default search action
Yacine Challal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine, Yacine Challal, Yacine Ghamri-Doudane:
AntibotV: A Multilevel Behaviour-based Framework for Botnets Detection in Vehicular Networks. CoRR abs/2407.03506 (2024) - 2023
- [j49]Yacine Hakimi, Riyadh Baghdadi, Yacine Challal:
A Hybrid Machine Learning Model for Code Optimization. Int. J. Parallel Program. 51(6): 309-331 (2023) - [j48]Redouane Niboucha, Sabra Ben Saad, Adlen Ksentini, Yacine Challal:
Zero-Touch Security Management for mMTC Network Slices: DDoS Attack Detection and Mitigation. IEEE Internet Things J. 10(9, May 1): 7800-7812 (2023) - [j47]Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal, Lina Ben-Abdelatif, Maroua Ouaked:
Implementing a secure remote patient monitoring system. Inf. Secur. J. A Glob. Perspect. 32(1): 21-38 (2023) - [j46]Amine Boulemtafes, Abdelouahid Derhab, Yacine Challal:
PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side. J. Inf. Secur. Appl. 77: 103552 (2023) - [j45]Amine Boulemtafes, Abdelouahid Derhab, Nassim Ait Ali Braham, Yacine Challal:
Privacy-preserving remote deep-learning-based inference under constrained client-side environment. J. Ambient Intell. Humaniz. Comput. 14(1): 553-566 (2023) - [c83]Khenfouci Yamina, Challal Yacine:
SuperChain: Decentralized and Trustful Supervised Learning over Blockchain. BCCA 2023: 627-634 - [c82]Sarra Khaber, Ryma Boussaha, Yacine Challal:
Service Orchestration in Autonomous Vehicle Networks: Leveraging Vehicular Fog and Edge Computing. SoftCOM 2023: 1-6 - 2022
- [j44]Karim Boutiba, Adlen Ksentini, Bouziane Brik, Yacine Challal, Amar Balla:
NRflex: Enforcing network slicing in 5G New Radio. Comput. Commun. 181: 284-292 (2022) - [j43]Mohamed Ali Kandi, Djamel Eddine Kouicem, Messaoud Doudou, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Comput. Commun. 191: 11-25 (2022) - [j42]Arbia Riahi, Enrico Natalizio, Sahbi Mazlout, Yacine Challal, Zied Chtourou:
Privacy preservation using game theory in e-health application. J. Inf. Secur. Appl. 66: 103158 (2022) - [j41]Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine, Yacine Challal, Yacine Ghamri-Doudane:
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks. J. Netw. Syst. Manag. 30(1): 15 (2022) - [c81]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:
Security Analysis and Evaluation of Optimized Authentication in Named Data Networking. CSA 2022: 287-297 - [c80]Omar Tahmi, Chamseddine Talhi, Yacine Challal:
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic. FPS 2022: 423-440 - [c79]Youcef Imine, Antoine Gallais, Yacine Challal:
An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing Architecture. SoftCOM 2022: 1-6 - 2021
- [j40]Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal:
Certificateless Public Key Systems Aggregation: An enabling technique for 5G multi-domain security management and delegation. Comput. Networks 199: 108443 (2021) - [c78]Amine Boulemtafes, Abdelouahid Derhab, Nassim Ait Ali Braham, Yacine Challal:
PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring. AICCSA 2021: 1-8 - 2020
- [j39]Safia Bourahla, Maryline Laurent, Yacine Challal:
Privacy preservation for social networks sequential publishing. Comput. Networks 170: 107106 (2020) - [j38]Amine Boulemtafes, Abdelouahid Derhab, Yacine Challal:
A review of privacy-preserving techniques for deep learning. Neurocomputing 384: 21-45 (2020) - [j37]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah, Malika Bessedik:
Optimized in-network authentication against pollution attacks in software-defined-named data networking. J. Inf. Secur. Appl. 50 (2020) - [j36]Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things. J. Netw. Comput. Appl. 150 (2020) - [c77]Samir Si-Mohammed, Adlen Ksentini, Maha Bouaziz, Yacine Challal, Amar Balla:
UAV mission optimization in 5G: On reducing MEC service relocation. GLOBECOM 2020: 1-6 - [c76]Mohamed Ali Kandi, Djamel Eddine Kouicem, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things. TrustCom 2020: 1868-1873
2010 – 2019
- 2019
- [j35]Qing Yang, Rongxing Lu, Chunming Rong, Yacine Challal, Maryline Laurent, Shengling Wang:
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions. IEEE Internet Things J. 6(3): 4556-4560 (2019) - [j34]Arbia Riahi, Yacine Challal, Pascal Moyal, Enrico Natalizio:
