Följ
Saïd GHAROUT
Saïd GHAROUT
Arm
Verifierad e-postadress på kigen.com
Titel
Citeras av
Citeras av
År
M2M security: Challenges and solutions
A Barki, A Bouabdallah, S Gharout, J Traore
IEEE Communications Surveys & Tutorials 18 (2), 1241-1254, 2016
1442016
Trusted execution environments: A look under the hood
G Arfaoui, S Gharout, J Traoré
2014 2nd IEEE international conference on mobile cloud computing, services …, 2014
472014
Trusted platform module as an enabler for security in cloud computing
M Achemlal, S Gharout, C Gaber
2011 Conference on Network and Information Systems Security, 1-6, 2011
442011
A practical set-membership proof for privacy-preserving NFC mobile ticketing
G Arfaoui, JF Lalande, J Traoré, N Desmoulins, P Berthomé, S Gharout
arXiv preprint arXiv:1505.03048, 2015
412015
Adaptive clustering for scalable key management in dynamic group communications
Y Challal, S Gharout, A Bouabdallah, H Bettahar
International Journal of Security and Networks 3 (2), 133-146, 2008
292008
Key management with host mobility in dynamic groups
S Gharout, A Bouabdallah, M Kellil, Y Challal
Proceedings of the 3rd international conference on Security of information …, 2010
262010
Adaptive group key management protocol for wireless communications
S Gharout, A Bouabdallah, Y Challal, M Achemlal
Journal of Universal Computer Science 18 (6), 874-899, 2012
242012
Designing and proving an EMV-compliant payment protocol for mobile devices
V Cortier, A Filipiak, J Florent, S Gharout, J Traoré
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 467-480, 2017
232017
Scalable delay-constrained multicast group key management
S Gharout, Y Challal, A Bouabdallah
International Journal of Network Security 7 (2), 142-156, 2008
152008
S-DV: a new approach to Secure Distance Vector routing protocols
A Babakhouya, Y Challal, A Bouabdallah, S Gharout
2006 Securecomm and Workshops, 1-10, 2006
142006
Anonymous attestations made practical
A Barki, N Desmoulins, S Gharout, J Traoré
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
132017
Solving partitioning problem in codesign with ant colonies
M Koudil, K Benatchba, S Gharout, N Hamani
International Work-Conference on the Interplay Between Natural and …, 2005
132005
Private eCash in practice (short paper)
A Barki, S Brunet, N Desmoulins, S Gambs, S Gharout, J Traoré
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
112017
Using ant colonies to solve data-mining problems
L Admane, K Benatchba, M Koudil, M Drias, S Gharout, N Hamani
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004
112004
Technique for downloading a network access profile
S Gharout, L Coureau
US Patent 11,349,831, 2022
102022
Practical and privacy-preserving TEE migration
G Arfaoui, S Gharout, JF Lalande, J Traoré
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
82015
Scenario requirements
M Achemlal, S Gharout, C Gaber, M Llanes, E Prieto, R Diaz, L Coppolino, ...
Bericht, MASSIF FP7-257475, 2011
72011
Scenario requirements (public version)
M Llanes, E Prieto, R Diaz, L Coppolino, A Sergio, R Cristaldi, ...
FP7-257475 MASSIF European project, Tech. Rep, 2011
62011
Method for obtaining a security token by a mobile terminal
A Filipiak, S Gharout, J Traore, V Cortier
US Patent 11,922,384, 2024
42024
Application of satisfiability algorithms to time-table problems
F NADER, M KOUDIL, K BENATCHBA, L ADMANE, S GHAROUT, ...
Rapport Interne LMCS, INI, 2004
32004
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20