default search action
Nesrine Kaaniche
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki:
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture. J. Netw. Syst. Manag. 32(2): 33 (2024) - [j19]Hichem Sedjelmaci, Nesrine Kaaniche, Aymen Boudguiga, Nirwan Ansari:
Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles. IEEE Trans. Veh. Technol. 73(2): 2633-2642 (2024) - [c35]Adda-Akram Bendoukha, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey:
FairCognizer: A Model for Accurate Predictions with Inherent Fairness Evaluation. ECAI 2024: 1019-1026 - [c34]Taisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi:
Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting Query. ICOIN 2024: 409-414 - [c33]Devharsh Trivedi, Nesrine Kaaniche, Aymen Boudguiga, Nikos Triandopoulos:
chiku: Efficient Probabilistic Polynomial Approximations Library. SECRYPT 2024: 634-641 - 2023
- [j18]Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos:
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation. Cryptogr. 7(4): 52 (2023) - [j17]Nesrine Kaaniche, Christophe Kiennert, Maryline Laurent, Joaquín García-Alfaro:
Anonymous certification for E-assessment opinion polls. J. Ambient Intell. Humaniz. Comput. 14(11): 14979-14993 (2023) - [i3]Montassar Naghmouchi, Maryline Laurent, Claire Levallois-Barth, Nesrine Kaaniche:
Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions. CoRR abs/2310.01006 (2023) - 2022
- [j16]Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent:
SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems. IEEE Access 10: 106400-106414 (2022) - [j15]Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh:
Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j14]Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche:
PIMA: A Privacy-preserving Identity management system based on an unlinkable MAlleable signature. J. Netw. Comput. Appl. 208: 103517 (2022) - [j13]Nazatul Haque Sultan, Nesrine Kaaniche, Maryline Laurent, Ferdous Ahmed Barbhuiya:
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. IEEE Trans. Cloud Comput. 10(1): 216-233 (2022) - [c32]Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche:
Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. ICC 2022: 5238-5243 - [c31]Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche:
SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information. ICSBT/SECRYPT (Revised Selected Papers) 2022: 1-19 - [c30]Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche:
SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge. SECRYPT 2022: 13-24 - [c29]Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez Granadillo:
Efficient Hybrid Model for Intrusion Detection Systems. SECRYPT 2022: 694-700 - [i2]Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent:
SPOT: Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems. CoRR abs/2212.00381 (2022) - 2021
- [j12]Nicolas Sklavos, Nesrine Kaaniche:
On the design of secure primitives for real world applications. Microprocess. Microsystems 80: 103614 (2021) - [j11]Hassan N. Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, Raphaël Couturier:
TRESC: Towards redesigning existing symmetric ciphers. Microprocess. Microsystems 87: 103478 (2021) - [j10]Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche:
An Efficient User-Centric Consent Management Design for Multiservices Platforms. Secur. Commun. Networks 2021: 5512075:1-5512075:19 (2021) - [j9]Nesrine Kaaniche, Maryline Laurent, Sébastien Canard:
Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds. IEEE Trans. Cloud Comput. 9(1): 102-117 (2021) - [i1]Claudio Bellei, Hussain Alattas, Nesrine Kaaniche:
Label-GCN: An Effective Method for Adding Label Propagation to Graph Convolutional Networks. CoRR abs/2104.02153 (2021) - 2020
- [j8]Nesrine Kaaniche, Maryline Laurent, Claire Levallois-Barth:
ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments. Frontiers Blockchain 3: 17 (2020) - [j7]Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi:
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications. Future Gener. Comput. Syst. 111: 899-918 (2020) - [j6]Nesrine Kaaniche, Maryline Laurent, Sana Belguith:
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. J. Netw. Comput. Appl. 171: 102807 (2020) - [j5]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J. Parallel Distributed Comput. 135: 1-20 (2020) - [j4]Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohammad Malli:
Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsystems 77: 103201 (2020) - [j3]Sana Belguith, Nesrine Kaaniche, Giovanni Russello:
CUPS: Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update. Secur. Priv. 3(4) (2020) - [c28]Paul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche:
An Identity-matching Process to Strengthen Trust in Federated-identity Architectures. ICETE (2) 2020: 142-154 - [c27]Nesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello:
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. ICETE (2) 2020: 225-237 - [c26]Nesrine Kaaniche, Souha Masmoudi, Souha Znina, Maryline Laurent, Levent Demir:
Privacy preserving cooperative computation for personalized web search applications. SAC 2020: 250-258
2010 – 2019
- 2019
- [c25]Zhi Guan, Abba Garba, Anran Li, Zhong Chen, Nesrine Kaaniche:
AuthLedger: A Novel Blockchain-based Domain Name Authentication Scheme. ICISSP 2019: 345-352 - 2018
- [j2]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput. Networks 133: 141-156 (2018) - [c24]Nesrine Kaaniche, Maryline Laurent:
Privacy-Preserving Multi-User Encrypted Access Control Scheme for Cloud-Assisted IoT Applications. IEEE CLOUD 2018: 590-597 - [c23]Nesrine Kaaniche, Maryline Laurent:
BDUA: Blockchain-Based Data Usage Auditing. IEEE CLOUD 2018: 630-637 - [c22]Sana Belguith, Nesrine Kaaniche, Giovanni Russello:
PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT. IEEE CLOUD 2018: 924-927 - [c21]Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello:
C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications. SCC 2018: 245-248 - [c20]Nesrine Kaaniche, Eunjin Jung, Ashish Gehani:
Efficiently Validating Aggregated IoT Data Integrity. BigDataService 2018: 260-265 - [c19]David Pàmies-Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castellà-Roca, Joaquín García-Alfaro:
Lifelogging Protection Scheme for Internet-Based Personal Assistants. DPM/CBT@ESORICS 2018: 431-440 - [c18]Sana Belguith, Nesrine Kaaniche, Giovanni Russello:
Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. ICETE (2) 2018: 301-312 - [c17]Nesrine Kaaniche, Maryline Laurent:
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. ICETE (2) 2018: 321-333 - [c16]Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse:
A Blockchain based Access Control Scheme. ICETE (2) 2018: 334-342 - [c15]Nesrine Kaaniche, Sana Belguith, Giovanni Russello:
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. NSS 2018: 187-201 - [c14]Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello:
Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications. OTM Conferences (1) 2018: 498-515 - 2017
- [j1]Nesrine Kaaniche, Maryline Laurent:
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111: 120-141 (2017) - [c13]Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig:
Security SLA Based Monitoring in Clouds. EDGE 2017: 90-97 - [c12]Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Christophe Kiennert, Joaquín García-Alfaro:
PCS , A Privacy-Preserving Certification Scheme. DPM/CBT@ESORICS 2017: 239-256 - [c11]Nesrine Kaaniche, Maryline Laurent:
A blockchain-based data usage auditing architecture with enhanced privacy and availability. NCA 2017: 403-407 - [c10]Christophe Kiennert, Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Joaquín García-Alfaro:
Anonymous Certification for an e-Assessment Framework. NordSec 2017: 70-85 - [c9]Nesrine Kaaniche, Maryline Laurent:
Attribute based Encryption for Multi-level Access Control Policies. SECRYPT 2017: 67-78 - [c8]Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
Constant-size Threshold Attribute based SignCryption for Cloud Applications. SECRYPT 2017: 212-225 - 2016
- [c7]Nesrine Kaaniche, Maryline Laurent:
Attribute-Based Signatures for Supporting Anonymous Certification. ESORICS (1) 2016: 279-300 - [c6]Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia:
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. SECRYPT 2016: 133-146 - 2015
- [c5]Nesrine Kaaniche, Maryline Laurent:
SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications. SERVICES 2015: 143-150 - 2014
- [b1]Nesrine Kaaniche:
Cloud data storage security based on cryptographic mechanisms. (La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques). Telecom & Management SudParis, Évry, Essonne, France, 2014 - [c4]Nesrine Kaaniche, Ethmane El Moustaine, Maryline Laurent:
A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications. CCGRID 2014: 522-531 - [c3]Nesrine Kaaniche, Maryline Laurent:
A Secure Client Side Deduplication Scheme in Cloud Storage Environments. NTMS 2014: 1-7 - [c2]Nesrine Kaaniche, Maryline Laurent, Mohammed El-Barbori:
CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. SECRYPT 2014: 5-18 - 2013
- [c1]Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent:
ID Based Cryptography for Cloud Data Storage. IEEE CLOUD 2013: 375-382
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 20:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint