Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Kamel Adi"'
Publikováno v:
2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT).
Publikováno v:
FiCloud
Cloud computing is a technology that provides users with a large storage space and an enormous computing power. For privacy purpose, the sensitive data should be encrypted before being outsourced to the cloud. To search over the outsourced data, sear
Autor:
Khaled Hamouid, Kamel Adi
Publikováno v:
Peer-to-Peer Networking and Applications. 12:1137-1155
This paper proposes a compromise-tolerant (t,n)-threshold certification management scheme for MANETs. Our solution allows to mitigate the impact of compromised nodes that participate in the certification service. In our design, certification manageme
Publikováno v:
WD
This paper proposes an anonymity based mechanism for providing privacy in IoT environment. Proposed scheme allows IoT entities to anonymously interacting and authenticating with each other, or even proving that they have trustworthy relationship with
Autor:
Kamel Adi, Khaled Hamouid
Publikováno v:
ISNCC
In-motion wireless charging services have emerged for the development of Electric Vehicles (EVs) industry. Fast authentication and privacy awareness are the major concerns in this promising technology. This paper proposes FLPA, a fast and anonymous a
Publikováno v:
Foundations and Practice of Security ISBN: 9783030453701
FPS
FPS
According to OWASP top10 Application Security Risks [8, 9] SQL injection (SQLi) remains the most dangerous and most commonly exploited vulnerability in web applications. Thus, a lot of attentions are devoted by the scientific community for the develo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f5459ed631f41ae2fb9fdc00e1bf97d2
https://doi.org/10.1007/978-3-030-45371-8_26
https://doi.org/10.1007/978-3-030-45371-8_26
Publikováno v:
Computers & Security. 76:156-177
We propose an efficient intrusion detection scheme for Mobile Ad-hoc Networks (MANETs). The scheme allows the reinforcing of network security while preserving the resources of the network nodes (e.g. energy). More specifically, the proposed solution
Publikováno v:
Computers & Security. 73:156-171
This paper proposes a formal framework for automatic security policy enforcement in computer systems. In this approach, systems and their interactions are formally modeled as process algebra expressions with a new dedicated calculus inspired from the
Autor:
Ammar Boulaiche, Kamel Adi
Publikováno v:
Telecommunication Systems. 68:277-294
In this paper, we propose a novel intrusion detection technique with a fully automatic attack signatures generation capability. The proposed approach exploits a honeypot traffic data analysis to build an attack scenarios database, used to detect pote
Publikováno v:
International Journal of Information Security. 16:91-113
Access control policies may contain anomalies such as incompleteness and inconsistency, which can result in security vulnerabilities. Detecting such anomalies in large sets of complex policies automatically is a difficult and challenging problem. In