Mehdi Berenjkoub

According to our database1, Mehdi Berenjkoub authored at least 26 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Survivability evaluation for networks carrying complex traffic flows.
Digit. Commun. Networks, April, 2023

2020
Comments on "Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra".
IEEE Trans. Inf. Forensics Secur., 2020

2019
Universal designated verifier signature scheme with non-delegatability in the standard model.
Inf. Sci., 2019

Secure pattern matching based on bit parallelism - Non-interactive protocols for non-deterministic string matching automata evaluation.
Int. J. Inf. Sec., 2019

Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model.
IET Inf. Secur., 2019

A High Throughput Device-to-Device Wireless Communication System.
IEICE Trans. Inf. Syst., 2019

Optimally Efficient Secure Scalar Product With Applications in Cloud Computing.
IEEE Access, 2019

2018
On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol.
CoRR, 2018

2017
An efficient certificateless signcryption scheme in the standard model.
ISC Int. J. Inf. Secur., 2017

2016
An improved certificateless signcryption scheme.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

2015
Defense Mechanisms against Injecting Traffic with MAC Layer Misbehavior Detection and Cooperation Stimulation for Autonomous Ad Hoc Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
An adaptive MAC protocol for wireless LANs.
J. Commun. Networks, 2014

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks.
ISC Int. J. Inf. Secur., 2014

A multi-signer convertible limited multi-verifier signature scheme in the standard model.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

A modular two-layer system for accurate and fast traffic classification.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
An unsupervised anomaly detection engine with an efficient feature set for AODV.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

2012
A symmetric polynomial-based mutual authentication protocol for GSM networks.
Int. J. Secur. Networks, 2012

2011
A high performance and intrinsically secure key establishment protocol for wireless sensor networks.
Comput. Networks, 2011

2010
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks.
ISC Int. J. Inf. Secur., 2010

A Hybrid Key Establishment Protocol for Large Scale Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

A New Key Establishment Protocol for Limited Resource Wireless Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
A TESLA-based mutual authentication protocol for GSM networks.
ISC Int. J. Inf. Secur., 2009

An efficient authentication and key management protocol for hierarchical ad hoc sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A new mutual authentication protocol for GSM networks.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

2008
A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks.
Proceedings of the Advances in Computer Science and Engineering, 2008

Prevention of Tunneling Attack in endairA.
Proceedings of the Advances in Computer Science and Engineering, 2008


  Loading...