Boucif Amar Bensaber

According to our database1, Boucif Amar Bensaber authored at least 32 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
Design and modeling an Adaptive Neuro-Fuzzy Inference System (ANFIS) for the prediction of a security index in VANET.
J. Comput. Sci., 2020

Study of the Impact of Sinkhole Attack in IoT Using Shewhart Control Charts.
Proceedings of the IEEE Global Communications Conference, 2020

2019
RIN: A dynamic pseudonym change system for privacy in VANET.
Concurr. Comput. Pract. Exp., 2019

Design and modeling an Adaptive Neuro-Diffuse System (ANFIS) for the prediction of a security index in VANET.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

2018
Efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks.
Secur. Priv., 2018

2017
Performance evaluation of communications in distributed systems and web based service architectures.
J. Comput. Sci., 2017

Using Mathematical Methods Against Denial of Service (DoS) Attacks in VANET.
Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, 2017

An efficient and dynamic pseudonyms change system for privacy in VANET.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

RSU authentication by aggregation in VANET using an interaction zone.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2016

2015
An Efficient Pseudonym Change Protocol Based on Trusted Neighbours for Privacy and Anonymity in VANETs.
Proceedings of the 5th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2015

A probabilistic model to corroborate three attacks in vehicular ad hoc networks.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

On Copulas-Based Classification Method for Intrusion Detection.
Proceedings of the Computer Science and Its Applications, 2015

2014
A typed applicative system for a language and text processing engineering.
J. Innov. Digit. Ecosyst., 2014

A Flexible Approach for Text Processing Engineering.
Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, 2014

Using Strong Lexical Association Extraction in an Understanding of Managers' Decision Process.
Proceedings of the Twenty-Seventh International Florida Artificial Intelligence Research Society Conference, 2014

2013
Seeking for High Level Lexical Association in Texts.
Proceedings of the Modeling Approaches and Algorithms for Advanced Computer Applications, 2013

Decision support protocol for intrusion detection in VANETs.
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2013

Protocol of change pseudonyms for VANETs.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Integration of Sequence of Computational Modules Dedicated to Text Analysis: A Combinatory Typed Approach.
Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, 2013

2012
Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs.
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2012

Extraction of Strong Associations in Classes of Similarities.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

2011
Trust Key Management Scheme for Wireless Body Area Networks.
Int. J. Netw. Secur., 2011

A Light Weight Protocol to Provide Location Privacy in Wireless Body Area networks
CoRR, 2011

A key management method based on an AVL tree and ECC cryptography for wireless sensor networks.
Proceedings of the Q2SWinet'11, Proceedings of the Seventh ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, FL, USA, October 31, 2011

2009
Combinators' Introduction: an Enhanced Algorithm.
Proceedings of the Twenty-Second International Florida Artificial Intelligence Research Society Conference, 2009

2008
The Categorial Annotation of Coordination in Arabic.
Proceedings of the Twenty-First International Florida Artificial Intelligence Research Society Conference, 2008

2006
Coordination and Applicative Categorial Type Logic.
Int. J. Artif. Intell. Tools, 2006

Multicast Key Agreement Protocol for Mobile Ad-hoc Networks.
Proceedings of the WINSYS 2006, 2006

2005
Some Arguments for Coordination in Categorial Grammar and Combinatory Logic.
Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, 2005

2000
PIERCE Program: Informatics Support for Multi-Site Clinical Research: an Environment for Consensual Use of Clinical Protocols and Clinical Trials.
Proceedings of the Computer-Based Support for Clinical Guidelines and Protocols, 2000


  Loading...