default search action
Maryline Laurent
Person information
- affiliation: Télécom SudParis, France
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Nathanaël Denis, Sophie Chabridon, Maryline Laurent:
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. Ann. des Télécommunications 79(7-8): 585-601 (2024) - [j43]Nathanaël Denis, Maryline Laurent, Sophie Chabridon:
A decentralized model for usage and information flow control in distributed systems. Comput. Secur. 144: 103975 (2024) - [c88]Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi:
Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query. ICOIN 2024: 409-414 - [i9]Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi:
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain. CoRR abs/2407.21559 (2024) - 2023
- [j42]Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Frédéric Cuppens:
Foreword of the special issue on « FPS 2021» symposium. Ann. des Télécommunications 78(7-8): 383 (2023) - [j41]Nathanaël Denis, Maryline Laurent, Sophie Chabridon:
Integrating Usage Control Into Distributed Ledger Technology for Internet of Things Privacy. IEEE Internet Things J. 10(22): 20120-20133 (2023) - [j40]Nesrine Kaaniche, Christophe Kiennert, Maryline Laurent, Joaquín García-Alfaro:
Anonymous certification for E-assessment opinion polls. J. Ambient Intell. Humaniz. Comput. 14(11): 14979-14993 (2023) - [j39]Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan:
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption. IEEE Trans. Cloud Comput. 11(1): 25-43 (2023) - [i8]Nathanaël Denis, Maryline Laurent, Sophie Chabridon:
Integrating Usage Control into Distributed Ledger Technology for Internet of Things Privacy. CoRR abs/2306.06143 (2023) - [i7]Montassar Naghmouchi, Maryline Laurent, Claire Levallois-Barth, Nesrine Kaaniche:
Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions. CoRR abs/2310.01006 (2023) - 2022
- [j38]Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent:
SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access 10: 106400-106414 (2022) - [j37]Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem:
Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT. ACM Comput. Surv. 54(7): 138:1-138:34 (2022) - [j36]Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche:
PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature. J. Netw. Comput. Appl. 208: 103517 (2022) - [j35]Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevicius, Qiang Tang, Aimilia Tasidou:
Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Comput. Sci. 8: e1165 (2022) - [j34]Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya:
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. IEEE Trans. Cloud Comput. 10(1): 216-233 (2022) - [c87]Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche:
SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information. ICSBT/SECRYPT (Revised Selected Papers) 2022: 1-19 - [c86]Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche:
SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge. SECRYPT 2022: 13-24 - [e4]Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquín García-Alfaro:
Foundations and Practice of Security - 14th International Symposium, FPS 2021, Paris, France, December 7-10, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13291, Springer 2022, ISBN 978-3-031-08146-0 [contents] - [e3]Josep Domingo-Ferrer, Maryline Laurent:
Privacy in Statistical Databases - International Conference, PSD 2022, Paris, France, September 21-23, 2022, Proceedings. Lecture Notes in Computer Science 13463, Springer 2022, ISBN 978-3-031-13944-4 [contents] - [i6]Montassar Naghmouchi, Hella Kaffel, Maryline Laurent:
An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts. CoRR abs/2201.00231 (2022) - [i5]Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent:
SPOT: Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems. CoRR abs/2212.00381 (2022) - 2021
- [j33]Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-Amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang:
Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access 9: 36038-36077 (2021) - [j32]Paul Marillonnet, Maryline Laurent, Mikaël Ates:
Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services. J. Comput. Sci. Technol. 36(3): 664-692 (2021) - [j31]Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche:
An Efficient User-Centric Consent Management Design for Multiservices Platforms. Secur. Commun. Networks 2021: 5512075:1-5512075:19 (2021) - [j30]Franklin Leukam Lako, Paul Lajoie-Mazenc, Maryline Laurent:
Privacy-Preserving Publication of Time-Series Data in Smart Grid. Secur. Commun. Networks 2021: 6643566:1-6643566:21 (2021) - [j29]Arie Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang:
Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things. Sensors 21(12): 4034 (2021) - [j28]Nesrine Kaaniche, Maryline Laurent, Sébastien Canard:
Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds. IEEE Trans. Cloud Comput. 9(1): 102-117 (2021) - [c85]Seryne Rahali, Maryline Laurent, Souha Masmoudi, Charles Roux, Brice Mazeau:
A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy. BigDataSE 2021: 118-127 - [c84]Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent:
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts. FPS 2021: 208-217 - [c83]Nathanaël Denis, Sophie Chabridon, Maryline Laurent:
Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains. Privacy and Identity Management 2021: 57-72 - [e2]Samia Bouzefrane, Maryline Laurent, Selma Boumerdassi, Eric Renault:
Mobile, Secure, and Programmable Networking - 6th International Conference, MSPN 2020, Paris, France, October 28-29, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12605, Springer 2021, ISBN 978-3-030-67549-3 [contents] - [i4]Seryne Rahali, Maryline Laurent, Souha Masmoudi, Charles Roux, Brice Mazeau:
A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy. CoRR abs/2109.11340 (2021) - [i3]Paul Marillonnet, Maryline Laurent, Mikaël Ates:
Personal information self-management: A survey of technologies supporting administrative services. CoRR abs/2109.12968 (2021) - 2020
- [j27]Safia Bourahla, Maryline Laurent, Yacine Challal:
Privacy preservation for social networks sequential publishing. Comput. Networks 170: 107106 (2020) - [j26]Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth:
ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments. Frontiers Blockchain 3: 17 (2020) - [j25]Nesrine Kaaniche, Maryline Laurent, Sana Belguith:
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. J. Netw. Comput. Appl. 171: 102807 (2020) - [j24]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J. Parallel Distributed Comput. 135: 1-20 (2020) - [c82]Franklin Leukam Lako, Paul Lajoie-Mazenc, Maryline Laurent:
Reconciling Privacy and Utility for Energy Services - an Application to Demand Response Protocols. EuroS&P Workshops 2020: 348-355 - [c81]Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche:
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures. ICETE (2) 2020: 142-154 - [c80]Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello:
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. ICETE (2) 2020: 225-237 - [c79]Nathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, Jean Leneutre:
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting. ICETE (2) 2020: 405-414 - [c78]Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré:
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. ICISSP 2020: 84-95 - [c77]Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir:
Privacy preserving cooperative computation for personalized web search applications. SAC 2020: 250-258 - [e1]Maryline Laurent, Thanassis Giannetsos:
Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings. Lecture Notes in Computer Science 12024, Springer 2020, ISBN 978-3-030-41701-7 [contents] - [i2]Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan:
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption. CoRR abs/2004.10952 (2020)
2010 – 2019
- 2019
- [j23]Qing Yang, Rongxing Lu, Chunming Rong, Yacine Challal, Maryline Laurent, Shengling Wang:
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet Things J. 6(3): 4556-4560 (2019) - [c76]Maryline Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane:
Authenticated and Privacy-Preserving Consent Management in the Internet of Things. ANT/EDI40 2019: 256-263 - [c75]Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo:
Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. IWCMC 2019: 1582-1587 - 2018
- [j22]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput. Networks 133: 141-156 (2018) - [j21]Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Maryline Laurent:
ICAuth: A secure and scalable owner delegated inter-cloud authorization. Future Gener. Comput. Syst. 88: 319-332 (2018) - [j20]Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web 21(1): 169-183 (2018) - [c74]Nesrine Kaaniche, Maryline Laurent:
Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications. IEEE CLOUD 2018: 590-597 - [c73]Nesrine Kaaniche, Maryline Laurent:
BDUA: Blockchain-Based Data Usage Auditing. IEEE CLOUD 2018: 630-637 - [c72]David Pàmies-Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castellà-Roca, Joaquín García-Alfaro:
Lifelogging Protection Scheme for Internet-Based Personal Assistants. DPM/CBT@ESORICS 2018: 431-440 - [c71]Nesrine Kaaniche, Maryline Laurent:
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. ICETE (2) 2018: 321-333 - [c70]Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse:
A Blockchain based Access Control Scheme. ICETE (2) 2018: 334-342 - [c69]Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre:
Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things. M4IoT@Middleware 2018: 35-40 - [c68]Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem:
Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. SecureComm (1) 2018: 53-68 - [c67]Aïda Diop, Saïd Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré:
Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 202-207 - 2017
- [j19]Louis Philippe Sondeck, Maryline Laurent, Vincent Frey:
Discrimination rate: an attribute-centric metric to measure privacy. Ann. des Télécommunications 72(11-12): 755-766 (2017) - [j18]Nesrine Kaaniche, Maryline Laurent:
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111: 120-141 (2017) - [j17]Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, Jean-Philippe Wary:
Diet-ESP: IP layer security for IoT. J. Comput. Secur. 25(2): 173-203 (2017) - [j16]Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent:
Security and Privacy in Emerging Wireless Networks. Secur. Commun. Networks 2017: 5618742:1-5618742:2 (2017) - [c66]Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig:
Security SLA Based Monitoring in Clouds. EDGE 2017: 90-97 - [c65]Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Christophe Kiennert, Joaquín García-Alfaro:
PCS , A Privacy-Preserving Certification Scheme. DPM/CBT@ESORICS 2017: 239-256 - [c64]Nesrine Kaaniche, Maryline Laurent:
A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017: 403-407 - [c63]Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquín García-Alfaro:
Anonymous Certification for an e-Assessment Framework. NordSec 2017: 70-85 - [c62]Nesrine Kaaniche, Maryline Laurent:
Attribute based Encryption for Multi-level Access Control Policies. SECRYPT 2017: 67-78 - [c61]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
Constant-size Threshold Attribute based SignCryption for Cloud Applications. SECRYPT 2017: 212-225 - [c60]Louis Philippe Sondeck, Maryline Laurent, Vincent Frey:
The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity. SECRYPT 2017: 285-294 - [i1]Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette:
Serverless Protocols for Inventory and Tracking with a UAV. CoRR abs/1708.05417 (2017) - 2016
- [j15]Collins Mtita, Maryline Laurent, Jacques Delort:
Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. IET Inf. Secur. 10(5): 262-271 (2016) - [c59]Nesrine Kaaniche, Maryline Laurent:
Attribute-Based Signatures for Supporting Anonymous Certification. ESORICS (1) 2016: 279-300 - [c58]Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things. ESORICS (2) 2016: 339-358 - [c57]Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia:
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. SECRYPT 2016: 133-146 - [c56]Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. WISTP 2016: 19-34 - 2015
- [j14]Kim Thuat Nguyen, Maryline Laurent, Nouha Oualha:
Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks 32: 17-31 (2015) - [c55]Armen Khatchatourov, Maryline Laurent, Claire Levallois-Barth:
Privacy in Digital Identity Systems: Models, Assessment, and User Adoption. EGOV 2015: 273-290 - [c54]Daniel Migault, Daniel Palomares, Tobias Guggemos, Aurélien Wailly, Maryline Laurent, Jean-Philippe Wary:
Recommendations for IPsec Configuration on Homenet and M2M Devices. Q2SWinet@MSWiM 2015: 9-17 - [c53]Florent Fortat, Maryline Laurent, Michel Simatic:
Games based on active NFC objects: Model and security requirements. NETGAMES 2015: 1-3 - [c52]Collins Mtita, Maryline Laurent, Pascal Daragon:
Serverless lightweight mutual authentication protocol for small mobile computing devices. NTMS 2015: 1-5 - [c51]Nesrine Kaaniche, Maryline Laurent:
SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications. SERVICES 2015: 143-150 - [c50]Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things. TrustCom/BigDataSE/ISPA (1) 2015: 467-474 - 2014
- [j13]Maryline Laurent, Sara Foresti, Heng Xu:
Privacy-aware electronic society. Ann. des Télécommunications 69(1-2): 1-2 (2014) - [j12]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent:
Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Networks 64: 273-295 (2014) - [j11]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent:
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. J. Netw. Comput. Appl. 45: 215-227 (2014) - [c49]Nesrine Kaaniche, Ethmane El Moustaine, Maryline Laurent:
A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications. CCGRID 2014: 522-531 - [c48]Daniel Migault, Daniel Palomares, Hendrik Hendrik, Maryline Laurent:
Secure IPsec based offload architectures for mobile data. Q2SWinet 2014: 95-104 - [c47]Daniel Palomares, Daniel Migault, Hendrik Hendrik, Maryline Laurent, Guy Pujolle:
Elastic virtual private cloud. Q2SWinet 2014: 127-131 - [c46]Nesrine Kaaniche, Maryline Laurent:
A Secure Client Side Deduplication Scheme in Cloud Storage Environments. NTMS 2014: 1-7 - [c45]Nesrine Kaaniche, Maryline Laurent, Mohammed El-Barbori:
CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. SECRYPT 2014: 5-18 - 2013
- [j10]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent:
Trust management system design for the Internet of Things: A context-aware and multi-service approach. Comput. Secur. 39: 351-365 (2013) - [c44]Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent:
High Availability for IPsec VPN Platforms: ClusterIP Evaluation. ARES 2013: 178-187 - [c43]Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent:
ID Based Cryptography for Cloud Data Storage. IEEE CLOUD 2013: 375-382 - [c42]Maryline Laurent, Samia Bouzefrane, Christophe Kiennert:
Towards a Secure Identity Management in Smartphone Environments. GreenCom/iThings/CPScom 2013: 2133-2135 - [c41]Daniel Palomares, Daniel Migault, Maryline Laurent:
Failure preventive mechanism for IPsec gateways. ICCIT 2013: 167-172 - [c40]Daniel Migault, Stanislas Francfort, Stéphane Sénécal, Emmanuel Herbert, Maryline Laurent:
Overcoming DNSSEC performance issues with DHT-based architectures. IM 2013: 816-819 - [c39]Emmanuel Herbert, Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Maryline Laurent:
Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency. IM 2013: 824-827 - [c38]Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent:
PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform. TrustCom/ISPA/IUCC 2013: 694-703 - [c37]Ethmane El Moustaine, Maryline Laurent:
GPS+: a back-end coupons identification for low-cost RFID. WISEC 2013: 73-78 - 2012
- [c36]Jean Michel Combes, Ghada Arfaoui, Maryline Laurent:
Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context. ARES 2012: 206-211 - [c35]Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui, Maryline Laurent:
E2E: An Optimized IPsec Architecture for Secure and Fast Offload. ARES 2012: 365-374 - [c34]Aymen Boudguiga, Maryline Laurent:
An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms. COMNET 2012: 1-8 - [c33]Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui, Maryline Laurent:
ISP Offload Infrastructure to minimize cost and time deployment. GLOBECOM 2012: 1041-1047 - [c32]Kheira Dari Bekara, Maryline Laurent, Than Ha Nguyen:
Technical Enforcement of European Privacy Legislation: An Access Control Approach. NTMS 2012: 1-7 - [c31]Yosra Ben Saied, Alexis Olivereau, Maryline Laurent:
A Distributed Approach for Secure M2M Communications. NTMS 2012: 1-7 - [c30]Ethmane El Moustaine, Maryline Laurent:
A lattice based authentication for low-cost RFID. RFID-TA 2012: 68-73 - [c29]Andrei Vlad Sambra, Maryline Laurent:
Context-Aware Decentralized Approach for Web Services. SERVICES 2012: 73-79 - 2011
- [c28]Aymen Boudguiga, Maryline Laurent:
An EAP ID-based authentication method for wireless networks. ICITST 2011: 232-239 - [c27]Sondes Larafa, Maryline Laurent:
Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. ISCC 2011: 856-863 - [c26]Sophie Gastellier-Prevost, Maryline Laurent:
Defeating pharming attacks at the client-side. NSS 2011: 33-40 - [c25]Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent:
A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. NSS 2011: 249-253 - [c24]Kheira Dari Bekara, Yosra Ben Mustapha, Samia Bouzefrane, Khaled Garri, Maryline Laurent, Pascal Thoniel:
Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments. NTMS 2011: 1-5 - [c23]Sophie Gastellier-Prevost, Gustavo Gonzalez Granadillo, Maryline Laurent:
A Dual Approach to Detect Pharming Attacks at the Client-Side. NTMS 2011: 1-5 - [c22]Aymen Boudguiga, Maryline Laurent:
Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. WCNC 2011: 784-789 - 2010
- [j9]Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa:
An EAP-EHash authentication method adapted to resource constrained terminals. Ann. des Télécommunications 65(5-6): 271-284 (2010) - [j8]Houssem Jarraya, Maryline Laurent:
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. Comput. Secur. 29(2): 180-195 (2010) - [j7]Tony Cheneau, Aymen Boudguiga, Maryline Laurent:
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Comput. Secur. 29(4): 419-431 (2010) - [c21]Daniel Migault, Cedric Girard, Maryline Laurent:
A performance view on DNSSEC migration. CNSM 2010: 469-474 - [c20]Sondes Larafa, Maryline Laurent:
Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks. WCNIS 2010: 277-281 - [c19]Aymen Boudguiga, Maryline Laurent:
An ID-based authentication scheme for the IEEE 802.11s Mesh Network. WiMob 2010: 256-263
2000 – 2009
- 2009
- [j6]Maher Ben Jemaa, Nahla Abid, Maryline Laurent-Maknavicius, Hakima Chaouchi:
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks. J. Comput. Networks Commun. 2009: 383517:1-383517:6 (2009) - 2008
- [c18]Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi:
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. ARES 2008: 144-152 - [c17]Houssem Jarraya, Maryline Laurent-Maknavicius:
A secure peer-to-peer backup system. NOTERE 2008: 17:1-17:10 - 2007
- [c16]Maryline Laurent-Maknavicius:
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet. ECUMN 2007: 433-438 - [c15]Chakib Bekara, Maryline Laurent-Maknavicius, Kheira Dari Bekara:
SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks. MSN 2007: 784-798 - [c14]Julien Bournelle, Jean Michel Combes, Maryline Laurent-Maknavicius, Sondes Larafa:
Using PANA for Mobile IPv6 Bootstrapping. Networking 2007: 345-355 - [c13]Chakib Bekara, Maryline Laurent-Maknavicius:
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks. WiMob 2007: 59 - [c12]Chakib Bekara, Maryline Laurent-Maknavicius:
A New Resilient Key Management Protocol for Wireless Sensor Networks. WISTP 2007: 14-26 - 2006
- [c11]Rafael Marín López, Antonio Fernandez Gómez-Skarmeta, Julien Bournelle, Maryline Laurent-Maknavicius, Jean Michel Combes:
Improved EAP keying framework for a secure mobility access service. IWCMC 2006: 183-188 - 2004
- [j5]Maryline Laurent-Maknavicius:
La sécurité de l'accès distant. Tech. Sci. Informatiques 23(5-6): 597-621 (2004) - [c10]Jean-Jacques Puig, Maryline Laurent-Maknavicius:
Routing Protocols Security Toward a Generic Model? CCCT (1) 2004: 74-78 - [c9]Julien Bournelle, Maryline Laurent-Maknavicius, Hannes Tschofenig, Yacine El Mghazli:
Handover-Aware Access Control Mechanism: CTP for PANA. ECUMN 2004: 430-439 - 2003
- [j4]Maryline Laurent-Maknavicius, Julien Bournelle:
Inter-domain security for mobile IPv6. Ann. des Télécommunications 58(7-8): 1001-1020 (2003) - 2002
- [c8]Maryline Laurent-Maknavicius:
For a Secure Mobile IP and Mobile IPv6 Deployment. SEC 2002: 109-120 - 2001
- [j3]Olivier Paul, Maryline Laurent:
Improving packet filters management through automatic and dynamic schemes. Ann. des Télécommunications 56(9-10): 595-608 (2001) - 2000
- [j2]Mohammed Achemlal, Maryline Laurent:
Analyse des fonctions des protocoles ipsec et leur intégration dans un réseau privé virtuel. Ann. des Télécommunications 55(7-8): 313-323 (2000) - [c7]Olivier Paul, Maryline Laurent, Sylvain Gombault:
A Full Bandwidth ATM Firewall. ESORICS 2000: 206-221 - [c6]Olivier Paul, Maryline Laurent:
Improving Packet Filters Management through Automatic and Dynamic Schemes. SEC 2000: 331-340
1990 – 1999
- 1999
- [c5]Olivier Paul, Maryline Laurent, Sylvain Gombault:
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks. ACSAC 1999: 75-83 - [c4]Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos:
Secure Communications in ATM Networks. ACSAC 1999: 84-93 - [c3]Olivier Paul, Maryline Laurent:
An Alternative Access Control Architecture for IP over ATM Networks. Communications and Multimedia Security 1999: 36-52 - 1998
- [j1]Maryline Laurent, Olivier Paul, Pierre Rolin:
Securing communications overAtm networks: the remoteAtm private networks interconnection example. Ann. des Télécommunications 53(9-10): 377-388 (1998) - 1997
- [c2]Maryline Laurent, Olivier Paul, Pierre Rolin:
Securing communications over ATM networks. SEC 1997: 425-439 - 1996
- [c1]Maryline Laurent:
Security Flows Analysis of the ATM Emulated LAN Architecture. Communications and Multimedia Security 1996: 37-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint