Maryline Laurent

Orcid: 0000-0002-7256-3721

Affiliations:
  • Télécom SudParis, France


According to our database1, Maryline Laurent authored at least 135 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control.
Ann. des Télécommunications, August, 2024

Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain.
CoRR, 2024

A decentralized model for usage and information flow control in distributed systems.
Comput. Secur., 2024

Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query.
Proceedings of the International Conference on Information Networking, 2024

2023
Foreword of the special issue on « FPS 2021» symposium.
Ann. des Télécommunications, August, 2023

Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption.
IEEE Trans. Cloud Comput., 2023

Anonymous certification for E-assessment opinion polls.
J. Ambient Intell. Humaniz. Comput., 2023

Integrating Usage Control Into Distributed Ledger Technology for Internet of Things Privacy.
IEEE Internet Things J., 2023

Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions.
CoRR, 2023

2022
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment.
IEEE Trans. Cloud Comput., 2022

Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022

PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature.
J. Netw. Comput. Appl., 2022

Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT.
ACM Comput. Surv., 2022

An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts.
CoRR, 2022

SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems.
IEEE Access, 2022

SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022

2021
Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds.
IEEE Trans. Cloud Comput., 2021

Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things.
Sensors, 2021

An Efficient User-Centric Consent Management Design for Multiservices Platforms.
Secur. Commun. Networks, 2021

Privacy-Preserving Publication of Time-Series Data in Smart Grid.
Secur. Commun. Networks, 2021

Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services.
J. Comput. Sci. Technol., 2021

Post-Quantum Era Privacy Protection for Intelligent Infrastructures.
IEEE Access, 2021

Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021

An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds.
J. Parallel Distributed Comput., 2020

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey.
J. Netw. Comput. Appl., 2020

ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments.
Frontiers Blockchain, 2020

Privacy preservation for social networks sequential publishing.
Comput. Networks, 2020

Privacy preserving cooperative computation for personalized web search applications.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

An Identity-matching Process to Strengthen Trust in Federated-identity Architectures.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Reconciling Privacy and Utility for Energy Services - an Application to Demand Response Protocols.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019

Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Authenticated and Privacy-Preserving Consent Management in the Internet of Things.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

2018
Securely outsourcing the ciphertext-policy attribute-based encryption.
World Wide Web, 2018

ICAuth: A secure and scalable owner delegated inter-cloud authorization.
Future Gener. Comput. Syst., 2018

PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT.
Comput. Networks, 2018

Questioning the security and efficiency of the ESIoT approach.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2018

Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things.
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018

A Blockchain based Access Control Scheme.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Lifelogging Protection Scheme for Internet-Based Personal Assistants.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

BDUA: Blockchain-Based Data Usage Auditing.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Security and Privacy in Emerging Wireless Networks.
Secur. Commun. Networks, 2017

Diet-ESP: IP layer security for IoT.
J. Comput. Secur., 2017

Serverless Protocols for Inventory and Tracking with a UAV.
CoRR, 2017

Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms.
Comput. Commun., 2017

Discrimination rate: an attribute-centric metric to measure privacy.
Ann. des Télécommunications, 2017

The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Attribute based Encryption for Multi-level Access Control Policies.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Constant-size Threshold Attribute based SignCryption for Cloud Applications.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Anonymous Certification for an e-Assessment Framework.
Proceedings of the Secure IT Systems, 2017

A blockchain-based data usage auditing architecture with enhanced privacy and availability.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

<i>PCS</i> , A Privacy-Preserving Certification Scheme.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Security SLA Based Monitoring in Clouds.
Proceedings of the IEEE International Conference on Edge Computing, 2017

2016
Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers.
IET Inf. Secur., 2016

Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY.
Proceedings of the Information Security Theory and Practice, 2016

PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2016, 2016

Attribute-Based Signatures for Supporting Anonymous Certification.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Survey on secure communication protocols for the Internet of Things.
Ad Hoc Networks, 2015

Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications.
Proceedings of the 2015 IEEE World Congress on Services, 2015

Serverless lightweight mutual authentication protocol for small mobile computing devices.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Games based on active NFC objects: Model and security requirements.
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015

Recommendations for IPsec Configuration on Homenet and M2M Devices.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Privacy in Digital Identity Systems: Models, Assessment, and User Adoption.
Proceedings of the Electronic Government - 14th IFIP WG 8.5 International Conference, 2015

2014
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications.
J. Netw. Comput. Appl., 2014

Lightweight collaborative key establishment scheme for the Internet of Things.
Comput. Networks, 2014

Privacy-aware electronic society.
Ann. des Télécommunications, 2014

CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds.
Proceedings of the SECRYPT 2014, 2014

A Secure Client Side Deduplication Scheme in Cloud Storage Environments.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Elastic virtual private cloud.
Proceedings of the Q2SWinet'14, 2014

Secure IPsec based offload architectures for mobile data.
Proceedings of the Q2SWinet'14, 2014

A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

2013
Trust management system design for the Internet of Things: A context-aware and multi-service approach.
Comput. Secur., 2013

GPS+: a back-end coupons identification for low-cost RFID.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Overcoming DNSSEC performance issues with DHT-based architectures.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Failure preventive mechanism for IPsec gateways.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

Towards a Secure Identity Management in Smartphone Environments.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

ID Based Cryptography for Cloud Data Storage.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

High Availability for IPsec VPN Platforms: ClusterIP Evaluation.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Context-Aware Decentralized Approach for Web Services.
Proceedings of the Eighth IEEE World Congress on Services, 2012

A lattice based authentication for low-cost RFID.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

A Distributed Approach for Secure M2M Communications.
Proceedings of the 5th International Conference on New Technologies, 2012

Technical Enforcement of European Privacy Legislation: An Access Control Approach.
Proceedings of the 5th International Conference on New Technologies, 2012

ISP Offload Infrastructure to minimize cost and time deployment.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms.
Proceedings of the Third International Conference on Communications and Networking, 2012

E2E: An Optimized IPsec Architecture for Secure and Fast Offload.
Proceedings of the Seventh International Conference on Availability, 2012

Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

A Dual Approach to Detect Pharming Attacks at the Client-Side.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Defeating pharming attacks at the client-side.
Proceedings of the 5th International Conference on Network and System Security, 2011

A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks.
Proceedings of the 5th International Conference on Network and System Security, 2011

Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

An EAP ID-based authentication method for wireless networks.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider.
Comput. Secur., 2010

Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU.
Comput. Secur., 2010

An EAP-EHash authentication method adapted to resource constrained terminals.
Ann. des Télécommunications, 2010

An ID-based authentication scheme for the IEEE 802.11s Mesh Network.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A performance view on DNSSEC migration.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks.
J. Comput. Networks Commun., 2009

2008
A secure peer-to-peer backup system.
Proceedings of the 8th international conference on New technologies in distributed systems, 2008

WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
A New Resilient Key Management Protocol for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Using PANA for Mobile IPv6 Bootstrapping.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

A PKI Approach Targeting the Provision of a Minimum Security Level within Internet.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

2006
Improved EAP keying framework for a secure mobility access service.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2004
La sécurité de l'accès distant.
Tech. Sci. Informatiques, 2004

Handover-Aware Access Control Mechanism: CTP for PANA.
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004

Routing Protocols Security Toward a Generic Model?
Proceedings of the 2nd International Conference Computing, 2004

2003
Inter-domain security for mobile IPv6.
Ann. des Télécommunications, 2003

2002
For a Secure Mobile IP and Mobile IPv6 Deployment.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Improving packet filters management through automatic and dynamic schemes.
Ann. des Télécommunications, 2001

2000
Analyse des fonctions des protocoles ipsec et leur intégration dans un réseau privé virtuel.
Ann. des Télécommunications, 2000

A Full Bandwidth ATM Firewall.
Proceedings of the Computer Security, 2000

1999
An Alternative Access Control Architecture for IP over ATM Networks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

An Asynchronous Distributed Access Control Architecture for IP over ATM Networks.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

Secure Communications in ATM Networks.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Securing communications overAtm networks: the remoteAtm private networks interconnection example.
Ann. des Télécommunications, 1998

1997
Securing communications over ATM networks.
Proceedings of the Information Security in Research and Business, 1997

1996
Security Flows Analysis of the ATM Emulated LAN Architecture.
Proceedings of the Communications and Multimedia Security II, 1996


  Loading...