Publications

Export 235 results:
Filters: First Letter Of Title is S  [Clear All Filters]
Conference Paper
F. Ezzahra Naamane, Et-tolba, M., et Belkasmi, M., « A saddle-point based approach for semi-analytical performance evaluation of a digital communication system », in 2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016.
F. Ea Naamane, Et-tolba, Mb, et Belkasmi, Mc, « A saddle-point based approach for semi-Analytical performance evaluation of a digital communication system », in IEEE Wireless Communications and Networking Conference, WCNC, 2016, vol. 2016-September.
H. K. Fezeu, Djotio, T., et Thami, R. O. H., « Safe and irrefutable decentralized communication: Bringing non-repudiation to mesh networks », in ACM International Conference Proceeding Series, 2017, vol. Part F129474.
K. Echihabi, Zoumpatianos, K., et Palpanas, T., « Scalable Machine Learning on High-Dimensional Vectors: From Data Series to Deep Network Embeddings », in ACM International Conference Proceeding Series, 2020, vol. Part F162565, p. 1-6.
R. Faizi, « Screening job candidates via social media: Opportunities and pitfalls », in Proceedings of the 29th International Business Information Management Association Conference - Education Excellence and Innovation Management through Vision 2020: From Regional Development Sustainability to Global Economic Growth, 2017, p. 1760-1765.
A. Filali, Kobbane, A., Elmachkour, M., et Cherkaoui, S., « SDN Controller Assignment and Load Balancing with Minimum Quota of Processing Capacity », in IEEE International Conference on Communications, 2018, vol. 2018-May.
E. Illi, Qaraqe, M. K., F. Bouanani, E., et Al-Kuwari, S. M., « On the Secrecy Analysis of a RIS-aided Wireless Communication System Subject to Phase Quantization Errors », in 2022 International Balkan Conference on Communications and Networking, BalkanCom 2022, 2022, p. 152-156.
M. Bouabdellah, Bouanani, F. E., et Benazza, H., « Secrecy outage performance for dual-hop underlay cognitive radio system over nakagami-m fading », in ACM International Conference Proceeding Series, 2018, p. 70-75.
M. Bouabdellah, F. Bouanani, E., et Ben-Azza, H., « Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels », in Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018, 2018, p. 1-5.
E. Illi, Bouanani, F. E., Da Costa, D. B., Ayoub, F., et Dias, U. S., « On the Secrecy Performance of Mixed RF/UOW Communication System », in 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings, 2019.
M. Bouabdellah, F. Bouanani, E., et Ben-Azza, H., « A secure cooperative transmission model in VANET using attribute based encryption », in 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings, 2017.
Y. Bensitel et Romadi, R., « Secure data storage in the cloud with homomorphic encryption », in Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016, 2017, p. 1-6.
J. Elhachimi et Kobbane, A., « Secure Internet of Thing using Blockchain Technology », in 2022 7th International Conference on Smart and Sustainable Technologies, SpliTech 2022, 2022.
K. Mrabet, Bouanani, F. El, et Ben-Azza, H., « A secure multi-hops routing for VANETs », in 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, p. 6-10.
Ka Mrabet, Bouanani, F. Ea, et Ben-Azza, Hb, « A secure multi-hops routing for VANETs », in International Conference on Wireless Networks and Mobile Communications, WINCOM 2015, 2015.
Ta Chanyour, Saadane, Rb, et Belkasmi, Ma, « Secure sparse network coding for reliable routing in large scale DTMN », in Proceedings - 2015 3rd International Workshop on RFID and Adaptive Wireless Sensor Networks, RAWSN 2015 - In conjunction with the International Conference on NETworked sYStems, NETYS 2015, 2015, p. 57-62.
T. Chanyour, Saadane, R., et Belkasmi, M., « Secure Sparse Network Coding for Reliable Routing in Large Scale DTMN », in 2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN), 2015, p. 57-62.
H. Z. Naji et Zbakh, M., « A secure virtualization architecture based on a nested Nova hypervisor », in Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017, 2018, vol. 2018-January, p. 1-7.
A. E. Bekkali, Boulmalf, M., Essaaidi, M., et Mezzour, G., « Securing the Internet of Things (IoT) », in Proceedings - 2018 International Conference on Wireless Networks and Mobile Communications, WINCOM 2018, 2019.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Security analysis of low cost RFID systems », in WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems, 2014, p. 11-16.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security & cooperation mechanisms over mobile ad hoc networks: A survey and challenges », in Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017, 2018, vol. 2018-January, p. 1-6.
Ha L'Amrani, Idrissi, YbEl Bouzekr, et Ajhoun, Ra, « The security of web services: Secure communication and identity management », in CEUR Workshop Proceedings, 2015, vol. 1580, p. 56-60.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:539,817
    Education - This is a contributing Drupal Theme
    Design by WeebPal.