default search action
Wassim Znaidi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c7]Noureddine Lasla, Mohamed F. Younis, Wassim Znaidi, Dhafer Ben Arbia:
Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS. NTMS 2018: 1-5 - 2017
- [j7]Mohamed Ben Brahim, Zeeshan Hameed Mir, Wassim Znaidi, Fethi Filali, Noureddine Hamdi:
QoS-Aware Video Transmission Over Hybrid Wireless Network for Connected Vehicles. IEEE Access 5: 8313-8323 (2017) - [j6]Elyes Ben Hamida, Muhammad Awais Javed, Wassim Znaidi:
Adaptive security provisioning for vehicular safety applications. Int. J. Space Based Situated Comput. 7(1): 16-31 (2017) - [j5]Somwrita Sarkar, Sanjay Chawla, Shameem Ahmad, Jaideep Srivastava, Hossam M. Hammady, Fethi Filali, Wassim Znaidi, Javier Borge-Holthoefer:
Effective Urban Structure Inference from Traffic Flow Dynamics. IEEE Trans. Big Data 3(2): 181-193 (2017) - 2016
- [j4]Muhammad Awais Javed, Elyes Ben Hamida, Wassim Znaidi:
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice. Sensors 16(6): 879 (2016) - 2013
- [j3]Wassim Znaidi, Marine Minier, Stéphane Ubéda:
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j2]Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Katia Jaffrès-Runser, Cédric Lauradoux, Marine Minier:
Energy efficient authentication strategies for network coding. Concurr. Comput. Pract. Exp. 24(10): 1086-1107 (2012) - [j1]Wassim Znaidi, Marine Minier:
Key establishment and management for WSNs. Telecommun. Syst. 50(2): 113-125 (2012) - 2011
- [c6]Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier:
Flooding attacks against network coding and countermeasures. NSS 2011: 305-309 - 2010
- [c5]Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier:
Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. NSS 2010: 223-230
2000 – 2009
- 2009
- [c4]Wassim Znaidi, Marine Minier, Stéphane Ubéda:
Hierarchical node replication attacks detection in wireless sensors networks. PIMRC 2009: 82-86 - [c3]Wassim Znaidi, Marine Minier, Cédric Lauradoux:
Aggregated Authentication (AMAC) Using Universal Hash Functions. SecureComm 2009: 248-264 - 2008
- [c2]Wassim Znaidi, Marine Minier, Jean-Philippe Babau:
Detecting wormhole attacks in wireless networks using local neighborhood information. PIMRC 2008: 1-5 - 2007
- [c1]Laurent Mounier, Ludovic Samper, Wassim Znaidi:
Worst-case lifetime computation of a wireless sensor network by model-checking. PE-WASUN 2007: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint