A novel digital signature scheme for advanced asymmetric encryption techniques

F Lalem, A Laouid, M Kara, M Al-Khalidi, A Eleyan - Applied Sciences, 2023 - mdpi.com
Digital signature schemes are practical mechanisms for achieving message integrity,
authenticity, and non-repudiation. Several asymmetric encryption techniques have been …

[HTML][HTML] Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras

Z Man, J Liu, F Zhang, X Meng - Alexandria Engineering Journal, 2025 - Elsevier
In order to solve the problems of key redundancy, transmission and storage security and the
difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper …

Arabic opinion mining using machine learning techniques: Algerian dialect as a case of study

M Kara, A Laouid, A Bounceur… - Proceedings of the 6th …, 2022 - dl.acm.org
Social networking services such as Facebook, Twitter, and YouTube are fertile ground for
analyzing texts, extracting opinions, and identifying feelings, due to a large number of texts …

[PDF][PDF] Tuberculosis detection using chest X-ray image classification by deep learning

SS Guia, A Laouid, M Kara, M Hammoudeh - 2023 - academia.edu
Tuberculosis is a serious and widespread lung disease, not all patients are usually detected.
After the availability of high-resolution chest x-rays, deep learning can now provide solutions …

Secure clock synchronization protocol in wireless sensor networks

M Kara, A Laouid, A Bounceur, M Hammoudeh - 2023 - researchsquare.com
Cryptography helps solve many computer and communication problems, including clock
synchronization, where a group of nodes wants to agree on a theoretically unique clock in …

A lightweight clock synchronization technique for wireless sensor networks: A randomization-based secure approach

M Kara - 2023 - researchsquare.com
Wireless sensor networks (WSNs) are receiving significant attention. In which, there is a
large number of studies are being done to address the problem of clock synchronization; …

Tuberculosis Detection Using Chest X-Ray Image Classification by Deep Learning

R Kebache, A Laouid, SS Guia, M Kara… - Proceedings of the 7th …, 2023 - dl.acm.org
Tuberculosis (TB) is a deadly and widespread lung disease that is often not easily
detectable in the early stages. Thanks to the availability of high-resolution chest X-rays …

Private Document Vault with Server-Side Encryption in Cloud AWS S3 Bucket

DJ Aditya, S Laxmanraj… - 2023 8th International …, 2023 - ieeexplore.ieee.org
The most requested future-oriented innovation in the world is distributed computing.
Distributed storage is one of the most famous managements presented in cloud computing …

A Lightweight Leader Election Algorithm for IoT: Cloud Storage Use Case

M Kara, A Bounceur, M Hammoudeh, H Ngadi… - 2023 - researchsquare.com
IoT devices in a distributed environment that work on shared data still have a necessity for a
locking mechanism to safely take turns while updating shared data. However, we no longer …

[PDF][PDF] Secure Management of Autonomous Cloud Entities in Distributed Systems

M Kara - 2023 - academia.edu
Abstract In recent years, Cloud Computing and Big Data have been considered the most
attractive areas that are revolutionizing the IT world. Cloud Computing paradigm has …