Search Results - "Gharout, Saïd"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    M2M Security: Challenges and Solutions by Barki, Amira, Bouabdallah, Abdelmadjid, Gharout, Said, Traore, Jacques

    Published in IEEE Communications surveys and tutorials (01-01-2016)
    “…Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors, and which is…”
    Get full text
    Journal Article
  2. 2

    Adaptive Group Key Management Protocol for Wireless Communications by Gharout, Saïd, Bouabdallah, Abdelmadjid, Challal, Yacine, Achemlal, Mohamed

    “…Group-oriented services and wireless communication networks are among the emerging technologies of the last few years. Group key management, which is an…”
    Get full text
    Journal Article
  3. 3

    Trusted Execution Environments: A Look under the Hood by Arfaoui, Ghada, Gharout, Said, Traore, Jacques

    “…Smartphones are now handling personal and extremely important data and applications. This increases mobile environment threats and makes smartphones one of…”
    Get full text
    Conference Proceeding
  4. 4

    Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices by Cortier, Veronique, Filipiak, Alicia, Florent, Jan, Gharout, Said, Traore, Jacques

    “…We devise a payment protocol that can be securely used on mobile devices, even infected by malicious applications. Our protocol only requires a light use of…”
    Get full text
    Conference Proceeding
  5. 5

    A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing by Arfaoui, Ghada, Lalande, Jean-François, Traoré, Jacques, Desmoulins, Nicolas, Berthomé, Pascal, Gharout, Saïd

    Published 12-05-2015
    “…To ensure the privacy of users in transport systems, researchers are working on new protocols providing the best security guarantees while respecting…”
    Get full text
    Journal Article
  6. 6

    Trusted Platform Module as an Enabler for Security in Cloud Computing by Achemlal, M., Gharout, S., Gaber, C.

    “…This paper studies the possibility of using TCG (Trusted Computing Group) specifications to establish trust in Cloud Computing, especially between the provider…”
    Get full text
    Conference Proceeding
  7. 7

    S-DV: A new approach to Secure Distance Vector routing protocols by Babakhouya, A., Challal, Y., Bouabdallah, A., Gharout, S.

    Published in 2006 Securecomm and Workshops (01-08-2006)
    “…The distance vector (DV) routing protocols (e.g., RIP) have been widely used in the Internet. These protocols are vulnerable to a variety of attacks since they…”
    Get full text
    Conference Proceeding
  8. 8

    Using ant colonies to solve data-mining problems by Admane, L., Benatchba, K., Koudil, M., Drias, M., Gharout, S., Hamani, N.

    “…Data mining is a constantly growing area. More and more domains of the daily life take advantage of the available tools (medicine, trade, meteorology, ...)…”
    Get full text
    Conference Proceeding