Gomez Laurent
Gomez Laurent
SAP Security Research
Verified email at
Cited by
Cited by
Method and system for authentication by defining a demanded level of security
LY Gomez, I Thomas
US Patent 8,490,154, 2013
ontext-aware security and secure context-awareness in ubiquitous computing environments
K Wrona, L Gomez
Annales Universitatis Mariae Curie-Sklodowska, sectio AI–Informatica 4 (1 …, 2006
Secure and trusted in-network data processing in wireless sensor networks: a survey
A Sorniotti, L Gomez, K Wrona, L Odorico
Journal of Information Assurance and Security 2 (3), 189-199, 2007
Differentially private generative adversarial networks for time series, continuous, and discrete open data
L Frigerio, AS Oliveira, L Gomez, P Duverger
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2019
Client authentication using a challenge provider
R Kilian-Kehr, J Haller, L Gomez, C Hebert
US Patent 7,673,141, 2010
Enterprise secure messaging architecture
J Haller, L Gomez, J Posegga
US Patent 7,272,716, 2007
Method and system for automatically organizing and achieving a pre-given task by means of robot functionalities
C Ulmer, L Gomez, F Montagut, C Hebert, K Wrona
US Patent 8,548,627, 2013
Method and system for access control using resource filters
L Gomez, A Laube
US Patent 8,156,537, 2012
Trustworthiness assessment of wireless sensor data for business applications
L Gomez, A Laube, A Sorniotti
2009 international conference on advanced information networking and …, 2009
Password protection using personal information
L Gomez, S Trabelsi, A Mouelhi
US Patent 8,539,599, 2013
System and method for inhibiting interaction with malicious software
LLY Gomez, CRJ Hebert, CSP Ulmer
US Patent 7,587,676, 2009
Context-aware based cryptography
LY Gomez
US Patent 8,687,805, 2014
Efficient access control for wireless sensor data
A Sorniotti, R Molva, L Gomez, C Trefois, A Laube, P Scaglioso
International Journal of Wireless Information Networks 16 (3), 165-174, 2009
Security patterns for capturing encryption-based access control to sensor data
A Cuevas, P El Khoury, L Gomez, A Laube
2008 Second International Conference on Emerging Security Information …, 2008
Design guidelines for integration of wireless sensor networks with enterprise systems
L Gomez, A Laube, A Sorniotti
Proceedings of the 1st international conference on MOBILe Wireless …, 2008
Context-aware security policy for the service discovery
S Trabelsi, L Gomez, Y Roudier
21st International Conference on Advanced Information Networking and …, 2007
Secure sensor networks for public safety command and control system
L Gomez, A Laube, C Ulmer
2009 IEEE Conference on Technologies for Homeland Security, 59-66, 2009
Penetration test attack tree generator
C Hebert, L Gomez
US Patent 9,894,090, 2018
Tracing of collaborative workflows
CRJ Hebert, LY Gomez, F Montagut, H Plate, CSP Ulmer
US Patent 8,819,131, 2014
Automatic electronic timesheet filler
CSP Ulmer, PTC Spadone, CRJ Hébert, LY Gomez, ME Rits
US Patent 7,386,785, 2008
The system can't perform the operation now. Try again later.
Articles 1–20