default search action
Damien Leroy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [j3]Damien Leroy, Gregory Detal, Julien Cathalo, Mark Manulis, François Koeune, Olivier Bonaventure:
SWISH: Secure WiFi sharing. Comput. Networks 55(7): 1614-1630 (2011) - [c9]Sébastien Piérard, Damien Leroy, Jean-Frédéric Hansen, Marc Van Droogenbroeck:
Estimation of Human Orientation in Images Captured with a Range Camera. ACIVS 2011: 519-530
2000 – 2009
- 2009
- [j2]Damien Leroy, Olivier Bonaventure:
Preparing network configurations for IPv6 renumbering. Int. J. Netw. Manag. 19(5): 415-426 (2009) - [c8]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home. AsiaCCS 2009: 92-103 - [c7]Gregory Detal, Damien Leroy, Olivier Bonaventure:
An adaptive three-party accounting protocol. StudentWorkshop@CoNEXT 2009: 3-4 - [c6]Damien Leroy, Mark Manulis, Olivier Bonaventure:
Enhanced wireless roaming security using three-party authentication and tunnels. U-NET@CoNEXT 2009: 7-12 - 2008
- [j1]Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, Jean-Jacques Quisquater:
WiFi Roaming: Legal Implications and Security Constraints. Int. J. Law Inf. Technol. 16(3): 205-241 (2008) - [c5]Damien Leroy, Rémi Gaillard, Erwin Schäfer, Cyrille Beltrando, Shi-Jie Wen, Richard Wong:
Variation of SRAM Alpha-Induced Soft Error Rate with Technology Node. IOLTS 2008: 253-257 - [c4]Damien Leroy, Olivier Bonaventure:
A Secure Mechanism for Address Block Allocation and Distribution. Networking 2008: 748-755 - [i1]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home. IACR Cryptol. ePrint Arch. 2008: 382 (2008) - 2007
- [c3]Damien Leroy, Olivier Bonaventure:
A secure role-based address allocation and distribution mechanism. CoNEXT 2007: 55 - 2006
- [c2]Damien Leroy, Stanislaw J. Piestrak, Fabrice Monteiro, Abbas Dandache, Stéphane Rossignol, Pascal Moitrel:
Characterizing Laser-Induced Pulses in ICs: Methodology and Results. IOLTS 2006: 11-16 - 2005
- [c1]Damien Leroy, Stanislaw J. Piestrak, Fabrice Monteiro, Abbas Dandache:
Modeling of Transients Caused by a Laser Attack on Smart Cards. IOLTS 2005: 193-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint