Managing the Performance Impact of Web Security, Electronic Commerce Research, vol.5, issue.1, p.99116, 2005. ,
DOI : 10.1023/B:ELEC.0000045975.59531.08
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security, The Journal of Supercomputing, vol.24, issue.1, pp.33-50, 2006. ,
DOI : 10.1007/s11227-006-3549-4
Adaptive Approach to Network Security, Communications in Computer and Information Science, vol.14, issue.3, pp.233-241, 2009. ,
DOI : 10.1016/j.cose.2004.11.002
On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems " ; European Teletraffic Seminar, pp.195-202, 2011. ,
Security and Compliance in Clouds " ; IT-Compliance, 4th Pan-European Conference, 2011. ,
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML), Annales UMCS, Informatica, vol.12, issue.4, pp.69-81, 2012. ,
DOI : 10.2478/v10065-012-0032-0
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML), QoP-ML) Lecture Notes in Computer Science, vol.7804, pp.261-270, 2013. ,
DOI : 10.1007/978-3-642-36818-9_27
URL : https://hal.archives-ouvertes.fr/hal-01480233
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy, Computer Communications, vol.26, issue.16, pp.1873-1883, 2003. ,
DOI : 10.1016/S0140-3664(03)00082-3
QoP-ML: Quality of Protection modelling language for cryptographic protocols " ; Computers & Security, pp.569-596 ,
Multilevel Modeling of Secure Systems in QoP, pp.1-256, 2015. ,
DOI : 10.1201/b18579
Quality of Protection Evaluation of Security Mechanisms, The Scientific World Journal, vol.135, 2014. ,
DOI : 10.1016/S0004-3702(96)00041-0
: visualizing the performance prediction of parallel iterative solvers, Future Generation Computer Systems, vol.19, issue.5, pp.721-733, 2003. ,
DOI : 10.1016/S0167-739X(02)00180-2
Automated Security Protocol Analysis With the AVISPA Tool, Electronic Notes in Theoretical Computer Science, vol.155, pp.61-86, 2006. ,
DOI : 10.1016/j.entcs.2005.11.052
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.417-431, 2008. ,
DOI : 10.1109/SP.2008.12
Tools for secure systems development with UML, International Journal on Software Tools for Technology Transfer, vol.10, issue.1, pp.527-544, 2007. ,
DOI : 10.1007/s10009-007-0048-8
Fundamental Aspects of Acoustic Emission Applications to the Problems Caused by Corrosion " ; Corrosion Monitoring in Industrial Plants Using Nondestructive Testing and Electrochemical Methods, American Society for Testing and Materials, pp.43-74, 1986. ,
Early Corrosion Detection in Prestressed Concrete Girders Using Acoustic Emission, Journal of Materials in Civil Engineering, vol.26, issue.3, pp.2014-504511 ,
DOI : 10.1061/(ASCE)MT.1943-5533.0000845
Energy efficiency in wireless sensor networks: A top-down survey, Computer Networks, vol.67, pp.104-122, 2014. ,
DOI : 10.1016/j.comnet.2014.03.027
URL : https://hal.archives-ouvertes.fr/hal-01009386
Electrical parameters influence on the dynamics of the hodgkinhuxley liquid state machine, Neurocomputing, vol.79, p.6878, 2012. ,
Analysis of the neural hypercolumn in parallel PCSIM simulations, Procedia Computer Science, vol.1, issue.1, pp.845-854, 2010. ,
DOI : 10.1016/j.procs.2010.04.092
Multihop Node Authentication Mechanisms for Wireless Sensor Networks, Ad-hoc, Mobile, and Wireless Networks, 2014. ,
DOI : 10.1007/978-3-319-07425-2_30