Mohamed Dâfir Ech-Cherif El Kettani

Orcid: 0000-0002-6625-1393

Affiliations:
  • Mohammed V University, Rabat, Morocco


According to our database1, Mohamed Dâfir Ech-Cherif El Kettani authored at least 27 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fedidchain: An Innovative Blockchain-Enabled Framework for Cross-Border Interoperability and Trust Management in Identity Federation Systems.
J. Netw. Syst. Manag., 2023

2020
MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context.
J. Ambient Intell. Humaniz. Comput., 2020

2019
An Efficient Fully Homomorphic Encryption Scheme.
Int. J. Netw. Secur., 2019

Towards an Interoperable Identity Management Framework: a Comparative Study.
CoRR, 2019

A Hybrid Scheme for an Interoperable Identity Federation System Based on Attribute Aggregation Method.
Comput., 2019

MSND: Multicast Software Defined Network Based Solution to Multicast Tree Construction.
Proceedings of the Ubiquitous Networking - 5th International Symposium, 2019

Using advanced detection and prevention technique to mitigate threats in SDN architecture.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

New context-based node acceptance CBNA framework for MitM detection in SDN Architecture.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Analysis of Identity Management Systems Using Blockchain Technology.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

2018
A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security.
CoRR, 2018

OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6.
Proceedings of the Networked Systems - 6th International Conference, 2018

Evaluating AND gates over encrypted data in cloud computing.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2018

Detection MITM Attack in Multi-SDN Controller.
Proceedings of the 5th IEEE International Congress on Information Science and Technology, 2018

Optimal Shared Multicast Tree Based Solution for Group Key Management in Mobile IPv6.
Proceedings of the 5th IEEE International Congress on Information Science and Technology, 2018

2017
A verifiable fully homomorphic encryption scheme to secure big data in cloud computing.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2017

A Noise-Free Homomorphic Evaluation of the AES Circuits to Optimize Secure Big Data Storage in Cloud Computing.
Proceedings of the Innovations in Smart Cities and Applications, 2017

Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Fully homomorphic encryption: Searching over encrypted cloud data.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017

2014
PIM-SM Protocol with GRASP-RP Selection Algorithm Based Architecture to Transparent Mobile Sources in Multicast Mobile IPv6 Diffusion.
J. Mobile Multimedia, 2014

QoS-VNS-CS: QoS constraints Core Selection Algorithm based on Variable Neighborhood Search Algorithm.
Int. J. Commun. Networks Inf. Secur., 2014

Multiple active cores-based shared multicast tree for mobile IPv6 environment.
Proceedings of the Third IEEE International Colloquium in Information Science and Technology, 2014

2013
Delay and Delay Variation Constrained Algorithm based on VNS Algorithm for RP Management in Mobile IPv6
CoRR, 2013

Parallel Greedy Randomized Adaptive Search Procedure with Delay and Delay Variation for RP Selection in PIM-SM Multicast Routing.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2012
VND-CS: A Variable Neighborhood Descent Algorithm for Core Selection Problem in Multicast Routing Protocol.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2008
NCSec: a national cyber security referential for the development of a code of practice in national cyber security management.
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008

2000
Fault Management in a Multicast Routing Environment: Kernel Based Tree Protocol, a Case Study.
Proceedings of the Managing QoS in Multimedia Networks and Services, IEEE/IFIP TC6, 2000


  Loading...