Abstract is missing.
- eIDAS2: What Prospects and Stakes for Digital Trust? (keynote abstract)Alban Feraud. 9 [doi]
- FHE: End-to-End Encryption for Everyone (keynote abstract)Marc Joye. 11 [doi]
- France Identity: an Architecture at the Service of Better Control of Personal Data (keynote abstract)Jean Karim Zinzindohoue. 13 [doi]
- Vers une gestion d'identités auto-souveraine pour les dispositifs IoT (Towards Self-Sovereign Identity Management for IoT Devices)Lydia Ouaili, Samia Bouzefrane 0001, Elena Kornyshova, Pierre Paradinas. 17-33 [doi]
- Resilience via Blackbox Self-Piloting PlantsMichel Barbeau, Joaquín García-Alfaro, Christian Lübben, Marc-Oliver Pahl, Lars Wüstrich. 35-46 [doi]
- C4PTION : pourquoi caractériser les auteurs de portions de code ? (C4PTION : why Characterise the Authors of code PorTIONs?)Olivier Gesny, Pierre-Marie Satre, Robin de Saint Jores, Tudy Gourmelen, Christophe Genevey-Metat, Dorian Bachelot, Loan Veyer, Maximilien Chaux, Pierre Delesques. 49-64 [doi]
- Federated Learning as Enabler for Collaborative Security between not Fully-Trusting Distributed PartiesLéo Lavaur, Benjamin Coste, Marc-Oliver Pahl, Yann Busnel, Fabien Autrel. 65-80 [doi]
- PALANTIR: Zero-Trust Architecture for Managed Security Service ProviderMaxime Compastié, Silvia Sisinni, Supreshna Gurung, Carolina Fernández, Ludovic Jacquin, Izidor Mlakar, Valentino Safran, Antonio Lioy, Ignazio Pedone. 83-98 [doi]
- Decentralized Public Key Infrastructure for Autonomous Embedded SystemsArthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Philippe Elbaz-Vincent. 99-114 [doi]
- Setting Hardware Root-of-Trust from Edge to Cloud, and How to Use itFlorent Chabaud. 115-130 [doi]