Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nesrine Kaaniche
@article{DBLP:journals/jnsm/SedjelmaciKT24, author = {Hichem Sedjelmaci and Nesrine Kaaniche and Kamel Tourki}, title = {Secure and Resilient 6 {G} {RAN} Networks: {A} Decentralized Approach with Zero Trust Architecture}, journal = {J. Netw. Syst. Manag.}, volume = {32}, number = {2}, pages = {33}, year = {2024}, url = {https://doi.org/10.1007/s10922-024-09807-x}, doi = {10.1007/S10922-024-09807-X}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnsm/SedjelmaciKT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/SedjelmaciKBA24, author = {Hichem Sedjelmaci and Nesrine Kaaniche and Aymen Boudguiga and Nirwan Ansari}, title = {Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {73}, number = {2}, pages = {2633--2642}, year = {2024}, url = {https://doi.org/10.1109/TVT.2023.3317940}, doi = {10.1109/TVT.2023.3317940}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/SedjelmaciKBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TrivediBKT23, author = {Devharsh Trivedi and Aymen Boudguiga and Nesrine Kaaniche and Nikos Triandopoulos}, title = {SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {52}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040052}, doi = {10.3390/CRYPTOGRAPHY7040052}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/TrivediBKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/KaanicheKLG23, author = {Nesrine Kaaniche and Christophe Kiennert and Maryline Laurent and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Anonymous certification for E-assessment opinion polls}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {11}, pages = {14979--14993}, year = {2023}, url = {https://doi.org/10.1007/s12652-019-01545-2}, doi = {10.1007/S12652-019-01545-2}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/KaanicheKLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-01006, author = {Montassar Naghmouchi and Maryline Laurent and Claire Levallois{-}Barth and Nesrine Kaaniche}, title = {Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions}, journal = {CoRR}, volume = {abs/2310.01006}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.01006}, doi = {10.48550/ARXIV.2310.01006}, eprinttype = {arXiv}, eprint = {2310.01006}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-01006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MasmoudiKL22, author = {Souha Masmoudi and Nesrine Kaaniche and Maryline Laurent}, title = {{SPOT:} Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems}, journal = {{IEEE} Access}, volume = {10}, pages = {106400--106414}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3208697}, doi = {10.1109/ACCESS.2022.3208697}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MasmoudiKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/BelguithKH22, author = {Sana Belguith and Nesrine Kaaniche and Mohammad Hammoudeh}, title = {Analysis of attribute-based cryptographic techniques and their application to protect cloud services}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/ett.3667}, doi = {10.1002/ETT.3667}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/BelguithKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MasmoudiLK22, author = {Souha Masmoudi and Maryline Laurent and Nesrine Kaaniche}, title = {{PIMA:} {A} Privacy-preserving Identity management system based on an unlinkable MAlleable signature}, journal = {J. Netw. Comput. Appl.}, volume = {208}, pages = {103517}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2022.103517}, doi = {10.1016/J.JNCA.2022.103517}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MasmoudiLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/SultanKLB22, author = {Nazatul Haque Sultan and Nesrine Kaaniche and Maryline Laurent and Ferdous Ahmed Barbhuiya}, title = {Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {1}, pages = {216--233}, year = {2022}, url = {https://doi.org/10.1109/TCC.2019.2931896}, doi = {10.1109/TCC.2019.2931896}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/SultanKLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SedjelmaciKBK22, author = {Hichem Sedjelmaci and Nizar Kheir and Aymen Boudguiga and Nesrine Kaaniche}, title = {Cooperative and smart attacks detection systems in 6G-enabled Internet of Things}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul, Korea, May 16-20, 2022}, pages = {5238--5243}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICC45855.2022.9838338}, doi = {10.1109/ICC45855.2022.9838338}, timestamp = {Fri, 19 Aug 2022 10:24:08 +0200}, biburl = {https://dblp.org/rec/conf/icc/SedjelmaciKBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/MasmoudiLK22, author = {Souha Masmoudi and Maryline Laurent and Nesrine Kaaniche}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {{SPOT+:} Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {1--19}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_1}, doi = {10.1007/978-3-031-45137-9\_1}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/MasmoudiLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MasmoudiLK22, author = {Souha Masmoudi and Maryline Laurent and Nesrine Kaaniche}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{SEVIL:} Secure and Efficient VerifIcation over Massive Proofs of KnowLedge}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {13--24}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011125800003283}, doi = {10.5220/0011125800003283}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MasmoudiLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaanicheBG22, author = {Nesrine Kaaniche and Aymen Boudguiga and Gustavo {Gonzalez Granadillo}}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Efficient Hybrid Model for Intrusion Detection Systems}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {694--700}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328300003283}, doi = {10.5220/0011328300003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaanicheBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-00381, author = {Souha Masmoudi and Nesrine Kaaniche and Maryline Laurent}, title = {{SPOT:} Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems}, journal = {CoRR}, volume = {abs/2212.00381}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.00381}, doi = {10.48550/ARXIV.2212.00381}, eprinttype = {arXiv}, eprint = {2212.00381}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-00381.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/SklavosK21, author = {Nicolas Sklavos and Nesrine Kaaniche}, title = {On the design of secure primitives for real world applications}, journal = {Microprocess. Microsystems}, volume = {80}, pages = {103614}, year = {2021}, url = {https://doi.org/10.1016/j.micpro.2020.103614}, doi = {10.1016/J.MICPRO.2020.103614}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/SklavosK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/NouraSKSCC21, author = {Hassan N. Noura and Ola Salman and Nesrine Kaaniche and Nicolas Sklavos and Ali Chehab and Rapha{\"{e}}l Couturier}, title = {{TRESC:} Towards redesigning existing symmetric ciphers}, journal = {Microprocess. Microsystems}, volume = {87}, pages = {103478}, year = {2021}, url = {https://doi.org/10.1016/j.micpro.2020.103478}, doi = {10.1016/J.MICPRO.2020.103478}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/NouraSKSCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MarillonnetALK21, author = {Paul Marillonnet and Mika{\"{e}}l Ates and Maryline Laurent and Nesrine Kaaniche}, title = {An Efficient User-Centric Consent Management Design for Multiservices Platforms}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5512075:1--5512075:19}, year = {2021}, url = {https://doi.org/10.1155/2021/5512075}, doi = {10.1155/2021/5512075}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MarillonnetALK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/KaanicheLC21, author = {Nesrine Kaaniche and Maryline Laurent and S{\'{e}}bastien Canard}, title = {Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {1}, pages = {102--117}, year = {2021}, url = {https://doi.org/10.1109/TCC.2018.2865343}, doi = {10.1109/TCC.2018.2865343}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/KaanicheLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-02153, author = {Claudio Bellei and Hussain Alattas and Nesrine Kaaniche}, title = {Label-GCN: An Effective Method for Adding Label Propagation to Graph Convolutional Networks}, journal = {CoRR}, volume = {abs/2104.02153}, year = {2021}, url = {https://arxiv.org/abs/2104.02153}, eprinttype = {arXiv}, eprint = {2104.02153}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-02153.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fbloc/KaanicheLL20, author = {Nesrine Kaaniche and Maryline Laurent and Claire Levallois{-}Barth}, title = {ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments}, journal = {Frontiers Blockchain}, volume = {3}, pages = {17}, year = {2020}, url = {https://doi.org/10.3389/fbloc.2020.00017}, doi = {10.3389/FBLOC.2020.00017}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fbloc/KaanicheLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BelguithKHD20, author = {Sana Belguith and Nesrine Kaaniche and Mohammad Hammoudeh and Tooska Dargahi}, title = {{PROUD:} Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications}, journal = {Future Gener. Comput. Syst.}, volume = {111}, pages = {899--918}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.11.012}, doi = {10.1016/J.FUTURE.2019.11.012}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/BelguithKHD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KaanicheLB20, author = {Nesrine Kaaniche and Maryline Laurent and Sana Belguith}, title = {Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey}, journal = {J. Netw. Comput. Appl.}, volume = {171}, pages = {102807}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2020.102807}, doi = {10.1016/J.JNCA.2020.102807}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KaanicheLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/BelguithKLJA20, author = {Sana Belguith and Nesrine Kaaniche and Maryline Laurent and Abderrazak Jemai and Rabah Attia}, title = {Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds}, journal = {J. Parallel Distributed Comput.}, volume = {135}, pages = {1--20}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2019.08.014}, doi = {10.1016/J.JPDC.2019.08.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/BelguithKLJA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/YaacoubSNKCM20, author = {Jean{-}Paul A. Yaacoub and Ola Salman and Hassan N. Noura and Nesrine Kaaniche and Ali Chehab and Mohammad Malli}, title = {Cyber-physical systems security: Limitations, issues and future trends}, journal = {Microprocess. Microsystems}, volume = {77}, pages = {103201}, year = {2020}, url = {https://doi.org/10.1016/j.micpro.2020.103201}, doi = {10.1016/J.MICPRO.2020.103201}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/YaacoubSNKCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BelguithKR20, author = {Sana Belguith and Nesrine Kaaniche and Giovanni Russello}, title = {{CUPS:} Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update}, journal = {Secur. Priv.}, volume = {3}, number = {4}, year = {2020}, url = {https://doi.org/10.1002/spy2.85}, doi = {10.1002/SPY2.85}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BelguithKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/MarillonnetALK20, author = {Paul Marillonnet and Mika{\"{e}}l Ates and Maryline Laurent and Nesrine Kaaniche}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {An Identity-matching Process to Strengthen Trust in Federated-identity Architectures}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {142--154}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009828401420154}, doi = {10.5220/0009828401420154}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/MarillonnetALK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KaanicheBLGR20, author = {Nesrine Kaaniche and Sana Belguith and Maryline Laurent and Ashish Gehani and Giovanni Russello}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {225--237}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009889302250237}, doi = {10.5220/0009889302250237}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/KaanicheBLGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KaanicheMZLD20, author = {Nesrine Kaaniche and Souha Masmoudi and Souha Znina and Maryline Laurent and Levent Demir}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {Privacy preserving cooperative computation for personalized web search applications}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {250--258}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373947}, doi = {10.1145/3341105.3373947}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/KaanicheMZLD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuanGL0K19, author = {Zhi Guan and Abba Garba and Anran Li and Zhong Chen and Nesrine Kaaniche}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {AuthLedger: {A} Novel Blockchain-based Domain Name Authentication Scheme}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {345--352}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007366803450352}, doi = {10.5220/0007366803450352}, timestamp = {Wed, 05 Jun 2019 13:01:15 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GuanGL0K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BelguithKLJA18, author = {Sana Belguith and Nesrine Kaaniche and Maryline Laurent and Abderrazak Jemai and Rabah Attia}, title = {{PHOABE:} Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT}, journal = {Comput. Networks}, volume = {133}, pages = {141--156}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.036}, doi = {10.1016/J.COMNET.2018.01.036}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BelguithKLJA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/KaanicheL18, author = {Nesrine Kaaniche and Maryline Laurent}, title = {Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications}, booktitle = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {590--597}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CLOUD.2018.00082}, doi = {10.1109/CLOUD.2018.00082}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/KaanicheL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/KaanicheL18a, author = {Nesrine Kaaniche and Maryline Laurent}, title = {{BDUA:} Blockchain-Based Data Usage Auditing}, booktitle = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {630--637}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CLOUD.2018.00087}, doi = {10.1109/CLOUD.2018.00087}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/KaanicheL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/BelguithKR18, author = {Sana Belguith and Nesrine Kaaniche and Giovanni Russello}, title = {{PU-ABE:} Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT}, booktitle = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {924--927}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CLOUD.2018.00137}, doi = {10.1109/CLOUD.2018.00137}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/BelguithKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/BelguithK0R18, author = {Sana Belguith and Nesrine Kaaniche and Mohamed Mohamed and Giovanni Russello}, title = {{C-ABSC:} Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications}, booktitle = {2018 {IEEE} International Conference on Services Computing, {SCC} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {245--248}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SCC.2018.00040}, doi = {10.1109/SCC.2018.00040}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/BelguithK0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataservice/KaanicheJG18, author = {Nesrine Kaaniche and Eunjin Jung and Ashish Gehani}, title = {Efficiently Validating Aggregated IoT Data Integrity}, booktitle = {Fourth {IEEE} International Conference on Big Data Computing Service and Applications, BigDataService 2018, Bamberg, Germany, March 26-29, 2018}, pages = {260--265}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/BigDataService.2018.00046}, doi = {10.1109/BIGDATASERVICE.2018.00046}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataservice/KaanicheJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Pamies-EstremsK18, author = {David P{\`{a}}mies{-}Estrems and Nesrine Kaaniche and Maryline Laurent and Jordi Castell{\`{a}}{-}Roca and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Giovanni Livraga and Ruben Rios}, title = {Lifelogging Protection Scheme for Internet-Based Personal Assistants}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11025}, pages = {431--440}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00305-0\_31}, doi = {10.1007/978-3-030-00305-0\_31}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Pamies-EstremsK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/BelguithKR18, author = {Sana Belguith and Nesrine Kaaniche and Giovanni Russello}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {301--312}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006854603010312}, doi = {10.5220/0006854603010312}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/BelguithKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KaanicheL18, author = {Nesrine Kaaniche and Maryline Laurent}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {{SABE:} {A} Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {321--333}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006855503210333}, doi = {10.5220/0006855503210333}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/KaanicheL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/LaurentKLP18, author = {Maryline Laurent and Nesrine Kaaniche and Christian Le and Mathieu Vander Plaetse}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {A Blockchain based Access Control Scheme}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {334--342}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006855603340342}, doi = {10.5220/0006855603340342}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/LaurentKLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KaanicheBR18, author = {Nesrine Kaaniche and Sana Belguith and Giovanni Russello}, editor = {Man Ho Au and Siu{-}Ming Yiu and Jin Li and Xiapu Luo and Cong Wang and Aniello Castiglione and Kamil Kluczniak}, title = {{EMA-LAB:} Efficient Multi Authorisation Level Attribute Based Access Control}, booktitle = {Network and System Security - 12th International Conference, {NSS} 2018, Hong Kong, China, August 27-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11058}, pages = {187--201}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02744-5\_14}, doi = {10.1007/978-3-030-02744-5\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/KaanicheBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/BelguithK0R18, author = {Sana Belguith and Nesrine Kaaniche and Mohamed Mohamed and Giovanni Russello}, editor = {Herv{\'{e}} Panetto and Christophe Debruyne and Henderik A. Proper and Claudio Agostino Ardagna and Dumitru Roman and Robert Meersman}, title = {Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications}, booktitle = {On the Move to Meaningful Internet Systems. {OTM} 2018 Conferences - Confederated International Conferences: CoopIS, C{\&}TC, and {ODBASE} 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11229}, pages = {498--515}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02610-3\_28}, doi = {10.1007/978-3-030-02610-3\_28}, timestamp = {Fri, 27 Dec 2019 21:26:49 +0100}, biburl = {https://dblp.org/rec/conf/otm/BelguithK0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KaanicheL17, author = {Nesrine Kaaniche and Maryline Laurent}, title = {Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms}, journal = {Comput. Commun.}, volume = {111}, pages = {120--141}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2017.07.006}, doi = {10.1016/J.COMCOM.2017.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/KaanicheL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/KaanicheMLL17, author = {Nesrine Kaaniche and Mohamed Mohamed and Maryline Laurent and Heiko Ludwig}, title = {Security {SLA} Based Monitoring in Clouds}, booktitle = {{IEEE} International Conference on Edge Computing, {EDGE} 2017, Honolulu, HI, USA, June 25-30, 2017}, pages = {90--97}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/IEEE.EDGE.2017.20}, doi = {10.1109/IEEE.EDGE.2017.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edge/KaanicheMLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KaanicheLRKG17, author = {Nesrine Kaaniche and Maryline Laurent and Pierre{-}Olivier Rocher and Christophe Kiennert and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Hannes Hartenstein and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {\emph{PCS} , {A} Privacy-Preserving Certification Scheme}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10436}, pages = {239--256}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67816-0\_14}, doi = {10.1007/978-3-319-67816-0\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KaanicheLRKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/KaanicheL17, author = {Nesrine Kaaniche and Maryline Laurent}, editor = {Aris Gkoulalas{-}Divanis and Miguel P. Correia and Dimiter R. Avresky}, title = {A blockchain-based data usage auditing architecture with enhanced privacy and availability}, booktitle = {16th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2017, Cambridge, MA, USA, October 30 - November 1, 2017}, pages = {403--407}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/NCA.2017.8171384}, doi = {10.1109/NCA.2017.8171384}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/KaanicheL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KiennertKLRG17, author = {Christophe Kiennert and Nesrine Kaaniche and Maryline Laurent and Pierre{-}Olivier Rocher and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Anonymous Certification for an e-Assessment Framework}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {70--85}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_5}, doi = {10.1007/978-3-319-70290-2\_5}, timestamp = {Mon, 26 Jun 2023 20:48:37 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/KiennertKLRG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaanicheL17, author = {Nesrine Kaaniche and Maryline Laurent}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Attribute based Encryption for Multi-level Access Control Policies}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {67--78}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006421000670078}, doi = {10.5220/0006421000670078}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaanicheL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelguithKLJA17, author = {Sana Belguith and Nesrine Kaaniche and Maryline Laurent and Abderrazak Jemai and Rabah Attia}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Constant-size Threshold Attribute based SignCryption for Cloud Applications}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {212--225}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006469202120225}, doi = {10.5220/0006469202120225}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelguithKLJA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KaanicheL16, author = {Nesrine Kaaniche and Maryline Laurent}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Attribute-Based Signatures for Supporting Anonymous Certification}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {279--300}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_14}, doi = {10.1007/978-3-319-45744-4\_14}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KaanicheL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelguithKJLA16, author = {Sana Belguith and Nesrine Kaaniche and Abderrazak Jemai and Maryline Laurent and Rabah Attia}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {PAbAC: {A} Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {133--146}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005968201330146}, doi = {10.5220/0005968201330146}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelguithKJLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/KaanicheL15, author = {Nesrine Kaaniche and Maryline Laurent}, editor = {Liang{-}Jie Zhang and Rami Bahsoon}, title = {SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications}, booktitle = {2015 {IEEE} World Congress on Services, {SERVICES} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {143--150}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SERVICES.2015.29}, doi = {10.1109/SERVICES.2015.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/KaanicheL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Kaaniche14, author = {Nesrine Kaaniche}, title = {Cloud data storage security based on cryptographic mechanisms. (La s{\'{e}}curit{\'{e}} des donn{\'{e}}es stock{\'{e}}es dans un environnement cloud, bas{\'{e}}e sur des m{\'{e}}canismes cryptographiques)}, school = {Telecom {\&} Management SudParis, {\'{E}}vry, Essonne, France}, year = {2014}, url = {https://tel.archives-ouvertes.fr/tel-01146029}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Kaaniche14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/KaanicheML14, author = {Nesrine Kaaniche and Ethmane El Moustaine and Maryline Laurent}, title = {A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications}, booktitle = {14th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2014, Chicago, IL, USA, May 26-29, 2014}, pages = {522--531}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CCGrid.2014.81}, doi = {10.1109/CCGRID.2014.81}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/KaanicheML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/KaanicheL14, author = {Nesrine Kaaniche and Maryline Laurent}, editor = {Mohamad Badra and Omar Alfandi}, title = {A Secure Client Side Deduplication Scheme in Cloud Storage Environments}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814002}, doi = {10.1109/NTMS.2014.6814002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/KaanicheL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaanicheLB14, author = {Nesrine Kaaniche and Maryline Laurent and Mohammed El{-}Barbori}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {CloudaSec: {A} Novel Public-key Based Framework to Handle Data Sharing Security in Clouds}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {5--18}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005010600050018}, doi = {10.5220/0005010600050018}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaanicheLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/KaanicheBL13, author = {Nesrine Kaaniche and Aymen Boudguiga and Maryline Laurent}, title = {{ID} Based Cryptography for Cloud Data Storage}, booktitle = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {375--382}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CLOUD.2013.80}, doi = {10.1109/CLOUD.2013.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/KaanicheBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.