Follow
Emmanuel Benoist
Emmanuel Benoist
Professor, computer science, Berne University of Applied Sciences
Verified email at bfh.ch
Title
Cited by
Cited by
Year
Virtual persons and identities
DO Jaquet-Chiffelle, E Benoist, R Haenni, F Wenger, H Zwingelberg
The Future of identity in the Information Society, 75-122, 2009
292009
Internet-Voting: Opportunity or threat for democracy?
E Benoist, B Anrig, DO Jaquet-Chiffelle
International Conference on E-Voting and Identity, 29-37, 2007
182007
Collecting data for the profiling of web users
E Benoist
Profiling the European Citizen: Cross-Disciplinary Perspectives, 169-184, 2008
162008
Pervasive Computing-the Next Technical Revolution
J Sliwa, E Benoist
2011 Developments in E-systems Engineering, 621-626, 2011
102011
Wireless sensor and actor networks: E-health, E-science, E-decisions
J Sliwa, E Benoist
2011 International Conference on Selected Topics in Mobile and Wireless …, 2011
102011
Ordered formulas
E Benoist, JJ Hébrard
Les cahiers du GREYC, CNRS-UPRES-A 6072, 1999
91999
D2. 3: Models
T Nabeth, M Gasson
FIDIS (Future of Identity in Information Society) Deliverable, 2005
82005
Deliverable D2. 3: Models
T Nabeth, E Benoist, B Anrig, M Meints, M Hansen, M Gasson, K Warwick
Frankfurt et al.: FIDIS NoE. Available at: http://www. fidis. net/fileadmin …, 2005
72005
Virtual? Identity
B Anrig, E Benoist, DO Jaquet-Chiffelle
FIDIS Deliverable 2, 22-34, 2002
72002
A web architecture based on physical data separation supporting privacy protection in medical research
J Sliwa, E Benoist
International Journal of Reliable and Quality E-Healthcare (IJRQEH) 1 (4), 68-79, 2012
62012
Deliverable D2. 3: Models. Frankfurt et al.: FIDIS NoE
T Nabeth, E Benoist, B Anrig, M Meints, M Hansen, M Gasson, K Warwick
62005
Applied approach to privacy and security for the Internet of things
P Chatterjee, E Benoist, A Nath
IGI Global, 2020
42020
Medical evaluative research and privacy protection
J Sliwa, E Benoist
2013 Sixth International Conference on Developments in eSystems Engineering …, 2013
42013
Descriptive Analysis and Inventory of Profiling Practices—Deliverable 7.2
M Hildebrandt, J Backhouse, V Andronikou, E Benoist, A Canhoto, C Diaz, ...
Future Identity Inform. Soc.(FIDIS), Tech. Rep, 2005
42005
Recognition of simple enlarged Horn formulas and simple extended Horn formulas
E Benoist, JJ Hébrard
Annals of Mathematics and Artificial Intelligence 37, 251-272, 2003
42003
Research and engineering roadmap for development and deployment of smart medical devices
J Sliwa, E Benoist
SCITEPRESS (Science and Technology Publications, Lda.), 2015
32015
Identity in a Networked World: Use Cases and Scenarios
DO Jaquet-Chiffelle, E Benoist, B Anrig
32006
Génération à délai polynomial pour le problème SAT
E Benoist
Caen, 2000
32000
How to collect consent for an anonymous medical database
E Benoist, J Sliwa
Proceedings of the International Conference on Health Informatics 1, 405-412, 2014
22014
Development of the security framework based on OWASP ESAPI for JSF2. 0
R Kachhadiya, E Benoist
Online, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20