Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Ali Azougaghe"'
Publikováno v:
Intelligent Systems Design and Applications ISBN: 9783030963071
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cebaf6a4e37639ebb1fe95272085ae53
https://doi.org/10.1007/978-3-030-96308-8_54
https://doi.org/10.1007/978-3-030-96308-8_54
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030736880
SoCPaR
SoCPaR
The process of democratization is developing and promoting due to electronic voting. However, the increase of frauds and the increasing amount of attacks launched by hackers, gave birth to privacy and authentication problems. Cryptography offers mult
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6911c4454ac5a43f849214906972721b
https://doi.org/10.1007/978-3-030-73689-7_73
https://doi.org/10.1007/978-3-030-73689-7_73
Publikováno v:
Business Intelligence ISBN: 9783030765071
CBI
CBI
In recent years, much research has been conducted on quantum computers – machine that exploit the phenomena of quantum mechanics to solve difficult or insoluble mathematical problems for conventional computers. If large-scale quantum computers are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eab621fba4b7c144764db694fa87463c
https://doi.org/10.1007/978-3-030-76508-8_25
https://doi.org/10.1007/978-3-030-76508-8_25
Publikováno v:
9th International Conference on Information Technology Convergence and Services (ITCSE 2020).
Publikováno v:
ACOSIS
Virtual machine migration represents a new topic of research last years. In this context, we present a new system based on matching game theory to design efficient and practical migration algorithms that work well with huge numbers of VMs and servers
Autor:
Mustapha Hedabou, M. El Marraki, Ali Azougaghe, H. Kamal Idrissi, Mostafa Belkasmi, Zaid Kartit, Ali Kartit
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789812879899
UNet
UNet
This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7c9913d29569921f32a95878cb0eee09
https://doi.org/10.1007/978-981-287-990-5_12
https://doi.org/10.1007/978-981-287-990-5_12
Autor:
Ali Azougaghe, Kartit, Zaid, Hedabou, Mustapha, Belkasmi, Mostafa, Benmiloud, Mostafa, Marraki, Mohamed
Publikováno v:
International Review on Computers & Software; Nov2015, Vol. 10 Issue 11, p1103-1109, 7p
Publikováno v:
ISDA
Cloud computing has now become a major trend, it is a new data hosting technology that is Very popular in recent years thanks to the amortization of costs it induces to companies. In this paper we present the major security issues in cloud computing
Publikováno v:
IAS
In this paper we present an electronic voting system based on homomorphic encryption to ensure privacy, confidentiality in the voting. Our proposal offers all the advantages of the multiplicatively homomorphic encryption cryptosystems. The proposed v
Publikováno v:
2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS).
Cloud computing gives another meaning to the word “sharing” in the world of networks. However, it gives rise to serious security problems. One of the techniques used by the attackers is the “Cloud cartography” which aims to locate a Virtual M