Named-data security scheme for named data networking B Hamdane, A Serhrouchni, A Fadlallah, SG El Fatmi 2012 Third International Conference on The Network of the Future (NOF), 1-6, 2012 | 59 | 2012 |
Access control enforcement in named data networking B Hamdane, A Serhrouchni, SG El Fatmi 8th International Conference for Internet Technology and Secured …, 2013 | 29 | 2013 |
Towards a secured clustering mechanism for messages exchange in VANET A Kchaou, R Abassi, SG El Fatmi 2018 32nd International Conference on Advanced Information Networking and …, 2018 | 28 | 2018 |
A novel node architecture for optical networks: Modeling, analysis and performance evaluation A Lazzez, Y Khlifi, SG El Fatmi, N Boudriga, MS Obaidat Computer communications 30 (5), 999-1014, 2007 | 25 | 2007 |
Data-based access control in named data networking B Hamdane, M Msahli, A Serhrouchni, SG El Fatmi 9th IEEE International Conference on Collaborative Computing: Networking …, 2013 | 23 | 2013 |
An Automated Validation Method for Security Policies: the firewall case R Abassi, SG El Fatmi 2008 The Fourth International Conference on Information Assurance and …, 2008 | 20 | 2008 |
Optical packet and burst switching node architecture: Modeling and performance analysis Y Khlifi, A Lazzez, S Guemara-Elfatmi, N Boudriga ConTel, Zagreb, Croatia, 2005 | 20 | 2005 |
A credential and encryption based access control solution for named data networking B Hamdane, SG El Fatmi 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 18 | 2015 |
Towards a generic trust management model R Abassi, SG El Fatmi 2012 19th International Conference on Telecommunications (ICT), 1-6, 2012 | 18 | 2012 |
Segments-priorities based contention resolution technique for QoS support in optical burst-switched networks A Lazzez, N Boudriga, SG El Fatmi Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE …, 2004 | 17 | 2004 |
A reputation-based clustering mechanism for manet routing security AB Chehida, R Abassi, SG El Fatmi 2013 International Conference on Availability, Reliability and Security, 310-315, 2013 | 16 | 2013 |
Hierarchical identity based cryptography for security and trust in named data networking B Hamdane, R Boussada, ME Elhdhili, SG El Fatmi 2017 IEEE 26th International Conference on Enabling Technologies …, 2017 | 15 | 2017 |
A trust management based security mechanism against collusion attacks in a MANET environment ABC Douss, R Abassi, SG El Fatmi 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 15 | 2014 |
A ticket-based authentication scheme for vanets preserving privacy O Chikhaoui, AB Chehida, R Abassi, SGE Fatmi Ad-hoc, Mobile, and Wireless Networks: 16th International Conference on Ad …, 2017 | 13 | 2017 |
A Model for Specification and Validation of Security Policies in Communication Networks: the firewall case R Abassi, SG El Fatmi 2008 Third International Conference on Availability, Reliability and …, 2008 | 13 | 2008 |
XML access control: from XACML to annotated schemas R Abassi, M Rusinowitch, F Jacquemard, SG El Fatmi The Second International Conference on Communications and Networking, 1-8, 2010 | 12 | 2010 |
Qos routing in ad hoc networks by integreting activity in the olsr protocol H Bouhouch, S Guemara, E Fatmi 2007 Second International Conference on Systems and Networks Communications …, 2007 | 11 | 2007 |
Security issues in e-government models: what governments should do S Benabdallah, SEF Guemara, N Boudriga IEEE International Conference on Systems, Man and Cybernetics 2, 398-403, 2002 | 11 | 2002 |
SECOMO: an estimation cost model for risk management projects J Krichene, N Boudriga, SGE Fatmi Proceedings of the 7th International Conference on Telecommunications, 2003 …, 2003 | 10 | 2003 |
Relational-based calculus for trust management in networked services S Guemara-ElFatmi, N Boudriga, MS Obaidat Computer Communications 27 (12), 1206-1219, 2004 | 9 | 2004 |