A privacy-preserving authentication scheme in an edge-fog environment AB Amor, M Abid, A Meddeb 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 69 | 2017 |
Secure fog-based e-learning scheme AB Amor, M Abid, A Meddeb IEEE Access 8, 31920-31933, 2020 | 39 | 2020 |
An efficient scheme for anonymous communication in IoT S Jebri, M Abid, A Bouallegue 2015 11th International Conference on Information Assurance and Security …, 2015 | 34 | 2015 |
Stac-protocol: Secure and trust anonymous communication protocol for iot S Jebri, M Abid, A Bouallegue 2017 13th International Wireless Communications and Mobile Computing …, 2017 | 19 | 2017 |
Iris based authentication mechanism for e-Passports M Abid, S Kanade, D Petrovska-Delacrétaz, B Dorizzi, H Afifi 2nd International Workshop on Security and Communication Networks (IWSCN …, 2010 | 19 | 2010 |
Toward a security model for the future network of information E Renault, A Ahmad, M Abid Proceedings of the 4th International Conference on Ubiquitous Information …, 2009 | 19 | 2009 |
Efficient identity-based authentication for IMS based services access M Abid, S Song, H Moustafa, H Afifi Proceedings of the 7th International Conference on Advances in Mobile …, 2009 | 18 | 2009 |
Secure e-passport protocol using elliptic curve diffie-hellman key agreement protocol M Abid, H Afifi 2008 The Fourth International Conference on Information Assurance and …, 2008 | 18 | 2008 |
Virtual identity approaches evaluation for anonymous communication in cloud environments IA Gomaa, E Abd-Elrahman, M Abid International journal of advanced computer science and applications 7 (2), 2016 | 15 | 2016 |
Towards a secure e-passport protocol based on biometrics M Abid, H Afifi Journal of Information Assurance and Security (JIAS), Special Issue on …, 2009 | 14 | 2009 |
Enhanced lightweight algorithm to secure data transmission in IoT systems S Jebri, A Ben Amor, M Abid, A Bouallegue Wireless Personal Communications 116 (3), 2321-2344, 2021 | 13 | 2021 |
LTAMA-algorithm: light and trust anonymous mutual authentication algorithm for IoT S Jebri, M Abid, A Bouallegue 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018 | 10 | 2018 |
Integrating identity-based cryptography in IMS service authentication M Abid, S Song, H Moustafa, H Afifi arXiv preprint arXiv:1004.0762, 2010 | 10 | 2010 |
A secure fog-based communication scheme AB Amor, M Abid, A Meddeb 2017 International Conference on Internet of Things, Embedded Systems and …, 2017 | 9 | 2017 |
Access Control to Objects and their Description in the Future Network of Information E Renault, A Ahmad, M Abid Journal of Information Processing Systems (JIPS) 6 (3), 359 - 374, 2010 | 8 | 2010 |
Privacy preservation and security management in VANET based to Software Defined Network K Assafra, B Alaya, M Abid 2022 IEEE Wireless Communications and Networking Conference (WCNC), 96-101, 2022 | 7 | 2022 |
Video Streaming Security: Window-Based Hash Chain Signature Combines with Redundancy Code-YouTube Scenario as an Internet Case Study E Abd-Elrahman, H Abid, Mohamed, Afifi IEEE International Symposium on Multimedia (ISM), 2010, 33-40, 2010 | 7 | 2010 |
A secure lightweight mutual authentication scheme in social industrial IoT environment A Ben Amor, S Jebri, M Abid, A Meddeb The Journal of Supercomputing 79 (12), 13578-13600, 2023 | 6 | 2023 |
Enhanced intrusion detection system based on autoencoder network and support vector machine S Dadi, M Abid Networking, Intelligent Systems and Security: Proceedings of NISS 2021, 327-341, 2022 | 5 | 2022 |
SAMAFog: service-aware mutual authentication fog-based protocol BEN Arij, A Mohamed, A Meddeb 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 5 | 2019 |