Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Khalifa Toumi"'
Publikováno v:
IEEE Access, Vol 5, Pp 24376-24388 (2017)
Web conversational services are exposed to several threats in which the social context between communicating participants is manipulated. Cybercrimes based on identity misrepresentation to obtain sensitive information are on the rise. Various scams a
Externí odkaz:
https://doaj.org/article/421097d9f9124cc69ec20ae3fa2875d0
Autor:
Azza Allouch, Omar Cheikhrouhou, Anis Koubâa, Khalifa Toumi, Mohamed Khalgui, Tuan Nguyen Gia
Publikováno v:
Sensors, Vol 21, Iss 9, p 3049 (2021)
Unmanned aerial systems (UAVs) are dramatically evolving and promoting several civil applications. However, they are still prone to many security issues that threaten public safety. Security becomes even more challenging when they are connected to th
Externí odkaz:
https://doaj.org/article/70d412ee5a7c4e01a15dc2ebdc5ff031
Autor:
Souad BelMannoubi, Haifa Touati, Mohamed Hadded, Khalifa Toumi, Oyunchimeg Shagdar, Farouk Kamoun
Publikováno v:
Vehicular Communications. :100607
Publikováno v:
International Journal on AdHoc Networking Systems. 10:1-17
Publikováno v:
2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).
Publikováno v:
BCCA
Blockchains have seen a recent rise in popularity as a generic solution for trustless distributed applications across a wide range of industries. However, blockchain protocols have faced scalability issues in applications involving a growing number o
Publikováno v:
Computers and Electrical Engineering
Computers and Electrical Engineering, Elsevier, 2020, 83, pp.106586. ⟨10.1016/j.compeleceng.2020.106586⟩
Computers and Electrical Engineering, Elsevier, 2020, 83, pp.106586. ⟨10.1016/j.compeleceng.2020.106586⟩
International audience; This paper proposes a novel user-centric and privacy-preserving credential scheme over the blockchain. The proposed protocol allows users to access services without revealing sensitive attributes. This new paradigm is based on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::13d8d5a25a97465a15ed1870ea306950
https://hal.archives-ouvertes.fr/hal-03086890
https://hal.archives-ouvertes.fr/hal-03086890
Publikováno v:
Pervasive and Mobile Computing
Pervasive and Mobile Computing, Elsevier, 2020, pp.101104. ⟨10.1016/j.pmcj.2019.101104⟩
Pervasive and Mobile Computing, Elsevier, 2020, pp.101104. ⟨10.1016/j.pmcj.2019.101104⟩
International audience; As we are moving towards the Internet of Things (IoT), the number of connected objects is growing at a rapid pace. These smart devices continuously generate enormous amounts of data, which can be valuable for many services. On
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7d8181e812d0f77f4077058344bd3615
https://hal.archives-ouvertes.fr/hal-02409341
https://hal.archives-ouvertes.fr/hal-02409341
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030440404
AINA
International Conference on Advanced Information Networking and Applications, AINA 2020: Advanced Information Networking and Applications
AINA 2020: 34th International Conference on Advanced Information Networking and Applications
AINA 2020: 34th International Conference on Advanced Information Networking and Applications, Apr 2020, Caserta, Italy. pp.1303-1318, ⟨10.1007/978-3-030-44041-1_111⟩
AINA
International Conference on Advanced Information Networking and Applications, AINA 2020: Advanced Information Networking and Applications
AINA 2020: 34th International Conference on Advanced Information Networking and Applications
AINA 2020: 34th International Conference on Advanced Information Networking and Applications, Apr 2020, Caserta, Italy. pp.1303-1318, ⟨10.1007/978-3-030-44041-1_111⟩
International audience; While smart contracts are becoming widely recognized as the most successful application of the blockchain technology that could be applied into various industries and for different purposes such as e-commerce, energy tradings,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a9c03791b5940ba2dbae06fbb00d4050
https://doi.org/10.1007/978-3-030-44041-1_111
https://doi.org/10.1007/978-3-030-44041-1_111
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System
Autor:
Ana R. Cavalli, Khalifa Toumi, Mohamed H. E. Aouadi, Jordi Puiggalí Allepuz, Wissam Mallouli, Pol Valletb Montfort
Publikováno v:
The Computer Journal
The Computer Journal, Oxford University Press (UK), 2018, 61 (8), pp.1109-1122. ⟨10.1093/comjnl/bxy018⟩
The Computer Journal, Oxford University Press (UK), 2018, 61 (8), pp.1109-1122. ⟨10.1093/comjnl/bxy018⟩
International audience; Testing and monitoring the effectiveness of security policies under pervasive system architectures is still a major challenging problem for the research community as well as industrials. The inherent characteristics of these s