Seguir
Maryline Laurent
Título
Citado por
Citado por
Año
Trust management system design for the Internet of Things: A context-aware and multi-service approach
YB Saied, A Olivereau, D Zeghlache, M Laurent
Computers & Security 39, 351-365, 2013
5772013
Survey on secure communication protocols for the Internet of Things
KT Nguyen, M Laurent, N Oualha
Ad Hoc Networks 32, 17-31, 2015
4782015
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
N Kaaniche, M Laurent
Computer Communications 111, 120-141, 2017
1982017
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Computer Networks 133, 141-156, 2018
1782018
Defeating pharming attacks at the client-side
S Gastellier-Prevost, M Laurent
2011 5th International Conference on Network and System Security, 33-40, 2011
1172011
Lightweight collaborative key establishment scheme for the Internet of Things
YB Saied, A Olivereau, D Zeghlache, M Laurent
Computer Networks 64, 273-295, 2014
1092014
A secure client side deduplication scheme in cloud storage environments
N Kaaniche, M Laurent
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
1022014
A full bandwidth ATM Firewall
O Paul, M Laurent, S Gombault
Computer Security-ESORICS 2000: 6th European Symposium on Research in …, 2000
982000
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
N Kaaniche, M Laurent, S Belguith
Journal of Network and Computer Applications 171, 102807, 2020
942020
A blockchain-based data usage auditing architecture with enhanced privacy and availability
N Kaaniche, M Laurent
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
942017
A new protocol for securing wireless sensor networks against nodes replication attacks
C Bekara, M Laurent-Maknavicius
Third IEEE International Conference on Wireless and Mobile Computing …, 2007
742007
Decisive heuristics to differentiate legitimate from phishing sites
S Gastellier-Prevost, GG Granadillo, M Laurent
2011 conference on network and information systems security, 1-9, 2011
732011
Digital identity management
M Laurent, S Bouzefrane
Elsevier, 2015
662015
Digital identity management
M Laurent, S Bouzefrane
Elsevier, 2015
662015
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
T Cheneau, A Boudguiga, M Laurent
computers & security 29 (4), 419-431, 2010
642010
Security architecture in a multi-hop mesh network
O Cheikhrouhou, M Laurent-Maknavicius, H Chaouchi
Proceedings of the 5th Conference on Security and Network Architectures (SAR …, 2006
612006
A distributed approach for secure M2M communications
YB Saied, A Olivereau, M Laurent
2012 5th International Conference on New Technologies, Mobility and Security …, 2012
552012
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
492021
Attribute-based signatures for supporting anonymous certification
N Kaaniche, M Laurent
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
492016
A dual approach to detect pharming attacks at the client-side
S Gastellier-Prevost, GG Granadillo, M Laurent
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
442011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20