Mobile values, new names, and secure communication, In ACM SIGPLAN Notices, vol.36, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
, , 2001.
Internet of surveillance: a cloud supported large-scale wireless surveillance system, The Journal of Supercomputing, vol.73, issue.3, pp.973-992, 2017. ,
Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage, International Conference on Principles of Security and Trust, pp.126-146, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00863375
Pabac: a privacy preserving attribute based framework for fine grained access control in clouds, SECRYPT 2016: 13th International Conference on Security and Cryptography, vol.4, pp.133-146, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01391253
Formal analyze of a private access control protocol to a cloud storage, SECRYPT 2017: 14th International Conference on Security and Cryptography, vol.4, pp.495-500, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01689790
Automatic proof of strong secrecy for security protocols, Proceedings. 2004 IEEE Symposium on, pp.86-100, 2004. ,
Automatic verification of correspondences for security protocols, J. Comput. Secur, vol.17, issue.4, pp.363-434, 2009. ,
Automated verification of selected equivalences for security protocols, The Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008. ,
An efficient cryptographic protocol verifier based on prolog rules, CSFW, vol.1, 2001. ,
Automated reasoning for equivalences in the applied pi calculus with barriers, CSF'16, pp.310-324, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423742
Mesh signatures, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.210-227, 2007. ,
Group signatures, Workshop on the Theory and Application of of Cryptographic Techniques, pp.257-265, 1991. ,
Design and formal analysis of a group signature based electronic toll pricing system, JoWUA, vol.4, issue.1, pp.55-75, 2013. ,
Proofs of partial knowledge and simplified design of witness hiding protocols, Annual International Cryptology Conference, pp.174-187, 1994. ,
Comparing state spaces in automatic security protocol analysis, Formal to Practical Security-Papers Issued from the 2005-2008 French-Japanese Collaboration, pp.70-94, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-01759940
Framework for securing data in cloud storage services, Security and Cryptography (SECRYPT), pp.1-8, 2014. ,
A formal analysis of authentication in the tpm, In International Workshop on Formal Aspects in Security and Trust, pp.111-125, 2010. ,
Practical passive leakage-abuse attacks against symmetric searchable encryption, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-01689780
Attribute-based encryption for fine-grained access control of encrypted data, ACM CCS'06, 2006. ,
A framework for cloud data security, Computing, Communication and Automation (ICCCA), 2016 International Conference on, pp.1199-1203, 2016. ,
Obfuscation and diversification for securing cloud computing, Enterprise Security, pp.179-202, 2017. ,
Service chaining for hybrid network function, IEEE Transactions on Cloud Computing, 2017. ,
Homomorphic encryption as a service for outsourced images in mobile cloud computing environment, International Journal of Cloud Applications and Computing (IJCAC), vol.7, issue.2, pp.27-40, 2017. ,
Analysis of an electronic voting protocol in the applied pi calculus, European Symposium on Programming, pp.186-200, 2005. ,
Decentralizing attribute-based encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.568-588, 2011. ,
Securing personal health records in cloud computing: Patientcentric and fine-grained data access control in multiowner settings, International Conference on Security and Privacy in Communication Systems, pp.89-106, 2010. ,
, , 2008.
, Attribute-based signatures: Achieving attribute-privacy and collusion-resistance, IACR Cryptology ePrint Archive, p.328, 2008.
An efficient algorithm for media-based surveillance system (eamsus) in iot smart city framework, Future Generation Computer Systems, 2017. ,
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space, Proceedings of the 20th USENIX Conference on Security, p.11, 2011. ,
Evaluations of cryptographic protocols: Verification tools dealing with algebraic properties, Foundations and Practice of Security-FPS 2015, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01306395
Formal analysis of security properties on the opcua scada protocol, International Conference on Computer Safety, Reliability, and Security, pp.67-75, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01366059
How to leak a secret, International Conference on the Theory and Application of Cryptology and Information Security, pp.552-565, 2001. ,
Privacy preserving access control with authentication for securing data in clouds, Cluster, Cloud and author Grid Computing (CCGrid), 2012 12th IEEE/ACM International Symposium on, pp.556-563, 2012. ,
Fuzzy identity-based encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.457-473, 2005. ,
Decentralized access control with anonymous authentication of data stored in clouds, 2017. ,
Secure integration of iot and cloud computing, Future Generation Computer Systems, 2016. ,
Study on data security of cloud computing, 2012 Spring Congress on, pp.1-3, 2012. ,
An access control method based on cp-abe and abs algorithm in cloud storage, In Applied Mechanics and Materials, vol.644, pp.1919-1922, 2014. ,
Toward publicly auditable secure cloud data storage services, IEEE Network, vol.24, issue.4, pp.19-24, 2010. ,
Attributed-based access control for multi-authority systems in cloud storage, Distributed Computing Systems (ICDCS), pp.536-545, 2012. ,
Expressive, efficient, and revocable data access control for multi-authority cloud storage, IEEE transactions on parallel and distributed systems, vol.25, pp.1735-1744, 2014. ,
The secure shell (ssh) authentication protocol, 2006. ,
Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, 2010. ,
Key research issues for privacy protection and preservation in cloud computing, Second International Conference on Cloud and Green Computing, CGC'12, pp.47-54, 2012. ,
Secure mobile multi cloud architecture for authentication and data storage, International Journal of Cloud Applications and Computing (IJCAC), vol.7, issue.2, pp.62-76, 2017. ,