default search action
Djamel Tandjaoui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]Hadjer Benhadj Djilali, Djamel Tandjaoui, Hamza Khemissa:
Enhanced dynamic team access control for collaborative Internet of Things using context. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j9]Faiza Medjek, Djamel Tandjaoui, Nabil Djedjig, Imed Romdhani:
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. Int. J. Crit. Infrastructure Prot. 34: 100436 (2021) - [j8]Faiza Medjek, Djamel Tandjaoui, Nabil Djedjig, Imed Romdhani:
Multicast DIS attack mitigation in RPL-based IoT-LLNs. J. Inf. Secur. Appl. 61: 102939 (2021) - 2020
- [j7]Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek, Imed Romdhani:
Trust-aware and cooperative routing protocol for IoT security. J. Inf. Secur. Appl. 52: 102467 (2020)
2010 – 2019
- 2019
- [j6]Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane:
An efficient authentication and key agreement scheme for e-health applications in the context of internet of things. Int. J. Inf. Comput. Secur. 11(4/5): 355-390 (2019) - [c16]Hadjer Benhadj Djilali, Djamel Tandjaoui:
Efficient Distributed Authentication and Access Control System Management for Internet of Things Using Blockchain. MSPN 2019: 51-60 - 2018
- [j5]Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani:
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. Int. J. Sens. Networks 26(4): 227-242 (2018) - [c15]Hadjer Benhadj Djilali, Djamel Tandjaoui:
Dynamic Team Access Control for Collaborative Internet of Things. MSPN 2018: 70-85 - 2017
- [c14]Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig:
A Trust-Based Intrusion Detection System for Mobile RPL Based Networks. iThings/GreenCom/CPSCom/SmartData 2017: 735-742 - [c13]Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane:
An Ultra-Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things. MSPN 2017: 49-62 - [c12]Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig:
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. TrustCom/BigDataSE/ICESS 2017: 1049-1055 - 2016
- [c11]Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani:
A New Distributed MIKEY Mode to Secure e-Health Applications. IoTBD 2016: 88-95 - [c10]Hamza Khemissa, Djamel Tandjaoui:
A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. WTS 2016: 1-6 - 2015
- [j4]Mohammed Riyadh Abdmeziem, Djamel Tandjaoui:
An end-to-end secure key management protocol for e-health applications. Comput. Electr. Eng. 44: 184-197 (2015) - [c9]Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani:
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). CIT/IUCC/DASC/PICom 2015: 1109-1117 - [c8]Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek:
Trust-based RPL for the Internet of Things. ISCC 2015: 962-967 - [c7]Hamza Khemissa, Djamel Tandjaoui:
A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things. NGMAST 2015: 90-95 - 2014
- [c6]Mohammed Riyadh Abdmeziem, Djamel Tandjaoui:
A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things. ADHOC-NOW Workshops 2014: 35-46 - [i1]Riad Abdmeziem, Djamel Tandjaoui:
Internet of Things: Concept, Building blocks, Applications and Challenges. CoRR abs/1401.6877 (2014)
2000 – 2009
- 2009
- [j3]Djamel Tandjaoui, Messaoud Doudou, Imed Romdhani:
FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks. Int. J. Grid High Perform. Comput. 1(4): 40-56 (2009) - [c5]S. Aoufi, Djamel Tandjaoui:
QoS Aware Multiple Spanning Tree Mechanism in Multi-radio Multi-channel Wireless Mesh Network. ISPAN 2009: 296-302 - 2005
- [j2]Djamel Tandjaoui, Nadjib Badache:
Performance enhancement of smooth handoff in mobile IP by reducing packets disorder. Int. J. Internet Protoc. Technol. 1(2): 117-124 (2005) - 2004
- [c4]Djamel Tandjaoui, Nadjib Badache, Abdelmadjid Bouabdallah:
Performance Analysis of Binding Update in Mobile IP during Handoff. HSNMC 2004: 503-511 - [c3]Djamel Tandjaoui, Nadjib Badache:
Performance evaluation of micromobility environments for various TCP protocols. LANMAN 2004: 157-162 - 2003
- [j1]Hamida Seba, Abdelmadjid Bouabdallah, Nadjib Badache, Hatem Bettahar, Djamel Tandjaoui:
Gestion de clés et sécurité multipoint: étude et perspectives. Ann. des Télécommunications 58(7-8): 1090-1129 (2003) - [c2]Djamel Tandjaoui, Nadjib Badache, Hatem Bettahar, Abdelmadjid Bouabdallah, Hamida Seba:
Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder. ISCC 2003: 149-154 - 2002
- [c1]Nadjib Badache, Djamel Tandjaoui:
A seamless handoff protocol for hierarchical Mobile IPv4. MWCN 2002: 651-655
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint