<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://loicmiller.com/tags/blockchain/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/blockchain-monnaie-numeriques/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/euro-numerique/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/passage-a-lechelle/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/preuve-succincte/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/sharding/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/verrous-technologiques/</loc><lastmod>2025-12-05T11:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/mining-in-logarithmic-space-with-variable-difficulty/</loc><lastmod>2025-10-14T14:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/polylogarithmic-communication-and-update-complexities/</loc><lastmod>2025-10-14T14:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/succinct-proof/</loc><lastmod>2025-10-14T14:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/variable-difficulty/</loc><lastmod>2025-10-14T14:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/mining-in-logarithmic-space-with-variable-difficulty/</loc><lastmod>2025-10-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication_types/paper-conference/</loc><lastmod>2025-10-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/</loc><lastmod>2025-10-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication_types/</loc><lastmod>2025-10-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/</loc><lastmod>2025-09-23T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/experience/</loc><lastmod>2025-09-23T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/compression/</loc><lastmod>2025-06-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/difficulte-variable/</loc><lastmod>2025-06-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/preuve-de-travail/</loc><lastmod>2025-06-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/preuves-non-interactives-nouvelle-ere-chaines-compressees/</loc><lastmod>2025-06-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication_types/article/</loc><lastmod>2024-03-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/collaborative-cybersecurity/</loc><lastmod>2024-03-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/collaborative-cybersecurity-using-blockchain-a-survey/</loc><lastmod>2024-03-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/distributed-ledgers/</loc><lastmod>2024-03-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/literature-review/</loc><lastmod>2024-03-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/security/</loc><lastmod>2024-03-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/survey/</loc><lastmod>2024-03-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication_types/article-journal/</loc><lastmod>2023-08-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/computational-complexity/</loc><lastmod>2023-08-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/directed-hypergraphs/</loc><lastmod>2023-08-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/finding-s-d-hypernetworks-in-f-hypergraphs-is-np-hard/</loc><lastmod>2023-08-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/hypernetworks/</loc><lastmod>2023-08-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/np-completeness/</loc><lastmod>2023-08-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/access-control/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/authorization/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/data-leak/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/metagraphs/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/microservices/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/policy-verification/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/rego/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/securing-workflows-using-microservices-and-metagraphs/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/workflow/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/yawl/</loc><lastmod>2021-12-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/controle-dacces/</loc><lastmod>2021-09-22T16:30:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/de-l-utilisation-des-metagraphs-pour-la-verification-de-politiques-de-securite/</loc><lastmod>2021-09-22T16:30:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/metagraphes/</loc><lastmod>2021-09-22T16:30:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/modelisation-de-politiques/</loc><lastmod>2021-09-22T16:30:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/verification-de-politiques/</loc><lastmod>2021-09-22T16:30:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/fuites-de-donnees/</loc><lastmod>2021-09-20T15:10:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/protection-contre-les-fuites-de-donnees-un-environnement-microservices-securise/</loc><lastmod>2021-09-20T15:10:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/securite/</loc><lastmod>2021-09-20T15:10:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/policy-modeling/</loc><lastmod>2021-08-31T17:15:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/policy-verification-using-metagraphs/</loc><lastmod>2021-08-31T17:15:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/de-l-utilisation-des-metagraphs-pour-la-verification-de-politiques-de-securite/</loc><lastmod>2021-08-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/protection-contre-les-fuites-de-donnees-un-environnement-microservices-securise/</loc><lastmod>2021-08-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/data-breach/</loc><lastmod>2021-06-08T17:15:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/towards-secure-and-leak-free-workflows-using-microservices/</loc><lastmod>2021-06-08T17:15:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/verification-of-cloud-security-policies/</loc><lastmod>2021-06-08T17:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/towards-secure-and-leak-free-workflows-using-microservices/</loc><lastmod>2021-06-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/verification-of-cloud-security-policies/</loc><lastmod>2021-06-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/securing-workflows-using-microservices/</loc><lastmod>2019-10-08T09:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/a-taxonomy-of-attacks-using-bgp-blackholing/</loc><lastmod>2019-09-23T10:55:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/bgp/</loc><lastmod>2019-09-23T10:55:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/blackholing/</loc><lastmod>2019-09-23T10:55:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/communities/</loc><lastmod>2019-09-23T10:55:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/ddos/</loc><lastmod>2019-09-23T10:55:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/hijacks/</loc><lastmod>2019-09-23T10:55:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/tags/leaks/</loc><lastmod>2019-09-23T10:55:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/publication/a-taxonomy-of-attacks-using-bgp-blackholing/</loc><lastmod>2019-09-23T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/securing-workflows-using-the-microservices-architecture/</loc><lastmod>2019-06-20T13:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/event/bgp-blackholing-attack-defense/</loc><lastmod>2019-01-18T10:15:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/post/</loc><changefreq>weekly</changefreq></url><url><loc>https://loicmiller.com/teaching/</loc><changefreq>weekly</changefreq></url></urlset>