Mohammed Achemlal

According to our database1, Mohammed Achemlal authored at least 16 papers between 1988 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Trusted Execution Environment: What It is, and What It is Not.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Towards Integrating Trusted Execution Environment into Embedded Autonomic Systems.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

2014
Host-Based Card Emulation: Development, Security, and Ecosystem Impact Analysis.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Adaptive Group Key Management Protocol for Wireless Communications.
J. Univers. Comput. Sci., 2012

Individual Countermeasure Selection Based on the Return On Response Investment Index.
Proceedings of the Computer Network Security, 2012

2011
MASSIF: A Promising Solution to Enhance Olympic Games IT Security.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
The Topology Change Attack: Threat and Impact.
J. Univers. Comput. Sci., 2009

2007
Reputation-Based Routing in Hybrid Ad Hoc Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

2006
Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements.
Proceedings of the SECRYPT 2006, 2006

2004
Certificate-Based Access Control and Authentication for DHCP.
Proceedings of the ICETE 2004, 2004

2003
An Approach to the Charging of Secure IP Multicast Services.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

2000
Analyse des fonctions des protocoles ipsec et leur intégration dans un réseau privé virtuel.
Ann. des Télécommunications, 2000

1988
Biomac, A Versatile Biometric Verification Machine for Access Control.
Proceedings of IAPR Workshop on Computer Vision, 1988


  Loading...