Search Results - "Bouabdallah, Abdelmadjid"

Refine Results
  1. 1

    Energy efficiency in wireless sensor networks: A top-down survey by Rault, Tifenn, Bouabdallah, Abdelmadjid, Challal, Yacine

    “…The design of sustainable wireless sensor networks (WSNs) is a very challenging issue. On the one hand, energy-constrained sensors are expected to run…”
    Get full text
    Journal Article
  2. 2

    A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things by Kandi, Mohamed Ali, Lakhlef, Hicham, Bouabdallah, Abdelmadjid, Challal, Yacine

    “…The Internet of Things (IoT) is a network made up of a large number of devices that collaborate to provide various service for the benefit of society. Two…”
    Get full text
    Journal Article
  3. 3

    Reliable and fully distributed trust model for mobile ad hoc networks by Omar, Mawloud, Challal, Yacine, Bouabdallah, Abdelmadjid

    Published in Computers & security (01-05-2009)
    “…A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management…”
    Get full text
    Journal Article
  4. 4

    Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks by Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.

    “…There has been a host of research works on wireless sensor networks for medical applications. However, the major shortcoming of these efforts is a lack of…”
    Get full text
    Conference Proceeding
  5. 5

    Internet of things security: A top-down survey by Kouicem, Djamel Eddine, Bouabdallah, Abdelmadjid, Lakhlef, Hicham

    “…Internet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years. It aims…”
    Get full text
    Journal Article
  6. 6

    Adaptive Group Key Management Protocol for Wireless Communications by Gharout, Saïd, Bouabdallah, Abdelmadjid, Challal, Yacine, Achemlal, Mohamed

    “…Group-oriented services and wireless communication networks are among the emerging technologies of the last few years. Group key management, which is an…”
    Get full text
    Journal Article
  7. 7

    Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey by Benhamaid, Sana, Bouabdallah, Abdelmadjid, Lakhlef, Hicham

    “…Internet-of-Things (IoT) refers to the massive network interconnection of objects often equipped with ubiquitous intelligence employed to provide smart…”
    Get full text
    Journal Article
  8. 8

    Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things by Kouicem, Djamel Eddine, Imine, Youcef, Bouabdallah, Abdelmadjid, Lakhlef, Hicham

    “…The Internet of Things (IoT) is a network that integrates a variety of heterogeneous nodes, such as connected devices (sensors, robots, and smart phones ...),…”
    Get full text
    Journal Article
  9. 9

    C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things by Touati, Lyes, Challal, Yacine, Bouabdallah, Abdelmadjid

    “…Cipher text Policy Attribute-Based Encryption (CP-ABE) is an extremely powerful asymmetric encryption mechanism, but its complexity and its overhead cannot be…”
    Get full text
    Conference Proceeding
  10. 10

    Interest-based trust management scheme for social internet of things by Talbi, Said, Bouabdallah, Abdelmadjid

    “…The integration of social ties between IoT’s devices has facilitated the emergence of new paradigm named the Social Internet of Things SIoT. In this paradigm,…”
    Get full text
    Journal Article
  11. 11

    A taxonomy of multicast data origin authentication: Issues and solutions by Challal, Y., Bettahar, H., Bouabdallah, A.

    Published in IEEE Communications surveys and tutorials (01-01-2004)
    “…Multicasting is an efficient communication mechanism for group-oriented applications such as videoconferencing, broadcasting stock quotes, interactive group…”
    Get full text
    Journal Article
  12. 12

    Energy-efficient mechanisms in security of the internet of things: A survey by Hellaoui, Hamed, Koudil, Mouloud, Bouabdallah, Abdelmadjid

    “…Security primitives in the IoT (Internet of Things) are energy consuming. Finding the best solutions that reduce energy consumption while ensuring the required…”
    Get full text
    Journal Article
  13. 13

    Efficient and lightweight group rekeying protocol for communicating things by Lakhlef, Hicham, Bouabdallah, Abdelmadjid

    Published in Computers & electrical engineering (01-05-2021)
    “…Recent advances in emerging technologies have given birth to a new type of networks called Internet of Things (IoT). The emergence of IoT has led practitioners…”
    Get full text
    Journal Article
  14. 14

    A survey on recent contention-free MAC protocols for static and mobile wireless decentralized networks in IoT by Abid, Khaled, Lakhlef, Hicham, Bouabdallah, Abdelmadjid

    “…Medium Access Control (MAC) protocols for wireless decentralized networks in IoT have attracted a lot of attention in both academic and industrial fields. They…”
    Get full text
    Journal Article
  15. 15

    Healing on the cloud: Secure cloud architecture for medical wireless sensor networks by Lounis, Ahmed, Hadjidj, Abdelkrim, Bouabdallah, Abdelmadjid, Challal, Yacine

    Published in Future generation computer systems (01-02-2016)
    “…There has been a host of research works on wireless sensor networks (WSN) for medical applications. However, the major shortcoming of these efforts is a lack…”
    Get full text
    Journal Article
  16. 16

    A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications by Rault, Tifenn, Bouabdallah, Abdelmadjid, Challal, Yacine, Marin, Frédéric

    Published in Pervasive and mobile computing (01-06-2017)
    “…Human context recognition (HCR) from on-body sensor networks is an important and challenging task for many healthcare applications because it offers continuous…”
    Get full text
    Journal Article
  17. 17

    The Topology Change Attack: Threat and Impact by Abdelouahab, Mahdi Amine, Bouabdallah, Abdelmadjid, Mohamed, Achemlal, Laniepce, Sylvie

    Published in Journal of Universal Computer Science (01-01-2009)
    “…Peer to peer (P2P) network has received in past few years a significant attention, especially such file sharing network as eDonkey [Kulbak and Kirkpatrick,…”
    Get full text
    Journal Article
  18. 18

    Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach by Hellaoui, Hamed, Koudil, Mouloud, Bouabdallah, Abdelmadjid

    Published in IEEE internet of things journal (01-07-2020)
    “…The challenging problem of energy efficiency in security of the Internet of Things (IoT) is tackled in this article. The authors consider the upcoming…”
    Get full text
    Journal Article
  19. 19

    Methods for detecting and removing ocular artifacts from EEG signals in drowsy driving warning systems: A survey by Mohammedi, Mohamed, Omar, Mawloud, Bouabdallah, Abdelmadjid

    Published in Multimedia tools and applications (01-05-2023)
    “…In the last decade, drowsiness while driving has been identified as a major factor behind a large number of fatal traffic accidents around the world. This…”
    Get full text
    Journal Article
  20. 20

    An accountable privacy-preserving scheme for public information sharing systems by Imine, Youcef, Lounis, Ahmed, Bouabdallah, Abdelmadjid

    Published in Computers & security (01-06-2020)
    “…Due to the emergence of data externalization technologies, as cloud and fog computing, setting up public information-sharing applications has become much…”
    Get full text
    Journal Article