default search action
Pascal Urien
- > Home > Persons > Pascal Urien
Publications
- 2021
- [j12]Kodjo Edem Agbezoutsi, Pascal Urien, Toundé Mesmin Dandjinou:
Mobile money traceability and federation using blockchain services. Ann. des Télécommunications 76(3-4): 223-233 (2021) - [j11]Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Pascal Urien:
Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review. Sensors 21(24): 8415 (2021) - [j10]Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien:
Security Analysis of Out-of-Band Device Pairing Protocols: A Survey. Wirel. Commun. Mob. Comput. 2021: 8887472:1-8887472:30 (2021) - [c94]Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien:
Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. NCA 2021: 1-10 - [c93]Farah Haidar, Farah Braiteh, Brigitte Lonc, Arnaud Kaiser, Pascal Urien:
Performance Evaluation of Pseudonym Reload over Cellular Technology. NTMS 2021: 1-4 - 2020
- [j9]Joseph Kamel, Mohammad Raashid Ansari, Jonathan Petit, Arnaud Kaiser, Inès Ben Jemaa, Pascal Urien:
Simulation Framework for Misbehavior Detection in Vehicular Networks. IEEE Trans. Veh. Technol. 69(6): 6631-6643 (2020) - [c89]Joseph Kamel, Michael Wolf, Rens W. van der Heijden, Arnaud Kaiser, Pascal Urien, Frank Kargl:
VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. ICC 2020: 1-6 - [c88]Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Jingxuan Ma, Pascal Urien:
COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment. SecureComm (2) 2020: 419-438 - [c87]Farah Haidar, Joseph Kamel, Inès Ben Jemaa, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
DARE: A Reports Dataset for Global Misbehavior Authority Evaluation in C-ITS. VTC Spring 2020: 1-6 - 2019
- [c82]Kodjo Edem Agbezoutsi, Pascal Urien, Toundé Mesmin Dandjinou:
Towards Blockchain Services For Mobile Money Traceability And Federation. CSNet 2019: 14-20 - [c80]Farah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
Risk Analysis on C-ITS Pseudonymity Aspects. NTMS 2019: 1-5 - [c78]Joseph Kamel, Farah Haidar, Inès Ben Jemaa, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
A Misbehavior Authority System for Sybil Attack Detection in C-ITS. UEMCON 2019: 1117-1123 - [c77]Joseph Kamel, Inès Ben Jemaa, Arnaud Kaiser, Loic Cantat, Pascal Urien:
Misbehavior Detection in C-ITS: A comparative approach of local detection mechanisms. VNC 2019: 1-8 - [c76]Joseph Kamel, Arnaud Kaiser, Inès Ben Jemaa, Pierpaolo Cincilla, Pascal Urien:
CaTch: A Confidence Range Tolerant Misbehavior Detection Approach. WCNC 2019: 1-8 - [c75]Farah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
C-ITS PKI protocol: performance evaluation in a real environment. WONS 2019: 52-55 - 2018
- [c73]Jean-Philippe Monteuuis, Aymen Boudguiga, Jun Zhang, Houda Labiod, Alain Servel, Pascal Urien:
SARA: Security Automotive Risk Analysis Method. CPSS@AsiaCCS 2018: 3-14 - [c70]Joseph Kamel, Inès Ben Jemaa, Arnaud Kaiser, Pascal Urien:
Misbehavior Reporting Protocol for C-ITS. VNC 2018: 1-4 - [c69]Farah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien, Richard Denis:
C-ITS Use Cases: Study, Extension and Classification Methodology. VTC Spring 2018: 1-5 - [c68]Joseph Kamel, Arnaud Kaiser, Inès Ben Jemaa, Pierpaolo Cincilla, Pascal Urien:
Feasibility Study of Misbehavior Detection Mechanisms in Cooperative Intelligent Transport Systems (C-ITS). VTC Spring 2018: 1-5 - 2017
- [c66]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System. ICDCS Workshops 2017: 105-112 - 2016
- [c62]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
A new approach to investigate IoT threats based on a four layer model. NOTERE 2016: 1-6 - 2015
- [c55]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
Internet of Things: A Definition & Taxonomy. NGMAST 2015: 72-77 - [e1]Mohamad Badra, Azzedine Boukerche, Pascal Urien:
7th International Conference on New Technologies, Mobility and Security, NTMS 2015, Paris, France, July 27-29, 2015. IEEE 2015, ISBN 978-1-4799-8784-9 [contents] - 2014
- [c54]Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle:
Global identity management of virtual machines based on remote secure elements. CITS 2014: 1-4 - [c51]Davi da Silva Böger, Luciano Barreto, Joni da Silva Fraga, Pascal Urien, Hassane Aissaoui, André Santos, Guy Pujolle:
User-centric Identity Management based on secure elements. ISCC 2014: 1-6 - [c49]Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle:
Implementation Software to Secure Virtual Machines with Remote Grid of Secure Elements. MILCOM 2014: 282-287 - [c48]Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle:
Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines. SECRYPT 2014: 285-290 - 2013
- [c43]Chrystel Gaber, Baptiste Hemery, Mohammed Achemlal, Marc Pasquet, Pascal Urien:
