El Mamoun Souidi

Orcid: 0000-0003-1716-3204

According to our database1, El Mamoun Souidi authored at least 34 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Click fraud prediction by stacking algorithm.
Intelligenza Artificiale, 2023

A Comparative Analysis of Sampling Techniques for Click-Through Rate Prediction in Native Advertising.
IEEE Access, 2023

Forecasting Click Fraud via Machine Learning Algorithms.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
New code-based cryptographic accumulator and fully dynamic group signature.
Des. Codes Cryptogr., 2022

The Blackhole Attack on Vehicular Network.
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022

2021
An Information Hiding Scheme for Live P2P Streaming Based on the R2 Protocol.
J. Inf. Hiding Multim. Signal Process., 2021

A behavioural in-depth analysis of ransomware infection.
IET Inf. Secur., 2021

In-Depth Analysis of Ransom Note Files.
Comput., 2021

Error Correcting Network Codes.
Comput. Networks, 2021

2020
Steganography over Redundant Residue Number System Codes.
J. Inf. Secur. Appl., 2020

Rank-metric code-based mutual authentication protocol for RFID.
J. Inf. Secur. Appl., 2020

2019
An efficient code-based threshold ring signature scheme.
J. Inf. Secur. Appl., 2019

Strong Designated Verifier Signature Based on the Rank Metric.
Proceedings of the Information Security Theory and Practice, 2019

Introduction to Steganography in RRNS based Communications.
Proceedings of the 2nd International Conference on Networking, 2019

An Efficient Identification Scheme Based on Rank Metric.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum \pi -distance 3.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Overinfection in Ransomware.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

A Steganogaphic Scheme for MAC-Independent Opportunistic Routing and Encoding (MORE) Protocol.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Inside GandCrab Ransomware.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
An Overview on Spora Ransomware.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

PrincessLocker analysis.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol.
Proceedings of the Codes, Cryptology and Information Security, 2017

A New Dynamic Code-Based Group Signature Scheme.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
A Code-based Group Signature Scheme with Shorter Public Key Length.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

2015
Security of Mobile Agent Platforms Using Access Control and Cryptography.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2015

2014
A Steganographic Protocol Based on Linear Error-Block Codes.
Proceedings of the SECRYPT 2014, 2014

Access control using mobile agents.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

A New Approach based on Cryptography and XML Serialization for Mobile Agent Security.
Proceedings of the ICAART 2014, 2014

2013
New families of perfect linear error-block codes.
Int. J. Inf. Coding Theory, 2013

2011
A New Steganographic Scheme based on First Order Reed Muller Codes - A New Steganographic Scheme.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Improving Code-Based Steganography with Linear Error-Block Codes.
Proceedings of the Digital Information Processing and Communications, 2011

2010
A Novel Steganographic Protocol from Error-correcting Codes.
J. Inf. Hiding Multim. Signal Process., 2010


  Loading...