Damien Sauveron
Damien Sauveron
Professor in Computer Science, University of Limoges
Verified email at - Homepage
Cited by
Cited by
Security, privacy and safety evaluation of dynamic and static fleets of drones
RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ...
2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017
Secure and Trusted Execution: Past, Present and Future–A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
IEEE TrustCom 2016, 2016
A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks
H Rhim, K Tamine, R Abassi, D Sauveron, S Guemara
Human-centric Computing and Information Sciences 8, 1-21, 2018
Multiapplication smart card: Towards an open smart card?
D Sauveron
Information security technical report 14 (2), 70-78, 2009
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications
F Merabet, A Cherif, M Belkadi, O Blazy, E Conchon, D Sauveron
Peer-to-Peer Networking and Applications 13 (2), 439-474, 2020
TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks
R Abassi, A Ben Chehida Douss, D Sauveron
Human-centric Computing and Information Sciences 10, 1-19, 2020
An efficient, secure and trusted channel protocol for avionics wireless networks
RN Akram, K Markantonakis, K Mayes, PF Bonnefoi, D Sauveron, ...
2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 1-10, 2016
Secure autonomous uavs fleets by using new specific embedded secure elements
RN Akram, PF Bonnefoi, S Chaumette, K Markantonakis, D Sauveron
2016 IEEE Trustcom/BigDataSE/ISPA, 606-614, 2016
Secure distributed computing on a Java Card/spl trade/grid
S Chaumette, P Grange, A Karray, D Sauveron, P Vignéras
19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005
An Efficient and Simple Way to Test the Security of Java CardsTM.
S Chaumette, D Sauveron
WOSIS, 331-341, 2005
Optical wireless channel simulation for communications inside aircraft cockpits
P Combeau, S Joumessi-Demeffo, A Julien-Vergonjanne, L Aveneau, ...
Journal of Lightwave Technology 38 (20), 5635-5648, 2020
Security, privacy and trust of user-centric solutions
RN Akram, HH Chen, J Lopez, D Sauveron, LT Yang
Future Generation Computer Systems 80, 417-420, 2018
An efficient protocol for UAS security
O Blazy, PF Bonnefoi, E Conchon, D Sauveron, RN Akram, ...
2017 Integrated Communications, Navigation and Surveillance Conference (ICNS …, 2017
A Grid of Java CardsTM to Deal with Security Demanding Application Domains
E Atallah, S Chaumette, F Darrigade, A Karray, D Sauveron
Рroceedings of e-Smart, 2005
Secure mobile edge server placement using multi-agent reinforcement learning
MK Kasi, S Abu Ghazalah, RN Akram, D Sauveron
Electronics 10 (17), 2098, 2021
Multi-objective function-based node-disjoint multipath routing for mobile ad hoc networks
B Velusamy, K Karunanithy, D Sauveron, RN Akram, J Cho
Electronics 10 (15), 1781, 2021
MANETS: an exclusive choice between use and security?
PF Bonnefoi, D Sauveron, JH Park
Computing and Informatics 27 (5), 799-821, 2008
Some security problems raised by open multiapplication smart cards
S Chaumette, D Sauveron
10th Nordic workshop on secure IT-systems: NordSec 94, 2005
Overview of security threats for smart cards in the public transport industry
K Markantonakis, K Mayes, D Sauveron, IG Askoxylakis
2008 IEEE International Conference on e-Business Engineering, 506-513, 2008
Which trust can be expected of the common criteria certification at end-user level?
D Sauveron, P Dusart
Future Generation Communication and Networking (FGCN 2007) 2, 423-428, 2007
The system can't perform the operation now. Try again later.
Articles 1–20