| 2008 |
| 20 | EE | Mohammad Ashiqur Rahaman,
Yves Roudier,
Andreas Schaad:
Distributed Access Control For XML Document Centric Collaborations.
EDOC 2008: 267-276 |
| 19 | EE | Nouha Oualha,
Yves Roudier:
Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory.
IWSOS 2008: 47-58 |
| 18 | EE | Nouha Oualha,
Melek Önen,
Yves Roudier:
A Security Protocol for Self-Organizing Data Storage.
SEC 2008: 675-679 |
| 2007 |
| 17 | EE | Slim Trabelsi,
Laurent Gomez,
Yves Roudier:
Context-Aware Security Policy for the Service Discovery.
AINA Workshops (1) 2007: 477-482 |
| 16 | EE | Nouha Oualha,
Pietro Michiardi,
Yves Roudier:
A Game Theoretic Model of a Protocol for Data Possession Verification.
WOWMOM 2007: 1-6 |
| 2006 |
| 15 | EE | Slim Trabelsi,
Jean-Christophe R. Pazzaglia,
Yves Roudier:
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing.
ECOWS 2006: 35-43 |
| 14 | EE | Slim Trabelsi,
Jean-Christophe R. Pazzaglia,
Yves Roudier:
Enabling Secure Discovery in a Pervasive Environment.
SPC 2006: 18-31 |
| 2005 |
| 13 | EE | Matija Puzar,
Jon Andersson,
Thomas Plagemann,
Yves Roudier:
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations.
ESAS 2005: 14-26 |
| 2004 |
| 12 | EE | Marc-Olivier Killijian,
David Powell,
Michel Banâtre,
Paul Couderc,
Yves Roudier:
Collaborative backup for dependable mobile applications.
Middleware for Pervasive and Ad-hoc Computing 2004: 146-149 |
| 11 | EE | Laurent Bussard,
Yves Roudier,
Refik Molva:
Untraceable Secret Credentials: Trust Establishment with Privacy.
PerCom Workshops 2004: 122-126 |
| 10 | EE | Thomas Walter,
Laurent Bussard,
Philip Robinson,
Yves Roudier:
Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension.
SAINT Workshops 2004: 696-701 |
| 9 | EE | Laurent Bussard,
Refik Molva,
Yves Roudier:
History-Based Signature or How to Trust Anonymous Documents.
iTrust 2004: 78-92 |
| 2003 |
| 8 | EE | Laurent Bussard,
Yves Roudier,
Roger Kilian-Kehr,
Stefano Crosta:
Trust and Authorization in Pervasive B2E Scenarios.
ISC 2003: 295-309 |
| 7 | EE | Laurent Bussard,
Yves Roudier:
Embedding Distance-Bounding Protocols within Intuitive Interactions.
SPC 2003: 143-156 |
| 2002 |
| 6 | EE | Sergio Loureiro,
Laurent Bussard,
Yves Roudier:
Extending Tamper-Proof Hardware Security to Untrusted Execution Environments.
CARDIS 2002: 111-124 |
| 5 | | Yves Roudier,
Olivier Fouache,
Pierre Vannel,
Refik Molva:
Enabling adaptive and secure extranets.
Communications and Multimedia Security 2002: 123-135 |
| 2000 |
| 4 | EE | Refik Molva,
Yves Roudier:
A Distributed Access Control Model for Java.
ESORICS 2000: 291-308 |
| 1997 |
| 3 | | Yuuji Ichisugi,
Yves Roudier:
The Extensible Java Preprocessor Kit and a Tiny Data-Parallel Java.
ISCOPE 1997: 153-160 |
| 1996 |
| 2 | | Françoise Baude,
Fabrice Belloncle,
Denis Caromel,
Nathalie Furmento,
Yves Roudier,
Philippe Mussi,
Günther Siegel:
Parallel Object-Oriented Programming for Parallel Simulations.
Inf. Sci. 93(1): 35-64 (1996) |
| 1995 |
| 1 | | Denis Caromel,
Yves Roudier:
Reactive Programming in Eiffel//.
OBPDC 1995: 125-147 |