selected publications
-
academic article
- A decentralized model for usage and information flow control in distributed systems. Computers & Security. 144:103975-103975. 2024
- Centralized, Distributed, and Everything in between. ACM Computing Surveys. 54:1-34. 2021
- Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things. Sensors. 21:4034-4034. 2021
- Personal Information Self-Management: A Survey of Technologies Supporting Administrative Services. Journal of Computer Science and Technology. 36:664-692. 2021
- Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access. 9:36038-36077. 2021
- Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. Journal of Network and Computer Applications. 171:102807-102807. 2020
- Anonymous certification for E-assessment opinion polls. Journal of Ambient Intelligence and Humanized Computing. 14:14979-14993. 2019
- Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing. 135:1-20. 2019
- Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet of Things Journal. 6:4556-4560. 2019
- Firewalls: the pocketknife for enforcing computer security. . 2017
- Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web. 21:169-183. 2017
- Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications. 111:120-141. 2017
- Discrimination rate: an attribute-centric metric to measure privacy. Annals of Telecommunications. 72:755-766. 2017
- Security and Privacy in Emerging Wireless Networks. Security and Communication Networks. 2017:1-2. 2017
- Digital Identity Management. Network Security. 2015:4-4. 2015
- Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks. 32:17-31. 2015
- A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. Journal of Network and Computer Applications. 45:215-227. 2014
- Lightweight collaborative key establishment scheme for the Internet of Things. Computer Networks. 64:273-295. 2014
- Privacy-aware electronic society. Annals of Telecommunications. 69:1-2. 2013
- Trust management system design for the Internet of Things: A context-aware and multi-service approach. Computers & Security. 39:351-365. 2013
- MyProfile - Decentralized User Profile and Identity on the Web. HAL (Le Centre pour la Communication Scientifique Directe). 2011
- A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. Computers & Security. 29:180-195. 2009
- Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks. Journal of Computer Networks and Communications. 2009. 2009
- Des réseaux ad hoc économiquement viables. HAL (Le Centre pour la Communication Scientifique Directe). 2008
- Improving packet filters management through automatic and dynamic schemes. Annals of Telecommunications. 56:595-608. 2001
-
blog posting
- Empower Healthcare through a Self-Sovereign Identity Infrastructure for Secure Electronic Health Data Access. arXiv (Cornell University). 2025
- Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions. arXiv (Cornell University). 2023
- Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption. arXiv (Cornell University). 2020
-
book
- Information Security Theory and Practice 2020
- Security, and privacy in emerging wireless networks : security and communication networks journal 2017
- Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies 2009
- Mobile and wireless networks security : proceedings of the MWNS 2008 workshop, Singapore, 9 april 2008 2008
- La sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux 2007
-
chapter
- SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information. Communications in computer and information science. 1-19. 2023
- Bringing Privacy, Security and Performance to the Internet of Things Through Usage Control and Blockchains. IFIP advances in information and communication technology. 57-72. 2022
- Privacy-by-design in intelligent infrastructures. . 2021
- Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. Security and Privacy in Communication Networks. 53-68. 2018
- Building trust through risk management in computer science. . 2018
- La blockchain est-elle une technologie de confiance. HAL (Le Centre pour la Communication Scientifique Directe). 2018
- Lifelogging Protection Scheme for Internet-Based Personal Assistants. Lecture notes in computer science. 431-440. 2018
- $$\mathcal {PCS}$$, A Privacy-Preserving Certification Scheme. Lecture notes in computer science. 239-256. 2017
- Anonymous Certification for an e-Assessment Framework. Lecture notes in computer science. 70-85. 2017
- Attribute-Based Signatures for Supporting Anonymous Certification. Lecture notes in computer science. 279-300. 2016
- Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things. Lecture notes in computer science. 339-358. 2016
- Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. Lecture notes in computer science. 19-34. 2016
- List of Authors. Elsevier eBooks. 245-245. 2015
- Privacy in Digital Identity Systems: Models, Assessment, and User Adoption. Lecture notes in computer science. 273-290. 2015
- Analyzing Internet DNS(SEC) Traffic with R for Resolving Platform Optimization. Elsevier eBooks. 435-456. 2013
- Sécurité des réseaux P2P. . 2010
- Sécurité des réseaux P2P. HAL (Le Centre pour la Communication Scientifique Directe). 2010
- Sécurité des réseaux P2P. HAL (Le Centre pour la Communication Scientifique Directe). 2010
- SAACCESS: Secured Ad hoc ACCess framework. New Technologies, Mobility and Security. 425-436. 2007
- A New Resilient Key Management Protocol for Wireless Sensor Networks. Lecture notes in computer science. 14-26. 2007
- Gestion de clés dans les réseaux de capteurs. . 2007
- Mécanismes de sécurité fondamentaux. . 2007
- Sécurité dans les réseaux de capteurs sans fil. . 2007
- Sécurité des réseaux mobiles IP. . 2007
- Using PANA for Mobile IPv6 Bootstrapping. Lecture notes in computer science. 345-355. 2007
- An Alternative Access Control Architecture for IP Over ATM Networks. Springer eBooks. 36-50. 1999
-
conference paper
- SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge. . 13-24. 2022
- Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. 405-414. 2020
- Distributed access control solution for the IoT based on multi-endorsed attributes and smart contracts. . 1582-1587. 2019
- Position paper. . 2018
- BDUA: Blockchain-Based Data Usage Auditing. . 630-637. 2018
- Questioning the security and efficiency of the ESIoT approach. . 202-207. 2018
- A Blockchain based Access Control Scheme. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. 168-176. 2018
- A Blockchain based Access Control Scheme. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. 334-342. 2018
- SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. 155-167. 2018
- SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. 321-333. 2018
- A blockchain-based data usage auditing architecture with enhanced privacy and availability. . 1-5. 2017
- PCS, a privacy-preserving certification scheme. . 2017
- Serverless protocols for inventory and tracking with a UAV. 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). 1-11. 2017
- Security SLA Based Monitoring in Clouds. . 90-97. 2017
- Constant-size Threshold Attribute based SignCryption for Cloud Applications. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. 2017
- Games based on active NFC objects: Model and security requirements. . 1-3. 2015
- Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things. 2015 IEEE Trustcom/BigDataSE/ISPA. 467-474. 2015
- Serverless lightweight mutual authentication protocol for small mobile computing devices. . 1-5. 2015
- SHoPS: Set Homomorphic Proof of Data Possession Scheme in Cloud Storage Applications. . 143-150. 2015
- Elastic virtual private cloud. . 127-131. 2014
- Secure IPsec based offload architectures for mobile data. . 95-104. 2014
- A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications. . 522-531. 2014
- A Secure Client Side Deduplication Scheme in Cloud Storage Environments. . 1-7. 2014
- CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. . 2014
- Towards a Secure Identity Management in Smartphone Environments. . 2133-2135. 2013
- PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform. . 694-703. 2013
- Failure preventive mechanism for IPsec gateways. . 167-172. 2013
- ID Based Cryptography for Cloud Data Storage. . 375-382. 2013
- Overcoming DNSSEC performance issues with DHT-based architectures. HAL (Le Centre pour la Communication Scientifique Directe). 2013
- Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency. HAL (Le Centre pour la Communication Scientifique Directe). 2013
- GPS+. . 73-78. 2013
- A lattice based authentication for low-cost RFID. . 68-73. 2012
- Dynamic DNS Update Security, Based on Cryptographically Generated Addresses and ID-Based Cryptography, in an IPv6 Autoconfiguration Context. . 206-211. 2012
- E2E: An Optimized IPsec Architecture for Secure and Fast Offload. . 365-374. 2012
- Context-Aware Decentralized Approach for Web Services. . 73-79. 2012
- Technical Enforcement of European Privacy Legislation: An Access Control Approach. . 1-7. 2012
- An EAP ID-Based authentication method for wireless networks. HAL (Le Centre pour la Communication Scientifique Directe). 2011
- A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. . 249-253. 2011
- Defeating pharming attacks at the client-side. . 33-40. 2011
- Privacy policy negotiation at user's side based on P3P tag value classification. . 2011
- Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETs. 2022 IEEE Symposium on Computers and Communications (ISCC). 856-863. 2011
- Decisive Heuristics to Differentiate Legitimate from Phishing Sites. . 1-9. 2011
- Using SEND Signature Algorithm Agility and Multiple-Key CGA to Secure Proxy Neighbor Discovery and Anycast Addressing. . 1-7. 2011
- Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. IEEE Wireless Communications and Networking Conference. 784-789. 2011
- Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS Environments. . 1-5. 2011
- Enabling user privacy in identity management systems. IEEE International Conference on Information Theory and Information Security. 514-520. 2010
- XPACML eXtensible Privacy Access Control Markup Langua. . 1-5. 2010
- A performance view on DNSSEC migration. . 469-474. 2010
- Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks. . 277-281. 2010
- La vie privée dans les environnements fédérés. . 2010
- Amélioration des performances des adresses CGA et du protocole SEND : étude comparée de RSA et d'ECC/ECDSA. . 2009
- Protocols for distributed AAA framework in mobile ad-hoc networks. . 2009
- Secure communications between multi-capacity devices with authentication support by network operators. HAL (Le Centre pour la Communication Scientifique Directe). 2009
- Mitigating Resource-Draining DoS Attacks on Broadcast Source Authentication on Wireless Sensors Networks. . 109-116. 2008
- Light and distributed AAA scheme for mobile ad-hoc networks. HAL (Le Centre pour la Communication Scientifique Directe). 2008
- WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. . 144-152. 2008
- A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks. . 59-59. 2007
- Defending against nodes replication attacks on wireless sensor networks. . 2007
- Inter-domain security for Mobile IPv6. . 238-245. 2003
-
document
- Procédé de sauvegarde/restauration de fichiers dans un réseau pair à pair. HAL (Le Centre pour la Communication Scientifique Directe). 2009
- Wireless Sensor Network Security. . 565-611. 2009
-
report
- A new authentication method based on cryptographic identifiers CGAs. HAL (Le Centre pour la Communication Scientifique Directe). 2009
- Un protocole pour la négociation des politiques de privacy. HAL (Le Centre pour la Communication Scientifique Directe). 2009
- Distributed AAA framework for MANET: performance analysis. HAL (Le Centre pour la Communication Scientifique Directe). 2009
- Secure aggregation in wireless sensor networks. HAL (Le Centre pour la Communication Scientifique Directe). 2009
- Cold chain monitoring using wireless sensor networks : design & experimental feedback. HAL (Le Centre pour la Communication Scientifique Directe). 2009
- Authentication services in mobile ad hoc networks. . 2008
- A Secure distributed P2P backup system based on AAA architecture. HAL (Le Centre pour la Communication Scientifique Directe). 2008