Yacine Challal
Orcid: 0000-0002-9237-6210
According to our database1,
Yacine Challal
authored at least 133 papers
between 2002 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Int. J. Parallel Program., December, 2023
PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side.
J. Inf. Secur. Appl., September, 2023
Inf. Secur. J. A Glob. Perspect., January, 2023
Privacy-preserving remote deep-learning-based inference under constrained client-side environment.
J. Ambient Intell. Humaniz. Comput., 2023
Zero-Touch Security Management for mMTC Network Slices: DDoS Attack Detection and Mitigation.
IEEE Internet Things J., 2023
Service Orchestration in Autonomous Vehicle Networks: Leveraging Vehicular Fog and Edge Computing.
Proceedings of the International Conference on Software, 2023
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
2022
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks.
J. Netw. Syst. Manag., 2022
J. Inf. Secur. Appl., 2022
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices.
Comput. Commun., 2022
An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing Architecture.
Proceedings of the 30th International Conference on Software, 2022
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Security Analysis and Evaluation of Optimized Authentication in Named Data Networking.
Proceedings of the Advances in Computing Systems and Applications, 2022
2021
Certificateless Public Key Systems Aggregation: An enabling technique for 5G multi-domain security management and delegation.
Comput. Networks, 2021
PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021
2020
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things.
J. Netw. Comput. Appl., 2020
Optimized in-network authentication against pollution attacks in software-defined-named data networking.
J. Inf. Secur. Appl., 2020
Comput. Networks, 2020
A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
IEEE Trans. Intell. Transp. Syst., 2019
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019
A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Single-Path Network Coding Authentication for Software-Defined Named Data Networking.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
2018
Digit. Commun. Networks, 2018
Comput. Networks, 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Proceedings of the 26th International Conference on Software, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Peer-to-Peer Collaborative Video-on-Demand Streaming over Mobile Content Centric Networking.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications.
Pervasive Mob. Comput., 2017
Using dynamic programming to solve the Wireless Sensor Network Configuration Problem.
J. Netw. Comput. Appl., 2017
Efficient and privacy-aware multi-party classification protocol for human activity recognition.
J. Netw. Comput. Appl., 2017
Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group Communications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 25th International Conference on Software, 2017
Proceedings of the International Conference on Selected Topics in Mobile and Wireless Networking, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks.
Future Gener. Comput. Syst., 2016
MK-AMI: Efficient multi-group key management scheme for secure communications in AMI systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Novel Efficient and Privacy-Preserving Protocols for Sensor-Based Human Activity Recognition.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015
Ad Hoc Networks, 2015
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
J. Netw. Comput. Appl., 2014
Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges.
IEEE Commun. Surv. Tutorials, 2014
Comput. Networks, 2014
Proceedings of the 2014 IFIP Wireless Days, 2014
Context-aware energy-efficient wireless sensor architecture for body activity recognition.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014
2013
IEEE Trans. Wirel. Commun., 2013
Wireless sensor networks for rehabilitation applications: Challenges and opportunities.
J. Netw. Comput. Appl., 2013
J. Intell. Robotic Syst., 2013
IEEE Commun. Lett., 2013
Comput. Commun., 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Global Information Infrastructure Symposium, 2013
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures.
Proceedings of the 4th International Conference on Ambient Systems, 2013
2012
A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring.
Proceedings of the 3rd International Conference on Ambient Systems, 2012
J. Univers. Comput. Sci., 2012
J. Parallel Distributed Comput., 2012
J. Netw. Comput. Appl., 2012
An efficient key management scheme for content access control for linear hierarchies.
Comput. Networks, 2012
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
Sécurité de l'Internet des Objets : vers une approche cognitive et systémique. (Internet of Things Security: towards cognitive and systemic approach).
, 2012
2011
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks.
J. Netw. Comput. Appl., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Efficient adaptive failure detection for Query/Response based wireless sensor networks.
Proceedings of the IFIP Wireless Days Conference 2011, 2011
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
2010
Telecommun. Syst., 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
HDMRP: An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010
An efficient and highly resilient key management scheme for wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the ARES 2010, 2010
2009
Comput. Secur., 2009
Proceedings of the 17th Euromicro International Conference on Parallel, 2009
2008
Int. J. Secur. Networks, 2008
Int. J. Netw. Secur., 2008
Int. J. Inf. Comput. Secur., 2008
HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks.
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the International Symposium on Computer Networks, 2006
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
PhD thesis, 2005
H<sub>2</sub>A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming.
Comput. Secur., 2005
Comput. Commun., 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
2004
IEEE Commun. Surv. Tutorials, 2004
Comput. Commun. Rev., 2004
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Proceedings of the High Speed Networks and Multimedia Communications, 2004
2002
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002