Password strength: An empirical analysis M Dell'Amico, P Michiardi, Y Roudier 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 390 | 2010 |
Security requirements for automotive on-board networks O Henniger, L Apvrille, A Fuchs, Y Roudier, A Ruddle, B Weyl 2009 9th International Conference on Intelligent Transport Systems …, 2009 | 156 | 2009 |
Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography H Schweppe, Y Roudier, B Weyl, L Apvrille, D Scheuermann 2011 IEEE Vehicular Technology Conference (VTC Fall), 1-5, 2011 | 117 | 2011 |
Secure automotive on-board protocols: A case of over-the-air firmware updates MS Idrees, H Schweppe, Y Roudier, M Wolf, D Scheuermann, O Henniger Communication Technologies for Vehicles: Third International Workshop …, 2011 | 98 | 2011 |
Security requirements for automotive on-board networks based on dark-side scenarios A Ruddle, B Weyl, S Idrees, Y Roudier, M Friedewald, T Leimbach, ... European Commission, 2009 | 86 | 2009 |
A risk assessment model for selecting cloud service providers E Cayirci, A Garaga, A Santana de Oliveira, Y Roudier Journal of Cloud Computing 5 (1), 14, 2016 | 83 | 2016 |
SysML-Sec: A model driven approach for designing safe and secure systems Y Roudier, L Apvrille 2015 3rd International Conference on Model-Driven Engineering and Software …, 2015 | 71 | 2015 |
Secure on-board architecture specification B Weyl, M Wolf, F Zweers, T Gendrullis, MS Idrees, Y Roudier, ... Evita Deliverable D 3, 2, 2010 | 66 | 2010 |
Security and privacy for in-vehicle networks H Schweppe, Y Roudier 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing …, 2012 | 65 | 2012 |
SysML-Sec: A SysML environment for the design and development of secure embedded systems L Apvrille, Y Roudier APCOSEC, Asia-Pacific Council on Systems Engineering, 8-11, 2013 | 62 | 2013 |
Secure automotive on-board electronics network architecture L Apvrille, R El Khayari, O Henniger, Y Roudier, H Schweppe, H Seudié, ... FISITA 2010 world automotive congress, Budapest, Hungary 8, 2010 | 57 | 2010 |
Enabling message security for RESTful services G Serme, AS de Oliveira, J Massiera, Y Roudier 2012 IEEE 19th International Conference on Web Services, 114-121, 2012 | 56 | 2012 |
Deliverable D2. 3: Security requirements for automotive on-board networks based on dark-side scenarios A Ruddle, D Ward, B Weyl, S Idrees, Y Roudier, M Friedewald, ... EVITA project, 2009 | 49 | 2009 |
Static code analysis for software security verification: Problems and approaches Z Zhioua, S Short, Y Roudier 2014 IEEE 38th International Computer Software and Applications Conference …, 2014 | 46 | 2014 |
Comparing encrypted documents having structured data MA Rahaman, A Schaad, H Plate, Y Roudier US Patent 8,726,151, 2014 | 46 | 2014 |
Mobile code security S Loureiro, R Molva, Y Roudier Proceedings of ISYPAR, 46, 2000 | 46 | 2000 |
The extensible Java preprocessor kit and a tiny data-parallel Java Y Ichisugi, Y Roudier International Conference on Computing in Object-Oriented Parallel …, 1997 | 41 | 1997 |
A security protocol for self-organizing data storage N Oualha, M Önen, Y Roudier Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 38 | 2008 |
Autonomous drones for disasters management: Safety and security verifications L Apvrille, Y Roudier, TJ Tanzi 2015 1st URSI Atlantic Radio Science Conference (URSI AT-RASC), 1-2, 2015 | 36 | 2015 |
A cloud adoption risk assessment model E Cayirci, A Garaga, A Santana, Y Roudier 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014 | 35 | 2014 |