Mehdi Berenjkoub
According to our database1,
Mehdi Berenjkoub
authored at least 26 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Digit. Commun. Networks, April, 2023
2020
Comments on "Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra".
IEEE Trans. Inf. Forensics Secur., 2020
2019
Universal designated verifier signature scheme with non-delegatability in the standard model.
Inf. Sci., 2019
Secure pattern matching based on bit parallelism - Non-interactive protocols for non-deterministic string matching automata evaluation.
Int. J. Inf. Sec., 2019
Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model.
IET Inf. Secur., 2019
IEICE Trans. Inf. Syst., 2019
IEEE Access, 2019
2018
On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol.
CoRR, 2018
2017
ISC Int. J. Inf. Secur., 2017
2016
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
2015
Defense Mechanisms against Injecting Traffic with MAC Layer Misbehavior Detection and Cooperation Stimulation for Autonomous Ad Hoc Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
ISC Int. J. Inf. Secur., 2014
A multi-signer convertible limited multi-verifier signature scheme in the standard model.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
2012
Int. J. Secur. Networks, 2012
2011
A high performance and intrinsically secure key establishment protocol for wireless sensor networks.
Comput. Networks, 2011
2010
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks.
ISC Int. J. Inf. Secur., 2010
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010
2009
ISC Int. J. Inf. Secur., 2009
An efficient authentication and key management protocol for hierarchical ad hoc sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009
2008
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008