Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Zaid Kartit"'
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2020 (2020)
Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than befo
Autor:
Zaid Kartit, Ouafaa Diouri
Publikováno v:
NISS
In recent years, individuals and organizations have been using digital services created by digital transformation. With smart mobile devices, there is a lot of enthusiasm for providing users with the ability to shop, communicate, and access to inform
Autor:
Mustapha Hedabou, M. El Marraki, Ali Azougaghe, H. Kamal Idrissi, Mostafa Belkasmi, Zaid Kartit, Ali Kartit
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789812879899
UNet
UNet
This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7c9913d29569921f32a95878cb0eee09
https://doi.org/10.1007/978-981-287-990-5_12
https://doi.org/10.1007/978-981-287-990-5_12
Publikováno v:
ISDA
Cloud computing has now become a major trend, it is a new data hosting technology that is Very popular in recent years thanks to the amortization of costs it induces to companies. In this paper we present the major security issues in cloud computing
Autor:
Zaid Kartit, Hassan Ouahmane, Ali Kartit, Mohamed Belkhouraf, Hamza Kamal Idrissi, Mohamed El Marraki
Publikováno v:
2015 International Conference on Cloud Technologies and Applications (CloudTech).
Cloud computing is one of the new and very promising trends in the IT technology field, it is subject to a lot of research and continuous advances are made. Its main objectives are to deliver different services for users, such as infrastructure, plat
Publikováno v:
International Review on Computers and Software (IRECOS). 11:42
In modern years, countless researchers are interested in anomaly detection techniques for building intrusion detection systems (IDS). Intrusion detection is a process of recognizing attacks and intrusions. The IDS key purpose is to classify the Regul
Autor:
Mustapha Hedabou, Zaid Kartit, Ali Azougaghe, Mostafa Benmiloud, Mohamed El Marraki, Mostafa Belkasmi
Publikováno v:
Scopus-Elsevier
In this paper we present an electronic voting system based on Homomorphic encryption to ensure privacy, confidentiality and integrity in the voting. Our proposal offers all the advantages of the additively homomorphic encryption cryptosystems. The pr