, Cellular networks for massive IoT, Ericsson, 2016.
Mobile phones as computing devices: The viruses are coming, IEEE Pervasive Computing, vol.3, issue.4, pp.11-15, 2004. ,
State of the art: Embedding security in vehicles, EURASIP Journal on Embedded Systems, issue.1, p.74706, 2007. ,
, Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses, pp.129-142, 2008.
Password security: A case history, Communications of the ACM, vol.22, issue.11, pp.594-597, 1979. ,
Secnum: an open characterizing platform for integrated circuits, European Workshop on Microelectronics Education, 2012. ,
How literacy tasks influence children's motivation for literacy. The reading teacher, vol.48, pp.662-673, 1995. ,
Teaching fpga security, Field-Programmable Technology (FPT), 2013 International Conference on, pp.306-309, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00866365
Course on secure hardware design of silicon chips, IET Circuits, Devices & Systems, vol.11, issue.4, pp.304-309, 2017. ,
Hardware security: From concept to application, pp.1-6, 2016. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01345970
The breakdown of vigilance during prolonged visual search, Quarterly Journal of Experimental Psychology, vol.1, issue.1, pp.6-21, 1948. ,
The "i's" have it: A framework for serious educational game design, Review of General Psychology, vol.14, issue.2, p.105, 2010. ,
From game design elements to gamefulness: defining gamification, Proceedings of the 15th international academic MindTrek conference: Envisioning future media environments, pp.9-15, 2011. ,
Gamification. using game-design elements in non-gaming contexts, CHI'11 extended abstracts on human factors in computing systems, pp.2425-2428, 2011. ,
Flow and the psychology of discovery and invention, p.39, 1997. ,
Experiential learning: Experience as the source of learning and development, 2014. ,
Collective intelligence: Mankind's emerging world in cyberspace, Perseus books, 1997. ,
Social engineering fundamentals, part i: hacker tactics. Security Focus, 2001. ,
The design of Rijndael: AES-the advanced encryption standard, 2013. ,
Modified caesar cipher for better security enhancement, International Journal of Computer Applications, vol.73, issue.3, 2013. ,
The spartan scytale. The Craft of the Ancient Historian: Essays' in honor of, pp.141-169, 1985. ,
The basics of hacking and penetration testing: ethical hacking and penetration testing made easy, 2013. ,
Differential power analysis, Annual International Cryptology Conference, pp.388-397, 1999. ,
Correlation power analysis with a leakage model, International workshop on cryptographic hardware and embedded systems, pp.16-29, 2004. ,
Bloom's taxonomy of educational objectives. Longman (1965) 26. : Mais où est donc passée la septième compagnie, 1973. ,