Publications

Export 2330 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
M. Bouabdellah, Bouanani, F. E., et Benazza, H., « Secrecy outage performance for dual-hop underlay cognitive radio system over nakagami-m fading », in ACM International Conference Proceeding Series, 2018, p. 70-75.
M. Bouabdellah, F. Bouanani, E., et Ben-Azza, H., « Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels », in Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018, 2018, p. 1-5.
E. Illi, Bouanani, F. E., Da Costa, D. B., Ayoub, F., et Dias, U. S., « On the Secrecy Performance of Mixed RF/UOW Communication System », in 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings, 2019.
E. S. Haddouti et Kettani, M. D. E. - C. El, « A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments », International Journal of Advanced Computer Science and Applications, vol. 13, p. 575-584, 2022.
M. Bouabdellah, F. Bouanani, E., et Ben-Azza, H., « A secure cooperative transmission model in VANET using attribute based encryption », in 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings, 2017.
Ya Bensitel et Romadi, Rb, « Secure data in cloud computing using homomorphic encryption », Journal of Theoretical and Applied Information Technology, vol. 82, p. 206-211, 2015.
A. Sebbar, Zkik, K., Baddi, Y., Boulmalf, M., et Kettani, M. D. Ech- Cherif, « Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks », Studies in Computational Intelligence, vol. 919, p. 355-371, 2021.
Y. Bensitel et Romadi, R., « Secure data storage in the cloud with homomorphic encryption », in Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016, 2017, p. 1-6.
J. Elhachimi et Kobbane, A., « Secure Internet of Thing using Blockchain Technology », in 2022 7th International Conference on Smart and Sustainable Technologies, SpliTech 2022, 2022.
K. Mrabet, Bouanani, F. El, et Ben-Azza, H., « A secure multi-hops routing for VANETs », in 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, p. 6-10.
Ka Mrabet, Bouanani, F. Ea, et Ben-Azza, Hb, « A secure multi-hops routing for VANETs », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
Ta Chanyour, Saadane, Rb, et Belkasmi, Ma, « Secure sparse network coding for reliable routing in large scale DTMN », in Proceedings - 2015 3rd International Workshop on RFID and Adaptive Wireless Sensor Networks, RAWSN 2015 - In conjunction with the International Conference on NETworked sYStems, NETYS 2015, 2015, p. 57-62.
T. Chanyour, Saadane, R., et Belkasmi, M., « Secure Sparse Network Coding for Reliable Routing in Large Scale DTMN », in 2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN), 2015, p. 57-62.
H. Z. Naji et Zbakh, M., « A secure virtualization architecture based on a nested Nova hypervisor », in Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017, 2018, vol. 2018-January, p. 1-7.
A. E. Bekkali, Boulmalf, M., Essaaidi, M., et Mezzour, G., « Securing the Internet of Things (IoT) », in Proceedings - 2018 International Conference on Wireless Networks and Mobile Communications, WINCOM 2018, 2019.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Security analysis of low cost RFID systems », in WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems, 2014, p. 11-16.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security & cooperation mechanisms over mobile ad hoc networks: A survey and challenges », in Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017, 2018, vol. 2018-January, p. 1-6.
N. Mouchfiq, Benjbara, C., et Habbani, A., « Security in MANETs: The Blockchain Issue », Communications in Computer and Information Science, vol. 1264, p. 219-232, 2020.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., Security in the internet of things. 2018, p. 105-121.
N. Mouchfiq, Habbani, A., et Benjbara, C., « Security issues in manets: A survey », Advances in Intelligent Systems and Computing, vol. 1184, p. 288-295, 2021.
Ha L'Amrani, Idrissi, YbEl Bouzekr, et Ajhoun, Ra, « The security of web services: Secure communication and identity management », in CEUR Workshop Proceedings, 2015, vol. 1580, p. 56-60.
M. Alouane et H. Bakkali, E., « Security, privacy and trust in cloud computing: A comparative study », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
M. Alouane et Bakkali, H. El, « Security, Privacy and Trust in Cloud Computing: A Comparative Study », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 23-30.
Ha Amraoui, Habbani, Aab, Hajami, Ac, et Bilal, Ed, « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », Mobile Information Systems, vol. 2016, 2016.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », MOBILE INFORMATION SYSTEMS, 2016.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:631,441
    Education - This is a contributing Drupal Theme
    Design by WeebPal.