Publications

AnnéeType de publicationAuteurMot clé
   

Article de revue avec comité de lecture (8)

DANDACHI Ghina, ELAYOUBI Salah-Eddine, CHAHED Tijani, CHENDEB Nada
Network centric versus user centric multihoming strategies in LTE/WiFi networks. IEEE transactions on vehicular technology, may 2017, vol. 66, n° 5, pp. 4188-4199
abstract

GONZALEZ GRANADILLO Gustavo Daniel, GARCIA-ALFARO Joaquin, DEBAR Hervé
A polytope-based approach to measure the impact of events against critical infrastructures. Journal of computer and system sciences, february 2017, vol. 83, n° 1, pp. 3-21
[PDF]
abstract

KAANICHE Nesrine, LAURENT Maryline
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer communications, october 2017, vol. 111, pp. 120-141
[PDF]
abstract

MIGAULT Daniel, GUGGEMOS Tobias, KILLIAN Sylvain, LAURENT Maryline, PUJOLLE Guy, WARY Jean-Philippe
Diet-ESP: IP layer security for IoT. Journal of computer security, may 2017, vol. 25, n° 2, pp. 173-203
abstract

NGUYEN Kim Thuat, OUAHLA Nouha, LAURENT Maryline
Securely outsourcing the ciphertext-policy attribute-based encryption. World wide web, 2017, pp. 1-15 (document in press - published online 03 Aug 2017)
URL: http://rdcu.be/uHXu
abstract

OUANTEUR Celia, AISSANI Djamil, BOUALLOUCHE-MEDJKOUNE Louiza, YAZID Mohand, CASTEL-TALEB Hind
Modeling and performance evaluation of the IEEE 802.15.4e LLDN mechanism designed for industrial applications in WSNs. Wireless networks, july 2017, vol. 23, n° 5, pp. 1343-1358
abstract

SONDECK Louis-Philippe, LAURENT Maryline, FREY Vincent
Discrimination rate : an attribute-centric metric to measure privacy. Annales des télécommunications- Annals of telecommunications, 2017, pp. 1-12 (document in press - published online 29 May 2017)
[PDF]
abstract

WANG Leye, ZHANG Daqing, XIONG Haoyi, GIBSON John Paul, CHEN Chao, XIE Bing
ecoSense: minimize participants' total 3G data cost in mobile crowdsensing using opportunistic relays. IEEE transactions on systems, man, and cybernetics. Systems, june 2017, vol. 47, n° 6, pp. 965-978
abstract

Article de revue sans comité de lecture (1)

LAURENT Maryline
Pare-feu : le couteau suisse de la sécurité informatique. Techniques de l'ingénieur. Sécurité des systèmes d'information, 2017 (document à paraître)
abstract

Communication dans une conférence à comité de lecture (18)

AFIFI Hossam, IBN KHEDHER Hatem, MOUSTAFA Hassnaa
Optimal Placement Algorithm (OPA) for IoT over ICN. INFOCOM NOM 2017 :Named-Oriented Mobility: Architectures, Algorithms, and Applications workshop, Los Alamitos : IEEE, 01-04 may 2017, Atlanta, United States, 2017, vol. 1, pp. 254-259 (document in press - published online 05 May 2017)
abstract

AMAR Djamel, LEPERS Catherine, GILLET Franck, LOURDIANE Mounia, WARE Cédric, CHIARONI Dominique
WDM slot sharing of colored optical packets for latency improvement and Class of Service differentiation. ICTON 2017: 19th International Conference on Transparent Optical Networks , IEEE , 02-06 july 2017, Girona, Spain, 2017, pp. 1-4, ISBN 978-1-5386-0860-9
abstract

BELGUITH Sana, KAANICHE Nesrine, LAURENT Maryline, JEMAI Abderrazak , ATTIA Rabah
Constant-size threshold attribute based signcryption for cloud applications. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Setúbal : Scitepress, 24-26 july 2017, Madrid, Spain, 2017, vol. 6, pp. 212-225, ISBN 978-989-758-259-2
[PDF]
abstract

BEN MOSBAH Aziza, GRIFFITH David, ROUIL Richard A.
A novel adaptive transmission algorithm for Device-to-Device Direct Discovery. IWCMC 2017 : 13th International Wireless Communications & Mobile Computing Conference, Los Alamitos : IEEE Computer Society, 26-30 june 2017, Valencia, Spain, 2017, pp. 177-182, ISBN 978-1-5090-4372-9
abstract

BEN MOSBAH Azza, HALL Timothy, SOURYAL Michael R., AFIFI Hossam
Analysis of the vulnerability of the incumbent frequency to inference attacks in spectrum sharing. CCNC 2017 : 14th IEEE Consumer Communications & Networking Conference, Los Alamitos : IEEE Computer Society, 08-11 january 2017, Las Vegas, United States, 2017, pp. 640-642, ISBN 978-1-5090-6196-9
URL: https://hal.archives-ouvertes.fr/hal-01494122/document
abstract

BEN MOSBAH Azza, HALL Timothy, SOURYAL Michael R., AFIFI Hossam
An analytical model for inference attacks on the incumbent's frequency in spectrum sharing. DySPAN 2017 : International Symposium on Dynamic Spectrum Access Networks, Los Alamitos : IEEE, 06-09 march 2017, Baltimore, United States, 2017, pp. 1-2, ISBN 978-1-5090-2830-6
URL: https://hal.archives-ouvertes.fr/hal-01494129/document
abstract

GONZALEZ GRANADILLO Gustavo Daniel, GARCIA-ALFARO Joaquin, DEBAR Hervé
An n-sided polygonal model to calculate the impact of cyber security events. CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems, Cham : Springer, 05-07 september 2016, Roscoff, France, 2017, pp. 87-102, ISBN 978-3-319-54875-3
[PDF]
abstract

GRIFFITH David, BEN MOSBAH Aziza, ROUIL Richard A.
Group discovery time in device-to-device (D2D) proximity services (ProSe) networks . INFOCOM 2017 : International Conference on Computer Communications, Los Alamitos : IEEE Computer Society, 01-04 may 2017, Atlanta, United States, 2017, pp. 1-9, ISBN 978-1-5090-5336-0
URL: https://hal.archives-ouvertes.fr/hal-01614144/document
abstract

HRIZI Fatma, TOUMI Khalifa, LAOUITI Anis
Trust-BZB : towards a trust-driven routing in vehicular networks. IWVSC 2016 : 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities, Singapore : Springer, 14-14 august 2016, Kuala Lumpur, Malaysia, 2017, vol. 548, pp. 85-96, ISBN 978-981-10-3502-9
abstract

IBN KHEDHER Hatem, AFIFI Hossam, KAMAL Ahmed E.
Service placement in complex active networks. ICCCN 2017 : 26th International Conference on Computer Communications and Networks, Los Alamitos : IEEE Computer Society, 31 july - 03 august 2017, Vancouver, Canada, 2017, pp. 1-9, ISBN 978-1-5090-2991-4
abstract

JAVED Ibrahim Tariq, TOUMI Khalifa, CRESPI Noel
ProtectCall: call protection based on user reputation. TRUSTCOM 2017 : 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Los Alamitos : IEEE Computer Society, 01-04 august 2017, Sydney, Australia, 2017, pp. 660-667, ISBN 978-1-5090-4906-6
URL: http://servicearchitecture.wp.tem-tsp.eu/files/2017/07/ProtectCall-Call-Protection-based-on-User-Reputation.pdf
abstract

KAANICHE Nesrine, LAURENT Maryline
Attribute based encryption for multi-level access control policies. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Setúbal : Scitepress, 24-26 july 2017, Madrid, Spain, 2017, vol. 6, pp. 67-78, ISBN 978-989-758-259-2
[PDF]
abstract

KAANICHE Nesrine, MOHAMED Mohamed, LAURENT Maryline, LUDWIG Heiko
Security SLA based monitoring in clouds. EDGE 2017 : 1st International Conference on Edge Computing, Los Alamitos : IEEE Computer Society, 25-30 june 2017, Honolulu, United States, 2017, pp. 90-97, ISBN 978-1-5386-2017-5
[PDF]
abstract

KAANICHE Nesrine, LAURENT Maryline, ROCHER Pierre Olivier, KIENNERT Christophe, GARCIA-ALFARO Joaquin
PCS, a privacy-preserving certification scheme. DPM 2017 : 12th International Workshop on Data Privacy Management, Cham : Springer, 14-15 september 2017, Oslo, Norway, 2017, pp. 239-256, ISBN 978-3-319-67815-3
[PDF]
abstract

RUBIO-HERNAN Jose, RODOLFO-MEJIAS Juan, GARCIA-ALFARO Joaquin
Security of cyber-physical systems : from theory to testbeds and validation. CYBERICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems, Cham : Springer, 26-30 september 2016, Heraklion, Greece, 2017, pp. 3-18, ISBN 978-3-319-61436-6
abstract

SONDECK Louis-Philippe, LAURENT Maryline, FREY Vincent
The semantic discrimination rate metric for privacy measurements which questions the benefit of t-closeness over l-diversity. SECRYPT 2017 : 14th International Conference on Security and Cryptography, Setúbal : Scitepress, 24-26 july 2017, Madrid, Spain, 2017, vol. 6, pp. 285-294, ISBN 978-989-758-259-2
[PDF]
abstract

TOUMI Khalifa, IDREES Muhammad Sabir, CHARMET Fabien, YAICH Reda, BLANC Gregory
Usage control policy enforcement in SDN-based clouds: a dynamic availability service use case . HPCC 2016 : 18th IEEE International Conference on High Performance Computing and Communications, IEEE, 12-14 december 2016, Sydney, Australia, 2017, pp. 578-585, ISBN 978-1-5090-4297-5
abstract

ZHANG Jun, LABIOD Houda, HAMMAMI Seif Eddine, AFIFI Hossam
Scalable energy efficient routing in multi-layer femtocell networks. IWCMC 2017 : 13th International Wireless Communications & Mobile Computing Conference, Los Alamitos : IEEE Computer Society, 26 june - 30 may 2017, Valencia, Spain, 2017, pp. 1540-1545, ISBN 978-1-5090-4372-9
abstract

Brevet (1)

GAUTHIER Vincent, ASGARI Fereshteh, EL YACOUBI Mounim, SULTAN Alexis
Procédé d'estimation de trajectoires utilisant des données mobiles. n°FR3046006, France, 23/06/2017
URL: http://bases-brevets.inpi.fr/fr/document/FR3046006.html
abstract

Direction d'ouvrage (1)

CUPPENS Frédéric, WANG Lingyu, CUPPENS-BOULAHIA Nora, TAWBI Nadia, GARCIA-ALFARO Joaquin
Foundations and practice of security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Cham : Springer, 2017, vol. 10128, (Lecture Notes in Computer Science, 10128), ISBN 978-3-319-51965-4
URL: http://dx.doi.org/10.1007/978-3-319-51966-1
abstract