Publications

PhD Thesis: 

  1. Trust, Security and Privacy in Global Computing”, J.-M. Seigneur, Trinity College Dublin, 2005.
  2. "QoS/QoE-based Wi-Fi Networks Trust and Reputation", X. Titi, University of Geneva, 2014. (supervised by Dr. Jean-Marc Seigneur)
  3. "Security Adaptation in Highly Dynamic Wireless Networks", T. El Maliki, University of Geneva, 2014. (supervised by Dr. Jean-Marc Seigneur)
  4. "A Fully Decentralized Trust Management and Cooperation Incentives Framework for Wireless User-Centric Networks", C. Ballester Lafuente, University of Geneva, 2015. (supervised by Dr. Jean-Marc Seigneur)

Conference papers:

  1. "Use case of linking a managed basket of fiat currencies to crypto-tokens", J.-M. Seigneur, H.  d'Hautefort and G. Ballocchi, First Meeting of the ITU Focus Group on Digital Currency including Digital Fiat Currency, Beijing, China, ITU, 2017.
  2. "Enhancing RADIUS based multifactor-factor authentication systems with RESTful API for self-service enrolment", E. Huseynov and J.-M. Seigneur, Proceedings of the 11th IEEE International Conference on Application of Information and Communication Technologies, IEEE, 2017.
  3. "Smart Cities Online Reputation Quantitative Survey", J.-M. Seigneur, in Proceedings of the Smart City Expo World Congress, 2016.
  4. “Beacon Authpath, Augmented Human Path Authentication”, E. Huseynov and J.-M. Seigneur, in Proceedings of the 10th International Conference on Application of Information and Communication Technologies, ISBN 9781509018406, IEEE, 2016.
  5. "Efficient Security Adaptation Framework for IoT Networks", T. El Maliki and J.-M. Seigneur, in Proceedings of the International Conference on Computational Science and Computational Intelligence, IEEE, 2016.
  6. "Electrosmog Visualization through Augmented Blurry Vision", K. Fan, J.-M. Seigneur, S. Nanayakkara and M. Inami, in Proceedings of the 7th Augmented Human International Conference, ACM, 2016.
  7. "Augmented Winter Ski with AR HMD", K. Fan, J.-M. Seigneur, J. Guislain, S. Nanayakkara and M. Inami, in Proceedings of the 7th Augmented Human International Conference, ACM, 2016.
  8. "MUSES RT2AE V P/DP: On the Road to Privacy-Friendly Security Technologies in the Workplace", Y. S. M. Van Der Sype, J. Guislain, J.-M. Seigneur and X. Titi, in Proceedings of the 9th Computer, Privacy & Data Protection International Conference, CPDP, 2016. 
  9. "Wi-Trust: Improving Wi-Fi Hotspots Trustworthiness with Computational Trust Management", J.-M. Seigneur, in Proceedings of the 7th Kaleidoscope International Conference, ITU/IEEE, 2015.
  10. "WifiOTP: Pervasive Two-Factor Authentication Using Wi-Fi SSID Broadcasts", E. Huseynov and J.-M. Seigneur, in Proceedings of the 7th Kaleidoscope International Conference, ITU, 2015.
  11. "Formal Modeling and Verification of Opportunity-enabled Risk Management", A. Aldini, J.-M. Seigneur, C. Ballester Lafuente, X. Titi, J. Guislain, in Proceedings of Trustcom International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications, IEEE, 2015.
  12. "Swiss Innovation Online Reputation Case Study", J.-M. Seigneur, in Proceedings of i-Society the International Conference on Information Society, 2014.
  13. "Les MOOCs, la bataille de l'e-réputation contre les formations universitaires ?", J.-M. Seigneur and C. Jeannette, in Proceedings of the Colloque "Le Numérique pour enseigner autrement", Fondation Paris-Dauphine, 2014.
  14. "Extending Trust Management with Cooperation Incentives: Achieving Collaborative Wi-Fi Sharing Using Trust Transfer to Stimulate Cooperative Behaviours", C. Ballester Lafuente and J.-M. Seigneur, in Proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, Singapore, IFIP, 2014.
  15. "On the Trade-off among Trust, Privacy, and Cost in Incentive-Based Networks", A. Aldini, A. Bogliolo, C. Ballester Lafuente and J.-M. Seigneur, in Proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, Singapore, IFIP, 2014.
  16. "Case study: Legal Requirements for the Use of Social Login Features for Online Reputation Updates", Y. S. M. Van Der Sype and J.-M. Seigneur, Proceedings of the 29h International Symposium of Applied Computing, Gyeongju, South Korea, ACM, 2014.
  17. "Collaborative Wireless Access to Mitigate Roaming Costs", C. Ballester Lafuente and J.-M. Seigneur, Proceedings of the 10th International Conference on Networking and Services, IARIA, 2014.
  18. "Secure User-Friendly Wi-Fi Access Point Joining", J-M. Seigneur, C. Ballester Lafuente and A. Matos, Proceedings of International Wireless Communications and Networking Conference, Shanghai, China, IEEE, 2013.
  19. "Dispositional Trust Self-Adaptation in User-Centric Environments", C. Ballester Lafuente and J.-M. Seigneur, Proceeding of International Conference on Advanced Information Networking and Applications, IEEE, 2013.
  20. "Security Adaptation Based on Autonomic and Trust Systems for Ubiquitous Mobile Network and Green IT", T. El Maliki and J.-M. Seigneur, Proceedings of the Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Porto, Portugal, IARIA, 2013.
  21. "A Survey of Trust and Risk Metrics for a BYOD Mobile Worker World", J.-M. Seigneur, P. Kölndorfer, M. Busch and C. Hochleitner, Proceedings of the Third International Conference on Social Eco-Informatics, Lisbon, Portugal, IARIA, 2013.
  22. "Investigations to Deploy e-Services for Cocoa Fair-trade Farmers in Africa", H. Imaze Ehi and J.-M. Seigneur, Proceedings of the Third International Conference on Social Eco-Informatics, Lisbon, Portugal, IARIA, 2013.
  23. "Achieving Collaborative Wi-Fi Sharing without Changing Current Technologies", C. Ballester Lafuente and J.-M. Seigneur, Proceedings of Trust-ID Symposium co-located with International TrustCom Conference, Melbourne, Australia, IEEE, 2013.
  24. "A User-centric Approach to Trust Management in Wi-Fi Networks", C. Ballester Lafuente, J.-M. Seigneur, P. Di Francesco, V. Moreno, R. Sofia, W. Moreira, A. Bogliolo and N. Martins, Proceedings of the 32nd International Conference on Computer Communications, INFOCOM, IEEE, 2013.
  25. "Virtual Currency and Reputation-Based Cooperation Incentives in User-Centric Networks", A. Bogliolo, P. Polidori, A. Aldini, W. Moreira, P. Mendes, M. Yildiz, C. Ballester Lafuente and J.-M. Seigneur, Proceedings of International Wireless Communications and Mobile Computing Conference, IEEE, 2012.
  26. "Trust and Cooperation Incentives for Wireless User-Centric Environments", C. Ballester Lafuente, J.-M. Seigneur, W. Moreira, P. Mendes, L. Maknavicius, A. Bogliolo and P. di Francesco, Proceedings of e-Society International Conference, Berlin, Germany, IADIS, 2012.
  27. "Crowd Augmented Wireless Access", C. Ballester Lafuente and J.-M. Seigneur, Proceedings of the Third Augmented Human International Conference, Megève, France, ACM, 2012.
  28. "Trust and Reputation Management for Detecting Untrustworthy Access Points", X. Titi, C. Ballester Lafuente and J.-M. Seigneur, Proceedings of International Conference on Reputation, Montpellier, France, 2011.
  29. "Flexible Communication - A Secure and Trust-Based Free Wi-Fi Password Sharing Service", C. Ballester Lafuente, X. Titi and J.-M. Seigneur, Proceedings of Trustcom - UbiSafe Symposium, Changsha, China, IEEE, 2011.
  30. "The Emotional Economy for the Augmented Human", J.-M. Seigneur, in the Proceedings of the 2nd Augmented Human International Conference, ACM, 2011.
  31. "Boosting Trustworthy Hotspot QoE Rating with Implicit Hotspot QoS Evidence", X. Titi, J.-M. Seigneur and C. Ballester Lafuente, in the Proceedings of e-Society, IADIS, 2011.
  32. "Towards mobile/wearable device electrosmog reduction through careful network selection", J.-M. Seigneur, X. Titi and T. El Maliki, in the Proceedings of the 1st Augmented Human International Conference, ACM, 2010.
  33. “A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments”, T. El Maliki and J.-M.Seigneur, in the Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies SECURWARE, Italy, IEEE, 2010.
  34. “Verifying Hotspot Quality User Rating With Certified QoS Evidence”, X. Titi and J.-M.Seigneur, in the Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies SECURWARE, Italy, IEEE, 2010.
  35. "Trust-based Hotspot Selection", X. Titi, T. El Maliki and J-M. Seigneur, in the Proceedings of the e-Society International Conference, Portugal, IADIS, 2010.
  36. "Reputation System for Access Point Selection", X. Titi, B. Yavuz, L. Ridel, J.-M. Seigneur, in the Proceedings of the International Conference on New Media and Interactivity, Istanbul, 2010.
  37. "Local ePolitics Reputation Case Study", J.-M. Seigneur, in the Proceedings of the 7th International Conference on e-Society, IADIS, 2009.
  38. "Reputation-based Telecommunication Network Selection", J.-M. Seigneur and X. Titi, in the Proceedings of the 7th International Conference on e-Society, IADIS, 2009.
  39. "Mobile Location Based Services for Trusted Information in Disaster Management", L. Ragia, M. Deriaz and J.-M. Seigneur,  in the Proceedings of the 17th International Conference on Information Systems Development, IEEE, 2008.
  40. "Trust Engines to Optimize Semi-Automated Industrial Production Planning", E. Grandgirard, C. Gertosio and J.-M. Seigneur, in the Proceedings of the fourth International Symposium on Industrial Electronics, IEEE, 2007.
  41. "A Survey of User-centric Identity Management Technologies", T. El Maliki and J.-M. Seigneur, in the Proceedings of the SECURWARE International Conference, IARIA, 2007.
  42. "EasIDeploy: A Usable and Convenient Identity Management Platform with Strong Authentication, PKI and Biometry", T. El Maliki, Y. Durukan and J.-M. Seigneur, in the Proceedings of the 2nd Conference on Advances in Computer Security and Forensics, 2007.
  43. "Trustworthily Forwarding Sensor Networks Information to the Internet", O. Powell, J.-M. Seigneur and L. Moraru, in the Proceedings of the SECURWARE International Conference, IARIA, 2007.
  44. "Deploying the Trusted Platform Module (TPM) to Increase Fairness and Trust in P2P File Sharing Servents", J. Abendroth and J.-M. Seigneur, in Proceedings of the the 5th International Conference on Information Security and Privacy, WSEAS, 2006.
  45. "Trust and Security in Spatial Messaging: FoxyTag, the Speed Camera Case Study", M. Deriaz and J.-M. Seigneur, in the Proceedings of the 3rd International Conference on Privacy, Security and Trust, 2006.
  46. "Extracting Trust from Domain Analysis: a Case Study on Wikipedia Project", P. Dondio, S. Barrett, S. Weber and J.-M. Seigneur, in the Proceedings of the 3rd International Conference on Autonomic and Trusted Computing, IEEE, 2006.
  47. "Computational Trust to Further Reduce the Complexity of the Higher Education Common Space", J.-M. Seigneur, P. Dondio, S. Weber and S. Barrett, in the Proceedings of the International Conference on Engineering and Computer Education, IEEE, 2005.
  48. "Trust Transfer: Encouraging Self-Recommendations without Sybil Attack", J.-M. Seigneur, A. Gray and C. D. Jensen, in the Proceedings of the International Conference on Trust Management, LNCS, Springer-Verlag, 2005.
  49. "Towards An Evaluation Methodology for Computational Trust Systems", C. Bryce, J.-M. Seigneur, N. Dimmock, W. Wagealla, K. Krukow and V. Cahill, in the Proceedings of the International Conference on Trust Management, LNCS, Springer-Verlag, 2005.
  50. "A Case Study Implementation of a Trust Engine", C. Bryce, P. Couderc, J.-M. Seigneur, and V. Cahill, in the Proceedings of the International Conference on Trust Management, LNCS, Springer-Verlag, 2005.
  51. "Combating Spam with TEA (Trustworthy Email Addresses)", J.-M. Seigneur, N. Dimmock, C. Bryce and C. D. Jensen, in the Proceedings of the 2nd Conference on Privacy, Security and Trust, Canada, 2004.
  52. "Default Free Introduction, Rare Self-Introduction Fee, Costly Spoofing: No Profitable Spam", J.-M. Seigneur and A. Gray, EUROPRIX Scholars Conference, Tampere, Finland, 2004.
  53. "Trading Privacy for Trust", J.-M. Seigneur and C. D. Jensen, in the Proceedings of iTrust'04 the Second International Conference on Trust Management, LNCS, Springer-Verlag, 2004.
  54. "Interaction with Trust in Ambient Intelligence", J.-M. Seigneur, in the Proceedings of UbiMob, ACM, 2004.
  55. "Ambient Intelligence through Image Retrieval", J.-M. Seigneur, D. Solis and F. Shevlin, in the Proceedings of the 3rd International Conference on Image and Video Retrieval, LNCS, Springer-Verlag, 2004.
  56. "Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss", J.-M. Seigneur and C. D. Jensen, in the Proceedings of the 19th  Symposium on Applied Computing 2004, Nicosia, Cyprus, ACM, 2004.
  57. "Towards Security Auto-Configuration for Smart Appliances", J.-M. Seigneur, C. D. Jensen, S. Farrell, E. Gray and Y. Chen, in the Proceedings of the Smart Objects Conference, Grenoble, France, 2003.
  58. "End-to-end Trust Starts with Recognition", J.-M. Seigneur, S. Farrell, C. D. Jensen, E. Gray, and Y. Chen, in the Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany, LNCS, Springer-Verlag, 2003.
  59. "P2p with JXTA-Java Pipes", J.-M. Seigneur, G. Biegel and C. D. Jensen, in the Proceedings of the 2nd International Conference on the Principles and Practice of Programming in Java, ACM, 2003.
  60. "Trust Propagation in Small Worlds", E. Gray, J.-M. Seigneur, Y. Chen, and C. D. Jensen, in the Proceedings of the First International Conference on Trust Management, LNCS, Springer-Verlag, 2003.
  61. "PEARL: a Generic Architecture for Live Experiments in a Remote Laboratory", T. Schäfer, J.-M. Seigneur and A. Donnelly, in the Proceedings of the SCS International Conference on Simulation and Multimedia in Engineering Education, ICSEE'03, Florida, 2003.

Books/Editor:

  1. "Proceedings of the 8th Augmented Human International Conference", J.-M. Seigneur and S. Nanayakkara, ICPS, ACM, 2017.
  2. "Augmented Human Research" Journal, Co-Editors in Chief: M. Inami, J.-M. Seigneur and P. Mistry, Springer, since 2016.
  3. "Proceedings of the 7th Augmented Human International Conference", J.-M. Seigneur, J. M. Hernandez-Munoz, P. McCullagh, A. Schmidt, T. Terada, W. Woo and P. Mistry, ISBN: 978-1-4503-3680-2, ACM, 2016.
  4. "Special Issue on Advanced Information Security for Secure and Trust Computing", T. Shon, J. H. Park, C. Lambrinoudakis, J.-M. Seigneur, Computers & Mathematics with Applications, 65(9): 1233, Journal, Elsvier, 2013.
  5. "Proceedings of the 3rd Augmented Human International Conference", J.-M. Seigneur, H. Koenitz and G. Moreau, ISBN: 978-1-4503-1077-2, ACM, 2012.
  6. "Secure and Trust Computing, Data Management, and Applications", C. Lee, J.-M. Seigneur, J. J. Park and R. R. Wagner, Communications in Computer and Information Science, Vol. 187, Springer, 2011.
  7. "Proceedings of the 1st Augmented Human International Conference", H. Saito, J.-M. Seigneur, G. Moreau and P. Mistry, ISBN 978-1-60558-825-4, ACM, 2010.
  8. "Collaborative Computer Security and Trust Management", J.-M. Seigneur and A. Slagell, ISBN13: 9781605664149, IGI Global, 2009.
  9. "Mobile Quality of Service", D. Konstantas and J.-M. Seigneur, ISBN: 978-2-88903-004-0, University of Geneva, 2009.
  10. "Collaborative Location Aware Mobile Services", D. Konstantas and J.-M. Seigneur, ISBN: 978-2-88903-001-9, University of Geneva, 2008.

Book chapters:

  1. "e-Reputation and Online Reputation Management Survey", J.-M. Seigneur, book chapter of "Computer and Information Security Handbook", Third Edition, Morgan Kauffman, Elsevier, ISBN: 978-0-12-803843-7, 2017.
  2. "Context-Aware Multi-Factor Authentication", E. Huseynov and J.-M. Seigneur, book chapter of "Computer and Information Security Handbook", Third Edition, Morgan Kauffman, Elsevier, ISBN: 978-0-12-803843-7, 2017.
  3. "On the road to privacy and data protection-friendly security technologies in the workplace. A case-study of the MUSES Trust and Risk Analysis Engine", Y. S. M. Van Der Sype, J. Guislain, J.-M. Seigneur and X. Titi, book chapter of “Data Protection and Privacy: (In)visibilities and Infrastructures”, ISBN-13: 978-3319507958, Law, Governance and Technology Series, Book 36, Springer, 2017.
  4. "Identity and User Management", T. El Maliki and J.-M. Seigneur, book chapter of "Managing Information Systems", Second Edition, ISBN-13: 978-0124166882, Syngress, Elsevier, 2014.
  5. "Online e-Reputation Management Services", J.-M. Seigneur, book chapter of "Computer And Information Security Handbook", Second Edition, ISBN-13: 978-0123943972, Morgan Kauffman, Elsevier, 2013.
  6. "Online Identity and User Management Services", T. El Maliki and J.-M. Seigneur, book chapter of "Computer And Information Security Handbook", Second Edition, ISBN-13: 978-0123943972, Morgan Kauffman, Elsevier, 2013.
  7. "Trust and Reputation for Successful Software Self-organisation", J.-M. Seigneur and P. Dondio, book chapter of "Self-Organising Software", Natural Computing Series, DOI: 10.1007/978-3-642-17348-6_8, Springer, 2011.
  8. "Adaptive Trust Management", J.-M. Seigneur, G. Lenzini and B. Hulsebosch, book chapter of "Self-Organising Software", Natural Computing Series, DOI: 10.1007/978-3-642-17348-6_8, Springer, 2011.
  9. "Reputation Management", J.-M. Seigneur, book chapter of “Computer And Information Security Handbook”, ISBN-13: 978-0-12-374354-1, Morgan Kauffman, Elsevier, 2009.
  10. "Identity Management", T. El Maliki and J.-M. Seigneur, book chapter of “Computer And Information Security Handbook”, ISBN-13: 978-0-12-374354-1, Morgan Kauffman, Elsevier, 2009.
  11. "Social Trust of Virtual Identities", J.-M. Seigneur, book chapter of "Computing with Social Trust and Reputation", ISBN 978-1-84800-355-2, Springer, 2008.
  12. "AmbiTrust? Immutable and Context-Aware Trust Fusion", J.-M. Seigneur, book chapter of "Trust Management in Virtual Environment", ISBN 81-314-1254-1, Icfai University Press, 2008.
  13. "Survivability of Sensors with Key and Trust Management", J.-M. Seigneur, L. Moraru and O. Powell, book chapter of "Handbook of Research on Wireless Security", ISBN 978-1-59904-899-4, IGI Global, 2008.
  14. "User-Centric Identity, Trust and Privacy", J.-M. Seigneur and C. D. Jensen, book chapter of "Trust in E-services: Technologies, Practices and Challenges", ISBN 978-1599042077, Idea Group Publishing, 2007.
  15. "Security in Exotic Wireless Networks", S. Farrell, J-M. Seigneur and C.D. Jensen,  book chapter of "Security and Privacy in Advanced Networking Technologies", NATO Computer and Systems Sciences Series III, vol.193, ISBN 1 58603 430 8, ISSN, 1 387-6694, IOS Press, 2004.