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation. IEEE Trans. Intell. Transp. Syst. 20(12): 4405-4414 (2019) - [c75]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:
Single-Path Network Coding Authentication for Software-Defined Named Data Networking. AICCSA 2019: 1-8 - [c74]Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things. GLOBECOM 2019: 1-6 - [c73]Abdelghani Krinah, Yacine Challal, Mawloud Omar, Omar Nouali:
Using ABE for Medical Data Protection in Fog Computing. ICEIS (2) 2019: 155-161 - [c72]Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal:
A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications. ICETE (2) 2019: 84-95 - [c71]Mohamed Mohammedi, Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Cryptanalysis and Improvement of Identity-Based Multisignature Scheme. ICFNDS 2019: 19:1-19:5 - [c70]Abada Abderrahmane, Guettaf Adnane, Challal Yacine, Garri Khireddine:
Android Malware Detection Based on System Calls Analysis and CNN Classification. WCNC Workshops 2019: 1-6 - [c69]Mourad Benmalek, Yacine Challal, Abdelouahid Derhab:
An Improved Key Graph based Key Management Scheme for Smart Grid AMI systems. WCNC 2019: 1-6 - [c68]Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
An Efficient Multi-Group Key Management Protocol for Heterogeneous IoT Devices. WCNC 2019: 1-6 - [c67]Mourad Benmalek, Yacine Challal, Abdelouahid Derhab:
Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges. WETICE 2019: 208-213 - 2018
- [j33]Mourad Benmalek, Yacine Challal, Abdelouahid Derhab, Abdelmadjid Bouabdallah:
VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems. Comput. Networks 132: 161-179 (2018) - [j32]Arbia Riahi, Enrico Natalizio, Yacine Challal, Zied Chtourou:
A roadmap for security challenges in the Internet of Things. Digit. Commun. Networks 4(2): 118-137 (2018) - [j31]Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal:
Security in device-to-device communications: a survey. IET Networks 7(1): 14-22 (2018) - [c66]Bourahla Safia, Challal Yacine:
Privacy Preservation in Social Networks Sequential Publishing. AINA 2018: 732-739 - [c65]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah, Djelloul Ighit, Lyes Tairi:
Peer-to-Peer Collaborative Video-on-Demand Streaming over Mobile Content Centric Networking. AINA 2018: 1053-1059 - [c64]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:
Authenticated Network Coding for Software-Defined Named Data Networking. AINA 2018: 1115-1122 - [c63]Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
An Efficient Multi-Group Key Management Protocol for Internet of Things. SoftCOM 2018: 1-6 - [c62]Zakaria Gheid, Yacine Challal, Lin Chen:
Private and efficient set intersection protocol for RFID-based food adequacy check. WCNC 2018: 1-6 - [c61]Yacine Challal, Fatima-Zohra Benhamida, Omar Nouali:
Scalable Key Management for Elastic Security Domains in Fog Networks. WETICE 2018: 187-192 - 2017
- [j30]Ada Gogu, Dritan Nace, Enrico Natalizio, Yacine Challal:
Using dynamic programming to solve the Wireless Sensor Network Configuration Problem. J. Netw. Comput. Appl. 83: 140-154 (2017) - [j29]Zakaria Gheid, Yacine Challal, Xun Yi, Abdelouahid Derhab:
Efficient and privacy-aware multi-party classification protocol for human activity recognition. J. Netw. Comput. Appl. 98: 84-96 (2017) - [j28]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal, Frédéric Marin:
A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications. Pervasive Mob. Comput. 37: 23-44 (2017) - [j27]Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent:
Security and Privacy in Emerging Wireless Networks. Secur. Commun. Networks 2017: 5618742:1-5618742:2 (2017) - [c60]Safia Bourahla, Yacine Challal:
Social Networks Privacy Preserving Data Publishing. CIS 2017: 258-262 - [c59]Zakaria Gheid, Yacine Challal:
Private and Efficient Set Intersection Protocol for Big Data Analytics. ICA3PP 2017: 149-164 - [c58]Arbia Riahi, Enrico Natalizio, Yacine Challal, Zied Chtourou:
A Markov game privacy preserving model in retail applications. MoWNet 2017: 1-8 - [c57]Ryma Boussaha, Yacine Challal, Malika Bessedik, Abdelmadjid Bouabdallah:
Towards authenticated network coding for named data networking. SoftCOM 2017: 1-6 - [c56]Lyes Touati, Yacine Challal:
Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group Communications. TrustCom/BigDataSE/ICESS 2017: 309-314 - 2016
- [j26]Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Future Gener. Comput. Syst. 55: 266-277 (2016) - [c55]Lyes Touati, Yacine Challal:
Collaborative KP-ABE for cloud-based Internet of Things applications. ICC 2016: 1-7 - [c54]Lyes Touati, Yacine Challal:
Instantaneous Proxy-Based Key Update for CP-ABE. LCN 2016: 591-594 - [c53]Lyes Touati, Hamed Hellaoui, Yacine Challal:
Threshold Yoking/Grouping Proofs Based on CP-ABE for IoT Applications. Trustcom/BigDataSE/ISPA 2016: 568-575 - [c52]Zakaria Gheid, Yacine Challal:
Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining. Trustcom/BigDataSE/ISPA 2016: 791-798 - [c51]Zakaria Gheid, Yacine Challal:
Novel Efficient and Privacy-Preserving Protocols for Sensor-Based Human Activity Recognition. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 301-308 - [c50]Mourad Benmalek, Yacine Challal:
MK-AMI: Efficient multi-group key management scheme for secure communications in AMI systems. WCNC 2016: 1-6 - [e1]Qing Yang, Wei Yu, Yacine Challal:
Wireless Algorithms, Systems, and Applications - 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings. Lecture Notes in Computer Science 9798, Springer 2016, ISBN 978-3-319-42835-2 [contents] - 2015
- [j25]Yacine Challal, Enrico Natalizio, Sevil Sen, Anna Maria Vegni:
Internet of Things security and privacy: Design methods and optimization. Ad Hoc Networks 32: 1-2 (2015) - [j24]Abdelmalik Bachir, Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(7): 1923-1936 (2015) - [c49]Mourad Benmalek, Yacine Challal, Abdelmadjid Bouabdallah:
Scalable Multi-group Key Management for Advanced Metering Infrastructure. CIT/IUCC/DASC/PICom 2015: 183-190 - [c48]Lyes Touati, Yacine Challal:
Efficient CP-ABE Attribute/Key Management for IoT Applications. CIT/IUCC/DASC/PICom 2015: 343-350 - [c47]Rachid Selt, Yacine Challal, Nadjia Benblidia:
Internet of things context-aware privacy architecture. AICCSA 2015: 1-2 - [c46]Walid Bechkit, Yacine Challal, Abdelmalik Bachir, Abdelmadjid Bouabdallah:
Temperature MAC plug-in for large scale WSN. ICC 2015: 6389-6394 - [c45]Lyes Touati, Yacine Challal:
Batch-based CP-ABE with attribute revocation mechanism for the Internet of Things. ICNC 2015: 1044-1049 - [c44]Lyes Touati, Yacine Challal:
Poster: Activity-Based Access Control for IoT. SmartObjects@MobiCom 2015: 29-30 - [c43]Mourad Benmalek, Yacine Challal:
eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid. TrustCom/BigDataSE/ISPA (1) 2015: 782-789 - [c42]Zakaria Gheid, Yacine Challal:
An Efficient and Privacy-Preserving Similarity Evaluation for Big Data Analytics. UCC 2015: 281-289 - 2014
- [j23]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal:
Energy efficiency in wireless sensor networks: A top-down survey. Comput. Networks 67: 104-122 (2014) - [j22]Miloud Bagaa, Yacine Challal, Adlen Ksentini, Abdelouahid Derhab, Nadjib Badache:
Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges. IEEE Commun. Surv. Tutorials 16(3): 1339-1368 (2014) - [j21]Fatima-Zohra Benhamida, Yacine Challal, Mouloud Koudil:
Adaptive failure detection in low power lossy wireless sensor networks. J. Netw. Comput. Appl. 45: 168-180 (2014) - [c41]Noureddine Lasla, Abdelouahid Derhab, Abdelraouf Ouadjaout, Miloud Bagaa, Yacine Challal:
SMART: Secure Multi-pAths Routing for wireless sensor neTworks. ADHOC-NOW 2014: 332-345 - [c40]Arbia Riahi, Enrico Natalizio, Yacine Challal, Nathalie Mitton, Antonio Iera:
A systemic and cognitive approach for IoT security. ICNC 2014: 183-188 - [c39]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal, Frédéric Marin:
Context-aware energy-efficient wireless sensor architecture for body activity recognition. PerCom Workshops 2014: 203-206 - [c38]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal, Frédéric Marin:
Energy-efficient architecture for wearable sensor networks. Wireless Days 2014: 1-8 - 2013
- [j20]Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
A new class of Hash-Chain based key pre-distribution schemes for WSN. Comput. Commun. 36(3): 243-255 (2013) - [j19]Abdelmalik Bachir, Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
Temperature-Aware Density Optimization for Low Power Wireless Sensor Networks. IEEE Commun. Lett. 17(2): 325-328 (2013) - [j18]Jose Alfredo Guerrero, Pedro Castillo Garcia, Yacine Challal:
Quadrotors Formation Control - A Wireless Medium Access Aware Approach. J. Intell. Robotic Syst. 70(1-4): 221-231 (2013) - [j17]Abdelkrim Hadjidj, Marion Souil, Abdelmadjid Bouabdallah, Yacine Challal, Henry L. Owen:
Wireless sensor networks for rehabilitation applications: Challenges and opportunities. J. Netw. Comput. Appl. 36(1): 1-15 (2013) - [j16]Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, Vahid Tarokh:
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(2): 948-959 (2013) - [c37]Mohamed Amine Kafi, Yacine Challal, Djamel Djenouri, Messaoud Doudou, Abdelmadjid Bouabdallah, Nadjib Badache:
A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures. ANT/SEIT 2013: 617-626 - [c36]Ada Gogu, Dritan Nace, Yacine Challal:
A Framework for Solving the Configuration Problem in Wireless Sensor Networks. BWCCA 2013: 54-60 - [c35]Azeddine Attir, Yacine Challal, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah:
Braided Disjoint Branch Routing Protocol for WSNs. BWCCA 2013: 106-113 - [c34]Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management. BWCCA 2013: 248-252 - [c33]Arbia Riahi, Yacine Challal, Enrico Natalizio, Zied Chtourou, Abdelmadjid Bouabdallah:
A Systemic Approach for IoT Security. DCOSS 2013: 351-355 - [c32]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal:
WSN lifetime optimization through controlled sink mobility and packet buffering. GIIS 2013: 1-6 - [c31]Fatima-Zohra Benhamida, Yacine Challal, Mouloud Koudil:
ALLONE: A new adaptive failure detector model for Low-power Lossy Networks. GLOBECOM 2013: 91-96 - [c30]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal:
Multi-hop wireless charging optimization in low-power networks. GLOBECOM 2013: 462-467 - 2012
- [b2]Yacine Challal:
Sécurité de l'Internet des Objets : vers une approche cognitive et systémique. (Internet of Things Security: towards cognitive and systemic approach). University of Technology of Compiègne, France, 2012 - [j15]H. Ragab Hassen, Hatem Bettahar, Abdelmadjid Bouabdallah, Yacine Challal:
An efficient key management scheme for content access control for linear hierarchies. Comput. Networks 56(8): 2107-2118 (2012) - [j14]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. J. Netw. Comput. Appl. 35(1): 268-286 (2012) - [j13]Miloud Bagaa, Yacine Challal, Abdelraouf Ouadjaout, Noureddine Lasla, Nadjib Badache:
Efficient data aggregation with in-network integrity control for WSN. J. Parallel Distributed Comput. 72(10): 1157-1170 (2012) - [j12]Said Gharout, Abdelmadjid Bouabdallah, Yacine Challal, Mohammed Achemlal:
Adaptive Group Key Management Protocol for Wireless Communications. J. Univers. Comput. Sci. 18(6): 874-898 (2012) - [c29]Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
A New Scalable Key Pre-Distribution Scheme for WSN. ICCCN 2012: 1-7 - [c28]Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks. ICCCN 2012: 1-7 - [c27]Walid Bechkit, Mouloud Koudil, Yacine Challal, Abdelmadjid Bouabdallah, Brahim Souici, Karima Benatchba:
A new weighted shortest path tree for convergecast traffic routing in WSN. ISCC 2012: 187-192 - [c26]Mohamed Amine Kafi, Yacine Challal, Djamel Djenouri, Abdelmadjid Bouabdallah, Lyes Khelladi, Nadjib Badache:
A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring. ANT/MobiWIS 2012: 543-552 - 2011
- [j11]Yacine Challal, Abdelraouf Ouadjaout, Noureddine Lasla, Miloud Bagaa, Abdelkrim Hadjidj:
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks. J. Netw. Comput. Appl. 34(4): 1380-1397 (2011) - [c25]Abdelkrim Hadjidj, Yacine Challal, Abdelmadjid Bouabdallah:
Toward a high-fidelity wireless sensor network for rehabilitation supervision. LCN 2011: 458-465 - [c24]Ada Gogu, Dritan Nace, Yacine Challal:
Energy-Aware Network Configuration for Wireless Sensor Networks. NBiS 2011: 22-29 - [c23]Fatima-Zohra Benhamida, Yacine Challal, Mouloud Koudil:
Efficient adaptive failure detection for Query/Response based wireless sensor networks. Wireless Days 2011: 1-6 - [c22]Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Rehabilitation supervision using wireless sensor networks. WOWMOM 2011: 1-3 - 2010
- [j10]Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal:
A new worm propagation threat in BitTorrent: modeling and analysis. Telecommun. Syst. 45(2-3): 95-109 (2010) - [c21]Fatima-Zohra Benhamida, Yacine Challal:
FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks. ARES 2010: 112-118 - [c20]Walid Bechkit, Abdelmadjid Bouabdallah, Yacine Challal:
Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining. CCS 2010: 642-644 - [c19]Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabdallah:
