SAMOVAR - SAMOVAR
Telecom SudParis
9 rue Charles Fourier
91011 EVRY CEDEX
Fax : +33 (0) 1 60 76 20 80
Pr. Maryline Laurent
Professeur
SCN
Maryline.laurent[@-Code to remove to avoid SPAM-]telecom-sudparis.eu
Article dans une revue
2024
- ref_biblio
- NathanaĂ«l Denis, Sophie Chabridon, Maryline Laurent. Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. Annals of Telecommunications - annales des tĂ©lĂ©communications, 2024, ⟨10.1007/s12243-023-01005-1⟩. ⟨hal-04383612⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nathanael Denis, Maryline Laurent, Sophie Chabridon. A decentralized model for usage and information flow control in distributed systems. Computers & Security, 2024, 144, pp.103975. ⟨10.1016/j.cose.2024.103975⟩. ⟨hal-04644186⟩
- AccĂšs au bibtex
2023
- ref_biblio
- NathanaĂ«l Denis, Maryline Laurent, Sophie Chabridon. Integrating usage control into distributed ledger technology for internet of things privacy. IEEE Internet of Things Journal, 2023, pp.1-1. ⟨10.1109/JIOT.2023.3283300⟩. ⟨hal-04121481⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan. Securing organizationâs data: A role-based authorized keyword search scheme with efficient decryption. IEEE Transactions on Cloud Computing, 2023, 11 (1), pp.25-43. ⟨10.1109/TCC.2021.3071304⟩. ⟨hal-04331375⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi. Self-Sovereign identity for consented and content-Based access to medical records using Blockchain. Security and communication networks, 2023, 2023, pp.1-11. ⟨10.1155/2023/6025789⟩. ⟨hal-04100562⟩
- AccÚs au texte intégral et bibtex
2022
- ref_biblio
- Sophie DramĂ©-MaignĂ©, HervĂ© Ganem, Maryline Laurent, Laurent Castillo. Centralized, Distributed, and Everything in between. ACM Computing Surveys, 2022, 54 (7), pp.1-34. ⟨10.1145/3465170⟩. ⟨hal-03754002⟩
- AccĂšs au bibtex
- ref_biblio
- Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-03997331⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-04331322⟩
- AccĂšs au bibtex
- ref_biblio
- Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent. SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access, 2022, 10, pp.106400-106414. ⟨10.1109/ACCESS.2022.3208697⟩. ⟨hal-04227764⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. PIMA: a privacy-preserving identity management system based on an unlinkable MAlleable signature. Journal of Network and Computer Applications (JNCA), 2022, 208 (103517), pp.1-35. ⟨10.1016/j.jnca.2022.103517⟩. ⟨hal-03793163⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/tcc.2019.2931896⟩. ⟨hal-03991044⟩
- AccÚs au texte intégral et bibtex
2021
- ref_biblio
- MikaĂ«l Ates, Maryline Laurent, Paul Marillonnet, Nesrine Kaaniche. An efficient user-centric consent management design for multiservices platforms. Security and communication networks, 2021, 2021, pp.1 - 19. ⟨10.1155/2021/5512075⟩. ⟨hal-03991134⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Arie Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang. Practical cross-layer radio frequency-based authentication scheme for internet of things. Sensors, 2021, 21 (12), pp.1-19. ⟨10.3390/s21124034⟩. ⟨hal-03753291⟩
- AccĂšs au bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Sebastien Canard. Cooperative set homomorphic proofs for data possession checking in clouds. IEEE Transactions on Cloud Computing, 2021, 9 (1), pp.102-117. ⟨10.1109/TCC.2018.2865343⟩. ⟨hal-01991145⟩
- AccĂšs au bibtex
- ref_biblio
- Paul Lajoie-Mazenc, Maryline Laurent, Franklin Leukam Lako. Privacy-preserving publication of time-series data in smart grid. Security and communication networks, 2021, 2021, pp.1-21. ⟨10.1155/2021/6643566⟩. ⟨hal-03754005⟩
- AccĂšs au bibtex
- ref_biblio
- Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, et al.. Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 2021, 9, pp.36038 - 36077. ⟨10.1109/ACCESS.2021.3062201⟩. ⟨hal-03153890⟩
- AccĂšs au bibtex
- ref_biblio
- Paul Marillonnet, Maryline Laurent, MikaĂ«l Ates. Personal information self-management: A survey of technologies supporting administrative services. Journal of Computer Science and Technology, 2021, 36 (3), pp.664-692. ⟨10.1007/s11390-021-9673-z⟩. ⟨hal-03753295⟩
- AccĂšs au bibtex
2020
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 2020, 135, pp.1-20. ⟨10.1016/j.jpdc.2019.08.014⟩. ⟨hal-03990990⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Safia Bourahla, Maryline Laurent, Yacine Challal. Privacy preservation for social networks sequential publishing. Computer Networks, 2020, 170, pp.107106-1:107106-25. ⟨10.1016/j.comnet.2020.107106⟩. ⟨hal-02921464⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 2020, 3 (17), pp.1-12. ⟨10.3389/fbloc.2020.00017⟩. ⟨hal-03991089⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. Journal of Network and Computer Applications (JNCA), 2020, 171, pp.102807. ⟨10.1016/j.jnca.2020.102807⟩. ⟨hal-03990971⟩
- AccÚs au texte intégral et bibtex
2019
- ref_biblio
- Nesrine Kaaniche, Chistophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro. Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing, 2019, 14, pp.14979-14993. ⟨10.1007/s12652-019-01545-2⟩. ⟨hal-03991234⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Qing Yang, Rongxing Lu, Chunming Rong, Yacine Challal, Maryline Laurent, et al.. Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet of Things Journal, 2019, 6 (3), pp.4556-4560. ⟨10.1109/JIOT.2019.2921235⟩. ⟨hal-02315884⟩
- AccĂšs au bibtex
2018
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IOT. Computer Networks, 2018, 133, pp.141 - 156. ⟨10.1016/j.comnet.2018.01.036⟩. ⟨hal-01773931⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web, 2018, 21 (1), pp.169 - 183. ⟨10.1007/s11280-017-0473-x⟩. ⟨hal-01682222⟩
- AccĂšs au bibtex
- ref_biblio
- Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Maryline Laurent. ICAuth: a secure and scalable owner delegated inter-cloud authorization. Future Generation Computer Systems, 2018, 88, pp.319 - 332. ⟨10.1016/j.future.2018.05.066⟩. ⟨hal-01991132⟩
- AccĂšs au bibtex
2017
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 2017, 111, pp.120 - 141. ⟨10.1016/j.comcom.2017.07.006⟩. ⟨hal-01576979⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent. Pare-feu: le couteau suisse de la sĂ©curitĂ© informatique. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2017, TE7550v2. ⟨hal-01681679⟩
- AccĂšs au bibtex
- ref_biblio
- Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, et al.. Diet-ESP: IP layer security for IoT. Journal of Computer Security, 2017, 25 (2), pp.173 - 203. ⟨10.3233/JCS-16857⟩. ⟨hal-01518274⟩
- AccĂšs au bibtex
- ref_biblio
- Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. Discrimination rate: an attribute-centric metric to measure privacy. Annals of Telecommunications - annales des tĂ©lĂ©communications, 2017, 72 (11-12), pp.755 - 766. ⟨10.1007/s12243-017-0581-8⟩. ⟨hal-01653440⟩
- AccĂšs au bibtex
2015
- ref_biblio
- Kim Thuat Nguyen, Maryline Laurent, Nouha Ouahla. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 2015, 32, pp.17 - 31. ⟨10.1016/j.adhoc.2015.01.006⟩. ⟨hal-01272046⟩
- AccĂšs au bibtex
2014
- ref_biblio
- Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. Journal of Network and Computer Applications (JNCA), 2014, 45, pp.215 - 227. ⟨10.1016/j.jnca.2014.07.036⟩. ⟨hal-01281944⟩
- AccĂšs au bibtex
- ref_biblio
- Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Lightweight collaborative key establishment scheme for the Internet of Things. Computer Networks, 2014, 64, pp.273 - 295. ⟨10.1016/j.comnet.2014.02.001⟩. ⟨hal-01263479⟩
- AccĂšs au bibtex
2013
- ref_biblio
- Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Trust management system design for the Internet of Things: a context-aware and multi- service approach. Computers & Security, 2013, 39 (Part B), pp.351 - 365. ⟨10.1016/j.cose.2013.09.001⟩. ⟨hal-01281972⟩
- AccĂšs au bibtex
2012
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. On the use of ID-based cryptography for the definition of new EAP authentication methods. International journal for information security research (IJISR), 2012, 2 (1 & 2), pp.246-255. ⟨hal-00724636⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Ethmane El Moustaine, Maryline Laurent. SystĂšmes et techniques RFID : risques et solutions de sĂ©curitĂ©. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2012, H5325. ⟨hal-00770788⟩
- AccĂšs au bibtex
- ref_biblio
- Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Risk assessment along supply chain : a RFID and wireless sensor network integration approach. Sensors & Transducers., 2012, 14 (2), pp.269-282. ⟨hal-00712579⟩
- AccĂšs au bibtex
2011
- ref_biblio
- Andrei Vlad Sambra, Maryline Laurent. MyProfile - Decentralized User Profile and Identity on the Web. W3C's Federated Social Web (FSW2011), 2011. ⟨hal-00745348⟩
- AccÚs au texte intégral et bibtex
2010
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. SĂ©curitĂ© dans les rĂ©seaux 802.11. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2010, TE7377. ⟨hal-01355251⟩
- AccĂšs au bibtex
- ref_biblio
- Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Computers & Security, 2010, 29 (4), pp.419 - 431. ⟨10.1016/j.cose.2009.12.008⟩. ⟨hal-00496002⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. Computers & Security, 2010, 29 (2), pp.180 - 195. ⟨10.1016/j.cose.2009.10.003⟩. ⟨hal-00472901⟩
- AccĂšs au bibtex
2009
- ref_biblio
- Maher Ben Jemaa, Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental measurements of host identity protocol for mobile nodes' networks. Journal of computer systems, networks, and communications, 2009, 2009 (Article ID 383517), pp.1 - 6. ⟨10.1155/2009/383517⟩. ⟨hal-00472911⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An EAP-EHash authentication method adapted to resource constrained terminals. Annals of Telecommunications - annales des tĂ©lĂ©communications, 2009, 65 (5), pp.271 - 284. ⟨10.1007/s12243-009-0135-9⟩. ⟨hal-00506549⟩
- AccÚs au texte intégral et bibtex
2008
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. SĂ©curitĂ© des rĂ©seaux sans fil et mobiles : problĂ©matiques et enjeux technologiques. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2008, 14. ⟨hal-01355033⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent. SĂ©curitĂ© des systĂšmes P2P de sauvegarde distribuĂ©e. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2008, 16. ⟨hal-01355031⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent. Projet DisPairSe : systĂšme P2P de sauvegarde distribuĂ©e sĂ©curisĂ©. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2008, 17, pp.2 - 3. ⟨hal-01354702⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Hakima Chaouchi. Des rĂ©seaux ad hoc Ă©conomiquement viables. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2008, 11. ⟨hal-01355035⟩
- AccĂšs au bibtex
2007
- ref_biblio
- Maryline Laurent. Les architectures de fĂ©dĂ©ration d'identitĂ© et la garantie de notre vie privĂ©e. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2007, 9. ⟨hal-01355037⟩
- AccĂšs au bibtex
2003
- ref_biblio
- Maryline Laurent. Protocole IPsec. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2003, TE7545. ⟨hal-01331303⟩
- AccĂšs au bibtex
2001
- ref_biblio
- Olivier Paul, Maryline Laurent. Improving packet filters management through automatic and dynamic schemes. Annals of Telecommunications - annales des tĂ©lĂ©communications, 2001, 56 (9-10), pp.595-608. ⟨10.1007/BF03008836⟩. ⟨hal-03643165⟩
- AccĂšs au bibtex
1999
- ref_biblio
- Herbert Leitold, Reinhard Posch, Enrique Areizaga, Ahmed Bouabdallah, Maryline Laurent, et al.. Security services in ATM networks. Interoperable communication networks journal, 1999, 2 (1), pp.107 - 119. ⟨hal-02341316⟩
- AccĂšs au bibtex
Communication dans un congrĂšs
2024
- ref_biblio
- Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. Differentially-private data aggregation over encrypted location data for range counting query. 2024 International Conference on Information Networking (ICOIN), Jan 2024, Ho Chi Minh City, Vietnam. pp.409-414, ⟨10.1109/ICOIN59985.2024.10572074⟩. ⟨hal-04645794⟩
- AccÚs au texte intégral et bibtex
2022
- ref_biblio
- Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SEVIL: secure and efficient verifIcation over massive proofs of knowLedge. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.13-24, ⟨10.5220/0011125800003283⟩. ⟨hal-03997364⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information. 19th International Conference E-Business and Telecommunications (ICSBT), Jul 2022, Lisbon (Portugal), Portugal. pp.1-19, ⟨10.1007/978-3-031-45137-9_1⟩. ⟨hal-04227767⟩
- AccÚs au texte intégral et bibtex
2021
- ref_biblio
- NathanaĂ«l Denis, Maryline Laurent, Sophie Chabridon. Bringing privacy, security and performance to the internet of things through usage control and blockchains. 16th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2021, Virtual, Luxembourg. pp.57-72, ⟨10.1007/978-3-030-99100-5_6⟩. ⟨hal-03754051⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent. An automatized identity and access management system for IoT combining self-sovereign identity and smart contracts. The 14th International Symposium on Foundations and Practice of Security ( FPS), Dec 2021, Paris, France. pp.208-217, ⟨10.1007/978-3-031-08147-7_14⟩. ⟨hal-03997389⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Seryne Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A validated privacy-utility preserving recommendation system with local differential privacy. 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩. ⟨hal-03754064⟩
- AccĂšs au bibtex
2020
- ref_biblio
- NathanaĂ«l Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, et al.. Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩. ⟨hal-02910407⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Aida Diop, Maryline Laurent, Jean Leneutre, Jacques TraorĂ©. CoRA: a scalable Collective Remote Attestation protocol for sensor networks. ICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩. ⟨hal-03024074⟩
- AccĂšs au bibtex
- ref_biblio
- Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. the 35th Annual ACM Symposium on Applied Computing(ACM), Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, ⟨10.1145/3341105.3373947⟩. ⟨hal-03991100⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-03991163⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Franklin Leukam Lako, Paul Lajoie Mazenc, Maryline Laurent. Reconciling privacy and utility for energy services. EuroS&PW 2020: 5th IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova (online), Italy. pp.348-355, ⟨10.1109/EuroSPW51379.2020.00054⟩. ⟨hal-03116988⟩
- AccĂšs au bibtex
- ref_biblio
- Paul Marillonnet, MikaĂ«l Ates, Maryline Laurent, Nesrine Kaaniche. An identity-matching process to strengthen trust in federated-identity architectures. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.142-154, ⟨10.5220/0009828401420154⟩. ⟨hal-03991153⟩
