Segui
Christophe Kiennert
Christophe Kiennert
Email verificata su telecom-sudparis.eu
Titolo
Citata da
Citata da
Anno
A survey on game-theoretic approaches for intrusion detection and response optimization
C Kiennert, Z Ismail, H Debar, J Leneutre
ACM Computing Surveys (CSUR) 51 (5), 1-31, 2018
642018
An innovative solution for cloud computing authentication: Grids of EAP-TLS smart cards
P Urien, E Marie, C Kiennert
2010 Fifth International Conference on Digital Telecommunications, 22-27, 2010
532010
Auditing a cloud provider’s compliance with data backup requirements: A game theoretical analysis
Z Ismail, C Kiennert, J Leneutre, L Chen
IEEE Transactions on Information Forensics and Security 11 (8), 1685-1699, 2016
362016
Integration of an adaptive trust‐based e‐assessment system into virtual learning environments—The TeSLA project experience
X Baró‐Solé, AE Guerrero‐Roldan, J Prieto‐Blázquez, A Rozeva, ...
Internet Technology Letters 1 (4), e56, 2018
192018
A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards
P Urien, M Pasquet, C Kiennert
2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011
192011
The influence of conception paradigms on data protection in e-learning platforms: A case study
C Kiennert, N De Vos, M Knockaert, J Garcia-Alfaro
IEEE Access 7, 64110-64119, 2019
182019
Security challenges in e-assessment and technical solutions
C Kiennert, PO Rocher, M Ivanova, A Rozeva, M Durcheva, ...
2017 21st International Conference Information Visualisation (IV), 366-371, 2017
182017
A new keying system for RFID lock based on SSL dual interface NFC chips and android mobiles
P Urien, C Kiennert
2012 IEEE Consumer Communications and Networking Conference (CCNC), 42-43, 2012
172012
, A Privacy-Preserving Certification Scheme
N Kaaniche, M Laurent, PO Rocher, C Kiennert, J Garcia-Alfaro
International Workshop on Data Privacy Management, 239-256, 2017
162017
Authentication systems
C Kiennert, S Bouzefrane, P Thoniel
Digital identity management, 95-135, 2015
122015
Data integrity and availability verification game in untrusted cloud storage
B Djebaili, C Kiennert, J Leneutre, L Chen
Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014
122014
A new convergent identity system based on eap-tls smart cards
P Urien, E Marie, C Kiennert
2011 Conference on Network and Information Systems Security, 1-6, 2011
122011
Anonymous certification for an e-assessment framework
C Kiennert, N Kaaniche, M Laurent, PO Rocher, J Garcia-Alfaro
Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia …, 2017
112017
A new cooperative architecture for sharing services managed by secure elements controlled by android phones with IP objects
P Urien, C Kiennert
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
112012
A new key delivering platform based on NFC enabled Android phone and Dual Interfaces EAP-TLS contactless smartcards
P Urien, C Kiennert
Mobile Computing, Applications, and Services: Third International Conference …, 2012
72012
Data Privacy Management, Cryptocurrencies and Blockchain Technology
N Kaaniche, M Laurent, PO Rocher, C Kiennert, J Garcia-Alfaro
Springer,, 2017
62017
A game theoretical model for optimal distribution of network security resources
Z Ismail, C Kiennert, J Leneutre, L Chen
Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017
62017
Optimizing resource allocation for secure SDN-based virtual network migration
F Charmet, G Blanc, C Kiennert
2019 IEEE 18th International Symposium on Network Computing and Applications …, 2019
42019
Preserving confidentiality during the migration of virtual SDN topologies: A formal approach
F Charmet, R Waldinger, G Blanc, C Kiennert, K Toumi
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
42017
Methodology of a network simulation in the context of an evaluation: application to an IDS
PM Bajan, C Kiennert, H Debar
ICISSP 2019: 5th International Conference on Information Systems Security …, 2019
22019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20