default search action
Sana Belguith
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Winston Ellis, Sana Belguith, Theo Tryfonas:
Machine Learning Security of Connected Autonomous Vehicles: A Systems Perspective. ICIT 2024: 1-8 - [c16]Sana Belguith, Inah Omoronyia, Ruzanna Chitchyan:
Personal Data-Less Personalized Software Applications. SIGSOFT FSE Companion 2024: 477-481 - 2023
- [j12]Tom Bolton, Tooska Dargahi, Sana Belguith, Carsten Maple:
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors. ACM Trans. Priv. Secur. 26(3): 31:1-31:29 (2023) - [c15]Katie Hawkins, Nora Alhuwaish, Sana Belguith, Asma Vranaki, Andrew Charlesworth:
A Decision-Making Process to Implement the 'Right to Be Forgotten' in Machine Learning. APF 2023: 20-38 - 2022
- [j11]Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh:
Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - 2021
- [j10]Aliyu Gana Yisa, Tooska Dargahi, Sana Belguith, Mohammad Hammoudeh:
Security challenges of Internet of Underwater Things: A systematic literature review. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j9]Tom Bolton, Tooska Dargahi, Sana Belguith, Mabrook S. Al-Rakhami, Ali Hassan Sodhro:
On the Security and Privacy Challenges of Virtual Assistants. Sensors 21(7): 2312 (2021) - [j8]Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello:
Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems. IEEE Trans. Dependable Secur. Comput. 18(3): 1051-1064 (2021) - 2020
- [j7]Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi:
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications. Future Gener. Comput. Syst. 111: 899-918 (2020) - [j6]Mohammad Hammoudeh, John Pimlott, Sana Belguith, Gregory Epiphaniou, Thar Baker, A. S. M. Kayes, Bamidele Adebisi, Ahcène Bounceur:
Network Traffic Analysis for Threat Detection in the Internet of Things. IEEE Internet Things Mag. 3(4): 40-45 (2020) - [j5]Nesrine Kaaniche, Maryline Laurent, Sana Belguith:
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. J. Netw. Comput. Appl. 171: 102807 (2020) - [j4]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J. Parallel Distributed Comput. 135: 1-20 (2020) - [j3]Sana Belguith, Nesrine Kaaniche, Giovanni Russello:
CUPS: Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update. Secur. Priv. 3(4) (2020) - [j2]Hichem Mrabet, Sana Belguith, Adeeb Alhomoud, Abderrazak Jemai:
A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 20(13): 3625 (2020) - [c14]Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello:
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. ICETE (2) 2020: 225-237 - [c13]Sana Belguith, Muhammad Rizwan Asghar, Song Wang, Karina Mabell Gomez, Giovanni Russello:
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks. ICETE (2) 2020: 608-617
2010 – 2019
- 2019
- [c12]Robert Marsh, Sana Belguith, Tooska Dargahi:
IoT Database Forensics: An Investigation on HarperDB Security. ICFNDS 2019: 3:1-3:7 - 2018
- [j1]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput. Networks 133: 141-156 (2018) - [c11]Sana Belguith, Nesrine Kaaniche, Giovanni Russello:
PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT. IEEE CLOUD 2018: 924-927 - [c10]Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello:
C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications. SCC 2018: 245-248 - [c9]Sana Belguith, Sarada Prasad Gochhayat, Mauro Conti, Giovanni Russello:
Emergency Access Control Management Via Attribute Based Encrypted QR Codes. CNS 2018: 1-8 - [c8]Shujie Cui, Sana Belguith, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search. ICCCN 2018: 1-9 - [c7]Sana Belguith, Nesrine Kaaniche, Giovanni Russello:
Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. ICETE (2) 2018: 301-312 - [c6]Nesrine Kaaniche, Sana Belguith, Giovanni Russello:
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. NSS 2018: 187-201 - [c5]Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello:
Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications. OTM Conferences (1) 2018: 498-515 - [c4]Sana Belguith, Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Secure publish and subscribe systems with efficient revocation. SAC 2018: 388-394 - [c3]Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello:
Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems. TrustCom/BigDataSE 2018: 1624-1627 - 2017
- [c2]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
Constant-size Threshold Attribute based SignCryption for Cloud Applications. SECRYPT 2017: 212-225 - 2016
- [c1]Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia:
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. SECRYPT 2016: 133-146
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint