Ahmed Serhrouchni

According to our database1, Ahmed Serhrouchni authored at least 124 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DynSplit: A Dynamic Split Learning Scheme for 5G-Enpowered Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

2023
Lightweight TLS 1.3 Handshake for C-ITS Systems.
Proceedings of the IEEE International Conference on Communications, 2023

DS-IRSA: A Deep Reinforcement Learning and Sensing Based IRSA.
Proceedings of the IEEE Global Communications Conference, 2023

A Healthcare Delivery System Powered by Semantic Data Description and Blockchain.
Proceedings of the Advances in Information and Communication, 2023

Scalable Blockchain Through Prioritised Sharding.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

Scaling A Blockchain System With Layered Architecture.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

2022
TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2022

Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol.
Proceedings of the 8th International Conference on Control, 2022

2021
A blockchain-based certificate revocation management and status verification system.
Comput. Secur., 2021

A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks.
Comput. Networks, 2021

Improved CRL Distribution point for Cooperative Intelligent Transportation Systems.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding.
Proceedings of the IEEE Global Communications Conference, 2021

2020
TLS Authentication Using Intelligent Transport System (ITS) Certificates.
RFC, September, 2020

Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming.
IEEE Internet Things J., 2020

An Intelligent Mechanism for Sybil Attacks Detection in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
A Survey of Internet of Things (IoT) Authentication Schemes.
Sensors, 2019

Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs).
Proceedings of the 2019 International Conference on Wireless Networks and Mobile Communications, 2019

Arabic Cyberbullying Detection: Enhancing Performance by Using Ensemble Machine Learning.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

A Blockchain-based Lightweight Authentication Solution for IoT.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

2018
Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks.
IEEE Trans. Veh. Technol., 2018

Event Detection in Wireless Body Area Networks Using Kalman Filter and Power Divergence.
IEEE Trans. Netw. Serv. Manag., 2018

Bubbles of Trust: A decentralized blockchain-based authentication system for IoT.
Comput. Secur., 2018

Cooperative relay beamforming for control channel jamming in vehicular networks.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

CDBE: A cooperative way to improve end-to-end congestion control in mobile network.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

BCTrust: A decentralized authentication blockchain-based mechanism.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Total Eclipse: How To Completely Isolate a Bitcoin Peer.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Performance evaluation of CQIC and TCP BBR in mobile network.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

Analysis of Cryptographic Algorithms on IoT Hardware platforms.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

2017
Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

TLS for Cooperative ITS Services.
Proceedings of the Internet of Vehicles. Technologies and Services for Smart Cities, 2017

Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain.
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017

Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

A lightweight IoT security protocol.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Analysis of authentication techniques in Internet of Things (IoT).
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS).
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Towards an Efficient File Synchronization between Digital Safes.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
A statistical trust system in wireless mesh networks.
Ann. des Télécommunications, 2016

Extending TLS with KMIP Protocol for Cloud Computing.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Security Incident Response: Towards a Novel Decision-Making System.
Proceedings of the Intelligent Systems Design and Applications, 2016

Vehicle Driving Pattern Based Sybil Attack Detection.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

SyncDS: A digital safe based file synchronization approach.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
DDOS Mitigation Cloud-Based Service.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Survey on packet marking fields and information for IP traceback.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Safe box cloud authentication using TLS extesion.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

A reputation system for detection of black hole attack in vehicular networking.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Secure access & authentication for collaborative intercloud exchange service.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Analysis of cyber security for industrial control systems.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Survey on packet marking fields and information for IP traceback.
Proceedings of the International Conference on Protocol Engineering, 2015

Toward user's devices collaboration to distribute securely the client side storage.
Proceedings of the International Conference on Protocol Engineering, 2015

Taxonomy of attacks on industrial control protocols.
Proceedings of the International Conference on Protocol Engineering, 2015

Efficient training data extraction framework for intrusion detection systems.
Proceedings of the 6th International Conference on the Network of the Future, 2015

Digital safe: Secure synchronization of shared files.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
A Model-Based Resilience Analysis for IMS.
J. Networks, 2014

A novel name-based security mechanism for information-centric networking.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Security enhancement of HTML5 Local Data Storage.
Proceedings of the 2014 International Conference and Workshop on the Network of the Future, 2014

Towards a Fine-Grained Access Control for Cloud.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

AIDD: A novel generic attack modeling approach.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

PCM in cloud.
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014

Hybrid approach to detect SQLi attacks and evasion techniques.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Content protection and secure synchronization of HTML5 local storage data.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

Improving Web Application Firewalls to detect advanced SQL injection attacks.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

Security assurance of local data stored by HTML5 web application.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Access control in probative value Cloud.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Access control enforcement in Named Data Networking.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Privacy-preserving domain-flux botnet detection in a large scale network.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

SBaaS: Safe Box as a service.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Data-based access control in named data networking.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Collaborative approach for inter-domain botnet detection in large-scale networks.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2011
End-to-End Adaptive Framework for Multimedia Information Retrieval.
Proceedings of the Wired/Wireless Internet Communications, 2011

Multiview Browsing and Visualization of Distributed Information.
Proceedings of the 11th Annual International Conference on New Technologies of Distributed Systems, 2011

2010
Conference knowledge modelling for conference-video-recordings querying and visualization.
J. Multim. Process. Technol., 2010

hTracker: towards a Service Provider Oriented Peer-to-peer architecture.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

Bayesian statistical analysis for spams.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

2009
Random Values, Nonce and Challenges: Semantic Meaning versus Opaque and Strings of Data.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Conference knowledge modeling for conference-video-recordings querying & visualization.
Proceedings of the MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, 2009

2008
Decentralized Alerts Correlation Approach for DDoS Intrusion Detection.
Proceedings of the NTMS 2008, 2008

Mutual Authentication for SIP: A Semantic Meaning for the SIP Opaque Values.
Proceedings of the NTMS 2008, 2008

NETPOPPS: A Network Provider Oriented Peer-to-Peer System.
Proceedings of the NTMS 2008, 2008

A collaborative peer-to-peer architecture to defend against DDoS attacks.
Proceedings of the LCN 2008, 2008

A Service Oriented P2P architecture with semantic support.
Proceedings of the 16th International Conference on Networks, 2008

An Infrastructure of Programmable Networks for Peer-to-Peer Applications.
Proceedings of the Fourth Advanced International Conference on Telecommunications, 2008

2007
CAP: A Context-Aware Peer-to-Peer System.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Convergence among Peer-to-Peer and Programmable Networks.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

2006
Intégrationfr de la signature numérique au protocole SSL/TLS.
Ann. des Télécommunications, 2006

Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements.
Proceedings of the SECRYPT 2006, 2006

Simple voice security protocol.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Towards a new Security Architecture for Telephony.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

PSAT: Proactive Signaling Architecture for IP Traceback.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

2005
A New Access Control Solution for a Multi-Provider Wireless Environment.
Telecommun. Syst., 2005

Mesurer la sécurité d'un réseau d'un opérateur de télécommunication.
Ann. des Télécommunications, 2005

Service Deployment in Active Networks Based on a P2P System.
Proceedings of the Mobility Aware Technologies and Applications, 2005

Reliable Multicast over Satellite Networks.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Security Verification of a Virtual Private Network over MPLS.
Proceedings of the Network Control and Engineering for QoS, 2005

Critical Analysis and New Perspective for Securing Voice Networks.
Proceedings of the Networking, 2005

A signaling architecture against dos attacks.
Proceedings of the ICETE 2005, 2005

Network Security using E-DHCP over NAT/IPSEC.
Proceedings of the IASTED International Conference on Web Technologies, 2005

2004
A lightweight identity authentication protocol for wireless networks.
Comput. Commun., 2004

Architecture d'un réseau actif à base de services Web.
Ann. des Télécommunications, 2004

DHCP Authentication Using Certificates.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Integrating a Signature Module in SSL/TLS.
Proceedings of the ICETE 2004, 2004

Certificate-Based Access Control and Authentication for DHCP.
Proceedings of the ICETE 2004, 2004

2003
A new secure session exchange key protocol for wireless communications.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Light TLS: Extended Handshake for Wireless Communications.
Proceedings of the Mobile and Wireless Communications Networks, 2003

New Key Management Protocol for SSL/TLS.
Proceedings of the Network Control and Engineering for QoS, 2003

ISAKMP handshake for SSL/TLS.
Proceedings of the Global Telecommunications Conference, 2003

2002
Using distributed component model for active service deployment.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

A solution for improving TCP performance over wireless links.
Proceedings of the Network Control and Engineering for QoS, 2002

Deployment and Experimentation of an active network at a: large scale: AMARRAGE.
Proceedings of the Network Control and Engineering for QoS, 2002

2001
RMTP Performance in Heterogeneous Environments & a New QoS-Based Mechanism for Building RMTP Trees.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

The Coexistence of Multicast and Unicast over a GPS Capable Network.
Proceedings of the Networking, 2001

2000
TCP over satellite links: Problems and solutions.
Telecommun. Syst., 2000

SPIN Model Checking: An Introduction.
Int. J. Softw. Tools Technol. Transf., 2000

Contractual Group Membership CGM: A New Mechanism for Multicast Group Management.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

Performance Evaluation of RMTP Using NS and RMTP Integration in Current Networks.
Proceedings of the Next Generation Networks, 2000

1999
SNMPv3 Can Still be Simple?
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999

Some Design Issues of SRMTP, a Scalable Reliable Multicast Transport Protocol.
Proceedings of the Multimedia Applications, Services and Techniques, 1999

1998
Towards a modular and interoperable SNMPv3.
Proceedings of the 1998 Network Operations and Management Symposium, 1998

QOS metrics tool using management by delegation.
Proceedings of the 1998 Network Operations and Management Symposium, 1998

SET and SSL: electronic payments on the Internet.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

The modularity of SNMPv3.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

1996
Creating implementations from Promela models.
Proceedings of the Spin Verification System, 1996

1990
PIL: A Tool for Pre-implementation of LOTOS.
Proceedings of the Formal Description Techniques, 1990


  Loading...