, Cellular networks for massive IoT, Ericsson, 2016.

D. Dagon, T. Martin, and T. Starner, Mobile phones as computing devices: The viruses are coming, IEEE Pervasive Computing, vol.3, issue.4, pp.11-15, 2004.

M. Wolf, A. Weimerskirch, and T. Wollinger, State of the art: Embedding security in vehicles, EURASIP Journal on Embedded Systems, issue.1, p.74706, 2007.

D. Halperin, T. S. Heydt-benjamin, B. Ransford, S. S. Clark, B. Defend et al., Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses, pp.129-142, 2008.

R. Morris and K. Thompson, Password security: A case history, Communications of the ACM, vol.22, issue.11, pp.594-597, 1979.

M. Bourrée, F. Bruguier, L. Barthe, P. Benoit, P. Maurine et al., Secnum: an open characterizing platform for integrated circuits, European Workshop on Microelectronics Education, 2012.

J. Turner and S. G. Paris, How literacy tasks influence children's motivation for literacy. The reading teacher, vol.48, pp.662-673, 1995.

L. Bossuet, Teaching fpga security, Field-Programmable Technology (FPT), 2013 International Conference on, pp.306-309, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00866365

B. Halak, Course on secure hardware design of silicon chips, IET Circuits, Devices & Systems, vol.11, issue.4, pp.304-309, 2017.

F. Bruguier, P. Benoit, L. Torres, and L. Bossuet, Hardware security: From concept to application, pp.1-6, 2016.
URL : https://hal.archives-ouvertes.fr/lirmm-01345970

N. H. Mackworth, The breakdown of vigilance during prolonged visual search, Quarterly Journal of Experimental Psychology, vol.1, issue.1, pp.6-21, 1948.

L. A. Annetta, The "i's" have it: A framework for serious educational game design, Review of General Psychology, vol.14, issue.2, p.105, 2010.

S. Deterding, D. Dixon, R. Khaled, and L. Nacke, From game design elements to gamefulness: defining gamification, Proceedings of the 15th international academic MindTrek conference: Envisioning future media environments, pp.9-15, 2011.

S. Deterding, M. Sicart, L. Nacke, K. O'hara, and D. Dixon, Gamification. using game-design elements in non-gaming contexts, CHI'11 extended abstracts on human factors in computing systems, pp.2425-2428, 2011.

M. Csikszentmihalyi, Flow and the psychology of discovery and invention, p.39, 1997.

D. A. Kolb, Experiential learning: Experience as the source of learning and development, 2014.

P. Lévy and R. Bononno, Collective intelligence: Mankind's emerging world in cyberspace, Perseus books, 1997.

S. Granger, Social engineering fundamentals, part i: hacker tactics. Security Focus, 2001.

J. Daemen and V. Rijmen, The design of Rijndael: AES-the advanced encryption standard, 2013.

K. Goyal and S. Kinger, Modified caesar cipher for better security enhancement, International Journal of Computer Applications, vol.73, issue.3, 2013.

T. Kelly, The spartan scytale. The Craft of the Ancient Historian: Essays' in honor of, pp.141-169, 1985.

P. Engebretson, The basics of hacking and penetration testing: ethical hacking and penetration testing made easy, 2013.

P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Annual International Cryptology Conference, pp.388-397, 1999.

E. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, International workshop on cryptographic hardware and embedded systems, pp.16-29, 2004.

B. Bloom, Bloom's taxonomy of educational objectives. Longman (1965) 26. : Mais où est donc passée la septième compagnie, 1973.