Implementation of secure key distribution based on quantum cryptography M Elboukhari, A Azizi, M Azizi 2009 International Conference on Multimedia Computing and Systems, 361-365, 2009 | 41 | 2009 |
Analysis of the Security of BB84 by Model Checking M Elboukhari, M Azizi, A Azizi arXiv preprint arXiv:1005.4504, 2010 | 26 | 2010 |
Routing protocols for VANETs: a taxonomy, evaluation and analysis A Bengag, A Bengag, M Elboukhari Advances in Science, Technology and Engineering Systems Journal 5 (1), 77-85, 2020 | 19 | 2020 |
Integration of quantum key distribution in the TLS protocol M Elboukhari, M Azizi, A Azizi IJCSNS 9 (12), 21-28, 2009 | 19 | 2009 |
Analysis of quantum cryptography protocols by model checking M Elboukhari, M Azizi, A Azizi Int. J. Universal Comput. Sci 1, 34-40, 2010 | 18 | 2010 |
Improving TLS security by quantum cryptography M Elboukhari, M Azizi, A Azizi International Journal of Network Security & Its Applications (IJNSA) 2 (3 …, 2010 | 16 | 2010 |
A novel greedy forwarding mechanism based on density, speed and direction parameters for vanets A Bengag, A Bengag, M Elboukhari International Association of Online Engineering, 2020 | 15 | 2020 |
Classification of mobile ad hoc networks attacks O Sbai, M Elboukhari 2018 IEEE 5th International Congress on Information Science and Technology …, 2018 | 15 | 2018 |
Verification of quantum cryptography protocols by model checking M Elboukhari, M Azizi, A Azizi Int. J. Network Security & Appl 2 (4), 43-53, 2010 | 13 | 2010 |
Impact analysis of black hole attacks on mobile Ad Hoc networks performance M Elboukhari, M Azizi, A Azizi International Journal of Grid Computing & Applications 6 (1/2), 1, 2015 | 12 | 2015 |
Intrusion Detection Systems in mobile ad hoc networks: A survey M Elboukhari, M Azizi, A Azizi 2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS …, 2014 | 12 | 2014 |
Quantum key distribution in practice: The state of art M Elboukhari, A Azizi, M Azizi 2010 5th International Symposium On I/V Communications and Mobile Network, 1-4, 2010 | 12 | 2010 |
Log files analysis using MapReduce to improve security Y AZIZI, M AZIZI, M ELBOUKHARI Procedia computer science 148, 37-44, 2019 | 11 | 2019 |
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3 O Sbai, M Elboukhari 2018 IEEE 5th International Congress on Information Science and Technology …, 2018 | 11 | 2018 |
Performance Comparison of routing protocols in Mobile Ad hoc Networks M Elboukhari Available at SSRN 3606911, 2015 | 9 | 2015 |
Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks O Sbai, M Elboukhari Int J Artif Intell ISSN 2252 (8938), 878, 2022 | 7 | 2022 |
Security oriented analysis of B92 by model checking M Elboukhari, A Azizi, M Azizi 2008 New Technologies, Mobility and Security, 1-6, 2008 | 7 | 2008 |
Wireless body area networks for healthcare: Application trends and mac technologies N Azdad, M Elboukhari International Journal of Business Data Communications and Networking (IJBDCN …, 2021 | 5 | 2021 |
Log Data Integrity Solution based on Blockchain Technology and IPFS. Y Azizi, M Azizi, M Elboukhari Int. J. Interact. Mob. Technol. 16 (15), 4-15, 2022 | 4 | 2022 |
A simulation analyses of MANET’s attacks against OLSR protocol with ns-3 O Sbai, M Elboukhari Innovations in Smart Cities Applications Edition 3: The Proceedings of the …, 2020 | 4 | 2020 |