SAMOVAR - SAMOVAR
Telecom SudParis
9 rue Charles Fourier
91011 EVRY CEDEX

Fax : +33 (0) 1 60 76 20 80

Pr. Maryline Laurent

Professeur
SCN

Maryline.laurent[@-Code to remove to avoid SPAM-]telecom-sudparis.eu

Article dans une revue

2024

ref_biblio
NathanaĂ«l Denis, Sophie Chabridon, Maryline Laurent. Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. Annals of Telecommunications - annales des tĂ©lĂ©communications, 2024, ⟨10.1007/s12243-023-01005-1⟩. ⟨hal-04383612⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-04383612/file/article.pdf BibTex
ref_biblio
Nathanael Denis, Maryline Laurent, Sophie Chabridon. A decentralized model for usage and information flow control in distributed systems. Computers & Security, 2024, 144, pp.103975. ⟨10.1016/j.cose.2024.103975⟩. ⟨hal-04644186⟩
AccĂšs au bibtex
BibTex

2023

ref_biblio
NathanaĂ«l Denis, Maryline Laurent, Sophie Chabridon. Integrating usage control into distributed ledger technology for internet of things privacy. IEEE Internet of Things Journal, 2023, pp.1-1. ⟨10.1109/JIOT.2023.3283300⟩. ⟨hal-04121481⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-04121481/file/articleIEEE_hal.pdf BibTex
ref_biblio
Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan. Securing organization’s data: A role-based authorized keyword search scheme with efficient decryption. IEEE Transactions on Cloud Computing, 2023, 11 (1), pp.25-43. ⟨10.1109/TCC.2021.3071304⟩. ⟨hal-04331375⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-04331375/file/TCC-2004.10952.pdf BibTex
ref_biblio
Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi. Self-Sovereign identity for consented and content-Based access to medical records using Blockchain. Security and communication networks, 2023, 2023, pp.1-11. ⟨10.1155/2023/6025789⟩. ⟨hal-04100562⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-04100562/file/SSI-Hindawi-SCN-Auteur2023.pdf BibTex

2022

ref_biblio
Sophie DramĂ©-MaignĂ©, HervĂ© Ganem, Maryline Laurent, Laurent Castillo. Centralized, Distributed, and Everything in between. ACM Computing Surveys, 2022, 54 (7), pp.1-34. ⟨10.1145/3465170⟩. ⟨hal-03754002⟩
AccĂšs au bibtex
BibTex
ref_biblio
Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-03997331⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03997331/file/2022-12-Peer_Journal_Sparta-PP-parkingService.pdf BibTex
ref_biblio
Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Computer Science, 2022, 8, pp.e1165. ⟨10.7717/peerj-cs.1165⟩. ⟨hal-04331322⟩
AccĂšs au bibtex
BibTex
ref_biblio
Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent. SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access, 2022, 10, pp.106400-106414. ⟨10.1109/ACCESS.2022.3208697⟩. ⟨hal-04227764⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-04227764/file/SPOT_IEEEAccess.pdf BibTex
ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. PIMA: a privacy-preserving identity management system based on an unlinkable MAlleable signature. Journal of Network and Computer Applications (JNCA), 2022, 208 (103517), pp.1-35. ⟨10.1016/j.jnca.2022.103517⟩. ⟨hal-03793163⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03793163/file/JNCA2022_PIMA.pdf BibTex
ref_biblio
Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/tcc.2019.2931896⟩. ⟨hal-03991044⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03991044/file/Final_version.pdf BibTex

2021

ref_biblio
MikaĂ«l Ates, Maryline Laurent, Paul Marillonnet, Nesrine Kaaniche. An efficient user-centric consent management design for multiservices platforms. Security and communication networks, 2021, 2021, pp.1 - 19. ⟨10.1155/2021/5512075⟩. ⟨hal-03991134⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03991134/file/5512075.pdf BibTex
ref_biblio
Arie Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang. Practical cross-layer radio frequency-based authentication scheme for internet of things. Sensors, 2021, 21 (12), pp.1-19. ⟨10.3390/s21124034⟩. ⟨hal-03753291⟩
AccĂšs au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Sebastien Canard. Cooperative set homomorphic proofs for data possession checking in clouds. IEEE Transactions on Cloud Computing, 2021, 9 (1), pp.102-117. ⟨10.1109/TCC.2018.2865343⟩. ⟨hal-01991145⟩
AccĂšs au bibtex
BibTex
ref_biblio
Paul Lajoie-Mazenc, Maryline Laurent, Franklin Leukam Lako. Privacy-preserving publication of time-series data in smart grid. Security and communication networks, 2021, 2021, pp.1-21. ⟨10.1155/2021/6643566⟩. ⟨hal-03754005⟩
AccĂšs au bibtex
BibTex
ref_biblio
Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, et al.. Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 2021, 9, pp.36038 - 36077. ⟨10.1109/ACCESS.2021.3062201⟩. ⟨hal-03153890⟩
AccĂšs au bibtex
BibTex
ref_biblio
Paul Marillonnet, Maryline Laurent, MikaĂ«l Ates. Personal information self-management: A survey of technologies supporting administrative services. Journal of Computer Science and Technology, 2021, 36 (3), pp.664-692. ⟨10.1007/s11390-021-9673-z⟩. ⟨hal-03753295⟩
AccĂšs au bibtex
https://arxiv.org/pdf/2109.12968 BibTex

2020

ref_biblio
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing, 2020, 135, pp.1-20. ⟨10.1016/j.jpdc.2019.08.014⟩. ⟨hal-03990990⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03990990/file/InsPABAC%2520%25288%2529.pdf BibTex
ref_biblio
Safia Bourahla, Maryline Laurent, Yacine Challal. Privacy preservation for social networks sequential publishing. Computer Networks, 2020, 170, pp.107106-1:107106-25. ⟨10.1016/j.comnet.2020.107106⟩. ⟨hal-02921464⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-02921464/file/SNPP%20R1%20Final.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. Frontiers in Blockchain, 2020, 3 (17), pp.1-12. ⟨10.3389/fbloc.2020.00017⟩. ⟨hal-03991089⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03991089/file/fbloc-03-00017.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. Journal of Network and Computer Applications (JNCA), 2020, 171, pp.102807. ⟨10.1016/j.jnca.2020.102807⟩. ⟨hal-03990971⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03990971/file/_JNCA____Survey_PETS.pdf BibTex

2019

ref_biblio
Nesrine Kaaniche, Chistophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro. Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing, 2019, 14, pp.14979-14993. ⟨10.1007/s12652-019-01545-2⟩. ⟨hal-03991234⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03991234/file/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf BibTex
ref_biblio
Qing Yang, Rongxing Lu, Chunming Rong, Yacine Challal, Maryline Laurent, et al.. Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet of Things Journal, 2019, 6 (3), pp.4556-4560. ⟨10.1109/JIOT.2019.2921235⟩. ⟨hal-02315884⟩
AccĂšs au bibtex
BibTex

2018

ref_biblio
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IOT. Computer Networks, 2018, 133, pp.141 - 156. ⟨10.1016/j.comnet.2018.01.036⟩. ⟨hal-01773931⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01773931/file/2018-JCN-PHOABE-Sana-Nesrine.pdf BibTex
ref_biblio
Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web, 2018, 21 (1), pp.169 - 183. ⟨10.1007/s11280-017-0473-x⟩. ⟨hal-01682222⟩
AccĂšs au bibtex
BibTex
ref_biblio
Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Maryline Laurent. ICAuth: a secure and scalable owner delegated inter-cloud authorization. Future Generation Computer Systems, 2018, 88, pp.319 - 332. ⟨10.1016/j.future.2018.05.066⟩. ⟨hal-01991132⟩
AccĂšs au bibtex
BibTex

2017

ref_biblio
Nesrine Kaaniche, Maryline Laurent. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 2017, 111, pp.120 - 141. ⟨10.1016/j.comcom.2017.07.006⟩. ⟨hal-01576979⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent. Pare-feu: le couteau suisse de la sĂ©curitĂ© informatique. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2017, TE7550v2. ⟨hal-01681679⟩
AccĂšs au bibtex
BibTex
ref_biblio
Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, et al.. Diet-ESP: IP layer security for IoT. Journal of Computer Security, 2017, 25 (2), pp.173 - 203. ⟨10.3233/JCS-16857⟩. ⟨hal-01518274⟩
AccĂšs au bibtex
BibTex
ref_biblio
Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. Discrimination rate: an attribute-centric metric to measure privacy. Annals of Telecommunications - annales des tĂ©lĂ©communications, 2017, 72 (11-12), pp.755 - 766. ⟨10.1007/s12243-017-0581-8⟩. ⟨hal-01653440⟩
AccĂšs au bibtex
BibTex

2015

ref_biblio
Kim Thuat Nguyen, Maryline Laurent, Nouha Ouahla. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 2015, 32, pp.17 - 31. ⟨10.1016/j.adhoc.2015.01.006⟩. ⟨hal-01272046⟩
AccĂšs au bibtex
BibTex

2014

ref_biblio
Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. Journal of Network and Computer Applications (JNCA), 2014, 45, pp.215 - 227. ⟨10.1016/j.jnca.2014.07.036⟩. ⟨hal-01281944⟩
AccĂšs au bibtex
BibTex
ref_biblio
Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Lightweight collaborative key establishment scheme for the Internet of Things. Computer Networks, 2014, 64, pp.273 - 295. ⟨10.1016/j.comnet.2014.02.001⟩. ⟨hal-01263479⟩
AccĂšs au bibtex
BibTex

2013

ref_biblio
Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Trust management system design for the Internet of Things: a context-aware and multi- service approach. Computers & Security, 2013, 39 (Part B), pp.351 - 365. ⟨10.1016/j.cose.2013.09.001⟩. ⟨hal-01281972⟩
AccĂšs au bibtex
BibTex

2012

ref_biblio
Aymen Boudguiga, Maryline Laurent. On the use of ID-based cryptography for the definition of new EAP authentication methods. International journal for information security research (IJISR), 2012, 2 (1 & 2), pp.246-255. ⟨hal-00724636⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00724636/file/2012-Journal-IJISR-Boudguiga.pdf BibTex
ref_biblio
Ethmane El Moustaine, Maryline Laurent. SystĂšmes et techniques RFID : risques et solutions de sĂ©curitĂ©. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2012, H5325. ⟨hal-00770788⟩
AccĂšs au bibtex
BibTex
ref_biblio
Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Risk assessment along supply chain : a RFID and wireless sensor network integration approach. Sensors & Transducers., 2012, 14 (2), pp.269-282. ⟨hal-00712579⟩
AccĂšs au bibtex
BibTex

2011

ref_biblio
Andrei Vlad Sambra, Maryline Laurent. MyProfile - Decentralized User Profile and Identity on the Web. W3C's Federated Social Web (FSW2011), 2011. ⟨hal-00745348⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00745348/file/fsw2011_MyProfile.pdf BibTex

2010

ref_biblio
Aymen Boudguiga, Maryline Laurent. SĂ©curitĂ© dans les rĂ©seaux 802.11. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2010, TE7377. ⟨hal-01355251⟩
AccĂšs au bibtex
BibTex
ref_biblio
Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Computers & Security, 2010, 29 (4), pp.419 - 431. ⟨10.1016/j.cose.2009.12.008⟩. ⟨hal-00496002⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00496002/file/article.pdf BibTex
ref_biblio
Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. Computers & Security, 2010, 29 (2), pp.180 - 195. ⟨10.1016/j.cose.2009.10.003⟩. ⟨hal-00472901⟩
AccĂšs au bibtex
BibTex

2009

ref_biblio
Maher Ben Jemaa, Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental measurements of host identity protocol for mobile nodes' networks. Journal of computer systems, networks, and communications, 2009, 2009 (Article ID 383517), pp.1 - 6. ⟨10.1155/2009/383517⟩. ⟨hal-00472911⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00472911/file/383517.pdf BibTex
ref_biblio
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An EAP-EHash authentication method adapted to resource constrained terminals. Annals of Telecommunications - annales des tĂ©lĂ©communications, 2009, 65 (5), pp.271 - 284. ⟨10.1007/s12243-009-0135-9⟩. ⟨hal-00506549⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00506549/file/Annales-EAP-EHASH-oct2009.pdf BibTex

2008

ref_biblio
Hakima Chaouchi, Maryline Laurent. SĂ©curitĂ© des rĂ©seaux sans fil et mobiles : problĂ©matiques et enjeux technologiques. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2008, 14. ⟨hal-01355033⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent. SĂ©curitĂ© des systĂšmes P2P de sauvegarde distribuĂ©e. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2008, 16. ⟨hal-01355031⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent. Projet DisPairSe : systĂšme P2P de sauvegarde distribuĂ©e sĂ©curisĂ©. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2008, 17, pp.2 - 3. ⟨hal-01354702⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Hakima Chaouchi. Des rĂ©seaux ad hoc Ă©conomiquement viables. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2008, 11. ⟨hal-01355035⟩
AccĂšs au bibtex
BibTex

2007

ref_biblio
Maryline Laurent. Les architectures de fĂ©dĂ©ration d'identitĂ© et la garantie de notre vie privĂ©e. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2007, 9. ⟨hal-01355037⟩
AccĂšs au bibtex
BibTex

2003

ref_biblio
Maryline Laurent. Protocole IPsec. Techniques de l'IngĂ©nieur. SĂ©curitĂ© des systĂšmes d'information, 2003, TE7545. ⟨hal-01331303⟩
AccĂšs au bibtex
BibTex

2001

ref_biblio
Olivier Paul, Maryline Laurent. Improving packet filters management through automatic and dynamic schemes. Annals of Telecommunications - annales des tĂ©lĂ©communications, 2001, 56 (9-10), pp.595-608. ⟨10.1007/BF03008836⟩. ⟨hal-03643165⟩
AccĂšs au bibtex
BibTex

1999

ref_biblio
Herbert Leitold, Reinhard Posch, Enrique Areizaga, Ahmed Bouabdallah, Maryline Laurent, et al.. Security services in ATM networks. Interoperable communication networks journal, 1999, 2 (1), pp.107 - 119. ⟨hal-02341316⟩
AccĂšs au bibtex
BibTex

Communication dans un congrĂšs

2024

ref_biblio
Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. Differentially-private data aggregation over encrypted location data for range counting query. 2024 International Conference on Information Networking (ICOIN), Jan 2024, Ho Chi Minh City, Vietnam. pp.409-414, ⟨10.1109/ICOIN59985.2024.10572074⟩. ⟨hal-04645794⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-04645794/file/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf BibTex

2022

ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SEVIL: secure and efficient verifIcation over massive proofs of knowLedge. 19th International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbon, Portugal. pp.13-24, ⟨10.5220/0011125800003283⟩. ⟨hal-03997364⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03997364/file/2022-SECRYPT_SEVIL-Masmoudi.pdf BibTex
ref_biblio
Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information. 19th International Conference E-Business and Telecommunications (ICSBT), Jul 2022, Lisbon (Portugal), Portugal. pp.1-19, ⟨10.1007/978-3-031-45137-9_1⟩. ⟨hal-04227767⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-04227767/file/Springer_SPOT_.pdf BibTex

2021

ref_biblio
NathanaĂ«l Denis, Maryline Laurent, Sophie Chabridon. Bringing privacy, security and performance to the internet of things through usage control and blockchains. 16th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2021, Virtual, Luxembourg. pp.57-72, ⟨10.1007/978-3-030-99100-5_6⟩. ⟨hal-03754051⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03754051/file/article.pdf BibTex
ref_biblio
Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent. An automatized identity and access management system for IoT combining self-sovereign identity and smart contracts. The 14th International Symposium on Foundations and Practice of Security ( FPS), Dec 2021, Paris, France. pp.208-217, ⟨10.1007/978-3-031-08147-7_14⟩. ⟨hal-03997389⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03997389/file/2022-FPS-IAM-SSI-Nghmouchi.pdf BibTex
ref_biblio
Seryne Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A validated privacy-utility preserving recommendation system with local differential privacy. 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩. ⟨hal-03754064⟩
AccĂšs au bibtex
https://arxiv.org/pdf/2109.11340 BibTex

2020

ref_biblio
NathanaĂ«l Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, et al.. Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting. SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩. ⟨hal-02910407⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-02910407/file/paper.pdf BibTex
ref_biblio
Aida Diop, Maryline Laurent, Jean Leneutre, Jacques TraorĂ©. CoRA: a scalable Collective Remote Attestation protocol for sensor networks. ICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩. ⟨hal-03024074⟩
AccĂšs au bibtex
BibTex
ref_biblio
Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. the 35th Annual ACM Symposium on Applied Computing(ACM), Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, ⟨10.1145/3341105.3373947⟩. ⟨hal-03991100⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03991100/file/_SAC2020_DADS_Priv_Preserv_Search.pdf BibTex
ref_biblio
Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩. ⟨hal-03991163⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03991163/file/SECRYPT2020_ProvSGX.pdf BibTex
ref_biblio
Franklin Leukam Lako, Paul Lajoie Mazenc, Maryline Laurent. Reconciling privacy and utility for energy services. EuroS&PW 2020: 5th IEEE European Symposium on Security and Privacy Workshops, Sep 2020, Genova (online), Italy. pp.348-355, ⟨10.1109/EuroSPW51379.2020.00054⟩. ⟨hal-03116988⟩
AccĂšs au bibtex
BibTex
ref_biblio
Paul Marillonnet, MikaĂ«l Ates, Maryline Laurent, Nesrine Kaaniche. An identity-matching process to strengthen trust in federated-identity architectures. 17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.142-154, ⟨10.5220/0009828401420154⟩. ⟨hal-03991153⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03991153/file/id_matching.pdf BibTex

2019

ref_biblio
Sophie DramĂ©-MaignĂ©, Maryline Laurent, Laurent Castillo. Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Jun 2019, Tangier, Morocco. pp.1582-1587, ⟨10.1109/IWCMC.2019.8766478⟩. ⟨hal-04331571⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things. ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩. ⟨hal-02147191⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-02147191/file/1-s2.0-S1877050919304995-main.pdf BibTex
ref_biblio
Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC sĂ©curitĂ© des rĂ©seaux : un apprentissage massif de la sĂ©curitĂ© par la thĂ©orie et la pratique. RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la SĂ©curitĂ© des SystĂšmes d'Information, INRIA, May 2019, Erquy, France. pp.1-4. ⟨hal-03754082⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03754082/file/RESSI-final.pdf BibTex

2018

ref_biblio
Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre. Towards end-to-end privacy for publish/subscribe architectures in the Internet of Things. M4IoT 2018: 5th Workshop on Middleware and Applications for the Internet of Things at the 2018 ACM/IFIP International Middleware Conference, Dec 2018, Rennes, France. pp.35 - 40, ⟨10.1145/3286719.3286727⟩. ⟨hal-01940866⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01940866/file/article_fonts_included.pdf BibTex
ref_biblio
Aida Diop, Said Gharout, Maryline Laurent, Jean Leneutre, Jacques TraorĂ©. Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩. ⟨hal-01850383⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01850383/file/2018-wisecAida-QuestioningEsIOTApproach.pdf BibTex
ref_biblio
Sophie DramĂ©-MaignĂ©, Maryline Laurent, Laurent Castillo, HervĂ© Ganem. Augmented chain of ownership : configuring IoT devices with the help of the blockchain. SECURECOMM 2018: 14th EAI International Conference on Security and Privacy in Communication Networks, Sep 2018, Singapour, Singapore. pp.53 - 68, ⟨10.1007/978-3-030-01701-9_4⟩. ⟨hal-01895391⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01895391/file/2018-fev-soumis-Securecomm_2018_paper_84-1.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. BDUA: blockchain-based data usage auditing. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Jul 2018, San Francisco, United States. pp.630-637, ⟨10.1109/CLOUD.2018.00087⟩. ⟨hal-03754087⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03754087/file/2018-ieeecloud-bdua-blockchain.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.155 - 167, ⟨10.5220/0006855501550167⟩. ⟨hal-01850387⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01850387/file/2018-SECRYPT-SABE-Multi-level-AC.pdf BibTex
ref_biblio
Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. SECRYPT 2018: 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.168 - 176, ⟨10.5220/0006855601680176⟩. ⟨hal-01864317⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01864317/file/2018-SECRYPT-BC-based-AC.pdf BibTex
ref_biblio
Maryline Laurent, Nesrine Kaaniche. Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IOT applications. 2018 CLOUD 11th International Conference on Cloud Computing, Jul 2018, San Francisco, France. pp.590-597, ⟨10.1109/CLOUD.2018.00082⟩. ⟨hal-03754091⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03754091/file/2018-ieeecloud-aggregatecp-abe.pdf BibTex
ref_biblio
Paul Marillonnet, MikaĂ«l Ates, Maryline Laurent. Etat de l'art des technologies de la gestion des donnĂ©es personnelles par l'usager. APVP 2018: Atelier sur la Protection de la Vie PrivĂ©e, Jun 2018, Porquerolles, France. ⟨hal-01822897⟩
AccĂšs au bibtex
BibTex
ref_biblio
David Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for internet-based personal assistants. DPM 2018: 13th International Workshop on Data Privacy Management, Sep 2018, Barcelona, Spain. pp.431 - 440, ⟨10.1007/978-3-030-00305-0_31⟩. ⟨hal-01991849⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01991849/file/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf BibTex

2017

ref_biblio
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Constant-size threshold attribute based signcryption for cloud applications. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.212 - 225, ⟨10.5220/0006469202120225⟩. ⟨hal-01575575⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01575575/file/2017-SECRYPT-ABSC-Sana-Belguith.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. Attribute based encryption for multi-level access control policies. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.67 - 78, ⟨10.5220/0006421000670078⟩. ⟨hal-01575560⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01575560/file/2017-SECRYPT-Multi-levelAccess-ehealth-ABC.pdf BibTex
ref_biblio
Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. Security SLA based monitoring in clouds. EDGE 2017 : 1st International Conference on Edge Computing, Jun 2017, Honolulu, United States. pp.90 - 97, ⟨10.1109/IEEE.EDGE.2017.20⟩. ⟨hal-01593433⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01593433/file/2017-EDGE-Secure_SLA-IBM-Nesrine.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. pp.239 - 256, ⟨10.1007/978-3-319-67816-0_14⟩. ⟨hal-01593430⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01593430/file/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications, Oct 2017, Cambridge, United States. pp.1 - 5, ⟨10.1109/NCA.2017.8171384⟩. ⟨hal-01682227⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01682227/file/2017-NCA-Auditable-consent-with-Blockchain.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway. ⟨hal-01702450⟩
AccĂšs au bibtex
BibTex
ref_biblio
Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems, Nov 2017, Tartu, Estonia. pp.70 - 85, ⟨10.1007/978-3-319-70290-2_5⟩. ⟨hal-01699347⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01699347/file/18676.pdf BibTex
ref_biblio
Collins Isdory Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, et al.. Serverless protocols for inventory and tracking with a UAV. DASC 2017 : IEEE/AIAA 36th Digital Avionics Systems Conference, Sep 2017, St Petersburg, United States. pp.1 - 11, ⟨10.1109/DASC.2017.8102113⟩. ⟨hal-01682257⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01682257/file/2017-DASC-Serverless-Inventory-Mtita.pdf BibTex
ref_biblio
Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. The semantic discrimination rate metric for privacy measurements which questions the benefit of T-closeness over L-diversity. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.285 - 294, ⟨10.5220/0006418002850294⟩. ⟨hal-01576996⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01576996/file/2017-SECRYPT-DR-Tcloseness.pdf BibTex

2016

ref_biblio
Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.133 - 146, ⟨10.5220/0005968201330146⟩. ⟨hal-01391253⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01391253/file/2016-SECRYPT-PAbAC-Belguith-Kaaniche.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, SĂ©bastien Canard. A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations. Proc. 2e atelier sur la SĂ©curitĂ© dans les Clouds, Feb 2016, paris, France. ⟨hal-03991200⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-03991200/file/kaaniche-paper.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. Attribute-based signatures for supporting anonymous certification. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.279 - 300, ⟨10.1007/978-3-319-45744-4_14⟩. ⟨hal-01391343⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01391343/file/2016-ESORICS-Anonymous-Certification-Nesrine-Kaaniche.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent, SĂ©bastien Canard. A novel proof of data possession scheme based on set-homomorphic operations. SEC2 2016 : 2e atelier sur la SĂ©curitĂ© dans les Clouds, Jul 2016, Lorient, France. pp.1 - 4. ⟨hal-01390987⟩
AccĂšs au bibtex
BibTex
ref_biblio
Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things. ESORICS 2016 : 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.339 - 358, ⟨10.1007/978-3-319-45741-3_18⟩. ⟨hal-01391319⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01391319/file/2016-ESORICS-Proxy-Reencryptor-Kim-Nguyen.pdf BibTex
ref_biblio
Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Novel lightweight signcryption-based key distribution mechanisms for MIKEY. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩. ⟨hal-01391308⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01391308/file/2016-WISTP-Signcryption-MIKEY-Kim-Nguyen.pdf BibTex

2015

ref_biblio
Florent Fortat, Maryline Laurent, Michel Simatic. Games based on active NFC objects : model and security requirements. NETGAMES 2015 : 14th International Workshop on Network and Systems Support for Games, Dec 2015, Zagreb, Croatia. pp.1 - 3, ⟨10.1109/NetGames.2015.7382998⟩. ⟨hal-01279183⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01279183/file/2015-Netgames-Fortat-model-security-Requirements.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. SHoPS: Set Homomorphic Proof of data Possession Scheme in cloud storage applications. Services 2015 : IEEE World Congress on Services , Jun 2015, New York, United States. pp.143 - 150, ⟨10.1109/SERVICES.2015.29⟩. ⟨hal-01254993⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01254993/file/2015-CLOUD-SHOPS.pdf BibTex
ref_biblio
Armen Khatchatourov, Maryline Laurent, Claire Levallois-Barth. Privacy in digital identity systems: models, assessment and user adoption. 14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩. ⟨hal-01283997⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01283997/file/2015-EGOV-Khatchatourov_Privacy_in_Digital_Identity.pdf BibTex
ref_biblio
Daniel Migault, Tobias Guggemos, Daniel Palomares, Aurelien Wailly, Maryline Laurent, et al.. Recommendations for IPsec configuration on homenet and M2M devices. Q2SWINET 2015 : 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Nov 2015, Cancun, Mexico. pp.9 - 17, ⟨10.1145/2815317.2815323⟩. ⟨hal-01263312⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01263312/file/Q2SWinet2015-ipsec-homenet-performance.pdf BibTex
ref_biblio
Collins Isdory Mtita, Maryline Laurent, Pascal Daragon. Serverless lightweight mutual authentication protocol for small mobile computing devices. NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security , Jul 2015, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2015.7266521⟩. ⟨hal-01285358⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01285358/file/NTMS2015-Mtita-ServerlessProtocol.pdf BibTex
ref_biblio
Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent. Lightweight certificateless and provably-secure signcryptosystem for the internet of things. TRUSTCOM 2015 : 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland. pp.467-474, ⟨10.1109/Trustcom.2015.408⟩. ⟨hal-01279169⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01279169/file/2015-trustcom-Signcryption.pdf BibTex

2014

ref_biblio
Nesrine Kaaniche, Maryline Laurent, Mohammed El Barbori. CloudaSec : a novel public-key based framework to handle data sharing security in clouds. SECRYPT 2014 : 11th International Conference on Security and Cryptography, Aug 2014, Vienne, Austria. pp.5 - 18, ⟨10.5220/0005010600050018⟩. ⟨hal-01263351⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01263351/file/2014-SECRYPT%20CloudaSEC-enligne.pdf BibTex
ref_biblio
Nesrine Kaaniche, Maryline Laurent. A secure client side deduplication scheme in cloud storage environments. NTMS 2014 : 6th International Conference on New Technologies, Mobility and Security , Mar 2014, Dubai, United Arab Emirates. pp.1 - 7, ⟨10.1109/NTMS.2014.6814002⟩. ⟨hal-01263425⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01263425/file/2014-NTMS-Nesrine.pdf BibTex
ref_biblio
Nesrine Kaaniche, Ethmane El Moustaine, Maryline Laurent. A novel zero-knowledge scheme for proof of data possession in cloud storage applications. CCGRID 2014 : 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing , May 2014, Chicago, United States. pp.522 - 531, ⟨10.1109/CCGrid.2014.81⟩. ⟨hal-01263463⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01263463/file/2014-CCGRID-ZeroKnowPDPScheme.pdf BibTex
ref_biblio
Armen Khatchatourov, Maryline Laurent, Meriem Sellami. Pseudonymisation, identitĂ©s multiples et protection des donnĂ©es Ă  caractĂšre personnel dans le champ des identitĂ©s numĂ©riques : quelques aspects du paysage europĂ©en. 5Ăšme Atelier sur la Protection de la Vie PrivĂ©e, Jun 2014, Cabourg, France. ⟨hal-02397700⟩
AccĂšs au bibtex
BibTex
ref_biblio
Daniel Migault, Daniel Palomares, Hendrik Hendrik, Maryline Laurent. Secure IPsec based offload architectures for mobile data : architecture description and performance evaluation. Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks, Sep 2014, Montreal, Canada. pp.95 - 104, ⟨10.1145/2642687.2642690⟩. ⟨hal-01263065⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01263065/file/2014-Q2SWinet-Offload-Perf-Evaluation-Migault.pdf BibTex
ref_biblio
Daniel Palomares, Daniel Migault, Hendrik Hendrik, Maryline Laurent. Elastic virtual private cloud. Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks , Sep 2014, Montreal, Canada. pp.127 - 131, ⟨10.1145/2642687.2642704⟩. ⟨hal-01264790⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01264790/file/2014-Q2SWinet-VirtualPrivateCloud-Palo.pdf BibTex

2013

ref_biblio
Ethmane El Moustaine, Maryline Laurent. GPS+ : a back-end coupons identification for low-cost RFID. WiSec '13 : 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Apr 2013, Budapest, Hungary. pp.73-78, ⟨10.1145/2462096.2462109⟩. ⟨hal-00843977⟩
AccĂšs au bibtex
BibTex
ref_biblio
Emmanuel Herbert, Daniel Migault, StĂ©phane SĂ©nĂ©cal, Stanislas Francfort, Maryline Laurent. Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency. IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.824-827. ⟨hal-00860157⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00860157/file/2012-12-IM2013-DNSSEC-Stat.pdf BibTex
ref_biblio
Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent. ID based cryptography for secure cloud data storage. CLOUD 2013 : IEEE 6th International Conference on Cloud Computing, Jun 2013, Santa Clara, CA, United States. pp.375-382, ⟨10.1109/CLOUD.2013.80⟩. ⟨hal-01275089⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01275089/file/2013-cloud-IDbased-cloudstorage.pdf BibTex
ref_biblio
Maryline Laurent, Samia Bouzefrane, Christophe Kiennert. Towards secure identity management in smartphone environments. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Aug 2013, X, France. pp.2133-2135. ⟨hal-01126288⟩
AccĂšs au bibtex
BibTex
ref_biblio
Daniel Migault, StĂ©phane SĂ©nĂ©cal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent. PREFETCHing to overcome DNSSEC deployment over large resolving platforms. TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.694 - 703, ⟨10.1109/TrustCom.2013.84⟩. ⟨hal-01262120⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01262120/file/2013-trustcom-free-pastry-experiment.pdf BibTex
ref_biblio
Daniel Migault, Stanislas Francfort, StĂ©phane SĂ©nĂ©cal, Emmanuel Herbert, Maryline Laurent. Overcoming DNSSEC performance issues with DHT-based architectures. IM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.816-819. ⟨hal-00860147⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00860147/file/2012-12-IM2013-DNSSEC-DHT.pdf BibTex
ref_biblio
Daniel Palomares, Daniel Migault, Maryline Laurent. Failure preventive mechanism for IPsec gateways. ICCIT '13 : The Third International Conference on Communications and Information Technology, Jun 2013, Beirut, Lebanon. pp.167-172, ⟨10.1109/ICCITechnology.2013.6579543⟩. ⟨hal-00860251⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00860251/file/2013-ICCT-Failure-Preventive-Palomares.pdf BibTex
ref_biblio
Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent. High Availability for IPsec VPN Platforms: ClusterIP Evaluation. 8th International Conference on Availability, Reliability and Security (ARES 2013), Sep 2013, Regensburg, Germany. pp.1. ⟨hal-00863418⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00863418/file/High_Availability_for_IPsec_VPN_Platforms-ClusterIP_Evaluation-ARES2013.pdf BibTex

2012

ref_biblio
Kheira Bekara, Maryline Laurent, Than Ha Nguyen. Technical enforcement of european privacy legislation: an access control approach. NTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security , May 2012, Istanbul, Turkey. pp.1 - 7, ⟨10.1109/NTMS.2012.6208724⟩. ⟨hal-01300733⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01300733/file/NTMS2012-Bekara-Kheira.pdf BibTex
ref_biblio
Yosra Ben Saied, Alexis Olivereau, Maryline Laurent. A distributed approach for secure M2M communications. NTMS '12 : 5th IFIP International Conference on New Technologies, Mobility and Security, May 2012, Istambul, Turkey. pp.1-7, ⟨10.1109/NTMS.2012.6208702⟩. ⟨hal-00811949⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00811949/file/2012-NTMS-BenSaied-SecureM2M.pdf BibTex
ref_biblio
Aymen Boudguiga, Maryline Laurent. An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-based cryptographic algorithms. ComNet '12 : The Third International Conference on Communications and Networking, Mar 2012, Tunis, Tunisia. pp.1-8, ⟨10.1109/ComNet.2012.6217728⟩. ⟨hal-00819802⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00819802/file/COMNET2012-Aymen-Sakai-Kasahara.pdf BibTex
ref_biblio
Jean-Michel Combes, Aurelien Wailly, Maryline Laurent. CGA as alternative security credentials with IKEv2 : implementation and analysis. SAR-SSI '12 : 7th Conference on Network Architectures and Information Systems Security, May 2012, Cabourg, France. pp.53-59. ⟨hal-00747186⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00747186/file/SAR-SSI-2012-JMC-IKEv2_CGA.pdf BibTex
ref_biblio
Jean-Michel Combes, Maryline Laurent. Source address validation improvements (SAVI): mĂ©canismes de prĂ©vention contre l'usurpation d'adresses IP source. SSTIC 2012 : Symposium sur la SĂ©curitĂ© des Technologies de l'Information et des Communications, Jun 2012, Rennes, France. pp.292 - 326. ⟨hal-01300731⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01300731/file/SSTIC20112-SAVI-Combes.pdf BibTex
ref_biblio
Jean-Michel Combes, Ghada Arfaoui, Maryline Laurent. Dynamic DNS update security, based on cryptographically generated addresses and ID-based cryptography, in an IPv6 autoconfiguration context. AReS '12 : The 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.206-211, ⟨10.1109/ARES.2012.69⟩. ⟨hal-00756609⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00756609/file/2012-ARES-DNS-CGA-combes-Arfaoui.pdf BibTex
ref_biblio
Ethmane El Moustaine, Maryline Laurent. A lattice based authentication for low-cost RFID. RFID-TA '12 : IEEE International Conference on RFID Technology and Applications, Nov 2012, Nice, France. pp.68-73, ⟨10.1109/RFID-TA.2012.6404569⟩. ⟨hal-00772773⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00772773/file/2012-RFID-TA-A_lattice_based_authentication_for_low-cost_RFID-E-ElMoustaine.pdf BibTex
ref_biblio
Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et al.. ISP offload infrastructure to minimize cost and time deployment. GLOBECOM '12 : IEEE Global Communications Conference, Dec 2012, Anaheim, United States. pp.1041-1047, ⟨10.1109/GLOCOM.2012.6503250⟩. ⟨hal-00833402⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00833402/file/2012-Globecom-Migault.pdf BibTex
ref_biblio
Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et al.. E2E : an optimized IPsec architecture for secure and fast offload. IWSMA '12 : The First International Workshop on Security of Mobile Applications, Aug 2012, Prague, Czech Republic. pp.365-374, ⟨10.1109/ARES.2012.80⟩. ⟨hal-00756529⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00756529/file/IWSMA2012_Migault-E2E-Offload-Ipsec.pdf BibTex
ref_biblio
Andrei Vlad Sambra, Maryline Laurent. Context-aware decentralized approach for web services. DTSOS '12 : IEEE SERVICES Workshop on Discovery, Testing, and Services-Oriented Software, Jun 2012, Honolulu, Hawaii, United States. pp.73-79, ⟨10.1109/SERVICES.2012.65⟩. ⟨hal-00734243⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00734243/file/2012-ICWS-Sambra.pdf BibTex

2011

ref_biblio
Kheira Bekara, Maryline Laurent. Privacy policy negotiation at user's side based on P3P tag value classification. EEE 2011 : The International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government, Jul 2011, Las Vegas, United States. pp.559 - 564. ⟨hal-01303408⟩
AccĂšs au bibtex
BibTex
ref_biblio
Kheira Bekara, Maryline Laurent. A semantic information model based on the privacy legislation. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 6, ⟨10.1109/SAR-SSI.2011.5931375⟩. ⟨hal-01304081⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01304081/file/OntologyPaper-Kheira-Bekara-Sar-SSI2011.pdf BibTex
ref_biblio
Aymen Boudguiga, Maryline Laurent. Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. WCNC 2011 : IEEE Wireless Communications and Networking Conference, Mar 2011, Cancun, Mexico. pp.784 - 789, ⟨10.1109/WCNC.2011.5779232⟩. ⟨hal-01304157⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01304157/file/Aymen-WCNC2011-ID-based-Authentication-MeshNetworks.pdf BibTex
ref_biblio
Aymen Boudguiga, Maryline Laurent. An EAP ID-Based authentication method for wireless networks. ISTP '11 : International Workshop on Information Security, Theory and Practice, Dec 2011, Abu Dhabi, United Arab Emirates. pp.232-239. ⟨hal-00802365⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00802365/file/Aymen-EAP-IDbased-Mesh-ICITST2011.pdf BibTex
ref_biblio
Samia Bouzefrane, Pascal Thoniel, Maryline Laurent, Kheira Bekara. Privacy preservation and low cost authentication in federated identity management systems. E-SMART 2011 : The Future of Digital Security Technologies, Sep 2011, Nice, France. ⟨hal-01303898⟩
AccĂšs au bibtex
BibTex
ref_biblio
Tony Cheneau, Maryline Laurent. Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 7, ⟨10.1109/SAR-SSI.2011.5931376⟩. ⟨hal-01304077⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01304077/file/M-CGA-Tony-Cheneau-SAR-SSI-2011.pdf BibTex
ref_biblio
Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent. A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. NSS 2011: 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.249--253, ⟨10.1109/ICNSS.2011.6060009⟩. ⟨hal-00745353⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00745353/file/takes.pdf BibTex
ref_biblio
Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. Decisive heuristics to differentiate legitimate from phishing sites. SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security, May 2011, La Rochelle, France. pp.1 - 9, ⟨10.1109/SAR-SSI.2011.5931389⟩. ⟨hal-01304087⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01304087/file/Paper-gastellier-decisive-heuristics-SARSSI11.pdf BibTex
ref_biblio
Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. A dual approach to detect pharming attacks at the client-side. NTMS 2011 : 4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1 - 5, ⟨10.1109/NTMS.2011.5721063⟩. ⟨hal-01304168⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01304168/file/Gastellier-NTMS2011-Dual-Approach-Pharming.pdf BibTex
ref_biblio
Sophie Gastellier-Prevost, Maryline Laurent. Defeating pharming attacks at the client-side. NSS 2011 : 5th International Conference on Network and System Security, Sep 2011, Milan, Italy. pp.33 - 40, ⟨10.1109/ICNSS.2011.6059957⟩. ⟨hal-01303641⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01303641/file/NSS2011-SophieGastellier-Pharming.pdf BibTex
ref_biblio
Laurent Gomez, Mehdi Khalfaoui, Elie El-Khoury, Cedric Ulmer, Jean-Pierre Deutsch, et al.. RESCUEIT : sĂ©cuRisation dE la ChaĂźne logiStique orientĂ©e serviCe depUis le mondE des objets jusqu'Ă  l'univers InformaTique. WISG '11 : Workshop Interdisciplinaire sur la SĂ©curitĂ© Globale, Jan 2011, Troyes, France. ⟨hal-00727624⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00727624/file/RESCUEIT_WISG2011.pdf BibTex
ref_biblio
Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Integration of RFID and wireless sensor networks into a supply chain management system. WSNSCM 2011 : 1st International Workshop on Sensor Networks for Supply Chain Management, Aug 2011, Nice/Saint Laurent Du Var, France. pp.393-398. ⟨hal-01303880⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01303880/file/Gomez-integrationofRFIDandWSNCM2011.pdf BibTex
ref_biblio
Claire SondĂšs Larafa, Maryline Laurent. Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. ISCC 2011 : 16th IEEE Symposium on Computers and Communications, Jun 2011, Kerkyra, Greece. pp.856 - 863, ⟨10.1109/ISCC.2011.5983949⟩. ⟨hal-01303801⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01303801/file/Larafa-ieeeiscc2011.pdf BibTex
ref_biblio
Daniel Palomares, Maryline Laurent. Mechanisms to Ensure Continuity of Service for IPsec/IKEv2 Based Communications. ICSNA-2011: International Conference on Secure Networking and Applications ,24-25 October, Paris, France, Oct 2011, Paris, France. pp.1. ⟨hal-00863428⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-00863428/file/Mechanism_to_ensure_continuity_of_service_for_IPsec_and_IKEv2-_ICSNA2011.pdf BibTex
ref_biblio
Andrei Vlad Sambra, Maryline Laurent. MyProfile - Privacy Aware Decentralized Identity on the Web. 1st International Conference on Secure networking and Applications (ICSNA), Oct 2011, Paris, France. ⟨hal-00745416⟩
AccĂšs au bibtex
BibTex

2010

ref_biblio
Kheira Bekara, Maryline Laurent. La vie privĂ©e dans les environnements fĂ©dĂ©rĂ©s. Atelier protection de la vie privĂ©e 2010, May 2010, Annecy, France. ⟨hal-01356807⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01356807/file/journee-Vie-Privee-Annecy-mai2010.pdf BibTex
ref_biblio
Kheira Bekara, Maryline Laurent. Enabling user privacy in identity management systems. ICITIS 2010 : IEEE International Conference on Information Theory and Information Security, Dec 2010, PĂ©kin, China. pp.514-520, ⟨10.1109/ICITIS.2010.5689547⟩. ⟨hal-01306871⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01306871/file/ICITIS2010-Bekara-Kheira-dec2010.pdf BibTex
ref_biblio
Kheira Bekara, Yosra Ben Mustapha, Maryline Laurent. XPACML eXtensible Privacy Access Control Markup Language. 2nd International Conference on Communications and Networking (ComNet 2010), Nov 2010, Tozeur, Tunisia. pp.1-5, ⟨10.1109/COMNET.2010.5699807⟩. ⟨hal-01306061⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01306061/file/Bekara-Priv-Language-Comnet2010.pdf BibTex
ref_biblio
Aymen Boudguiga, Maryline Laurent. An ID-based authentication scheme for the IEEE 802.11s mesh network. WIMOB 2010 : IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Oct 2010, Niagara Falls, Canada. pp.256 - 263, ⟨10.1109/WIMOB.2010.5645055⟩. ⟨hal-01308630⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01308630/file/Wimob2010-Aymen-Boudguiga-AuthScheme-MeshNetworks.pdf BibTex
ref_biblio
Tony Cheneau, Maryline Laurent. Étude des solutions de proxy Neighbor Discovery sĂ©curisĂ©es et proposition basĂ©e sur la Signature Agility. 5Ăšme ConfĂ©rence sur la SĂ©curitĂ© des Architectures RĂ©seaux et SystĂšmes d'Information (SAR-SSI 2010), May 2010, Rocquebrune Cap-Martin, France. pp.1 - 15. ⟨hal-01356372⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01356372/file/Cheneau-SARSSI2010.pdf BibTex
ref_biblio
Claire SondĂšs Larafa, Maryline Laurent. Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), Jun 2010, PĂ©kin, China. pp.277 - 281, ⟨10.1109/WCINS.2010.5541783⟩. ⟨hal-01356343⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01356343/file/Larafa-ieeewcnis2010.pdf BibTex
ref_biblio
Daniel Migault, CĂ©dric Girard, Maryline Laurent. A performance view on DNSSEC migration. CNSM 2010 : 6th International Conference on Network and Service Management, Oct 2010, Niagara Falls, Canada. pp.469 - 474, ⟨10.1109/CNSM.2010.5691275⟩. ⟨hal-01308335⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01308335/file/Migault-CNSM2010.pdf BibTex

2009

ref_biblio
Tony Cheneau, Aymen Boudguiga, Maryline Laurent. AmĂ©lioration des performances des adresses CGA et du protocole SEND : Ă©tude comparĂ©e de RSA et d'ECC/ECDSA. SAR-SSI 2009 : 4Ăšme ConfĂ©rence sur la sĂ©curitĂ© des architectures rĂ©seaux et des systĂšmes d'information, Jun 2009, Luchon, France. pp.139 - 156. ⟨hal-01360812⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01360812/file/Cheneau-SARSSI2009.pdf BibTex
ref_biblio
Claire SondĂšs Larafa, Maryline Laurent. Protocols for distributed AAA framework in mobile ad-hoc networks. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009, May 2009, Aachen, Germany. pp.75 - 86. ⟨hal-01316815⟩
AccĂšs au bibtex
BibTex
ref_biblio
Jean-Philippe Wary, Maryline Laurent. Secure communications between multi-capacity devices with authentication support by network operators. MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security, May 2009, Aachen, Germany. pp.25 - 35. ⟨hal-01368472⟩
AccĂšs au bibtex
BibTex

2008

ref_biblio
Chakib Bekara, Maryline Laurent, Kheira Bekara. Mitigating resource-draining DoS attacks on broadcast source authentication on wireless sensors networks. SecTech 2008 : International Conference on Security Technology, Dec 2008, Hainan Island, China. pp.109 - 116, ⟨10.1109/SecTech.2008.20⟩. ⟨hal-01327163⟩
AccĂšs au bibtex
BibTex
ref_biblio
Chakib Bekara, Maryline Laurent, Kheira Bekara. H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks. ICCS 2008 : 11th IEEE International Conference on Communication Systems, Nov 2008, Guangzhou, China. pp.1197 - 1203 ⟨10.1109/ICCS.2008.4737372⟩. ⟨hal-01327378⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01327378/file/cbekara-ICCS08.pdf BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. Toward a new ad hoc node design for secure service deployment over ad hoc network. MWNS 2008 : Workshop on Mobile and Wireless Networks Security, May 2008, Singapore, Singapore. pp.1 - 11, ⟨10.1142/9789812833266_0001⟩. ⟨hal-01355075⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01355075/file/MWNS%20CHA%20MAK-final.pdf BibTex
ref_biblio
Alexis Davoux, Jean-Christophe Defline, Ludovic Francesconi, Maryline Laurent, Kheira Bekara, et al.. Federation of circles of trust and secure usage of digital identity. e-2008 : eChallenges , Oct 2008, Stockholm, Sweden. ⟨hal-01333035⟩
AccĂšs au bibtex
BibTex
ref_biblio
Houssem Jarraya, Maryline Laurent. A secure Peer-to-Peer backup system. NOTERE 2008 : 8Ăšme confĂ©rence internationale sur les nouvelles technologies de la rĂ©partition, Jun 2008, Lyon, France. pp.125 - 134, ⟨10.1145/1416729.1416751⟩. ⟨hal-01379960⟩
AccĂšs au bibtex
BibTex
ref_biblio
Amir R. Khakpour, Maryline Laurent, Hakima Chaouchi. WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks. ARES 2008 : 3rd International Conference on Availability, Reliability and Security, Mar 2008, Barcelona, Spain. pp.144 - 152, ⟨10.1109/ARES.2008.19⟩. ⟨hal-01355081⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01355081/file/Khakpour-ARES08.pdf BibTex
ref_biblio
Claire SondĂšs Larafa, Maryline Laurent, Hakima Chaouchi. Light and distributed AAA scheme for mobile ad-hoc networks. SETOP 2008 : 1st Workshop on Security of Autonomous and Spontaneous Networks, Oct 2008, Loctudy, France. pp.93 - 104. ⟨hal-01327396⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01327396/file/LARAFA-SETOP08.pdf BibTex
ref_biblio
Maryline Laurent, Chakib Bekara, Wassim Drira. Light and simple security solution for cold chain supervision. EUNICE 2008 : 14th European Conference on Information and Communications Technologies, Sep 2008, Brest, France. pp.1 - 6. ⟨hal-01327416⟩
AccĂšs au bibtex
BibTex

2007

ref_biblio
Chakib Bekara, Maryline Laurent. A new protocol for securing wireless sensor networks against nodes replication attacks. 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), Oct 2007, White Plains, Ny, United States. pp.59 - ⟨10.1109/WIMOB.2007.4390853⟩. ⟨hal-01355352⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01355352/file/bekara-WiMob07.pdf BibTex
ref_biblio
Chakib Bekara, Maryline Laurent, Kheira Bekara. SAPC : a Secure Aggregation Protocol for Cluster-based wireless sensor networks. MSN 2007 : 3rd International Conference on Mobile Ad-hoc and Sensor Networks, Dec 2007, Beijing, China. pp.784 - 798, ⟨10.1007/978-3-540-77024-4_71⟩. ⟨hal-01328162⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01328162/file/Bekara-SAPC-MSN07.pdf BibTex
ref_biblio
Chakib Bekara, Maryline Laurent. A new resilient key management protocol for wireless sensor networks. WISTP 2007: 1st IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices : Smart Cards, Mobile and Ubiquitous Computing Systems, May 2007, Heraklion, Greece. pp.14 - 26, ⟨10.1007/978-3-540-72354-7_2⟩. ⟨hal-01328143⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01328143/file/bekara-WISTP07.pdf BibTex
ref_biblio
Chakib Bekara, Maryline Laurent. Defending against nodes replication attacks on wireless sensor networks. SAR-SSI 2007 : 2nd Conference on Security in Network Architectures and Information Systems, Jun 2007, Annecy, France. pp.31 - 40. ⟨hal-01328148⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01328148/file/bekara-SARSSI07.pdf BibTex
ref_biblio
Amin Ben Abdallah, Omar Cheikhrouhou, Maryline Laurent, Hakima Chaouchi, Maher Ben Jemaa. Architecture de sĂ©curitĂ© dans un rĂ©seau mesh multi sauts. GRES 2007 : 8Ăšme Colloque Francophone de Gestion de REseaux et de Services "Adaptation dynamique des rĂ©seaux et des services", Nov 2007, Hammamet, Tunisie. ⟨hal-01327900⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01327900/file/maknavicius-GRES07.pdf BibTex
ref_biblio
Julien Bournelle, Jean-Michel Combes, Maryline Laurent, Claire SondĂšs Larafa. Using PANA for mobile IPv6 bootstrapping. NETWORKING 2007 : 6th international IFIP-TC6 networking conference on ad hoc and sensor networks, wireless networks, next generation Internet, May 2007, Atlanta, United States. pp.345 - 355, ⟨10.1007/978-3-540-72606-7_30⟩. ⟨hal-01328113⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01328113/file/bournelle-ifip2007.pdf BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. SAACCESS : secured ad hoc access framework. NTMS 2007 : 1st IFIP International Conference on NewTechnologies, Mobility and Security, May 2007, Paris, France. pp.425 - 436, ⟨10.1007/978-1-4020-6270-4_35⟩. ⟨hal-01328014⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01328014/file/mlaurent-NTMS07.pdf BibTex

2006

ref_biblio
Julien Bournelle, Guillaume Valadon, David Binet, Saber Zrelli, Maryline Laurent-Maknavicius, et al.. AAA considerations within several NEMO deployment scenarios. WONEMO 2006, Jan 2006, Sendai, Japan. ⟨hal-01351674⟩
AccĂšs au bibtex
BibTex
ref_biblio
Omar Cheikhrouhou, Maher Ben Jemaa, Maryline Laurent. Nouvelle mĂ©thode d'authentification EAP-EHash. CFIP 2006/ Colloque Francophone sur l'IngĂ©nierie des Protocoles, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur, Tunisie. 12 p. ⟨inria-00111911⟩
AccÚs au texte intégral et bibtex
https://inria.hal.science/inria-00111911/file/CFIP-ID-06.pdf BibTex

2001

ref_biblio
Ahmed Bouabdallah, Maryline Laurent. Formal validation of an ATM security context negociation protocol. Proceedings of the International symposium on software and systems (I3S), Feb 2001, Constantine, Algeria. pp.25 - 33. ⟨hal-02341318⟩
AccĂšs au bibtex
BibTex

2000

ref_biblio
Olivier Paul, Maryline Laurent, Sylvain Gombault. A full bandwidth ATM firewall. ESORICS'2000 : 6th european symposium on research in computer security, Toulouse, octobre, Oct 2000, Toulouse, France. pp.206 - 221. ⟨hal-02142128⟩
AccĂšs au bibtex
BibTex

1999

ref_biblio
Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, et al.. Secure communications in ATM networks. ACSAC'99, proceedings of the 15th annual computer security applications conference, Dec 1999, Phoenix, United States. pp.84 - 93, ⟨10.1109/CSAC.1999.816016⟩. ⟨hal-02341313⟩
AccĂšs au bibtex
BibTex
ref_biblio
Olivier Paul, Maryline Laurent, Sylvain Gombault. An asynchronous distributed access control architecture for IP over ATM networks. ACSAC 1999 : 15th Annual Computer Security Applications Conference, Dec 1999, Phoenix, United States. ⟨10.1109/CSAC.1999.816015⟩. ⟨hal-01840923⟩
AccĂšs au bibtex
BibTex

Chapitre d'ouvrage

2022

ref_biblio
Josep Domingo-Ferrer, Maryline Laurent. Foreword, privacy in statistical databases 2022. Foreword, Privacy in Statistical Databases 2022, 13463, Springer International Publishing, 2022, Lecture Notes in Computer Science, 978-3-031-13945-1. ⟨10.1007/978-3-031-13945-1⟩. ⟨hal-04176139⟩
AccĂšs au bibtex
BibTex

2021

ref_biblio
Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevičius, Marinella Petrocchi, et al.. Privacy-by-design in intelligent infrastructures. Deep diving into data protection: 1979-2019: celebrating 40 years of research on privacy data protection at the CRIDS, 170 (51), Collection du CRIDS, pp.309-343, 2021, 9782807926493. ⟨hal-04331489⟩
AccĂšs au bibtex
BibTex

2018

ref_biblio
Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signes de confiance : l’impact des labels sur la gestion des donnĂ©es personnelles. Signes de confiance : l’impact des labels sur la gestion des donnĂ©es personnelles, Institut Mines-TĂ©lĂ©com, pp.199 - 202, 2018, 978-2-9557308-4-3. ⟨hal-02336275⟩
AccĂšs au bibtex
BibTex
ref_biblio
Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signs of trust : the impact of seals on personal data management. Signs of trust : the impact of seals on personal data management, 2, Institut Mines-TĂ©lĂ©com, pp.199 - 203, 2018, Chair Values and Policies of Personal Information, 978-2-9557308-5-0. ⟨hal-02336269⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Armen Khatchatourov. La confiance en informatique par la gestion du risque. Signes de confiance : l’impact des labels sur la gestion des donnĂ©es personnelles, Institut Mines-TĂ©lĂ©com, pp.47 - 62, 2018, 978-2-9557308-4-3. ⟨hal-01773953⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent. La blockchain est-elle une technologie de confiance. Claire Levallois-Barth. Signes de confiance : l’impact des labels sur la gestion des donnĂ©es personnelles, Institut Mines-TĂ©lĂ©com, pp.179 - 198, 2018, 978-2-9557308-4-3. ⟨hal-01778949⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01778949/file/2017-09-18-confiance%26Blockchain-fin.pdf BibTex
ref_biblio
Maryline Laurent. Is blockchain a trustworthy technology?. Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-TĂ©lĂ©com, pp.180-197, 2018, 978-2-9557308-6-7. ⟨hal-02516126⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-02516126/file/2018-EN-CahierChaireVPIP2-Fiche11-HAL.pdf BibTex
ref_biblio
Maryline Laurent, Armen Khatchatourov. Building trust through risk management in computer science. Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-TĂ©lĂ©com, pp.48-59, 2018, 978-2-9557308-6-7. ⟨hal-02516151⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-02516151/file/2018-EN-CahierChaireVPIP2-Fiche4-HAL.pdf BibTex

2015

ref_biblio
Maryline Laurent, Claire Levallois-Barth. Gestion de la vie privĂ©e et protection des donnĂ©es Ă  caractĂšre personnel. La gestion des identitĂ©s numĂ©riques, ISTE Edition, pp.179 - 236, 2015, SystĂšmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. ⟨hal-01263062⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Julie DenouĂ«l, Claire Levallois-Barth, Patrick Waelbroeck. Digital identity. Digital identity management, ISTE Press; Elsevier, pp.1 - 45, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50001-8⟩. ⟨hal-01272021⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Julie DenouĂ«l, Claire Levallois-Barth, Patrick Waelbroeck. Les identitĂ©s numĂ©riques. La gestion des identitĂ©s numĂ©riques, ISTE Edition, pp.19 - 90, 2015, SystĂšmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. ⟨hal-01263060⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Claire Levallois-Barth. Privacy management and protection of personal data. Digital identity management, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50004-3⟩. ⟨hal-01272029⟩
AccĂšs au bibtex
BibTex

2014

ref_biblio
Aymen Boudguiga, Maryline Laurent, Mohamed Hamdi. Fundamentals of identity-based cryptography. Practical cryptography : algorithms and implementations using C++, CRC Press, pp.225 - 250, 2014, 978-1-4822-2889-2. ⟨10.1201/b17707-13⟩. ⟨hal-01255480⟩
AccĂšs au bibtex
BibTex
ref_biblio
Aymen Boudguiga, Maryline Laurent. Authentication in wireless mesh networks. Security for multihop wireless networks , CRC Press, pp.419 - 446, 2014, 978-1-466-57803-6. ⟨10.1201/b16754-20⟩. ⟨hal-01260916⟩
AccĂšs au bibtex
BibTex
ref_biblio
Emmanuel Herbert, Daniel Migault, StĂ©phane SĂ©nĂ©cal, Stanislas Francfort, Maryline Laurent. Analyzing Internet DNS(SEC) traffic with R for resolving platform optimization. Data Mining Applications with R, Elsevier; Academic Press, pp.435 - 456, 2014, 978-0-12-411511-8. ⟨10.1016/B978-0-12-411511-8.00016-5⟩. ⟨hal-01263426⟩
AccĂšs au bibtex
BibTex

2010

ref_biblio
Houssem Jarraya, Maryline Laurent. SĂ©curitĂ© des rĂ©seaux P2P. Evolution des technologies pair-Ă -pair : optimisation, sĂ©curitĂ© et application, HermĂšs science; Lavoisier, pp.135 - 154, 2010, IC2 : TraitĂ© rĂ©seaux et tĂ©lĂ©coms, 978-2-7462-2579-4. ⟨hal-01355245⟩
AccĂšs au bibtex
BibTex

2009

ref_biblio
Chakib Bekara, Maryline Laurent. Key management in wireless sensor networks. Wireless and mobile network security, ISTE / Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch16⟩. ⟨hal-00472923⟩
AccĂšs au bibtex
BibTex
ref_biblio
Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Security of IP-based mobile networks. Wireless and Mobile Network Security , ISTE/Wiley, pp.437 - 474, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch12⟩. ⟨hal-00472937⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Hakima Chaouchi, Olivier Paul. Fundamental security mechanisms. Wireless and mobile network security , ISTE/Wiley, pp.73 - 130, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch3⟩. ⟨hal-00472941⟩
AccĂšs au bibtex
BibTex
ref_biblio
JosĂ©-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Wireless sensor network security. Wireless and mobile networks security, ISTE/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch15⟩. ⟨hal-01359532⟩
AccĂšs au bibtex
BibTex

2007

ref_biblio
Chakib Bekara, Maryline Laurent. Gestion de clĂ©s dans les rĂ©seaux de capteurs. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 3, Technologies Ă©mergentes, Hermes Science; Lavoisier, pp.233 - 269, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1699-0. ⟨hal-01328150⟩
AccĂšs au bibtex
BibTex
ref_biblio
Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. SĂ©curitĂ© des rĂ©seaux mobiles IP. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 3, Technologies Ă©mergentes, Hermes Science; Lavoisier, pp.47 - 81, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1699-0. ⟨hal-01328154⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Hakima Chaouchi, Olivier Paul. MĂ©canismes de sĂ©curitĂ© fondamentaux. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 1, Concepts fondamentaux, Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1697-6. ⟨hal-01328102⟩
AccĂšs au bibtex
BibTex
ref_biblio
JosĂ©-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. SĂ©curitĂ© dans les rĂ©seaux de capteurs sans fil. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 3, Technologies Ă©mergentes, Hermes Science; Lavoisier, pp.183 - 231, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1699-0. ⟨hal-01328149⟩
AccĂšs au bibtex
BibTex

2000

ref_biblio
Olivier Paul, Maryline Laurent. Improving Packet Filters Management through Automatic and Dynamic Schemes. Information Security for Global Information Infrastructures, 47, Springer US, pp.331-340, 2000, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-0-387-35515-3_34⟩. ⟨hal-03643182⟩
AccĂšs au bibtex
BibTex
ref_biblio
Olivier Paul, Maryline Laurent, Sylvain Gombault. A Full Bandwidth ATM Firewall. Computer Security - ESORICS 2000, 1895, Springer Berlin Heidelberg, pp.206-221, 2000, Lecture Notes in Computer Science, ⟨10.1007/10722599_13⟩. ⟨hal-03643184⟩
AccĂšs au bibtex
BibTex

1999

ref_biblio
Olivier Paul, Maryline Laurent. An Alternative Access Control Architecture for IP Over ATM Networks. Secure Information Networks, Springer US, pp.36-50, 1999, ⟨10.1007/978-0-387-35568-9_3⟩. ⟨hal-03643187⟩
AccĂšs au bibtex
BibTex

Ouvrages

2022

ref_biblio
Esma AĂŻmeur, Maryline Laurent, Reda Yaich, BenoĂźt Dupont, Joaquin Garcia‐alfaro (Dir.). Foundations and practice of security. Springer International Publishing, 13291, 2022, Lecture Notes in Computer Science, 978-3-031-08146-0. ⟨10.1007/978-3-031-08147-7⟩. ⟨hal-03843022⟩
AccĂšs au bibtex
BibTex

2020

ref_biblio
Maryline Laurent, Thanassis Giannetsos. Information Security Theory and Practice. Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩. ⟨hal-03173895⟩
AccÚs au texte intégral et bibtex
https://inria.hal.science/hal-03173895/file/IFIPLNCS12024DL_2020_BookFrontmatter.pdf BibTex

2017

ref_biblio
Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent (Dir.). Security, and privacy in emerging wireless networks : security and communication networks journal. Wiley; Hindawi Limited, 2017, Security and Communication Networks Journal, Security and Communication Networks Journal. ⟨hal-01682207⟩
AccĂšs au bibtex
BibTex

2015

ref_biblio
Maryline Laurent, Samia Bouzefrane (Dir.). Digital Identity Management. Iste, 2015. ⟨hal-01126495⟩
AccĂšs au bibtex
BibTex

2014

ref_biblio
Maryline Laurent, Samia Bouzefrane. La gestion des identitĂ©s numĂ©riques. ISTE. pp.340, 2014, Ă  paraĂźtre. ⟨hal-01126448⟩
AccĂšs au bibtex
BibTex
ref_biblio
Maryline Laurent, Sara Foresti, Heng Xu (Dir.). Privacy-aware electronic society. Springer, 2014, Annals of Telecommunication, Volume 69, Issue 1-2, Annals of Telecommunication, Volume 69, Issue 1-2, 0003-4347. ⟨hal-01261315⟩
AccĂšs au bibtex
BibTex

2009

ref_biblio
Hakima Chaouchi, Georg Carle, Maryline Laurent (Dir.). Mobile and wireless network security : proceedings of the 2nd International Workshop, MWNS 2009, Aachen, Germany, 15 may 2009. Shaker Verlag, pp.86, 2009, 978-3-8322-8177-9. ⟨hal-01370512⟩
AccĂšs au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies. ISTE/John Wiley & Sons, pp.667, 2009, ISTE, ISTE, 978-1-84821-117-9. ⟨hal-01370514⟩
AccĂšs au bibtex
BibTex

2008

ref_biblio
Maryline Laurent, Hakima Chaouchi (Dir.). Mobile and wireless networks security : proceedings of the MWNS 2008 workshop, Singapore, 9 april 2008. World Scientific, 2008, 978-981-283-325-9. ⟨hal-01355042⟩
AccĂšs au bibtex
BibTex

2007

ref_biblio
Hakima Chaouchi, Maryline Laurent. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 3, Technologies Ă©mergentes. Hermes Science; Lavoisier, pp.291, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1699-0. ⟨hal-01329422⟩
AccĂšs au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 2, Technologies du marchĂ©. Hermes Science; Lavoisier, pp.249, 2007, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, IC2 : information, commande, communication. RĂ©seaux et tĂ©lĂ©coms, 978-2-7462-1698-3. ⟨hal-01328157⟩
AccĂšs au bibtex
BibTex
ref_biblio
Hakima Chaouchi, Maryline Laurent. La sĂ©curitĂ© dans les rĂ©seaux sans fil et mobiles. 1, Concepts fondamentaux. Hermes Science; Lavoisier, pp.239, 2007, IC2, SĂ©rie RĂ©seaux et TĂ©lĂ©coms IC2, SĂ©rie RĂ©seaux et TĂ©lĂ©coms 978-2-7462-1697-6. ⟨hal-01328159⟩
AccĂšs au bibtex
BibTex

Brevet

2013

ref_biblio
Ethmane El Moustaine, Maryline Laurent. ProcĂ©dĂ© pour crypter des donnĂ©es dans un cryptosystĂšme NTRU (N,p,q). France, N° de brevet: FR2992510. 12959. 2013, pp.27. ⟨hal-01275262⟩
AccĂšs au bibtex
BibTex

2012

ref_biblio
Ethmane El Moustaine, Maryline Laurent. ProcĂ©dĂ© d'authentification d'un tag. France, N° de brevet: FR2971905. 12982. 2012, pp.24. ⟨hal-01343576⟩
AccĂšs au bibtex
BibTex

2009

ref_biblio
Hakima Chaouchi, Maryline Laurent. ProcĂ©dĂ© d'Ă©change de donnĂ©es dans un rĂ©seau ad hoc. France, N° de brevet: FR2919137. 7091. 2009, pp.50. ⟨hal-01354850⟩
AccĂšs au bibtex
BibTex
ref_biblio
Houssem Jarraya, Maryline Laurent. ProcĂ©dĂ© de sauvegarde/restauration de fichiers dans un rĂ©seau pair Ă  pair. France, N° de brevet: FR2929792. 5331. 2009, pp.36. ⟨hal-01343149⟩
AccĂšs au bibtex
BibTex

2006

ref_biblio
Olivier Paul, Sylvain Gombault, Maryline Laurent-Maknavicius, JoĂ«l Lattmann, Christian Duret, et al.. Method and device for the processing of data packets. France, Patent n° : EP1335565. 9870. 2006. ⟨hal-01868019⟩
AccĂšs au bibtex
BibTex

Proceedings/Recueil des communications

2021

ref_biblio
Samia Bouzefrane, Maryline Laurent, Selma Boumerdassi, Eric Renault. Mobile, Secure, and Programmable Networking: 6th international conference, MSPN 2020: Paris, France, October 28–29, 2020, revised selected papers. MSPN 2020: International Conference on Mobile, Secure, and Programmable Networking, Oct 2021, Paris, France. 12605, Springer, pp.X, 251, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-67549-3. ⟨10.1007/978-3-030-67550-9⟩. ⟨hal-03494288⟩
AccĂšs au bibtex
BibTex

Rapport

2010

ref_biblio
Chakib Bekara, Maryline Laurent, Wassim Drira, Rahim Kacimi, AndrĂ©-Luc Beylot, et al.. Tests, Mesures et Validation. [Contrat] Institut National Polytechnique de Toulouse. 2010. ⟨hal-03970390⟩
AccĂšs au bibtex
BibTex

2009

ref_biblio
Nahla Abid, Maryline Laurent. A new authentication method based on cryptographic identifiers CGAs. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2009, pp.29. ⟨hal-01360031⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01360031/file/RR-Nahla-Abid-EAP-CGA-2009.pdf BibTex
ref_biblio
Monique Becker, Chakib Bekara, AndrĂ©-Luc Beylot, Alexandre Delye, Riadh Dhaou, et al.. Cold chain monitoring using wireless sensor networks : design & experimental feedback. [Research Report] RR-09007–RST, TĂ©lĂ©com Sud Paris. 2009. ⟨hal-03975329⟩
AccĂšs au bibtex
BibTex
ref_biblio
Wassim Drira, Chakib Bekara, Maryline Laurent. Secure aggregation in wireless sensor networks. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2009, pp.58. ⟨hal-01360043⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01360043/file/RR_securite_Capteurs-Aggregation-WassimDRIRA-2009.pdf BibTex
ref_biblio
Claire SondĂšs Larafa, Maryline Laurent. Distributed AAA framework for MANET: performance analysis. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2009, pp.34. ⟨hal-01360029⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01360029/file/RR-Sondes-Larafa-AAA-Manet-Performance.pdf BibTex
ref_biblio
Amina Mekki Mokhtar, Kheira Bekara, Maryline Laurent. Un protocole pour la nĂ©gociation des politiques de privacy. [Rapport de recherche] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2009, pp.55. ⟨hal-01369889⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01369889/file/RR-Amina-Mekki-Negot-Pol-2009-1.pdf BibTex

2008

ref_biblio
Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental experience with Host Identity Protocol (HIP). [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.58. ⟨hal-01373423⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01373423/file/RR-HIP-Mesures-NahlaABID-2008.pdf BibTex
ref_biblio
Aymen Boudguiga, Tony Cheneau, Maryline Laurent. Usage and performance of cryptographically generated addresses. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.94. ⟨hal-01373433⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01373433/file/RR-Boudguiga-CGA-Performance.pdf BibTex
ref_biblio
Wassim Drira, Chakib Bekara, Maryline Laurent. SĂ©curitĂ© dans les rĂ©seaux de capteurs sans fil : conception et implĂ©mentation. [Rapport de recherche] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.55. ⟨hal-01373430⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01373430/file/RR_securite_Capteurs-Implem-WassimDRIRA-2008.pdf BibTex
ref_biblio
Houssem Jarraya, Maryline Laurent. Un systĂšme de sauvegarde P2P sĂ©curisĂ© s'appuyant sur une architecture AAA. [Rapport de recherche] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.55. ⟨hal-01373441⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01373441/file/RR_securite_P2P.pdf BibTex
ref_biblio
Willy Ronald Jimenez Freitez, Hakima Chaouchi, Maryline Laurent. Authentication services in mobile ad hoc networks. [Research Report] DĂ©pt. Logiciels-RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis); Services rĂ©partis, Architectures, MOdĂ©lisation, Validation, Administration des RĂ©seaux (Institut Mines-TĂ©lĂ©com-TĂ©lĂ©com SudParis-CNRS). 2008, pp.41. ⟨hal-01373823⟩
AccÚs au texte intégral et bibtex
https://hal.science/hal-01373823/file/RR-Willy-Jimenez-Virtualisationb-AAA-AdHoc.pdf BibTex

Pré-publication, Document de travail

2024

ref_biblio
Claire Levallois-Barth, Maryline Laurent. Les acteurs de l'Ă©cosystĂšme technique relatifs aux identitĂ©s numĂ©riques - ÉcosystĂšme Ă©largi Ă  la fourniture d'attributs, de justificatifs, de signatures Ă©lectroniques et de portefeuilles d'identitĂ© numĂ©rique, working paper. 2024. ⟨halshs-04430701⟩
AccÚs au texte intégral et bibtex
https://shs.hal.science/halshs-04430701/file/2024%2001%20C%20LEVALLOIS%20M%20LAURENT%20acteurs%20identites%20numeriques.pdf BibTex