Follow
Maryline Laurent
Title
Cited by
Cited by
Year
Trust management system design for the Internet of Things: A context-aware and multi-service approach
YB Saied, A Olivereau, D Zeghlache, M Laurent
Computers & Security 39, 351-365, 2013
5732013
Survey on secure communication protocols for the Internet of Things
KT Nguyen, M Laurent, N Oualha
Ad Hoc Networks 32, 17-31, 2015
4762015
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
N Kaaniche, M Laurent
Computer Communications 111, 120-141, 2017
1922017
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Computer Networks 133, 141-156, 2018
1782018
Defeating pharming attacks at the client-side
S Gastellier-Prevost, M Laurent
2011 5th International Conference on Network and System Security, 33-40, 2011
1122011
Lightweight collaborative key establishment scheme for the Internet of Things
YB Saied, A Olivereau, D Zeghlache, M Laurent
Computer Networks 64, 273-295, 2014
1092014
A secure client side deduplication scheme in cloud storage environments
N Kaaniche, M Laurent
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
1012014
A full bandwidth ATM Firewall
O Paul, M Laurent, S Gombault
Computer Security-ESORICS 2000: 6th European Symposium on Research in …, 2000
982000
A blockchain-based data usage auditing architecture with enhanced privacy and availability
N Kaaniche, M Laurent
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
932017
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
N Kaaniche, M Laurent, S Belguith
Journal of Network and Computer Applications 171, 102807, 2020
902020
A new protocol for securing wireless sensor networks against nodes replication attacks
C Bekara, M Laurent-Maknavicius
Third IEEE International Conference on Wireless and Mobile Computing …, 2007
742007
Decisive heuristics to differentiate legitimate from phishing sites
S Gastellier-Prevost, GG Granadillo, M Laurent
2011 conference on network and information systems security, 1-9, 2011
732011
Digital identity management
M Laurent, S Bouzefrane
Elsevier, 2015
662015
Digital identity management
M Laurent, S Bouzefrane
Elsevier, 2015
662015
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
T Cheneau, A Boudguiga, M Laurent
computers & security 29 (4), 419-431, 2010
642010
Security architecture in a multi-hop mesh network
O Cheikhrouhou, M Laurent-Maknavicius, H Chaouchi
Proceedings of the 5th Conference on Security and Network Architectures (SAR …, 2006
612006
A distributed approach for secure M2M communications
YB Saied, A Olivereau, M Laurent
2012 5th International Conference on New Technologies, Mobility and Security …, 2012
552012
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
492021
Attribute-based signatures for supporting anonymous certification
N Kaaniche, M Laurent
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
492016
A dual approach to detect pharming attacks at the client-side
S Gastellier-Prevost, GG Granadillo, M Laurent
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
442011
The system can't perform the operation now. Try again later.
Articles 1–20