Æȷοì
Nesrine Kaaniche
Nesrine Kaaniche
Institut Polytechnique de Paris
telecom-sudparis.euÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Cyber-physical systems security: Limitations, issues and future trends
JPA Yaacoub, O Salman, HN Noura, N Kaaniche, A Chehab, M Malli
Microprocessors and microsystems 77, 103201, 2020
4772020
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
N Kaaniche, M Laurent
Computer Communications 111, 120-141, 2017
2142017
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Computer Networks 133, 141-156, 2018
1892018
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
N Kaaniche, M Laurent, S Belguith
Journal of Network and Computer Applications 171, 102807, 2020
1202020
A secure client side deduplication scheme in cloud storage environments
N Kaaniche, M Laurent
2014 6th International Conference on New Technologies, Mobility and Security ¡¦, 2014
1052014
A blockchain-based data usage auditing architecture with enhanced privacy and availability
N Kaaniche, M Laurent
2017 IEEE 16th International Symposium on Network Computing and Applications ¡¦, 2017
942017
Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications
S Belguith, N Kaaniche, M Hammoudeh, T Dargahi
Future Generation Computer Systems 111, 899-918, 2020
792020
Attribute-based signatures for supporting anonymous certification
N Kaaniche, M Laurent
European Symposium on Research in Computer Security (ESORICS),2016, 279-300, 2016
552016
Analysis of attribute‐based cryptographic techniques and their application to protect cloud services
S Belguith, N Kaaniche, M Hammoudeh
Transactions on emerging telecommunications technologies 33 (3), e3667, 2022
492022
PU-ABE: Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT
S Belguith, N Kaaniche, G Russello
2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 924-927, 2018
482018
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
Journal of Parallel and Distributed Computing 135, 1-20, 2020
442020
ID based cryptography for cloud data storage
N Kaaniche, A Boudguiga, M Laurent
2013 IEEE Sixth International Conference on Cloud Computing, 375-382, 2013
392013
Pabac: a privacy preserving attribute based framework for fine grained access control in clouds
S Belguith, N Kaaniche, A Jemai, M Laurent, R Attia
SECRYPT 2016: 13th International Conference on Security and Cryptography 4 ¡¦, 2016
382016
Constant-size threshold attribute based signcryption for cloud applications
S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia
SECRYPT 2017: 14th International Conference on Security and Cryptography 6 ¡¦, 2017
352017
Security SLA based monitoring in clouds
N Kaaniche, M Mohamed, M Laurent, H Ludwig
2017 IEEE International Conference on Edge Computing (EDGE), 90-97, 2017
332017
A novel zero-knowledge scheme for proof of data possession in cloud storage applications
N Kaaniche, E El Moustaine, M Laurent
2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid ¡¦, 2014
292014
A blockchain-based access control scheme
M Laurent, N Kaaniche, C Le, M Vander Plaetse
SECRYPT 2018: 15th International Conference on Security and Cryptography 2 ¡¦, 2018
282018
Attribute based encryption for multi-level access control policies
N Kaaniche, M Laurent
SECRYPT 2017: 14th International Conference on Security and Cryptography 6 ¡¦, 2017
282017
Authorized keyword search over outsourced encrypted data in cloud environment
NH Sultan, N Kaaniche, M Laurent, FA Barbhuiya
IEEE Transactions on Cloud Computing 10 (1), 216-233, 2019
262019
Cloudasec: A novel public-key based framework to handle data sharing security in clouds
N Kaaniche, M Laurent, M El Barbori
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014
262014
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20