


Остановите войну!
for scientists:


default search action
Maryline Laurent-Maknavicius
Maryline Laurent
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j39]Nazatul Haque Sultan
, Maryline Laurent
, Vijay Varadharajan:
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption. IEEE Trans. Cloud Comput. 11(1): 25-43 (2023) - 2022
- [j38]Souha Masmoudi
, Nesrine Kaaniche, Maryline Laurent
:
SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access 10: 106400-106414 (2022) - [j37]Sophie Dramé-Maigné, Maryline Laurent
, Laurent Castillo, Hervé Ganem:
Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT. ACM Comput. Surv. 54(7): 138:1-138:34 (2022) - [j36]Souha Masmoudi
, Maryline Laurent, Nesrine Kaaniche:
PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature. J. Netw. Comput. Appl. 208: 103517 (2022) - [j35]Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevicius, Qiang Tang, Aimilia Tasidou:
Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Comput. Sci. 8: e1165 (2022) - [j34]Nazatul Haque Sultan
, Nesrine Kaaniche
, Maryline Laurent
, Ferdous Ahmed Barbhuiya
:
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. IEEE Trans. Cloud Comput. 10(1): 216-233 (2022) - [c85]Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche:
SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge. SECRYPT 2022: 13-24 - [e4]Esma Aïmeur
, Maryline Laurent
, Reda Yaich
, Benoît Dupont, Joaquín García-Alfaro
:
Foundations and Practice of Security - 14th International Symposium, FPS 2021, Paris, France, December 7-10, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13291, Springer 2022, ISBN 978-3-031-08146-0 [contents] - [e3]Josep Domingo-Ferrer
, Maryline Laurent
:
Privacy in Statistical Databases - International Conference, PSD 2022, Paris, France, September 21-23, 2022, Proceedings. Lecture Notes in Computer Science 13463, Springer 2022, ISBN 978-3-031-13944-4 [contents] - [i6]Montassar Naghmouchi, Hella Kaffel, Maryline Laurent
:
An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts. CoRR abs/2201.00231 (2022) - [i5]Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent:
SPOT: Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems. CoRR abs/2212.00381 (2022) - 2021
- [j33]Lukas Malina
, Petr Dzurenda
, Sara Ricci
, Jan Hajny
, Gautam Srivastava
, Raimundas Matulevicius
, Abasi-Amefon O. Affia
, Maryline Laurent
, Nazatul Haque Sultan
, Qiang Tang:
Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access 9: 36038-36077 (2021) - [j32]Paul Marillonnet
, Maryline Laurent
, Mikaël Ates:
Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services. J. Comput. Sci. Technol. 36(3): 664-692 (2021) - [j31]Paul Marillonnet
, Mikaël Ates
, Maryline Laurent
, Nesrine Kaaniche
:
An Efficient User-Centric Consent Management Design for Multiservices Platforms. Secur. Commun. Networks 2021: 5512075:1-5512075:19 (2021) - [j30]Franklin Leukam Lako
, Paul Lajoie-Mazenc
, Maryline Laurent
:
Privacy-Preserving Publication of Time-Series Data in Smart Grid. Secur. Commun. Networks 2021: 6643566:1-6643566:21 (2021) - [j29]Arie Haenel
, Yoram Haddad
, Maryline Laurent
, Zonghua Zhang:
Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things. Sensors 21(12): 4034 (2021) - [j28]Nesrine Kaaniche
, Maryline Laurent
, Sébastien Canard:
Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds. IEEE Trans. Cloud Comput. 9(1): 102-117 (2021) - [c84]Seryne Rahali, Maryline Laurent
, Souha Masmoudi
, Charles Roux, Brice Mazeau:
A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy. BigDataSE 2021: 118-127 - [c83]Montassar Naghmouchi, Hella Kaffel Ben Ayed, Maryline Laurent
:
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts. FPS 2021: 208-217 - [c82]Nathanaël Denis, Sophie Chabridon, Maryline Laurent
:
Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains. Privacy and Identity Management 2021: 57-72 - [e2]Samia Bouzefrane
, Maryline Laurent
, Selma Boumerdassi
, Eric Renault
:
Mobile, Secure, and Programmable Networking - 6th International Conference, MSPN 2020, Paris, France, October 28-29, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12605, Springer 2021, ISBN 978-3-030-67549-3 [contents] - [i4]Seryne Rahali, Maryline Laurent
, Souha Masmoudi, Charles Roux, Brice Mazeau:
A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy. CoRR abs/2109.11340 (2021) - [i3]Paul Marillonnet, Maryline Laurent
, Mikaël Ates:
Personal information self-management: A survey of technologies supporting administrative services. CoRR abs/2109.12968 (2021) - 2020
- [j27]Safia Bourahla, Maryline Laurent
, Yacine Challal
:
Privacy preservation for social networks sequential publishing. Comput. Networks 170: 107106 (2020) - [j26]Nesrine Kaaniche, Maryline Laurent
, Claire Levallois-Barth:
ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments. Frontiers Blockchain 3: 17 (2020) - [j25]Nesrine Kaaniche, Maryline Laurent
, Sana Belguith
:
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. J. Netw. Comput. Appl. 171: 102807 (2020) - [j24]Sana Belguith, Nesrine Kaaniche, Maryline Laurent
, Abderrazak Jemai
, Rabah Attia:
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J. Parallel Distributed Comput. 135: 1-20 (2020) - [c81]Franklin Leukam Lako, Paul Lajoie-Mazenc, Maryline Laurent
:
Reconciling Privacy and Utility for Energy Services - an Application to Demand Response Protocols. EuroS&P Workshops 2020: 348-355 - [c80]Paul Marillonnet
, Mikaël Ates, Maryline Laurent
, Nesrine Kaaniche:
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures. ICETE (2) 2020: 142-154 - [c79]Nesrine Kaaniche, Sana Belguith, Maryline Laurent
, Ashish Gehani, Giovanni Russello:
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. ICETE (2) 2020: 225-237 - [c78]Nathanaël Denis, Pierre Chaffardon, Denis Conan
, Maryline Laurent
, Sophie Chabridon, Jean Leneutre:
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting. ICETE (2) 2020: 405-414 - [c77]Aïda Diop, Maryline Laurent
, Jean Leneutre, Jacques Traoré:
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. ICISSP 2020: 84-95 - [c76]Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent
, Levent Demir:
Privacy preserving cooperative computation for personalized web search applications. SAC 2020: 250-258 - [e1]Maryline Laurent
, Thanassis Giannetsos
:
Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings. Lecture Notes in Computer Science 12024, Springer 2020, ISBN 978-3-030-41701-7 [contents] - [i2]Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan:
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption. CoRR abs/2004.10952 (2020)
2010 – 2019
- 2019
- [j23]Qing Yang
, Rongxing Lu, Chunming Rong
, Yacine Challal
, Maryline Laurent
, Shengling Wang:
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet Things J. 6(3): 4556-4560 (2019) - [c75]Maryline Laurent
, Jean Leneutre, Sophie Chabridon, Imane Laaouane:
Authenticated and Privacy-Preserving Consent Management in the Internet of Things. ANT/EDI40 2019: 256-263 - [c74]Sophie Dramé-Maigné, Maryline Laurent
, Laurent Castillo:
Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. IWCMC 2019: 1582-1587 - 2018
- [j22]Sana Belguith
, Nesrine Kaaniche, Maryline Laurent
, Abderrazak Jemai
, Rabah Attia:
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput. Networks 133: 141-156 (2018) - [j21]Nazatul Haque Sultan
, Ferdous Ahmed Barbhuiya, Maryline Laurent
:
ICAuth: A secure and scalable owner delegated inter-cloud authorization. Future Gener. Comput. Syst. 88: 319-332 (2018) - [j20]Kim Thuat Nguyen, Nouha Oualha
, Maryline Laurent
:
Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web 21(1): 169-183 (2018) - [c73]Nesrine Kaaniche, Maryline Laurent
:
Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications. IEEE CLOUD 2018: 590-597 - [c72]Nesrine Kaaniche, Maryline Laurent
:
BDUA: Blockchain-Based Data Usage Auditing. IEEE CLOUD 2018: 630-637 - [c71]David Pàmies-Estrems
, Nesrine Kaaniche
, Maryline Laurent
, Jordi Castellà-Roca
, Joaquín García-Alfaro
:
Lifelogging Protection Scheme for Internet-Based Personal Assistants. DPM/CBT@ESORICS 2018: 431-440 - [c70]Nesrine Kaaniche, Maryline Laurent:
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. ICETE (2) 2018: 321-333 - [c69]Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse:
A Blockchain based Access Control Scheme. ICETE (2) 2018: 334-342 - [c68]Stevan Coroller, Sophie Chabridon, Maryline Laurent
, Denis Conan
, Jean Leneutre:
Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things. M4IoT@Middleware 2018: 35-40 - [c67]Sophie Dramé-Maigné, Maryline Laurent
, Laurent Castillo, Hervé Ganem:
Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. SecureComm (1) 2018: 53-68 - [c66]Aïda Diop, Saïd Gharout, Maryline Laurent
, Jean Leneutre, Jacques Traoré:
Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 202-207 - 2017
- [j19]Louis Philippe Sondeck
, Maryline Laurent
, Vincent Frey:
Discrimination rate: an attribute-centric metric to measure privacy. Ann. des Télécommunications 72(11-12): 755-766 (2017) - [j18]Nesrine Kaaniche, Maryline Laurent
:
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111: 120-141 (2017) - [j17]Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent
, Guy Pujolle, Jean-Philippe Wary:
Diet-ESP: IP layer security for IoT. J. Comput. Secur. 25(2): 173-203 (2017) - [j16]Qing Yang
, Rongxing Lu
, Yacine Challal
, Maryline Laurent
:
Security and Privacy in Emerging Wireless Networks. Secur. Commun. Networks 2017: 5618742:1-5618742:2 (2017) - [c65]Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent
, Heiko Ludwig:
Security SLA Based Monitoring in Clouds. EDGE 2017: 90-97 - [c64]Nesrine Kaaniche, Maryline Laurent
, Pierre-Olivier Rocher, Christophe Kiennert, Joaquín García-Alfaro
:
PCS , A Privacy-Preserving Certification Scheme. DPM/CBT@ESORICS 2017: 239-256 - [c63]Nesrine Kaaniche, Maryline Laurent
:
A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017: 403-407 - [c62]Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent
, Pierre-Olivier Rocher, Joaquín García-Alfaro
:
Anonymous Certification for an e-Assessment Framework. NordSec 2017: 70-85 - [c61]Nesrine Kaaniche, Maryline Laurent
:
Attribute based Encryption for Multi-level Access Control Policies. SECRYPT 2017: 67-78 - [c60]Sana Belguith, Nesrine Kaaniche, Maryline Laurent
, Abderrazak Jemai
, Rabah Attia:
Constant-size Threshold Attribute based SignCryption for Cloud Applications. SECRYPT 2017: 212-225 - [c59]Louis Philippe Sondeck, Maryline Laurent
, Vincent Frey:
The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity. SECRYPT 2017: 285-294 - [i1]Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette:
Serverless Protocols for Inventory and Tracking with a UAV. CoRR abs/1708.05417 (2017) - 2016
- [j15]Collins Mtita, Maryline Laurent
, Jacques Delort:
Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. IET Inf. Secur. 10(5): 262-271 (2016) - [c58]Nesrine Kaaniche, Maryline Laurent
:
Attribute-Based Signatures for Supporting Anonymous Certification. ESORICS (1) 2016: 279-300 - [c57]Kim Thuat Nguyen, Nouha Oualha
, Maryline Laurent
:
Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things. ESORICS (2) 2016: 339-358 - [c56]Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai
, Maryline Laurent
, Rabah Attia:
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. SECRYPT 2016: 133-146 - [c55]Kim Thuat Nguyen, Nouha Oualha
, Maryline Laurent
:
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. WISTP 2016: 19-34 - 2015
- [j14]Kim Thuat Nguyen, Maryline Laurent
, Nouha Oualha
:
Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks 32: 17-31 (2015) - [c54]Armen Khatchatourov, Maryline Laurent
, Claire Levallois-Barth:
Privacy in Digital Identity Systems: Models, Assessment, and User Adoption. EGOV 2015: 273-290 - [c53]Daniel Migault, Daniel Palomares, Tobias Guggemos, Aurélien Wailly, Maryline Laurent
, Jean-Philippe Wary:
Recommendations for IPsec Configuration on Homenet and M2M Devices. Q2SWinet@MSWiM 2015: 9-17 - [c52]Florent Fortat, Maryline Laurent
, Michel Simatic:
Games based on active NFC objects: Model and security requirements. NETGAMES 2015: 1-3 - [c51]Collins Mtita, Maryline Laurent
, Pascal Daragon:
Serverless lightweight mutual authentication protocol for small mobile computing devices. NTMS 2015: 1-5 - [c50]Nesrine Kaaniche, Maryline Laurent
:
SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications. SERVICES 2015: 143-150 - [c49]Kim Thuat Nguyen, Nouha Oualha
, Maryline Laurent
:
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things. TrustCom/BigDataSE/ISPA (1) 2015: 467-474 - 2014
- [j13]Maryline Laurent
, Sara Foresti
, Heng Xu:
Privacy-aware electronic society. Ann. des Télécommunications 69(1-2): 1-2 (2014) - [j12]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache
, Maryline Laurent
:
Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Networks 64: 273-295 (2014) - [j11]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache
, Maryline Laurent
:
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. J. Netw. Comput. Appl. 45: 215-227 (2014) - [c48]Nesrine Kaaniche, Ethmane El Moustaine, Maryline Laurent
:
A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications. CCGRID 2014: 522-531 - [c47]Daniel Migault, Daniel Palomares, Hendrik Hendrik, Maryline Laurent
:
Secure IPsec based offload architectures for mobile data. Q2SWinet 2014: 95-104 - [c46]Daniel Palomares, Daniel Migault, Hendrik Hendrik, Maryline Laurent
, Guy Pujolle:
Elastic virtual private cloud. Q2SWinet 2014: 127-131 - [c45]Nesrine Kaaniche, Maryline Laurent
:
A Secure Client Side Deduplication Scheme in Cloud Storage Environments. NTMS 2014: 1-7 - [c44]Nesrine Kaaniche, Maryline Laurent
, Mohammed El-Barbori:
CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. SECRYPT 2014: 5-18 - 2013
- [j10]Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache
, Maryline Laurent
:
Trust management system design for the Internet of Things: A context-aware and multi-service approach. Comput. Secur. 39: 351-365 (2013) - [c43]Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent:
High Availability for IPsec VPN Platforms: ClusterIP Evaluation. ARES 2013: 178-187 - [c42]Nesrine Kaaniche, Aymen Boudguiga
, Maryline Laurent
:
ID Based Cryptography for Cloud Data Storage. IEEE CLOUD 2013: 375-382 - [c41]Maryline Laurent
, Samia Bouzefrane, Christophe Kiennert:
Towards a Secure Identity Management in Smartphone Environments. GreenCom/iThings/CPScom 2013: 2133-2135 - [c40]Daniel Palomares, Daniel Migault, Maryline Laurent
:
Failure preventive mechanism for IPsec gateways. ICCIT 2013: 167-172 - [c39]Daniel Migault, Stanislas Francfort, Stéphane Sénécal, Emmanuel Herbert, Maryline Laurent:
Overcoming DNSSEC performance issues with DHT-based architectures. IM 2013: 816-819 - [c38]Emmanuel Herbert, Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Maryline Laurent:
Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency. IM 2013: 824-827 - [c37]Daniel Migault, Stéphane Sénécal, Stanislas Francfort, Emmanuel Herbert, Maryline Laurent
:
PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform. TrustCom/ISPA/IUCC 2013: 694-703 - [c36]Ethmane El Moustaine, Maryline Laurent
:
GPS+: a back-end coupons identification for low-cost RFID. WISEC 2013: 73-78 - 2012
- [c35]Jean Michel Combes, Ghada Arfaoui
, Maryline Laurent
:
Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context. ARES 2012: 206-211 - [c34]Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui
, Maryline Laurent
:
E2E: An Optimized IPsec Architecture for Secure and Fast Offload. ARES 2012: 365-374 - [c33]Aymen Boudguiga
, Maryline Laurent
:
An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms. COMNET 2012: 1-8 - [c32]Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui
, Maryline Laurent
:
ISP Offload Infrastructure to minimize cost and time deployment. GLOBECOM 2012: 1041-1047 - [c31]Kheira Dari Bekara, Maryline Laurent
, Than Ha Nguyen:
Technical Enforcement of European Privacy Legislation: An Access Control Approach. NTMS 2012: 1-7 - [c30]Yosra Ben Saied, Alexis Olivereau, Maryline Laurent
:
A Distributed Approach for Secure M2M Communications. NTMS 2012: 1-7 - [c29]Ethmane El Moustaine, Maryline Laurent
:
A lattice based authentication for low-cost RFID. RFID-TA 2012: 68-73 - [c28]Andrei Vlad Sambra, Maryline Laurent
:
Context-Aware Decentralized Approach for Web Services. SERVICES 2012: 73-79 - 2011
- [c27]Aymen Boudguiga, Maryline Laurent:
An EAP ID-based authentication method for wireless networks. ICITST 2011: 232-239 - [c26]Sondes Larafa, Maryline Laurent
:
Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. ISCC 2011: 856-863 - [c25]Sophie Gastellier-Prevost, Maryline Laurent
:
Defeating pharming attacks at the client-side. NSS 2011: 33-40 - [c24]Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent
:
A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. NSS 2011: 249-253 - [c23]Kheira Dari Bekara, Yosra Ben Mustapha, Samia Bouzefrane, Khaled Garri, Maryline Laurent
, Pascal Thoniel:
Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments. NTMS 2011: 1-5 - [c22]Sophie Gastellier-Prevost, Gustavo Gonzalez Granadillo, Maryline Laurent
:
A Dual Approach to Detect Pharming Attacks at the Client-Side. NTMS 2011: 1-5 - [c21]Aymen Boudguiga
, Maryline Laurent
:
Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. WCNC 2011: 784-789 - 2010
- [j9]Omar Cheikhrouhou
, Maryline Laurent
, Amin Ben Abdallah, Maher Ben Jemaa:
An EAP-EHash authentication method adapted to resource constrained terminals. Ann. des Télécommunications 65(5-6): 271-284 (2010) - [j8]Houssem Jarraya, Maryline Laurent
:
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. Comput. Secur. 29(2): 180-195 (2010) - [j7]Tony Cheneau, Aymen Boudguiga
, Maryline Laurent
:
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Comput. Secur. 29(4): 419-431 (2010) - [c20]Daniel Migault, Cedric Girard, Maryline Laurent
:
A performance view on DNSSEC migration. CNSM 2010: 469-474 - [c19]Sondes Larafa, Maryline Laurent
:
Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks. WCNIS 2010: 277-281 - [c18]Aymen Boudguiga
, Maryline Laurent
:
An ID-based authentication scheme for the IEEE 802.11s Mesh Network. WiMob 2010: 256-263
2000 – 2009
- 2009
- [j6]Maher Ben Jemaa, Nahla Abid, Maryline Laurent-Maknavicius
, Hakima Chaouchi:
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks. J. Comput. Networks Commun. 2009: 383517:1-383517:6 (2009) - 2008
- [c17]Amir R. Khakpour, Maryline Laurent-Maknavicius
, Hakima Chaouchi:
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. ARES 2008: 144-152 - [c16]