Khaled Hamouid

According to our database1, Khaled Hamouid authored at least 13 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Corrigendum to "An extended Attribute-based access control with controlled delegation in IoT" [Journal of Information Systems and Applications 76 (2023) 103473].
J. Inf. Secur. Appl., 2024

Optimal and Secure Routing Protocol based on Key Management for IoT.
Proceedings of the 10th International Conference on Control, 2024

2023
Secure Electric Vehicle Dynamic Charging Based on Smart Contracts.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Dynamic and Flexible Access Control for IoT-Enabled Smart Healthcare.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2022
A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

2021
A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT.
Proceedings of the 2021 Wireless Days, 2021

2020
LSTR: Lightweight and Secure Tree-Based Routing for Wireless Sensor Networks.
Wirel. Pers. Commun., 2020

Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority.
Peer-to-Peer Netw. Appl., 2019

2015
Efficient certificateless web-of-trust model for public-key authentication in MANET.
Comput. Commun., 2015

2012
Self-Certified Based Trust Establishment Scheme in Ad-Hoc Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

2010
Secure and robust threshold key management (SRKM) scheme for <i>ad hoc</i> networks.
Secur. Commun. Networks, 2010

2009
Robust Key Management scheme for certification in mobile ad-hoc networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009


  Loading...