{"id":3567,"date":"2022-04-14T12:09:12","date_gmt":"2022-04-14T10:09:12","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/nesrine-kaaniche\/"},"modified":"2022-04-14T12:09:12","modified_gmt":"2022-04-14T10:09:12","slug":"nesrine-kaaniche","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/nesrine-kaaniche\/","title":{"rendered":"Nesrine KAANICHE"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/10\/kaaniche-150x150.jpg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Nesrine <span class=\"MonLabo-lastname\">KAANICHE<\/span><\/h1><div class=\"coordonnees\"><em>Ma\u00eetre de Conf\u00e9rences<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=3763\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">SCN<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">kaaniche.nesrine[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent, Claire Levallois-Barth, Nesrine Kaaniche. Perspectives on national digital identity systems. <i>Blockchain: Research and Applications<\/i>, 2025, pp.100429. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.bcra.2025.100429\">&#x27E8;10.1016\/j.bcra.2025.100429&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05433540v1\">&#x27E8;hal-05433540&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2310.01006\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2310.01006\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05433540v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki. Secure and resilient 6\u00a0G RAN networks: a decentralized approach with zero trust architecture. <i>Journal of Network and Systems Management<\/i>, 2024, 32 (33), <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10922-024-09807-x\">&#x27E8;10.1007\/s10922-024-09807-x&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04610740v1\">&#x27E8;hal-04610740&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04610740\/file\/ZeroTrust___6G-3.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04610740\/file\/ZeroTrust___6G-3.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04610740\/file\/ZeroTrust___6G-3.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04610740v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hichem Sedjelmaci, Nesrine Kaaniche, Aymen Boudguiga, Nirwan Ansari. Secure attack detection framework for hierarchical 6G-enabled internet of vehicles. <i>IEEE Transactions on Vehicular Technology<\/i>, 2023, 73 (2), pp.1-11. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TVT.2023.3317940\">&#x27E8;10.1109\/TVT.2023.3317940&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04227768v1\">&#x27E8;hal-04227768&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04227768\/file\/_Extension_ICC_2022__FL___SIEM.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04227768\/file\/_Extension_ICC_2022__FL___SIEM.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04227768\/file\/_Extension_ICC_2022__FL___SIEM.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04227768v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos. SigML++: supervised log anomaly with probabilistic polynomial approximation. <i>Cryptography<\/i>, 2023, 7 (4), pp.52. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/cryptography7040052\">&#x27E8;10.3390\/cryptography7040052&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04304189v1\">&#x27E8;hal-04304189&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04304189\/file\/MDPI_Article_Template.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04304189\/file\/MDPI_Article_Template.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04304189\/file\/MDPI_Article_Template.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04304189v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh. Analysis of attribute\u2010based cryptographic techniques and their application to protect cloud services. <i>Transactions on emerging telecommunications technologies<\/i>, 2022, 33 (3), pp.1-20. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/ett.3667\">&#x27E8;10.1002\/ett.3667&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03990998v1\">&#x27E8;hal-03990998&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03990998\/file\/Analysis_of_Attribute_Based_Cryptographic_Techniques_and_Their_Application_to_Protect_Cloud_Services__FinalVersion-3-22.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03990998\/file\/Analysis_of_Attribute_Based_Cryptographic_Techniques_and_Their_Application_to_Protect_Cloud_Services__FinalVersion-3-22.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03990998\/file\/Analysis_of_Attribute_Based_Cryptographic_Techniques_and_Their_Application_to_Protect_Cloud_Services__FinalVersion-3-22.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03990998v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent. SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. <i>IEEE Access<\/i>, 2022, 10, pp.106400-106414. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2022.3208697\">&#x27E8;10.1109\/ACCESS.2022.3208697&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04227764v1\">&#x27E8;hal-04227764&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04227764\/file\/SPOT_IEEEAccess.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04227764\/file\/SPOT_IEEEAccess.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04227764\/file\/SPOT_IEEEAccess.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04227764v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. PIMA: a privacy-preserving identity management system based on an unlinkable MAlleable signature. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2022, 208 (103517), pp.1-35. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2022.103517\">&#x27E8;10.1016\/j.jnca.2022.103517&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03793163v1\">&#x27E8;hal-03793163&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03793163\/file\/JNCA2022_PIMA.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03793163\/file\/JNCA2022_PIMA.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03793163\/file\/JNCA2022_PIMA.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03793163v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. <i>IEEE Transactions on Cloud Computing<\/i>, 2022, 10 (1), pp.216-233. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/tcc.2019.2931896\">&#x27E8;10.1109\/tcc.2019.2931896&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991044v1\">&#x27E8;hal-03991044&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991044\/file\/Final_version.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991044\/file\/Final_version.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991044\/file\/Final_version.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991044v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mika\u00ebl Ates, Maryline Laurent, Paul Marillonnet, Nesrine Kaaniche. An efficient user-centric consent management design for multiservices platforms. <i>Security and communication networks<\/i>, 2021, 2021, pp.1 - 19. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1155\/2021\/5512075\">&#x27E8;10.1155\/2021\/5512075&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991134v1\">&#x27E8;hal-03991134&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991134\/file\/5512075.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991134\/file\/5512075.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991134\/file\/5512075.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991134v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Sebastien Canard. Cooperative set homomorphic proofs for data possession checking in clouds. <i>IEEE Transactions on Cloud Computing<\/i>, 2021, 9 (1), pp.102-117. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TCC.2018.2865343\">&#x27E8;10.1109\/TCC.2018.2865343&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01991145v1\">&#x27E8;hal-01991145&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01991145v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hassan Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, et al.. TRESC: Towards redesigning existing symmetric ciphers. <i>Microprocessors and Microsystems: Embedded Hardware Design <\/i>, 2021, 87, pp.103478 (11). <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03549341v1\">&#x27E8;hal-03549341&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03549341\/file\/79f3e9fe-c069-4080-a1a4-3d2fbb9a8611-author.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03549341\/file\/79f3e9fe-c069-4080-a1a4-3d2fbb9a8611-author.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03549341\/file\/79f3e9fe-c069-4080-a1a4-3d2fbb9a8611-author.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03549341v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Giovanni Russello. CUPS: secure opportunistic cloud of things framework based on attribute\u2010based encryption scheme supporting access policy update. <i>Security and Privacy <\/i>, 2020, 3 (4), pp.1-24. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/spy2.85\">&#x27E8;10.1002\/spy2.85&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991066v1\">&#x27E8;hal-03991066&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991066\/file\/CUPS.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991066\/file\/CUPS.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991066\/file\/CUPS.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991066v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. <i>Journal of Parallel and Distributed Computing<\/i>, 2020, 135, pp.1-20. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jpdc.2019.08.014\">&#x27E8;10.1016\/j.jpdc.2019.08.014&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03990990v1\">&#x27E8;hal-03990990&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03990990\/file\/InsPABAC%2520%25288%2529.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03990990\/file\/InsPABAC%2520%25288%2529.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03990990\/file\/InsPABAC%2520%25288%2529.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03990990v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi. PROUD: verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. <i>Future Generation Computer Systems<\/i>, 2020, 111, pp.899-918. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.future.2019.11.012\">&#x27E8;10.1016\/j.future.2019.11.012&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03990965v1\">&#x27E8;hal-03990965&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03990965\/file\/_IEEE_TCC_FGCS_SI_Securely_Outsourcing_Constant_size_Threshold_Attribute_Based_SignCryption_for_Cloud_Assisted_IoT_Applications.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03990965\/file\/_IEEE_TCC_FGCS_SI_Securely_Outsourcing_Constant_size_Threshold_Attribute_Based_SignCryption_for_Cloud_Assisted_IoT_Applications.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03990965\/file\/_IEEE_TCC_FGCS_SI_Securely_Outsourcing_Constant_size_Threshold_Attribute_Based_SignCryption_for_Cloud_Assisted_IoT_Applications.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03990965v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. <i>Frontiers in Blockchain<\/i>, 2020, 3 (17), pp.1-12. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3389\/fbloc.2020.00017\">&#x27E8;10.3389\/fbloc.2020.00017&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991089v1\">&#x27E8;hal-03991089&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991089\/file\/fbloc-03-00017.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991089\/file\/fbloc-03-00017.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991089\/file\/fbloc-03-00017.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991089v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2020, 171, pp.102807. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2020.102807\">&#x27E8;10.1016\/j.jnca.2020.102807&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03990971v1\">&#x27E8;hal-03990971&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03990971\/file\/_JNCA____Survey_PETS.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03990971\/file\/_JNCA____Survey_PETS.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03990971\/file\/_JNCA____Survey_PETS.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03990971v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Paul Yaacoub, Ola Salman, Hassan N Noura, Nesrine Kaaniche, Ali Chehab, et al.. Cyber-physical systems security: limitations, issues and future trends. <i>Microprocessors and Microsystems: Embedded Hardware Design <\/i>, 2020, 77, pp.103201. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.micpro.2020.103201\">&#x27E8;10.1016\/j.micpro.2020.103201&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03990927v1\">&#x27E8;hal-03990927&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03990927\/file\/1-s2.0-S0141933120303689-main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03990927\/file\/1-s2.0-S0141933120303689-main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03990927\/file\/1-s2.0-S0141933120303689-main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03990927v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Chistophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro. Anonymous certification for E-assessment opinion polls. <i>Journal of Ambient Intelligence and Humanized Computing<\/i>, 2019, 14, pp.14979-14993. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12652-019-01545-2\">&#x27E8;10.1007\/s12652-019-01545-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991234v1\">&#x27E8;hal-03991234&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991234v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IOT. <i>Computer Networks<\/i>, 2018, 133, pp.141 - 156. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comnet.2018.01.036\">&#x27E8;10.1016\/j.comnet.2018.01.036&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01773931v1\">&#x27E8;hal-01773931&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01773931\/file\/2018-JCN-PHOABE-Sana-Nesrine.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01773931\/file\/2018-JCN-PHOABE-Sana-Nesrine.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01773931\/file\/2018-JCN-PHOABE-Sana-Nesrine.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01773931v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. <i>Computer Communications<\/i>, 2017, 111, pp.120 - 141. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comcom.2017.07.006\">&#x27E8;10.1016\/j.comcom.2017.07.006&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01576979v1\">&#x27E8;hal-01576979&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01576979v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">H\u00e9ber H. Arcolezi, Mina Alishahi, Adda-Akram Bendoukha, Nesrine Kaaniche. Fair play for individuals, foul play for groups? Auditing anonymization\u2019s impact on ML fairness. <i>28th European Conference on Artificial Intelligence (ECAI )<\/i>, Oct 2025, Bologna, Italy. pp.1009 - 1018, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3233\/FAIA250909\">&#x27E8;10.3233\/FAIA250909&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-05386310v1\">&#x27E8;hal-05386310&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-05386310\/file\/2505.07985v2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05386310\/file\/2505.07985v2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05386310\/file\/2505.07985v2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05386310v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adda-Akram Bendoukha, H\u00e9ber H. Arcolezi, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey, et al.. FADE: federated aggregation with discrimination elimination. <i>FAccT 2025 - ACM Conference on Fairness, Accountability, and Transparency (FAccT)<\/i>, Jun 2025, Ath\u00e8nes, Greece. pp.1-14. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05105146v1\">&#x27E8;hal-05105146&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05105146\/file\/Fade_FL__FaccT_2025_%20%2810%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05105146\/file\/Fade_FL__FaccT_2025_%20%2810%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05105146\/file\/Fade_FL__FaccT_2025_%20%2810%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05105146v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adda-Akram Bendoukha, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey. FairCognizer: A model for accurate predictions with inherent fairness evaluation (extended abstract). <i>IJCAI 2025 - the 34th International Joint Conference on Artificial Intelligence<\/i>, Aug 2025, Montreal, Canada. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05105245v2\">&#x27E8;hal-05105245v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05105245\/file\/FairCognizer__IJCAI_%20%2812%29-1.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05105245\/file\/FairCognizer__IJCAI_%20%2812%29-1.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05105245\/file\/FairCognizer__IJCAI_%20%2812%29-1.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05105245v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adda-Akram Bendoukha, Renaud Sirdey, Aymen Boudguiga, Nesrine Kaaniche. Unveiling the (in) security of threshold FHE-based federated learning: the practical impact of recent CPA D attacks. <i>2025 IEEE 38th Computer Security Foundations Symposium (CSF)<\/i>, Jun 2025, Santa cruz, United States. pp.378-393. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05105133v1\">&#x27E8;hal-05105133&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05105133\/file\/CSF_216_camera_ready.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05105133\/file\/CSF_216_camera_ready.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05105133\/file\/CSF_216_camera_ready.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05105133v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adda-Akram Bendoukha, Didem Demirag, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey, et al.. Towards privacy-preserving and fairness-aware federated learning framework. <i>Privacy Enhancing Technologies (PETs)<\/i>, Jul 2025, Washinghton, DC, United States. pp.845-865, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.56553\/popets-2025-0044\">&#x27E8;10.56553\/popets-2025-0044&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04782394v1\">&#x27E8;hal-04782394&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04782394\/file\/popets-2025-0044.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04782394\/file\/popets-2025-0044.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04782394\/file\/popets-2025-0044.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04782394v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Gustavo Gonzalez Granadillo, Nesrine Kaaniche. AI-based anomaly detection and classification of traffic using netflow. <i>The 22nd International Conference on Security and Cryptography (SECRYPT)<\/i>, Jun 2025, Bilabo, Spain. pp.644-649, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0013552700003979\">&#x27E8;10.5220\/0013552700003979&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05105183v1\">&#x27E8;hal-05105183&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05105183\/file\/SECRYPT_2025_102_CR.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05105183\/file\/SECRYPT_2025_102_CR.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05105183\/file\/SECRYPT_2025_102_CR.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05105183v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Adda-Akram Bendoukha, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey. FairCognizer: a model for accurate predictions with inherent fairness evaluation. <i>27TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI)<\/i>, Oct 2024, Santiago de Compostela, SPAIN, Spain. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3233\/FAIA240592\">&#x27E8;10.3233\/FAIA240592&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04745438v1\">&#x27E8;hal-04745438&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04745438\/file\/FairCognizer__ECAI_2024_-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04745438\/file\/FairCognizer__ECAI_2024_-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04745438\/file\/FairCognizer__ECAI_2024_-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04745438v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. Differentially-private data aggregation over encrypted location data for range counting query. <i>2024 International Conference on Information Networking (ICOIN)<\/i>, Jan 2024, Ho Chi Minh City, Vietnam. pp.409-414, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICOIN59985.2024.10572074\">&#x27E8;10.1109\/ICOIN59985.2024.10572074&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04645794v1\">&#x27E8;hal-04645794&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04645794\/file\/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04645794\/file\/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04645794\/file\/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04645794v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez-Granadillo. Efficient hybrid model for intrusion detection systems. <i>19th International Conference on Security and Cryptography (SECRYPT)<\/i>, Jul 2022, Lisbon, Portugal. pp.694-700, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011328300003283\">&#x27E8;10.5220\/0011328300003283&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04137867v1\">&#x27E8;hal-04137867&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04137867\/file\/Secrypt2022.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04137867\/file\/Secrypt2022.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04137867\/file\/Secrypt2022.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04137867v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information. <i>19th International Conference E-Business and Telecommunications (ICSBT)<\/i>, Jul 2022, Lisbon (Portugal), Portugal. pp.1-19, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-45137-9_1\">&#x27E8;10.1007\/978-3-031-45137-9_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04227767v1\">&#x27E8;hal-04227767&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04227767\/file\/Springer_SPOT_.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04227767\/file\/Springer_SPOT_.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04227767\/file\/Springer_SPOT_.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04227767v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SEVIL: secure and efficient verifIcation over massive proofs of knowLedge. <i>19th International Conference on Security and Cryptography (SECRYPT)<\/i>, Jul 2022, Lisbon, Portugal. pp.13-24, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011125800003283\">&#x27E8;10.5220\/0011125800003283&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03997364v1\">&#x27E8;hal-03997364&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03997364\/file\/2022-SECRYPT_SEVIL-Masmoudi.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03997364\/file\/2022-SECRYPT_SEVIL-Masmoudi.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03997364\/file\/2022-SECRYPT_SEVIL-Masmoudi.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03997364v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche. Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. <i>IEEE International Conference on Communications(ICC )<\/i>, May 2022, Seoul, South Korea. pp.5238-5243, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICC45855.2022.9838338\">&#x27E8;10.1109\/ICC45855.2022.9838338&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04069291v1\">&#x27E8;hal-04069291&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04069291\/file\/ICC_New%20version.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04069291\/file\/ICC_New%20version.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04069291\/file\/ICC_New%20version.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04069291v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. <i>17th International Conference on Security and Cryptography (SECRYPT)<\/i>, Jul 2020, Lieusaint - Paris, France. pp.225-237, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0009889302250237\">&#x27E8;10.5220\/0009889302250237&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991163v1\">&#x27E8;hal-03991163&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991163\/file\/SECRYPT2020_ProvSGX.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991163\/file\/SECRYPT2020_ProvSGX.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991163\/file\/SECRYPT2020_ProvSGX.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991163v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. <i>the 35th Annual ACM Symposium on Applied Computing(ACM)<\/i>, Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3341105.3373947\">&#x27E8;10.1145\/3341105.3373947&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991100v1\">&#x27E8;hal-03991100&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991100\/file\/_SAC2020_DADS_Priv_Preserv_Search.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991100\/file\/_SAC2020_DADS_Priv_Preserv_Search.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991100\/file\/_SAC2020_DADS_Priv_Preserv_Search.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991100v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Paul Marillonnet, Mika\u00ebl Ates, Maryline Laurent, Nesrine Kaaniche. An identity-matching process to strengthen trust in federated-identity architectures. <i>17th International Conference on Security and Cryptography (SECRYPT)<\/i>, Jul 2020, Lieusaint - Paris, France. pp.142-154, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0009828401420154\">&#x27E8;10.5220\/0009828401420154&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991153v1\">&#x27E8;hal-03991153&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991153\/file\/id_matching.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991153\/file\/id_matching.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991153\/file\/id_matching.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991153v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche. Authledger: a novel Blockchain-based domain name authentication scheme. <i>5th International Conference on Information Systems Security and Privacy(ICISSP)<\/i>, Feb 2019, Prague, Czech Republic. pp.345-352, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0007366803450352\">&#x27E8;10.5220\/0007366803450352&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991038v1\">&#x27E8;hal-03991038&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991038\/file\/AuthLedger__A_Novel_Blockchain_based_Domain_Name_Authentication_Scheme_Original.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991038\/file\/AuthLedger__A_Novel_Blockchain_based_Domain_Name_Authentication_Scheme_Original.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991038\/file\/AuthLedger__A_Novel_Blockchain_based_Domain_Name_Authentication_Scheme_Original.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991038v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Giovanni Russello. Lightweight attribute-based encryption supporting access policy update for cloud assited IoT. <i>Secrypt 2018: 15th International Conference on Security and Cryptography<\/i>, Jul 2018, Porto, Portugal. pp.135-146, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006854603010312\">&#x27E8;10.5220\/0006854603010312&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991119v1\">&#x27E8;hal-03991119&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991119\/file\/_SECRYPT_2018_PU_ABE__Lightweight_Attribute_Based_Encryption_Supporting_Access_Policy_Update_for_Cloud_Assitsed_IoT.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991119\/file\/_SECRYPT_2018_PU_ABE__Lightweight_Attribute_Based_Encryption_Supporting_Access_Policy_Update_for_Cloud_Assitsed_IoT.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991119\/file\/_SECRYPT_2018_PU_ABE__Lightweight_Attribute_Based_Encryption_Supporting_Access_Policy_Update_for_Cloud_Assitsed_IoT.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991119v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello. Coop-DAAB: cooperative attribute based data aggregation for internet of things applications. <i>On the Move to Meaningful Internet Systems. OTM 2018 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018,<\/i>, Oct 2018, Valetta,, Malta. pp.498-515, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-02610-3_28\">&#x27E8;10.1007\/978-3-030-02610-3_28&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991056v1\">&#x27E8;hal-03991056&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991056\/file\/Coop_DAAB__Cooperative_Attribute_Based_Data_Aggregation_for_Internet_of_Things_Applications.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991056\/file\/Coop_DAAB__Cooperative_Attribute_Based_Data_Aggregation_for_Internet_of_Things_Applications.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991056\/file\/Coop_DAAB__Cooperative_Attribute_Based_Data_Aggregation_for_Internet_of_Things_Applications.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991056v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. BDUA: blockchain-based data usage auditing. <i>2018 IEEE 11th International Conference on Cloud Computing (CLOUD)<\/i>, Jul 2018, San Francisco, United States. pp.630-637, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CLOUD.2018.00087\">&#x27E8;10.1109\/CLOUD.2018.00087&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754087v1\">&#x27E8;hal-03754087&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03754087\/file\/2018-ieeecloud-bdua-blockchain.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03754087\/file\/2018-ieeecloud-bdua-blockchain.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03754087\/file\/2018-ieeecloud-bdua-blockchain.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03754087v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Jung Eunjin, Ashish Gehani. Efficiently validating aggregated IoT data integrity. <i>2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService)<\/i>, Mar 2018, Bamberg, Germany. pp.17897073, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BigDataService.2018.00046\">&#x27E8;10.1109\/BigDataService.2018.00046&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991079v1\">&#x27E8;hal-03991079&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991079\/file\/BDS-2018.Homomorphic.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991079\/file\/BDS-2018.Homomorphic.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991079\/file\/BDS-2018.Homomorphic.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991079v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. <i>SECRYPT 2018: 15th International Conference on Security and Cryptography<\/i>, Jul 2018, Porto, Portugal. pp.155 - 167, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006855501550167\">&#x27E8;10.5220\/0006855501550167&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01850387v1\">&#x27E8;hal-01850387&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01850387\/file\/2018-SECRYPT-SABE-Multi-level-AC.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01850387\/file\/2018-SECRYPT-SABE-Multi-level-AC.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01850387\/file\/2018-SECRYPT-SABE-Multi-level-AC.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01850387v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Sana Belguith, Giovanni Russello. EMA-LAB: efficient multi authorisation level attribute based access control. <i>International Conference on Network and System Security (NSS)<\/i>, Aug 2018, Hong Kong, China. pp.187-201, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-02744-5_14\">&#x27E8;10.1007\/978-3-030-02744-5_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991168v1\">&#x27E8;hal-03991168&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991168\/file\/ema-lab-efficient2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991168\/file\/ema-lab-efficient2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991168\/file\/ema-lab-efficient2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991168v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. <i>SECRYPT 2018: 15th International Conference on Security and Cryptography<\/i>, Jul 2018, Porto, Portugal. pp.168 - 176, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006855601680176\">&#x27E8;10.5220\/0006855601680176&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01864317v1\">&#x27E8;hal-01864317&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01864317\/file\/2018-SECRYPT-BC-based-AC.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01864317\/file\/2018-SECRYPT-BC-based-AC.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01864317\/file\/2018-SECRYPT-BC-based-AC.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01864317v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Nesrine Kaaniche. Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IOT applications. <i>2018 CLOUD 11th International Conference on Cloud Computing<\/i>, Jul 2018, San Francisco, France. pp.590-597, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CLOUD.2018.00082\">&#x27E8;10.1109\/CLOUD.2018.00082&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754091v1\">&#x27E8;hal-03754091&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03754091\/file\/2018-ieeecloud-aggregatecp-abe.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03754091\/file\/2018-ieeecloud-aggregatecp-abe.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03754091\/file\/2018-ieeecloud-aggregatecp-abe.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03754091v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for internet-based personal assistants. <i>DPM 2018: 13th International Workshop on Data Privacy Management<\/i>, Sep 2018, Barcelona, Spain. pp.431 - 440, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-00305-0_31\">&#x27E8;10.1007\/978-3-030-00305-0_31&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01991849v1\">&#x27E8;hal-01991849&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01991849v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Constant-size threshold attribute based signcryption for cloud applications. <i>SECRYPT 2017 : 14th International Conference on Security and Cryptography<\/i>, Jul 2017, Madrid, Spain. pp.212 - 225, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006469202120225\">&#x27E8;10.5220\/0006469202120225&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01575575v1\">&#x27E8;hal-01575575&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01575575\/file\/2017-SECRYPT-ABSC-Sana-Belguith.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01575575\/file\/2017-SECRYPT-ABSC-Sana-Belguith.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01575575\/file\/2017-SECRYPT-ABSC-Sana-Belguith.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01575575v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. <i>DPM 2017 : 12th International Workshop on Data Privacy Management<\/i>, Sep 2017, Oslo, Norway. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01702450v1\">&#x27E8;hal-01702450&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01702450v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. Attribute based encryption for multi-level access control policies. <i>SECRYPT 2017 : 14th International Conference on Security and Cryptography<\/i>, Jul 2017, Madrid, Spain. pp.67 - 78, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006421000670078\">&#x27E8;10.5220\/0006421000670078&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01575560v1\">&#x27E8;hal-01575560&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01575560\/file\/2017-SECRYPT-Multi-levelAccess-ehealth-ABC.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01575560\/file\/2017-SECRYPT-Multi-levelAccess-ehealth-ABC.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01575560\/file\/2017-SECRYPT-Multi-levelAccess-ehealth-ABC.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01575560v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. Security SLA based monitoring in clouds. <i>EDGE 2017 : 1st International Conference on Edge Computing<\/i>, Jun 2017, Honolulu, United States. pp.90 - 97, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/IEEE.EDGE.2017.20\">&#x27E8;10.1109\/IEEE.EDGE.2017.20&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01593433v1\">&#x27E8;hal-01593433&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01593433\/file\/2017-EDGE-Secure_SLA-IBM-Nesrine.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01593433\/file\/2017-EDGE-Secure_SLA-IBM-Nesrine.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01593433\/file\/2017-EDGE-Secure_SLA-IBM-Nesrine.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01593433v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. <i>DPM 2017 : 12th International Workshop on Data Privacy Management<\/i>, Sep 2017, Oslo, Norway. pp.239 - 256, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-67816-0_14\">&#x27E8;10.1007\/978-3-319-67816-0_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01593430v1\">&#x27E8;hal-01593430&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01593430v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. A blockchain-based data usage auditing architecture with enhanced privacy and availability. <i>NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications<\/i>, Oct 2017, Cambridge, United States. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA.2017.8171384\">&#x27E8;10.1109\/NCA.2017.8171384&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01682227v1\">&#x27E8;hal-01682227&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01682227\/file\/2017-NCA-Auditable-consent-with-Blockchain.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01682227\/file\/2017-NCA-Auditable-consent-with-Blockchain.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01682227\/file\/2017-NCA-Auditable-consent-with-Blockchain.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01682227v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. <i>NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems<\/i>, Nov 2017, Tartu, Estonia. pp.70 - 85, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-70290-2_5\">&#x27E8;10.1007\/978-3-319-70290-2_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01699347v1\">&#x27E8;hal-01699347&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01699347v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds. <i>SECRYPT 2016 : 13th International Conference on Security and Cryptography<\/i>, Jul 2016, Lisbon, Portugal. pp.133 - 146, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0005968201330146\">&#x27E8;10.5220\/0005968201330146&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01391253v1\">&#x27E8;hal-01391253&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01391253\/file\/2016-SECRYPT-PAbAC-Belguith-Kaaniche.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01391253\/file\/2016-SECRYPT-PAbAC-Belguith-Kaaniche.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01391253\/file\/2016-SECRYPT-PAbAC-Belguith-Kaaniche.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01391253v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. Attribute-based signatures for supporting anonymous certification. <i>ESORICS 2016 : 21st European Symposium on Research in Computer Security<\/i>, Sep 2016, Heraklion, Greece. pp.279 - 300, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-45744-4_14\">&#x27E8;10.1007\/978-3-319-45744-4_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01391343v1\">&#x27E8;hal-01391343&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01391343\/file\/2016-ESORICS-Anonymous-Certification-Nesrine-Kaaniche.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01391343\/file\/2016-ESORICS-Anonymous-Certification-Nesrine-Kaaniche.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01391343\/file\/2016-ESORICS-Anonymous-Certification-Nesrine-Kaaniche.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01391343v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, S\u00e9bastien Canard. A novel proof of data possession scheme based on set-homomorphic operations. <i>SEC2 2016 : 2e atelier sur la S\u00e9curit\u00e9 dans les Clouds<\/i>, Jul 2016, Lorient, France. pp.1 - 4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01390987v1\">&#x27E8;hal-01390987&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01390987v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, S\u00e9bastien Canard. A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations. <i>Proc. 2e atelier sur la S\u00e9curit\u00e9 dans les Clouds<\/i>, Feb 2016, paris, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991200v1\">&#x27E8;hal-03991200&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991200\/file\/kaaniche-paper.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991200\/file\/kaaniche-paper.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991200\/file\/kaaniche-paper.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991200v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. SHoPS: Set Homomorphic Proof of data Possession Scheme in cloud storage applications. <i>Services 2015 : IEEE World Congress on Services <\/i>, Jun 2015, New York, United States. pp.143 - 150, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SERVICES.2015.29\">&#x27E8;10.1109\/SERVICES.2015.29&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01254993v1\">&#x27E8;hal-01254993&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01254993\/file\/2015-CLOUD-SHOPS.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01254993\/file\/2015-CLOUD-SHOPS.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01254993\/file\/2015-CLOUD-SHOPS.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01254993v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. A secure client side deduplication scheme in cloud storage environments. <i>NTMS 2014 : 6th International Conference on New Technologies, Mobility and Security <\/i>, Mar 2014, Dubai, United Arab Emirates. pp.1 - 7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2014.6814002\">&#x27E8;10.1109\/NTMS.2014.6814002&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263425v1\">&#x27E8;hal-01263425&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263425\/file\/2014-NTMS-Nesrine.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263425\/file\/2014-NTMS-Nesrine.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263425\/file\/2014-NTMS-Nesrine.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263425v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Mohammed El Barbori. CloudaSec : a novel public-key based framework to handle data sharing security in clouds. <i>SECRYPT 2014 : 11th International Conference on Security and Cryptography<\/i>, Aug 2014, Vienne, Austria. pp.5 - 18, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0005010600050018\">&#x27E8;10.5220\/0005010600050018&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263351v1\">&#x27E8;hal-01263351&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263351\/file\/2014-SECRYPT%20CloudaSEC-enligne.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263351\/file\/2014-SECRYPT%20CloudaSEC-enligne.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263351\/file\/2014-SECRYPT%20CloudaSEC-enligne.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263351v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Ethmane El Moustaine, Maryline Laurent. A novel zero-knowledge scheme for proof of data possession in cloud storage applications. <i>CCGRID 2014 : 14th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing <\/i>, May 2014, Chicago, United States. pp.522 - 531, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCGrid.2014.81\">&#x27E8;10.1109\/CCGrid.2014.81&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263463v1\">&#x27E8;hal-01263463&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263463\/file\/2014-CCGRID-ZeroKnowPDPScheme.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263463\/file\/2014-CCGRID-ZeroKnowPDPScheme.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263463\/file\/2014-CCGRID-ZeroKnowPDPScheme.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263463v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent. ID based cryptography for secure cloud data storage. <i>CLOUD 2013 : IEEE 6th International Conference on Cloud Computing<\/i>, Jun 2013, Santa Clara, CA, United States. pp.375-382, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CLOUD.2013.80\">&#x27E8;10.1109\/CLOUD.2013.80&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01275089v1\">&#x27E8;hal-01275089&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01275089\/file\/2013-cloud-IDbased-cloudstorage.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01275089\/file\/2013-cloud-IDbased-cloudstorage.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01275089\/file\/2013-cloud-IDbased-cloudstorage.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01275089v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Autre publication scientifique<\/p>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent, Claire Levallois-Barth, Nesrine Kaaniche. Comparative analysis of technical and legal frameworks of various national digial identity solutions. 2023, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.48550\/arXiv.2310.01006\">&#x27E8;10.48550\/arXiv.2310.01006&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04931054v1\">&#x27E8;hal-04931054&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2310.01006\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2310.01006\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04931054v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Th\u00e8se<\/p>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche. Cloud data storage security based on cryptographic mechanisms. Cryptography and Security [cs.CR]. Institut National des T\u00e9l\u00e9communications, 2014. English. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/2014TELE0033\">&#x27E8;NNT : 2014TELE0033&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/theses.hal.science\/tel-01146029v1\">&#x27E8;tel-01146029&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/theses.hal.science\/tel-01146029\/file\/TheseKAANICHENesrine.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/theses.hal.science\/tel-01146029\/file\/TheseKAANICHENesrine.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/theses.hal.science\/tel-01146029\/file\/TheseKAANICHENesrine.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/theses.hal.science\/tel-01146029v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Pr\u00e9-publication, Document de travail<\/p>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claudio Bellei, Hussain Alattas, Nesrine Kaaniche. Label-GCN: an effective method for adding label propagation to graph convolutional networks. 2024. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991083v1\">&#x27E8;hal-03991083&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991083\/file\/2104.02153.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991083\/file\/2104.02153.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991083\/file\/2104.02153.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991083v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4483,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-3567","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3567"}],"version-history":[{"count":0,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3567\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4483"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}