Trust management system design for the Internet of Things: A context-aware and multi-service approach YB Saied, A Olivereau, D Zeghlache, M Laurent Computers & Security 39, 351-365, 2013 | 426 | 2013 |
Survey on secure communication protocols for the Internet of Things KT Nguyen, M Laurent, N Oualha Ad Hoc Networks 32, 17-31, 2015 | 285 | 2015 |
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms N Kaaniche, M Laurent Computer Communications 111, 120-141, 2017 | 85 | 2017 |
Lightweight collaborative key establishment scheme for the Internet of Things YB Saied, A Olivereau, D Zeghlache, M Laurent Computer Networks 64, 273-295, 2014 | 81 | 2014 |
A secure client side deduplication scheme in cloud storage environments N Kaaniche, M Laurent 2014 6th International Conference on New Technologies, Mobility and Security …, 2014 | 78 | 2014 |
A new protocol for securing wireless sensor networks against nodes replication attacks C Bekara, M Laurent-Maknavicius Third IEEE International Conference on Wireless and Mobile Computing …, 2007 | 69 | 2007 |
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia Computer Networks 133, 141-156, 2018 | 62 | 2018 |
A full bandwidth ATM Firewall O Paul, M Laurent, S Gombault European Symposium on Research in Computer Security, 206-221, 2000 | 60 | 2000 |
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU T Cheneau, A Boudguiga, M Laurent computers & security 29 (4), 419-431, 2010 | 58 | 2010 |
Security architecture in a multi-hop mesh network O Cheikhrouhou, M Laurent-Maknavicius, H Chaouchi Proc. 5th Conference on Security and Network Architectures (SAR 2006), 1-10, 2006 | 57 | 2006 |
Decisive heuristics to differentiate legitimate from phishing sites S Gastellier-Prevost, GG Granadillo, M Laurent 2011 Conference on Network and Information Systems Security, 1-9, 2011 | 53 | 2011 |
A distributed approach for secure M2M communications YB Saied, A Olivereau, M Laurent 2012 5th International Conference on New Technologies, Mobility and Security …, 2012 | 45 | 2012 |
AAA for mobile IPv6 F Dupont, M Laurent-Maknavicius, J Bournelle Institut national des télécommunications, 2001 | 38 | 2001 |
A blockchain-based data usage auditing architecture with enhanced privacy and availability N Kaaniche, M Laurent 2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017 | 37 | 2017 |
A performance view on dnssec migration D Migault, C Girard, M Laurent 2010 International Conference on Network and Service Management, 469-474, 2010 | 35 | 2010 |
Wireless and Mobile Networks Security H Chaouchi, M Laurent-Maknavicius John Wiley & Sons, 2009 | 35 | 2009 |
Wireless and Mobile Networks Security H Chaouchi, M Laurent-Maknavicius John Wiley & Sons, 2009 | 35 | 2009 |
ID based cryptography for cloud data storage N Kaaniche, A Boudguiga, M Laurent 2013 IEEE Sixth International Conference on Cloud Computing, 375-382, 2013 | 33 | 2013 |
Digital identity management M Laurent, S Bouzefrane Elsevier, 2015 | 32 | 2015 |
Digital identity management M Laurent, S Bouzefrane Elsevier, 2015 | 32 | 2015 |