Security in device‐to‐device communications: a survey O Nait Hamoud, T Kenaza, Y Challal IET Networks 7 (1), 14-22, 2018 | 73 | 2018 |
Implementing a secure remote patient monitoring system O Nait Hamoud, T Kenaza, Y Challal, L Ben-Abdelatif, M Ouaked Information Security Journal: A Global Perspective 32 (1), 21-38, 2023 | 5 | 2023 |
Certificateless Public Key Systems Aggregation: An enabling technique for 5G multi-domain security management and delegation O Nait-Hamoud, T Kenaza, Y Challal Computer Networks 199, 108443, 2021 | 5 | 2021 |
Towards using multiple KGC for CL-PKC to secure D2D communications ON Hamoud, T Kenaza, Y Challal 2018 International Conference on Smart Communications in Network …, 2018 | 5 | 2018 |
Efficient centralized approach to prevent from replication attack in wireless sensor networks T Kenaza, ON Hamoud, N Nouali‐Taboudjemat Security and Communication Networks 8 (2), 220-231, 2015 | 5 | 2015 |
A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications. ON Hamoud, T Kenaza, Y Challal ICETE (2), 84-95, 2019 | 4 | 2019 |
The cloning attack vulnerability in WSN key management schemes NNT Othmane Nait Hamoud, Tayeb Kenaza The Seventh International Conference on Sensor Technologies and Applications …, 2013 | | 2013 |
The Cloning Attack Vulnerability in WSN Key Management Schemes ON Hamoud, T Kenaza, N Nouali-Taboudjmat | | |
la gestion des clés cryptographiques dans les réseaux de capteurs sans-fil. O NAIT HAMOUD Ecole Nationale Supérieure d'informatique, 0 | | |
La sécurité des communications dans les réseaux mobiles de nouvelle génération. O NAIT HAMOUD Ecole Nationale Supérieure d'informatique, 0 | | |