Maryline Laurent
Orcid: 0000-0002-7256-3721Affiliations:
- Télécom SudParis, France
According to our database1,
Maryline Laurent
authored at least 135 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control.
Ann. des Télécommunications, August, 2024
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain.
CoRR, 2024
Comput. Secur., 2024
Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query.
Proceedings of the International Conference on Information Networking, 2024
2023
Ann. des Télécommunications, August, 2023
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption.
IEEE Trans. Cloud Comput., 2023
J. Ambient Intell. Humaniz. Comput., 2023
Integrating Usage Control Into Distributed Ledger Technology for Internet of Things Privacy.
IEEE Internet Things J., 2023
Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions.
CoRR, 2023
2022
IEEE Trans. Cloud Comput., 2022
Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022
PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature.
J. Netw. Comput. Appl., 2022
Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT.
ACM Comput. Surv., 2022
An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts.
CoRR, 2022
IEEE Access, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022
2021
IEEE Trans. Cloud Comput., 2021
Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things.
Sensors, 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services.
J. Comput. Sci. Technol., 2021
IEEE Access, 2021
Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021
2020
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds.
J. Parallel Distributed Comput., 2020
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey.
J. Netw. Comput. Appl., 2020
Frontiers Blockchain, 2020
Comput. Networks, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Reconciling Privacy and Utility for Energy Services - an Application to Demand Response Protocols.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019
Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019
2018
World Wide Web, 2018
Future Gener. Comput. Syst., 2018
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT.
Comput. Networks, 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2018
Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things.
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms.
Comput. Commun., 2017
Ann. des Télécommunications, 2017
The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Secure IT Systems, 2017
A blockchain-based data usage auditing architecture with enhanced privacy and availability.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the IEEE International Conference on Edge Computing, 2017
2016
Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers.
IET Inf. Secur., 2016
Proceedings of the Information Security Theory and Practice, 2016
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Ad Hoc Networks, 2015
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications.
Proceedings of the 2015 IEEE World Congress on Services, 2015
Serverless lightweight mutual authentication protocol for small mobile computing devices.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015
Proceedings of the Electronic Government - 14th IFIP WG 8.5 International Conference, 2015
2014
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications.
J. Netw. Comput. Appl., 2014
Comput. Networks, 2014
CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the Q2SWinet'14, 2014
A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014
2013
Trust management system design for the Internet of Things: A context-aware and multi-service approach.
Comput. Secur., 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the Eighth IEEE World Congress on Services, 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms.
Proceedings of the Third International Conference on Communications and Networking, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context.
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
2010
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider.
Comput. Secur., 2010
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU.
Comput. Secur., 2010
Ann. des Télécommunications, 2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
2009
J. Comput. Networks Commun., 2009
2008
Proceedings of the 8th international conference on New technologies in distributed systems, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
2006
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
2004
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004
Routing Protocols Security Toward a Generic Model?
Proceedings of the 2nd International Conference Computing, 2004
2003
2002
For a Secure Mobile IP and Mobile IPv6 Deployment.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
Ann. des Télécommunications, 2001
2000
Analyse des fonctions des protocoles ipsec et leur intégration dans un réseau privé virtuel.
Ann. des Télécommunications, 2000
1999
An Alternative Access Control Architecture for IP over ATM Networks.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Securing communications overAtm networks: the remoteAtm private networks interconnection example.
Ann. des Télécommunications, 1998
1997
Securing communications over ATM networks.
Proceedings of the Information Security in Research and Business, 1997
1996
Security Flows Analysis of the ATM Emulated LAN Architecture.
Proceedings of the Communications and Multimedia Security II, 1996