L'état de la production scientifique de la division est présenté selon les critères reconnus en la matière, à savoir :

  • Publications et communications internationales.
  • Publications et communications nationales.
  • Rapports internes de recherche.
  • Rapports techniques.

 

DSI: Production Scientifique Année 2019

1. Fateh Boucenna, Omar Nouali, Samir Kechid : Secure Inverted Index based Search over Encrypted Cloud Data with User Access Rights Management, Journal of Computer Science and Technology and key agreement scheme for e-health applications in the context of Internet of Things. January 2019, (IF 1.185), Volume 34, Issue 1, pp 133–154, DOI 10.1007/s11390-019-1903-2. ©2019 Springer Science +Business Media, LLC & Science Press, China.

2. Amine Boulemtafes, Nadjib Badache: Sensing Platforms for Prototyping and Experimenting Wearable Continuous Health Monitoring Systems: A Quick Starter Point Guide. Chapitre dans le livre : "Incorporating the Internet of Things in Healthcare Applications and Wearable Devices" publié par IGI Global, 2019.

3. Amine Boulemtafes, Abdelouahid Derhab, Yacine Challal: A Review of Privacy-Preserving Techniques for Deep Learning. Journal Neurocomputing, Édité par Elsevier, Date en ligne Décembre 2019.

4. Amine Boulemtafes, Nadjib Badache: Sensing Platforms for Prototyping and Experimenting Wearable Continuous Health Monitoring Systems: A Quick Starter Point Guide. Chapitre dans le livre : "Incorporating the Internet of Things in Healthcare Applications and Wearable Devices" publié par IGI Global, 2019.

5. Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane: An efficient authentication and key agreement scheme for e-health applications in the context of Internet of Things. IJICS, International Journal of Information and Computer Security, Inderscience publishers, Numéro spécial: Cyber Security Issues and Solutions.

1. Abdelghani Krinah, Yacine Challal, Omar Nouali  : Using ABE for Medical Data Protection in Fog Computing. in ICEIS 2019, Heraklion – Grèce, 3-5 Mai 2019.

2. Ahmed Saidi, Omar Nouali, Abdelouahab Amira : Collaborative And Fast Decryption Using Fog Computing And A Hidden Access Policy.6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY (CSEIT-2019), NOVEMBER 23~34, 2019, ZURICH, SWITZERLAND.

 

DSI: Production Scientifique Année 2018

1. Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane : An efficient authentication and key agreement scheme for e-health applications in the context of Internet of Things.IJICS, International Journal of Information and Computer Security, Inderscience publishers, Abstract online, Juillet 2018.

2. Fateh Boucenna, Omar Nouali, Samir Kechid, Tahar Kechadi : Secure Inverted Index based Search over Encrypted Cloud Data with User Access Rights Management. Journal of Computer Science and Technology, 2018.

1. 1. Yacine Challal, Fatima Z. Benhamida, Omar Nouali  : Scalable Key Management for Elastic Security Domains in Fog networks. WETICE 2018, 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings will be included to IEEE Xplore and indexed through INSPEC, Compendex, and Thomson Reuters, DBLP, Google Scholar and EI Index, 27-29 Juin 2018, Paris, France.

 

DSI: Production Scientifique Année 2017

1. Amira Abdelouahab, Oudjaout Aberraouf, Derhab Abdelouahid, Badache Nadjib: Sound and Static Analysis of Session Fixation Vulnerabilities in PHP web Applications. CODASPY 2017, 7TH ACM Conference on Data and Application Security and Privacy.

2. Fateh Boucenna , Omar Nouali, Adel Dabah and Samir Kechid: Accelerated Semantic Search over Encrypted CloudData. BIGCUMPUTING 2017.

 

DSI: Production Scientifique Année 2016

1. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani :Lightweighted and Energy-Aware Mikey-Ticket For E-Health Applications in the Context of Internet of Things.Accepted for publication in International Journal of Sensor Networks (IJSNET), Inderscience publisher, 2016.

1. Nikolaos Sarantinos, Chafika Benzaid, Omar Arabiat, Ameer Al-Nemrat : Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. In Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 2016.

2. Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid : IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework. In Proceedings of Cybersecurity and Cyberforensics Conference (CCC), pp. 35 – 40, 2016.

3. Mourad Benmalek, Yacine Challal : MK-AMI: efficient Multi-group Key management scheme for secure communications in AMI systems. IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 2016.

4. Lyes Touati, Yacine Challal :Collaborative KP-ABE for Cloud-Based Internet of Things Applications.IEEE International conference on Computer Communications (ICC), Kualalampur, Malaysia, 2016.

5. Lyes Touati, Yacine Challal : Instantaneous proxy-based Key Update for CP-ABE.IEEE LCN, Dubai, 2016.

6. Lyes Touati, Hamed Hellaoui, Yacine Challal : Threshold Yoking/Grouping proofs based on CP-ABE for IoT applications. IEEE TrustCom, China, 2016.

7. Zakaria Gheid, Yacine Challal : Efficient and privacy preserving k-means clustering for big data mining.IEEE TrustCom, China, 2016.

8. Zakaria Gheid, Yacine Challal : Novel efficient and privacy-preserving protocols for sensor based human activity recognition. IEEE UIC, Toulouse France, 2016.

9. Benzaid, Abderrahman Boulgheraif, Fatma Zohra Dahmane, Ameer Al-Nemrat, Khaled Zeraoulia : Intelligent Detection of MAC Spoofing Attack in 802.11 Network. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN 2016), Singapore, 4th -7th January, 2016.

10. A. Djellalbia, S. Benmeziane, N. Badache, S. Bensimessaoud:An Anonymous Authentication Scheme in e-Health Cloud environment. 7th International workshop on Cloud Applications and Security in conjunction with The 11th IEEE International Conference for Internet Technology and Secured Transactions, December 5-7, 2016, Barcelona, Spain.

11. S. Bensimessaoud, S. Benmeziane, N. Badache, A. Djellalbia: An Enhanced Approach to Preserving Privacy in Social Network Data Publishing.BDSN 2016, The 4th International workshop on Big Data and Social Networking Management and Security, December 5-7, 2016, Barcelona, Spain.

12. Fateh Boucenna , Omar Nouali and Samir Kechid: Concept-based Semantic Search over Encrypted Cloud Data.WEBIST 2016 12th International Conference on Web Information Systems and Technologies, Apr 23, 2016 - Apr 25, 2016, Rome, Italy. Digital Object Identifier: 10.5220/0005858302350242. Proceedings of WEBIST 2016, ISBN: 978-989-758-186-1, available on-line in the SciTePress Digital Library at http://www.scitepress.org/DigitalLibrary.

13. H. Khemissa and D. Tandjaoui :A Novel Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things.in Proceedings of the 2016 Wireless Telecommunications Symposium (WTS), London, United Kingdom, 2016, pp. 1-6.

14. Ameer Al-Nemrat, Nikolaos Sarantinos, Chafika Benzaid and Omar Arabyat : Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. Submitted to Concurrency and Computation: Practice and Experience Journal. Numéro special sur « Advances in Cyber-Security Techniques and Applications" du journal "Concurrency and Computation : Practice and Experience".

 

DSI: Production Scientifique Année 2015

1. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui : An end-to-end secure key management protocol for e-health applications. Computers & Electrical Engineering, Special Issue on Emerging Research in Internet of Things, Vol 44: 184-197 (2015).

1. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani : Architecting the Internet of Things: State of the Art. Robots and Sensor Clouds book, Pages 55-75, Août 2015.

1. Mourad Benmalek, Yacine Challal : eSKAMI: Efficient and Scalable multi-group Key management for Advanced Metering Infrastructure in Smart Grid. RATSP Symposium in Conjunction with IEEE Trustcom, Helsinki, Finland, 2015.

2. Zakaria Gheid, Yacine Challal : <An Efficient and Privacy-preserving Similarity Evaluation For Big Data Analytics. ACM / IEEE Utility and Cloud Computing (UCC), Cyprus, Greece, 2015.

3. Mourad Benmalek, Yacine Challal, Abdelmadjid Bouabdallah : Scalable multi-group key management for Advanced Metering Infrastructure. IEEE International Conference on Computer and Information Technology (CIT), Liverpool, UK, 2015.

4. Lyes Touati, Yacine Challal : Poster: Activity based access control for IoT ACM SmartObjects, Paris, France 2015.

5. Lyes Touati, Yacine Challal : Efficient CP-ABE Attribute/Key Management for IoT Applications.IEEE International Conference on Computer and Information Technology (CIT), Liverpool, UK, 2015.

6. Mourad Benmalek, Yacine Challal : MK-AMI: efficient Multi-group Key management scheme for secure communications in AMI systems. IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 2016.

7. Lyes Touati, Yacine Challal :Collaborative KP-ABE for Cloud-Based Internet of Things Applications.IEEE International conference on Computer Communications (ICC), Kualalampur, Malaysia, 2016.

8. Ameer Al-Nemrat, Chafika Benza : Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. conférence IEEE Trustcom2015/ISPA2015/BigDataSE2015, les 20 et 22 Août 2015 à Helsinki, Finland.

9. BENZAÏD, Abderrahman Boulgheraif, Fatma Zohra Dahmane, Ameer Al-Nemrat, Khaled Zeraoulia: Intelligent Detection of MAC Spoofing Attack in 802.11 Network. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN 2016), Singapore, 4th -7th January, 2016. (To appear).

10. Amina DJELLALBIA, BenMeziane Souad, Nadjib Badache, Sihem BENSIMESSAOUD : An Adaptive Anonymous Authentication for Cloud Environment. International Conference on Cloud Computing Technologies and Applications, CLOUDTECH 2015, June 2-4 2015, Marrakesh, Morocco.

11. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani : A Decentralized Batch-based Group Key Management Protocol for Mobile Internet of Things (DBGK). In The 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015) Liverpool, England, UK, 26-28 October 2015.

12. Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek : Trust-based RPL for the Internet of Things.In The Twentieth IEEE Symposium on Computers and Communications, Larnaca, Cyprus, 2015.

13. Faiza Medjek, Djamel Tandjaoui, Mohammed Riyadh Abdmeziem, Nabil Djedjig : Analytical evaluation of the impacts of Sybil attacks against RPL under mobility.The 12 th International Symposium on Programming and Systems (ISPS), Alger (Algérie), 29 April 2015.

14. Hamza Khemissa, Djamel Tandjaoui : A Lightweight Authentication Scheme for E-health applications in the context of Internet of Things. In the 9th International Conference on Next Generation Mobile Applications, Services and Technologies,Cambridge UK, 2015.

15. Boualouache Abdelwahab, Nouali Omar et Moussaoui Samira : A BLE-based data collection system for IoT. 10th International Conference on Future Networks and Communications, FNC-2015 and the 12th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2015, inexé Elsevier, August 17-20, 2015, Belfort, France (accepté).

16. Fehis Saad, Nouali Omar : A new Graph based Chinese Wall Security Policy Model. 5th International Conference on Information Systems and Technologies (ICIST 2015), March 21-23, 2015. Istanbul, Turkey. (article accepté et non présenté).

17. Fehis Saad, Nouali Omar : A new Chinese Wall Security Policy Model Based On the Subject’s Wall and Object’s Wall. ICACC-2015, First International Conference on Anti-Cybercrime (ICACC-2015), Under the Patronage of the Custodian of the Two Holy Mosques King Abdullah Bin Abdulaziz Al Saud, 9-11 February 2015 - Riyadh, Saudi Arabia (article accepté et non présenté).

1. Mohammed Riyadh Abdmeziem, Djamel Tandjaoui : Securing e-Health Applications in the Context of Internet of Things: Tailoring Mikey Ticket. Conférence sur l’Ingénierie Informatique (C2i), Ecole Militaire Polytechnique (Bordj El Bahri, Alger), 17 Décembre 2014.

 

DSI: Production Scientifique Année 2014

1. R. Abdemezian, D. Tandjaoui : A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things.extended version submitted to ad hoc networks Special Issue on Internet of Things security and privacy: design methods, detection, prevention and countermeasures.

2. R. Abdemezian, D. Tandjaoui: A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things. extended version submitted to Computers & Electrical Engineering.

3. Boualouache Abdelwahab: UPCS : Urban Pseudonym Changing Strategy for Location Privacy in VANETs. Ad Hoc Networks, international and archival journal, Editor-in-Chief: I.F. Akyildiz, Impact Factor (2013): 1.943, Imprint: ELSEVIER, ISSN: 1570-8705, soumission en Novembre 2014.

1. R. Abdemezian, D. Tandjaoui: A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things. International Conference on Next Generation Computing and Communication Technologies 2014 (ICNGCCT'14), 23-24 April 2014, Dubai, UAE.

2. R. Abdemezian, D. Tandjaoui: Tailoring Mikey-Ticket to E-health Applications in the Context of Internet of Things. In the International Conference on Advanced Networking, Distributed Systems and Applications (INDS 2014), 17-19 June 2014, Bejaia, Algeria.

3. R. Abdemezian, D. Tandjaoui: A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things. 2nd International Workshop on Emerging Technologies for Smart Devices (ETSD 2014), 22-27 June 2014, Benidorm, Spain.

4. S. Benmeziane, N. Badache: A clustering technique to analyse anonymous systems.International Conference on Communications Systems and Technologies, ICCST’2014, Tunisia, August 2014.

5. Fehis Saad, Nouali Omar: Metadata’s Protection of CKMS in CKMS-As-A-Security Services. 4th International Conference on Information Systems and Technologies (ICIST 2014), Valencia, Spain, March 22-24, 2014.

6. D. Tandjaoui: A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things.accepté pour publication dans le proceeding de la conférence International Conference on Next Generation Computing and Communication Technologies 2014.

7. Brahim Hadaoui, Taboudjemat Nadia, Nouali Omar: Privacy Aware Multi-attribute Bucketization Technique in Database as a Service model for Disaster Management Systems. The International Conference on Data Mining, Internet Computing, and Big Data (BigData2014), as part of The Third World Congress on Computing and Information Technology (WCIT),17th to 19th November 2014, Asia Pacific University of Technology and Innovation (APU), Kuala Lumpur, Malaysia, 2014 (article accepté).

8. Fehis Saad, Nouali Omar: A new Graph based Chinese Wall Security Policy Model. 5th International Conference on Information Systems and Technologies (ICIST 2015).

 

© 2017 DSI, CERIST. All Rights Reserved.