An improved approach for lsb-based image steganography using AES algorithm SL Chikouche, N Chikouche 2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE …, 2017 | 52 | 2017 |
A novel image encryption algorithm based on hybrid chaotic maps using a key image S Benaissi, N Chikouche, R Hamza Optik 272, 170316, 2023 | 41 | 2023 |
A privacy-preserving code-based authentication protocol for Internet of Things N Chikouche, PL Cayrel, EHM Mboup, BO Boidje The Journal of Supercomputing 75 (12), 8231-8261, 2019 | 37 | 2019 |
Authentication schemes for healthcare applications using wireless medical sensor networks: A survey AN Bahache, N Chikouche, F Mezrag SN Computer Science 3 (5), 382, 2022 | 34 | 2022 |
Improved RFID authentication protocol based on randomized McEliece cryptosystem N Chikouche, F Cherif, PL Cayrel, M Benmohammed | 17 | 2015 |
Privacy preservation in healthcare systems BR Louassef, N Chikouche 2021 International Conference on Artificial Intelligence for Cyber Security …, 2021 | 12 | 2021 |
An authentication protocol based on combined RFID-biometric system RFID-biometric system N Chikouche, F Cherif, M Benmohammed arXiv preprint arXiv:1207.5627, 2012 | 12 | 2012 |
RFID authentication protocols based on error-correcting codes: a survey N Chikouche, F Cherif, PL Cayrel, M Benmohammed Wireless Personal Communications 96, 509-527, 2017 | 8 | 2017 |
Performance evaluation of post-quantum public-key cryptography in smart mobile devices N Chikouche, A Ghadbane Conference on e-Business, e-Services and e-Society, 67-80, 2018 | 7 | 2018 |
A secure code-based authentication scheme for RFID systems N Chikouche, F Cherif, PL Cayrel, M Benmohammed International Journal of Computer Network and Information Security 7 (9), 1-9, 2015 | 6 | 2015 |
Eap-sres: An enhanced authentication protocol for secure remote education systems using nfc technology N Chikouche, F Cherif International Journal of Computing and Digital Systems 9 (03), 2020 | 4 | 2020 |
Weaknesses in two RFID authentication protocols N Chikouche, F Cherif, PL Cayrel, M Benmohammed Codes, Cryptology, and Information Security: First International Conference …, 2015 | 4 | 2015 |
Performance evaluation and analysis of encryption schemes for wireless sensor networks AA Ghehioueche, N Chikouche, F Mezrag 2019 International Conference on Digitization (ICD), 187-191, 2019 | 3 | 2019 |
Implementation of Public-Key cryptographic systems on embedded devices (case: Computation speed) W Tayoub, S Lakehali, C Noureddine | 3 | 2013 |
Vulnerabilities of two recently RFID authentication protocols N Chikouche, F Cherif, M Benmohammed 2012 IEEE International Conference on Complex Systems (ICCS), 1-6, 2012 | 3 | 2012 |
An efficient privacy scheme for C-ITS stations B Moussaoui, N Chikouche, H Fouchal Computers and Electrical Engineering 107, 108613, 2023 | 2 | 2023 |
Formal analysis of a novel RFID authentication protocol N Chikouche 2017 8th International Conference on Computing, Communication and Networking …, 2017 | 2 | 2017 |
Algebraic replay attacks on authentication in RFID protocols N Chikouche, F Cherif, M Benmohammed International Conference on Security of Information and Communication …, 2013 | 2 | 2013 |
Vérification automatique des protocoles d’authentification des systèmes RFID N Chikouche, M Benmohammed Proc. of STIC’09, 2009 | 1 | 2009 |
Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework AN Bahache, N Chikouche, S Akleylek Internet of Things 26, 101200, 2024 | | 2024 |