Lamia Ben Azzouz

Orcid: 0000-0001-9364-7302

According to our database1, Lamia Ben Azzouz authored at least 20 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Virtualized Security for Industry 4.0.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

2022
Context-aware security for the Intra-Electric Vehicle Network under energy constraints.
Comput. Electr. Eng., 2022

2021
RICAV: RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Security issues in Industry 4.0.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
SDN, slicing, and NFV paradigms for a smart home: A comprehensive survey.
Trans. Emerg. Telecommun. Technol., 2019

A lightweight IPsec-based energy home area networks.
Trans. Emerg. Telecommun. Technol., 2019

Adaptive Security for the Intra-Electric Vehicular Wireless Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Cyber security issues of Internet of electric vehicles.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

2017
Improvements to the Smart Energy Profile security.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
A secure Neighborhood Area Network using IPsec.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

2011
Security services for eSafety applications clusters.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
Towards an efficient reputation based hybrid key management architecture for <i>ad hoc</i> networks.
Secur. Commun. Networks, 2010

OLSR based peer to peer instant messaging for Ad-hoc networks.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010

2009
REputation based Clustering Algorithm for security management in ad hoc networks with liars.
Int. J. Inf. Comput. Secur., 2009

2008
CASAN: Clustering algorithm for security in ad hoc networks.
Comput. Commun., 2008

Network entry process security in IEEE 802.16 mesh mode.
Proceedings of the 1st IFIP Wireless Days, 2008

2006
Lowest Weight: Reactive Clustering Algorithm for Adhoc Networks.
Proceedings of the Personal Wireless Communications, 2006

2004
A Kerberos-Based Authentication Architecture for Wireless LANs.
Proceedings of the NETWORKING 2004, 2004

A Kerberos-Based Authentication Architecture for WLANS - Test beds and experiments.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004

1999
An EDI User Agent over the Internet.
Netw. Inf. Syst. J., 1999


  Loading...