Search Results - "Gharout, Saïd"
-
1
M2M Security: Challenges and Solutions
Published in IEEE Communications surveys and tutorials (01-01-2016)“…Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors, and which is…”
Get full text
Journal Article -
2
Adaptive Group Key Management Protocol for Wireless Communications
Published in Journal of Universal Computer Science (2012)“…Group-oriented services and wireless communication networks are among the emerging technologies of the last few years. Group key management, which is an…”
Get full text
Journal Article -
3
Trusted Execution Environments: A Look under the Hood
Published in 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (01-04-2014)“…Smartphones are now handling personal and extremely important data and applications. This increases mobile environment threats and makes smartphones one of…”
Get full text
Conference Proceeding -
4
Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices
Published in 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (01-04-2017)“…We devise a payment protocol that can be securely used on mobile devices, even infected by malicious applications. Our protocol only requires a light use of…”
Get full text
Conference Proceeding -
5
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing
Published 12-05-2015“…To ensure the privacy of users in transport systems, researchers are working on new protocols providing the best security guarantees while respecting…”
Get full text
Journal Article -
6
Trusted Platform Module as an Enabler for Security in Cloud Computing
Published in 2011 Conference on Network and Information Systems Security (01-05-2011)“…This paper studies the possibility of using TCG (Trusted Computing Group) specifications to establish trust in Cloud Computing, especially between the provider…”
Get full text
Conference Proceeding -
7
S-DV: A new approach to Secure Distance Vector routing protocols
Published in 2006 Securecomm and Workshops (01-08-2006)“…The distance vector (DV) routing protocols (e.g., RIP) have been widely used in the Internet. These protocols are vulnerable to a variety of attacks since they…”
Get full text
Conference Proceeding -
8
Using ant colonies to solve data-mining problems
Published in 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583) (2004)“…Data mining is a constantly growing area. More and more domains of the daily life take advantage of the available tools (medicine, trade, meteorology, ...)…”
Get full text
Conference Proceeding