BibTeX records: Nesrine Kaaniche

download as .bib file

@article{DBLP:journals/jnsm/SedjelmaciKT24,
  author       = {Hichem Sedjelmaci and
                  Nesrine Kaaniche and
                  Kamel Tourki},
  title        = {Secure and Resilient 6 {G} {RAN} Networks: {A} Decentralized Approach
                  with Zero Trust Architecture},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {32},
  number       = {2},
  pages        = {33},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10922-024-09807-x},
  doi          = {10.1007/S10922-024-09807-X},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnsm/SedjelmaciKT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SedjelmaciKBA24,
  author       = {Hichem Sedjelmaci and
                  Nesrine Kaaniche and
                  Aymen Boudguiga and
                  Nirwan Ansari},
  title        = {Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet
                  of Vehicles},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {73},
  number       = {2},
  pages        = {2633--2642},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVT.2023.3317940},
  doi          = {10.1109/TVT.2023.3317940},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/SedjelmaciKBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TrivediBKT23,
  author       = {Devharsh Trivedi and
                  Aymen Boudguiga and
                  Nesrine Kaaniche and
                  Nikos Triandopoulos},
  title        = {SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {52},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040052},
  doi          = {10.3390/CRYPTOGRAPHY7040052},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/TrivediBKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/KaanicheKLG23,
  author       = {Nesrine Kaaniche and
                  Christophe Kiennert and
                  Maryline Laurent and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Anonymous certification for E-assessment opinion polls},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {11},
  pages        = {14979--14993},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-019-01545-2},
  doi          = {10.1007/S12652-019-01545-2},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/KaanicheKLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-01006,
  author       = {Montassar Naghmouchi and
                  Maryline Laurent and
                  Claire Levallois{-}Barth and
                  Nesrine Kaaniche},
  title        = {Comparative Analysis of Technical and Legal Frameworks of Various
                  National Digial Identity Solutions},
  journal      = {CoRR},
  volume       = {abs/2310.01006},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.01006},
  doi          = {10.48550/ARXIV.2310.01006},
  eprinttype    = {arXiv},
  eprint       = {2310.01006},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-01006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MasmoudiKL22,
  author       = {Souha Masmoudi and
                  Nesrine Kaaniche and
                  Maryline Laurent},
  title        = {{SPOT:} Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare
                  Systems},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {106400--106414},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3208697},
  doi          = {10.1109/ACCESS.2022.3208697},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MasmoudiKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/BelguithKH22,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Mohammad Hammoudeh},
  title        = {Analysis of attribute-based cryptographic techniques and their application
                  to protect cloud services},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.3667},
  doi          = {10.1002/ETT.3667},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/BelguithKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MasmoudiLK22,
  author       = {Souha Masmoudi and
                  Maryline Laurent and
                  Nesrine Kaaniche},
  title        = {{PIMA:} {A} Privacy-preserving Identity management system based on
                  an unlinkable MAlleable signature},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {208},
  pages        = {103517},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jnca.2022.103517},
  doi          = {10.1016/J.JNCA.2022.103517},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MasmoudiLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/SultanKLB22,
  author       = {Nazatul Haque Sultan and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Ferdous Ahmed Barbhuiya},
  title        = {Authorized Keyword Search over Outsourced Encrypted Data in Cloud
                  Environment},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {1},
  pages        = {216--233},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2019.2931896},
  doi          = {10.1109/TCC.2019.2931896},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/SultanKLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SedjelmaciKBK22,
  author       = {Hichem Sedjelmaci and
                  Nizar Kheir and
                  Aymen Boudguiga and
                  Nesrine Kaaniche},
  title        = {Cooperative and smart attacks detection systems in 6G-enabled Internet
                  of Things},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul,
                  Korea, May 16-20, 2022},
  pages        = {5238--5243},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICC45855.2022.9838338},
  doi          = {10.1109/ICC45855.2022.9838338},
  timestamp    = {Fri, 19 Aug 2022 10:24:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/SedjelmaciKBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/MasmoudiLK22,
  author       = {Souha Masmoudi and
                  Maryline Laurent and
                  Nesrine Kaaniche},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {{SPOT+:} Secure and Privacy-Preserving Proximity-Tracing Protocol
                  with Efficient Verification over Multiple Contact Information},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_1},
  doi          = {10.1007/978-3-031-45137-9\_1},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/MasmoudiLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MasmoudiLK22,
  author       = {Souha Masmoudi and
                  Maryline Laurent and
                  Nesrine Kaaniche},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{SEVIL:} Secure and Efficient VerifIcation over Massive Proofs of
                  KnowLedge},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {13--24},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011125800003283},
  doi          = {10.5220/0011125800003283},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MasmoudiLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KaanicheBG22,
  author       = {Nesrine Kaaniche and
                  Aymen Boudguiga and
                  Gustavo {Gonzalez Granadillo}},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Efficient Hybrid Model for Intrusion Detection Systems},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {694--700},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328300003283},
  doi          = {10.5220/0011328300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KaanicheBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-00381,
  author       = {Souha Masmoudi and
                  Nesrine Kaaniche and
                  Maryline Laurent},
  title        = {{SPOT:} Secure and Privacy-preserving prOximiTy protocol for e-healthcare
                  systems},
  journal      = {CoRR},
  volume       = {abs/2212.00381},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.00381},
  doi          = {10.48550/ARXIV.2212.00381},
  eprinttype    = {arXiv},
  eprint       = {2212.00381},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-00381.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/SklavosK21,
  author       = {Nicolas Sklavos and
                  Nesrine Kaaniche},
  title        = {On the design of secure primitives for real world applications},
  journal      = {Microprocess. Microsystems},
  volume       = {80},
  pages        = {103614},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.micpro.2020.103614},
  doi          = {10.1016/J.MICPRO.2020.103614},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/SklavosK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/NouraSKSCC21,
  author       = {Hassan N. Noura and
                  Ola Salman and
                  Nesrine Kaaniche and
                  Nicolas Sklavos and
                  Ali Chehab and
                  Rapha{\"{e}}l Couturier},
  title        = {{TRESC:} Towards redesigning existing symmetric ciphers},
  journal      = {Microprocess. Microsystems},
  volume       = {87},
  pages        = {103478},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.micpro.2020.103478},
  doi          = {10.1016/J.MICPRO.2020.103478},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/NouraSKSCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MarillonnetALK21,
  author       = {Paul Marillonnet and
                  Mika{\"{e}}l Ates and
                  Maryline Laurent and
                  Nesrine Kaaniche},
  title        = {An Efficient User-Centric Consent Management Design for Multiservices
                  Platforms},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5512075:1--5512075:19},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5512075},
  doi          = {10.1155/2021/5512075},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MarillonnetALK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/KaanicheLC21,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent and
                  S{\'{e}}bastien Canard},
  title        = {Cooperative Set Homomorphic Proofs for Data Possession Checking in
                  Clouds},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {1},
  pages        = {102--117},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2018.2865343},
  doi          = {10.1109/TCC.2018.2865343},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/KaanicheLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-02153,
  author       = {Claudio Bellei and
                  Hussain Alattas and
                  Nesrine Kaaniche},
  title        = {Label-GCN: An Effective Method for Adding Label Propagation to Graph
                  Convolutional Networks},
  journal      = {CoRR},
  volume       = {abs/2104.02153},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.02153},
  eprinttype    = {arXiv},
  eprint       = {2104.02153},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-02153.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fbloc/KaanicheLL20,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent and
                  Claire Levallois{-}Barth},
  title        = {ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments},
  journal      = {Frontiers Blockchain},
  volume       = {3},
  pages        = {17},
  year         = {2020},
  url          = {https://doi.org/10.3389/fbloc.2020.00017},
  doi          = {10.3389/FBLOC.2020.00017},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fbloc/KaanicheLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BelguithKHD20,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Mohammad Hammoudeh and
                  Tooska Dargahi},
  title        = {{PROUD:} Verifiable Privacy-preserving Outsourced Attribute Based
                  SignCryption supporting access policy Update for cloud assisted IoT
                  applications},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {111},
  pages        = {899--918},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.11.012},
  doi          = {10.1016/J.FUTURE.2019.11.012},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/BelguithKHD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KaanicheLB20,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent and
                  Sana Belguith},
  title        = {Privacy enhancing technologies for solving the privacy-personalization
                  paradox: Taxonomy and survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {171},
  pages        = {102807},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jnca.2020.102807},
  doi          = {10.1016/J.JNCA.2020.102807},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KaanicheLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/BelguithKLJA20,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Abderrazak Jemai and
                  Rabah Attia},
  title        = {Accountable privacy preserving attribute based framework for authenticated
                  encrypted access in clouds},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {135},
  pages        = {1--20},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2019.08.014},
  doi          = {10.1016/J.JPDC.2019.08.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/BelguithKLJA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/YaacoubSNKCM20,
  author       = {Jean{-}Paul A. Yaacoub and
                  Ola Salman and
                  Hassan N. Noura and
                  Nesrine Kaaniche and
                  Ali Chehab and
                  Mohammad Malli},
  title        = {Cyber-physical systems security: Limitations, issues and future trends},
  journal      = {Microprocess. Microsystems},
  volume       = {77},
  pages        = {103201},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.micpro.2020.103201},
  doi          = {10.1016/J.MICPRO.2020.103201},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/YaacoubSNKCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BelguithKR20,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Giovanni Russello},
  title        = {{CUPS:} Secure opportunistic cloud of things framework based on attribute-based
                  encryption scheme supporting access policy update},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.85},
  doi          = {10.1002/SPY2.85},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BelguithKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/MarillonnetALK20,
  author       = {Paul Marillonnet and
                  Mika{\"{e}}l Ates and
                  Maryline Laurent and
                  Nesrine Kaaniche},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {An Identity-matching Process to Strengthen Trust in Federated-identity
                  Architectures},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {142--154},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009828401420154},
  doi          = {10.5220/0009828401420154},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/MarillonnetALK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KaanicheBLGR20,
  author       = {Nesrine Kaaniche and
                  Sana Belguith and
                  Maryline Laurent and
                  Ashish Gehani and
                  Giovanni Russello},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {225--237},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009889302250237},
  doi          = {10.5220/0009889302250237},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KaanicheBLGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KaanicheMZLD20,
  author       = {Nesrine Kaaniche and
                  Souha Masmoudi and
                  Souha Znina and
                  Maryline Laurent and
                  Levent Demir},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {Privacy preserving cooperative computation for personalized web search
                  applications},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {250--258},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3373947},
  doi          = {10.1145/3341105.3373947},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/KaanicheMZLD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuanGL0K19,
  author       = {Zhi Guan and
                  Abba Garba and
                  Anran Li and
                  Zhong Chen and
                  Nesrine Kaaniche},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {AuthLedger: {A} Novel Blockchain-based Domain Name Authentication
                  Scheme},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {345--352},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007366803450352},
  doi          = {10.5220/0007366803450352},
  timestamp    = {Wed, 05 Jun 2019 13:01:15 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GuanGL0K19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BelguithKLJA18,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Abderrazak Jemai and
                  Rabah Attia},
  title        = {{PHOABE:} Securely outsourcing multi-authority attribute based encryption
                  with policy hidden for cloud assisted IoT},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {141--156},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.036},
  doi          = {10.1016/J.COMNET.2018.01.036},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BelguithKLJA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/KaanicheL18,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  title        = {Privacy-Preserving Multi-User Encrypted Access Control Scheme for
                  Cloud-Assisted IoT Applications},
  booktitle    = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {590--597},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CLOUD.2018.00082},
  doi          = {10.1109/CLOUD.2018.00082},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/KaanicheL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/KaanicheL18a,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  title        = {{BDUA:} Blockchain-Based Data Usage Auditing},
  booktitle    = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {630--637},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CLOUD.2018.00087},
  doi          = {10.1109/CLOUD.2018.00087},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/KaanicheL18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/BelguithKR18,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Giovanni Russello},
  title        = {{PU-ABE:} Lightweight Attribute-Based Encryption Supporting Access
                  Policy Update for Cloud Assisted IoT},
  booktitle    = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {924--927},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CLOUD.2018.00137},
  doi          = {10.1109/CLOUD.2018.00137},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/BelguithKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/BelguithK0R18,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Mohamed Mohamed and
                  Giovanni Russello},
  title        = {{C-ABSC:} Cooperative Attribute Based SignCryption Scheme for Internet
                  of Things Applications},
  booktitle    = {2018 {IEEE} International Conference on Services Computing, {SCC}
                  2018, San Francisco, CA, USA, July 2-7, 2018},
  pages        = {245--248},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SCC.2018.00040},
  doi          = {10.1109/SCC.2018.00040},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/BelguithK0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataservice/KaanicheJG18,
  author       = {Nesrine Kaaniche and
                  Eunjin Jung and
                  Ashish Gehani},
  title        = {Efficiently Validating Aggregated IoT Data Integrity},
  booktitle    = {Fourth {IEEE} International Conference on Big Data Computing Service
                  and Applications, BigDataService 2018, Bamberg, Germany, March 26-29,
                  2018},
  pages        = {260--265},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/BigDataService.2018.00046},
  doi          = {10.1109/BIGDATASERVICE.2018.00046},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataservice/KaanicheJG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Pamies-EstremsK18,
  author       = {David P{\`{a}}mies{-}Estrems and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Jordi Castell{\`{a}}{-}Roca and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Giovanni Livraga and
                  Ruben Rios},
  title        = {Lifelogging Protection Scheme for Internet-Based Personal Assistants},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018,
                  Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11025},
  pages        = {431--440},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00305-0\_31},
  doi          = {10.1007/978-3-030-00305-0\_31},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Pamies-EstremsK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/BelguithKR18,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Giovanni Russello},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Lightweight Attribute-based Encryption Supporting Access Policy Update
                  for Cloud Assisted IoT},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {301--312},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006854603010312},
  doi          = {10.5220/0006854603010312},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/BelguithKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KaanicheL18,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {{SABE:} {A} Selective Attribute-based Encryption for an Efficient
                  Threshold Multi-level Access Control},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {321--333},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006855503210333},
  doi          = {10.5220/0006855503210333},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KaanicheL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/LaurentKLP18,
  author       = {Maryline Laurent and
                  Nesrine Kaaniche and
                  Christian Le and
                  Mathieu Vander Plaetse},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {A Blockchain based Access Control Scheme},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {334--342},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006855603340342},
  doi          = {10.5220/0006855603340342},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/LaurentKLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KaanicheBR18,
  author       = {Nesrine Kaaniche and
                  Sana Belguith and
                  Giovanni Russello},
  editor       = {Man Ho Au and
                  Siu{-}Ming Yiu and
                  Jin Li and
                  Xiapu Luo and
                  Cong Wang and
                  Aniello Castiglione and
                  Kamil Kluczniak},
  title        = {{EMA-LAB:} Efficient Multi Authorisation Level Attribute Based Access
                  Control},
  booktitle    = {Network and System Security - 12th International Conference, {NSS}
                  2018, Hong Kong, China, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11058},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02744-5\_14},
  doi          = {10.1007/978-3-030-02744-5\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KaanicheBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/BelguithK0R18,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Mohamed Mohamed and
                  Giovanni Russello},
  editor       = {Herv{\'{e}} Panetto and
                  Christophe Debruyne and
                  Henderik A. Proper and
                  Claudio Agostino Ardagna and
                  Dumitru Roman and
                  Robert Meersman},
  title        = {Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet
                  of Things Applications},
  booktitle    = {On the Move to Meaningful Internet Systems. {OTM} 2018 Conferences
                  - Confederated International Conferences: CoopIS, C{\&}TC, and
                  {ODBASE} 2018, Valletta, Malta, October 22-26, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11229},
  pages        = {498--515},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02610-3\_28},
  doi          = {10.1007/978-3-030-02610-3\_28},
  timestamp    = {Fri, 27 Dec 2019 21:26:49 +0100},
  biburl       = {https://dblp.org/rec/conf/otm/BelguithK0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KaanicheL17,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  title        = {Data security and privacy preservation in cloud storage environments
                  based on cryptographic mechanisms},
  journal      = {Comput. Commun.},
  volume       = {111},
  pages        = {120--141},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comcom.2017.07.006},
  doi          = {10.1016/J.COMCOM.2017.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/KaanicheL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/KaanicheMLL17,
  author       = {Nesrine Kaaniche and
                  Mohamed Mohamed and
                  Maryline Laurent and
                  Heiko Ludwig},
  title        = {Security {SLA} Based Monitoring in Clouds},
  booktitle    = {{IEEE} International Conference on Edge Computing, {EDGE} 2017, Honolulu,
                  HI, USA, June 25-30, 2017},
  pages        = {90--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/IEEE.EDGE.2017.20},
  doi          = {10.1109/IEEE.EDGE.2017.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edge/KaanicheMLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KaanicheLRKG17,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent and
                  Pierre{-}Olivier Rocher and
                  Christophe Kiennert and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Hannes Hartenstein and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {\emph{PCS} , {A} Privacy-Preserving Certification Scheme},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017,
                  Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10436},
  pages        = {239--256},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67816-0\_14},
  doi          = {10.1007/978-3-319-67816-0\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KaanicheLRKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/KaanicheL17,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  editor       = {Aris Gkoulalas{-}Divanis and
                  Miguel P. Correia and
                  Dimiter R. Avresky},
  title        = {A blockchain-based data usage auditing architecture with enhanced
                  privacy and availability},
  booktitle    = {16th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2017, Cambridge, MA, USA, October 30 - November 1, 2017},
  pages        = {403--407},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/NCA.2017.8171384},
  doi          = {10.1109/NCA.2017.8171384},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/KaanicheL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/KiennertKLRG17,
  author       = {Christophe Kiennert and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Pierre{-}Olivier Rocher and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Anonymous Certification for an e-Assessment Framework},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_5},
  doi          = {10.1007/978-3-319-70290-2\_5},
  timestamp    = {Mon, 26 Jun 2023 20:48:37 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/KiennertKLRG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KaanicheL17,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Attribute based Encryption for Multi-level Access Control Policies},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {67--78},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006421000670078},
  doi          = {10.5220/0006421000670078},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KaanicheL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelguithKLJA17,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Abderrazak Jemai and
                  Rabah Attia},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Constant-size Threshold Attribute based SignCryption for Cloud Applications},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {212--225},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006469202120225},
  doi          = {10.5220/0006469202120225},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelguithKLJA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KaanicheL16,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Attribute-Based Signatures for Supporting Anonymous Certification},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {279--300},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_14},
  doi          = {10.1007/978-3-319-45744-4\_14},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KaanicheL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelguithKJLA16,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Abderrazak Jemai and
                  Maryline Laurent and
                  Rabah Attia},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {PAbAC: {A} Privacy Preserving Attribute based Framework for Fine Grained
                  Access Control in Clouds},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {133--146},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005968201330146},
  doi          = {10.5220/0005968201330146},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelguithKJLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/KaanicheL15,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  editor       = {Liang{-}Jie Zhang and
                  Rami Bahsoon},
  title        = {SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage
                  Applications},
  booktitle    = {2015 {IEEE} World Congress on Services, {SERVICES} 2015, New York
                  City, NY, USA, June 27 - July 2, 2015},
  pages        = {143--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SERVICES.2015.29},
  doi          = {10.1109/SERVICES.2015.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/KaanicheL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Kaaniche14,
  author       = {Nesrine Kaaniche},
  title        = {Cloud data storage security based on cryptographic mechanisms. (La
                  s{\'{e}}curit{\'{e}} des donn{\'{e}}es stock{\'{e}}es
                  dans un environnement cloud, bas{\'{e}}e sur des m{\'{e}}canismes
                  cryptographiques)},
  school       = {Telecom {\&} Management SudParis, {\'{E}}vry, Essonne, France},
  year         = {2014},
  url          = {https://tel.archives-ouvertes.fr/tel-01146029},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Kaaniche14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/KaanicheML14,
  author       = {Nesrine Kaaniche and
                  Ethmane El Moustaine and
                  Maryline Laurent},
  title        = {A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud
                  Storage Applications},
  booktitle    = {14th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid
                  Computing, CCGrid 2014, Chicago, IL, USA, May 26-29, 2014},
  pages        = {522--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CCGrid.2014.81},
  doi          = {10.1109/CCGRID.2014.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/KaanicheML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/KaanicheL14,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {A Secure Client Side Deduplication Scheme in Cloud Storage Environments},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814002},
  doi          = {10.1109/NTMS.2014.6814002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/KaanicheL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KaanicheLB14,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent and
                  Mohammed El{-}Barbori},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {CloudaSec: {A} Novel Public-key Based Framework to Handle Data Sharing
                  Security in Clouds},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {5--18},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005010600050018},
  doi          = {10.5220/0005010600050018},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KaanicheLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/KaanicheBL13,
  author       = {Nesrine Kaaniche and
                  Aymen Boudguiga and
                  Maryline Laurent},
  title        = {{ID} Based Cryptography for Cloud Data Storage},
  booktitle    = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa
                  Clara, CA, USA, June 28 - July 3, 2013},
  pages        = {375--382},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CLOUD.2013.80},
  doi          = {10.1109/CLOUD.2013.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/KaanicheBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics