Nesrine Kaaniche

Orcid: 0000-0002-1045-6445

According to our database1, Nesrine Kaaniche authored at least 55 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture.
J. Netw. Syst. Manag., April, 2024

Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles.
IEEE Trans. Veh. Technol., 2024

2023
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation.
Cryptogr., September, 2023

Anonymous certification for E-assessment opinion polls.
J. Ambient Intell. Humaniz. Comput., 2023

Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions.
CoRR, 2023

2022
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment.
IEEE Trans. Cloud Comput., 2022

PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature.
J. Netw. Comput. Appl., 2022

Analysis of attribute-based cryptographic techniques and their application to protect cloud services.
Trans. Emerg. Telecommun. Technol., 2022

SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems.
IEEE Access, 2022

SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Efficient Hybrid Model for Intrusion Detection Systems.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022

Cooperative and smart attacks detection systems in 6G-enabled Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

2021
TRESC: Towards redesigning existing symmetric ciphers.
Microprocess. Microsystems, November, 2021

Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds.
IEEE Trans. Cloud Comput., 2021

An Efficient User-Centric Consent Management Design for Multiservices Platforms.
Secur. Commun. Networks, 2021

On the design of secure primitives for real world applications.
Microprocess. Microsystems, 2021

Label-GCN: An Effective Method for Adding Label Propagation to Graph Convolutional Networks.
CoRR, 2021

2020
CUPS: Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update.
Secur. Priv., 2020

Cyber-physical systems security: Limitations, issues and future trends.
Microprocess. Microsystems, 2020

Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds.
J. Parallel Distributed Comput., 2020

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey.
J. Netw. Comput. Appl., 2020

PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications.
Future Gener. Comput. Syst., 2020

ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments.
Frontiers Blockchain, 2020

Privacy preserving cooperative computation for personalized web search applications.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

An Identity-matching Process to Strengthen Trust in Federated-identity Architectures.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT.
Comput. Networks, 2018

Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control.
Proceedings of the Network and System Security - 12th International Conference, 2018

A Blockchain based Access Control Scheme.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Lifelogging Protection Scheme for Internet-Based Personal Assistants.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Efficiently Validating Aggregated IoT Data Integrity.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

BDUA: Blockchain-Based Data Usage Auditing.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms.
Comput. Commun., 2017

Attribute based Encryption for Multi-level Access Control Policies.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Constant-size Threshold Attribute based SignCryption for Cloud Applications.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Anonymous Certification for an e-Assessment Framework.
Proceedings of the Secure IT Systems, 2017

A blockchain-based data usage auditing architecture with enhanced privacy and availability.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

<i>PCS</i> , A Privacy-Preserving Certification Scheme.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Security SLA Based Monitoring in Clouds.
Proceedings of the IEEE International Conference on Edge Computing, 2017

2016
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Attribute-Based Signatures for Supporting Anonymous Certification.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications.
Proceedings of the 2015 IEEE World Congress on Services, 2015

2014
Cloud data storage security based on cryptographic mechanisms. (La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques).
PhD thesis, 2014

CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds.
Proceedings of the SECRYPT 2014, 2014

A Secure Client Side Deduplication Scheme in Cloud Storage Environments.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

2013
ID Based Cryptography for Cloud Data Storage.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013


  Loading...