Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV” I Ahmim, N Ghoualmi-Zine, A Ahmim, M Ahmim International Journal of Information Security 21 (5), 1019-1026, 2022 | 13 | 2022 |
TAKE-IoT: Tiny authenticated key exchange protocol for the internet of things R Khelf, N Ghoualmi-Zine, M Ahmim International Journal of Embedded and Real-Time Communication Systems …, 2020 | 10 | 2020 |
Blockchain-Based Authentication Scheme for Collaborative Traffic Light Systems Using Fog Computing S Namane, M Ahmim, A Kondoro, IB Dhaou Electronics 12 (2), 431, 2023 | 6 | 2023 |
Formal analysis of efficiency and safety in IPSec based on internet key exchange protocol M Ahmim, M Babes, N Ghoualmi-Zine International Journal of Communication Networks and Distributed Systems 14 …, 2015 | 5 | 2015 |
Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model A Ahmim, F Maazouzi, M Ahmim, S Namane, IB Dhaou IEEE Access 11, 119862-119875, 2023 | 4 | 2023 |
Secure Network Entry Process in Wimax. N Kahya, N Ghoualmi-Zine, M Ahmim J. Commun. 14 (12), 1205-1210, 2019 | 1 | 2019 |
Blockchain-Based Authentication Scheme for Collaborative Traffic Light Systems Using Fog Computing. Electronics 2023, 12, 431 S Namane, M Ahmim, A Kondor, IB Dhaou | | 2023 |
ESIKE: An efficient and secure internet key exchange protocol M Ahmim, A Ahmim, MA Ferrag, N Ghoualmi-Zine, L Maglaras Wireless Personal Communications 128 (2), 1309-1324, 2023 | | 2023 |
Lightweight Authentication Protocols for Internet of Vehicles: Network Model, Taxonomy and Challenges I Ahmim, N Ghoualmi-Zine, M Ahmim, A Ahmim 2022 4th International Conference on Pattern Analysis and Intelligent …, 2022 | | 2022 |
An Enhanced of Secure Authentication Scheme for the Internet of Things M Ahmim, A Adjabi, A Ahmed, S Namane 2022 4th International Conference on Pattern Analysis and Intelligent …, 2022 | | 2022 |
4th PAIS Table of Contents A Bouamrane, H Zarzour, R Kenaza, A Khemane, H Bendjenna, ... | | |
Secured Initial Ranging Process in Wimax N Kahya, N Ghoualmi-Zine, M Ahmim | | |