dblp.uni-trier.dewww.uni-trier.de

Yves Roudier

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
20EEMohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad: Distributed Access Control For XML Document Centric Collaborations. EDOC 2008: 267-276
19EENouha Oualha, Yves Roudier: Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory. IWSOS 2008: 47-58
18EENouha Oualha, Melek Önen, Yves Roudier: A Security Protocol for Self-Organizing Data Storage. SEC 2008: 675-679
2007
17EESlim Trabelsi, Laurent Gomez, Yves Roudier: Context-Aware Security Policy for the Service Discovery. AINA Workshops (1) 2007: 477-482
16EENouha Oualha, Pietro Michiardi, Yves Roudier: A Game Theoretic Model of a Protocol for Data Possession Verification. WOWMOM 2007: 1-6
2006
15EESlim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier: Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. ECOWS 2006: 35-43
14EESlim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier: Enabling Secure Discovery in a Pervasive Environment. SPC 2006: 18-31
2005
13EEMatija Puzar, Jon Andersson, Thomas Plagemann, Yves Roudier: SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations. ESAS 2005: 14-26
2004
12EEMarc-Olivier Killijian, David Powell, Michel Banâtre, Paul Couderc, Yves Roudier: Collaborative backup for dependable mobile applications. Middleware for Pervasive and Ad-hoc Computing 2004: 146-149
11EELaurent Bussard, Yves Roudier, Refik Molva: Untraceable Secret Credentials: Trust Establishment with Privacy. PerCom Workshops 2004: 122-126
10EEThomas Walter, Laurent Bussard, Philip Robinson, Yves Roudier: Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. SAINT Workshops 2004: 696-701
9EELaurent Bussard, Refik Molva, Yves Roudier: History-Based Signature or How to Trust Anonymous Documents. iTrust 2004: 78-92
2003
8EELaurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta: Trust and Authorization in Pervasive B2E Scenarios. ISC 2003: 295-309
7EELaurent Bussard, Yves Roudier: Embedding Distance-Bounding Protocols within Intuitive Interactions. SPC 2003: 143-156
2002
6EESergio Loureiro, Laurent Bussard, Yves Roudier: Extending Tamper-Proof Hardware Security to Untrusted Execution Environments. CARDIS 2002: 111-124
5 Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva: Enabling adaptive and secure extranets. Communications and Multimedia Security 2002: 123-135
2000
4EERefik Molva, Yves Roudier: A Distributed Access Control Model for Java. ESORICS 2000: 291-308
1997
3 Yuuji Ichisugi, Yves Roudier: The Extensible Java Preprocessor Kit and a Tiny Data-Parallel Java. ISCOPE 1997: 153-160
1996
2 Françoise Baude, Fabrice Belloncle, Denis Caromel, Nathalie Furmento, Yves Roudier, Philippe Mussi, Günther Siegel: Parallel Object-Oriented Programming for Parallel Simulations. Inf. Sci. 93(1): 35-64 (1996)
1995
1 Denis Caromel, Yves Roudier: Reactive Programming in Eiffel//. OBPDC 1995: 125-147

Coauthor Index

1Jon Andersson [13]
2Michel Banâtre [12]
3Françoise Baude [2]
4Fabrice Belloncle [2]
5Laurent Bussard [6] [7] [8] [9] [10] [11]
6Denis Caromel [1] [2]
7Paul Couderc [12]
8Stefano Crosta [8]
9Olivier Fouache [5]
10Nathalie Furmento [2]
11Laurent Gomez [17]
12Yuuji Ichisugi [3]
13Roger Kilian-Kehr [8]
14Marc-Olivier Killijian [12]
15Sergio Loureiro [6]
16Pietro Michiardi [16]
17Refik Molva [4] [5] [9] [11]
18Philippe Mussi [2]
19Melek Önen [18]
20Nouha Oualha [16] [18] [19]
21Jean-Christophe R. Pazzaglia [14] [15]
22Thomas Plagemann [13]
23David Powell [12]
24Matija Puzar [13]
25Mohammad Ashiqur Rahaman [20]
26Philip Robinson [10]
27Andreas Schaad [20]
28Günther Siegel [2]
29Slim Trabelsi [14] [15] [17]
30Pierre Vannel [5]
31Thomas Walter [10]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)