Volgen
Aymen Boudguiga
Aymen Boudguiga
Geverifieerd e-mailadres voor cea.fr - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Towards better availability and accountability for iot updates by means of a blockchain
A Boudguiga, N Bouzerna, L Granboulan, A Olivereau, F Quesnel, ...
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 50-58, 2017
2782017
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
T Cheneau, A Boudguiga, M Laurent
computers & security 29 (4), 419-431, 2010
642010
A secure and authenticated key management protocol (SA-KMP) for vehicular networks
H Tan, M Ma, H Labiod, A Boudguiga, J Zhang, PHJ Chong
IEEE Transactions on Vehicular Technology 65 (12), 9570-9584, 2016
582016
Sara: Security automotive risk analysis method
JP Monteuuis, A Boudguiga, J Zhang, H Labiod, A Servel, P Urien
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 3-14, 2018
532018
A simple intrusion detection method for controller area network
A Boudguiga, W Klaudel, A Boulanger, P Chiron
2016 ieee international conference on communications (icc), 1-7, 2016
442016
ID based cryptography for cloud data storage
N Kaaniche, A Boudguiga, M Laurent
2013 IEEE Sixth International Conference on Cloud Computing, 375-382, 2013
392013
An efficient cyber defense framework for UAV-Edge computing network
H Sedjelmaci, A Boudguiga, IB Jemaa, SM Senouci
Ad Hoc Networks 94, 101970, 2019
272019
Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping
PE Clet, M Zuber, A Boudguiga, R Sirdey, C Gouy-Pailler
Cryptology ePrint Archive, 2022
192022
RACE: Risk analysis for cooperative engines
A Boudguiga, A Boulanger, P Chiron, W Klaudel, H Labiod, JC Seguy
2015 7th International Conference on New Technologies, Mobility and Security …, 2015
192015
Cooperative-its architecture and security challenges: a survey
A Boudguiga, A Kaiser, P Cincilla
Inteligent Transport System World Congress, 2015
142015
An authentication scheme for IEEE 802.11 s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms
A Boudguiga, M Laurent
Third International Conference on Communications and Networking, 1-8, 2012
142012
A generic cyber defense scheme based on stackelberg game for vehicular network
H Sedjelmaci, IH Brahmi, A Boudguiga, W Klaudel
2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2018
102018
Cooperative and smart attacks detection systems in 6G-enabled Internet of Things
H Sedjelmaci, N Kheir, A Boudguiga, N Kaaniche
ICC 2022-IEEE International Conference on Communications, 5238-5243, 2022
92022
Server assisted key establishment for WSN: A MIKEY-Ticket approach
A Boudguiga, A Olivereau, N Oualha
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
9*2013
Revisiting stream-cipher-based homomorphic transciphering in the TFHE era
AA Bendoukha, A Boudguiga, R Sirdey
International Symposium on Foundations and Practice of Security, 19-33, 2021
82021
Cooperative security framework for CBTC network
H Sedjelmaci, F Guenab, A Boudguiga, Y Petiot
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
72018
Method and device for establishing session keys
A Boudguiga, N Oualha, A Olivereau, C Janneteau
US Patent 9,787,651, 2017
72017
Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption.
A Boudguiga, O Stan, A Fazzat, H Labiod, PE Clet
ICISSP, 684-693, 2021
62021
On the performance of freescale i. MX6 cryptographic acceleration and assurance module
A Boudguiga, W Klaudel, JD Wesolowski
Proceedings of the 2015 Workshop on Rapid Simulation and Performance …, 2015
62015
Key-escrow resistant ID-based authentication scheme for IEEE 802.11 s mesh networks
A Boudguiga, M Laurent
2011 IEEE Wireless Communications and Networking Conference, 784-789, 2011
62011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20