Christophe Kiennert

According to our database1, Christophe Kiennert authored at least 19 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Anonymous certification for E-assessment opinion polls.
J. Ambient Intell. Humaniz. Comput., 2023

2019
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization.
ACM Comput. Surv., 2019

The Influence of Conception Paradigms on Data Protection in E-Learning Platforms: A Case Study.
IEEE Access, 2019

Optimizing Resource Allocation for Secure SDN-based Virtual Network Migration.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Integration of an adaptive trust-based e-assessment system into virtual learning environments - The TeSLA project experience.
Internet Technol. Lett., 2018

2017
Anonymous Certification for an e-Assessment Framework.
Proceedings of the Secure IT Systems, 2017

Preserving confidentiality during the migration of virtual SDN topologies: A formal approach.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Security Challenges in e-Assessment and Technical Solutions.
Proceedings of the 21st International Conference Information Visualisation, 2017

A Game Theoretical Model for Optimal Distribution of Network Security Resources.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

<i>PCS</i> , A Privacy-Preserving Certification Scheme.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis.
IEEE Trans. Inf. Forensics Secur., 2016

2014
Data Integrity and Availability Verification Game in Untrusted Cloud Storage.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
Towards a Secure Identity Management in Smartphone Environments.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Elaboration d'un modèle d'identité numérique adapté à la convergence. (Development of a convergence-oriented digital identity framework).
PhD thesis, 2012

A new cooperative architecture for sharing services managed by secure elements controlled by android phones with IP objects.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

A new keying system for RFID lock based on SSL dual interface NFC chips and android mobiles.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
A New Key Delivering Platform Based on NFC Enabled Android Phone and Dual Interfaces EAP-TLS Contactless Smartcards.
Proceedings of the Mobile Computing, Applications, and Services, 2011

A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011


  Loading...