Trust management system design for the Internet of Things: A context-aware and multi-service approach YB Saied, A Olivereau, D Zeghlache, M Laurent Computers & Security 39, 351-365, 2013 | 600 | 2013 |
Survey on secure communication protocols for the Internet of Things KT Nguyen, M Laurent, N Oualha Ad Hoc Networks 32, 17-31, 2015 | 503 | 2015 |
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms N Kaaniche, M Laurent Computer Communications 111, 120-141, 2017 | 222 | 2017 |
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia Computer Networks 133, 141-156, 2018 | 193 | 2018 |
Defeating pharming attacks at the client-side S Gastellier-Prevost, M Laurent 2011 5th International Conference on Network and System Security, 33-40, 2011 | 171 | 2011 |
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey N Kaaniche, M Laurent, S Belguith Journal of Network and Computer Applications 171, 102807, 2020 | 132 | 2020 |
Lightweight collaborative key establishment scheme for the Internet of Things YB Saied, A Olivereau, D Zeghlache, M Laurent Computer Networks 64, 273-295, 2014 | 113 | 2014 |
A secure client side deduplication scheme in cloud storage environments N Kaaniche, M Laurent 2014 6th International Conference on New Technologies, Mobility and Security …, 2014 | 108 | 2014 |
A full bandwidth ATM Firewall O Paul, M Laurent, S Gombault Computer Security-ESORICS 2000: 6th European Symposium on Research in …, 2000 | 104 | 2000 |
A blockchain-based data usage auditing architecture with enhanced privacy and availability N Kaaniche, M Laurent 2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017 | 97 | 2017 |
A new protocol for securing wireless sensor networks against nodes replication attacks C Bekara, M Laurent-Maknavicius Third IEEE International Conference on Wireless and Mobile Computing …, 2007 | 78 | 2007 |
Digital identity management M Laurent, S Bouzefrane Elsevier, 2015 | 77 | 2015 |
Decisive heuristics to differentiate legitimate from phishing sites S Gastellier-Prevost, GG Granadillo, M Laurent 2011 conference on network and information systems security, 1-9, 2011 | 75 | 2011 |
Post-quantum era privacy protection for intelligent infrastructures L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ... IEEE Access 9, 36038-36077, 2021 | 74 | 2021 |
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU T Cheneau, A Boudguiga, M Laurent computers & security 29 (4), 419-431, 2010 | 67 | 2010 |
Security architecture in a multi-hop mesh network O Cheikhrouhou, M Laurent-Maknavicius, H Chaouchi Proceedings of the 5th Conference on Security and Network Architectures (SAR …, 2006 | 60 | 2006 |
Attribute-based signatures for supporting anonymous certification N Kaaniche, M Laurent Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 58 | 2016 |
A distributed approach for secure M2M communications YB Saied, A Olivereau, M Laurent 2012 5th International Conference on New Technologies, Mobility and Security …, 2012 | 58 | 2012 |
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia Journal of Parallel and Distributed Computing 135, 1-20, 2020 | 45 | 2020 |
A dual approach to detect pharming attacks at the client-side S Gastellier-Prevost, GG Granadillo, M Laurent 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 45 | 2011 |