- AccÚs au texte intégral et bibtex
2019
- ref_biblio
- Sophie DramĂ©-MaignĂ©, Maryline Laurent, Laurent Castillo. Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Jun 2019, Tangier, Morocco. pp.1582-1587, ⟨10.1109/IWCMC.2019.8766478⟩. ⟨hal-04331571⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things. ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩. ⟨hal-02147191⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC sĂ©curitĂ© des rĂ©seaux : un apprentissage massif de la sĂ©curitĂ© par la thĂ©orie et la pratique. RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la SĂ©curitĂ© des SystĂšmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4. ⟨hal-03754082⟩
- AccÚs au texte intégral et bibtex
2018
- ref_biblio
- Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre. Towards end-to-end privacy for publish/subscribe architectures in the Internet of Things. M4IoT 2018: 5th Workshop on Middleware and Applications for the Internet of Things at the 2018 ACM/IFIP International Middleware Conference, Dec 2018, Rennes, France. pp.35 - 40, ⟨10.1145/3286719.3286727⟩. ⟨hal-01940866⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Aida Diop, Said Gharout, Maryline Laurent, Jean Leneutre, Jacques TraorĂ©. Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩. ⟨hal-01850383⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Sophie DramĂ©-MaignĂ©, Maryline Laurent, Laurent Castillo, HervĂ© Ganem. Augmented chain of ownership : configuring IoT devices with the help of the blockchain. SECURECOMM 2018: 14th EAI International Conference on Security and Privacy in Communication Networks, Sep 2018, Singapour, Singapore. pp.53 - 68, ⟨10.1007/978-3-030-01701-9_4⟩. ⟨hal-01895391⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. BDUA: blockchain-based data usage auditing. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Jul 2018, San Francisco, United States. pp.630-637, ⟨10.1109/CLOUD.2018.00087⟩. ⟨hal-03754087⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.155 - 167, ⟨10.5220/0006855501550167⟩. ⟨hal-01850387⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.168 - 176, ⟨10.5220/0006855601680176⟩. ⟨hal-01864317⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Maryline Laurent, Nesrine Kaaniche. Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IOT applications. 2018 CLOUD 11th International Conference on Cloud Computing, Jul 2018, San Francisco, France. pp.590-597, ⟨10.1109/CLOUD.2018.00082⟩. ⟨hal-03754091⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Paul Marillonnet, MikaĂ«l Ates, Maryline Laurent. Etat de l'art des technologies de la gestion des donnĂ©es personnelles par l'usager. APVP 2018: Atelier sur la Protection de la Vie PrivĂ©e, Jun 2018, Porquerolles, France. ⟨hal-01822897⟩
- AccĂšs au bibtex
- ref_biblio
- David Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for internet-based personal assistants. DPM 2018: 13th International Workshop on Data Privacy Management, Sep 2018, Barcelona, Spain. pp.431 - 440, ⟨10.1007/978-3-030-00305-0_31⟩. ⟨hal-01991849⟩
- AccÚs au texte intégral et bibtex
2017
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Constant-size threshold attribute based signcryption for cloud applications. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.212 - 225, ⟨10.5220/0006469202120225⟩. ⟨hal-01575575⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. Attribute based encryption for multi-level access control policies. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.67 - 78, ⟨10.5220/0006421000670078⟩. ⟨hal-01575560⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. Security SLA based monitoring in clouds. EDGE 2017 : 1st International Conference on Edge Computing, Jun 2017, Honolulu, United States. pp.90 - 97, ⟨10.1109/IEEE.EDGE.2017.20⟩. ⟨hal-01593433⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. pp.239 - 256, ⟨10.1007/978-3-319-67816-0_14⟩. ⟨hal-01593430⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171384⟩. ⟨hal-01682227⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. ⟨hal-01702450⟩
- AccĂšs au bibtex
- ref_biblio
- Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems, Nov 2017, Tartu, Estonia. pp.70 - 85, ⟨10.1007/978-3-319-70290-2_5⟩. ⟨hal-01699347⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Collins Isdory Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, et al.. Serverless protocols for inventory and tracking with a UAV. DASC 2017 : IEEE/AIAA 36th Digital Avionics Systems Conference, Sep 2017, St Petersburg, United States. pp.1 - 11, ⟨10.1109/DASC.2017.8102113⟩. ⟨hal-01682257⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. The semantic discrimination rate metric for privacy measurements which questions the benefit of T-closeness over L-diversity. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.285 - 294, ⟨10.5220/0006418002850294⟩. ⟨hal-01576996⟩
- AccÚs au texte intégral et bibtex
2016
- ref_biblio
- Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.133 - 146, ⟨10.5220/0005968201330146⟩. ⟨hal-01391253⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, SĂ©bastien Canard. A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations. Proc. 2e atelier sur la SĂ©curitĂ© dans les Clouds, Feb 2016, paris, France. ⟨hal-03991200⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. Attribute-based signatures for supporting anonymous certification. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.279 - 300, ⟨10.1007/978-3-319-45744-4_14⟩. ⟨hal-01391343⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, SĂ©bastien Canard. A novel proof of data possession scheme based on set-homomorphic operations. SEC2 2016 : 2e atelier sur la SĂ©curitĂ© dans les Clouds, Jul 2016, Lorient, France. pp.1 - 4. ⟨hal-01390987⟩
- AccĂšs au bibtex
- ref_biblio
- Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.339 - 358, ⟨10.1007/978-3-319-45741-3_18⟩. ⟨hal-01391319⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Novel lightweight signcryption-based key distribution mechanisms for MIKEY. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩. ⟨hal-01391308⟩
- AccÚs au texte intégral et bibtex
2015
- ref_biblio
- Florent Fortat, Maryline Laurent, Michel Simatic. Games based on active NFC objects : model and security requirements. NETGAMES 2015 : 14th International Workshop on Network and Systems Support for Games, Dec 2015, Zagreb, Croatia. pp.1 - 3, ⟨10.1109/NetGames.2015.7382998⟩. ⟨hal-01279183⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. SHoPS: Set Homomorphic Proof of data Possession Scheme in cloud storage applications. Services 2015 : IEEE World Congress on Services , Jun 2015, New York, United States. pp.143 - 150, ⟨10.1109/SERVICES.2015.29⟩. ⟨hal-01254993⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Armen Khatchatourov, Maryline Laurent, Claire Levallois-Barth. Privacy in digital identity systems: models, assessment and user adoption. 14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩. ⟨hal-01283997⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Migault, Tobias Guggemos, Daniel Palomares, Aurelien Wailly, Maryline Laurent, et al.. Recommendations for IPsec configuration on homenet and M2M devices. Q2SWINET 2015 : 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Nov 2015, Cancun, Mexico. pp.9 - 17, ⟨10.1145/2815317.2815323⟩. ⟨hal-01263312⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Collins Isdory Mtita, Maryline Laurent, Pascal Daragon. Serverless lightweight mutual authentication protocol for small mobile computing devices. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security , Jul 2015, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2015.7266521⟩. ⟨hal-01285358⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent. Lightweight certificateless and provably-secure signcryptosystem for the internet of things. TRUSTCOM 2015 : 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland. pp.467-474, ⟨10.1109/Trustcom.2015.408⟩. ⟨hal-01279169⟩
- AccÚs au texte intégral et bibtex
2014
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent, Mohammed El Barbori. CloudaSec : a novel public-key based framework to handle data sharing security in clouds. SECRYPT 2014 : 11th International Conference on Security and Cryptography, Aug 2014, Vienne, Austria. pp.5 - 18, ⟨10.5220/0005010600050018⟩. ⟨hal-01263351⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Maryline Laurent. A secure client side deduplication scheme in cloud storage environments. NTMS 2014 : 6th International Conference on New Technologies, Mobility and Security , Mar 2014, Dubai, United Arab Emirates. pp.1 - 7, ⟨10.1109/NTMS.2014.6814002⟩. ⟨hal-01263425⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Ethmane El Moustaine, Maryline Laurent. A novel zero-knowledge scheme for proof of data possession in cloud storage applications. CCGRID 2014 : 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing , May 2014, Chicago, United States. pp.522 - 531, ⟨10.1109/CCGrid.2014.81⟩. ⟨hal-01263463⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Armen Khatchatourov, Maryline Laurent, Meriem Sellami. Pseudonymisation, identitĂ©s multiples et protection des donnĂ©es Ă caractĂšre personnel dans le champ des identitĂ©s numĂ©riques : quelques aspects du paysage europĂ©en. 5Ăšme Atelier sur la Protection de la Vie PrivĂ©e, Jun 2014, Cabourg, France. ⟨hal-02397700⟩
- AccĂšs au bibtex
- ref_biblio
- Daniel Migault, Daniel Palomares, Hendrik Hendrik, Maryline Laurent. Secure IPsec based offload architectures for mobile data : architecture description and performance evaluation. Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks, Sep 2014, Montreal, Canada. pp.95 - 104, ⟨10.1145/2642687.2642690⟩. ⟨hal-01263065⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Palomares, Daniel Migault, Hendrik Hendrik, Maryline Laurent. Elastic virtual private cloud. Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks , Sep 2014, Montreal, Canada. pp.127 - 131, ⟨10.1145/2642687.2642704⟩. ⟨hal-01264790⟩
- AccÚs au texte intégral et bibtex
2013
- ref_biblio
- Ethmane El Moustaine, Maryline Laurent. GPS+ : a back-end coupons identification for low-cost RFID. WiSec '13 : 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Apr 2013, Budapest, Hungary. pp.73-78, ⟨10.1145/2462096.2462109⟩. ⟨hal-00843977⟩
- AccĂšs au bibtex
- ref_biblio
- Emmanuel Herbert, Daniel Migault, StĂ©phane SĂ©nĂ©cal, Stanislas Francfort, Maryline Laurent. Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency. IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.824-827. ⟨hal-00860157⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent. ID based cryptography for secure cloud data storage. CLOUD 2013 : IEEE 6th International Conference on Cloud Computing, Jun 2013, Santa Clara, CA, United States. pp.375-382, ⟨10.1109/CLOUD.2013.80⟩. ⟨hal-01275089⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Maryline Laurent, Samia Bouzefrane, Christophe Kiennert. Towards secure identity management in smartphone environments. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Aug 2013, X, France. pp.2133-2135. ⟨hal-01126288⟩
- AccĂšs au bibtex
- ref_biblio
- Daniel Migault, StĂ©phane SĂ©nĂ©cal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent. PREFETCHing to overcome DNSSEC deployment over large resolving platforms. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.694 - 703, ⟨10.1109/TrustCom.2013.84⟩. ⟨hal-01262120⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Migault, Stanislas Francfort, StĂ©phane SĂ©nĂ©cal, Emmanuel Herbert, Maryline Laurent. Overcoming DNSSEC performance issues with DHT-based architectures. IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.816-819. ⟨hal-00860147⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Palomares, Daniel Migault, Maryline Laurent. Failure preventive mechanism for IPsec gateways. ICCIT '13 : The Third International Conference on Communications and Information Technology, Jun 2013, Beirut, Lebanon. pp.167-172, ⟨10.1109/ICCITechnology.2013.6579543⟩. ⟨hal-00860251⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent. High Availability for IPsec VPN Platforms: ClusterIP Evaluation. 8th International Conference on Availability, Reliability and Security (ARES 2013), Sep 2013, Regensburg, Germany. pp.1. ⟨hal-00863418⟩
- AccÚs au texte intégral et bibtex
2012
- ref_biblio
- Kheira Bekara, Maryline Laurent, Than Ha Nguyen. Technical enforcement of european privacy legislation: an access control approach. NTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security , May 2012, Istanbul, Turkey. pp.1 - 7, ⟨10.1109/NTMS.2012.6208724⟩. ⟨hal-01300733⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Yosra Ben Saied, Alexis Olivereau, Maryline Laurent. A distributed approach for secure M2M communications. NTMS '12 : 5th IFIP International Conference on New Technologies, Mobility and Security, May 2012, Istambul, Turkey. pp.1-7, ⟨10.1109/NTMS.2012.6208702⟩. ⟨hal-00811949⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-based cryptographic algorithms. ComNet '12 : The Third International Conference on Communications and Networking, Mar 2012, Tunis, Tunisia. pp.1-8, ⟨10.1109/ComNet.2012.6217728⟩. ⟨hal-00819802⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Jean-Michel Combes, Aurelien Wailly, Maryline Laurent. CGA as alternative security credentials with IKEv2 : implementation and analysis. SAR-SSI '12 : 7th Conference on Network Architectures and Information Systems Security, May 2012, Cabourg, France. pp.53-59. ⟨hal-00747186⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Jean-Michel Combes, Maryline Laurent. Source address validation improvements (SAVI): mĂ©canismes de prĂ©vention contre l'usurpation d'adresses IP source. SSTIC 2012 : Symposium sur la SĂ©curitĂ© des Technologies de l'Information et des Communications, Jun 2012, Rennes, France. pp.292 - 326. ⟨hal-01300731⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Jean-Michel Combes, Ghada Arfaoui, Maryline Laurent. Dynamic DNS update security, based on cryptographically generated addresses and ID-based cryptography, in an IPv6 autoconfiguration context. AReS '12 : The 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.206-211, ⟨10.1109/ARES.2012.69⟩. ⟨hal-00756609⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Ethmane El Moustaine, Maryline Laurent. A lattice based authentication for low-cost RFID. RFID-TA '12 : IEEE International Conference on RFID Technology and Applications, Nov 2012, Nice, France. pp.68-73, ⟨10.1109/RFID-TA.2012.6404569⟩. ⟨hal-00772773⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et al.. ISP offload infrastructure to minimize cost and time deployment. GLOBECOM '12 : IEEE Global Communications Conference, Dec 2012, Anaheim, United States. pp.1041-1047, ⟨10.1109/GLOCOM.2012.6503250⟩. ⟨hal-00833402⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et al.. E2E : an optimized IPsec architecture for secure and fast offload. IWSMA '12 : The First International Workshop on Security of Mobile Applications, Aug 2012, Prague, Czech Republic. pp.365-374, ⟨10.1109/ARES.2012.80⟩. ⟨hal-00756529⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Andrei Vlad Sambra, Maryline Laurent. Context-aware decentralized approach for web services. DTSOS '12 : IEEE SERVICES Workshop on Discovery, Testing, and Services-Oriented Software, Jun 2012, Honolulu, Hawaii, United States. pp.73-79, ⟨10.1109/SERVICES.2012.65⟩. ⟨hal-00734243⟩
- AccÚs au texte intégral et bibtex
2011
- ref_biblio
- Kheira Bekara, Maryline Laurent. Privacy policy negotiation at user's side based on P3P tag value classification. EEE 2011 : The International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, Jul 2011, Las Vegas, United States. pp.559 - 564. ⟨hal-01303408⟩
- AccĂšs au bibtex
- ref_biblio
- Kheira Bekara, Maryline Laurent. A semantic information model based on the privacy legislation. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 6, ⟨10.1109/SAR-SSI.2011.5931375⟩. ⟨hal-01304081⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. WCNC 2011 : IEEE Wireless Communications and Networking Conference, Mar 2011, Cancun, Mexico. pp.784 - 789, ⟨10.1109/WCNC.2011.5779232⟩. ⟨hal-01304157⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. An EAP ID-Based authentication method for wireless networks. ISTP '11 : International Workshop on Information Security, Theory and Practice, Dec 2011, Abu Dhabi, United Arab Emirates. pp.232-239. ⟨hal-00802365⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Samia Bouzefrane, Pascal Thoniel, Maryline Laurent, Kheira Bekara. Privacy preservation and low cost authentication in federated identity management systems. E-SMART 2011 : The Future of Digital Security Technologies, Sep 2011, Nice, France. ⟨hal-01303898⟩
- AccĂšs au bibtex
- ref_biblio
- Tony Cheneau, Maryline Laurent. Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 7, ⟨10.1109/SAR-SSI.2011.5931376⟩. ⟨hal-01304077⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent. A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. NSS 2011: 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.249--253, ⟨10.1109/ICNSS.2011.6060009⟩. ⟨hal-00745353⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. Decisive heuristics to differentiate legitimate from phishing sites. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931389⟩. ⟨hal-01304087⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. A dual approach to detect pharming attacks at the client-side. NTMS 2011 : 4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2011.5721063⟩. ⟨hal-01304168⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Sophie Gastellier-Prevost, Maryline Laurent. Defeating pharming attacks at the client-side. NSS 2011 : 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.33 - 40, ⟨10.1109/ICNSS.2011.6059957⟩. ⟨hal-01303641⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Laurent Gomez, Mehdi Khalfaoui, Elie El-Khoury, Cedric Ulmer, Jean-Pierre Deutsch, et al.. RESCUEIT : sĂ©cuRisation dE la ChaĂźne logiStique orientĂ©e serviCe depUis le mondE des objets jusqu'Ă l'univers InformaTique. WISG '11 : Workshop Interdisciplinaire sur la SĂ©curitĂ© Globale, Jan 2011, Troyes, France. ⟨hal-00727624⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Integration of RFID and wireless sensor networks into a supply chain management system. WSNSCM 2011 : 1st International Workshop on Sensor Networks for Supply Chain Management, Aug 2011, Nice/Saint Laurent Du Var, France. pp.393-398. ⟨hal-01303880⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Claire SondĂšs Larafa, Maryline Laurent. Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. ISCC 2011 : 16th IEEE Symposium on Computers and Communications, Jun 2011, Kerkyra, Greece. pp.856 - 863, ⟨10.1109/ISCC.2011.5983949⟩. ⟨hal-01303801⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Palomares, Maryline Laurent. Mechanisms to Ensure Continuity of Service for IPsec/IKEv2 Based Communications. ICSNA-2011: International Conference on Secure Networking and Applications ,24-25 October, Paris, France, Oct 2011, Paris, France. pp.1. ⟨hal-00863428⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Andrei Vlad Sambra, Maryline Laurent. MyProfile - Privacy Aware Decentralized Identity on the Web. 1st International Conference on Secure networking and Applications (ICSNA), Oct 2011, Paris, France. ⟨hal-00745416⟩
- AccĂšs au bibtex
2010
- ref_biblio
- Kheira Bekara, Maryline Laurent. La vie privĂ©e dans les environnements fĂ©dĂ©rĂ©s. Atelier protection de la vie privĂ©e 2010, May 2010, Annecy, France. ⟨hal-01356807⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Kheira Bekara, Maryline Laurent. Enabling user privacy in identity management systems. ICITIS 2010 : IEEE International Conference on Information Theory and Information Security, Dec 2010, PĂ©kin, China. pp.514-520, ⟨10.1109/ICITIS.2010.5689547⟩. ⟨hal-01306871⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Kheira Bekara, Yosra Ben Mustapha, Maryline Laurent. XPACML eXtensible Privacy Access Control Markup Language. 2nd International Conference on Communications and Networking (ComNet 2010), Nov 2010, Tozeur, Tunisia. pp.1-5, ⟨10.1109/COMNET.2010.5699807⟩. ⟨hal-01306061⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. An ID-based authentication scheme for the IEEE 802.11s mesh network. WIMOB 2010 : IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2010, Niagara Falls, Canada. pp.256 - 263, ⟨10.1109/WIMOB.2010.5645055⟩. ⟨hal-01308630⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Tony Cheneau, Maryline Laurent. Ătude des solutions de proxy Neighbor Discovery sĂ©curisĂ©es et proposition basĂ©e sur la Signature Agility. 5Ăšme ConfĂ©rence sur la SĂ©curitĂ© des Architectures RĂ©seaux et SystĂšmes d'Information (SAR-SSI 2010), May 2010, Rocquebrune Cap-Martin, France. pp.1 - 15. ⟨hal-01356372⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Claire SondĂšs Larafa, Maryline Laurent. Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), Jun 2010, PĂ©kin, China. pp.277 - 281, ⟨10.1109/WCINS.2010.5541783⟩. ⟨hal-01356343⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Daniel Migault, CĂ©dric Girard, Maryline Laurent. A performance view on DNSSEC migration. CNSM 2010 : 6th International Conference on Network and Service Management, Oct 2010, Niagara Falls, Canada. pp.469 - 474, ⟨10.1109/CNSM.2010.5691275⟩. ⟨hal-01308335⟩
- AccÚs au texte intégral et bibtex
2009
- ref_biblio
- Tony Cheneau, Aymen Boudguiga, Maryline Laurent. AmĂ©lioration des performances des adresses CGA et du protocole SEND : Ă©tude comparĂ©e de RSA et d'ECC/ECDSA. SAR-SSI 2009 : 4Ăšme ConfĂ©rence sur la sĂ©curitĂ© des architectures rĂ©seaux et des systĂšmes d'information, Jun 2009, Luchon, France. pp.139 - 156. ⟨hal-01360812⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Claire SondĂšs Larafa, Maryline Laurent. Protocols for distributed AAA framework in mobile ad-hoc networks. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009, May 2009, Aachen, Germany. pp.75 - 86. ⟨hal-01316815⟩
- AccĂšs au bibtex
- ref_biblio
- Jean-Philippe Wary, Maryline Laurent. Secure communications between multi-capacity devices with authentication support by network operators. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security, May 2009, Aachen, Germany. pp.25 - 35. ⟨hal-01368472⟩
- AccĂšs au bibtex
2008
- ref_biblio
- Chakib Bekara, Maryline Laurent, Kheira Bekara. Mitigating resource-draining DoS attacks on broadcast source authentication on wireless sensors networks. SecTech 2008 : International Conference on Security Technology, Dec 2008, Hainan Island, China. pp.109 - 116, ⟨10.1109/SecTech.2008.20⟩. ⟨hal-01327163⟩
- AccĂšs au bibtex
- ref_biblio
- Chakib Bekara, Maryline Laurent, Kheira Bekara. H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks. ICCS 2008 : 11th IEEE International Conference on Communication Systems, Nov 2008, Guangzhou, China. pp.1197 - 1203 ⟨10.1109/ICCS.2008.4737372⟩. ⟨hal-01327378⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. Toward a new ad hoc node design for secure service deployment over ad hoc network. MWNS 2008 : Workshop on Mobile and Wireless Networks Security, May 2008, Singapore, Singapore. pp.1 - 11, ⟨10.1142/9789812833266_0001⟩. ⟨hal-01355075⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Alexis Davoux, Jean-Christophe Defline, Ludovic Francesconi, Maryline Laurent, Kheira Bekara, et al.. Federation of circles of trust and secure usage of digital identity. e-2008 : eChallenges , Oct 2008, Stockholm, Sweden. ⟨hal-01333035⟩
- AccĂšs au bibtex
- ref_biblio
- Houssem Jarraya, Maryline Laurent. A secure Peer-to-Peer backup system. NOTERE 2008 : 8Ăšme confĂ©rence internationale sur les nouvelles technologies de la rĂ©partition, Jun 2008, Lyon, France. pp.125 - 134, ⟨10.1145/1416729.1416751⟩. ⟨hal-01379960⟩
- AccĂšs au bibtex
- ref_biblio
- Amir R. Khakpour, Maryline Laurent, Hakima Chaouchi. WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks. ARES 2008 : 3rd International Conference on Availability, Reliability and Security, Mar 2008, Barcelona, Spain. pp.144 - 152, ⟨10.1109/ARES.2008.19⟩. ⟨hal-01355081⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Claire SondĂšs Larafa, Maryline Laurent, Hakima Chaouchi. Light and distributed AAA scheme for mobile ad-hoc networks. SETOP 2008 : 1st Workshop on Security of Autonomous and Spontaneous Networks, Oct 2008, Loctudy, France. pp.93 - 104. ⟨hal-01327396⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Maryline Laurent, Chakib Bekara, Wassim Drira. Light and simple security solution for cold chain supervision. EUNICE 2008 : 14th European Conference on Information and Communications Technologies, Sep 2008, Brest, France. pp.1 - 6. ⟨hal-01327416⟩
- AccĂšs au bibtex
2007
- ref_biblio
- Chakib Bekara, Maryline Laurent. A new protocol for securing wireless sensor networks against nodes replication attacks. 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), Oct 2007, White Plains, Ny, United States. pp.59 - ⟨10.1109/WIMOB.2007.4390853⟩. ⟨hal-01355352⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Chakib Bekara, Maryline Laurent, Kheira Bekara. SAPC : a Secure Aggregation Protocol for Cluster-based wireless sensor networks. MSN 2007 : 3rd International Conference on Mobile Ad-hoc and Sensor Networks, Dec 2007, Beijing, China. pp.784 - 798, ⟨10.1007/978-3-540-77024-4_71⟩. ⟨hal-01328162⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Chakib Bekara, Maryline Laurent. A new resilient key management protocol for wireless sensor networks. WISTP 2007: 1st IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices : Smart Cards, Mobile and Ubiquitous Computing Systems, May 2007, Heraklion, Greece. pp.14 - 26, ⟨10.1007/978-3-540-72354-7_2⟩. ⟨hal-01328143⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Chakib Bekara, Maryline Laurent. Defending against nodes replication attacks on wireless sensor networks. SAR-SSI 2007 : 2nd Conference on Security in Network Architectures and Information Systems, Jun 2007, Annecy, France. pp.31 - 40. ⟨hal-01328148⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Amin Ben Abdallah, Omar Cheikhrouhou, Maryline Laurent, Hakima Chaouchi, Maher Ben Jemaa. Architecture de sĂ©curitĂ© dans un rĂ©seau mesh multi sauts. GRES 2007 : 8Ăšme Colloque Francophone de Gestion de REseaux et de Services "Adaptation dynamique des rĂ©seaux et des services", Nov 2007, Hammamet, Tunisie. ⟨hal-01327900⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Julien Bournelle, Jean-Michel Combes, Maryline Laurent, Claire SondĂšs Larafa. Using PANA for mobile IPv6 bootstrapping. NETWORKING 2007 : 6th international IFIP-TC6 networking conference on ad hoc and sensor networks, wireless networks, next generation Internet, May 2007, Atlanta, United States. pp.345 - 355, ⟨10.1007/978-3-540-72606-7_30⟩. ⟨hal-01328113⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. SAACCESS : secured ad hoc access framework. NTMS 2007 : 1st IFIP International Conference on NewTechnologies, Mobility and Security, May 2007, Paris, France. pp.425 - 436, ⟨10.1007/978-1-4020-6270-4_35⟩. ⟨hal-01328014⟩
- AccÚs au texte intégral et bibtex
2006
- ref_biblio
- Julien Bournelle, Guillaume Valadon, David Binet, Saber Zrelli, Maryline Laurent-Maknavicius, et al.. AAA considerations within several NEMO deployment scenarios. WONEMO 2006, Jan 2006, Sendai, Japan. ⟨hal-01351674⟩
- AccĂšs au bibtex
- ref_biblio
- Omar Cheikhrouhou, Maher Ben Jemaa, Maryline Laurent. Nouvelle mĂ©thode d'authentification EAP-EHash. CFIP 2006/ Colloque Francophone sur l'IngĂ©nierie des Protocoles, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur, Tunisie. 12 p. ⟨inria-00111911⟩
- AccÚs au texte intégral et bibtex
2001
- ref_biblio
- Ahmed Bouabdallah, Maryline Laurent. Formal validation of an ATM security context negociation protocol. Proceedings of the International symposium on software and systems (I3S), Feb 2001, Constantine, Algeria. pp.25 - 33. ⟨hal-02341318⟩
- AccĂšs au bibtex
2000
- ref_biblio
- Olivier Paul, Maryline Laurent, Sylvain Gombault. A full bandwidth ATM firewall. ESORICS'2000 : 6th european symposium on research in computer security, Toulouse, octobre, Oct 2000, Toulouse, France. pp.206 - 221. ⟨hal-02142128⟩
- AccĂšs au bibtex
1999
- ref_biblio
- Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, et al.. Secure communications in ATM networks. ACSAC'99, proceedings of the 15th annual computer security applications conference, Dec 1999, Phoenix, United States. pp.84 - 93, ⟨10.1109/CSAC.1999.816016⟩. ⟨hal-02341313⟩
- AccĂšs au bibtex
- ref_biblio
- Olivier Paul, Maryline Laurent, Sylvain Gombault. An asynchronous distributed access control architecture for IP over ATM networks. ACSAC 1999 : 15th Annual Computer Security Applications Conference, Dec 1999, Phoenix, United States. ⟨10.1109/CSAC.1999.816015⟩. ⟨hal-01840923⟩
- AccĂšs au bibtex
Chapitre d'ouvrage
2022
- ref_biblio
- Josep Domingo-Ferrer, Maryline Laurent. Foreword, privacy in statistical databases 2022. Foreword, Privacy in Statistical Databases 2022, 13463, Springer International Publishing, 2022, Lecture Notes in Computer Science, 978-3-031-13945-1. ⟨10.1007/978-3-031-13945-1⟩. ⟨hal-04176139⟩
- AccĂšs au bibtex
2021
- ref_biblio
- Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas MatuleviÄius, Marinella Petrocchi, et al.. Privacy-by-design in intelligent infrastructures. Deep diving into data protection: 1979-2019: celebrating 40 years of research on privacy data protection at the CRIDS, 170 (51), Collection du CRIDS, pp.309-343, 2021, 9782807926493. ⟨hal-04331489⟩
- AccĂšs au bibtex
2018
- ref_biblio
- Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signes de confiance : lâimpact des labels sur la gestion des donnĂ©es personnelles. Signes de confiance : lâimpact des labels sur la gestion des donnĂ©es personnelles, Institut Mines-TĂ©lĂ©com, pp.199 - 202, 2018, 978-2-9557308-4-3. ⟨hal-02336275⟩
- AccĂšs au bibtex
- ref_biblio
- Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signs of trust : the impact of seals on personal data management. Signs of trust : the impact of seals on personal data management, 2, Institut Mines-TĂ©lĂ©com, pp.199 - 203, 2018, Chair Values and Policies of Personal Information, 978-2-9557308-5-0. ⟨hal-02336269⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Armen Khatchatourov. La confiance en informatique par la gestion du risque. Signes de confiance : lâimpact des labels sur la gestion des donnĂ©es personnelles, Institut Mines-TĂ©lĂ©com, pp.47 - 62, 2018, 978-2-9557308-4-3. ⟨hal-01773953⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent. La blockchain est-elle une technologie de confiance. Claire Levallois-Barth. Signes de confiance : lâimpact des labels sur la gestion des donnĂ©es personnelles, Institut Mines-TĂ©lĂ©com, pp.179 - 198, 2018, 978-2-9557308-4-3. ⟨hal-01778949⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Maryline Laurent. Is blockchain a trustworthy technology?. Claire Levallois-Barth. Signs of trust â The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-TĂ©lĂ©com, pp.180-197, 2018, 978-2-9557308-6-7. ⟨hal-02516126⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Maryline Laurent, Armen Khatchatourov. Building trust through risk management in computer science. Claire Levallois-Barth. Signs of trust â The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-TĂ©lĂ©com, pp.48-59, 2018, 978-2-9557308-6-7. ⟨hal-02516151⟩
- AccÚs au texte intégral et bibtex
2015
- ref_biblio
- Maryline Laurent, Claire Levallois-Barth. Gestion de la vie privĂ©e et protection des donnĂ©es Ă caractĂšre personnel. La gestion des identitĂ©s numĂ©riques, ISTE Edition, pp.179 - 236, 2015, SystĂšmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. ⟨hal-01263062⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Julie DenouĂ«l, Claire Levallois-Barth, Patrick Waelbroeck. Digital identity. Digital identity management, ISTE Press; Elsevier, pp.1 - 45, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50001-8⟩. ⟨hal-01272021⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Julie DenouĂ«l, Claire Levallois-Barth, Patrick Waelbroeck. Les identitĂ©s numĂ©riques. La gestion des identitĂ©s numĂ©riques, ISTE Edition, pp.19 - 90, 2015, SystĂšmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. ⟨hal-01263060⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Claire Levallois-Barth. Privacy management and protection of personal data. Digital identity management, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50004-3⟩. ⟨hal-01272029⟩
- AccĂšs au bibtex
2014
- ref_biblio
- Aymen Boudguiga, Maryline Laurent, Mohamed Hamdi. Fundamentals of identity-based cryptography. Practical cryptography : algorithms and implementations using C++, CRC Press, pp.225 - 250, 2014, 978-1-4822-2889-2. ⟨10.1201/b17707-13⟩. ⟨hal-01255480⟩
- AccĂšs au bibtex
- ref_biblio
- Aymen Boudguiga, Maryline Laurent. Authentication in wireless mesh networks. Security for multihop wireless networks , CRC Press, pp.419 - 446, 2014, 978-1-466-57803-6. ⟨10.1201/b16754-20⟩. ⟨hal-01260916⟩
- AccĂšs au bibtex
- ref_biblio
- Emmanuel Herbert, Daniel Migault, StĂ©phane SĂ©nĂ©cal, Stanislas Francfort, Maryline Laurent. Analyzing Internet DNS(SEC) traffic with R for resolving platform optimization. Data Mining Applications with R, Elsevier; Academic Press, pp.435 - 456, 2014, 978-0-12-411511-8. ⟨10.1016/B978-0-12-411511-8.00016-5⟩. ⟨hal-01263426⟩
- AccĂšs au bibtex
2010
- ref_biblio
- Houssem Jarraya, Maryline Laurent. SĂ©curitĂ© des rĂ©seaux P2P. Evolution des technologies pair-Ă -pair : optimisation, sĂ©curitĂ© et application, HermĂšs science; Lavoisier, pp.135 - 154, 2010, IC2 : TraitĂ© rĂ©seaux et tĂ©lĂ©coms, 978-2-7462-2579-4. ⟨hal-01355245⟩
- AccĂšs au bibtex
2009
- ref_biblio
- Chakib Bekara, Maryline Laurent. Key management in wireless sensor networks. Wireless and mobile network security, ISTE / Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch16⟩. ⟨hal-00472923⟩
- AccĂšs au bibtex
- ref_biblio
- Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Security of IP-based mobile networks. Wireless and Mobile Network Security , ISTE/Wiley, pp.437 - 474, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch12⟩. ⟨hal-00472937⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Hakima Chaouchi, Olivier Paul. Fundamental security mechanisms. Wireless and mobile network security , ISTE/Wiley, pp.73 - 130, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch3⟩. ⟨hal-00472941⟩
- AccĂšs au bibtex
- ref_biblio
- JosĂ©-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Wireless sensor network security. Wireless and mobile networks security, ISTE/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch15⟩. ⟨hal-01359532⟩
- AccĂšs au bibtex
2007
- ref_biblio
- Chakib Bekara, Maryline Laurent. Gestion de clĂ©s dans les rĂ©seaux de capteurs. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 3, Technologies Ă©mergentes, Hermes Science; Lavoisier, pp.233 - 269, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1699-0. ⟨hal-01328150⟩
- AccĂšs au bibtex
- ref_biblio
- Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. SĂ©curitĂ© des rĂ©seaux mobiles IP. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 3, Technologies Ă©mergentes, Hermes Science; Lavoisier, pp.47 - 81, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1699-0. ⟨hal-01328154⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Hakima Chaouchi, Olivier Paul. MĂ©canismes de sĂ©curitĂ© fondamentaux. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 1, Concepts fondamentaux, Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1697-6. ⟨hal-01328102⟩
- AccĂšs au bibtex
- ref_biblio
- JosĂ©-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. SĂ©curitĂ© dans les rĂ©seaux de capteurs sans fil. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 3, Technologies Ă©mergentes, Hermes Science; Lavoisier, pp.183 - 231, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1699-0. ⟨hal-01328149⟩
- AccĂšs au bibtex
2000
- ref_biblio
- Olivier Paul, Maryline Laurent. Improving Packet Filters Management through Automatic and Dynamic Schemes. Information Security for Global Information Infrastructures, 47, Springer US, pp.331-340, 2000, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-0-387-35515-3_34⟩. ⟨hal-03643182⟩
- AccĂšs au bibtex
- ref_biblio
- Olivier Paul, Maryline Laurent, Sylvain Gombault. A Full Bandwidth ATM Firewall. Computer Security - ESORICS 2000, 1895, Springer Berlin Heidelberg, pp.206-221, 2000, Lecture Notes in Computer Science, ⟨10.1007/10722599_13⟩. ⟨hal-03643184⟩
- AccĂšs au bibtex
1999
- ref_biblio
- Olivier Paul, Maryline Laurent. An Alternative Access Control Architecture for IP Over ATM Networks. Secure Information Networks, Springer US, pp.36-50, 1999, ⟨10.1007/978-0-387-35568-9_3⟩. ⟨hal-03643187⟩
- AccĂšs au bibtex
Ouvrages
2022
- ref_biblio
- Esma AĂŻmeur, Maryline Laurent, Reda Yaich, BenoĂźt Dupont, Joaquin Garciaâalfaro (Dir.). Foundations and practice of security. Springer International Publishing, 13291, 2022, Lecture Notes in Computer Science, 978-3-031-08146-0. ⟨10.1007/978-3-031-08147-7⟩. ⟨hal-03843022⟩
- AccĂšs au bibtex
2020
- ref_biblio
- Maryline Laurent, Thanassis Giannetsos. Information Security Theory and Practice. Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩. ⟨hal-03173895⟩
- AccÚs au texte intégral et bibtex
2017
- ref_biblio
- Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent (Dir.). Security, and privacy in emerging wireless networks : security and communication networks journal. Wiley; Hindawi Limited, 2017, Security and Communication Networks Journal, Security and Communication Networks Journal. ⟨hal-01682207⟩
- AccĂšs au bibtex
2015
- ref_biblio
- Maryline Laurent, Samia Bouzefrane (Dir.). Digital Identity Management. Iste, 2015. ⟨hal-01126495⟩
- AccĂšs au bibtex
2014
- ref_biblio
- Maryline Laurent, Samia Bouzefrane. La gestion des identitĂ©s numĂ©riques. ISTE. pp.340, 2014, Ă paraĂźtre. ⟨hal-01126448⟩
- AccĂšs au bibtex
- ref_biblio
- Maryline Laurent, Sara Foresti, Heng Xu (Dir.). Privacy-aware electronic society. Springer, 2014, Annals of Telecommunication, Volume 69, Issue 1-2, Annals of Telecommunication, Volume 69, Issue 1-2, 0003-4347. ⟨hal-01261315⟩
- AccĂšs au bibtex
2009
- ref_biblio
- Hakima Chaouchi, Georg Carle, Maryline Laurent (Dir.). Mobile and wireless network security : proceedings of the 2nd International Workshop, MWNS 2009, Aachen, Germany, 15 may 2009. Shaker Verlag, pp.86, 2009, 978-3-8322-8177-9. ⟨hal-01370512⟩
- AccĂšs au bibtex
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies. ISTE/John Wiley & Sons, pp.667, 2009, ISTE, ISTE, 978-1-84821-117-9. ⟨hal-01370514⟩
- AccĂšs au bibtex
2008
- ref_biblio
- Maryline Laurent, Hakima Chaouchi (Dir.). Mobile and wireless networks security : proceedings of the MWNS 2008 workshop, Singapore, 9 april 2008. World Scientific, 2008, 978-981-283-325-9. ⟨hal-01355042⟩
- AccĂšs au bibtex
2007
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 3, Technologies Ă©mergentes. Hermes Science; Lavoisier, pp.291, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1699-0. ⟨hal-01329422⟩
- AccĂšs au bibtex
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 2, Technologies du marchĂ©. Hermes Science; Lavoisier, pp.249, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1698-3. ⟨hal-01328157⟩
- AccĂšs au bibtex
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 1, Concepts fondamentaux. Hermes Science; Lavoisier, pp.239, 2007, IC2, SĂ©rie RĂ©seaux et TĂ©lĂ©coms IC2, SĂ©rie RĂ©seaux et TĂ©lĂ©coms 978-2-7462-1697-6. ⟨hal-01328159⟩
- AccĂšs au bibtex
Brevet
2013
- ref_biblio
- Ethmane El Moustaine, Maryline Laurent. ProcĂ©dĂ© pour crypter des donnĂ©es dans un cryptosystĂšme NTRU (N,p,q). France, N° de brevet: FR2992510. 12959. 2013, pp.27. ⟨hal-01275262⟩
- AccĂšs au bibtex
2012
- ref_biblio
- Ethmane El Moustaine, Maryline Laurent. ProcĂ©dĂ© d'authentification d'un tag. France, N° de brevet: FR2971905. 12982. 2012, pp.24. ⟨hal-01343576⟩
- AccĂšs au bibtex
2009
- ref_biblio
- Hakima Chaouchi, Maryline Laurent. ProcĂ©dĂ© d'Ă©change de donnĂ©es dans un rĂ©seau ad hoc. France, N° de brevet: FR2919137. 7091. 2009, pp.50. ⟨hal-01354850⟩
- AccĂšs au bibtex
- ref_biblio
- Houssem Jarraya, Maryline Laurent. ProcĂ©dĂ© de sauvegarde/restauration de fichiers dans un rĂ©seau pair Ă pair. France, N° de brevet: FR2929792. 5331. 2009, pp.36. ⟨hal-01343149⟩
- AccĂšs au bibtex
2006
- ref_biblio
- Olivier Paul, Sylvain Gombault, Maryline Laurent-Maknavicius, JoĂ«l Lattmann, Christian Duret, et al.. Method and device for the processing of data packets. France, Patent n° : EP1335565. 9870. 2006. ⟨hal-01868019⟩
- AccĂšs au bibtex
Proceedings/Recueil des communications
2021
- ref_biblio
- Samia Bouzefrane, Maryline Laurent, Selma Boumerdassi, Eric Renault. Mobile, Secure, and Programmable Networking: 6th international conference, MSPN 2020: Paris, France, October 28â29, 2020, revised selected papers. MSPN 2020: International Conference on Mobile, Secure, and Programmable Networking, Oct 2021, Paris, France. 12605, Springer, pp.X, 251, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-67549-3. ⟨10.1007/978-3-030-67550-9⟩. ⟨hal-03494288⟩
- AccĂšs au bibtex
Rapport
2010
- ref_biblio
- Chakib Bekara, Maryline Laurent, Wassim Drira, Rahim Kacimi, AndrĂ©-Luc Beylot, et al.. Tests, Mesures et Validation. [Contrat] Institut National Polytechnique de Toulouse. 2010. ⟨hal-03970390⟩
- AccĂšs au bibtex
2009
- ref_biblio
- Nahla Abid, Maryline Laurent. A new authentication method based on cryptographic identifiers CGAs. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2009, pp.29. ⟨hal-01360031⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Monique Becker, Chakib Bekara, AndrĂ©-Luc Beylot, Alexandre Delye, Riadh Dhaou, et al.. Cold chain monitoring using wireless sensor networks : design & experimental feedback. [Research Report] RR-09007âRST, TĂ©lĂ©com Sud Paris. 2009. ⟨hal-03975329⟩
- AccĂšs au bibtex
- ref_biblio
- Wassim Drira, Chakib Bekara, Maryline Laurent. Secure aggregation in wireless sensor networks. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2009, pp.58. ⟨hal-01360043⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Claire SondĂšs Larafa, Maryline Laurent. Distributed AAA framework for MANET: performance analysis. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2009, pp.34. ⟨hal-01360029⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Amina Mekki Mokhtar, Kheira Bekara, Maryline Laurent. Un protocole pour la nĂ©gociation des politiques de privacy. [Rapport de recherche] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2009, pp.55. ⟨hal-01369889⟩
- AccÚs au texte intégral et bibtex
2008
- ref_biblio
- Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental experience with Host Identity Protocol (HIP). [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.58. ⟨hal-01373423⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Aymen Boudguiga, Tony Cheneau, Maryline Laurent. Usage and performance of cryptographically generated addresses. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.94. ⟨hal-01373433⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Wassim Drira, Chakib Bekara, Maryline Laurent. SĂ©curitĂ© dans les rĂ©seaux de capteurs sans fil : conception et implĂ©mentation. [Rapport de recherche] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.55. ⟨hal-01373430⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Houssem Jarraya, Maryline Laurent. Un systĂšme de sauvegarde P2P sĂ©curisĂ© s'appuyant sur une architecture AAA. [Rapport de recherche] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.55. ⟨hal-01373441⟩
- AccÚs au texte intégral et bibtex
- ref_biblio
- Willy Ronald Jimenez Freitez, Hakima Chaouchi, Maryline Laurent. Authentication services in mobile ad hoc networks. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.41. ⟨hal-01373823⟩
- AccÚs au texte intégral et bibtex
Pré-publication, Document de travail
2024
- ref_biblio
- Claire Levallois-Barth, Maryline Laurent. Les acteurs de l'Ă©cosystĂšme technique relatifs aux identitĂ©s numĂ©riques - ĂcosystĂšme Ă©largi Ă la fourniture d'attributs, de justificatifs, de signatures Ă©lectroniques et de portefeuilles d'identitĂ© numĂ©rique, working paper. 2024. ⟨halshs-04430701⟩
- AccÚs au texte intégral et bibtex