Web oauth-based SSO systems security Y Sadqi, Y Belfaik, S Safi Proceedings of the 3rd International Conference on Networking, Information …, 2020 | 16 | 2020 |
A novel secure and privacy-preserving model for OpenID connect based on blockchain B Yousra, S Yassine, M Yassine, S Said, T Lo’ai, K Salah IEEE Access, 2023 | 8 | 2023 |
A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Towards Effective Mitigation Strategies M Zaoui, B Yousra, S Yassine, M Yassine, O Karim IEEE Access, 2024 | 1 | 2024 |
A Comparative Study of Protocols’ Security Verification Tools: Avispa, Scyther, ProVerif, and Tamarin Y Belfaik, Y Lotfi, Y Sadqi, S Safi International Conference on Digital Technologies and Applications, 118-128, 2024 | 1 | 2024 |
A Deep Dive Into Cybersecurity Risk Assessment and Countermeasures in Online Social Networks A Zineddine, Y Belfaik, Y Sadqi Risk Assessment and Countermeasures for Cybersecurity, 1-19, 2024 | | 2024 |
Privacy-Preserving Techniques for Online Social Networks Data Y Belfaik, A Zineddine, Y Sadqi, S Safi Risk Assessment and Countermeasures for Cybersecurity, 62-78, 2024 | | 2024 |
MULTI-KEY FULLY HOMOMORPHIC ENCRYPTION FOR PRIVACY-PRESERVATION WITHIN FEDERATED LEARNING ENVIRONMENTS O Chakir, Y Belfaik, Y Sadqi EDPACS 68 (6), 25-34, 2023 | | 2023 |
Single Sign-On Revocation Access Y Belfaik, A Lmouhandiz, Y Sadqi, S Safi Advances in Information, Communication and Cybersecurity: Proceedings of …, 2022 | | 2022 |