Sauveron. The Smart Cards Grid Project. Cartes 2003. 17 – 19 novembre 2003, Paris, France. (Poster). [PDF]

List of my co-authors / Liste de mes co-auteurs

  • J. Albert, LaBRI, équipe Systèmes et Objets Distribués, Talence, France
  • K. P. Arnett. Mississippi State University, U.S.A
  • I G. Askoxylakis, FORTH-ICS, Greece
  • E. Atallah, XLIM, équipe Sécurité de l'Information, Limoges, France
  • L. Barrère, LaBRI, équipe Systèmes et Objets Distribués, Talence, France
  • A. Bilas. FORTH-ICS, Greece
  • P-F. Bonnefoi, XLIM, équipe Sécurité de l'Information, Limoges, France
  • S. Bouzefrane, Cédric, CNAM, Paris, France
  • C. Burgod, XLIM, équipe Sécurité de l'Information, Limoges, France
  • A. C-C. Chang National Chung Cheng University, Taiwan
  • H-C. Chao,National Ilan University, Taiwan,
  • S. Chaumette, LaBRI, équipe Systèmes et Objets Distribués, Talence, France
  • W. Chen, California University of Pennsylvania, USA
  • J. Cordry, University of Teesside, Cleveland, UK
  • F. Darrigade, LaBRI, équipe Systèmes et Objets Distribués, Talence, France
  • P. Dusart, LACO, équipe Arithmétique, Cryptographie, Codage, Limoges, France
  • S. Eonet, Bordeaux, France
  • K. Garri, Cédric, CNAM, Paris, France
  • J. Gimenez, Bordeaux, France
  • P. Grange, LaBRI, équipe Systèmes et Objets Distribués, Talence, France
  • D. Gollmann. Institutes of the TU Hamburg-Harburg, Germany
  • I. Hatchondo, LaBRI, équipe Systèmes et Objets Distribués, Talence, France
  • Y-S. Jeong, Wonkwang University, Korea
  • V. Jolivet, LMSI, équipe Synthèse d'Images Réalistes, Limoges, France
  • A. Karray, LaBRI, équipe Systèmes et Objets Distribués, Talence, France
  • J. Kim. Kyungnam University, Korea
  • J-P. Lacoustille, SERMA Technologies, Centre d'Évaluation de la Sécurité des Technologies de l'Information, Pessac, France
  • K. K. Lai. City University of Hong Kong, Hong Kong
  • K. Markantonakis, Smart Card Centre, Information Security Groupe, Royal Holloway, University of London, Egham, Surrey, UK.
  • K. Mayes, Smart Card Centre, Information Security Groupe, Royal Holloway, University of London, Egham, Surrey, UK.
  • J. Onieva. University of Malaga, Spain
  • J. H. Park, Seoul National University of Science and Technology, Korea
  • F. Piper, Information Security Groupe, Royal Holloway, University of London, Egham, Surrey, UK.
  • J. Posegga. Institute for IT Security and Security Law, University of Passau, Germany
  • P. Poulingeas, LMSI, équipe Sécurité de l'Information, Limoges, France
  • B. Preneel, Katholieke Universiteit Leuven, Belgium
  • J-J. Quisquater. Catholic University of Louvain, Belgium
  • S. Rho, Sungkyul University, Korea
  • P. Samarati. University of Milan, Italy
  • T. Tabata, Okayama University, Japan
  • K. Tai-Hoon, Hannam University, Korea
  • M. Tunstall, University of Bristol, UK
  • T. Vasilakos, University of Western Macedonia,Greece
  • C. Verikoukis, Telecommunications Technological Centre of Catalonia, Spain
  • P. Vignéras, LaBRI, équipe Systèmes et Objets Distribués, Talence, France
  • S-J. Wang, Central Police University, Taiwan
  • X. Wang, University of Plymouth, UK
  • Y. Xiang, Central Queensland University, Australia
  • L.T. Yang, St. Francis Xavier University, Canada
  • S-S. Yeo. Kyushu University, Japan
  • Y. Zhang, University of Western Sydney, Australia

Impact Factor
Computing and Informatics (SCI-indexed, Slovak Academy of Sciences, 2008 Impact Factor: 0.492)