Journal/Magazine papers:

  1. "Numerical Investigation of the Early Flight Phase in Ski-Jumping”, N. Gardan, A.,Schneider,  G. Polidori, H.  Trenchard, J.-M. Seigneur, F. Beaumont, F. Fourchet and R. Taiar, Journal of Biomechanics, Elsevier, [to be published in 2017]. 
  2. "Wi-Trust : Computational Trust and Reputation Management for Stronger Hotspot 2.0 Security", J.-M. Seigneur, Journal of ICT Standardization, River Publishers [to be published in 2017].
  3. "Design and Validation of a Trust-based Opportunity-enabled Risk Management System", A. Aldini, J.-M. Seigneur, C. Ballester Lafuente, X. Titi and J. Guislain, Information & Computer Security, Vol. 25 Iss: 1, Emerald Group Publishing, 2017.
  4. "Extending Trust Management with Cooperation Incentives: A Fully Decentralized Framework for User-Centric Network Environments", C. Ballester Lafuente, J.-M. Seigneur, Journal of Trust Management, Springer, 2015.
  5. "TEFIS: A Single Access Point for Conducting Multifaceted Experiments on Heterogeneous Test Facilities", M. Yannuzzi, A. Sällström, B. Pickering, R. Serral-Gracià, M. S. Siddiqui, W. Chen; S. Taylor, F. Benbadis, J. Leguay, E. Borrelli, I. Ormaetxea, K. Campowski, G. Giammatteo, G. Aristomenopoulos, S. Papavassiliou, K. Kuczynski, S. Zielinski, J.-M. Seigneur, C. Ballester Lafuente, J. Johansson, X. Masip-Bruin, M. Caria, J. Ribeiro Junior, E. Salageanu and J. Latanicki, Computer Networks special issue on Future Internet Testbeds, the International Journal of Computer and Telecommunications Networking, Elsevier, 2013.
  6. "A Security Adaptation Reference Monitor (SARM) for Wireless Sensor Network", T. El Maliki and J.-M. Seigneur, Communications and Networking, ISRN, 2012.
  7. "Trust Management for Selecting Trustworthy Access Points"X. Titi, J.-M. Seigneur and C. Ballester Lafuente, in International Journal Of Computer Science Issues, Volume 8, Issue 2, 2011.
  8. "Trust-Based Hotspot Selection", X. Titi, T. El Maliki and J.-M. Seigneur, in International Journal on Computer Science and Information Systems, Volume 2, ISSN 1646-3692, IADIS, 2011.
  9.  "Trust Engines to Preserve the Quality of an Operational Decision System", E. Grandgirard, C. Gertosio and J.-M. Seigneur, in International Journal of Factory Automation, Robotics and Soft Computing, ISSN 1828 – 6984, 2007.
  10. "Leveraging the Trusted Platform Module for More Trustworthy P2P File Sharing Peer Software", J. Abendroth and J.-M. Seigneur, in Transactions on Communications Journal, WSEAS, 2007.
  11. "Trust Evolution Policies for Security in Collaborative Ad Hoc Applications", E. Gray, C. D. Jensen, P. O'Connell, S. Weber, J.-M. Seigneur and Y. Chen, in Electr. Notes Theor. Comput. Sci., 157(3): 95-111, 2006.
  12. "Decentralized Identity for the Digital Business Ecosystem", J.-M. Seigneur, in ERCIM News, No. 63, 2005.
  13. "Fostering Sustainability via Trust Engines", J.-M. Seigneur, in Technology and Society, vol. 24(1), IEEE, 2005.
  14. "The Claim Tool Kit for Ad-hoc Recognition of Peer Entities", J.-M. Seigneur and C. D. Jensen, in the Journal of Science of Computer Programming, Elsevier, 2004.
  15. "Privacy Recovery with Disposable Email Addresses", J.-M. Seigneur, C. D. Jensen, in Security&Privacy, special issue on Understanding Privacy, November-December, IEEE, 2003. Selected for the special press release of the issue.
  16. "Using Trust for Secure Collaboration in Uncertain Environments", V. Cahill, et al., in Pervasive Computing Mobile and Ubiquitous Computing, vol. 2(3), July-September, IEEE, 2003.

Workshop papers:

  1. "Increasing Online Spendings thanks to More Trustworthy Online Ratings", J.-M. Seigneur, The Bright Internet and Global Trust Building, ICIS Conference, AIS, 2016.
  2. "User-Driven Reputation of Mobile Network Providers", J.-M. Seigneur, X. Titi and L. Ridel, ERCIM eMobility Working Group, 2009.
  3. "User-Driven Trust Computation in Wireless Network and Telecommunication Providers", J.-M. Seigneur, X. Titi, L. Ridel and B. Yavuz, Wireless World Research Forum (WWRF), 2009.
  4. "Trustworthiness of Collaborative Open Source Software Quality Assessment", J.-M. Seigneur, in the Proceedings of the International SECURECOMM Conference, SECOVAL workshop, IEEE, 2007.
  5. "Computational Trust: the Substance to Reduce Upperware Collaboration Frictions”, in the Proceedings of the Upperware Workshop at the EU IST conference in Helsinki, 2006.
  6. "Towards Trustworthy Spatial Messaging", M. Deriaz and J.-M. Seigneur, in the Proceedings of the Second International Workshop on Security and Trust Management, ERCIM, ENTCS, 2006.
  7. "Security Evaluation of Free/Open Source Software Powered by a Peer-to-Peer Ecosystem," J.-M. Seigneur, Workshop on Evaluation Frameworks for Open Source Software of the Second International Conference on Open Source Systems, 2006.
  8. "Demonstration of Security through Collaboration in the Digital Business Ecosystem", J.-M. Seigneur, IEEE Workshop on the Value of Security through Collaboration, 2005.
  9. "Trust Evolution Policies for Security in Collaborative Ad Hoc Applications", E. Gray, C. D. Jensen, P. O'Connell, S. Weber, J.-M. Seigneur and Y. Chen, in the Proceedings of the 1st ERCIM Workshop on Security and Trust Management, 2005.
  10. "The REL Project: Mobile-based Reliable Relations", J.-M. Seigneur, P. G. Argyroudis, D. O'Callaghan, and J. Abendroth, in the Proceedings of the 1st Workshop on Friend of a Friend, Social Networking and the Semantic Web, W3C, 2004.
  11. "Towards Trustworthy Eco Computing", J.-M. Seigneur, in the Proceedings of the Sustainable Pervasive Computing Workshop of the Second International Conference on Pervasive Computing, 2004.
  12. "The Role of Identity in Pervasive Computational Trust", J.-M. Seigneur and C. D. Jensen, in the Proceedings of the Security and Privacy in Pervasive Computing Workshop of the Second International Conference on Pervasive Computing, Kluwer, 2004.
  13. "Risk Probability Estimating Based on Clustering", Y. Chen, C. D. Jensen, E. Gray and J.-M. Seigneur, in the Proceedings of the 4th Annual IEEE Information Assurance Workshop, 2003.
  14. "Bank Accounting and Ubiquitous Brokering of Trustos", J.-M. Seigneur, J. Abendroth, C. D. Jensen, in 7th CaberNet Radicals Workshop, Bertinoro, Italy, 2002.
  15. "Secure Ubiquitous Computing Based on Entity Recognition", J.-M. Seigneur, S. Farrell, C. D. Jensen, in Ubicomp2002 Security Workshop, Göteborg, Sweden, 2002.

Posters/Technical reports:

  1. "OPPRIM: Opportunity-enabled risk management for trust and risk-aware asset access decision-making", Seigneur, J., Ballester Lafuente, C., Titi, X., & Guislain, J., Archive ouverte Université de Genève, 025.063; 301; 305.3; 025.06/650, retrieved from http://archive-ouverte.unige.ch/unige:46443, 2015.
  2. "Trust Management in ULOOP", C. Ballester Lafuente, J.-M. Seigneur, R. Sofia, C. Silva, W. Moreira, A. Bogliolo, ULOOP FP7 project white paper 07, 2012.
  3. "Crediting Aspects in ULOOP", A. Bogliolo, S. Delpriori, L. Klopfenstein, A. Aldini, J.-M. Seigneur, W. Moreira, ULOOP FP7 project white paper 09, October 2012.
  4. "Boosting Trustworthy Hotspots Rating with Implicit Hotspot QoS Evidence", X. Titi and J.-M. Seigneur, Future Internet Assembly, Stockholm, 2009.
  5. "Optimal Security Adaptation in Proximity-Based Wireless Networks", T. El Maliki and J.-M. Seigneur, ASG Technical Report, University of Geneva, 2009.
  6. "User Experience and Emotion-Aware Business Network Service Selection", J.-M. Seigneur and X. Titi, ASG Technical Report, University of Geneva, 2008.
  7. "TrustMIX: Trustworthy MIX for Energy Saving in Sensor Network", O. Powell, L. Moraru, J.-M. Seigneur, Cornell University Library, Arxiv.org, 2007.  
  8. "Nanotechnologies Yield Privacy Fear", J.-M. Seigneur, Poster, EuroNanoForum, 2007.
  9. "Security for Free/Open Source Software Powered by Peer-to-Peer", ASG Technical Report, University of Geneva, 2006.
  10. "HOUSe-KEEPER, a Vendor-independent Architecture for Easy Management of Smart Homes", J.-M. Seigneur, MSc dissertation, Computer Science Technical Report TCD-CS-2001-42, Trinity College Dublin, 2001.
  11. "SECURE Framework Architecture (Beta)", J-M. Seigneur, V. Cahill, C. D. Jensen, E. Gray, Y. Chen, Technical Report TCD-CS-2004-07, Trinity College Dublin, 2004.
  12. "PR3 Email Honeypot", J.-M. Seigneur, A. Lambert, P. G. Argyroudis, and C. D. Jensen, Technical Report TCD-CS-2003-39, Trinity College Dublin, 2003.
  13. "A General Risk Assessment of Security in Pervasive Computing", Y. Chen, C. D. Jensen, E. Gray, V. Cahill and J.-M. Seigneur, Technical Report TCD-CS-2003-45, Trinity College Dublin, 2003.
  14. "Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications", E. Gray, P. O'Connell, C. D. Jensen, S. Weber, J.-M. Seigneur, and Y. Chen, Technical Report TCD-CS-2002-66, Trinity College Dublin, 2002. 

Contributions to European Union projects deliverable reports:

  1. FP7-ICT-2011-8-318508 MUSES
  2. FP7-ICT-2009-1-6-258142  TEFIS
  3. FP7-ICT-257418 ULOOP
  4. FP7-ICT-2007-2-224024 PERIMETER
  5. FP6-IST-004312 EDOS
  6. FP6-IST-2002-507953 DBE
  7. FP5-IST-2001-32486 SECURE
  8. FP7-IST-1999-12550 PEARL