Mawloud Omar

Orcid: 0000-0002-4670-8982

According to our database1, Mawloud Omar authored at least 60 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Reliable and Secure X2V Energy Trading Framework for Highly Dynamic Connected Electric Vehicles.
IEEE Trans. Veh. Technol., July, 2023

Methods for detecting and removing ocular artifacts from EEG signals in drowsy driving warning systems: A survey.
Multim. Tools Appl., May, 2023

Highly efficient approach for discordant BSMs detection in connected vehicles environment.
Wirel. Networks, 2023

Securing 5G Network Slices with Adaptive Machine Learning Models as-a-Service: A Novel Approach.
Proceedings of the IEEE Global Communications Conference, 2023

2022
IFKMS: Inverse Function-based Key Management Scheme for IoT networks.
J. Inf. Secur. Appl., 2022

Ultra-safe and reliable enhanced train-centric communication-based train control system.
Computing, 2022

Efficient and lightweight protocol for anti-jamming communications in wireless body area networks.
Comput. Electr. Eng., 2022

Safety-Oriented Train Control Systems Monitoring in Smart Railway Transportation: A Review.
Proceedings of the 4th International Conference on Pattern Analysis and Intelligent Systems, 2022

Ultra-Lightweight and Secure Intrusion Detection System for Massive-IoT Networks.
Proceedings of the IEEE International Conference on Communications, 2022

A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

User Mobility Dataset for 5G Networks Based on GPS Geolocation.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

2021
Energy-aware key management and access control for the Internet of things.
World Wide Web, 2021

Reliable and Adaptive Distributed Public-Key Management Infrastructure for the Internet of Things.
Wirel. Pers. Commun., 2021

Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects.
Wirel. Pers. Commun., 2021

Robust multimodal biometric authentication on IoT device through ear shape and arm gesture.
Multim. Tools Appl., 2021

An efficient biometric-based continuous authentication scheme with HMM prehensile movements modeling.
J. Inf. Secur. Appl., 2021

CHEARP: Chord-based hierarchical energy-aware routing protocol for wireless sensor networks.
Comput. Sci. Inf. Syst., 2021

A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT.
Proceedings of the 2021 Wireless Days, 2021

Toward a lightweight machine learning based solution against cyber-intrusions for IoT.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

2020
Authenticated semi-quantum key distribution without entanglement.
Quantum Inf. Process., 2020

Characterizing and using gullibility, competence, and reciprocity in a very fast and robust trust and distrust inference algorithm for weighted signed social networks.
Knowl. Based Syst., 2020

Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities.
Comput. Electr. Eng., 2020

Matrix-based key management scheme for IoT networks.
Ad Hoc Networks, 2020

Efficient and Lightweight Polynomial-Based Key Management Scheme for Dynamic Networks.
Proceedings of the Mobile, Secure, and Programmable Networking, 2020

Autonomous Vehicle Security: Literature Review of Real Attack Experiments.
Proceedings of the Risks and Security of Internet and Systems, 2020

Secure Data Processing for Industrial Remote Diagnosis and Maintenance.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Reliable and Secure Distributed Smart Road Pricing System for Smart Cities.
IEEE Trans. Intell. Transp. Syst., 2019

Context-aware negotiation, reputation and priority traffic light management protocols for VANET-based smart cities.
Telecommun. Syst., 2019

A robust trust inference algorithm in weighted signed social networks based on collaborative filtering and agreement as a similarity metric.
J. Netw. Comput. Appl., 2019

Context-aware pseudonymization and authorization model for IoT-based smart hospitals.
J. Ambient Intell. Humaniz. Comput., 2019

A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity.
Comput. Secur., 2019

Securing Vehicular Platooning against Vehicle Platooning Disruption (VPD) Attacks.
Proceedings of the 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, 2019

CAPM: Context-Aware Privacy Model for IoT-Based Smart Hospitals.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Reputation based Intelligent Control Protocol.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

CA-ADP: Context-Aware Authorization and Delegation Protocol for IoT-based healthcare smart systems.
Proceedings of the International Conference on Internet of Things, 2019

Cryptanalysis and Improvement of Identity-Based Multisignature Scheme.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

A wider picture of trust: confronting multi-contextual social traits for trust inference.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Using ABE for Medical Data Protection in Fog Computing.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

2018
Deterministic MDI QKD with two secret bits per shared entangled pair.
Quantum Inf. Process., 2018

Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments.
J. Ambient Intell. Humaniz. Comput., 2018

Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET.
J. Inf. Secur. Appl., 2018

Reliable and Efficient Data Communication Protocol for WBAN-Based Healthcare Systems.
Int. J. E Health Medical Commun., 2018

µKMS: micro key management system for WSNs.
IET Wirel. Sens. Syst., 2018

QoS-based routing in Wireless Body Area Networks: a survey and taxonomy.
Computing, 2018

Efficient and energy-aware key management framework for dynamic sensor networks.
Comput. Electr. Eng., 2018

2017
Secure and distributed certification system architecture for safety message authentication in VANET.
Telecommun. Syst., 2017

Secure and reliable patient body motion based authentication approach for medical body area networks.
Pervasive Mob. Comput., 2017

A trust-based approach for securing data communication in delay tolerant networks.
Int. J. Inf. Comput. Secur., 2017

A comprehensive analytical model for QoS-based routing protocols evaluation in WBANs.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

2016
Lightweight Sharing Scheme for Data Integrity Protection in WSNs.
Wirel. Pers. Commun., 2016

Secure and reliable certificate chains recovery protocol for mobile ad hoc networks.
J. Netw. Comput. Appl., 2016

Lightweight identity-based authentication protocol for wireless sensor networks.
Int. J. Inf. Comput. Secur., 2016

Reliable and energy aware query-driven routing protocol for wireless sensor networks.
Ann. des Télécommunications, 2016

Trust-ticket based authentication scheme for WSN multi-domain applications.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

EREAT: Efficient Route Estimation based-on Actuator Tracking for WSANs.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

Collaborative Localization Algorithm based on Constraint Programming.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2015
Secure and efficient sharing aggregation scheme for data protection in WSNs.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

2012
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy.
J. Netw. Comput. Appl., 2012

2009
Reliable and fully distributed trust model for mobile ad hoc networks.
Comput. Secur., 2009

2007
NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007


  Loading...