Jean-Marc Seigneur

Orcid: 0000-0002-3271-2905

According to our database1, Jean-Marc Seigneur authored at least 65 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
NFT Trust Survey.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

A Rule-Language Tailored for Financial Inclusion and KYC/AML Compliance.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

2022
Towards a decentralized social trust solution to proof-of-address.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

How should metaverse augment humans with disabilities?: This paper discusses how the metaverse should augment the humans with disabilities.
Proceedings of the AH 2022: 13th Augmented Human International Conference, Winnipeg, MB, Canada, May 26, 2022

Recognition System for Behavior & Activities of Daily Living Among Patients with Dementia Using Smart Algorithms and Assistive Technology.
Proceedings of the AH 2022: 13th Augmented Human International Conference, Winnipeg, MB, Canada, May 26, 2022

2021
The Role of Technology in Senior Co-Caregiving Support: A Scoping Review of Senior Care Mobile Applications.
Proceedings of the AH 2021: 12th Augmented Human International Conference, 2021

2020
Blockchain real estate relational value survey.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Body chain: using blockchain to reach augmented body health state consensus.
Proceedings of the AH '20: 11th Augmented Human International Conference, 2020

2018
A Survey on Trust in Augmented Human Technologies.
Proceedings of the Human Systems Engineering and Design, 2018

2017
Wi-Trust: Computational Trust and Reputation Management for Stronger Hotspot 2.0 Security.
J. ICT Stand., 2017

Design and validation of a trust-based opportunity-enabled risk management system.
Inf. Comput. Secur., 2017

Preface of the Section Focused on Superhuman Technology.
Adv. Robotics, 2017

2016
Electrosmog Visualization through Augmented Blurry Vision.
Proceedings of the 7th Augmented Human International Conference, 2016

Augmented Winter Ski with AR HMD.
Proceedings of the 7th Augmented Human International Conference, 2016

2015
Formal Modeling and Verification of Opportunity-enabled Risk Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Wi-trust: Improving Wi-Fi hotspots trustworthiness with computational trust management.
Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, 2015

WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts.
Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, 2015

2014
TEFIS: A single access point for conducting multifaceted experiments on heterogeneous test facilities.
Comput. Networks, 2014

Case study: legal requirements for the use of social login features for online reputation updates.
Proceedings of the Symposium on Applied Computing, 2014

Extending Trust Management with Cooperation Incentives: Achieving Collaborative Wi-Fi Sharing Using Trust Transfer to Stimulate Cooperative Behaviours.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based Networks.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

2013
Special Issue on Advanced Information Security for Secure and Trust Computing.
Comput. Math. Appl., 2013

Secure user-friendly Wi-Fi access point joining.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Achieving Collaborative Wi-Fi Sharing without Changing Current Technologies.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Dispositional Trust Adaptation in User-Centric Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Virtual currency and reputation-based cooperation incentives in user-centric networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Crowd augmented wireless access.
Proceedings of the 3rd Augmented Human International Conference, 2012

2011
Adaptive Trust Management.
Proceedings of the Self-organising Software - From Natural to Artificial Adaptation, 2011

Trust and Reputation for Successful Software Self-organisation.
Proceedings of the Self-organising Software - From Natural to Artificial Adaptation, 2011

Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service.
Proceedings of the IEEE 10th International Conference on Trust, 2011

The emotional economy for the augmented human.
Proceedings of the 2nd Augmented Human International Conference, 2011

2010
Local ePolitics Reputation Case Study
CoRR, 2010

Reputation-based Telecommunication Network Selection
CoRR, 2010

Verifying Hotspot Quality User Rating with Certified QoS Evidence.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Towards mobile/wearable device electrosmog reduction through careful network selection.
Proceedings of the 1st Augmented Human International Conference, 2010

2009
Social Trust of Virtual Identities.
Proceedings of the Computing with Social Trust, 2009

2008
Fourth special track on Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK'08): editorial message.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Mobile Location-Based Services for Trusted Information in Disaster Management.
Proceedings of the Information Systems Development, 2008

2007
TrustMIX: Trustworthy MIX for Energy Saving in Sensor Networks
CoRR, 2007

Trustworthily Forwarding Sensor Networks Information to the Internet.
Proceedings of the First International Conference on Emerging Security Information, 2007

A Survey of User-centric Identity Management Technologies.
Proceedings of the First International Conference on Emerging Security Information, 2007

Trustworthiness of collaborative Open Source Software quality assessment.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2006
Towards Trustworthy Spatial Messaging.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06).
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Trust and security in spatial messaging: FoxyTag, the speed camera case study.
Proceedings of the 2006 International Conference on Privacy, 2006

Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Fostering sustainability via trust engines.
IEEE Technol. Soc. Mag., 2005

The Claim Tool Kit for ad hoc recognition of peer entities.
Sci. Comput. Program., 2005

Trust Evolution Policies for Security in Collaborative Ad Hoc Applications.
Proceedings of the First International Workshop on Security and Trust Management, 2005

Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK).
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Trust Transfer: Encouraging Self-recommendations Without Sybil Attack.
Proceedings of the Trust Management, Third International Conference, 2005

Towards an Evaluation Methodology for Computational Trust Systems.
Proceedings of the Trust Management, Third International Conference, 2005

Implementation of the SECURE Trust Engine.
Proceedings of the Trust Management, Third International Conference, 2005

2004
Interacting with trust in ambient intelligence.
Proceedings of the Actes des 1ères journées francophones Mobilité et Ubiquité 2004, 2004

Trust enhanced ubiquitous payment without too much privacy loss.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Combating Spam with TEA.
Proceedings of the Second Annual Conference on Privacy, 2004

Trading Privacy for Trust.
Proceedings of the Trust Management, Second International Conference, 2004

Ambient Intelligence Through Image Retrieval.
Proceedings of the Image and Video Retrieval: Third International Conference, 2004

2003
Using Trust for Secure Collaboration in Uncertain Environments.
IEEE Pervasive Comput., 2003

Privacy Recovery with Disposable Email Addresses.
IEEE Secur. Priv., 2003

End-to-End Trust Starts with Recognition.
Proceedings of the Security in Pervasive Computing, 2003

P2P with JXTA-Java pipes.
Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, 2003

Trust Propagation in Small Worlds.
Proceedings of the Trust Management, First International Conference, 2003

Risk Probability Estimating Based on Clustering.
Proceedings of the IEEE Systems, 2003


  Loading...