Follow
Solange Ghernaouti
Solange Ghernaouti
Full Professor, University of Lausanne
No verified email - Homepage
Title
Cited by
Cited by
Year
Cyber power: Crime, conflict and security in cyberspace
S Ghernaouti-Helie
Crc Press, 2013
932013
A global treaty on cybersecurity and cybercrime
S Schjolberg, S Ghernaouti-Helie
Cybercrime Law 97, 2011
792011
802.11 i encryption key distribution using quantum cryptography.
TMT Nguyen, MA Sfaxi, S Ghernaouti-Hélie
J. Networks 1 (5), 9-20, 2006
592006
Using Quantum Key Distribution within IPSEC to secure MAN communications
MA Sfaxi, S Ghernaouti-Hélie, G Ribordy, O Gay
Proceedings of metropolitan area networks (man2005), 2005
552005
Sécurité informatique et réseaux: cours et exercices corrigés
S Ghernaouti-Hélie, M Riguidel
(No Title), 2008
50*2008
A global protocol on cybersecurity and cybercrime
S Schjølberg, S Ghernaouti-Hélie
Cybercrimelaw. net, 2009
362009
La cybercriminalité: le visible et l'invisible
S Ghernaouti-Hélie
Collection le savoir suisse, 2009
292009
Integration of quantum cryptography in 802.11 networks
TMT Nguyen, MA Sfaxi, S Ghernaouti-Hélie
First International Conference on Availability, Reliability and Security …, 2006
252006
Security metrics to improve information security management
I Tashi, S Ghernaouti-Hélie
Proceedings of 6th Annual Security Conference, 2007
242007
Upgrading PPP security by quantum key distribution
S Ghernaouti-Hélie, MA Sfaxi
International Conference on Network Control and Engineering for QoS …, 2005
232005
Efficient security measurements and metrics for risk assessment
I Tashi, S Ghernaouti-Helie
2008 The Third International Conference on Internet Monitoring and …, 2008
212008
Protecting information in a connected world: A question of security and of confidence in security
S Ghernaouti-Hélie, D Simms, I Tashi
2011 14th International Conference on Network-Based Information Systems, 208-212, 2011
192011
An inclusive information society needs a global approach of information security
S Ghernaouti-Hélie
2009 International Conference on Availability, Reliability and Security, 658-662, 2009
172009
The cybersecurity risk paradox: impact of social, economic, and technological factors on rates of malware
D Burt, P Nicholas, K Sullivan, T Scoles, S Ghernaouti-Helie
Microsoft Security Intelligence Report Special Edition (SIR), Microsoft …, 2014
162014
Privacy requirements specification for digital identity management systems implementation: towards a digital society of privacy
GB Ayed, S Ghernaouti-Hélie
2011 International Conference for Internet Technology and Secured …, 2011
162011
Digital identity management within networked information systems: From vertical silos view into horizontal user-supremacy processes management
GB Ayed, S Ghernaouti-Helie
2011 14th International Conference on Network-Based Information Systems, 98-103, 2011
162011
SECOQC business white paper
S Ghernaouti-Helie, I Tashi, T Laenger, C Monyk
arXiv preprint arXiv:0904.4073, 2009
162009
De l'ordinateur à la société de l'information
A Dufour, S Ghernaouti-Hélie
FeniXX, 2001
152001
Sécurité Internet: stratégies et technologies
S Ghernaouti-Hélie
Dunod, 2000
152000
Secure message relay over networks with QKD-links
S Rass, MA Sfaxi, S Ghernaouti-Hélie, K Kyamakya
Second International Conference on Quantum, Nano and Micro Technologies …, 2008
142008
The system can't perform the operation now. Try again later.
Articles 1–20