关注
mohamed elboukhari
mohamed elboukhari
enseignant chercheur, cuillizi, science économique, centre universitaire d'illizi
在 cuillizi.dz 的电子邮件经过验证
标题
引用次数
引用次数
年份
Implementation of secure key distribution based on quantum cryptography
M Elboukhari, A Azizi, M Azizi
2009 International Conference on Multimedia Computing and Systems, 361-365, 2009
412009
Analysis of the Security of BB84 by Model Checking
M Elboukhari, M Azizi, A Azizi
arXiv preprint arXiv:1005.4504, 2010
262010
Routing protocols for VANETs: a taxonomy, evaluation and analysis
A Bengag, A Bengag, M Elboukhari
Advances in Science, Technology and Engineering Systems Journal 5 (1), 77-85, 2020
192020
Integration of quantum key distribution in the TLS protocol
M Elboukhari, M Azizi, A Azizi
IJCSNS 9 (12), 21-28, 2009
192009
Analysis of quantum cryptography protocols by model checking
M Elboukhari, M Azizi, A Azizi
Int. J. Universal Comput. Sci 1, 34-40, 2010
182010
Improving TLS security by quantum cryptography
M Elboukhari, M Azizi, A Azizi
International Journal of Network Security & Its Applications (IJNSA) 2 (3 …, 2010
162010
A novel greedy forwarding mechanism based on density, speed and direction parameters for vanets
A Bengag, A Bengag, M Elboukhari
International Association of Online Engineering, 2020
152020
Classification of mobile ad hoc networks attacks
O Sbai, M Elboukhari
2018 IEEE 5th International Congress on Information Science and Technology …, 2018
152018
Verification of quantum cryptography protocols by model checking
M Elboukhari, M Azizi, A Azizi
Int. J. Network Security & Appl 2 (4), 43-53, 2010
132010
Impact analysis of black hole attacks on mobile Ad Hoc networks performance
M Elboukhari, M Azizi, A Azizi
International Journal of Grid Computing & Applications 6 (1/2), 1, 2015
122015
Intrusion Detection Systems in mobile ad hoc networks: A survey
M Elboukhari, M Azizi, A Azizi
2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS …, 2014
122014
Quantum key distribution in practice: The state of art
M Elboukhari, A Azizi, M Azizi
2010 5th International Symposium On I/V Communications and Mobile Network, 1-4, 2010
122010
Log files analysis using MapReduce to improve security
Y AZIZI, M AZIZI, M ELBOUKHARI
Procedia computer science 148, 37-44, 2019
112019
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
O Sbai, M Elboukhari
2018 IEEE 5th International Congress on Information Science and Technology …, 2018
112018
Performance Comparison of routing protocols in Mobile Ad hoc Networks
M Elboukhari
Available at SSRN 3606911, 2015
92015
Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks
O Sbai, M Elboukhari
Int J Artif Intell ISSN 2252 (8938), 878, 2022
72022
Security oriented analysis of B92 by model checking
M Elboukhari, A Azizi, M Azizi
2008 New Technologies, Mobility and Security, 1-6, 2008
72008
Wireless body area networks for healthcare: Application trends and mac technologies
N Azdad, M Elboukhari
International Journal of Business Data Communications and Networking (IJBDCN …, 2021
52021
Log Data Integrity Solution based on Blockchain Technology and IPFS.
Y Azizi, M Azizi, M Elboukhari
Int. J. Interact. Mob. Technol. 16 (15), 4-15, 2022
42022
A simulation analyses of MANET’s attacks against OLSR protocol with ns-3
O Sbai, M Elboukhari
Innovations in Smart Cities Applications Edition 3: The Proceedings of the …, 2020
42020
系统目前无法执行此操作,请稍后再试。
文章 1–20