Hella Kaffel Ben Ayed

According to our database1, Hella Kaffel Ben Ayed authored at least 38 papers between 1986 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain.
CoRR, 2024

Performance Evaluation of LoRaWAN Propagation Models for Real-Time IoT Deployments.
Proceedings of the 27th IEEE International Symposium on Real-Time Distributed Computing, 2024

Federated Learning Models for Real-Time IoT: A Survey.
Proceedings of the 27th IEEE International Symposium on Real-Time Distributed Computing, 2024

2023
Blockchain for Ridesharing: A Systematic Literature Review.
Proceedings of the International Conference on Smart Applications, 2023

Toward Interoperability of NFT Marketplaces.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

2022
Machine learning contributions on the field of security and privacy of android.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
Blockchain based OAuth for IoT.
Proceedings of the 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, 2021

An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2019
A Blockchain based access control for IoT.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A survey on Blockchain based access control for Internet of Things.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

State of the art on Privacy Risk Estimation Related to Android Applications.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2017
A proposal of a distributed access control over Fog computing: The ITS use case.
Proceedings of the International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, 2017

Assessment for Android apps permissions a proactive approach toward privacy risk.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Protection of IoT transaction using ID-KEM based on three-pass protocol countermeasure.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

An IDMS approach towards privacy and new requirements in IoT.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
A protocol for setting up ad hoc mobile clouds over spontaneous MANETs.
Int. J. Wirel. Mob. Comput., 2016

A generic Kerberos-based access control system for the cloud.
Ann. des Télécommunications, 2016

A protocol for setting up ad hoc mobile clouds over spontaneous MANETs: A proof of concept.
Proceedings of the 2016 Cloudification of the Internet of Things, 2016

Privacy risk assessment for Web tracking: A user-oriented approach toward privacy risk assessment for Web tracking.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

Generic Access Control System for Ad Hoc MCC and Fog Computing.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Privacy risk assessment and users' awareness for mobile apps permissions.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Ad Hoc Cloud as a Service: A Protocol for Setting up an Ad hoc Cloud over MANETs.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

A taxonomy of identities management systems in IOT.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Toward Proactive Mobile Tracking Management.
Int. J. Inf. Secur. Priv., 2014

2013
Evaluation of third party tracking on the web.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Fairness and Access Control for Mobile P2P Auctions over MANETs.
J. Theor. Appl. Electron. Commer. Res., 2012

2008
Performance Evaluation of a Protocol for Fair P2P Auctions over MANETs.
Proceedings of the Advances in Ad Hoc Networking, 2008

What Can Context Do for Trust in Manets?
Proceedings of the ICEIS 2008, 2008

Towards fair P2P auctions over MANETs.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Analogy in Making Predictions.
J. Decis. Syst., 2007

Secure and fair auctions over ad hoc networks.
Int. J. Electron. Bus., 2007

2005
A Hierarchical distributed communication architecture for real-time auctions.
Proceedings of the ICETE 2005, 2005

2004
Security issues of m-commerce over hotspot networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

A Communication Architecture for Real-Time Auctions.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004

2002
A SET Based Approach to Secure the Payment in Mobile Commerce.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Wireless set: an approach for the deployment of set over WAP mobile networks.
Proceedings of the Network Control and Engineering for QoS, 2002

1999
An EDI User Agent over the Internet.
Netw. Inf. Syst. J., 1999

1986
Messaging System for African Countries: Afrimail Project.
Proceedings of the New Communication Services: A Challenge to Computer Technology, 1986


  Loading...