default search action
Sarra Cherbal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Oussama Nahnah, Sarra Cherbal:
SLAK: secure lightweight scheme for authentication and key-agreement in internet of things. Int. J. Inf. Comput. Secur. 23(2): 200-226 (2024) - [j10]Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Al-Sakib Khan Pathan:
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain. Peer Peer Netw. Appl. 17(1): 68-88 (2024) - [j9]Sarra Cherbal, Abdelhak Zier, Sara Hebal, Lemia Louail, Boubakeur Annane:
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. J. Supercomput. 80(3): 3738-3816 (2024) - [j8]Sarra Cherbal:
3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things. Wirel. Pers. Commun. 135(2): 727-762 (2024) - [c7]Ines Adjeroud, Sarra Cherbal, Chahrazed Benrebbouh, Hamza Baaraoui:
Authentication scheme based on blockchain and Proof-of-Work for IoT. PAIS 2024: 1-8 - [c6]Sarra Cherbal:
Blockchain-Enabled Authentication and Key Exchange for Enhancing User Privacy and Data Confidentiality in Smart Homes. PAIS 2024: 1-7 - 2023
- [j7]Sarra Cherbal, Rania Benchetioui:
ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement. Comput. Electr. Eng. 109(Part B): 108759 (2023) - [j6]Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Al-Sakib Khan Pathan:
A lightweight security scheme to defend against quantum attack in IoT-based energy internet. Int. J. Sens. Networks 43(1): 13-26 (2023) - [c5]Chahrazed Benrebbouh, Lemia Louail, Sarra Cherbal:
Distributed TDMA for IoT Using a Dynamic Slot Assignment. ACR 2023: 469-480 - [c4]Sarra Cherbal:
Secure Key Exchange Scheme and Blockchain-oriented Data Protection in the Internet of Vehicles. ICSPIS 2023: 45-50 - [c3]Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Lemia Louail:
Enhancing Security and Authentication in IoT-based Energy Internet using Post-Quantum Blockchain. PAIS 2023: 1-8 - [c2]Rahma Berchi, Lemia Louail, Sarra Cherbal:
Security Issues in Cloud-based IoT Systems. PAIS 2023: 1-8 - [c1]Kharoubi Kamir, Sarra Cherbal:
Machine learning solutions for securing IoT-based healthcare: A Review. PAIS 2023: 1-8 - 2021
- [j5]Sarra Cherbal:
Load balancing mechanism using Mobile agents. Informatica (Slovenia) 45(2) (2021) - [j4]Sarra Cherbal, Imen Barouchi:
ZRR-P2P: Zone-Based Mechanism for Data Replication and Research Optimization in Unstructured P2P Systems. Ingénierie des Systèmes d Inf. 26(1): 23-32 (2021)
2010 – 2019
- 2017
- [j3]Sarra Cherbal, Abdellah Boukerram, Abdelhak Boubetra:
RepMChord: A novel replication approach for mobile Chord with reduced traffic overhead. Int. J. Commun. Syst. 30(14) (2017) - [j2]Sarra Cherbal, Abdellah Boukerram, Abdelhak Boubetra:
Locality-Awareness and Replication for an Adaptive CHORD to MANet. Int. J. Distributed Syst. Technol. 8(3): 1-24 (2017) - 2016
- [j1]Sarra Cherbal, Abdallah Boukerram, Abdelhak Boubetra:
A survey of DHT solutions in fixed and mobile networks. Int. J. Commun. Networks Distributed Syst. 17(1): 14-42 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint