Trust management in social internet of things: a survey, Conference on e-Business, pp.430-441, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01702224
A subjective model for trustworthiness evaluation in the social internet of things, Personal Indoor and Mobile Radio Communications (PIMRC), pp.18-23, 2012. ,
Rfid technology and its applications in internet of things (iot), Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp.1282-1285, 2012. ,
A cross-layer communication module for the internet of things, Computer Networks, vol.57, issue.3, pp.622-633, 2013. ,
Internet of things: Vision, applications and research challenges, Ad hoc networks, vol.10, issue.7, pp.1497-1516, 2012. ,
A social internet of things application architecture: applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds, 2015. ,
URL : https://hal.archives-ouvertes.fr/tel-01316892
The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization, Computer networks, vol.56, issue.16, pp.3594-3608, 2012. ,
Social internet of things, World Scientific News, vol.41, p.76, 2016. ,
The internet of things for ambient assisted living, Seventh International Conference on Information Technology: New Generations (ITNG), pp.804-809, 2010. ,
Rfid in pervasive computing: state-ofthe-art and outlook, Pervasive and Mobile Computing, vol.5, issue.1, pp.110-131, 2009. ,
Wireless sensor networks: a survey, Computer networks, vol.38, issue.4, pp.393-422, 2002. ,
Wireless sensor and actor networks: research challenges, vol.2, pp.351-367, 2004. ,
Application of rfid technology for logistics on internet of things, AASRI Procedia, vol.1, pp.106-111, 2012. ,
A survey of internet-of-things: Future vision, architecture, challenges and services, Internet of things (WF-IoT), pp.287-292, 2014. ,
A survey on trust management for internet of things, Journal of network and computer applications, vol.42, pp.120-134, 2014. ,
Identity management and integrity protection in the internet of things, 2012 third international conference on emerging security technologies, pp.111-114, 2012. ,
Deanonymization attack on geolocated data, Journal of Computer and System Sciences, vol.80, issue.8, pp.1597-1614, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01242268
Mobility modeling and security validation of a mobility management scheme based on ecc for ip-based wireless sensor networks (6lowpan), 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.491-496, 2011. ,
A lightweight and secure tftp protocol for smart environment, Computer Applications and Industrial Electronics (ISCAIE), 2012 IEEE Symposium on, pp.302-306, 2012. ,
On the effectiveness of endto-end security for internet-integrated sensing applications, Green Computing and Communications (GreenCom), 2012 IEEE International Conference on, pp.87-93, 2012. ,
Svelte: Real-time intrusion detection in the internet of things, Ad hoc networks, vol.11, issue.8, pp.2661-2674, 2013. ,
Cyber-entity security in the internet of things, Computer, p.1, 2013. ,
Trusted architecture for farmland wireless sensor networks, Cloud Computing Technology and Science (CloudCom), pp.782-787, 2012. ,
ARM architecture reference manual. Pearson Education, 2001. ,
Trustworthy infrastructure services for a secure and privacy-respecting internet of things, Trust, Security and Privacy in Computing and Communications (TrustCom), pp.998-1003, 2012. ,
An adaptive method for user profile learning, East European Conference on Advances in Databases and Information Systems, pp.126-134, 2013. ,
Analyzing tagged resources for social interests detection, International Conference on Enterprise Information Systems, pp.340-345, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01178560
Dérivation de profils utilisateursà partir de réseaux sociaux: une approche par communautés de réseauxégocentriques (derivation of user profiles from social networks: a community approach of egocentric networks), Ingénierie des systèmes d'information, vol.18, pp.11-37, 2013. ,
A web service selection framework based on user's context and qos, 2014 IEEE International Conference on, pp.708-711, 2014. ,
From the internet of things to the internet of people, IEEE Internet Computing, vol.19, issue.2, pp.40-47, 2015. ,
Physical cyber social computing for human experience, Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics, p.1, 2013. ,
People as a service: a mobile-centric model for providing collective sociological profiles, IEEE software, vol.31, issue.2, pp.48-53, 2014. ,
Social devices: collaborative co-located interactions in a mobile cloud, Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p.10, 2012. ,
The internet of things: A survey from the data-centric perspective," in Managing and mining sensor data, pp.383-428, 2013. ,
From" smart objects" to" social objects": The next evolutionary step of the internet of things, IEEE Communications Magazine, vol.52, issue.1, pp.97-105, 2014. ,
, Les franais et la mobilité digitale (the french and digital mobility), vol.04, pp.2018-2020, 2014.
, Objets connectés: Ce qu'en attendent les franais, vol.12, pp.2018-2020, 2014.
Trustworthiness management in the social internet of things, IEEE Transactions on knowledge and data engineering, vol.26, issue.5, pp.1253-1266, 2014. ,
L'utilisation de smartphones par les médecins (the use of smartphones by doctors, vol.3, pp.2018-2020, 2016. ,
Medical Research and Technology, ser. Cutting-Edge Science and Technology, 2016. ,
Connected health: From e-health to connected health, CNOM, Tech. Rep, vol.06, p.2015 ,
Taciot: multidimensional trust-aware access control system for the internet of things, Soft Computing, vol.20, issue.5, pp.1763-1779, 2016. ,
From personal experience to global reputation for trust evaluation in the social internet of things, GLOBECOM 2017-2017 IEEE Global Communications Conference, pp.1-7, 2017. ,
Trust-based service management for social internet of things systems, IEEE transactions on dependable and secure computing, vol.13, pp.684-696, 2016. ,
A study on the need of the usable security in the corelation between it security and user experience, International Journal of Internet, Broadcasting and Communication, vol.9, issue.4, pp.14-18, 2017. ,
Design process for usable security and authentication using a user-centered approach, Proceedings of the XVIII International Conference on Human Computer Interaction, p.42, 2017. ,
Data-driven, personalized usable privacy, EPFL, 2017. ,
Towards usable privacy policy display and management, Information Management & Computer Security, vol.20, issue.1, pp.4-17, 2012. ,
A multimodal human-machine interface enabling situationadaptive control inputs for highly automated vehicles, Intelligent Vehicles Symposium, pp.1195-1200, 2017. ,
Intelligent humanmachine interface, 2011. ,