Sihem Guemara El Fatmi

According to our database1, Sihem Guemara El Fatmi authored at least 65 papers between 1997 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Ensuring Data Integrity Using Digital Signature in an IoT Environment.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
A Distributed Resource Management for VANET using Smart Contract.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Towards the Performance Evaluation of a Trust Based Routing Protocol for VANET.
Proceedings of the Advanced Information Networking and Applications, 2021

A Lightweight Authentication Scheme for SDN-Based Architecture in IoT.
Proceedings of the Advanced Information Networking and Applications, 2021

Enhancing security using digital signature in an efficient Network Coding-enabled WSN.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021

Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Formal Validation of a Security Mechanism against the RSU Compromise Attack.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Smart Contract-Based Access Control for the Vehicular Networks.
Proceedings of the 28th International Conference on Software, 2020

A secure network coding-enabled approach for a confidential cluster-based routing in wireless sensor networks.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

A New SDN Architecture Based on Trust Management and Access Control for IoT.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Towards the performance evaluation of a clustering and trust based security mechanism for VANET.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Towards a New Clustering Algorithm based on Trust Management and Edge Computing for IoT.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A Formal Environment for Credibility and Accuracy Assessment of Safety Messages Exchanged in VANETs.
Proceedings of the Information Systems, 2019

A Security Mechanism Against the RSU Compromise Attack in a Ticket-Based Authentication Scheme for VANETs.
Proceedings of the Information Systems, 2019

2018
Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography.
Int. J. Syst. Serv. Oriented Eng., 2018

A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks.
Hum. centric Comput. Inf. Sci., 2018

A New Trust based Routing Protocol for VANETs.
Proceedings of the Seventh International Conference on Communications and Networking, 2018

Towards the Optimization of a Ticket-based Authentication Scheme for VANETs.
Proceedings of the Seventh International Conference on Communications and Networking, 2018

Towards a Secured Clustering Mechanism for Messages Exchange in VANET.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Towards the Formal Validation of a Ticket-Based Authentication Scheme for VANETs.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Toward a Distributed Trust Management scheme for VANET.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A trust-based security environment in MANET: definition and performance evaluation.
Ann. des Télécommunications, 2017

Towards a Secure Access to Content in Named Data Networking.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Hierarchical Identity Based Cryptography for Security and Trust in Named Data Networking.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

A Ticket-Based Authentication Scheme for VANETs Preserving Privacy.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2017

A Trust Based Communication Scheme for Safety Messages Exchange in VANETs.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2017

2015
A credential and encryption based access control solution for named data networking.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Toward Securing MANET Against the Energy Depletion Attack.
Proceedings of the Risks and Security of Internet and Systems, 2015

A Formal Environment for MANET Organization and Security.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Trust Negotiation Based Approach to Enforce MANET Routing Security.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
A novel name-based security mechanism for information-centric networking.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

A novel secure Ad hoc routing protocol using one time password.
Proceedings of the International Conference on Advanced Logistics and Transport, 2014

A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Dealing with delegation in a trust-based MANET.
Proceedings of the 20st International Conference on Telecommunications, 2013

Access control enforcement in Named Data Networking.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Data-based access control in named data networking.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

A Reputation-Based Clustering Mechanism for MANET Routing Security.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Delegation Management Modeling in a Security Policy based Environment.
Proceedings of the Proceedings Fourth International Symposium on Symbolic Computation in Software Science, 2012

Towards a generic trust management model.
Proceedings of the 19th International Conference on Telecommunications, 2012

Trust-based delegation for Ad Hoc QoS enhancing.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Using security policies in a network securing process.
Proceedings of the 18th International Conference on Telecommunications, 2011

2009
Towards a test cases generation method for Security Policies.
Proceedings of the 2009 International Conference on Telecommunications, 2009

Dealing with Multi Security Policies in Communication Networks.
Proceedings of the Fifth International Conference on Networking and Services, 2009

2008
Towards an automated firewall security policies validation process.
Proceedings of the CRiSIS '08, 2008

An Automated Validation Method for Security Policies: The Firewall Case.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case.
Proceedings of the The Third International Conference on Availability, 2008

2007
A novel node architecture for optical networks: Modeling, analysis and performance evaluation.
Comput. Commun., 2007

QoS Routing In Ad Hoc Networks by Integreting Activity in the OLSR Protocol.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

A Dynamic QoS-Based Scheme for Admission Control in OBS Networks.
Proceedings of IEEE International Conference on Communications, 2007

Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach.
Proceedings of the Proceedings 40th Annual Simulation Symposium (ANSS-40 2007), 2007

A QoS-Oriented Protocol for Burst Admission Control in OBS Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
QoS Oriented Contention Resolution Techniques for Optical Burst Switching Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
New correlation method for an efficient intrusion detection system.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Performance analysis and simulation of a novel OBS network architecture.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Optical Label Switching: Design issues, modeling and performance analysis.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

An advance dynamic resource reservation algorithm for OBS networks: Design and performance.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

2004
Relational-based calculus for trust management in networked services.
Comput. Commun., 2004

Relational-based Trust Management in a Generic Payment System.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

2002
Quality of service provision in high-speed networks: an active approach.
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002

2001
Synchronizing multimedia flows in active-high-speed networks.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

1997
Multiple connections in data communication and advanced applications.
Comput. Commun., 1997

Extended connection models for advanced applications.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

Formal Protocol Description: Model and validation.
Proceedings of the Participants Copies of Third International Seminar on the Use of Relational Methods in Computer Science, 1997


  Loading...