Confidentiality-Preserving query execution of fragmented outsourced data A Bkakria, F Cuppens, N Cuppens-Boulahia, JM Fernandez Information and Communication Technology, 426-440, 2013 | 11 | 2013 |
Opal: an open-source global platform java library which includes the remote application management over http A Bkakria, G Bouffard, J Iguchi-Cartigny, JL Lanet e-Smart 2011, 2011 | 9 | 2011 |
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption A Bkakria, F Cuppens, N Cuppens-Boulahia, JM Fernandez, ... | 9* | |
Optimized and Controlled Provisioning of Encrypted Outsourced Data A Bkakria, A Schaad, F Kerschbaum, F Cuppens, N Cuppens-Boulahia, ... | 7* | 2014 |
Linking differential identifiability with differential privacy A Bkakria, N Cuppens-Boulahia, F Cuppens International Conference on Information and Communications Security, 232-247, 2018 | 6 | 2018 |
Optimal distribution of privacy budget in differential privacy F Cuppens, F Bouattour, FB Fredj Risks and Security of Internet and Systems: 13th International Conference …, 2019 | 4 | 2019 |
Optimal Distribution of Privacy Budget in Differential Privacy A Bkakria, N Cuppens, F Cuppens | 4* | |
Privacy-Preserving Pattern Matching on Encrypted Data A Bkakria, N Cuppens, F Cuppens International Conference on the Theory and Application of Cryptology and …, 2020 | 3 | 2020 |
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper) A Bkakria, M Graa, N Cuppens-Boulahia, F Cuppens, JL Lanet 2017 15th Annual Conference on Privacy, Security and Trust (PST), 253-2535, 2017 | 3 | 2017 |
Specification and deployment of integrated security policies for outsourced data A Bkakria, F Cuppens, N Cuppens-Boulahia, D Gross-Amblard IFIP Annual Conference on Data and Applications Security and Privacy, 17-32, 2014 | 3 | 2014 |
Pattern matching on encrypted data A Bkakria, N Cuppens, F Cuppens Cryptology ePrint Archive, Report 2020/422, 2020 | 1 | 2020 |
Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption A Bkakria Cryptology ePrint Archive, 2022 | | 2022 |
Secure and Robust Cyber Security Threat Information Sharing A Bkakria, R Yaich, W Arabi International Symposium on Foundations & Practice of Security, 2021 | | 2021 |
Information theoretic-based privacy risk evaluation for data anonymization A Bkakria, F Cuppens, N Cuppens, A Tasidou Journal of Surveillance, Security and Safety 2, 83-102, 2021 | | 2021 |
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems A Bkakria, M Graa, N Cuppens-Boulahia, F Cuppens, JL Lanet International Conference on Information Systems Security, 127-145, 2017 | | 2017 |
Realtime detection and reaction to activity hijacking attacks in Android smartphones A Bkakria, G Mariem, N Cuppens-Boulahia, F Cuppens, JL Lanet 15th International Conference on Privacy, Security and Trust (PST). IEEE, 2017 | | 2017 |
Security Mechanisms Planning to Enforce Security Policies A Bkakria, F Cuppens, N Cuppens-Boulahia, D Gross-Amblard International Symposium on Foundations and Practice of Security, 85-101, 2015 | | 2015 |
Expression and deployment of security policies for outsourced data A Bkakria, F Cuppens, N Cuppens-Boulahia, D Gross-Amblard | | |
Pattern Matching over Encrypted Data A Bkakria, N Cuppens, F Cuppens | | |