Mohamed Elhoucine Elhdhili

According to our database1, Mohamed Elhoucine Elhdhili authored at least 27 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
LoRaWAN possible attacks, proposed countermeasures and enhanced solution.
Int. J. Inf. Commun. Technol., 2021

2020
Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security.
Wirel. Pers. Commun., 2020

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments.
IEEE Trans. Netw. Serv. Manag., 2020

Collaborative and verifiable key derivation protocol for smart home security: CV-KDP.
Inf. Technol. Manag., 2020

2019
Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP.
J. Netw. Syst. Manag., 2019

Privacy-preserving aware data transmission for IoT-based e-health.
Comput. Networks, 2019

Novel Smart Home Authentication Protocol LRP-SHAP.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

PP-NDNoT: On preserving privacy in IoT-based E-health systems over NDN.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

2018
Enhancing Security and Trust in Named Data Networking using Hierarchical Identity Based Cryptography.
Int. J. Syst. Serv. Oriented Eng., 2018

A Secure and Privacy-Preserving Solution for IoT over NDN Applied to E-health.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Lightweight Privacy-Preserving Solution for IoT: The Case of E-Health.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption scheme.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Towards a Secure Access to Content in Named Data Networking.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Hierarchical Identity Based Cryptography for Security and Trust in Named Data Networking.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

CTMS-SIOT: A context-based trust management system for the social Internet of Things.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Lightweight Enhanced Collaborative Key Management Scheme for Smart Home Application.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

Trusted Third Party Based Key Management for Enhancing LoRaWAN Security.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

Privacy Preserving Solution for Internet of Things with Application to eHealth.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Security analysis of existing IoT key management protocols.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

A survey on privacy: Terminology, mechanisms and attacks.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

Priority-MAC: A priority based medium access control solution with QoS for WSN.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2010
Towards an efficient reputation based hybrid key management architecture for <i>ad hoc</i> networks.
Secur. Commun. Networks, 2010

2009
REputation based Clustering Algorithm for security management in ad hoc networks with liars.
Int. J. Inf. Comput. Secur., 2009

2008
CASAN: Clustering algorithm for security in ad hoc networks.
Comput. Commun., 2008

2006
Lowest Weight: Reactive Clustering Algorithm for Adhoc Networks.
Proceedings of the Personal Wireless Communications, 2006


  Loading...