关注
Noureddine Chikouche
Noureddine Chikouche
Professor, University of M'sila
在 univ-msila.dz 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An improved approach for lsb-based image steganography using AES algorithm
SL Chikouche, N Chikouche
2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE …, 2017
522017
A novel image encryption algorithm based on hybrid chaotic maps using a key image
S Benaissi, N Chikouche, R Hamza
Optik 272, 170316, 2023
412023
A privacy-preserving code-based authentication protocol for Internet of Things
N Chikouche, PL Cayrel, EHM Mboup, BO Boidje
The Journal of Supercomputing 75 (12), 8231-8261, 2019
372019
Authentication schemes for healthcare applications using wireless medical sensor networks: A survey
AN Bahache, N Chikouche, F Mezrag
SN Computer Science 3 (5), 382, 2022
342022
Improved RFID authentication protocol based on randomized McEliece cryptosystem
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
172015
Privacy preservation in healthcare systems
BR Louassef, N Chikouche
2021 International Conference on Artificial Intelligence for Cyber Security …, 2021
122021
An authentication protocol based on combined RFID-biometric system RFID-biometric system
N Chikouche, F Cherif, M Benmohammed
arXiv preprint arXiv:1207.5627, 2012
122012
RFID authentication protocols based on error-correcting codes: a survey
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
Wireless Personal Communications 96, 509-527, 2017
82017
Performance evaluation of post-quantum public-key cryptography in smart mobile devices
N Chikouche, A Ghadbane
Conference on e-Business, e-Services and e-Society, 67-80, 2018
72018
A secure code-based authentication scheme for RFID systems
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
International Journal of Computer Network and Information Security 7 (9), 1-9, 2015
62015
Eap-sres: An enhanced authentication protocol for secure remote education systems using nfc technology
N Chikouche, F Cherif
International Journal of Computing and Digital Systems 9 (03), 2020
42020
Weaknesses in two RFID authentication protocols
N Chikouche, F Cherif, PL Cayrel, M Benmohammed
Codes, Cryptology, and Information Security: First International Conference …, 2015
42015
Performance evaluation and analysis of encryption schemes for wireless sensor networks
AA Ghehioueche, N Chikouche, F Mezrag
2019 International Conference on Digitization (ICD), 187-191, 2019
32019
Implementation of Public-Key cryptographic systems on embedded devices (case: Computation speed)
W Tayoub, S Lakehali, C Noureddine
32013
Vulnerabilities of two recently RFID authentication protocols
N Chikouche, F Cherif, M Benmohammed
2012 IEEE International Conference on Complex Systems (ICCS), 1-6, 2012
32012
An efficient privacy scheme for C-ITS stations
B Moussaoui, N Chikouche, H Fouchal
Computers and Electrical Engineering 107, 108613, 2023
22023
Formal analysis of a novel RFID authentication protocol
N Chikouche
2017 8th International Conference on Computing, Communication and Networking …, 2017
22017
Algebraic replay attacks on authentication in RFID protocols
N Chikouche, F Cherif, M Benmohammed
International Conference on Security of Information and Communication …, 2013
22013
Vérification automatique des protocoles d’authentification des systèmes RFID
N Chikouche, M Benmohammed
Proc. of STIC’09, 2009
12009
Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework
AN Bahache, N Chikouche, S Akleylek
Internet of Things 26, 101200, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20