Maryline Laurent
Citée par
Citée par
Trust management system design for the Internet of Things: A context-aware and multi-service approach
YB Saied, A Olivereau, D Zeghlache, M Laurent
Computers & Security 39, 351-365, 2013
Survey on secure communication protocols for the Internet of Things
KT Nguyen, M Laurent, N Oualha
Ad Hoc Networks 32, 17-31, 2015
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
N Kaaniche, M Laurent
Computer Communications 111, 120-141, 2017
Lightweight collaborative key establishment scheme for the Internet of Things
YB Saied, A Olivereau, D Zeghlache, M Laurent
Computer Networks 64, 273-295, 2014
A secure client side deduplication scheme in cloud storage environments
N Kaaniche, M Laurent
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Computer Networks 133, 141-156, 2018
A new protocol for securing wireless sensor networks against nodes replication attacks
C Bekara, M Laurent-Maknavicius
Third IEEE International Conference on Wireless and Mobile Computing …, 2007
A full bandwidth ATM Firewall
O Paul, M Laurent, S Gombault
European Symposium on Research in Computer Security, 206-221, 2000
Security architecture in a multi-hop mesh network
O Cheikhrouhou, M Laurent-Maknavicius, H Chaouchi
Proc. 5th Conference on Security and Network Architectures (SAR 2006), 1-10, 2006
Decisive heuristics to differentiate legitimate from phishing sites
S Gastellier-Prevost, GG Granadillo, M Laurent
2011 Conference on Network and Information Systems Security, 1-9, 2011
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
T Cheneau, A Boudguiga, M Laurent
computers & security 29 (4), 419-431, 2010
A blockchain-based data usage auditing architecture with enhanced privacy and availability
N Kaaniche, M Laurent
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
A distributed approach for secure M2M communications
YB Saied, A Olivereau, M Laurent
2012 5th International Conference on New Technologies, Mobility and Security …, 2012
AAA for mobile IPv6
F Dupont, M Laurent-Maknavicius, J Bournelle
Institut national des télécommunications, 2001
A performance view on dnssec migration
D Migault, C Girard, M Laurent
2010 International Conference on Network and Service Management, 469-474, 2010
Digital identity management
M Laurent, S Bouzefrane
Elsevier, 2015
Digital identity management
M Laurent, S Bouzefrane
Elsevier, 2015
Wireless and mobile network security
H Chaouchi, M Laurent-Maknavicius
John Wiley & Sons, 2013
ID based cryptography for cloud data storage
N Kaaniche, A Boudguiga, M Laurent
2013 IEEE Sixth International Conference on Cloud Computing, 375-382, 2013
Attribute-based signatures for supporting anonymous certification
N Kaaniche, M Laurent
European symposium on research in computer security, 279-300, 2016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20