default search action
Brigitte Lonc
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c16]Brigitte Lonc, Alexandre Aubry, Hafeda Bakhti, Maria Christofi, Hassane Aissaoui-Mehrez:
Feasibility and Benchmarking of Post-Quantum Cryptography in the Cooperative ITS Ecosystem. VNC 2023: 215-222 - 2021
- [c15]Farah Haidar, Farah Braiteh, Brigitte Lonc, Arnaud Kaiser, Pascal Urien:
Performance Evaluation of Pseudonym Reload over Cellular Technology. NTMS 2021: 1-4 - 2020
- [c14]Farah Haidar, Joseph Kamel, Inès Ben Jemaa, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
DARE: A Reports Dataset for Global Misbehavior Authority Evaluation in C-ITS. VTC Spring 2020: 1-6
2010 – 2019
- 2019
- [c13]Farah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
Risk Analysis on C-ITS Pseudonymity Aspects. NTMS 2019: 1-5 - [c12]Joseph Kamel, Farah Haidar, Inès Ben Jemaa, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
A Misbehavior Authority System for Sybil Attack Detection in C-ITS. UEMCON 2019: 1117-1123 - [c11]Farah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
C-ITS PKI protocol: performance evaluation in a real environment. WONS 2019: 52-55 - 2018
- [c10]Farah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien, Richard Denis:
C-ITS Use Cases: Study, Extension and Classification Methodology. VTC Spring 2018: 1-5 - 2017
- [c9]Jean Philippe Monteuuis, Badis Hammi, Eduardo Salles, Houda Labiod, Remi Blancher, Erwan Abalea, Brigitte Lonc:
Securing PKI Requests for C-ITS Systems. ICCCN 2017: 1-8 - [c8]Mounira Msahli, Ahmed Serhrouchni, Houda Labiod, Arnaud Kaiser, Brigitte Lonc:
TLS for Cooperative ITS Services. IOV 2017: 176-189 - [c7]Inès Ben Jemaa, Arnaud Kaiser, Brigitte Lonc:
Study of the impact of pseudonym change mechanisms on vehicular safety. VNC 2017: 259-262 - [c6]Farah Haidar, Arnaud Kaiser, Brigitte Lonc:
On the Performance Evaluation of Vehicular PKI Protocol for V2X Communications Security. VTC Fall 2017: 1-5 - 2016
- [c5]Brigitte Lonc, Pierpaolo Cincilla:
Cooperative ITS security framework: Standards and implementations progress in Europe. WoWMoM 2016: 1-6 - 2015
- [c4]Pierpaolo Cincilla, Arnaud Kaiser, Brigitte Lonc, Houda Labiod, Remi Blancher, Christophe Jouvray, Richard Denis, Antoine Boulanger:
Security of C-ITS messages: A practical solution the ISE project demonstrator. NTMS 2015: 1-2 - 2014
- [c3]Rim Moalla, Brigitte Lonc, Houda Labiod, Noemie Simoni:
Towards a Cooperative ITS Vehicle Application Oriented Security Framework. Intelligent Vehicles Symposium 2014: 1043-1048 - 2012
- [c2]Rim Moalla, Brigitte Lonc, Houda Labiod, Noemie Simoni:
How to secure ITS applications? Med-Hoc-Net 2012: 113-118
1980 – 1989
- 1985
- [c1]Brigitte Lonc:
GENEPIX: a portable version under UNIX of the OSI protocol tester GENEPI. PSTV 1985: 507-518
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint