Maryline Laurent-Maknavicius

According to our database1, Maryline Laurent-Maknavicius authored at least 92 papers between 1996 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Securely outsourcing the ciphertext-policy attribute-based encryption.
World Wide Web, 2018

ICAuth: A secure and scalable owner delegated inter-cloud authorization.
Future Generation Comp. Syst., 2018

PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT.
Computer Networks, 2018

Questioning the security and efficiency of the ESIoT approach.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2018

Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things.
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018

A Blockchain based Access Control Scheme.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Lifelogging Protection Scheme for Internet-Based Personal Assistants.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

BDUA: Blockchain-Based Data Usage Auditing.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Security and Privacy in Emerging Wireless Networks.
Security and Communication Networks, 2017

Diet-ESP: IP layer security for IoT.
Journal of Computer Security, 2017

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms.
Computer Communications, 2017

Discrimination rate: an attribute-centric metric to measure privacy.
Annales des Télécommunications, 2017

The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Attribute based Encryption for Multi-level Access Control Policies.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Constant-size Threshold Attribute based SignCryption for Cloud Applications.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Anonymous Certification for an e-Assessment Framework.
Proceedings of the Secure IT Systems, 2017

A blockchain-based data usage auditing architecture with enhanced privacy and availability.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

PCS , A Privacy-Preserving Certification Scheme.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Security SLA Based Monitoring in Clouds.
Proceedings of the IEEE International Conference on Edge Computing, 2017

2016
Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers.
IET Information Security, 2016

Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY.
Proceedings of the Information Security Theory and Practice, 2016

PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2016, 2016

Attribute-Based Signatures for Supporting Anonymous Certification.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Survey on secure communication protocols for the Internet of Things.
Ad Hoc Networks, 2015

Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications.
Proceedings of the 2015 IEEE World Congress on Services, 2015

Serverless lightweight mutual authentication protocol for small mobile computing devices.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Games based on active NFC objects: Model and security requirements.
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015

Recommendations for IPsec Configuration on Homenet and M2M Devices.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Privacy in Digital Identity Systems: Models, Assessment, and User Adoption.
Proceedings of the Electronic Government - 14th IFIP WG 8.5 International Conference, 2015

2014
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications.
J. Network and Computer Applications, 2014

Lightweight collaborative key establishment scheme for the Internet of Things.
Computer Networks, 2014

Privacy-aware electronic society.
Annales des Télécommunications, 2014

CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds.
Proceedings of the SECRYPT 2014, 2014

A Secure Client Side Deduplication Scheme in Cloud Storage Environments.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Elastic virtual private cloud.
Proceedings of the Q2SWinet'14, 2014

Secure IPsec based offload architectures for mobile data.
Proceedings of the Q2SWinet'14, 2014

A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

2013
Trust management system design for the Internet of Things: A context-aware and multi-service approach.
Computers & Security, 2013

GPS+: a back-end coupons identification for low-cost RFID.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Overcoming DNSSEC performance issues with DHT-based architectures.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Towards a Secure Identity Management in Smartphone Environments.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

ID Based Cryptography for Cloud Data Storage.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

High Availability for IPsec VPN Platforms: ClusterIP Evaluation.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Context-Aware Decentralized Approach for Web Services.
Proceedings of the Eighth IEEE World Congress on Services, 2012

A lattice based authentication for low-cost RFID.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

A Distributed Approach for Secure M2M Communications.
Proceedings of the 5th International Conference on New Technologies, 2012

Technical Enforcement of European Privacy Legislation: An Access Control Approach.
Proceedings of the 5th International Conference on New Technologies, 2012

ISP Offload Infrastructure to minimize cost and time deployment.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms.
Proceedings of the Third International Conference on Communications and Networking, 2012

E2E: An Optimized IPsec Architecture for Secure and Fast Offload.
Proceedings of the Seventh International Conference on Availability, 2012

Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

A Dual Approach to Detect Pharming Attacks at the Client-Side.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Defeating pharming attacks at the client-side.
Proceedings of the 5th International Conference on Network and System Security, 2011

A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks.
Proceedings of the 5th International Conference on Network and System Security, 2011

Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

An EAP ID-based authentication method for wireless networks.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider.
Computers & Security, 2010

Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU.
Computers & Security, 2010

An EAP-EHash authentication method adapted to resource constrained terminals.
Annales des Télécommunications, 2010

An ID-based authentication scheme for the IEEE 802.11s Mesh Network.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A performance view on DNSSEC migration.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks.
Journal Comp. Netw. and Communic., 2009

2008
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
A New Resilient Key Management Protocol for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Using PANA for Mobile IPv6 Bootstrapping.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

A PKI Approach Targeting the Provision of a Minimum Security Level within Internet.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

2006
Improved EAP keying framework for a secure mobility access service.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2004
La sécurité de l'accès distant.
Technique et Science Informatiques, 2004

Handover-Aware Access Control Mechanism: CTP for PANA.
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004

2003
Inter-domain security for mobile IPv6.
Annales des Télécommunications, 2003

2002
For a Secure Mobile IP and Mobile IPv6 Deployment.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2000
Analyse des fonctions des protocoles ipsec et leur intégration dans un réseau privé virtuel.
Annales des Télécommunications, 2000

Improving Packet Filters Management through Automatic and Dynamic Schemes.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A Full Bandwidth ATM Firewall.
Proceedings of the Computer Security, 2000

1999
An Alternative Access Control Architecture for IP over ATM Networks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

An Asynchronous Distributed Access Control Architecture for IP over ATM Networks.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

Secure Communications in ATM Networks.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Securing communications overAtm networks: the remoteAtm private networks interconnection example.
Annales des Télécommunications, 1998

1997
Securing communications over ATM networks.
Proceedings of the Information Security in Research and Business, 1997

1996
Security Flows Analysis of the ATM Emulated LAN Architecture.
Proceedings of the Communications and Multimedia Security II, 1996


  Loading...