BiTIT: Throttling BitTorrent illegal traffic. ISCC 2010: 708-713 - [c18]Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, Ahlem Bencheikh:
An efficient and highly resilient key management scheme for wireless sensor networks. LCN 2010: 216-219 - [c17]Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
HDMRP: An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks. QSHINE 2010: 469-482 - [c16]Said Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal:
Key management with host mobility in dynamic groups. SIN 2010: 186-194
2000 – 2009
- 2009
- [j9]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Reliable and fully distributed trust model for mobile ad hoc networks. Comput. Secur. 28(3-4): 199-214 (2009) - [c15]Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabdallah:
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment. PDP 2009: 293-300 - 2008
- [j8]Lyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache:
On security issues in embedded systems: challenges and solutions. Int. J. Inf. Comput. Secur. 2(2): 140-174 (2008) - [j7]Said Gharout, Yacine Challal, Abdelmadjid Bouabdallah:
Scalable Delay-constrained Multicast Group Key Management. Int. J. Netw. Secur. 7(2): 160-174 (2008) - [j6]Yacine Challal, Said Gharout, Abdelmadjid Bouabdallah, Hatem Bettahar:
Adaptive clustering for scalable key management in dynamic group communications. Int. J. Secur. Networks 3(2): 133-146 (2008) - [c14]Abdelraouf Ouadjaout, Yacine Challal, Noureddine Lasla, Miloud Bagaa:
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks. ARES 2008: 503-508 - [c13]Boushra Maala, Yacine Challal, Abdelmadjid Bouabdallah:
HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks. WSAN 2008: 125-136 - [c12]Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal:
A new worm propagation threat in BitTorrent: Modeling and analysis. IMCSIT 2008: 791-798 - 2007
- [j5]H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
Key management for content access control in a hierarchy. Comput. Networks 51(11): 3197-3219 (2007) - [c11]Miloud Bagaa, Noureddine Lasla, Abdelraouf Ouadjaout, Yacine Challal:
SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks. LCN 2007: 1053-1060 - [c10]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography. SecureComm 2007: 2-10 - 2006
- [c9]Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah:
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. ISCC 2006: 662-667 - [c8]Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah:
AAA based security architecture for multicast content distribution. ISCN 2006: 85-90 - [c7]Abdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah, Said Gharout:
S-DV: A new approach to Secure Distance Vector routing protocols. SecureComm 2006: 1-10 - 2005
- [b1]Yacine Challal:
Group Communication Security. (Sécurité dans les communications de groupe). University of Technology of Compiègne, France, 2005 - [j4]Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard:
RLH: receiver driven layered hash-chaining for multicast data origin authentication. Comput. Commun. 28(7): 726-740 (2005) - [j3]Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar:
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. Comput. Secur. 24(1): 57-68 (2005) - [c6]H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
An Efficient Key Management Algorithm for Hierarchical Group Communication. SecureComm 2005: 270-276 - 2004
- [j2]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
SAKM: a scalable and adaptive key management approach for multicast communications. Comput. Commun. Rev. 34(2): 55-70 (2004) - [j1]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Commun. Surv. Tutorials 6(1-4): 34-57 (2004) - [c5]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. HSNMC 2004: 1056-1067 - [c4]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A2cast: an adaptive source authentication protocol for multicast streams. ISCC 2004: 363-368 - [c3]Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard:
Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme. LCN 2004: 411-412 - [c2]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A Scalable and Adaptive Key Management Protocol for Group Communication. WWIC 2004: 260-271 - 2002
- [c1]Hatem Bettahar, Abdelmadjid Bouabdallah, Yacine Challal:
AKMP: an adaptive key management protocol for secure multicast. ICCCN 2002: 190-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint