ma_biblio_journaux.bib

@article{MinierN12,
  author = {Marine Minier and
               Mar\'{\i}a Naya-Plasencia},
  title = {{A related key impossible differential attack against 22
               rounds of the lightweight block cipher LBlock}},
  journal = {Inf. Process. Lett.},
  volume = {112},
  number = {16},
  year = {2012},
  pages = {624-629}
}
@article{MinierPP12,
  author = {Marine Minier and
               Raphael C.-W. Phan and
               Benjamin Pousse},
  title = {{On Integral Distinguishers of Rijndael Family of Ciphers}},
  journal = {Cryptologia},
  volume = {36},
  number = {2},
  year = {2012},
  pages = {104-118}
}
@article{ApavatjrutZFGJLM12,
  author = {Anya Apavatjrut and
               Wassim Znaidi and
               Antoine Fraboulet and
               Claire Goursaud and
               Katia Jaffr{\`e}s-Runser and
               C{\'e}dric Lauradoux and
               Marine Minier},
  title = {{Energy efficient authentication strategies for network coding}},
  journal = {Concurrency and Computation: Practice and Experience},
  volume = {24},
  number = {10},
  year = {2012},
  pages = {1086-1107}
}
@article{ZnaidiM12,
  author = {Wassim Znaidi and
               Marine Minier},
  title = {Key establishment and management for WSNs},
  journal = {Telecommunication Systems},
  volume = {50},
  number = {2},
  year = {2012},
  pages = {113-125}
}
@article{Ochir,
  author = {Ochirkhand Erdene-Ochir and
               Apostolos A. Kountouris and
               Marine Minier and
               Fabrice Valois},
  title = {A New Metric to Quantify Resiliency in Networking},
  journal = {IEEE Communications Letters},
  volume = {16},
  number = {10},
  year = {2012},
  pages = {1699-1702}
}
@article{Jess1,
  author = {YuanYuan Zhang and Marine Minier},
  title = {{Selective Forwarding Attacks Against Data and ACK Flows in Network Coding and Countermeasures}},
  journal = {Journal of Computer Networks and Communications},
  volume = {à paraître, accepté en Août 2012},
  year = {2012}
}
@article{Jess2,
  author = {YuanYuan Zhang and Marine Minier},
  title = {{How Network Coding System Constrains Packet Pollution Attacks in Wireless Sensor Networks}},
  journal = {International Journal of Grid and Utility Computing},
  volume = {à paraître, accepté en Août 2012},
  year = {2012}
}
@article{ArnaultBMP11,
  author = {Fran\c{c}ois Arnault and
               Thierry P. Berger and
               Marine Minier and
               Benjamin Pousse},
  title = {{Revisiting LFSRs for Cryptographic Applications}},
  journal = {IEEE Transactions on Information Theory},
  volume = {57},
  number = {12},
  year = {2011},
  pages = {8095-8113}
}
@article{OchirJournal2011,
  author = {Ochirkhand Erdene-Ochir and Marine Minier and Fabirce Valois and Apostolos Kountouris},
  title = {{Enhancing Resiliency Against Routing Layer Attacks in Wireless Sensor Networks: Gradient-based Routing in Focus}},
  journal = {IARIA on-line journals, International Journal on Advances in Networks and Services},
  volume = {4},
  number = {1\&2},
  year = {2011},
  note = {disponible en ligne \url{http://www.iariajournals.org/networks_and_services/}},
  pages = {38-54}
}
@article{ArnaultBergerMinier_IEEEinfth08,
  author = {F. Arnault and T. P. Berger and M. Minier},
  title = {{Some Results on {FCSR} Automata with applications to the security of {FCSR}-based pseudorandom generators}},
  journal = {IEEE Trans. on Inf. Theory},
  volume = {54},
  number = {2},
  year = {2008},
  pages = {836-841}
}
@article{GaliceMinierUbeda_IJICS08,
  author = {Samuel Galice and Marine Minier and Stéphane Ubéda},
  title = {{The KAA Framework : A History-Based Trust Establishment in Ambient Networks}},
  journal = {IJICS - International Journal of Intelligent Control and Systems, Special Issue on Information Assurance},
  volume = {12},
  number = {4},
  year = {2007},
  pages = {331-340}
}

This file was generated by bibtex2html 1.95.