Identity-Based Encryption from the Weil Pairing, Advances in Cryptology -Crypto'2001, pp.213-229, 2001. ,
DOI : 10.1007/3-540-44647-8_13
A new ID-based group signature scheme from bilinear pairings, Information Security Applications, 4th International Workshop -WISA'03, pp.585-592, 2003. ,
A Flexible and Secure Deployment Framework for Distributed Applications, In Lecture Notes in Computer Science, vol.3083, pp.219-233, 2004. ,
DOI : 10.1007/978-3-540-24848-4_15
Ten risks of pki: What you're not being told about public key infrastructure, Computer Security Journal, vol.16, issue.1, 2000. ,
Supporting Secure Deployment of Portal Components, ICWE 2004, number 3140 in LNCS, pp.516-520, 2004. ,
DOI : 10.1007/978-3-540-27834-4_62
Cryptographic message syntax (cms) ,
DOI : 10.17487/rfc5652
A mac-based service bundle authentication mechanism in the osgi service platform, DASFAA, 2004. ,
Bundle authentication and authorization using xml security in the osgi service platform, ICIS '05: Proceedings of the Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05), pp.502-507, 2005. ,
A smartfrog tutorial, 2006. ,
A flexible role-based secure messaging service: exploiting IBE technology for privacy in health care, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.432-437, 2003. ,
DOI : 10.1109/DEXA.2003.1232060
Osgi service platform, core specification release 4. Draft, 2005. ,
Secure component deployment in the osgi(tm) release 4 platform, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00084795
Supporting the Secure Deployment of OSGi Bundles, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. ,
DOI : 10.1109/WOWMOM.2007.4351681
URL : https://hal.archives-ouvertes.fr/inria-00275186
Identity-Based Cryptosystems and Signature Schemes, Proceedings of CRYPTO 84 on Advances in cryptology, pp.47-53, 1985. ,
DOI : 10.1007/3-540-39568-7_5
Secure communication in a distributed system using identity based encryption, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings., pp.414-420, 2003. ,
DOI : 10.1109/CCGRID.2003.1199395
How to Break MD5 and Other Hash Functions, Lecture Notes in Computer Science, vol.3494, pp.19-35, 2001. ,
DOI : 10.1007/11426639_2