Synthetic logs generator for fraud detection in mobile transfer services. CTS 2013: 174-179 - [c42]Chrystel Gaber, Baptiste Hemery, Mohammed Achemlal, Marc Pasquet, Pascal Urien:
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services. Financial Cryptography 2013: 397-398 - [c38]Hassane Aissaoui, Pascal Urien, Guy Pujolle:
Low Latency of Re-authentication during Handover - Re-authentication using a Signed Token in Heterogeneous Wireless Access Networks. SIGMAP 2013: 248-254 - 2012
- [c37]Pascal Urien, Christophe Kiennert:
A new keying system for RFID lock based on SSL dual interface NFC chips and android mobiles. CCNC 2012: 42-43 - [c36]Pascal Urien, Christophe Kiennert:
A new cooperative architecture for sharing services managed by secure elements controlled by android phones with IP objects. CTS 2012: 404-409 - [c35]Fouad Amine Guenane, Nouha Samet, Guy Pujolle, Pascal Urien:
A strong authentication for virtual networks using EAP-TLS smart cards. GIIS 2012: 1-6 - 2011
- [c33]Dorice Nyamy, Pascal Urien:
HIP-TAG, a new paradigm for the Internet of Things. CCNC 2011: 49-54 - [c31]Pascal Urien, Marc Pasquet, Christophe Kiennert:
A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards. CTS 2011: 476-483 - [c30]Pascal Urien, Christophe Kiennert:
A New Key Delivering Platform Based on NFC Enabled Android Phone and Dual Interfaces EAP-TLS Contactless Smartcards. MobiCASE 2011: 387-394 - 2010
- [j7]Samer El-Sawda, Pascal Urien, Rami El Sawda:
SIP SecLite: SIP Security Solution All in One. J. Next Gener. Inf. Technol. 1(1): 86-99 (2010) - [c29]Samer El-Sawda, Pascal Urien, Rami El Sawda:
A trust communication with SIP protocol. AICCSA 2010: 1-6 - 2008
- [j6]Pascal Urien, Guy Pujolle:
Security and privacy for the next wireless generation. Int. J. Netw. Manag. 18(2): 129-145 (2008) - [c21]Aroua Biri, Pascal Urien, Emmanuel Onfroy, Hossam Afifi:
A Novel Architecture for securing data delivery in Internet. ICOIN 2008: 1-5 - [c20]Pascal Urien, Dorice Nyami, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan, Jean-Ferdy Susini:
HIP Tags Privacy Architecture. ICSNC 2008: 179-184 - [c19]Mohamad Badra, Pascal Urien:
TLS Tandem. NTMS 2008: 1-5 - [c18]Pascal Urien, Simon Elrharbi, Dorice Nyamy, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Patrice Krzanik, Jean-Ferdinand Susini:
HIP-tags, a new paradigm for the Internet Of Things. Wireless Days 2008: 1-5 - 2007
- [j5]Mohamad Badra, Pascal Urien, Ibrahim Hajjeh:
Flexible and fast security solution for wireless LAN. Pervasive Mob. Comput. 3(1): 1-14 (2007) - [c16]Mohamad Badra, Pascal Urien:
Adding Identity Protection to EAP-TLS Smartcards. WCNC 2007: 2951-2956 - 2006
- [c15]Pascal Urien, Mesmin Dandjinou:
Designing Smartcards for Emerging Wireless Networks. CARDIS 2006: 165-178 - [c14]Pascal Urien, Mesmin Dandjinou, Mohamad Badra:
Introducing trusted EAP module for security enhancement in WLANs and VPNs. Communication, Network, and Information Security 2006: 191-198 - [c13]Pascal Urien, Mesmin Dandjinou:
Introducing Smartcard Enabled RADIUS Server. CTS 2006: 74-80 - [c12]Pascal Urien, Mohamad Badra:
Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures. SECRYPT 2006: 157-163 - 2005
- [j4]Artur Hecker, Houda Labiod, Guy Pujolle, Hossam Afifi, Ahmed Serhrouchni, Pascal Urien:
A New Access Control Solution for a Multi-Provider Wireless Environment. Telecommun. Syst. 29(2): 131-152 (2005) - [c11]Pascal Urien, Mesmin Dandjinou:
The OpenEapSmartcard platform. Net-Con 2005: 75-86 - 2004
- [j3]Marc Loutrel, Pascal Urien, Dominique Gaïti:
Authentication in wireless networks: state of the art and integration with smart card. Ann. des Télécommunications 59(1-2): 130-148 (2004) - [j2]Mohamad Badra, Ahmed Serhrouchni, Pascal Urien:
A lightweight identity authentication protocol for wireless networks. Comput. Commun. 27(17): 1738-1745 (2004) - [c10]Mohamad Badra, Pascal Urien:
Enhancing WLAN Security by Introducing EAP-TLS Smartcards. ICWI 2004: 342-349 - [c9]Mohamad Badra, Pascal Urien:
Toward SSL integration in SIM SmartCards. WCNC 2004: 889-893 - 2003
- [c6]Bachar Zouari, Hossam Afifi, Artur Hecker, Houda Labiod, Guy Pujolle, Pascal Urien:
A novel authentication model based on secured IP smart cards. ICC 2003: 809-813 - [c5]Marc Loutrel, Pascal Urien, Guy Pujolle:
A smartcard for authentication in WLANs. LANC 2003: 125-130 - 2002
- [c4]Marc Loutrel, Pascal Urien, Dominique Gaïti:
An EAP-BT smartcard for authentication in the next generation of wireless communications. Net-Con 2002: 103-114 - [c3]Alain Ringapin, Jalel Ben-Othman, Pascal Urien:
Mobility and security in IP network. PIMRC 2002: 280-284 - 2001
- [c1]Pascal Urien, Hayder Saleh, Adel Tizraoui:
XML Smartcards. ICN (1) 2001: 811-820
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-02 20:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint