{"id":3570,"date":"2022-04-14T15:08:38","date_gmt":"2022-04-14T13:08:38","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/acmes-2\/maryline-laurent-2\/"},"modified":"2022-04-14T15:08:54","modified_gmt":"2022-04-14T13:08:54","slug":"maryline-laurent-2","status":"publish","type":"page","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/acmes-2\/maryline-laurent-2\/","title":{"rendered":"Maryline LAURENT"},"content":{"rendered":"<p><div class=\"bandeau-personnel MonLaboUser\"><img decoding=\"async\" src=\"https:\/\/samovar.telecom-sudparis.eu\/wp-content\/uploads\/2022\/10\/maryline-150x150.jpg\" class=\"wp-image-6 alignleft img-arrondi wp-post-image\" height=\"150\" width=\"150\" alt=\" \" \/><div class=\"adresse\"><p>SAMOVAR - SAMOVAR<br \/>Telecom SudParis<br \/>\r\n9 rue Charles Fourier<br \/>\r\n91011 EVRY CEDEX<\/p><p>Fax : +33 (0) 1 60 76 20 80<\/p><\/div><div class=\"monlaboBlocTexte\"><h1>Pr. Maryline <span class=\"MonLabo-lastname\">Laurent<\/span><\/h1><div class=\"coordonnees\"><em>Professeur<\/em><br \/><span class=\"team-description\"><a href=\"https:\/\/samovar.telecom-sudparis.eu\/?page_id=3763\" class=\"MonLaboLink\"><span class=\"MonLabo_team_name\">SCN<\/span><\/a><\/span><\/div><div class=\"coordonnees\"><span class=\"MonLabo-email\">Maryline.laurent[&#64;<span>-Code to remove to avoid SPAM-<\/span>]telecom-sudparis.eu<\/span><\/div><div class=\"external_url\"><h1 style=\"text-align: center;\"><a href=\"https:\/\/www-public.imtbs-tsp.eu\/~lauren_m\/\"><button class=\"btn btn-oldstyle\" type=\"button\">Site personnel<\/button><\/a><\/h1><\/div><\/div><\/div>\n<div id=\"res_script\">\n<p class='Rubrique'>Article dans une revue<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Omar Cheikhrouhou, Khaleel Mershad, Maryline Laurent, Anis Koubaa. Blockchain and emerging technologies for next generation secure healthcare: a comprehensive survey of applications, challenges, and future directions. <i>Blockchain: Research and Applications<\/i>, 2025, pp.100305. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.bcra.2025.100305\">&#x27E8;10.1016\/j.bcra.2025.100305&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05073957v1\">&#x27E8;hal-05073957&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05073957\/file\/BRA_copy_HAL_Blockchain_for_Next_Generation_Secure_Healthcare_Survey__Springer___AK_Revision___Copy_-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05073957\/file\/BRA_copy_HAL_Blockchain_for_Next_Generation_Secure_Healthcare_Survey__Springer___AK_Revision___Copy_-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05073957\/file\/BRA_copy_HAL_Blockchain_for_Next_Generation_Secure_Healthcare_Survey__Springer___AK_Revision___Copy_-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05073957v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sa\u00efd Ider, Maryline Laurent. GeoFINDR: practical approach to verify cloud instances geolocation in multicloud. <i>Computer Networks<\/i>, 2025, pp.111862. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comnet.2025.111862\">&#x27E8;10.1016\/j.comnet.2025.111862&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/ip-paris.hal.science\/hal-05376087v1\">&#x27E8;hal-05376087&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/ip-paris.hal.science\/hal-05376087\/file\/2504.18685v1-2-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/ip-paris.hal.science\/hal-05376087\/file\/2504.18685v1-2-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/ip-paris.hal.science\/hal-05376087\/file\/2504.18685v1-2-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/ip-paris.hal.science\/hal-05376087v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Antonio L\u00f3pez Mart\u00ednez, Montassar Naghmouchi, Maryline Laurent, Joaqu\u00edn Garc\u00eda Alfaro, Manuel Gil P\u00e9rez, et al.. Breaking barriers in healthcare: A secure identity framework for seamless access. <i>Computer Standards and Interfaces<\/i>, 2025, 95, pp.104020. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.csi.2025.104020\">&#x27E8;10.1016\/j.csi.2025.104020&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05138125v1\">&#x27E8;hal-05138125&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05138125\/file\/breaking%20barriers%20-%20neutral%20template.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05138125\/file\/breaking%20barriers%20-%20neutral%20template.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05138125\/file\/breaking%20barriers%20-%20neutral%20template.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05138125v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent, Claire Levallois-Barth, Nesrine Kaaniche. Perspectives on national digital identity systems. <i>Blockchain: Research and Applications<\/i>, 2025, pp.100429. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.bcra.2025.100429\">&#x27E8;10.1016\/j.bcra.2025.100429&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05433540v1\">&#x27E8;hal-05433540&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2310.01006\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2310.01006\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05433540v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Louis Philippe Sondeck, Maryline Laurent. Practical and ready-to-use methodology to assess the re-identification risk in anonymized datasets. <i>Scientific Reports<\/i>, 2025, 15 (23223), pp.1-11. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1038\/s41598-025-04907-3\">&#x27E8;10.1038\/s41598-025-04907-3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05249960v2\">&#x27E8;hal-05249960v2&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05249960\/file\/ReidentificationRisk-Assessment-Sondeck-Laurent-HAL.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05249960\/file\/ReidentificationRisk-Assessment-Sondeck-Laurent-HAL.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05249960\/file\/ReidentificationRisk-Assessment-Sondeck-Laurent-HAL.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05249960v2\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nathana\u00ebl Denis, Sophie Chabridon, Maryline Laurent. Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2024, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-023-01005-1\">&#x27E8;10.1007\/s12243-023-01005-1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04383612v1\">&#x27E8;hal-04383612&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04383612\/file\/article.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04383612\/file\/article.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04383612\/file\/article.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04383612v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nathanael Denis, Maryline Laurent, Sophie Chabridon. A decentralized model for usage and information flow control in distributed systems. <i>Computers & Security<\/i>, 2024, 144, pp.103975. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2024.103975\">&#x27E8;10.1016\/j.cose.2024.103975&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04644186v1\">&#x27E8;hal-04644186&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04644186v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nathana\u00ebl Denis, Maryline Laurent, Sophie Chabridon. Integrating usage control into distributed ledger technology for internet of things privacy. <i>IEEE Internet of Things Journal<\/i>, 2023, pp.1-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/JIOT.2023.3283300\">&#x27E8;10.1109\/JIOT.2023.3283300&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04121481v1\">&#x27E8;hal-04121481&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04121481\/file\/articleIEEE_hal.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04121481\/file\/articleIEEE_hal.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04121481\/file\/articleIEEE_hal.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04121481v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan. Securing organization\u2019s data: A role-based authorized keyword search scheme with efficient decryption. <i>IEEE Transactions on Cloud Computing<\/i>, 2023, 11 (1), pp.25-43. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TCC.2021.3071304\">&#x27E8;10.1109\/TCC.2021.3071304&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04331375v1\">&#x27E8;hal-04331375&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04331375\/file\/TCC-2004.10952.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04331375\/file\/TCC-2004.10952.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04331375\/file\/TCC-2004.10952.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04331375v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi. Self-Sovereign identity for consented and content-Based access to medical records using Blockchain. <i>Security and communication networks<\/i>, 2023, 2023, pp.1-11. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1155\/2023\/6025789\">&#x27E8;10.1155\/2023\/6025789&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04100562v1\">&#x27E8;hal-04100562&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04100562\/file\/SSI-Hindawi-SCN-Auteur2023.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04100562\/file\/SSI-Hindawi-SCN-Auteur2023.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04100562\/file\/SSI-Hindawi-SCN-Auteur2023.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04100562v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sophie Dram\u00e9-Maign\u00e9, Herv\u00e9 Ganem, Maryline Laurent, Laurent Castillo. Centralized, Distributed, and Everything in between. <i>ACM Computing Surveys<\/i>, 2022, 54 (7), pp.1-34. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3465170\">&#x27E8;10.1145\/3465170&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754002v1\">&#x27E8;hal-03754002&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03754002v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, et al.. Privacy-preserving solution for vehicle parking services complying with EU legislation. <i>PeerJ Computer Science<\/i>, 2022, 8, pp.e1165. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.7717\/peerj-cs.1165\">&#x27E8;10.7717\/peerj-cs.1165&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03997331v1\">&#x27E8;hal-03997331&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03997331\/file\/2022-12-Peer_Journal_Sparta-PP-parkingService.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03997331\/file\/2022-12-Peer_Journal_Sparta-PP-parkingService.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03997331\/file\/2022-12-Peer_Journal_Sparta-PP-parkingService.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03997331v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent. SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. <i>IEEE Access<\/i>, 2022, 10, pp.106400-106414. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2022.3208697\">&#x27E8;10.1109\/ACCESS.2022.3208697&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04227764v1\">&#x27E8;hal-04227764&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04227764\/file\/SPOT_IEEEAccess.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04227764\/file\/SPOT_IEEEAccess.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04227764\/file\/SPOT_IEEEAccess.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04227764v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. PIMA: a privacy-preserving identity management system based on an unlinkable MAlleable signature. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2022, 208 (103517), pp.1-35. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2022.103517\">&#x27E8;10.1016\/j.jnca.2022.103517&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03793163v1\">&#x27E8;hal-03793163&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03793163\/file\/JNCA2022_PIMA.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03793163\/file\/JNCA2022_PIMA.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03793163\/file\/JNCA2022_PIMA.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03793163v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya. Authorized keyword search over outsourced encrypted data in cloud environment. <i>IEEE Transactions on Cloud Computing<\/i>, 2022, 10 (1), pp.216-233. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/tcc.2019.2931896\">&#x27E8;10.1109\/tcc.2019.2931896&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991044v1\">&#x27E8;hal-03991044&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991044\/file\/Final_version.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991044\/file\/Final_version.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991044\/file\/Final_version.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991044v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mika\u00ebl Ates, Maryline Laurent, Paul Marillonnet, Nesrine Kaaniche. An efficient user-centric consent management design for multiservices platforms. <i>Security and communication networks<\/i>, 2021, 2021, pp.1 - 19. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1155\/2021\/5512075\">&#x27E8;10.1155\/2021\/5512075&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991134v1\">&#x27E8;hal-03991134&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991134\/file\/5512075.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991134\/file\/5512075.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991134\/file\/5512075.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991134v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Arie Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang. Practical cross-layer radio frequency-based authentication scheme for internet of things. <i>Sensors<\/i>, 2021, 21 (12), pp.1-19. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3390\/s21124034\">&#x27E8;10.3390\/s21124034&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03753291v1\">&#x27E8;hal-03753291&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03753291\/file\/main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03753291\/file\/main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03753291\/file\/main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03753291v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Sebastien Canard. Cooperative set homomorphic proofs for data possession checking in clouds. <i>IEEE Transactions on Cloud Computing<\/i>, 2021, 9 (1), pp.102-117. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TCC.2018.2865343\">&#x27E8;10.1109\/TCC.2018.2865343&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01991145v1\">&#x27E8;hal-01991145&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01991145v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Paul Lajoie-Mazenc, Maryline Laurent, Franklin Leukam Lako. Privacy-preserving publication of time-series data in smart grid. <i>Security and communication networks<\/i>, 2021, 2021, pp.1-21. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1155\/2021\/6643566\">&#x27E8;10.1155\/2021\/6643566&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754005v1\">&#x27E8;hal-03754005&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03754005v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, et al.. Post-quantum era privacy protection for intelligent infrastructures. <i>IEEE Access<\/i>, 2021, 9, pp.36038 - 36077. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2021.3062201\">&#x27E8;10.1109\/ACCESS.2021.3062201&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03153890v1\">&#x27E8;hal-03153890&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03153890v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Paul Marillonnet, Maryline Laurent, Mika\u00ebl Ates. Personal information self-management: A survey of technologies supporting administrative services. <i>Journal of Computer Science and Technology<\/i>, 2021, 36 (3), pp.664-692. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11390-021-9673-z\">&#x27E8;10.1007\/s11390-021-9673-z&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03753295v1\">&#x27E8;hal-03753295&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03753295\/file\/2109.12968v1.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03753295\/file\/2109.12968v1.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03753295\/file\/2109.12968v1.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03753295v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. <i>Journal of Parallel and Distributed Computing<\/i>, 2020, 135, pp.1-20. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jpdc.2019.08.014\">&#x27E8;10.1016\/j.jpdc.2019.08.014&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03990990v1\">&#x27E8;hal-03990990&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03990990\/file\/InsPABAC%2520%25288%2529.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03990990\/file\/InsPABAC%2520%25288%2529.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03990990\/file\/InsPABAC%2520%25288%2529.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03990990v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Safia Bourahla, Maryline Laurent, Yacine Challal. Privacy preservation for social networks sequential publishing. <i>Computer Networks<\/i>, 2020, 170, pp.107106-1:107106-25. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comnet.2020.107106\">&#x27E8;10.1016\/j.comnet.2020.107106&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02921464v1\">&#x27E8;hal-02921464&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02921464\/file\/SNPP%20R1%20Final.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02921464\/file\/SNPP%20R1%20Final.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02921464\/file\/SNPP%20R1%20Final.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02921464v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth. ID-based user-centric data usage auditing scheme for distributed environments. <i>Frontiers in Blockchain<\/i>, 2020, 3 (17), pp.1-12. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3389\/fbloc.2020.00017\">&#x27E8;10.3389\/fbloc.2020.00017&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991089v1\">&#x27E8;hal-03991089&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991089\/file\/fbloc-03-00017.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991089\/file\/fbloc-03-00017.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991089\/file\/fbloc-03-00017.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991089v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Sana Belguith. Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2020, 171, pp.102807. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2020.102807\">&#x27E8;10.1016\/j.jnca.2020.102807&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03990971v1\">&#x27E8;hal-03990971&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03990971\/file\/_JNCA____Survey_PETS.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03990971\/file\/_JNCA____Survey_PETS.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03990971\/file\/_JNCA____Survey_PETS.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03990971v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Chistophe Kiennert, Maryline Laurent, Joaquin Garcia-Alfaro. Anonymous certification for E-assessment opinion polls. <i>Journal of Ambient Intelligence and Humanized Computing<\/i>, 2019, 14, pp.14979-14993. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12652-019-01545-2\">&#x27E8;10.1007\/s12652-019-01545-2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991234v1\">&#x27E8;hal-03991234&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991234\/file\/_AIHC__Anonymous_Certification_for_E_assessment_Opinion_Polls-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991234v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Qing Yang, Rongxing Lu, Chunming Rong, Yacine Challal, Maryline Laurent, et al.. Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. <i>IEEE Internet of Things Journal<\/i>, 2019, 6 (3), pp.4556-4560. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/JIOT.2019.2921235\">&#x27E8;10.1109\/JIOT.2019.2921235&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02315884v1\">&#x27E8;hal-02315884&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02315884v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IOT. <i>Computer Networks<\/i>, 2018, 133, pp.141 - 156. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comnet.2018.01.036\">&#x27E8;10.1016\/j.comnet.2018.01.036&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01773931v1\">&#x27E8;hal-01773931&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01773931\/file\/2018-JCN-PHOABE-Sana-Nesrine.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01773931\/file\/2018-JCN-PHOABE-Sana-Nesrine.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01773931\/file\/2018-JCN-PHOABE-Sana-Nesrine.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01773931v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Securely outsourcing the ciphertext-policy attribute-based encryption. <i>World Wide Web<\/i>, 2018, 21 (1), pp.169 - 183. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11280-017-0473-x\">&#x27E8;10.1007\/s11280-017-0473-x&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01682222v1\">&#x27E8;hal-01682222&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01682222v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Maryline Laurent. ICAuth: a secure and scalable owner delegated inter-cloud authorization. <i>Future Generation Computer Systems<\/i>, 2018, 88, pp.319 - 332. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.future.2018.05.066\">&#x27E8;10.1016\/j.future.2018.05.066&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01991132v1\">&#x27E8;hal-01991132&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01991132v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. <i>Computer Communications<\/i>, 2017, 111, pp.120 - 141. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comcom.2017.07.006\">&#x27E8;10.1016\/j.comcom.2017.07.006&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01576979v1\">&#x27E8;hal-01576979&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01576979v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent. Pare-feu: le couteau suisse de la s\u00e9curit\u00e9 informatique. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2017, TE7550v2. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01681679v1\">&#x27E8;hal-01681679&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01681679v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, et al.. Diet-ESP: IP layer security for IoT. <i>Journal of Computer Security<\/i>, 2017, 25 (2), pp.173 - 203. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3233\/JCS-16857\">&#x27E8;10.3233\/JCS-16857&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01518274v1\">&#x27E8;hal-01518274&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01518274v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. Discrimination rate: an attribute-centric metric to measure privacy. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2017, 72 (11-12), pp.755 - 766. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-017-0581-8\">&#x27E8;10.1007\/s12243-017-0581-8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01653440v1\">&#x27E8;hal-01653440&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01653440v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kim Thuat Nguyen, Maryline Laurent, Nouha Ouahla. Survey on secure communication protocols for the Internet of Things. <i>Ad Hoc Networks<\/i>, 2015, 32, pp.17 - 31. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.adhoc.2015.01.006\">&#x27E8;10.1016\/j.adhoc.2015.01.006&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01272046v1\">&#x27E8;hal-01272046&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01272046v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. <i>Journal of Network and Computer Applications (JNCA)<\/i>, 2014, 45, pp.215 - 227. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jnca.2014.07.036\">&#x27E8;10.1016\/j.jnca.2014.07.036&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01281944v1\">&#x27E8;hal-01281944&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01281944v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Lightweight collaborative key establishment scheme for the Internet of Things. <i>Computer Networks<\/i>, 2014, 64, pp.273 - 295. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comnet.2014.02.001\">&#x27E8;10.1016\/j.comnet.2014.02.001&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263479v1\">&#x27E8;hal-01263479&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263479v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent. Trust management system design for the Internet of Things: a context-aware and multi- service approach. <i>Computers & Security<\/i>, 2013, 39 (Part B), pp.351 - 365. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2013.09.001\">&#x27E8;10.1016\/j.cose.2013.09.001&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01281972v1\">&#x27E8;hal-01281972&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01281972v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Maryline Laurent. On the use of ID-based cryptography for the definition of new EAP authentication methods. <i>International journal for information security research (IJISR)<\/i>, 2012, 2 (1 & 2), pp.246-255. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00724636v1\">&#x27E8;hal-00724636&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00724636\/file\/2012-Journal-IJISR-Boudguiga.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00724636\/file\/2012-Journal-IJISR-Boudguiga.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00724636\/file\/2012-Journal-IJISR-Boudguiga.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00724636v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ethmane El Moustaine, Maryline Laurent. Syst\u00e8mes et techniques RFID : risques et solutions de s\u00e9curit\u00e9. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2012, H5325. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00770788v1\">&#x27E8;hal-00770788&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00770788v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Risk assessment along supply chain : a RFID and wireless sensor network integration approach. <i>Sensors & Transducers.<\/i>, 2012, 14 (2), pp.269-282. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00712579v1\">&#x27E8;hal-00712579&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00712579v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Andrei Vlad Sambra, Maryline Laurent. MyProfile - Decentralized User Profile and Identity on the Web. <i>W3C's Federated Social Web (FSW2011)<\/i>, 2011. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00745348v1\">&#x27E8;hal-00745348&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00745348\/file\/fsw2011_MyProfile.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00745348\/file\/fsw2011_MyProfile.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00745348\/file\/fsw2011_MyProfile.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00745348v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Maryline Laurent. S\u00e9curit\u00e9 dans les r\u00e9seaux 802.11. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2010, TE7377. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355251v1\">&#x27E8;hal-01355251&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01355251v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. <i>Computers & Security<\/i>, 2010, 29 (4), pp.419 - 431. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2009.12.008\">&#x27E8;10.1016\/j.cose.2009.12.008&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00496002v1\">&#x27E8;hal-00496002&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00496002\/file\/article.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00496002\/file\/article.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00496002\/file\/article.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00496002v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. <i>Computers & Security<\/i>, 2010, 29 (2), pp.180 - 195. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2009.10.003\">&#x27E8;10.1016\/j.cose.2009.10.003&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00472901v1\">&#x27E8;hal-00472901&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00472901v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maher Ben Jemaa, Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental measurements of host identity protocol for mobile nodes' networks. <i>Journal of computer systems, networks, and communications<\/i>, 2009, 2009 (Article ID 383517), pp.1 - 6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1155\/2009\/383517\">&#x27E8;10.1155\/2009\/383517&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00472911v1\">&#x27E8;hal-00472911&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00472911\/file\/383517.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00472911\/file\/383517.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00472911\/file\/383517.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00472911v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An EAP-EHash authentication method adapted to resource constrained terminals. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2009, 65 (5), pp.271 - 284. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-009-0135-9\">&#x27E8;10.1007\/s12243-009-0135-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00506549v1\">&#x27E8;hal-00506549&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00506549\/file\/Annales-EAP-EHASH-oct2009.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00506549\/file\/Annales-EAP-EHASH-oct2009.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00506549\/file\/Annales-EAP-EHASH-oct2009.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00506549v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Maryline Laurent. S\u00e9curit\u00e9 des r\u00e9seaux sans fil et mobiles : probl\u00e9matiques et enjeux technologiques. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2008, 14. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355033v1\">&#x27E8;hal-01355033&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01355033v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent. S\u00e9curit\u00e9 des syst\u00e8mes P2P de sauvegarde distribu\u00e9e. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2008, 16. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355031v1\">&#x27E8;hal-01355031&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01355031v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent. Projet DisPairSe : syst\u00e8me P2P de sauvegarde distribu\u00e9e s\u00e9curis\u00e9. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2008, 17, pp.2 - 3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01354702v1\">&#x27E8;hal-01354702&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01354702v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Hakima Chaouchi. Des r\u00e9seaux ad hoc \u00e9conomiquement viables. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2008, 11. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355035v1\">&#x27E8;hal-01355035&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01355035v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent. Les architectures de f\u00e9d\u00e9ration d'identit\u00e9 et la garantie de notre vie priv\u00e9e. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2007, 9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355037v1\">&#x27E8;hal-01355037&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01355037v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2003<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent. Protocole IPsec. <i>Techniques de l'Ing\u00e9nieur. S\u00e9curit\u00e9 des syst\u00e8mes d'information<\/i>, 2003, TE7545. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01331303v1\">&#x27E8;hal-01331303&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01331303v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2001<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Maryline Laurent. Improving packet filters management through automatic and dynamic schemes. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2001, 56 (9-10), pp.595-608. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/BF03008836\">&#x27E8;10.1007\/BF03008836&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03643165v1\">&#x27E8;hal-03643165&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03643165v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>1999<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Herbert Leitold, Reinhard Posch, Enrique Areizaga, Ahmed Bouabdallah, Maryline Laurent, et al.. Security services in ATM networks. <i>Interoperable communication networks journal<\/i>, 1999, 2 (1), pp.107 - 119. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02341316v1\">&#x27E8;hal-02341316&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02341316v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Article de blog scientifique<\/p>\n<p class='SousRubrique'>2026<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Levallois-Barth, Maryline Laurent. Qu'est-ce qu'un portefeuille europ\u00e9en d'identit\u00e9 num\u00e9rique ?. 2026, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.64628\/AAK.nxxusg33k\">&#x27E8;10.64628\/AAK.nxxusg33k&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05588294v1\">&#x27E8;hal-05588294&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-05588294v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mark Hunyadi, Claire Levallois-Barth, Ivan Messeguer, Maryline Laurent, Patrick Waelbroeck. Le wallet, ou portefeuille europ\u00e9en d\u2019identit\u00e9 num\u00e9rique : vers une d\u00e9mocratie conforme au march\u00e9 ?. 2023. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05105036v1\">&#x27E8;hal-05105036&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-05105036v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Mark Hunyadi, Claire Levallois-Barth, Ivan Meseguer, Maryline Laurent, Patrick Waelbroeck. Pourquoi un portefeuille num\u00e9rique europ\u00e9en \u00e0 marche forc\u00e9e?. 2022. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05105052v1\">&#x27E8;hal-05105052&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-05105052v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Levallois-Barth, Maryline Laurent, Ivan Messeguer, Patrick Waelbroeck, Val\u00e9rie Charolles. Urgence sanitaire, situation d\u2019exception : quelles garanties pour nos libert\u00e9s fondamentales ?. 2020. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05104610v1\">&#x27E8;hal-05104610&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-05104610v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Communication dans un congr\u00e8s<\/p>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. Differentially-private data aggregation over encrypted location data for range counting query. <i>2024 International Conference on Information Networking (ICOIN)<\/i>, Jan 2024, Ho Chi Minh City, Vietnam. pp.409-414, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICOIN59985.2024.10572074\">&#x27E8;10.1109\/ICOIN59985.2024.10572074&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04645794v1\">&#x27E8;hal-04645794&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04645794\/file\/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04645794\/file\/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04645794\/file\/ICOIN2024__Differentially_Private_Data_Aggregation_over_Encrypted_Location_Data_for_Range_Counting_Query%20%28modified%29.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04645794v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SEVIL: secure and efficient verifIcation over massive proofs of knowLedge. <i>19th International Conference on Security and Cryptography (SECRYPT)<\/i>, Jul 2022, Lisbon, Portugal. pp.13-24, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0011125800003283\">&#x27E8;10.5220\/0011125800003283&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03997364v1\">&#x27E8;hal-03997364&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03997364\/file\/2022-SECRYPT_SEVIL-Masmoudi.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03997364\/file\/2022-SECRYPT_SEVIL-Masmoudi.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03997364\/file\/2022-SECRYPT_SEVIL-Masmoudi.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03997364v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche. SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact information. <i>19th International Conference E-Business and Telecommunications (ICSBT)<\/i>, Jul 2022, Lisbon (Portugal), Portugal. pp.1-19, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-45137-9_1\">&#x27E8;10.1007\/978-3-031-45137-9_1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04227767v1\">&#x27E8;hal-04227767&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-04227767\/file\/Springer_SPOT_.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04227767\/file\/Springer_SPOT_.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04227767\/file\/Springer_SPOT_.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04227767v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nathana\u00ebl Denis, Maryline Laurent, Sophie Chabridon. Bringing privacy, security and\u00a0performance to\u00a0the\u00a0internet of\u00a0things through usage control and\u00a0blockchains. <i>16th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity)<\/i>, Aug 2021, Virtual, Luxembourg. pp.57-72, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-99100-5_6\">&#x27E8;10.1007\/978-3-030-99100-5_6&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754051v1\">&#x27E8;hal-03754051&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03754051\/file\/article.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03754051\/file\/article.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03754051\/file\/article.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03754051v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent. An automatized identity and access management system for IoT combining self-sovereign identity and smart contracts. <i>The 14th International Symposium on Foundations and Practice of Security ( FPS)<\/i>, Dec 2021, Paris, France. pp.208-217, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-08147-7_14\">&#x27E8;10.1007\/978-3-031-08147-7_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03997389v1\">&#x27E8;hal-03997389&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03997389\/file\/2022-FPS-IAM-SSI-Nghmouchi.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03997389\/file\/2022-FPS-IAM-SSI-Nghmouchi.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03997389\/file\/2022-FPS-IAM-SSI-Nghmouchi.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03997389v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Seryne Rahali, Maryline Laurent, Charles Roux, Brice Mazeau, Souha Masmoudi. A validated privacy-utility preserving recommendation system with local differential privacy. <i>2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE)<\/i>, Oct 2021, Shenyang, France. pp.118-127, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BigDataSE53435.2021.00026\">&#x27E8;10.1109\/BigDataSE53435.2021.00026&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754064v1\">&#x27E8;hal-03754064&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03754064\/file\/2109.11340v1.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03754064\/file\/2109.11340v1.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03754064\/file\/2109.11340v1.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03754064v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nathana\u00ebl Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, et al.. Privacy-preserving content-based publish\/subscribe with encrypted matching and data splitting. <i>SECRYPT 2020: 17th International Conference on Security and Cryptography<\/i>, Jul 2020, Lieusaint - Paris, France. pp.405-414, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0009833204050414\">&#x27E8;10.5220\/0009833204050414&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02910407v1\">&#x27E8;hal-02910407&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02910407\/file\/paper.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02910407\/file\/paper.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02910407\/file\/paper.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02910407v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aida Diop, Maryline Laurent, Jean Leneutre, Jacques Traor\u00e9. CoRA: a scalable Collective Remote Attestation protocol for sensor networks. <i>ICISSP 2020: 6th International Conference on Information Systems Security and Privacy<\/i>, Feb 2020, Valletta, Malta. pp.84-95, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0008962700840095\">&#x27E8;10.5220\/0008962700840095&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/telecom-paris.hal.science\/hal-03024074v1\">&#x27E8;hal-03024074&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/telecom-paris.hal.science\/hal-03024074v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir. Privacy preserving cooperative computation for personalized web search applications. <i>the 35th Annual ACM Symposium on Applied Computing(ACM)<\/i>, Mar 2020, Brno Czech Republic, Czech Republic. pp.250-258, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3341105.3373947\">&#x27E8;10.1145\/3341105.3373947&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991100v1\">&#x27E8;hal-03991100&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991100\/file\/_SAC2020_DADS_Priv_Preserv_Search.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991100\/file\/_SAC2020_DADS_Priv_Preserv_Search.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991100\/file\/_SAC2020_DADS_Priv_Preserv_Search.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991100v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. Prov-trust: towards a trustworthy SGX-based data provenance system. <i>17th International Conference on Security and Cryptography (SECRYPT)<\/i>, Jul 2020, Lieusaint - Paris, France. pp.225-237, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0009889302250237\">&#x27E8;10.5220\/0009889302250237&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991163v1\">&#x27E8;hal-03991163&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991163\/file\/SECRYPT2020_ProvSGX.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991163\/file\/SECRYPT2020_ProvSGX.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991163\/file\/SECRYPT2020_ProvSGX.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991163v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Franklin Leukam Lako, Paul Lajoie Mazenc, Maryline Laurent. Reconciling privacy and utility for energy services. <i>EuroS&PW 2020: 5th IEEE European Symposium on Security and Privacy Workshops<\/i>, Sep 2020, Genova (online), Italy. pp.348-355, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EuroSPW51379.2020.00054\">&#x27E8;10.1109\/EuroSPW51379.2020.00054&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03116988v1\">&#x27E8;hal-03116988&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03116988v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Paul Marillonnet, Mika\u00ebl Ates, Maryline Laurent, Nesrine Kaaniche. An identity-matching process to strengthen trust in federated-identity architectures. <i>17th International Conference on Security and Cryptography (SECRYPT)<\/i>, Jul 2020, Lieusaint - Paris, France. pp.142-154, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0009828401420154\">&#x27E8;10.5220\/0009828401420154&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991153v1\">&#x27E8;hal-03991153&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991153\/file\/id_matching.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991153\/file\/id_matching.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991153\/file\/id_matching.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991153v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2019<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sophie Dram\u00e9-Maign\u00e9, Maryline Laurent, Laurent Castillo. Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. <i>15th International Wireless Communications and Mobile Computing Conference (IWCMC)<\/i>, Jun 2019, Tangier, Morocco. pp.1582-1587, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/IWCMC.2019.8766478\">&#x27E8;10.1109\/IWCMC.2019.8766478&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04331571v1\">&#x27E8;hal-04331571&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04331571v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Jean Leneutre, Sophie Chabridon, Imane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things. <i>ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT)<\/i>, Apr 2019, Leuven, Belgium. pp.256-263, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.procs.2019.04.037\">&#x27E8;10.1016\/j.procs.2019.04.037&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02147191v1\">&#x27E8;hal-02147191&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02147191\/file\/1-s2.0-S1877050919304995-main.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02147191\/file\/1-s2.0-S1877050919304995-main.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02147191\/file\/1-s2.0-S1877050919304995-main.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02147191v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Gregory Blanc, Bruno Carron, Nicolas Charbonnier, Isabelle Chrisment, et al.. MOOC s\u00e9curit\u00e9 des r\u00e9seaux : un apprentissage massif de la s\u00e9curit\u00e9 par la th\u00e9orie et la pratique. <i>RESSI 2019 Rendez-vous de la Recherche et de l'Enseignement de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information<\/i>, INRIA, May 2019, Erquy, France. pp.1-4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754082v1\">&#x27E8;hal-03754082&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03754082\/file\/RESSI-final.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03754082\/file\/RESSI-final.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03754082\/file\/RESSI-final.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03754082v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre. Towards end-to-end privacy for publish\/subscribe architectures in the Internet of Things. <i>M4IoT 2018: 5th Workshop on Middleware and Applications for the Internet of Things at the 2018 ACM\/IFIP International Middleware Conference<\/i>, Dec 2018, Rennes, France. pp.35 - 40, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3286719.3286727\">&#x27E8;10.1145\/3286719.3286727&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01940866v1\">&#x27E8;hal-01940866&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01940866\/file\/article_fonts_included.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01940866\/file\/article_fonts_included.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01940866\/file\/article_fonts_included.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01940866v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aida Diop, Said Gharout, Maryline Laurent, Jean Leneutre, Jacques Traor\u00e9. Questioning the security and efficiency of the ESIoT approach. <i>WISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks<\/i>, Jun 2018, Stockholm, Sweden. pp.202 - 207, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3212480.3212491\">&#x27E8;10.1145\/3212480.3212491&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01850383v1\">&#x27E8;hal-01850383&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01850383\/file\/2018-wisecAida-QuestioningEsIOTApproach.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01850383\/file\/2018-wisecAida-QuestioningEsIOTApproach.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01850383\/file\/2018-wisecAida-QuestioningEsIOTApproach.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01850383v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sophie Dram\u00e9-Maign\u00e9, Maryline Laurent, Laurent Castillo, Herv\u00e9 Ganem. Augmented chain of ownership : configuring IoT devices with the help of the blockchain. <i>SECURECOMM 2018: 14th EAI International Conference on Security and Privacy in Communication Networks<\/i>, Sep 2018, Singapour, Singapore. pp.53 - 68, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-01701-9_4\">&#x27E8;10.1007\/978-3-030-01701-9_4&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01895391v1\">&#x27E8;hal-01895391&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01895391\/file\/2018-fev-soumis-Securecomm_2018_paper_84-1.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01895391\/file\/2018-fev-soumis-Securecomm_2018_paper_84-1.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01895391\/file\/2018-fev-soumis-Securecomm_2018_paper_84-1.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01895391v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. BDUA: blockchain-based data usage auditing. <i>2018 IEEE 11th International Conference on Cloud Computing (CLOUD)<\/i>, Jul 2018, San Francisco, United States. pp.630-637, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CLOUD.2018.00087\">&#x27E8;10.1109\/CLOUD.2018.00087&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754087v1\">&#x27E8;hal-03754087&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03754087\/file\/2018-ieeecloud-bdua-blockchain.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03754087\/file\/2018-ieeecloud-bdua-blockchain.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03754087\/file\/2018-ieeecloud-bdua-blockchain.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03754087v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. SABE : a Selective Attribute-Based Encryption for an efficient threshold multi-level access control. <i>SECRYPT 2018: 15th International Conference on Security and Cryptography<\/i>, Jul 2018, Porto, Portugal. pp.155 - 167, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006855501550167\">&#x27E8;10.5220\/0006855501550167&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01850387v1\">&#x27E8;hal-01850387&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01850387\/file\/2018-SECRYPT-SABE-Multi-level-AC.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01850387\/file\/2018-SECRYPT-SABE-Multi-level-AC.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01850387\/file\/2018-SECRYPT-SABE-Multi-level-AC.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01850387v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. A blockchain-based access control scheme. <i>SECRYPT 2018: 15th International Conference on Security and Cryptography<\/i>, Jul 2018, Porto, Portugal. pp.168 - 176, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006855601680176\">&#x27E8;10.5220\/0006855601680176&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01864317v1\">&#x27E8;hal-01864317&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01864317\/file\/2018-SECRYPT-BC-based-AC.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01864317\/file\/2018-SECRYPT-BC-based-AC.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01864317\/file\/2018-SECRYPT-BC-based-AC.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01864317v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Nesrine Kaaniche. Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IOT applications. <i>2018 CLOUD 11th International Conference on Cloud Computing<\/i>, Jul 2018, San Francisco, France. pp.590-597, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CLOUD.2018.00082\">&#x27E8;10.1109\/CLOUD.2018.00082&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03754091v1\">&#x27E8;hal-03754091&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03754091\/file\/2018-ieeecloud-aggregatecp-abe.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03754091\/file\/2018-ieeecloud-aggregatecp-abe.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03754091\/file\/2018-ieeecloud-aggregatecp-abe.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03754091v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Paul Marillonnet, Mika\u00ebl Ates, Maryline Laurent. Etat de l'art des technologies de la gestion des donn\u00e9es personnelles par l'usager. <i>APVP 2018: Atelier sur la Protection de la Vie Priv\u00e9e<\/i>, Jun 2018, Porquerolles, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01822897v1\">&#x27E8;hal-01822897&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01822897v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">David Pamies Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castella-Roca, Joaquin Garcia-Alfaro. Lifelogging protection scheme for internet-based personal assistants. <i>DPM 2018: 13th International Workshop on Data Privacy Management<\/i>, Sep 2018, Barcelona, Spain. pp.431 - 440, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-00305-0_31\">&#x27E8;10.1007\/978-3-030-00305-0_31&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01991849v1\">&#x27E8;hal-01991849&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01991849\/file\/DPM2018_PA__lifelogging-anonymization-sanitizableSignature.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01991849v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Constant-size threshold attribute based signcryption for cloud applications. <i>SECRYPT 2017 : 14th International Conference on Security and Cryptography<\/i>, Jul 2017, Madrid, Spain. pp.212 - 225, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006469202120225\">&#x27E8;10.5220\/0006469202120225&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01575575v1\">&#x27E8;hal-01575575&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01575575\/file\/2017-SECRYPT-ABSC-Sana-Belguith.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01575575\/file\/2017-SECRYPT-ABSC-Sana-Belguith.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01575575\/file\/2017-SECRYPT-ABSC-Sana-Belguith.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01575575v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. Attribute based encryption for multi-level access control policies. <i>SECRYPT 2017 : 14th International Conference on Security and Cryptography<\/i>, Jul 2017, Madrid, Spain. pp.67 - 78, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006421000670078\">&#x27E8;10.5220\/0006421000670078&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01575560v1\">&#x27E8;hal-01575560&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01575560\/file\/2017-SECRYPT-Multi-levelAccess-ehealth-ABC.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01575560\/file\/2017-SECRYPT-Multi-levelAccess-ehealth-ABC.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01575560\/file\/2017-SECRYPT-Multi-levelAccess-ehealth-ABC.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01575560v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig. Security SLA based monitoring in clouds. <i>EDGE 2017 : 1st International Conference on Edge Computing<\/i>, Jun 2017, Honolulu, United States. pp.90 - 97, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/IEEE.EDGE.2017.20\">&#x27E8;10.1109\/IEEE.EDGE.2017.20&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01593433v1\">&#x27E8;hal-01593433&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01593433\/file\/2017-EDGE-Secure_SLA-IBM-Nesrine.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01593433\/file\/2017-EDGE-Secure_SLA-IBM-Nesrine.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01593433\/file\/2017-EDGE-Secure_SLA-IBM-Nesrine.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01593433v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. <i>DPM 2017 : 12th International Workshop on Data Privacy Management<\/i>, Sep 2017, Oslo, Norway. pp.239 - 256, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-67816-0_14\">&#x27E8;10.1007\/978-3-319-67816-0_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01593430v1\">&#x27E8;hal-01593430&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01593430\/file\/dpm-2017-kaaniche-Garcia-CertificationScheme.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01593430v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. A blockchain-based data usage auditing architecture with enhanced privacy and availability. <i>NCA 2017 : 16th IEEE International Symposium on Network Computing and Applications<\/i>, Oct 2017, Cambridge, United States. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NCA.2017.8171384\">&#x27E8;10.1109\/NCA.2017.8171384&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01682227v1\">&#x27E8;hal-01682227&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01682227\/file\/2017-NCA-Auditable-consent-with-Blockchain.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01682227\/file\/2017-NCA-Auditable-consent-with-Blockchain.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01682227\/file\/2017-NCA-Auditable-consent-with-Blockchain.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01682227v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Pierre Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro. PCS, a privacy-preserving certification scheme. <i>DPM 2017 : 12th International Workshop on Data Privacy Management<\/i>, Sep 2017, Oslo, Norway. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01702450v1\">&#x27E8;hal-01702450&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01702450v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquin Garcia-Alfaro. Anonymous certification for an e-assessment framework. <i>NORDSEC 2017 : 22nd Nordic Conference on Secure IT Systems<\/i>, Nov 2017, Tartu, Estonia. pp.70 - 85, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-70290-2_5\">&#x27E8;10.1007\/978-3-319-70290-2_5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01699347v1\">&#x27E8;hal-01699347&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01699347\/file\/18676.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01699347v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Collins Isdory Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, et al.. Serverless protocols for inventory and tracking with a UAV. <i>DASC 2017 : IEEE\/AIAA 36th Digital Avionics Systems Conference<\/i>, Sep 2017, St Petersburg, United States. pp.1 - 11, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/DASC.2017.8102113\">&#x27E8;10.1109\/DASC.2017.8102113&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01682257v1\">&#x27E8;hal-01682257&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01682257\/file\/2017-DASC-Serverless-Inventory-Mtita.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01682257\/file\/2017-DASC-Serverless-Inventory-Mtita.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01682257\/file\/2017-DASC-Serverless-Inventory-Mtita.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01682257v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Louis-Philippe Sondeck, Maryline Laurent, Vincent Frey. The semantic discrimination rate metric for privacy measurements which questions the benefit of T-closeness over L-diversity. <i>SECRYPT 2017 : 14th International Conference on Security and Cryptography<\/i>, Jul 2017, Madrid, Spain. pp.285 - 294, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006418002850294\">&#x27E8;10.5220\/0006418002850294&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01576996v1\">&#x27E8;hal-01576996&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01576996\/file\/2017-SECRYPT-DR-Tcloseness.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01576996\/file\/2017-SECRYPT-DR-Tcloseness.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01576996\/file\/2017-SECRYPT-DR-Tcloseness.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01576996v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds. <i>SECRYPT 2016 : 13th International Conference on Security and Cryptography<\/i>, Jul 2016, Lisbon, Portugal. pp.133 - 146, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0005968201330146\">&#x27E8;10.5220\/0005968201330146&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01391253v1\">&#x27E8;hal-01391253&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01391253\/file\/2016-SECRYPT-PAbAC-Belguith-Kaaniche.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01391253\/file\/2016-SECRYPT-PAbAC-Belguith-Kaaniche.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01391253\/file\/2016-SECRYPT-PAbAC-Belguith-Kaaniche.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01391253v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. Attribute-based signatures for supporting anonymous certification. <i>ESORICS 2016 : 21st European Symposium on Research in Computer Security<\/i>, Sep 2016, Heraklion, Greece. pp.279 - 300, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-45744-4_14\">&#x27E8;10.1007\/978-3-319-45744-4_14&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01391343v1\">&#x27E8;hal-01391343&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01391343\/file\/2016-ESORICS-Anonymous-Certification-Nesrine-Kaaniche.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01391343\/file\/2016-ESORICS-Anonymous-Certification-Nesrine-Kaaniche.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01391343\/file\/2016-ESORICS-Anonymous-Certification-Nesrine-Kaaniche.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01391343v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, S\u00e9bastien Canard. A novel proof of data possession scheme based on set-homomorphic operations. <i>SEC2 2016 : 2e atelier sur la S\u00e9curit\u00e9 dans les Clouds<\/i>, Jul 2016, Lorient, France. pp.1 - 4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01390987v1\">&#x27E8;hal-01390987&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01390987v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, S\u00e9bastien Canard. A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations. <i>Proc. 2e atelier sur la S\u00e9curit\u00e9 dans les Clouds<\/i>, Feb 2016, paris, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03991200v1\">&#x27E8;hal-03991200&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-03991200\/file\/kaaniche-paper.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03991200\/file\/kaaniche-paper.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03991200\/file\/kaaniche-paper.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03991200v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things. <i>ESORICS 2016 : 21st European Symposium on Research in Computer Security<\/i>, Sep 2016, Heraklion, Greece. pp.339 - 358, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-45741-3_18\">&#x27E8;10.1007\/978-3-319-45741-3_18&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01391319v1\">&#x27E8;hal-01391319&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01391319\/file\/2016-ESORICS-Proxy-Reencryptor-Kim-Nguyen.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01391319\/file\/2016-ESORICS-Proxy-Reencryptor-Kim-Nguyen.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01391319\/file\/2016-ESORICS-Proxy-Reencryptor-Kim-Nguyen.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01391319v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kim Thuat Nguyen, Nouha Ouahla, Maryline Laurent. Novel lightweight signcryption-based key distribution mechanisms for MIKEY. <i>10th IFIP International Conference on Information Security Theory and Practice (WISTP)<\/i>, Sep 2016, Heraklion, Greece. pp.19-34, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-45931-8_2\">&#x27E8;10.1007\/978-3-319-45931-8_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01391308v1\">&#x27E8;hal-01391308&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01391308\/file\/2016-WISTP-Signcryption-MIKEY-Kim-Nguyen.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01391308\/file\/2016-WISTP-Signcryption-MIKEY-Kim-Nguyen.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01391308\/file\/2016-WISTP-Signcryption-MIKEY-Kim-Nguyen.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01391308v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Florent Fortat, Maryline Laurent, Michel Simatic. Games based on active NFC objects : model and security requirements. <i>NETGAMES 2015 : 14th International Workshop on Network and Systems Support for Games<\/i>, Dec 2015, Zagreb, Croatia. pp.1 - 3, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NetGames.2015.7382998\">&#x27E8;10.1109\/NetGames.2015.7382998&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01279183v1\">&#x27E8;hal-01279183&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01279183\/file\/2015-Netgames-Fortat-model-security-Requirements.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01279183\/file\/2015-Netgames-Fortat-model-security-Requirements.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01279183\/file\/2015-Netgames-Fortat-model-security-Requirements.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01279183v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. SHoPS: Set Homomorphic Proof of data Possession Scheme in cloud storage applications. <i>Services 2015 : IEEE World Congress on Services <\/i>, Jun 2015, New York, United States. pp.143 - 150, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SERVICES.2015.29\">&#x27E8;10.1109\/SERVICES.2015.29&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01254993v1\">&#x27E8;hal-01254993&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01254993\/file\/2015-CLOUD-SHOPS.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01254993\/file\/2015-CLOUD-SHOPS.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01254993\/file\/2015-CLOUD-SHOPS.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01254993v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Armen Khatchatourov, Maryline Laurent, Claire Levallois-Barth. Privacy in digital identity systems: models, assessment and user adoption. <i>14th International Conference on Electronic Government (EGOV)<\/i>, Aug 2015, Thessaloniki, Greece. pp.273-290, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-22479-4_21\">&#x27E8;10.1007\/978-3-319-22479-4_21&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01283997v1\">&#x27E8;hal-01283997&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01283997\/file\/2015-EGOV-Khatchatourov_Privacy_in_Digital_Identity.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01283997\/file\/2015-EGOV-Khatchatourov_Privacy_in_Digital_Identity.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01283997\/file\/2015-EGOV-Khatchatourov_Privacy_in_Digital_Identity.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01283997v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Migault, Tobias Guggemos, Daniel Palomares, Aurelien Wailly, Maryline Laurent, et al.. Recommendations for IPsec configuration on homenet and M2M devices. <i>Q2SWINET 2015 : 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks<\/i>, Nov 2015, Cancun, Mexico. pp.9 - 17, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2815317.2815323\">&#x27E8;10.1145\/2815317.2815323&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263312v1\">&#x27E8;hal-01263312&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263312\/file\/Q2SWinet2015-ipsec-homenet-performance.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263312\/file\/Q2SWinet2015-ipsec-homenet-performance.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263312\/file\/Q2SWinet2015-ipsec-homenet-performance.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263312v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Collins Isdory Mtita, Maryline Laurent, Pascal Daragon. Serverless lightweight mutual authentication protocol for small mobile computing devices. <i>NTMS 2015 : 7th International Conference on New Technologies, Mobility and Security <\/i>, Jul 2015, Paris, France. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2015.7266521\">&#x27E8;10.1109\/NTMS.2015.7266521&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01285358v1\">&#x27E8;hal-01285358&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01285358\/file\/NTMS2015-Mtita-ServerlessProtocol.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01285358\/file\/NTMS2015-Mtita-ServerlessProtocol.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01285358\/file\/NTMS2015-Mtita-ServerlessProtocol.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01285358v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent. Lightweight certificateless and provably-secure signcryptosystem for the internet of things. <i>TRUSTCOM 2015 : 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Aug 2015, Helsinki, Finland. pp.467-474, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/Trustcom.2015.408\">&#x27E8;10.1109\/Trustcom.2015.408&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01279169v1\">&#x27E8;hal-01279169&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01279169\/file\/2015-trustcom-Signcryption.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01279169\/file\/2015-trustcom-Signcryption.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01279169\/file\/2015-trustcom-Signcryption.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01279169v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent. A secure client side deduplication scheme in cloud storage environments. <i>NTMS 2014 : 6th International Conference on New Technologies, Mobility and Security <\/i>, Mar 2014, Dubai, United Arab Emirates. pp.1 - 7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2014.6814002\">&#x27E8;10.1109\/NTMS.2014.6814002&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263425v1\">&#x27E8;hal-01263425&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263425\/file\/2014-NTMS-Nesrine.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263425\/file\/2014-NTMS-Nesrine.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263425\/file\/2014-NTMS-Nesrine.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263425v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Maryline Laurent, Mohammed El Barbori. CloudaSec : a novel public-key based framework to handle data sharing security in clouds. <i>SECRYPT 2014 : 11th International Conference on Security and Cryptography<\/i>, Aug 2014, Vienne, Austria. pp.5 - 18, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0005010600050018\">&#x27E8;10.5220\/0005010600050018&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263351v1\">&#x27E8;hal-01263351&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263351\/file\/2014-SECRYPT%20CloudaSEC-enligne.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263351\/file\/2014-SECRYPT%20CloudaSEC-enligne.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263351\/file\/2014-SECRYPT%20CloudaSEC-enligne.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263351v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Ethmane El Moustaine, Maryline Laurent. A novel zero-knowledge scheme for proof of data possession in cloud storage applications. <i>CCGRID 2014 : 14th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing <\/i>, May 2014, Chicago, United States. pp.522 - 531, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CCGrid.2014.81\">&#x27E8;10.1109\/CCGrid.2014.81&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263463v1\">&#x27E8;hal-01263463&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263463\/file\/2014-CCGRID-ZeroKnowPDPScheme.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263463\/file\/2014-CCGRID-ZeroKnowPDPScheme.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263463\/file\/2014-CCGRID-ZeroKnowPDPScheme.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263463v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Armen Khatchatourov, Maryline Laurent, Meriem Sellami. Pseudonymisation, identit\u00e9s multiples et protection des donn\u00e9es \u00e0 caract\u00e8re personnel dans le champ des identit\u00e9s num\u00e9riques : quelques aspects du paysage europ\u00e9en. <i>5\u00e8me Atelier sur la Protection de la Vie Priv\u00e9e<\/i>, Jun 2014, Cabourg, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02397700v1\">&#x27E8;hal-02397700&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02397700v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Migault, Daniel Palomares, Hendrik Hendrik, Maryline Laurent. Secure IPsec based offload architectures for mobile data : architecture description and performance evaluation. <i>Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks<\/i>, Sep 2014, Montreal, Canada. pp.95 - 104, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2642687.2642690\">&#x27E8;10.1145\/2642687.2642690&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263065v1\">&#x27E8;hal-01263065&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01263065\/file\/2014-Q2SWinet-Offload-Perf-Evaluation-Migault.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01263065\/file\/2014-Q2SWinet-Offload-Perf-Evaluation-Migault.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01263065\/file\/2014-Q2SWinet-Offload-Perf-Evaluation-Migault.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01263065v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Palomares, Daniel Migault, Hendrik Hendrik, Maryline Laurent. Elastic virtual private cloud. <i>Q2SWINET 2014 : 10th international symposium on QoS and security for wireless and mobile networks <\/i>, Sep 2014, Montreal, Canada. pp.127 - 131, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2642687.2642704\">&#x27E8;10.1145\/2642687.2642704&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01264790v1\">&#x27E8;hal-01264790&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01264790\/file\/2014-Q2SWinet-VirtualPrivateCloud-Palo.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01264790\/file\/2014-Q2SWinet-VirtualPrivateCloud-Palo.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01264790\/file\/2014-Q2SWinet-VirtualPrivateCloud-Palo.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01264790v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ethmane El Moustaine, Maryline Laurent. GPS+ : a back-end coupons identification for low-cost RFID. <i>WiSec '13 : 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks<\/i>, Apr 2013, Budapest, Hungary. pp.73-78, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2462096.2462109\">&#x27E8;10.1145\/2462096.2462109&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00843977v1\">&#x27E8;hal-00843977&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00843977v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Emmanuel Herbert, Daniel Migault, St\u00e9phane S\u00e9n\u00e9cal, Stanislas Francfort, Maryline Laurent. Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency. <i>IM '13 : IFIP\/IEEE International Symposium on Integrated Network Management<\/i>, May 2013, Ghent, Belgium. pp.824-827. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00860157v1\">&#x27E8;hal-00860157&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00860157\/file\/2012-12-IM2013-DNSSEC-Stat.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00860157\/file\/2012-12-IM2013-DNSSEC-Stat.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00860157\/file\/2012-12-IM2013-DNSSEC-Stat.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00860157v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent. ID based cryptography for secure cloud data storage. <i>CLOUD 2013 : IEEE 6th International Conference on Cloud Computing<\/i>, Jun 2013, Santa Clara, CA, United States. pp.375-382, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CLOUD.2013.80\">&#x27E8;10.1109\/CLOUD.2013.80&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01275089v1\">&#x27E8;hal-01275089&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01275089\/file\/2013-cloud-IDbased-cloudstorage.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01275089\/file\/2013-cloud-IDbased-cloudstorage.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01275089\/file\/2013-cloud-IDbased-cloudstorage.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01275089v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Samia Bouzefrane, Christophe Kiennert. Towards secure identity management in smartphone environments. <i>2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing<\/i>, Aug 2013, X, France. pp.2133-2135. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01126288v1\">&#x27E8;hal-01126288&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01126288v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Migault, St\u00e9phane S\u00e9n\u00e9cal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent. PREFETCHing to overcome DNSSEC deployment over large resolving platforms. <i>TRUSTCOM 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications<\/i>, Jul 2013, Melbourne, Australia. pp.694 - 703, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TrustCom.2013.84\">&#x27E8;10.1109\/TrustCom.2013.84&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01262120v1\">&#x27E8;hal-01262120&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01262120\/file\/2013-trustcom-free-pastry-experiment.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01262120\/file\/2013-trustcom-free-pastry-experiment.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01262120\/file\/2013-trustcom-free-pastry-experiment.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01262120v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Migault, Stanislas Francfort, St\u00e9phane S\u00e9n\u00e9cal, Emmanuel Herbert, Maryline Laurent. Overcoming DNSSEC performance issues with DHT-based architectures. <i>IM '13 : IFIP\/IEEE International Symposium on Integrated Network Management<\/i>, May 2013, Ghent, Belgium. pp.816-819. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00860147v1\">&#x27E8;hal-00860147&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00860147\/file\/2012-12-IM2013-DNSSEC-DHT.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00860147\/file\/2012-12-IM2013-DNSSEC-DHT.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00860147\/file\/2012-12-IM2013-DNSSEC-DHT.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00860147v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Palomares, Daniel Migault, Maryline Laurent. Failure preventive mechanism for IPsec gateways. <i>ICCIT '13 : The Third International Conference on Communications and Information Technology<\/i>, Jun 2013, Beirut, Lebanon. pp.167-172, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICCITechnology.2013.6579543\">&#x27E8;10.1109\/ICCITechnology.2013.6579543&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00860251v1\">&#x27E8;hal-00860251&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00860251\/file\/2013-ICCT-Failure-Preventive-Palomares.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00860251\/file\/2013-ICCT-Failure-Preventive-Palomares.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00860251\/file\/2013-ICCT-Failure-Preventive-Palomares.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00860251v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent. High Availability for IPsec VPN Platforms: ClusterIP Evaluation. <i>8th International Conference on Availability, Reliability and Security (ARES 2013)<\/i>, Sep 2013, Regensburg, Germany. pp.1. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00863418v1\">&#x27E8;hal-00863418&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00863418\/file\/High_Availability_for_IPsec_VPN_Platforms-ClusterIP_Evaluation-ARES2013.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00863418\/file\/High_Availability_for_IPsec_VPN_Platforms-ClusterIP_Evaluation-ARES2013.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00863418\/file\/High_Availability_for_IPsec_VPN_Platforms-ClusterIP_Evaluation-ARES2013.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00863418v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kheira Bekara, Maryline Laurent, Than Ha Nguyen. Technical enforcement of european privacy legislation: an access control approach. <i>NTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security <\/i>, May 2012, Istanbul, Turkey. pp.1 - 7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2012.6208724\">&#x27E8;10.1109\/NTMS.2012.6208724&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01300733v1\">&#x27E8;hal-01300733&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01300733\/file\/NTMS2012-Bekara-Kheira.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01300733\/file\/NTMS2012-Bekara-Kheira.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01300733\/file\/NTMS2012-Bekara-Kheira.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01300733v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Yosra Ben Saied, Alexis Olivereau, Maryline Laurent. A distributed approach for secure M2M communications. <i>NTMS '12 : 5th IFIP International Conference on New Technologies, Mobility and Security<\/i>, May 2012, Istambul, Turkey. pp.1-7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2012.6208702\">&#x27E8;10.1109\/NTMS.2012.6208702&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00811949v1\">&#x27E8;hal-00811949&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00811949\/file\/2012-NTMS-BenSaied-SecureM2M.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00811949\/file\/2012-NTMS-BenSaied-SecureM2M.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00811949\/file\/2012-NTMS-BenSaied-SecureM2M.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00811949v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Maryline Laurent. An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-based cryptographic algorithms. <i>ComNet '12 : The Third International Conference on Communications and Networking<\/i>, Mar 2012, Tunis, Tunisia. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ComNet.2012.6217728\">&#x27E8;10.1109\/ComNet.2012.6217728&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00819802v1\">&#x27E8;hal-00819802&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00819802\/file\/COMNET2012-Aymen-Sakai-Kasahara.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00819802\/file\/COMNET2012-Aymen-Sakai-Kasahara.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00819802\/file\/COMNET2012-Aymen-Sakai-Kasahara.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00819802v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Michel Combes, Aurelien Wailly, Maryline Laurent. CGA as alternative security credentials with IKEv2 : implementation and analysis. <i>SAR-SSI '12 : 7th Conference on Network Architectures and Information Systems Security<\/i>, May 2012, Cabourg, France. pp.53-59. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00747186v1\">&#x27E8;hal-00747186&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00747186\/file\/SAR-SSI-2012-JMC-IKEv2_CGA.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00747186\/file\/SAR-SSI-2012-JMC-IKEv2_CGA.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00747186\/file\/SAR-SSI-2012-JMC-IKEv2_CGA.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00747186v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Michel Combes, Ghada Arfaoui, Maryline Laurent. Dynamic DNS update security, based on cryptographically generated addresses and ID-based cryptography, in an IPv6 autoconfiguration context. <i>AReS '12 : The 7th International Conference on Availability, Reliability and Security<\/i>, Aug 2012, Prague, Czech Republic. pp.206-211, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2012.69\">&#x27E8;10.1109\/ARES.2012.69&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00756609v1\">&#x27E8;hal-00756609&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00756609\/file\/2012-ARES-DNS-CGA-combes-Arfaoui.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00756609\/file\/2012-ARES-DNS-CGA-combes-Arfaoui.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00756609\/file\/2012-ARES-DNS-CGA-combes-Arfaoui.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00756609v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Michel Combes, Maryline Laurent. Source address validation improvements (SAVI): m\u00e9canismes de pr\u00e9vention contre l'usurpation d'adresses IP source. <i>SSTIC 2012 : Symposium sur la S\u00e9curit\u00e9 des Technologies de l'Information et des Communications<\/i>, Jun 2012, Rennes, France. pp.292 - 326. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01300731v1\">&#x27E8;hal-01300731&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01300731\/file\/SSTIC20112-SAVI-Combes.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01300731\/file\/SSTIC20112-SAVI-Combes.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01300731\/file\/SSTIC20112-SAVI-Combes.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01300731v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ethmane El Moustaine, Maryline Laurent. A lattice based authentication for low-cost RFID. <i>RFID-TA '12 : IEEE International Conference on RFID Technology and Applications<\/i>, Nov 2012, Nice, France. pp.68-73, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/RFID-TA.2012.6404569\">&#x27E8;10.1109\/RFID-TA.2012.6404569&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00772773v1\">&#x27E8;hal-00772773&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00772773\/file\/2012-RFID-TA-A_lattice_based_authentication_for_low-cost_RFID-E-ElMoustaine.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00772773\/file\/2012-RFID-TA-A_lattice_based_authentication_for_low-cost_RFID-E-ElMoustaine.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00772773\/file\/2012-RFID-TA-A_lattice_based_authentication_for_low-cost_RFID-E-ElMoustaine.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00772773v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et al.. ISP offload infrastructure to minimize cost and time deployment. <i>GLOBECOM '12 : IEEE Global Communications Conference<\/i>, Dec 2012, Anaheim, United States. pp.1041-1047, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/GLOCOM.2012.6503250\">&#x27E8;10.1109\/GLOCOM.2012.6503250&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00833402v1\">&#x27E8;hal-00833402&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00833402\/file\/2012-Globecom-Migault.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00833402\/file\/2012-Globecom-Migault.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00833402\/file\/2012-Globecom-Migault.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00833402v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, et al.. E2E : an optimized IPsec architecture for secure and fast offload. <i>IWSMA '12 : The First International Workshop on Security of Mobile Applications<\/i>, Aug 2012, Prague, Czech Republic. pp.365-374, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2012.80\">&#x27E8;10.1109\/ARES.2012.80&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00756529v1\">&#x27E8;hal-00756529&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00756529\/file\/IWSMA2012_Migault-E2E-Offload-Ipsec.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00756529\/file\/IWSMA2012_Migault-E2E-Offload-Ipsec.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00756529\/file\/IWSMA2012_Migault-E2E-Offload-Ipsec.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00756529v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Andrei Vlad Sambra, Maryline Laurent. Context-aware decentralized approach for web services. <i>DTSOS '12 : IEEE SERVICES Workshop on Discovery, Testing, and Services-Oriented Software<\/i>, Jun 2012, Honolulu, Hawaii, United States. pp.73-79, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SERVICES.2012.65\">&#x27E8;10.1109\/SERVICES.2012.65&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00734243v1\">&#x27E8;hal-00734243&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00734243\/file\/2012-ICWS-Sambra.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00734243\/file\/2012-ICWS-Sambra.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00734243\/file\/2012-ICWS-Sambra.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00734243v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2011<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kheira Bekara, Maryline Laurent. Privacy policy negotiation at user's side based on P3P tag value classification. <i>EEE 2011 : The International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government<\/i>, Jul 2011, Las Vegas, United States. pp.559 - 564. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01303408v1\">&#x27E8;hal-01303408&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01303408v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kheira Bekara, Maryline Laurent. A semantic information model based on the privacy legislation. <i>SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security<\/i>, May 2011, La Rochelle, France. pp.1 - 6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SAR-SSI.2011.5931375\">&#x27E8;10.1109\/SAR-SSI.2011.5931375&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01304081v1\">&#x27E8;hal-01304081&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01304081\/file\/OntologyPaper-Kheira-Bekara-Sar-SSI2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01304081\/file\/OntologyPaper-Kheira-Bekara-Sar-SSI2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01304081\/file\/OntologyPaper-Kheira-Bekara-Sar-SSI2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01304081v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Maryline Laurent. Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. <i>WCNC 2011 : IEEE Wireless Communications and Networking Conference<\/i>, Mar 2011, Cancun, Mexico. pp.784 - 789, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WCNC.2011.5779232\">&#x27E8;10.1109\/WCNC.2011.5779232&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01304157v1\">&#x27E8;hal-01304157&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01304157\/file\/Aymen-WCNC2011-ID-based-Authentication-MeshNetworks.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01304157\/file\/Aymen-WCNC2011-ID-based-Authentication-MeshNetworks.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01304157\/file\/Aymen-WCNC2011-ID-based-Authentication-MeshNetworks.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01304157v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Maryline Laurent. An EAP ID-Based authentication method for wireless networks. <i>ISTP '11 : International Workshop on Information Security, Theory and Practice<\/i>, Dec 2011, Abu Dhabi, United Arab Emirates. pp.232-239. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00802365v1\">&#x27E8;hal-00802365&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00802365\/file\/Aymen-EAP-IDbased-Mesh-ICITST2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00802365\/file\/Aymen-EAP-IDbased-Mesh-ICITST2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00802365\/file\/Aymen-EAP-IDbased-Mesh-ICITST2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00802365v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Samia Bouzefrane, Pascal Thoniel, Maryline Laurent, Kheira Bekara. Privacy preservation and low cost authentication in federated identity management systems. <i>E-SMART 2011 : The Future of Digital Security Technologies<\/i>, Sep 2011, Nice, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01303898v1\">&#x27E8;hal-01303898&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01303898v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Tony Cheneau, Maryline Laurent. Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing. <i>SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security<\/i>, May 2011, La Rochelle, France. pp.1 - 7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SAR-SSI.2011.5931376\">&#x27E8;10.1109\/SAR-SSI.2011.5931376&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01304077v1\">&#x27E8;hal-01304077&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01304077\/file\/M-CGA-Tony-Cheneau-SAR-SSI-2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01304077\/file\/M-CGA-Tony-Cheneau-SAR-SSI-2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01304077\/file\/M-CGA-Tony-Cheneau-SAR-SSI-2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01304077v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent. A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. <i>NSS 2011: 5th International Conference on Network and System Security<\/i>, Sep 2011, Milan, Italy. pp.249--253, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICNSS.2011.6060009\">&#x27E8;10.1109\/ICNSS.2011.6060009&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00745353v1\">&#x27E8;hal-00745353&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00745353\/file\/takes.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00745353\/file\/takes.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00745353\/file\/takes.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00745353v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sophie Gastellier-Prevost, Maryline Laurent. Defeating pharming attacks at the client-side. <i>NSS 2011 : 5th International Conference on Network and System Security<\/i>, Sep 2011, Milan, Italy. pp.33 - 40, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICNSS.2011.6059957\">&#x27E8;10.1109\/ICNSS.2011.6059957&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01303641v1\">&#x27E8;hal-01303641&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01303641\/file\/NSS2011-SophieGastellier-Pharming.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01303641\/file\/NSS2011-SophieGastellier-Pharming.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01303641\/file\/NSS2011-SophieGastellier-Pharming.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01303641v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. Decisive heuristics to differentiate legitimate from phishing sites. <i>SAR-SSI 2011 : 6th Conference on Network Architectures and Information Systems Security<\/i>, May 2011, La Rochelle, France. pp.1 - 9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SAR-SSI.2011.5931389\">&#x27E8;10.1109\/SAR-SSI.2011.5931389&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01304087v1\">&#x27E8;hal-01304087&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01304087\/file\/Paper-gastellier-decisive-heuristics-SARSSI11.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01304087\/file\/Paper-gastellier-decisive-heuristics-SARSSI11.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01304087\/file\/Paper-gastellier-decisive-heuristics-SARSSI11.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01304087v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Sophie Gastellier-Prevost, Gustavo Daniel Gonzalez Granadillo, Maryline Laurent. A dual approach to detect pharming attacks at the client-side. <i>NTMS 2011 : 4th IFIP International Conference on New Technologies, Mobility and Security<\/i>, Feb 2011, Paris, France. pp.1 - 5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NTMS.2011.5721063\">&#x27E8;10.1109\/NTMS.2011.5721063&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01304168v1\">&#x27E8;hal-01304168&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01304168\/file\/Gastellier-NTMS2011-Dual-Approach-Pharming.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01304168\/file\/Gastellier-NTMS2011-Dual-Approach-Pharming.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01304168\/file\/Gastellier-NTMS2011-Dual-Approach-Pharming.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01304168v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Laurent Gomez, Mehdi Khalfaoui, Elie El-Khoury, Cedric Ulmer, Jean-Pierre Deutsch, et al.. RESCUEIT : s\u00e9cuRisation dE la Cha\u00eene logiStique orient\u00e9e serviCe depUis le mondE des objets jusqu'\u00e0 l'univers InformaTique. <i>WISG '11 : Workshop Interdisciplinaire sur la S\u00e9curit\u00e9 Globale<\/i>, Jan 2011, Troyes, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00727624v1\">&#x27E8;hal-00727624&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00727624\/file\/RESCUEIT_WISG2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00727624\/file\/RESCUEIT_WISG2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00727624\/file\/RESCUEIT_WISG2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00727624v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Laurent Gomez, Maryline Laurent, Ethmane El Moustaine. Integration of RFID and wireless sensor networks into a supply chain management system. <i>WSNSCM 2011 : 1st International Workshop on Sensor Networks for Supply Chain Management<\/i>, Aug 2011, Nice\/Saint Laurent Du Var, France. pp.393-398. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01303880v1\">&#x27E8;hal-01303880&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01303880\/file\/Gomez-integrationofRFIDandWSNCM2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01303880\/file\/Gomez-integrationofRFIDandWSNCM2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01303880\/file\/Gomez-integrationofRFIDandWSNCM2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01303880v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Sond\u00e8s Larafa, Maryline Laurent. Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. <i>ISCC 2011 : 16th IEEE Symposium on Computers and Communications<\/i>, Jun 2011, Kerkyra, Greece. pp.856 - 863, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ISCC.2011.5983949\">&#x27E8;10.1109\/ISCC.2011.5983949&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01303801v1\">&#x27E8;hal-01303801&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01303801\/file\/Larafa-ieeeiscc2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01303801\/file\/Larafa-ieeeiscc2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01303801\/file\/Larafa-ieeeiscc2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01303801v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Palomares, Maryline Laurent. Mechanisms to Ensure Continuity of Service for IPsec\/IKEv2 Based Communications. <i>ICSNA-2011: International Conference on Secure Networking and Applications ,24-25 October, Paris, France<\/i>, Oct 2011, Paris, France. pp.1. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00863428v1\">&#x27E8;hal-00863428&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-00863428\/file\/Mechanism_to_ensure_continuity_of_service_for_IPsec_and_IKEv2-_ICSNA2011.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00863428\/file\/Mechanism_to_ensure_continuity_of_service_for_IPsec_and_IKEv2-_ICSNA2011.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00863428\/file\/Mechanism_to_ensure_continuity_of_service_for_IPsec_and_IKEv2-_ICSNA2011.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00863428v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Andrei Vlad Sambra, Maryline Laurent. MyProfile - Privacy Aware Decentralized Identity on the Web. <i>1st International Conference on Secure networking and Applications (ICSNA)<\/i>, Oct 2011, Paris, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00745416v1\">&#x27E8;hal-00745416&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00745416v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kheira Bekara, Maryline Laurent. La vie priv\u00e9e dans les environnements f\u00e9d\u00e9r\u00e9s. <i>Atelier protection de la vie priv\u00e9e 2010<\/i>, May 2010, Annecy, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01356807v1\">&#x27E8;hal-01356807&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01356807\/file\/journee-Vie-Privee-Annecy-mai2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01356807\/file\/journee-Vie-Privee-Annecy-mai2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01356807\/file\/journee-Vie-Privee-Annecy-mai2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01356807v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kheira Bekara, Maryline Laurent. Enabling user privacy in identity management systems. <i>ICITIS 2010 : IEEE International Conference on Information Theory and Information Security<\/i>, Dec 2010, P\u00e9kin, China. pp.514-520, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICITIS.2010.5689547\">&#x27E8;10.1109\/ICITIS.2010.5689547&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01306871v1\">&#x27E8;hal-01306871&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01306871\/file\/ICITIS2010-Bekara-Kheira-dec2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01306871\/file\/ICITIS2010-Bekara-Kheira-dec2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01306871\/file\/ICITIS2010-Bekara-Kheira-dec2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01306871v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Kheira Bekara, Yosra Ben Mustapha, Maryline Laurent. XPACML eXtensible Privacy Access Control Markup Language. <i> 2nd International Conference on Communications and Networking (ComNet 2010)<\/i>, Nov 2010, Tozeur, Tunisia. pp.1-5, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/COMNET.2010.5699807\">&#x27E8;10.1109\/COMNET.2010.5699807&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01306061v1\">&#x27E8;hal-01306061&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01306061\/file\/Bekara-Priv-Language-Comnet2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01306061\/file\/Bekara-Priv-Language-Comnet2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01306061\/file\/Bekara-Priv-Language-Comnet2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01306061v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Maryline Laurent. An ID-based authentication scheme for the IEEE 802.11s mesh network. <i>WIMOB 2010 : IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications<\/i>, Oct 2010, Niagara Falls, Canada. pp.256 - 263, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WIMOB.2010.5645055\">&#x27E8;10.1109\/WIMOB.2010.5645055&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01308630v1\">&#x27E8;hal-01308630&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01308630\/file\/Wimob2010-Aymen-Boudguiga-AuthScheme-MeshNetworks.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01308630\/file\/Wimob2010-Aymen-Boudguiga-AuthScheme-MeshNetworks.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01308630\/file\/Wimob2010-Aymen-Boudguiga-AuthScheme-MeshNetworks.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01308630v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Tony Cheneau, Maryline Laurent. \u00c9tude des solutions de proxy Neighbor Discovery s\u00e9curis\u00e9es et proposition bas\u00e9e sur la Signature Agility. <i>5\u00e8me Conf\u00e9rence sur la S\u00e9curit\u00e9 des Architectures R\u00e9seaux et Syst\u00e8mes d'Information (SAR-SSI 2010)<\/i>, May 2010, Rocquebrune Cap-Martin, France. pp.1 - 15. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01356372v1\">&#x27E8;hal-01356372&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01356372\/file\/Cheneau-SARSSI2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01356372\/file\/Cheneau-SARSSI2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01356372\/file\/Cheneau-SARSSI2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01356372v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Sond\u00e8s Larafa, Maryline Laurent. Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks. <i>IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010)<\/i>, Jun 2010, P\u00e9kin, China. pp.277 - 281, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WCINS.2010.5541783\">&#x27E8;10.1109\/WCINS.2010.5541783&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01356343v1\">&#x27E8;hal-01356343&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01356343\/file\/Larafa-ieeewcnis2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01356343\/file\/Larafa-ieeewcnis2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01356343\/file\/Larafa-ieeewcnis2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01356343v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Daniel Migault, C\u00e9dric Girard, Maryline Laurent. A performance view on DNSSEC migration. <i>CNSM 2010 : 6th International Conference on Network and Service Management<\/i>, Oct 2010, Niagara Falls, Canada. pp.469 - 474, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CNSM.2010.5691275\">&#x27E8;10.1109\/CNSM.2010.5691275&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01308335v1\">&#x27E8;hal-01308335&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01308335\/file\/Migault-CNSM2010.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01308335\/file\/Migault-CNSM2010.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01308335\/file\/Migault-CNSM2010.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01308335v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Am\u00e9lioration des performances des adresses CGA et du protocole SEND : \u00e9tude compar\u00e9e de RSA et d'ECC\/ECDSA. <i>SAR-SSI 2009 : 4\u00e8me Conf\u00e9rence sur la s\u00e9curit\u00e9 des architectures r\u00e9seaux et des syst\u00e8mes d'information<\/i>, Jun 2009, Luchon, France. pp.139 - 156. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01360812v1\">&#x27E8;hal-01360812&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01360812\/file\/Cheneau-SARSSI2009.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01360812\/file\/Cheneau-SARSSI2009.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01360812\/file\/Cheneau-SARSSI2009.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01360812v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Sond\u00e8s Larafa, Maryline Laurent. Protocols for distributed AAA framework in mobile ad-hoc networks. <i>MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP Networking 2009<\/i>, May 2009, Aachen, Germany. pp.75 - 86. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01316815v1\">&#x27E8;hal-01316815&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01316815v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Philippe Wary, Maryline Laurent. Secure communications between multi-capacity devices with authentication support by network operators. <i>MWNS 2009 : 2nd International Workshop on Mobile and Wireless Networks Security<\/i>, May 2009, Aachen, Germany. pp.25 - 35. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01368472v1\">&#x27E8;hal-01368472&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01368472v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent, Kheira Bekara. Mitigating resource-draining DoS attacks on broadcast source authentication on wireless sensors networks. <i>SecTech 2008 : International Conference on Security Technology<\/i>, Dec 2008, Hainan Island, China. pp.109 - 116, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SecTech.2008.20\">&#x27E8;10.1109\/SecTech.2008.20&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01327163v1\">&#x27E8;hal-01327163&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01327163v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent, Kheira Bekara. H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacks. <i>ICCS 2008 : 11th IEEE International Conference on Communication Systems<\/i>, Nov 2008, Guangzhou, China. pp.1197 - 1203 <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICCS.2008.4737372\">&#x27E8;10.1109\/ICCS.2008.4737372&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01327378v1\">&#x27E8;hal-01327378&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01327378\/file\/cbekara-ICCS08.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01327378\/file\/cbekara-ICCS08.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01327378\/file\/cbekara-ICCS08.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01327378v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Maryline Laurent. Toward a new ad hoc node design for secure service deployment over ad hoc network. <i>MWNS 2008 : Workshop on Mobile and Wireless Networks Security<\/i>, May 2008, Singapore, Singapore. pp.1 - 11, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1142\/9789812833266_0001\">&#x27E8;10.1142\/9789812833266_0001&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355075v1\">&#x27E8;hal-01355075&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01355075\/file\/MWNS%20CHA%20MAK-final.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01355075\/file\/MWNS%20CHA%20MAK-final.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01355075\/file\/MWNS%20CHA%20MAK-final.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01355075v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Alexis Davoux, Jean-Christophe Defline, Ludovic Francesconi, Maryline Laurent, Kheira Bekara, et al.. Federation of circles of trust and secure usage of digital identity. <i>e-2008 : eChallenges <\/i>, Oct 2008, Stockholm, Sweden. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01333035v1\">&#x27E8;hal-01333035&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01333035v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houssem Jarraya, Maryline Laurent. A secure Peer-to-Peer backup system. <i>NOTERE 2008 : 8\u00e8me conf\u00e9rence internationale sur les nouvelles technologies de la r\u00e9partition<\/i>, Jun 2008, Lyon, France. pp.125 - 134, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1416729.1416751\">&#x27E8;10.1145\/1416729.1416751&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01379960v1\">&#x27E8;hal-01379960&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01379960v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Amir R. Khakpour, Maryline Laurent, Hakima Chaouchi. WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks. <i>ARES 2008 : 3rd International Conference on Availability, Reliability and Security<\/i>, Mar 2008, Barcelona, Spain. pp.144 - 152, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2008.19\">&#x27E8;10.1109\/ARES.2008.19&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355081v1\">&#x27E8;hal-01355081&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01355081\/file\/Khakpour-ARES08.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01355081\/file\/Khakpour-ARES08.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01355081\/file\/Khakpour-ARES08.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01355081v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Sond\u00e8s Larafa, Maryline Laurent, Hakima Chaouchi. Light and distributed AAA scheme for mobile ad-hoc networks. <i>SETOP 2008 : 1st Workshop on Security of Autonomous and Spontaneous Networks<\/i>, Oct 2008, Loctudy, France. pp.93 - 104. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01327396v1\">&#x27E8;hal-01327396&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01327396\/file\/LARAFA-SETOP08.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01327396\/file\/LARAFA-SETOP08.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01327396\/file\/LARAFA-SETOP08.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01327396v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Chakib Bekara, Wassim Drira. Light and simple security solution for cold chain supervision. <i>EUNICE 2008 : 14th European Conference on Information and Communications Technologies<\/i>, Sep 2008, Brest, France. pp.1 - 6. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01327416v1\">&#x27E8;hal-01327416&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01327416v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent. A new protocol for securing wireless sensor networks against nodes replication attacks. <i>3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007)<\/i>, Oct 2007, White Plains, Ny, United States. pp.59 - <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WIMOB.2007.4390853\">&#x27E8;10.1109\/WIMOB.2007.4390853&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355352v1\">&#x27E8;hal-01355352&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01355352\/file\/bekara-WiMob07.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01355352\/file\/bekara-WiMob07.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01355352\/file\/bekara-WiMob07.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01355352v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent. A new resilient key management protocol for wireless sensor networks. <i>WISTP 2007: 1st IFIP TC6 \/ WG 8.8 \/ WG 11.2 International Workshop on Information Security Theory and Practices : Smart Cards, Mobile and Ubiquitous Computing Systems<\/i>, May 2007, Heraklion, Greece. pp.14 - 26, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-72354-7_2\">&#x27E8;10.1007\/978-3-540-72354-7_2&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328143v1\">&#x27E8;hal-01328143&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01328143\/file\/bekara-WISTP07.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01328143\/file\/bekara-WISTP07.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01328143\/file\/bekara-WISTP07.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01328143v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent, Kheira Bekara. SAPC : a Secure Aggregation Protocol for Cluster-based wireless sensor networks. <i>MSN 2007 : 3rd International Conference on Mobile Ad-hoc and Sensor Networks<\/i>, Dec 2007, Beijing, China. pp.784 - 798, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-77024-4_71\">&#x27E8;10.1007\/978-3-540-77024-4_71&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328162v1\">&#x27E8;hal-01328162&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01328162\/file\/Bekara-SAPC-MSN07.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01328162\/file\/Bekara-SAPC-MSN07.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01328162\/file\/Bekara-SAPC-MSN07.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01328162v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent. Defending against nodes replication attacks on wireless sensor networks. <i>SAR-SSI 2007 : 2nd Conference on Security in Network Architectures and Information Systems<\/i>, Jun 2007, Annecy, France. pp.31 - 40. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328148v1\">&#x27E8;hal-01328148&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01328148\/file\/bekara-SARSSI07.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01328148\/file\/bekara-SARSSI07.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01328148\/file\/bekara-SARSSI07.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01328148v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Amin Ben Abdallah, Omar Cheikhrouhou, Maryline Laurent, Hakima Chaouchi, Maher Ben Jemaa. Architecture de s\u00e9curit\u00e9 dans un r\u00e9seau mesh multi sauts. <i>GRES 2007 : 8\u00e8me Colloque Francophone de Gestion de REseaux et de Services \"Adaptation dynamique des r\u00e9seaux et des services\"<\/i>, Nov 2007, Hammamet, Tunisie. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01327900v1\">&#x27E8;hal-01327900&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01327900\/file\/maknavicius-GRES07.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01327900\/file\/maknavicius-GRES07.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01327900\/file\/maknavicius-GRES07.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01327900v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Julien Bournelle, Jean-Michel Combes, Maryline Laurent, Claire Sond\u00e8s Larafa. Using PANA for mobile IPv6 bootstrapping. <i>NETWORKING 2007 : 6th international IFIP-TC6 networking conference on ad hoc and sensor networks, wireless networks, next generation Internet<\/i>, May 2007, Atlanta, United States. pp.345 - 355, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-72606-7_30\">&#x27E8;10.1007\/978-3-540-72606-7_30&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328113v1\">&#x27E8;hal-01328113&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01328113\/file\/bournelle-ifip2007.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01328113\/file\/bournelle-ifip2007.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01328113\/file\/bournelle-ifip2007.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01328113v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Maryline Laurent. SAACCESS : secured ad hoc access framework. <i>NTMS 2007 : 1st IFIP International Conference on NewTechnologies, Mobility and Security<\/i>, May 2007, Paris, France. pp.425 - 436, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-1-4020-6270-4_35\">&#x27E8;10.1007\/978-1-4020-6270-4_35&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328014v1\">&#x27E8;hal-01328014&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01328014\/file\/mlaurent-NTMS07.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01328014\/file\/mlaurent-NTMS07.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01328014\/file\/mlaurent-NTMS07.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01328014v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2006<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Julien Bournelle, Guillaume Valadon, David Binet, Saber Zrelli, Maryline Laurent-Maknavicius, et al.. AAA considerations within several NEMO deployment scenarios. <i>WONEMO 2006<\/i>, Jan 2006, Sendai, Japan. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01351674v1\">&#x27E8;hal-01351674&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01351674v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Omar Cheikhrouhou, Maher Ben Jemaa, Maryline Laurent. Nouvelle m\u00e9thode d'authentification EAP-EHash. <i>CFIP 2006\/ Colloque Francophone sur l'Ing\u00e9nierie des Protocoles<\/i>, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur, Tunisie. 12 p. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00111911v1\">&#x27E8;inria-00111911&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/inria-00111911\/file\/CFIP-ID-06.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00111911\/file\/CFIP-ID-06.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00111911\/file\/CFIP-ID-06.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00111911v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2001<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ahmed Bouabdallah, Maryline Laurent. Formal validation of an ATM security context negociation protocol. <i>Proceedings of the International symposium on software and systems (I3S)<\/i>, Feb 2001, Constantine, Algeria. pp.25 - 33. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02341318v1\">&#x27E8;hal-02341318&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02341318v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2000<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Maryline Laurent, Sylvain Gombault. A full bandwidth ATM firewall. <i>ESORICS'2000 : 6th european symposium on research in computer security, Toulouse, octobre<\/i>, Oct 2000, Toulouse, France. pp.206 - 221. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02142128v1\">&#x27E8;hal-02142128&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02142128v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>1999<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, et al.. Secure communications in ATM networks. <i>ACSAC'99, proceedings of the 15th annual computer security applications conference<\/i>, Dec 1999, Phoenix, United States. pp.84 - 93, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSAC.1999.816016\">&#x27E8;10.1109\/CSAC.1999.816016&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02341313v1\">&#x27E8;hal-02341313&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02341313v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Maryline Laurent, Sylvain Gombault. An asynchronous distributed access control architecture for IP over ATM networks. <i>ACSAC 1999 : 15th Annual Computer Security Applications Conference<\/i>, Dec 1999, Phoenix, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSAC.1999.816015\">&#x27E8;10.1109\/CSAC.1999.816015&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01840923v1\">&#x27E8;hal-01840923&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01840923v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Chapitre d'ouvrage<\/p>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Josep Domingo-Ferrer, Maryline Laurent. Foreword, privacy in statistical databases 2022. <i>Foreword, Privacy in Statistical Databases 2022<\/i>, 13463, Springer International Publishing, 2022, Lecture Notes in Computer Science, 978-3-031-13945-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-13945-1\">&#x27E8;10.1007\/978-3-031-13945-1&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04176139v1\">&#x27E8;hal-04176139&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04176139v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevi\u010dius, Marinella Petrocchi, et al.. Privacy-by-design in intelligent infrastructures. <i>Deep diving into data protection: 1979-2019: celebrating 40 years of research on privacy data protection at the CRIDS<\/i>, 170 (51), Collection du CRIDS, pp.309-343, 2021, 9782807926493. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04331489v1\">&#x27E8;hal-04331489&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-04331489v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signes de confiance : l\u2019impact des labels sur la gestion des donn\u00e9es personnelles. Claire Levallois-Barth. <i>Signes de confiance : l\u2019impact des labels sur la gestion des donn\u00e9es personnelles<\/i>, <a target=\"_blank\" href=\"https:\/\/cvpip.wp.imt.fr\/files\/2018\/02\/CahierChaireVPIP2-Signes_de_Confiance-janvier2018.pdf\">Institut Mines-T\u00e9l\u00e9com<\/a>, pp.199 - 202, 2018, 978-2-9557308-4-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02336275v1\">&#x27E8;hal-02336275&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02336275v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent, Patrick Waelbroeck. Conclusion. Signs of trust : the impact of seals on personal data management. <i>Signs of trust : the impact of seals on personal data management<\/i>, 2, Institut Mines-T\u00e9l\u00e9com, pp.199 - 203, 2018, Chair Values and Policies of Personal Information, 978-2-9557308-5-0. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02336269v1\">&#x27E8;hal-02336269&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-02336269v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Armen Khatchatourov. La confiance en informatique par la gestion du risque. <i>Signes de confiance : l\u2019impact des labels sur la gestion des donn\u00e9es personnelles<\/i>, Institut Mines-T\u00e9l\u00e9com, pp.47 - 62, 2018, 978-2-9557308-4-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01773953v1\">&#x27E8;hal-01773953&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01773953v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent. La blockchain est-elle une technologie de confiance. Claire Levallois-Barth. <i>Signes de confiance : l\u2019impact des labels sur la gestion des donn\u00e9es personnelles<\/i>, Institut Mines-T\u00e9l\u00e9com, pp.179 - 198, 2018, 978-2-9557308-4-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01778949v1\">&#x27E8;hal-01778949&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01778949\/file\/2017-09-18-confiance%26Blockchain-fin.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01778949\/file\/2017-09-18-confiance%26Blockchain-fin.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01778949\/file\/2017-09-18-confiance%26Blockchain-fin.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01778949v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent. Is blockchain a trustworthy technology?. Claire Levallois-Barth. <i>Signs of trust \u2013 The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth<\/i>, Institut Mines-T\u00e9l\u00e9com, pp.180-197, 2018, 978-2-9557308-6-7. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02516126v1\">&#x27E8;hal-02516126&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02516126\/file\/2018-EN-CahierChaireVPIP2-Fiche11-HAL.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02516126\/file\/2018-EN-CahierChaireVPIP2-Fiche11-HAL.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02516126\/file\/2018-EN-CahierChaireVPIP2-Fiche11-HAL.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02516126v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Armen Khatchatourov. Building trust through risk management in computer science. Claire Levallois-Barth. <i>Signs of trust \u2013 The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth<\/i>, Institut Mines-T\u00e9l\u00e9com, pp.48-59, 2018, 978-2-9557308-6-7. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02516151v1\">&#x27E8;hal-02516151&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-02516151\/file\/2018-EN-CahierChaireVPIP2-Fiche4-HAL.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02516151\/file\/2018-EN-CahierChaireVPIP2-Fiche4-HAL.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02516151\/file\/2018-EN-CahierChaireVPIP2-Fiche4-HAL.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02516151v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2016<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Armen Khatchatourov, Claire Levallois-Barth, Maryline Laurent. Analyse comparative des choix de conception des syst\u00e8mes de gestion des identit\u00e9s num\u00e9riques. Claire Levallois-Barth. <i>Identit\u00e9s num\u00e9riques<\/i>, 1, <a target=\"_blank\" href=\"https:\/\/cvpip.wp.imt.fr\/files\/2016\/02\/Cahier-Identites-numeriques_web.pdf\">Institut Mines-T\u00e9l\u00e9com<\/a>, pp.71-83, 2016, Cahier. <a target=\"_blank\" href=\"https:\/\/shs.hal.science\/halshs-05104271v1\">&#x27E8;halshs-05104271&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/shs.hal.science\/halshs-05104271v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Julie Denou\u00ebl, Claire Levallois-Barth, Patrick Waelbroeck. Digital identity. <i>Digital identity management<\/i>, ISTE Press; Elsevier, pp.1 - 45, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/B978-1-78548-004-1.50001-8\">&#x27E8;10.1016\/B978-1-78548-004-1.50001-8&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01272021v1\">&#x27E8;hal-01272021&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01272021v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Claire Levallois-Barth. Gestion de la vie priv\u00e9e et protection des donn\u00e9es \u00e0 caract\u00e8re personnel. <i>La gestion des identit\u00e9s num\u00e9riques<\/i>, ISTE Edition, pp.179 - 236, 2015, Syst\u00e8mes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263062v1\">&#x27E8;hal-01263062&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263062v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Claire Levallois-Barth. Privacy management and protection of personal data. <i>Digital identity management<\/i>, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/B978-1-78548-004-1.50004-3\">&#x27E8;10.1016\/B978-1-78548-004-1.50004-3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01272029v1\">&#x27E8;hal-01272029&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01272029v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Julie Denou\u00ebl, Claire Levallois-Barth, Patrick Waelbroeck. Les identit\u00e9s num\u00e9riques. <i>La gestion des identit\u00e9s num\u00e9riques<\/i>, ISTE Edition, pp.19 - 90, 2015, Syst\u00e8mes d'information, web et informatique ubiquitaire, 978-1-78405-056-6. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263060v1\">&#x27E8;hal-01263060&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263060v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Maryline Laurent, Mohamed Hamdi. Fundamentals of identity-based cryptography. <i>Practical cryptography : algorithms and implementations using C++<\/i>, CRC Press, pp.225 - 250, 2014, 978-1-4822-2889-2. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1201\/b17707-13\">&#x27E8;10.1201\/b17707-13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01255480v1\">&#x27E8;hal-01255480&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01255480v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Maryline Laurent. Authentication in wireless mesh networks. <i>Security for multihop wireless networks <\/i>, CRC Press, pp.419 - 446, 2014, 978-1-466-57803-6. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1201\/b16754-20\">&#x27E8;10.1201\/b16754-20&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01260916v1\">&#x27E8;hal-01260916&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01260916v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Emmanuel Herbert, Daniel Migault, St\u00e9phane S\u00e9n\u00e9cal, Stanislas Francfort, Maryline Laurent. Analyzing Internet DNS(SEC) traffic with R for resolving platform optimization. <i>Data Mining Applications with R<\/i>, Elsevier; Academic Press, pp.435 - 456, 2014, 978-0-12-411511-8. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/B978-0-12-411511-8.00016-5\">&#x27E8;10.1016\/B978-0-12-411511-8.00016-5&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01263426v1\">&#x27E8;hal-01263426&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01263426v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houssem Jarraya, Maryline Laurent. S\u00e9curit\u00e9 des r\u00e9seaux P2P. <i>Evolution des technologies pair-\u00e0-pair : optimisation, s\u00e9curit\u00e9 et application<\/i>, Herm\u00e8s science; Lavoisier, pp.135 - 154, 2010, IC2 : Trait\u00e9 r\u00e9seaux et t\u00e9l\u00e9coms, 978-2-7462-2579-4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355245v1\">&#x27E8;hal-01355245&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01355245v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent. Key management in wireless sensor networks. <i>Wireless and mobile network security<\/i>, ISTE \/ Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/9780470611883.ch16\">&#x27E8;10.1002\/9780470611883.ch16&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00472923v1\">&#x27E8;hal-00472923&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00472923v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. Security of IP-based mobile networks. <i>Wireless and Mobile Network Security <\/i>, ISTE\/Wiley, pp.437 - 474, 2009, 978-1-84821-117-9. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/9780470611883.ch12\">&#x27E8;10.1002\/9780470611883.ch12&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00472937v1\">&#x27E8;hal-00472937&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00472937v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Hakima Chaouchi, Olivier Paul. Fundamental security mechanisms. <i>Wireless and mobile network security <\/i>, ISTE\/Wiley, pp.73 - 130, 2009, 978-1-84821-117-9. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/9780470611883.ch3\">&#x27E8;10.1002\/9780470611883.ch3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00472941v1\">&#x27E8;hal-00472941&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-00472941v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jos\u00e9-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. Wireless sensor network security. <i>Wireless and mobile networks security<\/i>, ISTE\/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/9780470611883.ch15\">&#x27E8;10.1002\/9780470611883.ch15&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01359532v1\">&#x27E8;hal-01359532&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01359532v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent. Gestion de cl\u00e9s dans les r\u00e9seaux de capteurs. <i>La s\u00e9curit\u00e9 dans les r\u00e9seaux sans fil et mobiles. 3, Technologies \u00e9mergentes<\/i>, Hermes Science; Lavoisier, pp.233 - 269, 2007, IC2 : information, commande, communication. R\u00e9seaux et t\u00e9l\u00e9coms, 978-2-7462-1699-0. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328150v1\">&#x27E8;hal-01328150&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01328150v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jean-Michel Combes, Daniel Migault, Julien Bournelle, Hakima Chaouchi, Maryline Laurent. S\u00e9curit\u00e9 des r\u00e9seaux mobiles IP. <i>La s\u00e9curit\u00e9 dans les r\u00e9seaux sans fil et mobiles. 3, Technologies \u00e9mergentes<\/i>, Hermes Science; Lavoisier, pp.47 - 81, 2007, IC2 : information, commande, communication. R\u00e9seaux et t\u00e9l\u00e9coms, 978-2-7462-1699-0. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328154v1\">&#x27E8;hal-01328154&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01328154v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Hakima Chaouchi, Olivier Paul. M\u00e9canismes de s\u00e9curit\u00e9 fondamentaux. <i>La s\u00e9curit\u00e9 dans les r\u00e9seaux sans fil et mobiles. 1, Concepts fondamentaux<\/i>, Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information, commande, communication. R\u00e9seaux et t\u00e9l\u00e9coms, 978-2-7462-1697-6. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328102v1\">&#x27E8;hal-01328102&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01328102v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Jos\u00e9-Marcos Nogueira, Hao-Chi Wong, Antonio Alfredo F. Loureiro, Chakib Bekara, Maryline Laurent, et al.. S\u00e9curit\u00e9 dans les r\u00e9seaux de capteurs sans fil. <i>La s\u00e9curit\u00e9 dans les r\u00e9seaux sans fil et mobiles. 3, Technologies \u00e9mergentes<\/i>, Hermes Science; Lavoisier, pp.183 - 231, 2007, IC2 : information, commande, communication. R\u00e9seaux et t\u00e9l\u00e9coms, 978-2-7462-1699-0. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328149v1\">&#x27E8;hal-01328149&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01328149v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2000<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Maryline Laurent. Improving Packet Filters Management through Automatic and Dynamic Schemes. <i>Information Security for Global Information Infrastructures<\/i>, 47, Springer US, pp.331-340, 2000, IFIP Advances in Information and Communication Technology, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-0-387-35515-3_34\">&#x27E8;10.1007\/978-0-387-35515-3_34&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03643182v1\">&#x27E8;hal-03643182&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03643182v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Maryline Laurent, Sylvain Gombault. A Full Bandwidth ATM Firewall. <i>Computer Security - ESORICS 2000<\/i>, 1895, Springer Berlin Heidelberg, pp.206-221, 2000, Lecture Notes in Computer Science, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/10722599_13\">&#x27E8;10.1007\/10722599_13&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03643184v1\">&#x27E8;hal-03643184&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03643184v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>1999<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Maryline Laurent. An Alternative Access Control Architecture for IP Over ATM Networks. <i>Secure Information Networks<\/i>, Springer US, pp.36-50, 1999, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-0-387-35568-9_3\">&#x27E8;10.1007\/978-0-387-35568-9_3&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03643187v1\">&#x27E8;hal-03643187&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03643187v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>N\u00b0sp\u00e9cial de revue\/special issue<\/p>\n<p class='SousRubrique'>2017<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent. Security, and privacy in emerging wireless networks : security and communication networks journal. 2017, Security and Communication Networks Journal. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01682207v1\">&#x27E8;hal-01682207&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01682207v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Autre publication scientifique<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Antonio L\u00f3pez Mart\u00ednez, Montassar Naghmouchi, Maryline Laurent, Joaquin Garcia\u2010alfaro, Manuel Gil P\u00e9rez, et al.. Empower healthcare through a self-sovereign identity infrastructure for secure electronic health data access. 2025, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.48550\/arXiv.2501.12229\">&#x27E8;10.48550\/arXiv.2501.12229&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04930967v1\">&#x27E8;hal-04930967&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2501.12229\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2501.12229\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04930967v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent. A systematic review and layered framework for privacy-by-design in self-sovereign identity systems. 2025, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.48550\/arXiv.2502.02520\">&#x27E8;10.48550\/arXiv.2502.02520&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05249882v1\">&#x27E8;hal-05249882&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05249882\/file\/2502.02520v2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05249882\/file\/2502.02520v2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05249882\/file\/2502.02520v2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05249882v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2023<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent, Claire Levallois-Barth, Nesrine Kaaniche. Comparative analysis of technical and legal frameworks of various national digial identity solutions. 2023, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.48550\/arXiv.2310.01006\">&#x27E8;10.48550\/arXiv.2310.01006&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04931054v1\">&#x27E8;hal-04931054&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/arxiv.org\/pdf\/2310.01006\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/2310.01006\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04931054v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Ouvrages<\/p>\n<p class='SousRubrique'>2022<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Esma A\u00efmeur, Maryline Laurent, Reda Yaich, Beno\u00eet Dupont, Joaquin Garcia\u2010alfaro (Dir.). Foundations and practice of security. Springer International Publishing, 13291, 2022, Lecture Notes in Computer Science, 978-3-031-08146-0. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-08147-7\">&#x27E8;10.1007\/978-3-031-08147-7&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03843022v1\">&#x27E8;hal-03843022&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03843022v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2020<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Thanassis Giannetsos. Information Security Theory and Practice. Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-41702-4\">&#x27E8;10.1007\/978-3-030-41702-4&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-03173895v1\">&#x27E8;hal-03173895&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/inria.hal.science\/hal-03173895\/file\/IFIPLNCS12024DL_2020_BookFrontmatter.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03173895\/file\/IFIPLNCS12024DL_2020_BookFrontmatter.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03173895\/file\/IFIPLNCS12024DL_2020_BookFrontmatter.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03173895v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2018<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Levallois-Barth, Armen Khatchatourov, Maryline Laurent, Patrick Waelbroeck, Delphine Chauvet, et al.. Signes de confiance : l'impact des labels sur la gestion des donn\u00e9es personnelles. Claire Levallois-Barth. <a target=\"_blank\" href=\"https:\/\/cvpip.wp.imt.fr\/files\/2018\/02\/CahierChaireVPIP2-Signes_de_Confiance-janvier2018.pdf\">Claire Levallois-Barth<\/a>, pp.III-232, 2018, 978-2-9557308-4-3. <a target=\"_blank\" href=\"https:\/\/shs.hal.science\/halshs-05104121v1\">&#x27E8;halshs-05104121&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/shs.hal.science\/halshs-05104121\/file\/ouvrage_2018-Signes_de_Confiance.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/shs.hal.science\/halshs-05104121\/file\/ouvrage_2018-Signes_de_Confiance.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/shs.hal.science\/halshs-05104121\/file\/ouvrage_2018-Signes_de_Confiance.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/shs.hal.science\/halshs-05104121v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Levallois-Barth, Armen Khatchatourov, Maryline Laurent, Patrick Waelbroeck, Delphine Chauvet, et al.. Signs of trust: the impact of seals on personal data management. Claire Levallois-Barth. <a target=\"_blank\" href=\"https:\/\/cvpip.wp.imt.fr\/files\/2018\/11\/Handbook2-ChairVPIP-2018-electronicversion.pdf\"><\/a>, pp.III-240, 2018, 978-2-9557308-5-0. <a target=\"_blank\" href=\"https:\/\/shs.hal.science\/halshs-05104128v1\">&#x27E8;halshs-05104128&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/shs.hal.science\/halshs-05104128\/file\/book-2019-signs%20of%20trust.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/shs.hal.science\/halshs-05104128\/file\/book-2019-signs%20of%20trust.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/shs.hal.science\/halshs-05104128\/file\/book-2019-signs%20of%20trust.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/shs.hal.science\/halshs-05104128v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2015<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Samia Bouzefrane (Dir.). Digital Identity Management. <a target=\"_blank\" href=\"https:\/\/www.istegroup.com\/en\/book\/digital-identity-management\/\">Iste<\/a>, 2015. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01126495v1\">&#x27E8;hal-01126495&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01126495v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2014<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Samia Bouzefrane. La gestion des identit\u00e9s num\u00e9riques. ISTE. pp.340, 2014, \u00e0 para\u00eetre. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01126448v1\">&#x27E8;hal-01126448&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01126448v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Sara Foresti, Heng Xu (Dir.). Privacy-aware electronic society. Springer, 2014, Annals of Telecommunication, Volume 69, Issue 1-2, Annals of Telecommunication, Volume 69, Issue 1-2, 0003-4347. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01261315v1\">&#x27E8;hal-01261315&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01261315v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Georg Carle, Maryline Laurent (Dir.). Mobile and wireless network security : proceedings of the 2nd International Workshop, MWNS 2009, Aachen, Germany, 15 may 2009. Shaker Verlag, pp.86, 2009, 978-3-8322-8177-9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01370512v1\">&#x27E8;hal-01370512&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01370512v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Maryline Laurent. Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies. ISTE\/John Wiley & Sons, pp.667, 2009, ISTE, ISTE, 978-1-84821-117-9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01370514v1\">&#x27E8;hal-01370514&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01370514v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Maryline Laurent, Hakima Chaouchi (Dir.). Mobile and wireless networks security : proceedings of the MWNS 2008 workshop, Singapore, 9 april 2008. World Scientific, 2008, 978-981-283-325-9. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01355042v1\">&#x27E8;hal-01355042&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01355042v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2007<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Maryline Laurent. La s\u00e9curit\u00e9 dans les r\u00e9seaux sans fil et mobiles. 3, Technologies \u00e9mergentes. Hermes Science; Lavoisier, pp.291, 2007, IC2 : information, commande, communication. R\u00e9seaux et t\u00e9l\u00e9coms, IC2 : information, commande, communication. R\u00e9seaux et t\u00e9l\u00e9coms, 978-2-7462-1699-0. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01329422v1\">&#x27E8;hal-01329422&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01329422v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Maryline Laurent. La s\u00e9curit\u00e9 dans les r\u00e9seaux sans fil et mobiles. 2, Technologies du march\u00e9. Hermes Science; Lavoisier, pp.249, 2007, IC2 : information, commande, communication. R\u00e9seaux et t\u00e9l\u00e9coms, IC2 : information, commande, communication. R\u00e9seaux et t\u00e9l\u00e9coms, 978-2-7462-1698-3. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328157v1\">&#x27E8;hal-01328157&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01328157v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Maryline Laurent. La s\u00e9curit\u00e9 dans les r\u00e9seaux sans fil et mobiles. 1, Concepts fondamentaux. Hermes Science; Lavoisier, pp.239, 2007, IC2, S\u00e9rie R\u00e9seaux et T\u00e9l\u00e9coms IC2, S\u00e9rie R\u00e9seaux et T\u00e9l\u00e9coms 978-2-7462-1697-6. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01328159v1\">&#x27E8;hal-01328159&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01328159v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Brevet<\/p>\n<p class='SousRubrique'>2013<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ethmane El Moustaine, Maryline Laurent. Proc\u00e9d\u00e9 pour crypter des donn\u00e9es dans un cryptosyst\u00e8me NTRU (N,p,q). France, N\u00b0 de brevet: FR2992510. 12959. 2013, pp.27. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01275262v1\">&#x27E8;hal-01275262&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01275262v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2012<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Ethmane El Moustaine, Maryline Laurent. Proc\u00e9d\u00e9 d'authentification d'un tag. France, N\u00b0 de brevet: FR2971905. 12982. 2012, pp.24. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01343576v1\">&#x27E8;hal-01343576&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01343576v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Hakima Chaouchi, Maryline Laurent. Proc\u00e9d\u00e9 d'\u00e9change de donn\u00e9es dans un r\u00e9seau ad hoc. France, N\u00b0 de brevet: FR2919137. 7091. 2009, pp.50. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01354850v1\">&#x27E8;hal-01354850&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01354850v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houssem Jarraya, Maryline Laurent. Proc\u00e9d\u00e9 de sauvegarde\/restauration de fichiers dans un r\u00e9seau pair \u00e0 pair. France, N\u00b0 de brevet: FR2929792. 5331. 2009, pp.36. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01343149v1\">&#x27E8;hal-01343149&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01343149v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2003<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Olivier Paul, Sylvain Gombault, Maryline Laurent-Maknavicius, Jo\u00ebl Lattmann, Christian Duret, et al.. Method and device for the processing of data packets. France, Patent n\u00b0 : EP1335565. 9870. 2003. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01868019v1\">&#x27E8;hal-01868019&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-01868019v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Poster de conf\u00e9rence<\/p>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent. ClinConNet: privacy preserving identity &amp; consent management for clinical trials. <i>Journ\u00e9es Annuelles du PEPR Sant\u00e9 Num\u00e9rique (PEPR-SanteNum)<\/i>, Oct 2025, Lille, France. 2025. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05353590v1\">&#x27E8;hal-05353590&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05353590\/file\/Poster.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05353590\/file\/Poster.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05353590\/file\/Poster.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05353590v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Proceedings\/Recueil des communications<\/p>\n<p class='SousRubrique'>2021<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Samia Bouzefrane, Maryline Laurent, Selma Boumerdassi, Eric Renault. Mobile, Secure, and Programmable Networking: 6th international conference, MSPN 2020: Paris, France, October 28\u201329, 2020, revised selected papers. <i>MSPN 2020: International Conference on Mobile, Secure, and Programmable Networking<\/i>, Oct 2021, Paris, France. 12605, Springer, pp.X, 251, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-67549-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-67550-9\">&#x27E8;10.1007\/978-3-030-67550-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03494288v1\">&#x27E8;hal-03494288&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03494288v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='Rubrique'>Rapport<\/p>\n<p class='SousRubrique'>2010<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Chakib Bekara, Maryline Laurent, Wassim Drira, Rahim Kacimi, Andr\u00e9-Luc Beylot, et al.. Tests, Mesures et Validation. [Contrat] Institut National Polytechnique de Toulouse. 2010. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03970390v1\">&#x27E8;hal-03970390&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03970390v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<p class='SousRubrique'>2009<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nahla Abid, Maryline Laurent. A new authentication method based on cryptographic identifiers CGAs. [Research Report] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2009, pp.29. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01360031v1\">&#x27E8;hal-01360031&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01360031\/file\/RR-Nahla-Abid-EAP-CGA-2009.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01360031\/file\/RR-Nahla-Abid-EAP-CGA-2009.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01360031\/file\/RR-Nahla-Abid-EAP-CGA-2009.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01360031v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Monique Becker, Chakib Bekara, Andr\u00e9-Luc Beylot, Alexandre Delye, Riadh Dhaou, et al.. Cold chain monitoring using wireless sensor networks : design & experimental feedback. [Research Report] RR-09007\u2013RST, T\u00e9l\u00e9com Sud Paris. 2009. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03975329v1\">&#x27E8;hal-03975329&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\">\n<a href=\"https:\/\/hal.science\/hal-03975329v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wassim Drira, Chakib Bekara, Maryline Laurent. Secure aggregation in wireless sensor networks. [Research Report] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2009, pp.58. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01360043v1\">&#x27E8;hal-01360043&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01360043\/file\/RR_securite_Capteurs-Aggregation-WassimDRIRA-2009.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01360043\/file\/RR_securite_Capteurs-Aggregation-WassimDRIRA-2009.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01360043\/file\/RR_securite_Capteurs-Aggregation-WassimDRIRA-2009.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01360043v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Sond\u00e8s Larafa, Maryline Laurent. Distributed AAA framework for MANET: performance analysis. [Research Report] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2009, pp.34. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01360029v1\">&#x27E8;hal-01360029&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01360029\/file\/RR-Sondes-Larafa-AAA-Manet-Performance.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01360029\/file\/RR-Sondes-Larafa-AAA-Manet-Performance.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01360029\/file\/RR-Sondes-Larafa-AAA-Manet-Performance.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01360029v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Amina Mekki Mokhtar, Kheira Bekara, Maryline Laurent. Un protocole pour la n\u00e9gociation des politiques de privacy. [Rapport de recherche] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2009, pp.55. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01369889v1\">&#x27E8;hal-01369889&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01369889\/file\/RR-Amina-Mekki-Negot-Pol-2009-1.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01369889\/file\/RR-Amina-Mekki-Negot-Pol-2009-1.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01369889\/file\/RR-Amina-Mekki-Negot-Pol-2009-1.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01369889v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2008<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Nahla Abid, Maryline Laurent, Hakima Chaouchi. Experimental experience with Host Identity Protocol (HIP). [Research Report] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2008, pp.58. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01373423v1\">&#x27E8;hal-01373423&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01373423\/file\/RR-HIP-Mesures-NahlaABID-2008.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01373423\/file\/RR-HIP-Mesures-NahlaABID-2008.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01373423\/file\/RR-HIP-Mesures-NahlaABID-2008.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01373423v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Aymen Boudguiga, Tony Cheneau, Maryline Laurent. Usage and performance of cryptographically generated addresses. [Research Report] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2008, pp.94. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01373433v1\">&#x27E8;hal-01373433&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01373433\/file\/RR-Boudguiga-CGA-Performance.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01373433\/file\/RR-Boudguiga-CGA-Performance.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01373433\/file\/RR-Boudguiga-CGA-Performance.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01373433v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Wassim Drira, Chakib Bekara, Maryline Laurent. S\u00e9curit\u00e9 dans les r\u00e9seaux de capteurs sans fil : conception et impl\u00e9mentation. [Rapport de recherche] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2008, pp.55. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01373430v1\">&#x27E8;hal-01373430&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01373430\/file\/RR_securite_Capteurs-Implem-WassimDRIRA-2008.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01373430\/file\/RR_securite_Capteurs-Implem-WassimDRIRA-2008.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01373430\/file\/RR_securite_Capteurs-Implem-WassimDRIRA-2008.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01373430v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Houssem Jarraya, Maryline Laurent. Un syst\u00e8me de sauvegarde P2P s\u00e9curis\u00e9 s'appuyant sur une architecture AAA. [Rapport de recherche] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2008, pp.55. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01373441v1\">&#x27E8;hal-01373441&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01373441\/file\/RR_securite_P2P.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01373441\/file\/RR_securite_P2P.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01373441\/file\/RR_securite_P2P.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01373441v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Willy Ronald Jimenez Freitez, Hakima Chaouchi, Maryline Laurent. Authentication services in mobile ad hoc networks. [Research Report] D\u00e9pt. Logiciels-R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis); Services r\u00e9partis, Architectures, MOd\u00e9lisation, Validation, Administration des R\u00e9seaux (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis-CNRS). 2008, pp.41. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01373823v1\">&#x27E8;hal-01373823&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-01373823\/file\/RR-Willy-Jimenez-Virtualisationb-AAA-AdHoc.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01373823\/file\/RR-Willy-Jimenez-Virtualisationb-AAA-AdHoc.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01373823\/file\/RR-Willy-Jimenez-Virtualisationb-AAA-AdHoc.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01373823v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Logiciel<\/p>\n<p class='SousRubrique'>2026<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent. Web portal for ClinConNet platform. 2026, <a target=\"_blank\" style=\"word-break: break-all;\" href=\"https:\/\/archive.softwareheritage.org\/browse\/swh:1:dir:659af85496f6fe2786f2c64488ebb6474384cd46;origin=https:\/\/hal.archives-ouvertes.fr\/hal-05546070;visit=swh:1:snp:c7bf4a94e7d8f70eaee4384ddeecf64db10aeb4e;anchor=swh:1:rel:f205205a3b2f4e40f554dc621e0cba822d403fc1;path=\/\">&#x27E8;swh:1:dir:659af85496f6fe2786f2c64488ebb6474384cd46;origin=https:\/\/hal.archives-ouvertes.fr\/hal-05546070;visit=swh:1:snp:c7bf4a94e7d8f70eaee4384ddeecf64db10aeb4e;anchor=swh:1:rel:f205205a3b2f4e40f554dc621e0cba822d403fc1;path=\/&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05546070v1\">&#x27E8;hal-05546070&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05546070\/file\/ClinConNet-Portal-master.zip\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05546070\/file\/ClinConNet-Portal-master.zip\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05546070\/file\/ClinConNet-Portal-master.zip\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05546070v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent. Cloud agent (SSI wallet) for clinConNet platform. 2026, <a target=\"_blank\" style=\"word-break: break-all;\" href=\"https:\/\/archive.softwareheritage.org\/browse\/swh:1:dir:44b688768d5253e52e7e8b4380076c0d926f6496;origin=https:\/\/hal.archives-ouvertes.fr\/hal-05546077;visit=swh:1:snp:faeea91acb9b9267bdb8b8001e6284ba7b04516d;anchor=swh:1:rel:065a94f4035c03a16ad0d75fd62d409c00d86e74;path=\/\">&#x27E8;swh:1:dir:44b688768d5253e52e7e8b4380076c0d926f6496;origin=https:\/\/hal.archives-ouvertes.fr\/hal-05546077;visit=swh:1:snp:faeea91acb9b9267bdb8b8001e6284ba7b04516d;anchor=swh:1:rel:065a94f4035c03a16ad0d75fd62d409c00d86e74;path=\/&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05546077v1\">&#x27E8;hal-05546077&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05546077\/file\/Veramo-cloud-agent-master.zip\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05546077\/file\/Veramo-cloud-agent-master.zip\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05546077\/file\/Veramo-cloud-agent-master.zip\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05546077v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>Pr\u00e9-publication, Document de travail<\/p>\n<p class='SousRubrique'>2026<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Montassar Naghmouchi, Maryline Laurent. Clinconnet : a Blockchain-based dynamic consent management platform for clinical research. 2026. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05515030v1\">&#x27E8;hal-05515030&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05515030\/file\/Blockchain_based_Dynamic_Consent_Paper-58.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05515030\/file\/Blockchain_based_Dynamic_Consent_Paper-58.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05515030\/file\/Blockchain_based_Dynamic_Consent_Paper-58.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05515030v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2025<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Said Ider, Maryline Laurent. GeoFINDR: Practical Approach to Verify Cloud Instances Geolocation in Multicloud. 2025. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-05253993v1\">&#x27E8;hal-05253993&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/hal.science\/hal-05253993\/file\/2504.18685v1-2.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05253993\/file\/2504.18685v1-2.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05253993\/file\/2504.18685v1-2.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05253993v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>2024<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">ref_biblio<\/dt><dd class=\"ValeurRes ref_biblio\">Claire Levallois-Barth, Maryline Laurent. Les acteurs de l'\u00e9cosyst\u00e8me technique relatifs aux identit\u00e9s num\u00e9riques - \u00c9cosyst\u00e8me \u00e9largi \u00e0 la fourniture d'attributs, de justificatifs, de signatures \u00e9lectroniques et de portefeuilles d'identit\u00e9 num\u00e9rique, working paper. 2024. <a target=\"_blank\" href=\"https:\/\/shs.hal.science\/halshs-04430701v1\">&#x27E8;halshs-04430701&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\">\n<a href=\"https:\/\/shs.hal.science\/halshs-04430701\/file\/2024%2001%20C%20LEVALLOIS%20M%20LAURENT%20acteurs%20identites%20numeriques.pdf\"  target=\"_blank\">\n<img decoding=\"async\" alt=\"https:\/\/shs.hal.science\/halshs-04430701\/file\/2024%2001%20C%20LEVALLOIS%20M%20LAURENT%20acteurs%20identites%20numeriques.pdf\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/shs.hal.science\/halshs-04430701\/file\/2024%2001%20C%20LEVALLOIS%20M%20LAURENT%20acteurs%20identites%20numeriques.pdf\" \/><\/a>\n<span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/shs.hal.science\/halshs-04430701v1\/bibtex\" target=\"_self\">\n<img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.archives-ouvertes.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a>\n<\/span><\/dd>\n<\/dl>\n<\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":4479,"parent":2438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-3570","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3570"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3570\/revisions"}],"predecessor-version":[{"id":3571,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/3570\/revisions\/3571"}],"up":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/pages\/2438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/4479"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}